Patents by Inventor Anthony M. Butler
Anthony M. Butler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11165590Abstract: A method and system for decentralized biometric signing of a digital contract. A private key is encrypted using biometric data captured, from a user, on a mobile device. The encrypted private key, a public key associated with the private key, and a digital identity pertaining to the user and the captured biometric data are stored on the mobile device. A digital hash of the digital contract is generated. Using the captured biometric data, the user is authenticated and the encrypted private key is decrypted. The digital hash is signed with the decrypted private key. The signed digital hash of the digital contract, the digital contract prior to being hashed, the identifier, the certifier of the identifier, the public key, a certification of the public key by a third party, and a record of a successful authentication of the user using the biometric data are stored in a blockchain.Type: GrantFiled: November 18, 2019Date of Patent: November 2, 2021Assignee: International Business Machines CorporationInventors: Anthony M. Butler, Ghada Dulaim, Victor Usobiaga
-
Patent number: 10834289Abstract: A method to detect a plurality of steganography based information embedded in a multimedia file associated with an online computer environment is provided. The method may include detecting the multimedia file entering or exiting an online environment associated with a network or an organization. The method may also include comparing a stored hashed version of the detected multimedia file to the detected version of the multimedia file. The method may also include comparing a stored perceptual hashed version of the detected multimedia file to the detected version of the multimedia file based on the detected multimedia file not matching the stored hashed version of the detected multimedia file. The method may further include assigning a flag attribute to the detected multimedia file based on the detected multimedia file matching the stored perceptual hashed version of the detected multimedia file.Type: GrantFiled: March 27, 2015Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Dusty Boshoff, Anthony M. Butler
-
Patent number: 10785026Abstract: A method and/or NFC (Near Field Communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. The (NFC) enabled mobile device applies an electronic signature thereof in an electronic contract provided on the NFC enabled mobile device used by a first contracting party, where the electronic signature is applied through a secure element of the NFC enabled mobile device. The NFC enabled mobile device determines that the NFC enabled mobile device is not within NFC range to an other NFC enabled mobile device used by a second contracting party to the electronic contract. In response to the NFC enabled mobile device determining that it is not within NFC range to the other NFC enabled mobile device, the NFC enabled mobile device sends, to the other NFC enabled mobile device, a multimedia messaging service (MMS) text message that includes the electronic contract.Type: GrantFiled: April 12, 2018Date of Patent: September 22, 2020Assignee: International Business Machines CorporationInventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
-
Publication number: 20200084047Abstract: A method and system for decentralized biometric signing of a digital contract. A private key is encrypted using biometric data captured, from a user, on a mobile device. The encrypted private key, a public key associated with the private key, and a digital identity pertaining to the user and the captured biometric data are stored on the mobile device. A digital hash of the digital contract is generated. Using the captured biometric data, the user is authenticated and the encrypted private key is decrypted. The digital hash is signed with the decrypted private key. The signed digital hash of the digital contract, the digital contract prior to being hashed, the identifier, the certifier of the identifier, the public key, a certification of the public key by a third party, and a record of a successful authentication of the user using the biometric data are stored in a blockchain.Type: ApplicationFiled: November 18, 2019Publication date: March 12, 2020Inventors: Anthony M. Butler, Ghada Dulaim, Victor Usobiaga
-
Patent number: 10541818Abstract: A method and system for decentralized biometric signing of a digital contract. A digital identity including a private key is created. The private key was encrypted on a mobile device via use of captured biometric data. A digital hash of the digital contract is generated. A user using biometric data is authenticated. Usage of the biometric data is authorized. Responsive to the usage of the biometric data being authorized, the encrypted private key is decrypted. The digital hash is signed with the decrypted private key. The signed digital hash is stored in a blockchain.Type: GrantFiled: April 19, 2017Date of Patent: January 21, 2020Assignee: International Business Machines CorporationInventors: Anthony M. Butler, Ghada Dulaim, Victor Usobiaga
-
Publication number: 20180309581Abstract: A method and system for decentralized biometric signing of a digital contract. A digital identity including a private key is created. The private key was encrypted on a mobile device via use of captured biometric data. A digital hash of the digital contract is generated. A user using biometric data is authenticated. Usage of the biometric data is authorized. Responsive to the usage of the biometric data being authorized, the encrypted private key is decrypted. The digital hash is signed with the decrypted private key. The signed digital hash is stored in a blockchain.Type: ApplicationFiled: April 19, 2017Publication date: October 25, 2018Inventors: Anthony M. Butler, Ghada Dulaim, Victor Usobiaga
-
Publication number: 20180234240Abstract: A method and/or NFC (Near Field Communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. The (NFC) enabled mobile device applies an electronic signature thereof in an electronic contract provided on the NFC enabled mobile device used by a first contracting party, where the electronic signature is applied through a secure element of the NFC enabled mobile device. The NFC enabled mobile device determines that the NFC enabled mobile device is not within NFC range to an other NFC enabled mobile device used by a second contracting party to the electronic contract. In response to the NFC enabled mobile device determining that it is not within NFC range to the other NFC enabled mobile device, the NFC enabled mobile device sends, to the other NFC enabled mobile device, a multimedia messaging service (MMS) text message that includes the electronic contract.Type: ApplicationFiled: April 12, 2018Publication date: August 16, 2018Inventors: PAUL A. ASHLEY, ANTHONY M. BUTLER, RAVI KOTHARI, YU-CHEN LIN
-
Patent number: 10033530Abstract: A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.Type: GrantFiled: March 7, 2014Date of Patent: July 24, 2018Assignee: International Business Machines CorporationInventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
-
Patent number: 10032240Abstract: A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.Type: GrantFiled: November 8, 2013Date of Patent: July 24, 2018Assignee: International Business Machines CorporationInventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
-
Patent number: 9626528Abstract: The present disclosure relates generally to the field of automatically learning and automatically adapting to perform classification of protected data. In various examples, learning and adapting to perform classification of protected data may be implemented in the form of systems, methods and/or algorithms.Type: GrantFiled: March 7, 2014Date of Patent: April 18, 2017Assignee: International Business Machines CorporationInventor: Anthony M. Butler
-
Patent number: 9535731Abstract: A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer; directing all traffic from the illicit intrusion to the cloned computer; observing activities of the illicit intrusion interacting with the cloned computer; and dynamically adapting the cloned computer to perform activities of predicted interest to the illicit intrusion based on the observed activities of the illicit intrusion. The steps of the method may be performed by one or more computing devices.Type: GrantFiled: November 21, 2014Date of Patent: January 3, 2017Assignee: International Business Machines CorporationInventors: Paul A. Ashley, Anthony M. Butler, Ghada M. ElKeissi, Leny Veliyathuparambil
-
Publication number: 20160283746Abstract: A method to detect a plurality of steganography based information embedded in a multimedia file associated with an online computer environment is provided. The method may include detecting the multimedia file entering or exiting an online environment associated with a network or an organization. The method may also include comparing a stored hashed version of the detected multimedia file to the detected version of the multimedia file. The method may also include comparing a stored perceptual hashed version of the detected multimedia file to the detected version of the multimedia file based on the detected multimedia file not matching the stored hashed version of the detected multimedia file. The method may further include assigning a flag attribute to the detected multimedia file based on the detected multimedia file matching the stored perceptual hashed version of the detected multimedia file.Type: ApplicationFiled: March 27, 2015Publication date: September 29, 2016Inventors: Dusty Boshoff, Anthony M. Butler
-
Publication number: 20160149950Abstract: A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer; directing all traffic from the illicit intrusion to the cloned computer; observing activities of the illicit intrusion interacting with the cloned computer; and dynamically adapting the cloned computer to perform activities of predicted interest to the illicit intrusion based on the observed activities of the illicit intrusion. The steps of the method may be performed by one or more computing devices.Type: ApplicationFiled: November 21, 2014Publication date: May 26, 2016Inventors: Paul A. Ashley, Anthony M. Butler, Ghada M. ELKeissi, Leny Veliyathuparambil
-
Patent number: 9301132Abstract: A method, system and a computer program product for managing distribution of software updates in Near Field Communication (NFC) mobile devices includes retrieving information of one or more softwares in one or more NFC mobile devices by a NFC reader in communication range with the one or more NFC mobile devices, transmitting the retrieved information from the NFC reader to a distribution server which determines if the one or more softwares requires an update based on the retrieved information, in response to said determination, receiving an available updated software or update components of the one or more softwares from the distribution server to the NFC reader and transmitting thereof from the NFC reader to a secure element of the one or more NFC mobile devices whose one or more softwares require an updation.Type: GrantFiled: November 7, 2013Date of Patent: March 29, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
-
Patent number: 9198031Abstract: A method, system and a computer program product for managing distribution of software updates in Near Field Communication (NFC) mobile devices includes retrieving information of one or more softwares in one or more NFC mobile devices by a NFC reader in communication range with the one or more NFC mobile devices, transmitting the retrieved information from the NFC reader to a distribution server which determines if the one or more softwares requires an update based on the retrieved information, in response to said determination, receiving an available updated software or update components of the one or more softwares from the distribution server to the NFC reader and transmitting thereof from the NFC reader to a secure element of the one or more NFC mobile devices whose one or more softwares require an updation.Type: GrantFiled: June 6, 2014Date of Patent: November 24, 2015Assignee: International Business Machines CorporationInventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
-
Publication number: 20150254469Abstract: The present disclosure relates generally to the field of automatically learning and automatically adapting to perform classification of protected data. In various examples, learning and adapting to perform classification of protected data may be implemented in the form of systems, methods and/or algorithms.Type: ApplicationFiled: March 7, 2014Publication date: September 10, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Anthony M. Butler
-
Patent number: 9088409Abstract: A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the exchange of security keys, the home TSM delegates to the roaming TSM access to the second partition of the SIM.Type: GrantFiled: June 25, 2013Date of Patent: July 21, 2015Assignee: International Business Machines CorporationInventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
-
Patent number: 9088410Abstract: A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the exchange of security keys, the home TSM delegates to the roaming TSM access to the second partition of the SIM.Type: GrantFiled: September 2, 2014Date of Patent: July 21, 2015Assignee: International Business Machines CorporationInventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
-
Publication number: 20150131797Abstract: A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.Type: ApplicationFiled: March 7, 2014Publication date: May 14, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: PAUL A. ASHLEY, ANTHONY M. BUTLER, RAVI KOTHARI, YU-CHEN LIN
-
Publication number: 20150134561Abstract: A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.Type: ApplicationFiled: November 8, 2013Publication date: May 14, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: PAUL A. ASHLEY, ANTHONY M. BUTLER, RAVI KOTHARI, YU-CHEN LIN