Patents by Inventor Linwood Overby

Linwood Overby has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190132304
    Abstract: A user can authenticate with multiple factors to a security appliance and establish an authenticated connection with a TN3270 client to a TN3270 server on a first mainframe via the security appliance as a proxy. The security appliance records the port number of the proxied connection and associates the port number with the user identifier, as well as an indication that MFA was performed successfully. After an SNA session is established with a second mainframe that hosts the SNA application to be accessed, a security macro can resolve a logical unit name of the TN3270 client to the IP address of the security appliance and port number of the proxied connection. The second mainframe can send a request via a web interface to the IP address for verification that the MFA requirement was satisfied for the user identifier associated with the SNA session.
    Type: Application
    Filed: November 1, 2017
    Publication date: May 2, 2019
    Inventors: Linwood Overby, Frederic Armand Honore Duminy, Ronald James Colmone, Brian Michael Emond, Scott Andrew Fagen, Sai Swetha Gujja
  • Patent number: 8458763
    Abstract: A computer-implemented method of enabling security in network resources provisioned as part of a service landscape instance is provided. The method includes initiating an orchestration process for creating a landscape service instance to provide services to a service subscriber over a data communications network. The method further includes deriving from the orchestration process at least one parameter, and generating at least one security configuration profile based upon the at least one parameter for at least one system of the landscape service instance.
    Type: Grant
    Filed: July 1, 2008
    Date of Patent: June 4, 2013
    Assignee: International Business Machines Corporation
    Inventors: Sivaram Gottimukkala, Lap Huynh, Dinakaran Joseph, Michael Law, Linwood Overby, Jr., Wesley Devine, Michael Behrendt, Gerd Breiter
  • Patent number: 8424053
    Abstract: A computer-implemented method is provided for updating network security policy rules when network resources are provisioned in a service landscape instance. The method includes categorizing network resources in a service landscape instance based on a service landscape model. The method further includes responding to the provisioning of a network resource by automatically generating one or more security policy rules for a newly-provisioned network resource. Additionally, the method includes updating security policy rules of pre-existing network resources in the service landscape instance that are determined to be eligible to communicate with the newly-provisioned network resource so as to include the newly-provisioned network resource as a remote resource based on the service landscape model.
    Type: Grant
    Filed: July 1, 2008
    Date of Patent: April 16, 2013
    Assignee: International Business Machines Corporation
    Inventors: Sivaram Gottimukkala, Lap Huynh, Dinakaran Joseph, Linwood Overby, Jr., Wesley Devine, Michael Behrendt, Gerd Breiter
  • Publication number: 20100005504
    Abstract: A computer-implemented method of enabling security in network resources provisioned as part of a service landscape instance is provided. The method includes initiating an orchestration process for creating a landscape service instance to provide services to a service subscriber over a data communications network. The method further includes deriving from the orchestration process at least one parameter, and generating at least one security configuration profile based upon the at least one parameter for at least one system of the landscape service instance.
    Type: Application
    Filed: July 1, 2008
    Publication date: January 7, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sivaram Gottimukkala, Lap Huynh, Dinakaran Joseph, Michael Law, Linwood Overby, JR., Wesley Devine, Michael Behrendt, Gerd Breiter
  • Publication number: 20100005505
    Abstract: A computer-implemented method is provided for updating network security policy rules when network resources are provisioned in a service landscape instance. The method includes categorizing network resources in a service landscape instance based on a service landscape model. The method further includes responding to the provisioning of a network resource by automatically generating one or more security policy rules for a newly-provisioned network resource. Additionally, the method includes updating security policy rules of pre-existing network resources in the service landscape instance that are determined to be eligible to communicate with the newly-provisioned network resource so as to include the newly-provisioned network resource as a remote resource based on the service landscape model.
    Type: Application
    Filed: July 1, 2008
    Publication date: January 7, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sivaram Gottimukkala, Lap Huynh, Dinakaran Joseph, Gerd Brieter, Linwood Overby, JR., Wesley Devine, Michael Behrendt
  • Publication number: 20080098126
    Abstract: Secure communications are provided over a network in a distributed workload environment having target hosts which are accessed through a distribution processor by a common network address. Secure communications are provided by routing both inbound and outbound communications with target hosts which are associated with a secure network communication through the distribution processor. Both inbound and outbound secure network communications are processed at the distribution processor so as to provide network security processing of communications from the target host and network security processing of communications to the target host.
    Type: Application
    Filed: December 21, 2007
    Publication date: April 24, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James Godwin, David Herr, Linwood Overby
  • Publication number: 20070245401
    Abstract: Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.
    Type: Application
    Filed: April 17, 2006
    Publication date: October 18, 2007
    Inventors: Roy Brabson, Barry Mosakowski, Linwood Overby
  • Publication number: 20070192848
    Abstract: The invention determines if a security association (SA) extends end-to-end between a source node originating a connection and a destination node. In such a case, there will be no ambiguities in routing due to network address translation, and the SA is allowed. In the preferred embodiment, both end nodes of a security connection test themselves and the remote node for gateway status to determine if any ambiguities might exist in network routing due to the presence of a network address translator.
    Type: Application
    Filed: February 14, 2006
    Publication date: August 16, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Wuchieh Jong, Linwood Overby, Joyce Porter, David Wierbowski
  • Publication number: 20070192447
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to network services protocol implementation configuration and provide a method, system and computer program product for platform independent configuration of multiple network services protocol implementations. In one embodiment of the invention, a method for configuring a network services protocol implementation can include configuring a platform independent configuration for a network services protocol implementation. Thereafter, a target node can be selected to receive a deployment of the network services protocol implementation and the configured platform independent configuration can be transformed into a platform specific configuration for the target node. Finally, the transformed platform specific configuration can be deployed onto the target node.
    Type: Application
    Filed: February 15, 2006
    Publication date: August 16, 2007
    Applicant: International Business Machines Corporation
    Inventors: Lap Huynh, Dinakaran Joseph, Linwood Overby, Mark Wright
  • Publication number: 20070189307
    Abstract: A method, system and computer program product for predictively configuring a security services protocol implementation can be provided. The method can include providing a set of network topology descriptions and determining a selection of one of the network topology descriptions. The method further can include identifying configuration settings corresponding to the selection and applying the configuration settings to the security services protocol implementation. For instance, applying the configuration settings to the security services protocol implementation can include selecting encapsulation mode and routing settings for the security services protocol implementation.
    Type: Application
    Filed: February 15, 2006
    Publication date: August 16, 2007
    Applicant: International Business Machines Corporation
    Inventors: Linwood Overby, Mark Wright
  • Publication number: 20070073879
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to secure communications for multiple hosts in an address translation environment and provide a method, system and computer program product for IPsec SA management for multiple clients sharing a single network address. In one embodiment, a computer implemented method for IPsec SA management for multiple hosts sharing a single network address can include receiving a packet for IPsec processing for a specified client among the multiple clients sharing the single network address. A dynamic SA can be located among multiple dynamic SAs for the specified client using client identifying information exclusive of a 5-tuple produced for the dynamic SA. Finally, IPsec processing can be performed for the packet.
    Type: Application
    Filed: September 29, 2005
    Publication date: March 29, 2007
    Applicant: International Business Machines Corporation
    Inventors: Linwood Overby, Joyce Porter, David Wierbowski
  • Publication number: 20060227770
    Abstract: Preventing duplicate sources on a protocol connection that uses network addresses, protocols and port numbers to identify connections that include port number translation. In response to an inbound IPsec packet from a remote source client, a determination is made as to whether or not a port number is available within a range of port numbers that comply with a security association governing the connection. If so, an available port number is assigned to the connection, thereby avoiding a possibility of a duplicate source. If a port number is not available, the packet is rejected.
    Type: Application
    Filed: April 11, 2005
    Publication date: October 12, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Patricia Jakubik, Linwood Overby, Joyce Porter, David Wierbowski
  • Publication number: 20060227807
    Abstract: Preventing duplicate sources on a protocol connection that uses network addresses, protocols and port numbers to identify source applications that are served by a NAPT. If an arriving packet encapsulates an encrypted packet and has passed through an NAPT en route to the destination host, the encapsulated packet is decrypted to obtain an original source port number and original packet protocol from the decrypted packet. A source port mapping table (SPMT) is searched for an association between the NAPT source address, the original source port, and the original packet protocol associated with the NAPT source address and port number. If an incorrect association is found, the packet is rejected as representing an illegal duplicate source; that is, a second packet from a different host served by a NAPT that is USING the same SOURCE port and protocol.
    Type: Application
    Filed: April 11, 2005
    Publication date: October 12, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Patricia Jakubik, Linwood Overby Jr., Joyce Porter, David Wierbowski
  • Publication number: 20050066193
    Abstract: A computer selectively responds to at least one notification of an intrusion from a network-accessible intrusion detection service (IDS) manager. The computer selectively responds to the intrusion notification based on local IDS policy that includes information related to the computer. The information related to the computer may be based on whether the computer is a server of information for other computers in the computer system, whether the computer is protected by a firewall from a source of the intrusion, proximity of the computer to a source of the intrusion, memory utilization in the computer, and/or processor utilization in the computer.
    Type: Application
    Filed: September 22, 2003
    Publication date: March 24, 2005
    Inventor: Linwood Overby
  • Publication number: 20050010817
    Abstract: The invention detects a denial of service attack at a node by monitoring the number of discarded packets in relationship to the number of inbound packets. When an attack is detected, relevant inbound packet information is collected during the attack to help characterize the attack and at least to pinpoint the source of the last hop to the attacked node.
    Type: Application
    Filed: July 8, 2003
    Publication date: January 13, 2005
    Applicant: International Business Machines Corporation
    Inventors: Patricia Jakubik, Patrick LiVecchi, Linwood Overby,