Patents by Inventor David S. Kern

David S. Kern has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11050573
    Abstract: Embodiments of the present invention include determining whether a cryptographic certificate can be trusted. A cryptographic certificate is received at a client device. The client device performs a first check on a first set of attributes of the cryptographic certificate. In addition, the client device sends the cryptographic certificate to a central verification server, which performs a second check on a second set of attributes of the cryptographic certificate. In the case that the first set of attributes passes the first check, and the second set of attributes passes the second check, the client device determines that the cryptographic certificate can be trusted.
    Type: Grant
    Filed: September 5, 2019
    Date of Patent: June 29, 2021
    Assignee: International Business Machines Corporation
    Inventors: David S. Kern, Juan G. Lara, Mark A. McGloin, Olgierd S. Pieczul
  • Publication number: 20200052909
    Abstract: Embodiments of the present invention include determining whether a cryptographic certificate can be trusted. A cryptographic certificate is received at a client device. The client device performs a first check on a first set of attributes of the cryptographic certificate. In addition, the client device sends the cryptographic certificate to a central verification server, which performs a second check on a second set of attributes of the cryptographic certificate. In the case that the first set of attributes passes the first check, and the second set of attributes passes the second check, the client device determines that the cryptographic certificate can be trusted.
    Type: Application
    Filed: September 5, 2019
    Publication date: February 13, 2020
    Inventors: David S. Kern, Juan G. Lara, MARK A. MCGLOIN, OLGIERD S. PIECZUL
  • Patent number: 10447485
    Abstract: Embodiments of the present invention include determining whether a cryptographic certificate can be trusted. A cryptographic certificate is received at a client device. The client device performs a first check on a first set of attributes of the cryptographic certificate. In addition, the client device sends the cryptographic certificate to a central verification server, which performs a second check on a second set of attributes of the cryptographic certificate. In the case that the first set of attributes passes the first check, and the second set of attributes passes the second check, the client device determines that the cryptographic certificate can be trusted.
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: October 15, 2019
    Assignee: International Business Machines Corporation
    Inventors: David S. Kern, Juan G. Lara, Mark A. McGloin, Olgierd S. Pieczul
  • Publication number: 20170134173
    Abstract: Embodiments of the present invention include determining whether a cryptographic certificate can be trusted. A cryptographic certificate is received at a client device. The client device performs a first check on a first set of attributes of the cryptographic certificate. In addition, the client device sends the cryptographic certificate to a central verification server, which performs a second check on a second set of attributes of the cryptographic certificate. In the case that the first set of attributes passes the first check, and the second set of attributes passes the second check, the client device determines that the cryptographic certificate can be trusted.
    Type: Application
    Filed: November 5, 2015
    Publication date: May 11, 2017
    Inventors: David S. Kern, Juan G. Lara, Mark A. McGloin, Olgierd S. Pieczul
  • Patent number: 9094194
    Abstract: A system for automating the recovery of a credential store, in which client software generates a temporary key pair based on a new password, and sends client information including the user's name, the public half of the temporary key pair, and the host name of the client computer system to a server system, from which the client information is passed to a recovery process. The client software process displays a prompt indicating that the user should call a help desk. A help desk administrator verifies the user's identity and approves the user's request by causing an approval message to be sent to the recovery process. The recovery process obtains recovery information consisting of either the decryption key(s) for the credential store, or a decrypted copy of the credential store, and encrypts the recovery information using the temporary public key. The client process downloads the recovery information from the server, and decrypts it using private key of the temporary key pair.
    Type: Grant
    Filed: April 18, 2006
    Date of Patent: July 28, 2015
    Assignee: International Business Machines Corporation
    Inventors: David S. Kern, Shiu F. Poon, Robert J. Paganetti
  • Patent number: 8995653
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to symmetric key generation and provide a method, system and computer program product for symmetric key generation using an asymmetric private key. In one embodiment, a symmetric key generation data processing system can include a symmetric key generator configured with a programmatic interface including an input parameter for a seed, an input parameter for an asymmetric private key, and an output parameter for a symmetric key. The symmetric key generator can include program code enabled to generate the symmetric key by encrypting the seed with the asymmetric private key.
    Type: Grant
    Filed: July 12, 2005
    Date of Patent: March 31, 2015
    Assignee: International Business Machines Corporation
    Inventors: Alan D. Eldridge, David S. Kern
  • Patent number: 8296827
    Abstract: A method is provided for a enabling a user to initiate a password protected backup copy of the user's credentials. The method includes providing a user with a credential store containing information relating to the user's identity, generating a different recovery password of any length for each recovery authority, encrypting the recovery password for each recovery authority, storing the encrypted recovery passwords in the credential store, and sending a copy of the information by the user from the credential store to a central repository.
    Type: Grant
    Filed: December 29, 2005
    Date of Patent: October 23, 2012
    Assignee: International Business Machines Corporation
    Inventors: Robert J. Paganetti, David S. Kern
  • Publication number: 20120151204
    Abstract: Efficient routing for a client-server session or connection is provided in an application layer of multi-layered systems interconnect stack by caching a plurality of application-specific information at an intermediary network point; using the application specific information to route messages for an application connection; and indexing the application-specific information with a key provided by the application. Optionally, a second key may be used to retrieve the application-specific information if the first key is not provided in an application connection request, where the second key is optionally opaque to the application program. The intermediary network point may be an edge of network Internet Protocol (IP) switch, and the application layer in which the routing is performed may be layer seven of the Open Systems Interconnection model.
    Type: Application
    Filed: December 8, 2010
    Publication date: June 14, 2012
    Applicant: International Business Machines Corporation
    Inventors: Daniel M. Jamrog, David S. Kern, Jason D. LaVoie, Chester E. Ryder, III
  • Patent number: 8195959
    Abstract: The present invention is a method, system and apparatus for the encryption of a credential store by using a lockbox mechanism. In a credential store encryption method, a lockbox for a credential store can be retrieved and an encryption key can be selected from among a list of encryption keys in the lockbox. The lockbox can be a local lockbox and the local lockbox can be retrieved from an unencrypted region of the credential store. In any case, subsequent to the retrieval of the lockbox, the credential store can be decrypted with the selected encryption key.
    Type: Grant
    Filed: November 22, 2004
    Date of Patent: June 5, 2012
    Assignee: International Business Machines Corporation
    Inventors: Alan D. Eldridge, David S. Kern
  • Publication number: 20100115261
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to seal list management in decrypting encrypted data and provide a method, system and computer program product for extensible seal management for encrypted data. In an embodiment of the invention, a method for extensible seal management for encrypted data can include identifying multiple different seal hints of different seal hint formats for different seals in a seal list associated with encrypted data and selecting from amongst the multiple different seal hints, seal hints of a recognizable seal hint format. The method also can include filtering the seals in the seal list according to the selected seal hints and attempting decryption of the filtered seals with a decryption key specified by the selected seal hints to decrypt one of the filtered seals in order to reveal a bulk key. Finally, the method can include decrypting the encrypted data with the bulk key.
    Type: Application
    Filed: November 6, 2008
    Publication date: May 6, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Richard F. Annicchiarico, David S. Kern, Robert J. Paganetti
  • Publication number: 20080019530
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to encrypted message management in an archival environment, and provide a novel and non-obvious method, system and computer program product for message archival assurance. In one embodiment of the invention, a message archival assurance method can be provided that can include receiving an encrypted message designated for receipt by a messaging client; determining whether the encrypted message is decryptable using one of a set of a bulk keys accessible by the messaging system; and, archiving and forwarding the encrypted message to the messaging client only if the encrypted message is decryptable using one of a set of bulk keys accessible by the messaging system and otherwise discarding the encrypted message.
    Type: Application
    Filed: May 30, 2006
    Publication date: January 24, 2008
    Applicant: International Business Machines Corporation
    Inventors: Alan D. Eldridge, David S. Kern