Patents by Inventor Brandon S. Johnson

Brandon S. Johnson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11196559
    Abstract: A method, apparatus and computer program product for secure communication includes receiving a message for transmission from a transmitting node to a receiving node. The message is split into a plurality of channels and each channel receives an identical copy of the message. Noise data is added to each version of the message. The noise data is different for a respective copy of the message than any other version of the message thus producing a plurality of ciphers each for a respective channel. The ciphers are transmitted via the respective channels from the transmitting node to the receiving node.
    Type: Grant
    Filed: August 8, 2018
    Date of Patent: December 7, 2021
    Assignee: International Business Machines Corporation
    Inventors: Sanjay Upreti, Brandon S Johnson
  • Publication number: 20200052895
    Abstract: A method, apparatus and computer program product for secure communication includes receiving a message for transmission from a transmitting node to a receiving node. The message is split into a plurality of channels and each channel receives an identical copy of the message. Noise data is added to each version of the message. The noise data is different for a respective copy of the message than any other version of the message thus producing a plurality of ciphers each for a respective channel. The ciphers are transmitted via the respective channels from the transmitting node to the receiving node.
    Type: Application
    Filed: August 8, 2018
    Publication date: February 13, 2020
    Inventors: Sanjay Upreti, Brandon S. Johnson
  • Patent number: 10205748
    Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked, and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.
    Type: Grant
    Filed: May 11, 2018
    Date of Patent: February 12, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael D. Hocker, Brandon S. Johnson
  • Patent number: 10205747
    Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked, and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.
    Type: Grant
    Filed: May 11, 2018
    Date of Patent: February 12, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael D. Hocker, Brandon S. Johnson
  • Patent number: 10069860
    Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.
    Type: Grant
    Filed: February 14, 2017
    Date of Patent: September 4, 2018
    Assignee: International Business Machines Corporation
    Inventors: Michael D. Hocker, Brandon S. Johnson
  • Publication number: 20180248912
    Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked, and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.
    Type: Application
    Filed: May 11, 2018
    Publication date: August 30, 2018
    Inventors: Michael D. Hocker, Brandon S. Johnson
  • Publication number: 20180248911
    Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked, and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.
    Type: Application
    Filed: May 11, 2018
    Publication date: August 30, 2018
    Inventors: Michael D. Hocker, Brandon S. Johnson
  • Publication number: 20180234455
    Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.
    Type: Application
    Filed: February 14, 2017
    Publication date: August 16, 2018
    Inventors: Michael D. Hocker, Brandon S. Johnson
  • Patent number: 10003612
    Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.
    Type: Grant
    Filed: September 28, 2017
    Date of Patent: June 19, 2018
    Assignee: International Business Machines Corporation
    Inventors: Michael D. Hocker, Brandon S. Johnson
  • Publication number: 20120311551
    Abstract: An embedded system post-linker optimization automation method can include connecting to a network file system, coordinating a first handshaking procedure to initiate an embedded application from the network file system, coordinating a second handshaking procedure to initiate a training phase of the embedded application and coordinating a third handshaking procedure to initiate generation of an optimized embedded application from the embedded application during an optimization phase.
    Type: Application
    Filed: June 6, 2011
    Publication date: December 6, 2012
    Applicant: International Business Machines Coporation
    Inventors: Brandon S. Johnson, Mark D. Marik