Patents by Inventor Linwood H. Overby, Jr.

Linwood H. Overby, Jr. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10567373
    Abstract: A system for establishing a secure connection is described. The system includes a remote direct memory access over converged Ethernet (RoCE) adapter and host device. The host device includes a processor configured to establish a Transmission Control Protocol (TCP) connection between the host device and a client device via the host device network adapter. The host device forwards Internet Protocol Security (IPSec) Security Associations (SAs) and related keys to a host device Remote Direct Memory Access over Converged Ethernet (RoCE) adapter operatively connected with the host device for remote direct memory access. The RoCE adapter communicates protected data to and from the client device over an RoCE connection using the IPSec SAs and related keys.
    Type: Grant
    Filed: November 10, 2017
    Date of Patent: February 18, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Constantinos Kassimis, Chris Meyer, Linwood H. Overby, Jr., Jerry Stevens
  • Patent number: 10567372
    Abstract: A system for establishing a secure connection is described. The system includes a remote direct memory access over converged Ethernet (RoCE) adapter and host device. The host device includes a processor configured to establish a Transmission Control Protocol (TCP) connection between the host device and a client device via the host device network adapter. The host device forwards Internet Protocol Security (IPSec) Security Associations (SAs) and related keys to a host device Remote Direct Memory Access over Converged Ethernet (RoCE) adapter operatively connected with the host device for remote direct memory access. The RoCE adapter communicates protected data to and from the client device over an RoCE connection using the IPSec SAs and related keys.
    Type: Grant
    Filed: June 16, 2017
    Date of Patent: February 18, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Constantinos Kassimis, Chris Meyer, Linwood H. Overby, Jr., Jerry Stevens
  • Patent number: 10382490
    Abstract: A computer-implemented method includes monitoring a plurality of connections of a plurality of host applications at a host, where each connection of the plurality of connections carries network traffic associated with a respective host application of the plurality of host applications. A plurality of sets of security attributes are detected, and include a respective set of security attributes for each connection of the plurality of connections. The plurality of sets of security attributes are stored in a security database. From the security database, the respective set of security attributes of a first connection are compared to a centralized security policy. It is determined that the respective set of security attributes of the first connection do not meet the centralized security policy. A remedial action is performed on the first connection, responsive to the respective set of security attributes of the first connection not meeting the centralized security policy.
    Type: Grant
    Filed: January 24, 2017
    Date of Patent: August 13, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Constantinos Kassimis, Christopher Meyer, Linwood H. Overby, Jr., David J. Wierbowski
  • Patent number: 10348681
    Abstract: Embodiments of the present invention provide methods, systems and computer program products for the centralized, secure offloading of security services for distributed security enforcement points. In an embodiment, a network data processing system can be configured for centralized secure offload of security services for distributed security enforcement points and can include a set of security enforcement points controlling communication flows between devices in different less trusted zones of protection. The system also can include a security server communicatively coupled to the security enforcement points and hosting security services logic disposed in a more trusted zone of protection. Each of the security enforcement points can include an interface to the security services logic and program code enabled to offload security related services processing through the interface to the security services logic disposed in the more trusted zone of protection.
    Type: Grant
    Filed: January 24, 2007
    Date of Patent: July 9, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Curtis M. Gearhart, Christopher Meyer, Linwood H. Overby, Jr., David J. Wierbowski
  • Publication number: 20180367527
    Abstract: A system for establishing a secure connection is described. The system includes a remote direct memory access over converged Ethernet (RoCE) adapter and host device. The host device includes a processor configured to establish a Transmission Control Protocol (TCP) connection between the host device and a client device via the host device network adapter. The host device forwards Internet Protocol Security (IPSec) Security Associations (SAs) and related keys to a host device Remote Direct Memory Access over Converged Ethernet (RoCE) adapter operatively connected with the host device for remote direct memory access. The RoCE adapter communicates protected data to and from the client device over an RoCE connection using the IPSec SAs and related keys.
    Type: Application
    Filed: November 10, 2017
    Publication date: December 20, 2018
    Inventors: Constantinos Kassimis, Chris Meyer, Linwood H. Overby, JR., Jerry Stevens
  • Publication number: 20180367525
    Abstract: A system for establishing a secure connection is described. The system includes a remote direct memory access over converged Ethernet (RoCE) adapter and host device. The host device includes a processor configured to establish a Transmission Control Protocol (TCP) connection between the host device and a client device via the host device network adapter. The host device forwards Internet Protocol Security (IPSec) Security Associations (SAs) and related keys to a host device Remote Direct Memory Access over Converged Ethernet (RoCE) adapter operatively connected with the host device for remote direct memory access. The RoCE adapter communicates protected data to and from the client device over an RoCE connection using the IPSec SAs and related keys.
    Type: Application
    Filed: June 16, 2017
    Publication date: December 20, 2018
    Inventors: Constantinos Kassimis, Chris Meyer, Linwood H. Overby, JR., Jerry Stevens
  • Publication number: 20180212999
    Abstract: A computer-implemented method includes monitoring a plurality of connections of a plurality of host applications at a host, where each connection of the plurality of connections carries network traffic associated with a respective host application of the plurality of host applications. A plurality of sets of security attributes are detected, and include a respective set of security attributes for each connection of the plurality of connections. The plurality of sets of security attributes are stored in a security database. From the security database, the respective set of security attributes of a first connection are compared to a centralized security policy. It is determined that the respective set of security attributes of the first connection do not meet the centralized security policy. A remedial action is performed on the first connection, responsive to the respective set of security attributes of the first connection not meeting the centralized security policy.
    Type: Application
    Filed: January 24, 2017
    Publication date: July 26, 2018
    Inventors: Constantinos Kassimis, Christopher Meyer, Linwood H. Overby, JR., David J. Wierbowski
  • Patent number: 9954821
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to secure communications for multiple hosts in an address translation environment and provide a method, system and computer program product for IPsec SA management for multiple clients sharing a single network address. In one embodiment, a computer implemented method for IPsec SA management for multiple hosts sharing a single network address can include receiving a packet for IPsec processing for a specified client among the multiple clients sharing the single network address. A dynamic SA can be located among multiple dynamic SAs for the specified client using client identifying information exclusive of a 5-tuple produced for the dynamic SA. Finally, IPsec processing can be performed for the packet.
    Type: Grant
    Filed: July 12, 2012
    Date of Patent: April 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Linwood H. Overby, Jr., Joyce A. Porter, David J. Wierbowski
  • Patent number: 9781162
    Abstract: A method, system and computer program product for predictively configuring a security services protocol implementation can be provided. The method can include providing a set of network topology descriptions and determining a selection of one of the network topology descriptions. The method further can include identifying configuration settings corresponding to the selection and applying the configuration settings to the security services protocol implementation. For instance, applying the configuration settings to the security services protocol implementation can include selecting encapsulation mode and routing settings for the security services protocol implementation.
    Type: Grant
    Filed: February 15, 2006
    Date of Patent: October 3, 2017
    Assignee: International Business Machines Corporation
    Inventors: Linwood H. Overby, Jr., Mark T. Wright
  • Patent number: 9715401
    Abstract: In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM can be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.
    Type: Grant
    Filed: September 15, 2008
    Date of Patent: July 25, 2017
    Assignee: International Business Machines Corporation
    Inventors: Wesley M. Devine, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Michael S. Law, Linwood H. Overby, Jr.
  • Patent number: 9507676
    Abstract: Aspects of the disclosure relate to managing migration of one or more applications from a primary computing device to recovery computing devices using a controller. Resource data that includes application resource requirements and resource capacities is monitored. An application exists as a single instance on the primary computing device. A recovery cluster for the application consisting of recovery computing devices is determined. A division of the application into a plurality of application instances is identified. In response to the resource data being updated, a new recovery cluster is determined. In response to the new recovery cluster, a new plurality of application instances is identified. Once a triggering event on the primary computing device is detected, the controller migrates the new application instances to the new recovery cluster. Other uses of the disclosure are possible.
    Type: Grant
    Filed: December 17, 2014
    Date of Patent: November 29, 2016
    Assignee: International Business Machines Corporation
    Inventors: Michael G. Fitzpatrick, Brian J. Lang, Linwood H. Overby, Jr., Jerry W. Stevens
  • Publication number: 20160179636
    Abstract: Aspects of the disclosure relate to managing migration of one or more applications from a primary computing device to recovery computing devices using a controller. Resource data that includes application resource requirements and resource capacities is monitored. An application exists as a single instance on the primary computing device. A recovery cluster for the application consisting of recovery computing devices is determined. A division of the application into a plurality of application instances is identified. In response to the resource data being updated, a new recovery cluster is determined. In response to the new recovery cluster, a new plurality of application instances is identified. Once a triggering event on the primary computing device is detected, the controller migrates the new application instances to the new recovery cluster. Other uses of the disclosure are possible.
    Type: Application
    Filed: December 17, 2014
    Publication date: June 23, 2016
    Inventors: Michael G. Fitzpatrick, Brian J. Lang, Linwood H. Overby, JR., Jerry W. Stevens
  • Patent number: 9137203
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to network security and provide a method, system and computer program product for centralized secure offload of key exchange services for distributed security enforcement points. In one embodiment, a data processing system for centralized secure offload of key exchange services for distributed security enforcement points can be provided. The system can include a security enforcement point controlling communication flows between devices in different less trusted zones of protection, and a security server communicatively coupled to the security enforcement point and hosting key exchange services disposed in a more trusted zone of protection. The security enforcement point can include an interface to the key exchange services and program code enabled to offload at least one portion of a key exchange through the interface to the key exchange services disposed in the more trusted zone of protection.
    Type: Grant
    Filed: January 24, 2007
    Date of Patent: September 15, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Curtis M. Gearhart, Christopher Meyer, Linwood H. Overby, Jr., David J. Wierbowski
  • Patent number: 9021250
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to security function processing of encrypted data in a security enforcement point and provide a method, system and computer program product for security enforcement point inspection of a traversing encrypted data in a secure, end-to-end communications path. In an embodiment of the invention, a method for security enforcement point inspection of encrypted data in a secure, end-to-end communications path can be provided. The method can include establishing a persistent secure session with a key server holding an SA for an end-to-end secure communications path between endpoints, receiving the SA for the end-to-end secure communications path over the persistent secure session, decrypting an encrypted payload for the end-to-end secure communications path using session key data in the SA, and performing a security function on the decrypted payload.
    Type: Grant
    Filed: April 22, 2007
    Date of Patent: April 28, 2015
    Assignee: International Business Machines Corporation
    Inventor: Linwood H. Overby, Jr.
  • Patent number: 8972475
    Abstract: Secure communications are provided over a network in a distributed workload environment having target hosts which are accessed through a distribution processor by a common network address. Secure communications are provided by routing both inbound and outbound communications with target hosts which are associated with a secure network communication through the distribution processor. Both inbound and outbound secure network communications are processed at the distribution processor so as to provide network security processing of communications from the target host and network security processing of communications to the target host.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: March 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: James Russell Godwin, David Anthony Herr, Linwood H. Overby, Jr.
  • Patent number: 8925081
    Abstract: Intrusion detection is performed by communicating an initialization request from an intrusion detection system enabled application to an intrusion module to begin intrusion detection. Also, a request is communicated to a policy transfer agent to provide an intrusion detection system policy specifically configured for the application. The application identifies where in the application code the intrusion detection system policy is to be checked against an incoming or outgoing communication. Information obtained by the application program is selectively evaluated against information in the intrusion detection system policy. A conditional response is made based upon information in the intrusion detection system policy if an intrusion associated with the application program is detected.
    Type: Grant
    Filed: May 11, 2012
    Date of Patent: December 30, 2014
    Assignee: International Business Machines Corporation
    Inventors: Lap T. Huynh, Linwood H. Overby, Jr.
  • Patent number: 8891550
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to network services protocol implementation configuration and provide a method, system and computer program product for platform independent configuration of multiple network services protocol implementations. In one embodiment of the invention, a method for configuring a network services protocol implementation can include configuring a platform independent configuration for a network services protocol implementation. Thereafter, a target node can be selected to receive a deployment of the network services protocol implementation and the configured platform independent configuration can be transformed into a platform specific configuration for the target node. Finally, the transformed platform specific configuration can be deployed onto the target node.
    Type: Grant
    Filed: February 15, 2006
    Date of Patent: November 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: Lap T. Huynh, Dinakaran Joseph, Linwood H. Overby, Jr., Mark T. Wright
  • Patent number: 8752162
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to security enforcement point operability in a TLS secured communications path and provide a novel and non-obvious method, system and computer program product for the secure sharing of TLS session keys with trusted enforcement points. In one embodiment of the invention, a method for securely sharing TLS session keys with trusted enforcement points can be provided. The method can include conducting a TLS handshake with a TLS client to extract and decrypt a session key for a TLS session with the TLS client traversing at least one security enforcement point. The method further can include providing the session key to a communicatively coupled key server for distribution to the at least one security enforcement point. Finally, the method can include engaging in secure communications with the TLS client over the TLS session.
    Type: Grant
    Filed: June 11, 2011
    Date of Patent: June 10, 2014
    Assignee: International Business Machines Corporation
    Inventors: David G. Kuehr-McLaren, Linwood H. Overby, Jr.
  • Patent number: 8539548
    Abstract: A hierarchical administrative system centrally controls configuration of network security policy for a group of information handling systems (IHSs) by multiple tier levels of administration. The highest tier level of administration builds policies that fulfill IT security policy intent. Higher level administrators may scope subordinate administrators to a group of IHSs or a single IHS. Higher level administrators may allow subordinate administrators to perform system specific customization of the policy based on permissions that the higher level administrator grants. Customization may include completing partially-built rule conditions with IP address and port, completing partially-built rule actions, and adding or deleting rules based on IHS unique applications or security requirements. A security enforcement tool may enforce customizations of network security policy.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: September 17, 2013
    Assignee: International Business Machines Corporation
    Inventors: Linwood H. Overby, Jr., Kimberly T. Bailey, Jeffrey B. Cates, Mark T. Wright
  • Patent number: 8458768
    Abstract: Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.
    Type: Grant
    Filed: May 19, 2011
    Date of Patent: June 4, 2013
    Assignee: International Business Machines Corporation
    Inventors: Roy F. Brabson, Barry Mosakowski, Linwood H. Overby, Jr.