Patents by Inventor Kenneth A. Goldman

Kenneth A. Goldman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9298922
    Abstract: A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote system to establish trust in the properties of the computer system. The properties to be trusted are expanded from the usual system software layers and related configuration files to novel types of data such as static data specific to the computer system, dynamic data determined at system startup, or dynamic data created as the computer system runs applications.
    Type: Grant
    Filed: July 10, 2008
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventors: Stefan Berger, Kenneth Goldman, Trenton R. Jaeger, Ronald Perez, Reiner Sailer, Enriquillo Valdez
  • Publication number: 20160006703
    Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.
    Type: Application
    Filed: September 15, 2015
    Publication date: January 7, 2016
    Inventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquilo Valdez
  • Publication number: 20150262185
    Abstract: Various embodiments for maintaining security and confidentiality of data and operations within a fraud detection system. Each of these embodiments utilizes a secure architecture in which: (1) access to data is limited to only approved or authorized entities; (2) confidential details in received data can be readily identified and concealed; and (3) confidential details that have become non-confidential can be identified and exposed.
    Type: Application
    Filed: May 13, 2015
    Publication date: September 17, 2015
    Inventors: Naoki Abe, Carl E. Abrams, Chidanand V. Apte, Bishwaranjan Bhattacharjee, Kenneth A. Goldman, Matthias Gruetzner, Matthew A. Hilbert, John Langford, Sriram K. Padmanabhan, Charles P. Tresser, Kathleen M. Troidle, Philip S. Yu
  • Publication number: 20150244709
    Abstract: A system and method for secure component provisioning implements a three-way transaction to thwart fraudulent component provisioning when a certificate requester is not fully trusted. A certificate authority receives a certificate request for a component from a contract manufacturer and then issues the certificate, sending the issued certificate to a final assembly point for provisioning of the component.
    Type: Application
    Filed: February 26, 2014
    Publication date: August 27, 2015
    Applicant: International Business Machines Corporation
    Inventor: Kenneth A. Goldman
  • Patent number: 9064364
    Abstract: Various embodiments for maintaining security and confidentiality of data and operations within a fraud detection system. Each of these embodiments utilizes a secure architecture in which: (1) access to data is limited to only approved or authorized entities; (2) confidential details in received data can be readily identified and concealed; and (3) confidential details that have become non-confidential can be identified and exposed.
    Type: Grant
    Filed: October 22, 2003
    Date of Patent: June 23, 2015
    Assignee: International Business Machines Corporation
    Inventors: Naoki Abe, Carl E. Abrams, Chidanand V. Apte, Bishwaranjan Bhattacharjee, Kenneth A. Goldman, Matthias Gruetzner, Matthew A. Hilbert, John Langford, Sriram K. Padmanabhan, Charles P. Tresser, Kathleen M. Troidle, Philip S. Yu
  • Publication number: 20150074392
    Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.
    Type: Application
    Filed: September 12, 2013
    Publication date: March 12, 2015
    Applicant: International Business Machines Corporation
    Inventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquillo Valdez
  • Patent number: 8589672
    Abstract: Method, apparatus and computer program product are provided for operating a plurality of computer nodes while maintaining trust. A primary computer node and at least one secondary computer node are connected into a cluster, wherein each of the clustered computer nodes includes a trusted platform module (TPM) that is accessible to software and includes security status information about the respective computer node. Each clustered computer node is then merged into a single node with only the TPM of the primary computer node being accessible to software. The TPM of the primary computer node is updated to include the security status information of each TPM in the cluster. Preferably, the step of merging is controlled by power on self test (POST) basic input output system (BIOS) code associated with a boot processor in the primary node.
    Type: Grant
    Filed: November 14, 2008
    Date of Patent: November 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Shiva R. Dasari, Lee H. Wilson, Scott N. Durham, Sumeet Kochar, William B. Schwartz, Kenneth A. Goldman
  • Patent number: 8356347
    Abstract: A migration scheme for virtualized Trusted Platform Modules is presented. The procedure is capable of securely migrating an instance of a virtual Trusted Platform Module from one physical platform to another. A virtual Trusted Platform Module instance's state is downloaded from a source virtual Trusted Platform Module and all its state information is encrypted using a hybrid of public and symmetric key cryptography. The encrypted state is transferred to the target physical platform, decrypted and the state of the virtual Trusted Platform Module instance is rebuilt.
    Type: Grant
    Filed: July 22, 2011
    Date of Patent: January 15, 2013
    Assignee: International Business Machines Corporation
    Inventors: Stefan Berger, Kenneth A. Goldman, Reiner Sailer
  • Publication number: 20110283352
    Abstract: A migration scheme for virtualized Trusted Platform Modules is presented. The procedure is capable of securely migrating an instance of a virtual Trusted Platform Module from one physical platform to another. A virtual Trusted Platform Module instance's state is downloaded from a source virtual Trusted Platform Module and all its state information is encrypted using a hybrid of public and symmetric key cryptography. The encrypted state is transferred to the target physical platform, decrypted and the state of the virtual Trusted Platform Module instance is rebuilt.
    Type: Application
    Filed: July 22, 2011
    Publication date: November 17, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Stefan Berger, Kenneth A. Goldman, Reiner Sailer
  • Patent number: 8020204
    Abstract: A migration scheme for virtualized Trusted Platform Modules is presented. The procedure is capable of securely migrating an instance of a virtual Trusted Platform Module from one physical platform to another. A virtual Trusted Platform Module instance's state is downloaded from a source virtual Trusted Platform Module and all its state information is encrypted using a hybrid of public and symmetric key cryptography. The encrypted state is transferred to the target physical platform, decrypted and the state of the virtual Trusted Platform Module instance is rebuilt.
    Type: Grant
    Filed: May 2, 2008
    Date of Patent: September 13, 2011
    Assignee: International Business Machines Corporation
    Inventors: Stefan Berger, Kenneth A. Goldman, Reiner Sailer
  • Patent number: 7840801
    Abstract: The presented method allows a virtual TRUSTED PLATFORM MODULE (TPM) instance to map the Platform Configuration Registers (PCR) register state of a parent virtual TPM instance into its own register space and export the state of those registers to applications inside the virtual machine associated with the virtual TPM instance. Through the mapping of PCR registers, the procedure of attesting to the overall state of a virtual machine can be accelerated, since the state of all measurements relevant to the trustworthiness of a virtual machine are all visible in the combined view of mapped and non-mapped PCR registers. Registers that are mapped into the register space of a virtual TPM instance reflect the state of trustworthiness of those virtual machines that were involved in the creation of the virtual machine that is being challenged.
    Type: Grant
    Filed: January 19, 2007
    Date of Patent: November 23, 2010
    Assignee: International Business Machines Corporation
    Inventors: Stefan Berger, Kenneth A. Goldman, Ronald Perez, Reiner Sailer
  • Publication number: 20100125731
    Abstract: Method, apparatus and computer program product are provided for operating a plurality of computer nodes while maintaining trust. A primary computer node and at least one secondary computer node are connected into a cluster, wherein each of the clustered computer nodes includes a trusted platform module (TPM) that is accessible to software and includes security status information about the respective computer node. Each clustered computer node is then merged into a single node with only the TPM of the primary computer node being accessible to software. The TPM of the primary computer node is updated to include the security status information of each TPM in the cluster. Preferably, the step of merging is controlled by power on self test (POST) basic input output system (BIOS) code associated with a boot processor in the primary node.
    Type: Application
    Filed: November 14, 2008
    Publication date: May 20, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shiva R. Dasari, Lee H. Wilson, Scott N. Durham, Sumeet Kochar, William B. Schwartz, Kenneth A. Goldman
  • Publication number: 20090328145
    Abstract: A migration scheme for virtualized Trusted Platform Modules is presented. The procedure is capable of securely migrating an instance of a virtual Trusted Platform Module from one physical platform to another. A virtual Trusted Platform Module instance's state is downloaded from a source virtual Trusted Platform Module and all its state information is encrypted using a hybrid of public and symmetric key cryptography. The encrypted state is transferred to the target physical platform, decrypted and the state of the virtual Trusted Platform Module instance is rebuilt.
    Type: Application
    Filed: May 2, 2008
    Publication date: December 31, 2009
    Inventors: STEFAN BERGER, Kenneth A. Goldman, Reiner Sailer
  • Publication number: 20080270603
    Abstract: A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote system to establish trust in the properties of the computer system. The properties to be trusted are expanded from the usual system software layers and related configuration files to novel types of data such as static data specific to the computer system, dynamic data determined at system startup, or dynamic data created as the computer system runs applications.
    Type: Application
    Filed: July 10, 2008
    Publication date: October 30, 2008
    Inventors: Stefan Berger, Kenneth Goldman, Trenton R. Jaeger, Ronald Perez, Reiner Sailer, Enriquillo Valdez
  • Patent number: 7444670
    Abstract: A migration scheme for virtualized Trusted Platform Modules is presented. The procedure is capable of securely migrating an instance of a virtual Trusted Platform Module from one physical platform to another. A virtual Trusted Platform Module instance's state is downloaded from a source virtual Trusted Platform Module and all its state information is encrypted using a hybrid of public and symmetric key cryptography. The encrypted state is transferred to the target physical platform, decrypted and the state of the virtual Trusted Platform Module instance is rebuilt.
    Type: Grant
    Filed: March 21, 2006
    Date of Patent: October 28, 2008
    Assignee: International Business Machines Corporation
    Inventors: Stefan Berger, Kenneth A. Goldman, Reiner Sailer
  • Publication number: 20080178176
    Abstract: The presented method allows a virtual TRUSTED PLATFORM MODULE (TPM) instance to map the Platform Configuration Registers (PCR) register state of a parent virtual TPM instance into its own register space and export the state of those registers to applications inside the virtual machine associated with the virtual TPM instance. Through the mapping of PCR registers, the procedure of attesting to the overall state of a virtual machine can be accelerated, since the state of all measurements relevant to the trustworthiness of a virtual machine are all visible in the combined view of mapped and non-mapped PCR registers. Registers that are mapped into the register space of a virtual TPM instance reflect the state of trustworthiness of those virtual machines that were involved in the creation of the virtual machine that is being challenged.
    Type: Application
    Filed: January 19, 2007
    Publication date: July 24, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Stefan Berger, Kenneth A. Goldman, Ronald Perez, Reiner Sailer
  • Publication number: 20080046752
    Abstract: A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote system to establish trust in the properties of the computer system. The properties to be trusted are expanded from the usual system software layers and related configuration files to novel types of data such as static data specific to the computer system, dynamic data determined at system startup, or dynamic data created as the computer system runs applications.
    Type: Application
    Filed: August 9, 2006
    Publication date: February 21, 2008
    Inventors: Stefan Berger, Kenneth Goldman, Trenton R. Jaeger, Ronald Perez, Reiner Sailer, Enriquillo Valdez
  • Publication number: 20070226786
    Abstract: A migration scheme for virtualized Trusted Platform Modules is presented. The procedure is capable of securely migrating an instance of a virtual Trusted Platform Module from one physical platform to another. A virtual Trusted Platform Module instance's state is downloaded from a source virtual Trusted Platform Module and all its state information is encrypted using a hybrid of public and symmetric key cryptography. The encrypted state is transferred to the target physical platform, decrypted and the state of the virtual Trusted Platform Module instance is rebuilt.
    Type: Application
    Filed: March 21, 2006
    Publication date: September 27, 2007
    Applicant: International Business Machines Corporation
    Inventors: Stefan Berger, Kenneth Goldman, Reiner Sailer
  • Publication number: 20070176751
    Abstract: An exemplary embodiment uses a novel adaptation of a tree splitting algorithm applied to Radio Frequency (RE) tagging technology to identify many tags in the RF field of a base station. The embodiment uses the tree splitting algorithm to identify a single tag in a field of a plurality of radio frequency tags. Once the single tag is identified, the identified tag is placed in a Data_Exchange state where the base station can access data from the tag memory by using information that identifies the tag.
    Type: Application
    Filed: January 2, 2007
    Publication date: August 2, 2007
    Inventors: Christian Cesar, Shun Chan, Thomas Colino, Kenneth Goldman, Sharon Greene, Harley Heinrich, Kevin McAuliffe, Dilip Kandlur, Arvind Krishna
  • Publication number: 20070159305
    Abstract: A system and method is disclosed for selecting certain subgroups of radio frequency (RF) tags for querying, communicating, and/or identifying by a base station. The base station sends commands to a group tags within a RF field of the base station. The tags use control logic to determine whether or not they meet certain criteria sent out by the commands. This may cause the tags to change state which either prevents or allows a given tag to participate in an identification process. In this way, a given subgroups of tags meeting certain criteria can be selected for querying, communicating, and/or identifying.
    Type: Application
    Filed: January 2, 2007
    Publication date: July 12, 2007
    Inventors: Christian Cesar, Shun-Shing Chan, Harley Heinrich, Thomas Cofino, Dilip Kandlur, Kenneth Goldman, Sharon Greene, Kevin McAuliffe, Arvind Krishna