Patents by Inventor Allen Roginsky

Allen Roginsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7519824
    Abstract: A method for time stamping a digital document employs a two-part time stamp receipt. The first part of the time stamp receipt includes identifying data associated with a document and a nonce. The second part of the time stamp receipt includes a time indication and the nonce. The nonce serves as a link between the first and second parts.
    Type: Grant
    Filed: December 10, 1999
    Date of Patent: April 14, 2009
    Assignee: International Business Machines Corporation
    Inventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
  • Patent number: 7519178
    Abstract: A method, system and apparatus are described for ensuring a uniform random distribution of keys generated for cryptography. These generated keys, are depicted utilizing a trusted third party, or Certification Authority (CA) in the generation of a reliable seed to be used in the generation of prime numbers used in public key cryptography. The inclusion of the trusted third party allows for an independent third party to police against first party attacks on the security of the system without increasing the overhead of the system significantly.
    Type: Grant
    Filed: February 24, 1999
    Date of Patent: April 14, 2009
    Assignee: International Business Machines Corporation
    Inventors: Stephen Michael Matyas, Jr., Allen Roginsky
  • Patent number: 7490241
    Abstract: A method for time stamping a digital document is disclosed. The document originator creates a time stamp receipt using the document and the current time. The time stamp receipt is submitted to a time stamping authority having a trusted clock. The time stamping authority validates the time stamp receipt by comparing the time value specified in the time stamp receipt to the current time. If the time value specified in the time stamp receipt is within a predetermined time window, the time stamping authority cryptographically binds the time value and document, or the time value and some representation of the document, e.g., by signing the time stamp receipt with its private signature key.
    Type: Grant
    Filed: December 10, 1999
    Date of Patent: February 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
  • Patent number: 7487359
    Abstract: A time stamping protocol has two stages referred to as the ticketing stage and the certification stage. During the ticketing stage, the document or other identifying data is sent to the TSA. The TSA generates a “ticket” based on the document or other identifying data and a time indication derived from a trusted clock. The ticket, which serves as an unsigned time stamp receipt, is transmitted back to the document originator. During the certification stage, the holder of the ticket requests a certified time stamp receipt by presenting the ticket to the TSA. The TSA verifies the ticket and generates a signed time stamp receipt, called the ticket stub, which is then transmitted back to the document originator. The ticket stub serves as a “universal time-stamp” that the holder of the ticket stub can use to prove the date of the document.
    Type: Grant
    Filed: August 29, 2007
    Date of Patent: February 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
  • Patent number: 7315948
    Abstract: A time stamping protocol has two stages referred to as the ticketing stage and the certification stage. During the ticketing stage, the document or other identifying data is sent to the TSA. The TSA generates a “ticket” based on the document or other identifying data and a time indication derived from a trusted clock. The ticket, which serves as an unsigned time stamp receipt, is transmitted back to the document originator. During the certification stage, the holder of the ticket requests a certified time stamp receipt by presenting the ticket to the TSA. The TSA verifies the ticket and generates a signed time stamp receipt, called the ticket stub, which is then transmitted back to the document originator. The ticket stub serves as a “universal time-stamp” that the holder of the ticket stub can use to prove the date of the document.
    Type: Grant
    Filed: December 10, 1999
    Date of Patent: January 1, 2008
    Assignee: International Business Machines Corporation
    Inventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
  • Publication number: 20070297608
    Abstract: A method for protecting data for access by a plurality of users. A server encrypts data using a master key and a symmetric encryption algorithm. For each authorized user, a key encryption key (KEK) is derived from a passphrase, and the master key is encrypted using the KEK. The server posts the encrypted data and an ancillary file that includes, for each user, a user identifier and the master key encrypted according to the user's KEK. To access the data, a user enters the passphrase into a client, which re-derives the user's KEK, and finds, in the ancillary file, the master key encrypted using the user's KEK. The client decrypts the master key and then decrypts the data. A KEK may be derived from a natural language passphrase by hashing the passphrase, concatenating the result and a predetermined text, hashing the concatenation, and truncating.
    Type: Application
    Filed: June 21, 2007
    Publication date: December 27, 2007
    Inventors: Per Jonas, Allen Roginsky, Nevenko Zunic
  • Publication number: 20070294537
    Abstract: A time stamping protocol has two stages referred to as the ticketing stage and the certification stage. During the ticketing stage, the document or other identifying data is sent to the TSA. The TSA generates a “ticket” based on the document or other identifying data and a time indication derived from a trusted clock. The ticket, which serves as an unsigned time stamp receipt, is transmitted back to the document originator. During the certification stage, the holder of the ticket requests a certified time stamp receipt by presenting the ticket to the TSA. The TSA verifies the ticket and generates a signed time stamp receipt, called the ticket stub, which is then transmitted back to the document originator.
    Type: Application
    Filed: August 29, 2007
    Publication date: December 20, 2007
    Applicant: International Business Machines Corporation
    Inventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen Matyas
  • Publication number: 20070157308
    Abstract: An authenticator is configured with intelligence for the purpose of providing a “failsafe” mode for port-based authentication (802.1x). This failsafe mode enables end users to access a network when communication between the authenticator and the authentication server has temporarily failed, but keeps security measures in place so that unauthorized users cannot gain network access. An 802.1x access control point (e.g., a switch) is enabled to continue to authenticate certain users onto the network during periods of temporary communication failure with the authentication server, by locally storing alternative authentication information limited to historical authentication information of clients that have previously accessed the network via the authentication server. Subsequent revalidation of specific users using the primary authentication information follows restoration of communication with the authentication server.
    Type: Application
    Filed: January 3, 2006
    Publication date: July 5, 2007
    Inventors: Jeffrey Bardsley, Nathaniel Kim, Charles Lingafelt, Allen Roginsky
  • Publication number: 20070038866
    Abstract: Method, system, and program product for port based authentication protocols where addresses are dynamically assigned within a network environment, and more particularly to port based authentication in the network environment, where connection information is captured and stored. This facilitates administrator access to information created as a result of protocol exchanges involved in dynamic address assignment, authentication, and connection.
    Type: Application
    Filed: August 9, 2005
    Publication date: February 15, 2007
    Inventors: Jeffrey Bardsley, Nathaniel Kim, Charles Lingafelt, Allen Roginsky, Norman Strole
  • Publication number: 20070016456
    Abstract: System, method and program product for reporting status of a process. A flow chart illustrates steps of the process and an order for performance of the steps. Then, a determination is made whether any of the steps has been performed. In response to a determination that any of the steps has been performed, graphically representing on the flow chart that the step has been performed. The graphical representation can be color-coding of the step. The determination that a step has been performed can be made based on user input that the step has been performed, or automatically by a program checking a record indicating that the step has been performed. Also, a program can automatically determine that a deadline for performing one of the steps has passed without performance of the one step. In response, the program initiates a graphical representation on the one step in the flowchart that the deadline has passed without performance of the one step.
    Type: Application
    Filed: July 12, 2005
    Publication date: January 18, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kevin Himberger, Clark Jeffries, Allen Roginsky, Charles Lingafelt, Phillip Singleton
  • Publication number: 20060156408
    Abstract: A method, apparatus, and computer instructions for providing a current and complete security compliance view of an enterprise system. The present invention provides the ability to gain a real-time security posture and security compliance view of an enterprise and to assess the risk impact of known threats and attacks to continued business operations at various levels is provided. Responsive to a change to an enterprise environment, a request, or an external threat, an administrator loads or updates at least one of a Critical Application Operations database, a Historical database, an Access Control database, a Connectivity database, and a Threat database. Based on a comparison of information in the databases against similar security data elements from company or external policies, the administrator may generate a Security Compliance view of the enterprise. A Security Posture view may also be generated by comparing the Security Compliance view against data in the Threat database.
    Type: Application
    Filed: January 11, 2005
    Publication date: July 13, 2006
    Applicant: International Business Machines Corporation
    Inventors: Kevin Himberger, Clark Jeffries, Charles Lingafelt, Allen Roginsky, Phillip Singleton
  • Patent number: 6993656
    Abstract: A method for time stamping a digital document is disclosed. The document originator creates a time stamp receipt by combining the document or other identifying data and a digital time indication. The time stamp receipt is submitted to a time stamping authority having a trusted clock. The time stamping authority optionally validates the time stamp receipt and then computes the age of the time stamp receipt. The time stamping authority creates an aged time stamp receipt by combining the identifying data and time indication contained in the submitted time stamp receipt with the computed age of the time stamp receipt. The time stamping authority cryptographically binds the time information and identifying data in the aged time stamp receipt, e.g., by signing the combination of the identifying data, time indication, and computed age with a private signature generation key.
    Type: Grant
    Filed: December 10, 1999
    Date of Patent: January 31, 2006
    Assignee: International Business Machines Corporation
    Inventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
  • Patent number: 6965998
    Abstract: A time-stamping protocol for time-stamping digital documents uses a time-based signature key. A document or other identifying data is sent to a time stamping authority TSA. The TSA has a time-based signature key that the TSA uses to sign time stamp receipts. The signature key is associated with a fixed time reference that is stored in a public key certificate also containing the public verification key. Upon receiving the document, the TSA creates a time stamp receipt by computing a time difference between the time reference associated with the signature key and the time the document was received. The time difference is appended to the document to create a time stamp receipt and the receipt is then signed by the TSA and transmitted to the requestor.
    Type: Grant
    Filed: December 10, 1999
    Date of Patent: November 15, 2005
    Assignee: International Business Machines Corporation
    Inventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
  • Patent number: 6742119
    Abstract: A method for time stamping a digital document is disclosed. The document originator creates a time stamp receipt by combining the document and a digital time indication. The time stamp receipt is submitted to a time stamping agent having a trusted clock. The time stamping agent optionally validates the time stamp receipt and then computes the age of the time stamp receipt. If valid, the time stamping agent certifies the time stamp receipt by signing the time stamp receipt with a private signature key. The private signature key is selected from a group of signature keys by the time stamping agent based on the computed age of the time stamp receipt.
    Type: Grant
    Filed: December 10, 1999
    Date of Patent: May 25, 2004
    Assignee: International Business Machines Corporation
    Inventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
  • Patent number: 6345098
    Abstract: A method, system and apparatus are described which utilize a trusted third party, or Certification Authority (CA) in the generation of a reliable seed to be used in the generation of prime numbers used in public key cryptography. The inclusion of the trusted third party allows for an independent third party to police against first party attacks on the security of the system without increasing the overhead of the system significantly.
    Type: Grant
    Filed: July 2, 1998
    Date of Patent: February 5, 2002
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Matyas, Jr., Allen Roginsky
  • Patent number: 6307938
    Abstract: A method, system and apparatus for generating primes (p and q) for use in cryptography from secret random numbers and an initialization value whereby the initial secret random numbers are encoded into the generated primes. This eliminates the need to retain the initial secret random numbers for auditing purposes. The initialization value may also be generated from information readily available, if so desired, resulting in additional entropy without the requirement of storing additional information.
    Type: Grant
    Filed: July 10, 1998
    Date of Patent: October 23, 2001
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Matyas, Jr., Allen Roginsky
  • Patent number: 6034946
    Abstract: Methods, systems and computer program products which identify network routing paths having a first performance characteristic less than a first specified limit and a second performance characteristic less than a second specified limit from a plurality of routing paths. These routing paths are identified by combining both the first performance characteristic and the second performance characteristic for one of the plurality of routing paths to provide a third performance characteristic which differs from both the first and the second performance characteristic and which operates as a proxy for the first and second performance characteristic. It is then determined if the third performance characteristic of the routing path is less than a third performance limit associated with the third performance characteristic.
    Type: Grant
    Filed: April 15, 1997
    Date of Patent: March 7, 2000
    Assignee: International Business Machines Corporation
    Inventors: Allen Roginsky, Raif Onvural, Vijay Srinivasan