Patents by Inventor Alan Eldridge

Alan Eldridge has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070014398
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to symmetric key generation and provide a method, system and computer program product for symmetric key generation using an asymmetric private key. In one embodiment, a symmetric key generation data processing system can include a symmetric key generator configured with a programmatic interface including an input parameter for a seed, an input parameter for an asymmetric private key, and an output parameter for a symmetric key. The symmetric key generator can include program code enabled to generate the symmetric key by encrypting the seed with the asymmetric private key.
    Type: Application
    Filed: July 12, 2005
    Publication date: January 18, 2007
    Applicant: International Business Machines Corporation
    Inventors: Alan Eldridge, David Kern
  • Publication number: 20060112283
    Abstract: The present invention is a method, system and apparatus for the encryption of a credential store by using a lockbox mechanism. In a credential store encryption method, a lockbox for a credential store can be retrieved and an encryption key can be selected from among a list of encryption keys in the lockbox. The lockbox can be a local lockbox and the local lockbox can be retrieved from an unencrypted region of the credential store. In any case, subsequent to the retrieval of the lockbox, the credential store can be decrypted with the selected encryption key.
    Type: Application
    Filed: November 22, 2004
    Publication date: May 25, 2006
    Applicant: International Business Machines Corporation
    Inventors: Alan Eldridge, David Kern
  • Publication number: 20050138388
    Abstract: The invention provides a method for managing cryptographically generated data tokens, the method comprising: decoding a data file to retrieve a first cryptographically generated data token, identifying a second cryptographically generated data token associated with the first data token, and updating the second data token according to a security preference related to a characteristic of the first or the second data token.
    Type: Application
    Filed: December 19, 2003
    Publication date: June 23, 2005
    Inventors: Robert Paganetti, Alan Eldridge, Charles Kaufman
  • Publication number: 20050138367
    Abstract: The invention relates generally secure mail operations. More particularly, the invention provides a method for managing a user security credential, the method comprising: storing, in a file contained in a data store communicatively coupled to a mail server, a security credential associated with a user; authorizing a client to access the data store according to an access permission associated with the user; retrieving the security credential from the file; and initiating a security-related mail operation from the client using the security credential without the security credential leaving the server.
    Type: Application
    Filed: December 19, 2003
    Publication date: June 23, 2005
    Inventors: Robert Paganetti, Alan Eldridge, Charles Kaufman, Mary Zurko, Katherine Emling, Richard Davies