Patents by Inventor David G. Wheeler
David G. Wheeler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11776574Abstract: Techniques for authentication of digital recordings are provided. An element of encrypted data is output in a recording environment. The element of encrypted data, embedded in a digital recording comprising at least one of audio data and image data captured in the recording environment, is extracted. A decrypted value is generated based on a private key and the first element of encrypted data, and the first decrypted value and a stored value associated with a first element of the digital recording are compared. The digital recording is authenticated based on the first decrypted value substantially matching the stored value.Type: GrantFiled: December 21, 2020Date of Patent: October 3, 2023Assignee: International Business Machines CorporationInventors: Chad M. Albertson, Mark S. Fredrickson, David G. Wheeler, Scott D. Frei
-
Patent number: 11341034Abstract: Techniques for analysis of verification parameters and reduction of training data are provided. A plurality of test results is received, where each of the plurality of test results specifies a respective one or more parameters and a respective one or more events. A list of parameters used to stimulate computing logic is determined. Additionally, a plurality of relevant parameters is generated, corresponding to parameters in the list of parameters that have at least two distinct values specified in the plurality of test results. A plurality of training cases is generated based on the plurality of test results and the plurality of relevant parameters. Further, a neural network is generated for design verification of the computing logic based on the plurality of relevant parameters. The neural network is trained based on the plurality of training cases.Type: GrantFiled: August 6, 2018Date of Patent: May 24, 2022Assignee: International Business Machines CorporationInventors: Chad Albertson, John Borkenhagen, Scott D. Frei, David G. Wheeler, Mark S. Fredrickson
-
Patent number: 11263332Abstract: A computer system, processor, and method for processing information is disclosed that includes watching logical operations to detect unauthorized attempts to access a register, and taking evasive action in response to detecting unauthorized attempts to access the register. In an embodiment, the register is a hidden, secret, restricted, or undocumented register, and the method further includes, in response to unauthorized attempts to access the secret register, locking the contents of the secret register. The evasive action may include one or more of interrupting the operations of the processor; causing the processor to shut-down, malfunction, lock, self-destruct; no longer providing read or write permission or access to the register; releasing data disguised to look like the real register data while not releasing the real data; and combinations thereof.Type: GrantFiled: July 31, 2018Date of Patent: March 1, 2022Assignee: International Business Machines CorporationInventors: Mark Fredrickson, Chad Albertson, Scott D. Frei, David G. Wheeler
-
Patent number: 11184354Abstract: Techniques for enhanced security for disconnected devices are provided. A request for one or more attributes of a security component is received by the security component, from a requesting device. The one or more attributes are provided to the requesting device, where the requesting device transmits the one or more attributes to a network service, where the security component is not able to communicate with the network service. A token is received from the requesting device, where the requesting device received the token in response to transmitting the one or more attributes to the network service. A level of access is determined for the requesting device, based on validating the token using a predefined configuration of the security component. Finally, the determined level of access is provided to the requesting device.Type: GrantFiled: March 22, 2019Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Chad Albertson, David G. Wheeler, Scott D. Frei, Mark S. Fredrickson
-
Publication number: 20210151081Abstract: Techniques for authentication of digital recordings are provided. An element of encrypted data is output in a recording environment. The element of encrypted data, embedded in a digital recording comprising at least one of audio data and image data captured in the recording environment, is extracted. A decrypted value is generated based on a private key and the first element of encrypted data, and the first decrypted value and a stored value associated with a first element of the digital recording are compared. The digital recording is authenticated based on the first decrypted value substantially matching the stored value.Type: ApplicationFiled: December 21, 2020Publication date: May 20, 2021Inventors: Chad ALBERTSON, Mark S. FREDRICKSON, David G. WHEELER, Scott D. FREI
-
Patent number: 10957355Abstract: Performing an operation comprising extracting a first element of encrypted data embedded in a digital recording comprising at least one of audio data and image data captured in a recording environment, generating a first decrypted value, the generating performed by execution of a cryptography algorithm based on a private key and the first element of encrypted data, comparing the first decrypted value and a stored value associated with a first element of the digital recording, and authenticating the digital recording based on the first decrypted value substantially matching the stored value.Type: GrantFiled: February 28, 2018Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Chad M. Albertson, Mark S. Fredrickson, David G. Wheeler, Scott D. Frei
-
Publication number: 20200304495Abstract: Techniques for enhanced security for disconnected devices are provided. A request for one or more attributes of a security component is received by the security component, from a requesting device. The one or more attributes are provided to the requesting device, where the requesting device transmits the one or more attributes to a network service, where the security component is not able to communicate with the network service. A token is received from the requesting device, where the requesting device received the token in response to transmitting the one or more attributes to the network service. A level of access is determined for the requesting device, based on validating the token using a predefined configuration of the security component. Finally, the determined level of access is provided to the requesting device.Type: ApplicationFiled: March 22, 2019Publication date: September 24, 2020Inventors: Chad ALBERTSON, David G. WHEELER, Scott D. FREI, Mark S. FREDRICKSON
-
Publication number: 20200042434Abstract: Techniques for analysis of verification parameters and reduction of training data are provided. A plurality of test results is received, where each of the plurality of test results specifies a respective one or more parameters and a respective one or more events. A list of parameters used to stimulate computing logic is determined. Additionally, a plurality of relevant parameters is generated, corresponding to parameters in the list of parameters that have at least two distinct values specified in the plurality of test results. A plurality of training cases is generated based on the plurality of test results and the plurality of relevant parameters. Further, a neural network is generated for design verification of the computing logic based on the plurality of relevant parameters. The neural network is trained based on the plurality of training cases.Type: ApplicationFiled: August 6, 2018Publication date: February 6, 2020Inventors: Chad ALBERTSON, John BORKENHAGEN, Scott D. FREI, David G. WHEELER, Mark S. FREDRICKSON
-
Publication number: 20200042730Abstract: A computer system, processor, and method for processing information is disclosed that includes watching logical operations to detect unauthorized attempts to access a register, and taking evasive action in response to detecting unauthorized attempts to access the register. In an embodiment, the register is a hidden, secret, restricted, or undocumented register, and the method further includes, in response to unauthorized attempts to access the secret register, locking the contents of the secret register. The evasive action may include one or more of interrupting the operations of the processor; causing the processor to shut-down, malfunction, lock, self-destruct; no longer providing read or write permission or access to the register; releasing data disguised to look like the real register data while not releasing the real data; and combinations thereof.Type: ApplicationFiled: July 31, 2018Publication date: February 6, 2020Inventors: Mark Fredrickson, Chad Albertson, Scott D. Frei, David G. Wheeler
-
Publication number: 20190267036Abstract: Performing an operation comprising extracting a first element of encrypted data embedded in a digital recording comprising at least one of audio data and image data captured in a recording environment, generating a first decrypted value, the generating performed by execution of a cryptography algorithm based on a private key and the first element of encrypted data, comparing the first decrypted value and a stored value associated with a first element of the digital recording, and authenticating the digital recording based on the first decrypted value substantially matching the stored value.Type: ApplicationFiled: February 28, 2018Publication date: August 29, 2019Inventors: Chad M. ALBERTSON, Mark S. FREDRICKSON, David G. WHEELER, Scott D. FREI
-
Patent number: 7916048Abstract: A method an apparatus is provided to generate a gray code sequence from a sequence of binary values having a length āLā. Accordingly, one aspect of the present invention provides a circuit comprising a cycle flag toggle circuit configured to toggle a cycle flag between a first value and a second value, an intermediate value generator coupled to an output of the cycle flag toggle circuit configured to receive the binary value, and configured to generate an intermediate value from the cycle flag and the binary value, and a binary to gray converter coupled to an output of the intermediate value generator, configured to convert the intermediate value to a gray code.Type: GrantFiled: February 3, 2010Date of Patent: March 29, 2011Assignee: International Business Machines CorporationInventors: Jayashri A. Basappa, Anil Pothireddy, David G. Wheeler