Patents by Inventor Anthony Nadalin

Anthony Nadalin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8261330
    Abstract: A method, system and apparatus for federated identity brokering. In accordance with the present invention, a credential processing gateway can be disposed between one or more logical services and one or more service requesting clients in a computer communications network. Acting as a proxy and a trusted authority to the logical services, the credential processing gateway can map the credentials of the service requesting clients to the certification requirements of the logical services. In this way, the credential processing gateway can act as a federated identity broker in providing identity certification services for a multitude of different service requesting clients without requiring the logical services to include a pre-configuration for specifically processing the credentials of particular service requesting clients.
    Type: Grant
    Filed: August 25, 2009
    Date of Patent: September 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: Barry D. Atkins, David O. Melgar, Anthony Nadalin, Ajamu A. Wesley
  • Publication number: 20090313467
    Abstract: A method, system and apparatus for federated identity brokering. In accordance with the present invention, a credential processing gateway can be disposed between one or more logical services and one or more service requesting clients in a computer communications network. Acting as a proxy and a trusted authority to the logical services, the credential processing gateway can map the credentials of the service requesting clients to the certification requirements of the logical services. In this way, the credential processing gateway can act as a federated identity broker in providing identity certification services for a multitude of different service requesting clients without requiring the logical services to include a pre-configuration for specifically processing the credentials of particular service requesting clients.
    Type: Application
    Filed: August 25, 2009
    Publication date: December 17, 2009
    Applicant: International Business Machines Corporation
    Inventors: Barry D. Atkins, David O. Melgar, Anthony Nadalin, Ajamu A. Wesley
  • Patent number: 7581248
    Abstract: A method, system and apparatus for federated identity brokering. In accordance with the present invention, a credential processing gateway can be disposed between one or more logical services and one or more service requesting clients in a computer communications network. Acting as a proxy and a trusted authority to the logical services, the credential processing gateway can map the credentials of the service requesting clients to the certification requirements of the logical services. In this way, the credential processing gateway can act as a federated identity broker in providing identity certification services for a multitude of different service requesting clients without requiring the logical services to include a pre-configuration for specifically processing the credentials of particular service requesting clients.
    Type: Grant
    Filed: June 28, 2004
    Date of Patent: August 25, 2009
    Assignee: International Business Machines Corporation
    Inventors: Barry D. Atkins, David O. Melgar, Anthony Nadalin, Ajamu A. Wesley
  • Publication number: 20080104698
    Abstract: A method and apparatus for implementing a new Permission for methods that perform callback operations are provided. The method and apparatus provide an AdoptPermission Permission type that allows a method to pass a Java 2 authorization test without having the specific required Permissions expressly granted to the method and without the method having the AllPermission Permission granted to it. With the apparatus and method, an AdoptPermission Permission type is defined that operates to allow a ProtectionDomain to “adopt” a required Permission. However, this adoption of a required Permission can only be performed if the ProtectionDomain of at least one method in the thread stack has been granted a Permission that implies the required Permission.
    Type: Application
    Filed: January 3, 2008
    Publication date: May 1, 2008
    Inventors: Lawrence Koved, Anthony Nadalin, Marco Pistoia
  • Publication number: 20080022409
    Abstract: A method, system, apparatus, or computer program product is presented for routing event messages between data processing systems based on privacy policies associated with the data processing systems and based on event policies associated with event types for the event messages. When a system attempts to publish an event message for a particular type of event or to subscribe to those event messages, an event policy is checked to determine whether the system may publish messages for that type of event or may subscribe to those messages. Moreover, if a publishing system publishes an event message that contains personally identifiable information for a user of a data processing system, and a subscribing system has subscribed to event messages having the same event type, then the privacy policies associated with the systems are compared to determine compatibility or incompatibility between the privacy policies before routing a message between the systems.
    Type: Application
    Filed: October 4, 2007
    Publication date: January 24, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Maryann Hondo, Anthony Nadalin, Ajamu Wesley
  • Publication number: 20070234417
    Abstract: A method is presented in which federated domains interact within a federated environment. Domains within a federation can initiate federated single-sign-on operations for a user at other federated domains. A point-of-contact server within a domain relies upon a trust proxy within the domain to manage trust relationships between the domain and the federation. Trust proxies interpret assertions from other federated domains as necessary. Trust proxies may have a trust relationship with one or more trust brokers, and a trust proxy may rely upon a trust broker for assistance in interpreting assertions.
    Type: Application
    Filed: June 12, 2007
    Publication date: October 4, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: George Blakley III, Heather Hinton, Anthony Nadalin
  • Publication number: 20070083761
    Abstract: Methods, systems, and products are disclosed in which generating evidence of web services transactions are provided generally by receiving in an ultimate recipient web service from an initial sender a request, the request containing a proof of message origin (‘PMO’). The PMO contains an element addressed to the ultimate recipient web service and the element bears a first signature, the first signature having a value. Embodiments also include authenticating the identity of the initial sender; creating a proof of message receipt (‘PMR’) including signing the value of the first signature; sending the PMR to the initial sender, receiving, by the initial sender, the PMR; and saving, by the initial sender, the PMR.
    Type: Application
    Filed: October 6, 2005
    Publication date: April 12, 2007
    Inventors: Paul Bunter, Ralph Hertlein, Sreedhar Janaswamy, Rania Khalaf, Keeranoor Kumar, Michael McIntosh, Anthony Nadalin, Shishir Saxena, Ralph Williams
  • Publication number: 20070056026
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to access control and provide a method, system and computer program product for access control management for a collection of heterogeneous application components. In a first embodiment, a data processing system for role-based access control management for multiple heterogeneous application components can include at least one business role descriptor associating a business role with multiple, different application roles for corresponding, disparate application components. The system also can include at least one access policy associating a user with the business role. Finally, the system can include policy deployment logic include program code enabled to process the access policy to assign the user to the different application roles in the disparate application components.
    Type: Application
    Filed: September 8, 2005
    Publication date: March 8, 2007
    Applicant: International Business Machines Corporation
    Inventors: Kathryn Britton, Dieter Buehler, Ching-Yun Chao, Timothy Hahn, Anthony Nadalin, Nataraj Nagaratnam, Yi-Hsiu Wei, Chun Yang
  • Publication number: 20060294383
    Abstract: Methods, systems, and products are disclosed in which secure data communications in web services are provided generally by receiving in a web service from a client a request containing an element bearing a first signature, the signature having a value; signing the value of the first signature, thereby creating a second signature; and sending a response from the web service to the client, the response including the second signature. The requester may verify that the response includes the second signature. The request may be encrypted, and the response may be encrypted. The first signature may be encrypted, and the web service may encrypt the value of the first signature and include the encrypted value of the first signature in the response. The web service may receive a request encoded in SOAP and may send a response also encoded in SOAP.
    Type: Application
    Filed: June 28, 2005
    Publication date: December 28, 2006
    Inventors: Paula Austel, Maryann Hondo, Michael McIntosh, Anthony Nadalin, Nataraj Nagaratnam
  • Publication number: 20060294366
    Abstract: A method and system is presented for supporting the establishment of a secure communication session within a data processing system. A certificate request command is sent from a server to a client. A certificate command is received at the server from the client in response to the certificate request command, and the certificate command is accompanied by a public key certificate and an attribute certificate that is digitally signed by a private key that is bound to the public key certificate. A secure communication session is established in response to successfully verifying the public key certificate. The attribute certificate contains credential information for an authentication operation or an authorization operation that is performed after establishment of the secure communication session.
    Type: Application
    Filed: June 23, 2005
    Publication date: December 28, 2006
    Inventors: Anthony Nadalin, Bruce Rich, Xiaoyan Zhang
  • Publication number: 20060230430
    Abstract: A method, system and computer program product for implementing authorization policies for web services may include defining an authorization policy for access to a web service. The method, system and computer program product may also include attaching the authorization policy to a service definition for the web service.
    Type: Application
    Filed: April 6, 2005
    Publication date: October 12, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Maryann Hondo, Anthony Nadalin, Nataraj Nagaratnam
  • Publication number: 20060168132
    Abstract: A web services framework consists of a modular, extensible stack of XML specifications and standards targeting the emerging infrastructure in which distributed, heterogeneous applications are exposed by different organizations as services on the Internet. These services have their capabilities described and published in a machine readable format.
    Type: Application
    Filed: October 31, 2005
    Publication date: July 27, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul Bunter, Ralph Hertlein, Sreedhar Janaswamy, Rania Khalaf, Keeranoor Kumar, Michael Mcntosh, Anthony Nadalin, Shishir Saxena, Ralph Williams
  • Patent number: 7000108
    Abstract: A system, apparatus and method for processing Personal InFormation EXchange Syntax (PFX) objects in a data processing system is presented. The PFX object may be formatted, i.e. may maintain a syntax, as defined by PKCS (Public Key Cryptography Standard) standards, and in particular PKCS #12. A PFX object utility allows a user to view and edit the contents of data objects embedded within a PFX object via a graphical user interface. Graphical objects represent the data objects embedded within a PFX object. A user may drag and drop objects onto other objects within the PFX object, and the PFX object utility automatically performs the necessary operations.
    Type: Grant
    Filed: May 2, 2000
    Date of Patent: February 14, 2006
    Assignee: International Business Machines Corporation
    Inventors: Julianne Yarsa, Anthony Nadalin, Bruce A. Rich, Theodore Jack London Shrader
  • Publication number: 20060021010
    Abstract: A method, system and apparatus for federated identity brokering. In accordance with the present invention, a credential processing gateway can be disposed between one or more logical services and one or more service requesting clients in a computer communications network. Acting as a proxy and a trusted authority to the logical services, the credential processing gateway can map the credentials of the service requesting clients to the certification requirements of the logical services. In this way, the credential processing gateway can act as a federated identity broker in providing identity certification services for a multitude of different service requesting clients without requiring the logical services to include a pre-configuration for specifically processing the credentials of particular service requesting clients.
    Type: Application
    Filed: June 28, 2004
    Publication date: January 26, 2006
    Applicant: International Business Machines Corporation
    Inventors: Barry Atkins, David Melgar, Anthony Nadalin, Ajamu Wesley
  • Publication number: 20060004662
    Abstract: A client generates a session key and a delegation ticket containing information for a requested delegation operation. The client generates a first copy of the session key and encrypts it using a public key of a proxy. The client generates a second copy of the session key and encrypts it using a public key of a server. The client then puts the encrypted session keys and delegation ticket into a first message that is sent to the proxy. The proxy extracts and decrypts its copy of the session key from the first message. The proxy then encrypts a proof-of-delegation data item with the session key and places it and the delegation ticket along with the encrypted copy of the session key for the server into a second message, which is sent to the server. The server extracts and decrypts its copy of the session key from the second message and uses the session key to obtain the proof-of-delegation data. Authority is successfully delegated to the proxy only if the server can verify the proof-of-delegation data.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anthony Nadalin, Bruce Rich, Xiaoyan Zhang
  • Publication number: 20050278534
    Abstract: A method, an apparatus, a system, and a computer program product are presented for validating certificates. A certificate validation service receives a certificate validation request for a target certificate from a client, thereby allowing the client to offload certificate validation tasks into an online certificate validation service that is accessible and sharable by multiple components within a data processing system. In response to a determination that the target certificate is valid or invalid, the certificate validation service sends a certificate validation response with an indicating status value that the target certificate is valid or invalid. The certificate validation service is able to cache information about previously validated certificates and the associated certificate chains, thereby enhancing the efficiency of the service. Different certificate validation policies may be applied against target certificates based upon information associated with the target certificates.
    Type: Application
    Filed: May 27, 2004
    Publication date: December 15, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anthony Nadalin, Bruce Rich, Xiaoyan Zhang
  • Publication number: 20050223412
    Abstract: Techniques are disclosed for achieving context-sensitive confidentiality within a federated environment for which content is aggregated in a distributed Web portal (or similar aggregation framework), ensuring that message portions that should be confidential are confidential to all entities in the federated environment except those entities to which the message portions may properly be divulged. The federation may comprise an arbitrary number of autonomous security domains, and these security domains may have independent trust models and authentication services. Using the disclosed techniques, messages can be routed securely within a cross-domain federation (irrespective of routing paths), thereby ensuring that confidential information is not exposed to unintended third parties and that critical information is not tampered with while in transit between security domains. Preferred embodiments leverage Web services techniques and a number of industry standards.
    Type: Application
    Filed: March 31, 2004
    Publication date: October 6, 2005
    Applicant: International Business Machines Corporation
    Inventors: Anthony Nadalin, Ajamu Wesley
  • Publication number: 20050114701
    Abstract: Techniques are disclosed for federating identity management within a distributed portal server, leveraging Web services techniques and a number of industry standards. Identities are managed across autonomous security domains which may be comprised of independent trust models, authentication services, and user enrollment services. The disclosed techniques enable integrating third-party Web services-based portlets, which rely on various potentially-different security mechanisms, within a common portal page.
    Type: Application
    Filed: November 21, 2003
    Publication date: May 26, 2005
    Applicant: International Business Machines Corporation
    Inventors: Barry Atkins, David Melgar, Anthony Nadalin, Ajamu Wesley
  • Publication number: 20050039158
    Abstract: A method and apparatus for implementing a new Permission for methods that perform callback operations are provided. The method and apparatus provide an AdoptPermission Permission type that allows a method to pass a Java 2 authorization test without having the specific required Permissions expressly granted to the method and without the method having the AllPermission Permission granted to it. With the apparatus and method, an AdoptPermission Permission type is defined that operates to allow a ProtectionDomain to “adopt” a required Permission. However, this adoption of a required Permission can only be performed if the ProtectionDomain of at least one method in the thread stack has been granted a Permission that implies the required Permission.
    Type: Application
    Filed: August 13, 2003
    Publication date: February 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Lawrence Koved, Anthony Nadalin, Marco Pistoia