Patents by Inventor Lawrence Koved
Lawrence Koved has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11122026Abstract: Adjustments to be made to a system for authenticating users may be made by performing the following operations: obtaining a stochastic model of the system, wherein the stochastic model includes two or more classes of requests; obtaining a set of preferences for handling authentication requests and a set of operational parameter values; determining, based at least in part on the stochastic model and the set of operational parameter values, that adjusting an authentication scheme will improve a probable degree to which the authentication system will meet the set of preferences; responsive to the determination that adjusting the authentication scheme will improve the probable degree to which the system for authenticating users will meet the set of preferences, adjusting the authentication scheme of the system for authenticating users; and performing an authentication of a user based on the adjusted authentication scheme.Type: GrantFiled: August 1, 2019Date of Patent: September 14, 2021Assignee: International Business Machines CorporationInventors: Lawrence Koved, Bo Zhang
-
Patent number: 11107048Abstract: An example operation may include one or more of receiving one or more transaction requests to complete one or more transactions, recording the one or more transaction requests in a blockchain, requesting one or more transaction confirmations from an out-of-band device to confirm the one or more transactions, and committing the one or more confirmed transactions to the blockchain.Type: GrantFiled: April 17, 2017Date of Patent: August 31, 2021Assignee: International Business Machines CorporationInventors: Ramesh Gopinath, Lawrence Koved, Brigid Mcdermott, Krishna Ratakonda
-
Patent number: 11025643Abstract: Authenticated base digital document(s) are issued to client(s) by an issuing party, and aggregate digital document(s) are received. An aggregate digital document includes base digital document(s) and attachment(s). Authenticity of the aggregate digital document(s) is verified, resulting in authenticated aggregate digital document(s), which are stored and/or redistributed. Authentication challenge(s) are sent by a verifying party to a client requesting part or all of an aggregate digital document from the client be verified. The part or all of the aggregate digital document is received and authenticity and integrity are verified, resulting in an authenticated aggregate digital document. The client verifies authenticity of a base digital document and receives the authentication challenge(s) for an authenticated aggregate digital document and sends part or all of the authenticated aggregate digital document to the verifying party for verification by the verifying party.Type: GrantFiled: April 2, 2019Date of Patent: June 1, 2021Assignee: International Business Machines CorporationInventors: Divyesh Jadav, Rabimba Karanjai, Lawrence Koved, Gabriel Alatorre
-
Publication number: 20200322351Abstract: Authenticated base digital document(s) are issued to client(s) by an issuing party, and aggregate digital document(s) are received. An aggregate digital document includes base digital document(s) and attachment(s). Authenticity of the aggregate digital document(s) is verified, resulting in authenticated aggregate digital document(s), which are stored and/or redistributed. Authentication challenge(s) are sent by a verifying party to a client requesting part or all of an aggregate digital document from the client be verified. The part or all of the aggregate digital document is received and authenticity and integrity are verified, resulting in an authenticated aggregate digital document. The client verifies authenticity of a base digital document and receives the authentication challenge(s) for an authenticated aggregate digital document and sends part or all of the authenticated aggregate digital document to the verifying party for verification by the verifying party.Type: ApplicationFiled: April 2, 2019Publication date: October 8, 2020Inventors: Divyesh Jadav, Rabimba Karanjai, Lawrence Koved, Gabriel Alatorre
-
Publication number: 20200177568Abstract: Adjustments to be made to a system for authenticating users may be made by performing the following operations: obtaining a stochastic model of the system, wherein the stochastic model includes two or more classes of requests; obtaining a set of preferences for handling authentication requests and a set of operational parameter values; determining, based at least in part on the stochastic model and the set of operational parameter values, that adjusting an authentication scheme will improve a probable degree to which the authentication system will meet the set of preferences; responsive to the determination that adjusting the authentication scheme will improve the probable degree to which the system for authenticating users will meet the set of preferences, adjusting the authentication scheme of the system for authenticating users; and performing an authentication of a user based on the adjusted authentication scheme.Type: ApplicationFiled: August 1, 2019Publication date: June 4, 2020Inventors: Lawrence Koved, Bo Zhang
-
Patent number: 10652225Abstract: Using a stochastic queuing model to determine adjustments to be made to authentication system operation. In light of operational parameter values and the stochastic queuing model, a determination is made that adjusting the value of a particular parameter for handling authentication requests is likely to improve some aspect of system performance, and the request handling parameter is adjusted accordingly.Type: GrantFiled: June 24, 2015Date of Patent: May 12, 2020Assignee: International Business Machines CorporationInventors: Lawrence Koved, Bo Zhang
-
Patent number: 10586210Abstract: A certified checkpoint is provided for a ledger comprising a blockchain and a world state. The certified checkpoint enables a third party to recognize and verify that the ledger has integrity, a known starting state, and immutability properties starting at a specific point in time. Certification means that all of the validating peers reached consensus on the state of the ledger at that point in time. Thus, the certified checkpoint state represents an agreed-upon state, and that one or more subsequent operations on the ledger are relative to that agreed-upon state. Preferably, before a checkpoint is certified, it must be consistent, meaning that all validating peers have reached the same value for the checkpoint. Preferably, the checkpoint is a compression of the current blockchain world state into a compact representation (e.g., a hash) of the ledger that based on an agreed-upon consensus protocol is consistent across the (validating) peers.Type: GrantFiled: November 30, 2016Date of Patent: March 10, 2020Assignee: International Business Machines CorporationInventors: Guerney D. H. Hunt, Lawrence Koved
-
Patent number: 10523421Abstract: A certified checkpoint is provided for a ledger comprising a blockchain and a world state. The certified checkpoint enables a third party to recognize and verify that the ledger has integrity, a known starting state, and immutability properties starting at a specific point in time. Certification means that all of the validating peers reached consensus on the state of the ledger at that point in time. Thus, the certified checkpoint state represents an agreed-upon state, and that one or more subsequent operations on the ledger are relative to that agreed-upon state. Preferably, before a checkpoint is certified, it must be consistent, meaning that all validating peers have reached the same value for the checkpoint. Preferably, the checkpoint is a compression of the current blockchain world state into a compact representation (e.g., a hash) of the ledger that based on an agreed-upon consensus protocol is consistent across the (validating) peers. The approach also is extended to a permissionless blockchain.Type: GrantFiled: June 26, 2017Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Guerney D. H. Hunt, Lawrence Koved
-
Patent number: 10460289Abstract: A certified checkpoint is provided for a ledger comprising a blockchain and a world state. The certified checkpoint enables a third party to recognize and verify that the ledger has integrity, a known starting state, and immutability properties starting at a specific point in time. Certification means that all of the validating peers reached consensus on the state of the ledger at that point in time. Thus, the certified checkpoint state represents an agreed-upon state, and that one or more subsequent operations on the ledger are relative to that agreed-upon state. Preferably, before a checkpoint is certified, it must be consistent, meaning that all validating peers have reached the same value for the checkpoint. Preferably, the checkpoint is a compression of the current blockchain world state into a compact representation (e.g., a hash) of the ledger that based on an agreed-upon consensus protocol is consistent across the (validating) peers. A technique to certify a blockchain checkpoint also is described.Type: GrantFiled: February 2, 2017Date of Patent: October 29, 2019Assignee: International Business Machines CorporationInventors: Guerney D. H. Hunt, Lawrence Koved
-
Patent number: 10375116Abstract: Systems and methods for protecting a data item include, upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score and a current protection, level of the data item. A policy is applied to determine an appropriate protection for the data item based upon the sensitivity score and the current protection level. A protected data item is provided to the client device by applying the appropriate protection to the data item.Type: GrantFiled: March 2, 2017Date of Patent: August 6, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pau-Chen Cheng, Stephen C. Gates, Lawrence Koved, Wilfried Teiken
-
Patent number: 10375119Abstract: Dynamic multi-factor authentication challenge selection is provided. A risk associated with an operation that requires authentication of a user of a client device is determined. A plurality of authentication methods is identified. Each respective authentication method associated with a level of security offsetting the risk and a computing cost associated with a respective authentication method. One or more authentication methods are selected from the plurality of authentication methods according to the risk and to minimize the computing cost associated with authenticating the operation.Type: GrantFiled: July 28, 2016Date of Patent: August 6, 2019Assignee: International Business Machines CorporationInventors: Hagai Aronowitz, Lawrence Koved, Ian M. Molloy, Bo Zhang
-
Patent number: 10277591Abstract: Authenticating a user is provided. A decryption key corresponding to an authentication account of the user of a client device and authentication credential data obtained from the user of the client device is received during authentication. Encrypted authentication credential data corresponding to the user is decrypted using the received decryption key corresponding to the authentication account of the user. The decrypted authentication credential data is compared with the received authentication credential data to authenticate the user of the client device.Type: GrantFiled: June 26, 2018Date of Patent: April 30, 2019Assignee: International Business Machines CorporationInventors: Lawrence Koved, Ian M. Molloy, Gelareh Taban
-
Publication number: 20180316666Abstract: Authenticating a user is provided. A decryption key corresponding to an authentication account of the user of a client device and authentication credential data obtained from the user of the client device is received during authentication. Encrypted authentication credential data corresponding to the user is decrypted using the received decryption key corresponding to the authentication account of the user. The decrypted authentication credential data is compared with the received authentication credential data to authenticate the user of the client device.Type: ApplicationFiled: June 26, 2018Publication date: November 1, 2018Inventors: Lawrence Koved, Ian M. Molloy, Gelareh Taban
-
Publication number: 20180300693Abstract: An example operation may include one or more of receiving one or more transaction requests to complete one or more transactions, recording the one or more transaction requests in a blockchain, requesting one or more transaction confirmations from an out-of-band device to confirm the one or more transactions, and committing the one or more confirmed transactions to the blockchain.Type: ApplicationFiled: April 17, 2017Publication date: October 18, 2018Inventors: Ramesh Gopinath, Lawrence Koved, Brigid Mcdermott, Krishna Ratakonda
-
Patent number: 10097544Abstract: Authenticating a user is provided. A decryption key corresponding to an authentication account of the user of a client device and authentication credential data obtained from the user of the client device is received during authentication. Encrypted authentication credential data corresponding to the user is decrypted using the received decryption key corresponding to the authentication account of the user. The decrypted authentication credential data is compared with the received authentication credential data to authenticate the user of the client device.Type: GrantFiled: June 1, 2016Date of Patent: October 9, 2018Assignee: International Business Machines CorporationInventors: Lawrence Koved, Ian M. Molloy, Gelareh Taban
-
Patent number: 10091181Abstract: Dynamic risk communication associated with a computer device may include automatically detecting one or more security risk factors for the computer device based on current context information associated with the computer device. Whether an attempt is being made via the computer device to manipulate the one or more risk factors in an attempt to reduce a security level of a computer-implemented authentication procedure may be determined. Responsive to determining that the attempt is being made to manipulate the one or more risk factors, a new challenge for additional identification may be communicated for presentation on a user interface device of the computer device while suppressing one or more security risk factors from being presented on the user interface device. Responsive to determining that an attempt is not being made to manipulate the one or more risk factors, the new challenge and one or more security risk factors may be communicated.Type: GrantFiled: June 9, 2017Date of Patent: October 2, 2018Assignee: International Business Machines CorporationInventors: Pau-Chen Cheng, Lawrence Koved, Kapil K. Singh, Calvin B. Swart, Sharon M. Trewin
-
Publication number: 20180158034Abstract: A blockchain may include various transactions which are identified and which require processing. The order of processing such transactions may be optimized by examining content of the transactions. One example method of operation may comprise one or more of receiving an ordered set of proposed transactions intended for inclusion in a blockchain block, creating a lattice structure containing the proposed transactions for the blockchain block, the lattice structure comprising a top and a bottom and a plurality of nodes representing the proposed transactions, determining an order of execution of the proposed transactions for the blockchain block via the lattice structure, and processing the proposed transactions in the lattice structure in parallel based on a configuration of the lattice structure.Type: ApplicationFiled: December 7, 2016Publication date: June 7, 2018Inventors: Guerney D.H. Hunt, Lawrence Koved
-
Publication number: 20180150835Abstract: A certified checkpoint is provided for a ledger comprising a blockchain and a world state. The certified checkpoint enables a third party to recognize and verify that the ledger has integrity, a known starting state, and immutability properties starting at a specific point in time. Certification means that all of the validating peers reached consensus on the state of the ledger at that point in time. Thus, the certified checkpoint state represents an agreed-upon state, and that one or more subsequent operations on the ledger are relative to that agreed-upon state. Preferably, before a checkpoint is certified, it must be consistent, meaning that all validating peers have reached the same value for the checkpoint. Preferably, the checkpoint is a compression of the current blockchain world state into a compact representation (e.g., a hash) of the ledger that based on an agreed-upon consensus protocol is consistent across the (validating) peers. A technique to certify a blockchain checkpoint also is described.Type: ApplicationFiled: February 2, 2017Publication date: May 31, 2018Inventors: Guerney D.H. Hunt, Lawrence Koved
-
Publication number: 20180152289Abstract: A certified checkpoint is provided for a ledger comprising a blockchain and a world state. The certified checkpoint enables a third party to recognize and verify that the ledger has integrity, a known starting state, and immutability properties starting at a specific point in time. Certification means that all of the validating peers reached consensus on the state of the ledger at that point in time. Thus, the certified checkpoint state represents an agreed-upon state, and that one or more subsequent operations on the ledger are relative to that agreed-upon state. Preferably, before a checkpoint is certified, it must be consistent, meaning that all validating peers have reached the same value for the checkpoint. Preferably, the checkpoint is a compression of the current blockchain world state into a compact representation (e.g., a hash) of the ledger that based on an agreed-upon consensus protocol is consistent across the (validating) peers. The approach also is extended to a permissionless blockchain.Type: ApplicationFiled: June 26, 2017Publication date: May 31, 2018Inventors: Guerney D.H. Hunt, Lawrence Koved
-
Publication number: 20180150799Abstract: A certified checkpoint is provided for a ledger comprising a blockchain and a world state. The certified checkpoint enables a third party to recognize and verify that the ledger has integrity, a known starting state, and immutability properties starting at a specific point in time. Certification means that all of the validating peers reached consensus on the state of the ledger at that point in time. Thus, the certified checkpoint state represents an agreed-upon state, and that one or more subsequent operations on the ledger are relative to that agreed-upon state. Preferably, before a checkpoint is certified, it must be consistent, meaning that all validating peers have reached the same value for the checkpoint. Preferably, the checkpoint is a compression of the current blockchain world state into a compact representation (e.g., a hash) of the ledger that based on an agreed-upon consensus protocol is consistent across the (validating) peers.Type: ApplicationFiled: November 30, 2016Publication date: May 31, 2018Inventors: Guerney D.H. Hunt, Lawrence Koved