Patents by Inventor Garry J Sullivan

Garry J Sullivan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11012231
    Abstract: The solutions disclosed enable security credentials to be shared between two entities. Embodiments of the present invention can be used to facilitate the transfer security credentials associated with a first level of permission of a first entity to a second entity that does not have the security credentials associated with the first level of permission in response to receiving a request to share security credentials between two entities.
    Type: Grant
    Filed: February 6, 2020
    Date of Patent: May 18, 2021
    Assignee: International Business Machines Corporation
    Inventors: James R. Coon, Michael J. Miele, Garry J. Sullivan
  • Publication number: 20200177374
    Abstract: The solutions disclosed enable security credentials to be shared between two entities. Embodiments of the present invention can be used to facilitate the transfer security credentials associated with a first level of permission of a first entity to a second entity that does not have the security credentials associated with the first level of permission in response to receiving a request to share security credentials between two entities.
    Type: Application
    Filed: February 6, 2020
    Publication date: June 4, 2020
    Inventors: James R. Coon, Michael J. Miele, Garry J. Sullivan
  • Patent number: 10594478
    Abstract: The solutions disclosed enable security credentials to be shared between two entities. Embodiments of the present invention can be used to facilitate the transfer security credentials associated with a first level of permission of a first entity to a second entity that does not have the security credentials associated with the first level of permission in response to receiving a request to share security credentials between two entities.
    Type: Grant
    Filed: November 18, 2016
    Date of Patent: March 17, 2020
    Assignee: International Business Machines Corporation
    Inventors: James R. Coon, Michael J. Miele, Garry J. Sullivan
  • Publication number: 20180152292
    Abstract: The solutions disclosed enable security credentials to be shared between two entities. Embodiments of the present invention can be used to facilitate the transfer security credentials associated with a first level of permission of a first entity to a second entity that does not have the security credentials associated with the first level of permission in response to receiving a request to share security credentials between two entities.
    Type: Application
    Filed: February 19, 2018
    Publication date: May 31, 2018
    Inventors: James R. Coon, Michael J. Miele, Garry J. Sullivan
  • Publication number: 20180145828
    Abstract: The solutions disclosed enable security credentials to be shared between two entities. Embodiments of the present invention can be used to facilitate the transfer security credentials associated with a first level of permission of a first entity to a second entity that does not have the security credentials associated with the first level of permission in response to receiving a request to share security credentials between two entities.
    Type: Application
    Filed: November 18, 2016
    Publication date: May 24, 2018
    Inventors: James R. Coon, Michael J. Miele, Garry J. Sullivan
  • Patent number: 9607135
    Abstract: A system and method of managing a plurality of assets by associating a smart card with a compute subsystem by installing a database on the smart card and embedding an identifier of the compute subsystem. The system and method, in turn, may receive a request to access an asset of a compute subsystem; verify that a feature of the database is enabled in response to the request, the feature corresponding to the asset; and grant the access to access the asset upon the verifying of the feature.
    Type: Grant
    Filed: August 13, 2015
    Date of Patent: March 28, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James R. Coon, Richard J. Gusefski, Franz Hardt, Roger D. Krsnak, Jakob C. Lang, Victor M. Lourenco, Jan Schneider, Garry J. Sullivan, Brian D. Valentine
  • Patent number: 9424406
    Abstract: A system and method of managing a plurality of assets by associating a smart card with a compute subsystem by installing a database on the smart card and embedding an identifier of the compute subsystem. The system and method, in turn, may receive a request to access an asset of a compute subsystem; verify that a feature of the database is enabled in response to the request, the feature corresponding to the asset; and grant the access to access the asset upon the verifying of the feature.
    Type: Grant
    Filed: September 9, 2014
    Date of Patent: August 23, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James R. Coon, Richard J. Gusefski, Franz Hardt, Roger D. Krsnak, Jakob C. Lang, Victor M. Lourenco, Jan Schneider, Garry J. Sullivan, Brian D. Valentine
  • Publication number: 20160070893
    Abstract: A system and method of managing a plurality of assets by associating a smart card with a compute subsystem by installing a database on the smart card and embedding an identifier of the compute subsystem. The system and method, in turn, may receive a request to access an asset of a compute subsystem; verify that a feature of the database is enabled in response to the request, the feature corresponding to the asset; and grant the access to access the asset upon the verifying of the feature.
    Type: Application
    Filed: September 9, 2014
    Publication date: March 10, 2016
    Inventors: James R. Coon, Richard J. Gusefski, Franz Hardt, Roger D. Krsnak, Jakob C. Lang, Victor M. Lourenco, Jan Schneider, Garry J. Sullivan, Brian D. Valentine
  • Publication number: 20160070921
    Abstract: A system and method of managing a plurality of assets by associating a smart card with a compute subsystem by installing a database on the smart card and embedding an identifier of the compute subsystem. The system and method, in turn, may receive a request to access an asset of a compute subsystem; verify that a feature of the database is enabled in response to the request, the feature corresponding to the asset; and grant the access to access the asset upon the verifying of the feature.
    Type: Application
    Filed: August 13, 2015
    Publication date: March 10, 2016
    Inventors: JAMES R. COON, RICHARD J. GUSEFSKI, FRANZ HARDT, ROGER D. KRSNAK, JAKOB C. LANG, VICTOR M. LOURENCO, JAN SCHNEIDER, GARRY J. SULLIVAN, BRIAN D. VALENTINE
  • Patent number: 8582778
    Abstract: A computer program product for integrated key serving is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes using a smart card of two or more smart cards with a support element of two or more support elements to create an encryption key and storing the encryption key in an encrypted file that can only be decrypted by the smart card and the support element used to create the encryption key.
    Type: Grant
    Filed: June 1, 2011
    Date of Patent: November 12, 2013
    Assignee: International Business Machines Corporation
    Inventors: Edward W. Chencinski, James R. Coon, John C. Dayka, Steven G. Glassen, Richard J. Gusefski, Michael J. Jordan, Marco Kraemer, Thomas B. Mathias, Peter K. Szwed, Garry J. Sullivan, Klaus Werner
  • Publication number: 20120308011
    Abstract: A computer program product for integrated key serving is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes using a smart card of two or more smart cards with a support element of two or more support elements to create an encryption key and storing the encryption key in an encrypted file that can only be decrypted by the smart card and the support element used to create the encryption key.
    Type: Application
    Filed: June 1, 2011
    Publication date: December 6, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward W. Chencinski, James R. Coon, John C. Dayka, Steven G. Glassen, Richard J. Gusefski, Michael J. Jordan, Marco Kraemer, Thomas B. Mathias, Peter K. Szwed, Garry J. Sullivan, Klaus Werner
  • Patent number: 8261328
    Abstract: A method for using shared vulnerability to provide trusted communication services between systems is disclosed. For example, a server may deny access to a service which renders it vulnerable to an untrusted client unless access to a useful vulnerability is received from the client. That is, the server may trust the client because any misuse by the client may result in the server exploiting the shared vulnerability. A system may request access to a service on another system to perform some transaction. Upon receiving this request, the server may determine a vulnerability of the client useful in deterring or stopping unwanted actions. The server may request access to this vulnerability. Once this vulnerability has been granted to the server, the server may then grant access to the requested service to the client.
    Type: Grant
    Filed: August 14, 2008
    Date of Patent: September 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: David Christopher Hinkemeyer, Daniel P Kolz, Taylor L Schreck, Garry J Sullivan, Rainieri Ventura
  • Publication number: 20100043059
    Abstract: A method for using shared vulnerability to provide trusted communication services between systems is disclosed. For example, a server may deny access to a service which renders it vulnerable to an untrusted client unless access to a useful vulnerability is received from the client. That is, the server may trust the client because any misuse by the client may result in the server exploiting the shared vulnerability. A system may request access to a service on another system to perform some transaction. Upon receiving this request, the server may determine a vulnerability of the client useful in deterring or stopping unwanted actions. The server may request access to this vulnerability. Once this vulnerability has been granted to the server, the server may then grant access to the requested service to the client.
    Type: Application
    Filed: August 14, 2008
    Publication date: February 18, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Christopher Hinkemeyer, Daniel P. Kolz, Taylor L. Schreck, Garry J. Sullivan, Rainieri Ventura
  • Publication number: 20080172720
    Abstract: Methods, apparatus, and products for administering access permissions for computer resources that include: establishing, for active access permissions for a computer resource for a user, proposed alternative access permissions for the computer resource for the user; receiving, in an access control module of an operating system from the user, a request for access to the resource; determining, by the access control module, whether to grant access to the resource for the request in accordance with the active access permissions for the computer resource for the user; determining, by the access control module, whether access would have been granted for the request in accordance with the proposed alternative access permissions for the resource for the user; and recording, by the access control module, the result of the determination whether access would have been granted.
    Type: Application
    Filed: January 15, 2007
    Publication date: July 17, 2008
    Inventors: Patrick S. Botz, Daniel P. Kolz, Garry J. Sullivan
  • Publication number: 20080034402
    Abstract: A method, system, and computer program product for implementing policy-based security control functions is provided. The method includes constructing an organizational domain specifying business assets to be secured and the actors in specific roles requiring access to the business assets. The method also includes constructing a control policy domain including system setting attributes and access control policies for a computer system, the access control policies specifying permissions-based access to specified types of data based upon actor and purpose of use criteria. The method further includes mapping user identifiers to corresponding actors and mapping system artifacts in the computer system or subsystem to business assets defined in the organizational domain to which an access control policy is to be applied. The method also includes applying the access control policies to the system.
    Type: Application
    Filed: August 7, 2006
    Publication date: February 7, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Patrick S. Botz, Daniel P. Kolz, Garry J. Sullivan