Patents by Inventor Allen Roginsky
Allen Roginsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7519824Abstract: A method for time stamping a digital document employs a two-part time stamp receipt. The first part of the time stamp receipt includes identifying data associated with a document and a nonce. The second part of the time stamp receipt includes a time indication and the nonce. The nonce serves as a link between the first and second parts.Type: GrantFiled: December 10, 1999Date of Patent: April 14, 2009Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
-
Patent number: 7519178Abstract: A method, system and apparatus are described for ensuring a uniform random distribution of keys generated for cryptography. These generated keys, are depicted utilizing a trusted third party, or Certification Authority (CA) in the generation of a reliable seed to be used in the generation of prime numbers used in public key cryptography. The inclusion of the trusted third party allows for an independent third party to police against first party attacks on the security of the system without increasing the overhead of the system significantly.Type: GrantFiled: February 24, 1999Date of Patent: April 14, 2009Assignee: International Business Machines CorporationInventors: Stephen Michael Matyas, Jr., Allen Roginsky
-
Patent number: 7490241Abstract: A method for time stamping a digital document is disclosed. The document originator creates a time stamp receipt using the document and the current time. The time stamp receipt is submitted to a time stamping authority having a trusted clock. The time stamping authority validates the time stamp receipt by comparing the time value specified in the time stamp receipt to the current time. If the time value specified in the time stamp receipt is within a predetermined time window, the time stamping authority cryptographically binds the time value and document, or the time value and some representation of the document, e.g., by signing the time stamp receipt with its private signature key.Type: GrantFiled: December 10, 1999Date of Patent: February 10, 2009Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
-
Patent number: 7487359Abstract: A time stamping protocol has two stages referred to as the ticketing stage and the certification stage. During the ticketing stage, the document or other identifying data is sent to the TSA. The TSA generates a “ticket” based on the document or other identifying data and a time indication derived from a trusted clock. The ticket, which serves as an unsigned time stamp receipt, is transmitted back to the document originator. During the certification stage, the holder of the ticket requests a certified time stamp receipt by presenting the ticket to the TSA. The TSA verifies the ticket and generates a signed time stamp receipt, called the ticket stub, which is then transmitted back to the document originator. The ticket stub serves as a “universal time-stamp” that the holder of the ticket stub can use to prove the date of the document.Type: GrantFiled: August 29, 2007Date of Patent: February 3, 2009Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
-
Patent number: 7315948Abstract: A time stamping protocol has two stages referred to as the ticketing stage and the certification stage. During the ticketing stage, the document or other identifying data is sent to the TSA. The TSA generates a “ticket” based on the document or other identifying data and a time indication derived from a trusted clock. The ticket, which serves as an unsigned time stamp receipt, is transmitted back to the document originator. During the certification stage, the holder of the ticket requests a certified time stamp receipt by presenting the ticket to the TSA. The TSA verifies the ticket and generates a signed time stamp receipt, called the ticket stub, which is then transmitted back to the document originator. The ticket stub serves as a “universal time-stamp” that the holder of the ticket stub can use to prove the date of the document.Type: GrantFiled: December 10, 1999Date of Patent: January 1, 2008Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
-
Publication number: 20070297608Abstract: A method for protecting data for access by a plurality of users. A server encrypts data using a master key and a symmetric encryption algorithm. For each authorized user, a key encryption key (KEK) is derived from a passphrase, and the master key is encrypted using the KEK. The server posts the encrypted data and an ancillary file that includes, for each user, a user identifier and the master key encrypted according to the user's KEK. To access the data, a user enters the passphrase into a client, which re-derives the user's KEK, and finds, in the ancillary file, the master key encrypted using the user's KEK. The client decrypts the master key and then decrypts the data. A KEK may be derived from a natural language passphrase by hashing the passphrase, concatenating the result and a predetermined text, hashing the concatenation, and truncating.Type: ApplicationFiled: June 21, 2007Publication date: December 27, 2007Inventors: Per Jonas, Allen Roginsky, Nevenko Zunic
-
Publication number: 20070294537Abstract: A time stamping protocol has two stages referred to as the ticketing stage and the certification stage. During the ticketing stage, the document or other identifying data is sent to the TSA. The TSA generates a “ticket” based on the document or other identifying data and a time indication derived from a trusted clock. The ticket, which serves as an unsigned time stamp receipt, is transmitted back to the document originator. During the certification stage, the holder of the ticket requests a certified time stamp receipt by presenting the ticket to the TSA. The TSA verifies the ticket and generates a signed time stamp receipt, called the ticket stub, which is then transmitted back to the document originator.Type: ApplicationFiled: August 29, 2007Publication date: December 20, 2007Applicant: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen Matyas
-
Publication number: 20070157308Abstract: An authenticator is configured with intelligence for the purpose of providing a “failsafe” mode for port-based authentication (802.1x). This failsafe mode enables end users to access a network when communication between the authenticator and the authentication server has temporarily failed, but keeps security measures in place so that unauthorized users cannot gain network access. An 802.1x access control point (e.g., a switch) is enabled to continue to authenticate certain users onto the network during periods of temporary communication failure with the authentication server, by locally storing alternative authentication information limited to historical authentication information of clients that have previously accessed the network via the authentication server. Subsequent revalidation of specific users using the primary authentication information follows restoration of communication with the authentication server.Type: ApplicationFiled: January 3, 2006Publication date: July 5, 2007Inventors: Jeffrey Bardsley, Nathaniel Kim, Charles Lingafelt, Allen Roginsky
-
Publication number: 20070038866Abstract: Method, system, and program product for port based authentication protocols where addresses are dynamically assigned within a network environment, and more particularly to port based authentication in the network environment, where connection information is captured and stored. This facilitates administrator access to information created as a result of protocol exchanges involved in dynamic address assignment, authentication, and connection.Type: ApplicationFiled: August 9, 2005Publication date: February 15, 2007Inventors: Jeffrey Bardsley, Nathaniel Kim, Charles Lingafelt, Allen Roginsky, Norman Strole
-
Publication number: 20070016456Abstract: System, method and program product for reporting status of a process. A flow chart illustrates steps of the process and an order for performance of the steps. Then, a determination is made whether any of the steps has been performed. In response to a determination that any of the steps has been performed, graphically representing on the flow chart that the step has been performed. The graphical representation can be color-coding of the step. The determination that a step has been performed can be made based on user input that the step has been performed, or automatically by a program checking a record indicating that the step has been performed. Also, a program can automatically determine that a deadline for performing one of the steps has passed without performance of the one step. In response, the program initiates a graphical representation on the one step in the flowchart that the deadline has passed without performance of the one step.Type: ApplicationFiled: July 12, 2005Publication date: January 18, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kevin Himberger, Clark Jeffries, Allen Roginsky, Charles Lingafelt, Phillip Singleton
-
Publication number: 20060156408Abstract: A method, apparatus, and computer instructions for providing a current and complete security compliance view of an enterprise system. The present invention provides the ability to gain a real-time security posture and security compliance view of an enterprise and to assess the risk impact of known threats and attacks to continued business operations at various levels is provided. Responsive to a change to an enterprise environment, a request, or an external threat, an administrator loads or updates at least one of a Critical Application Operations database, a Historical database, an Access Control database, a Connectivity database, and a Threat database. Based on a comparison of information in the databases against similar security data elements from company or external policies, the administrator may generate a Security Compliance view of the enterprise. A Security Posture view may also be generated by comparing the Security Compliance view against data in the Threat database.Type: ApplicationFiled: January 11, 2005Publication date: July 13, 2006Applicant: International Business Machines CorporationInventors: Kevin Himberger, Clark Jeffries, Charles Lingafelt, Allen Roginsky, Phillip Singleton
-
Patent number: 6993656Abstract: A method for time stamping a digital document is disclosed. The document originator creates a time stamp receipt by combining the document or other identifying data and a digital time indication. The time stamp receipt is submitted to a time stamping authority having a trusted clock. The time stamping authority optionally validates the time stamp receipt and then computes the age of the time stamp receipt. The time stamping authority creates an aged time stamp receipt by combining the identifying data and time indication contained in the submitted time stamp receipt with the computed age of the time stamp receipt. The time stamping authority cryptographically binds the time information and identifying data in the aged time stamp receipt, e.g., by signing the combination of the identifying data, time indication, and computed age with a private signature generation key.Type: GrantFiled: December 10, 1999Date of Patent: January 31, 2006Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
-
Patent number: 6965998Abstract: A time-stamping protocol for time-stamping digital documents uses a time-based signature key. A document or other identifying data is sent to a time stamping authority TSA. The TSA has a time-based signature key that the TSA uses to sign time stamp receipts. The signature key is associated with a fixed time reference that is stored in a public key certificate also containing the public verification key. Upon receiving the document, the TSA creates a time stamp receipt by computing a time difference between the time reference associated with the signature key and the time the document was received. The time difference is appended to the document to create a time stamp receipt and the receipt is then signed by the TSA and transmitted to the requestor.Type: GrantFiled: December 10, 1999Date of Patent: November 15, 2005Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
-
Patent number: 6742119Abstract: A method for time stamping a digital document is disclosed. The document originator creates a time stamp receipt by combining the document and a digital time indication. The time stamp receipt is submitted to a time stamping agent having a trusted clock. The time stamping agent optionally validates the time stamp receipt and then computes the age of the time stamp receipt. If valid, the time stamping agent certifies the time stamp receipt by signing the time stamp receipt with a private signature key. The private signature key is selected from a group of signature keys by the time stamping agent based on the computed age of the time stamp receipt.Type: GrantFiled: December 10, 1999Date of Patent: May 25, 2004Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
-
Patent number: 6345098Abstract: A method, system and apparatus are described which utilize a trusted third party, or Certification Authority (CA) in the generation of a reliable seed to be used in the generation of prime numbers used in public key cryptography. The inclusion of the trusted third party allows for an independent third party to police against first party attacks on the security of the system without increasing the overhead of the system significantly.Type: GrantFiled: July 2, 1998Date of Patent: February 5, 2002Assignee: International Business Machines CorporationInventors: Stephen M. Matyas, Jr., Allen Roginsky
-
Patent number: 6307938Abstract: A method, system and apparatus for generating primes (p and q) for use in cryptography from secret random numbers and an initialization value whereby the initial secret random numbers are encoded into the generated primes. This eliminates the need to retain the initial secret random numbers for auditing purposes. The initialization value may also be generated from information readily available, if so desired, resulting in additional entropy without the requirement of storing additional information.Type: GrantFiled: July 10, 1998Date of Patent: October 23, 2001Assignee: International Business Machines CorporationInventors: Stephen M. Matyas, Jr., Allen Roginsky
-
Patent number: 6034946Abstract: Methods, systems and computer program products which identify network routing paths having a first performance characteristic less than a first specified limit and a second performance characteristic less than a second specified limit from a plurality of routing paths. These routing paths are identified by combining both the first performance characteristic and the second performance characteristic for one of the plurality of routing paths to provide a third performance characteristic which differs from both the first and the second performance characteristic and which operates as a proxy for the first and second performance characteristic. It is then determined if the third performance characteristic of the routing path is less than a third performance limit associated with the third performance characteristic.Type: GrantFiled: April 15, 1997Date of Patent: March 7, 2000Assignee: International Business Machines CorporationInventors: Allen Roginsky, Raif Onvural, Vijay Srinivasan