Patents by Inventor Andy Trotter

Andy Trotter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20050114686
    Abstract: A method and system for encrypting non-volatile storage regions, such as volumes, accessible by multiple users. A plurality of non-volatile storage regions is encrypted each with a different encryption key. A subset of the encryption keys is made available to each user thereby granting the user access to a corresponding subset of non-volatile storage regions. To protect a user's encryption keys, a private-public encryption key pair is generated, the private key being made available only to that user. The subset of the user's encryption keys is encrypted using the user's public encryption key. The users' private keys can be stored in a secure encryption module and can be protected with a password. Upon authenticating a user, the corresponding encryption keys may be provided to the user after decrypting the encryption keys using the user's private key. The contents of the non-volatile storage regions are then decrypted using the encryption keys.
    Type: Application
    Filed: November 21, 2003
    Publication date: May 26, 2005
    Applicant: International Business Machines Corporation
    Inventors: Charles Ball, Ryan Catherman, Philip Childs, James Hoff, Andy Trotter
  • Publication number: 20050066355
    Abstract: A system for broadcasting television signals transmits both encrypted program content and access control data over a satellite system to be received by a number of individual receivers, each of which has registered with the program provider by providing a public cryptographic key and hash codes representing the serial numbers of critical components within the receiver. The access control data, which is addressed to an individual receiver, includes data encrypted with the public key of the receiver, indicating the program content to be decrypted by the receiver using its private key. Whenever the receiver is powered on, the hash codes are generated and stored to ensure the components have not been changed. Each transmission from the receiver to the program provider is validated by checking the hash codes.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Daryl Cromer, Joshua Jankowsky, Howard Locker, Andy Trotter, James Ward
  • Publication number: 20050033721
    Abstract: A program product, method and an apparatus is disclosed to quickly and easily hide and expose and store and retrieve locally stored data. A location switch is employed in controlling the visibility and usability of files stored on a hard disk or other storage device included in the apparatus. A user selects from a plurality of location modes. Based on a selected location, files become visible and accessible or hidden and inaccessible. The files can be encrypted/decrypted on the disk and the encryption/decryption can be done in a transparent manner. The cryptology functions can also be tied to a cryptographic processor if one is available in the system.
    Type: Application
    Filed: August 8, 2003
    Publication date: February 10, 2005
    Applicant: International Business Machines Corporation
    Inventors: Daryl Cromer, Joshua Jankowsky, Andy Trotter, James Ward
  • Publication number: 20050033722
    Abstract: A program product, method and an apparatus is disclosed to quickly and easily hide and expose and store and retrieve locally stored data. A personality switch is employed in controlling the visibility and usability of files stored on a hard disk or other storage device included in the apparatus. A user selects from a plurality of personality modes. Based on a selected personality, files become visible and accessible or hidden and inaccessible. The files can be encrypted/decrypted on the disk and the encryption/decryption can be done in a transparent manner. The cryptology functions can also be tied to a cryptographic processor if one is available in the system. Authentication can be utilized to switch in-between personality modes.
    Type: Application
    Filed: August 8, 2003
    Publication date: February 10, 2005
    Applicant: International Business Machines Corporation
    Inventors: Daryl Cromer, Joshua Jankowsky, Andy Trotter, James Ward