Patents by Inventor Marcia Lambert Peters
Marcia Lambert Peters has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8750705Abstract: A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping.Type: GrantFiled: June 22, 2011Date of Patent: June 10, 2014Assignee: International Business Machines CorporationInventors: Bruce Dickson, David Louis Kaminsky, Marcia Lambert Peters Stockton
-
Publication number: 20110249828Abstract: A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping.Type: ApplicationFiled: June 22, 2011Publication date: October 13, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bruce Dickson, David Louis Kaminsky, Marcia Lambert Peters
-
Patent number: 8015593Abstract: A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping.Type: GrantFiled: April 21, 2008Date of Patent: September 6, 2011Assignee: International Business Machines CorporationInventors: Bruce Dickson, David Louis Kaminsky, Marcia Lambert Peters Stockton
-
Patent number: 7899325Abstract: A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping.Type: GrantFiled: November 19, 2007Date of Patent: March 1, 2011Assignee: International Business Machines CorporationInventors: Bruce Dickson, David Louis Kaminsky, Marcia Lambert Peters Stockton
-
Publication number: 20090326732Abstract: A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping.Type: ApplicationFiled: April 21, 2008Publication date: December 31, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bruce Dickson, David Louis Kaminsky, Marcia Lambert Peters
-
Patent number: 7362973Abstract: A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping.Type: GrantFiled: September 15, 1999Date of Patent: April 22, 2008Assignee: International Business Machines CorporationInventors: Bruce Dickson, David Louis Kaminsky, Marcia Lambert Peters
-
Patent number: 7069452Abstract: Methods, systems and computer program products which provide secure updates of firmware (i.e. data stored in a programmable memory device of a processing system) are disclosed. Updates of a programmable memory of a device may be controlled by providing an update window of finite duration during which the programmable memory may be updated. Access to the programmable memory may be based on the state of an access latch. The access latch may be set to allow access after a hardware reset of the device. An update control program may be executed to control access to the programmable memory and the latch reset to prevent access upon completion of the update control program. Verification of the update may be provided through encryption techniques and rules incorporated in certificates for application of updates to provide for selectively updating devices. Also disclosed are methods of securely providing differing functionality to generic devices.Type: GrantFiled: July 12, 2000Date of Patent: June 27, 2006Assignee: International Business Machines CorporationInventors: John R. Hind, Marcia Lambert Peters
-
Patent number: 6980660Abstract: A method and system for enabling wireless devices distributed throughout an enterprise to be efficiently initialized for secure communications. The method and system utilize well known public key cryptography and machine unique identifiers to establish a secure channel and initialize the wireless devices.Type: GrantFiled: May 21, 1999Date of Patent: December 27, 2005Assignee: International Business Machines CorporationInventors: John Raithel Hind, Marcia Lambert Peters
-
Patent number: 6976163Abstract: Methods, systems, computer program products and business methods are provided which provide or utilize updates of firmware (i.e. data stored in a programmable memory device of a processing system) based on rules provided as extensions to certificates associated with an update. Such updates may be provided by obtaining an update image corresponding to the update of the programmable memory and obtaining a certificate associated with the update image, the certificate having update application rules in at least one extension of the certificate. The certificate may be provided as part of the update image. The update application rules are extracted from the extension of the certificate and the programmable memory selectively updated based on the update image and the update application rules extracted from the obtained certificate. Certificates for use in such firmware updates are also provided.Type: GrantFiled: July 12, 2000Date of Patent: December 13, 2005Assignee: International Business Machines CorporationInventors: John R. Hind, Marcia Lambert Peters
-
Patent number: 6886095Abstract: A method and system for efficiently establishing secure communications between mobile devices in a radio network. The present invention utilizes public key cryptography and unique hardware identifiers to enable authorizations for access to wireless networks, such as picocells. The present invention prevents the mobile user from maintaining a plurality of secrets such as user identifier/password pairs, PINs, or encryption keys, for access to each device to which he might require access.Type: GrantFiled: May 21, 1999Date of Patent: April 26, 2005Assignee: International Business Machines CorporationInventors: John Raithel Hind, Marcia Lambert Peters
-
Patent number: 6772331Abstract: A method and system for enabling wireless devices to be paired or permanently associated by a user or a network administrator. The method and system utilize well known public key cryptography and machine unique identifiers to establish a secure channel and associate the devices with eachother. This is extremely useful for associating a wireless headset with a telephone or associating a wireless mouse with a computer.Type: GrantFiled: May 21, 1999Date of Patent: August 3, 2004Assignee: International Business Machines CorporationInventors: John Raithel Hind, Marcia Lambert Peters
-
Patent number: 6480895Abstract: Objects including Java bytecodes are embedded in a 3270 datastream structured field. The 3270 datastream structured field, including the objects so embedded, are passed between a primary logical unit and a secondary logical unit that communicate with each other over a network using 3270 datastream architecture. An initialization protocol sends a Read Partition (Query) structured field from the primary logical unit to the secondary logical unit, to query whether the secondary logical unit supports Java. The secondary logical unit sends a Query Reply structured field to the primary logical unit in response to receipt of the Read Partition (Query) from the primary logical unit if the secondary logical unit supports Java. In response to receipt of the Query Reply structured field from the secondary logical unit, the 3270 datastream structured field including embedded objects such as Java bytecodes is passed between the primary logical unit and the secondary logical unit.Type: GrantFiled: May 6, 1998Date of Patent: November 12, 2002Assignee: International Business Machines CorporationInventors: James Peyton Gray, David Louis Kaminsky, James Merwin Mathewson, II, Marcia Lambert Peters, Richard Dean Telford
-
Patent number: 6327624Abstract: Java and other objects are integrated with legacy 3270 applications by sending 3270 datastream communications between a primary logical unit (LU) and a secondary LU over a network using 3270 datastream architecture and sending 3270 datastream structured fields including embedded objects such as Java bytecodes between the primary LU and the secondary LU over the network using 3270 datastream architecture. The sending of 3270 datastream communications and the sending of 3270 datastream structured fields are repeated in an arbitrary sequence, to thereby asynchronously send 3270 datastreams and objects such as Java bytecodes between the primary LU and the secondary LU over the network using 3270 datastream architecture. Thus, objects such as Java bytecodes are sent using the LU2 protocol in a manner that need not interfere with legacy communications between a 3270 application and an end user.Type: GrantFiled: May 6, 1998Date of Patent: December 4, 2001Assignee: International Business Machines Corp.Inventors: James Merwin Mathewson, II, Marcia Lambert Peters
-
Patent number: 6097727Abstract: A route selection system, method and computer program provides a complete end-to-end communications path between an origin node and a destination node in a relatively large communications network having a number of branch networks and at least one backbone network operationally connectable to the branch network. The origin node, the destination node, or both nodes, are located in branch networks and operationally connect to standard network nodes in the backbone network by way of a branch network node. The branch network nodes may be cascaded or in parallel. The branch network node modifies the communications path selected by the standard network node. The branch network node conceals the hop between the node in the branch and itself, identifies the direction of the hop as either an uplink or a downlink, identifies itself as the control point of the resource located in the corresponding node in the branch, and includes the concealed hop information in its own tail vectors which it adds to the route.Type: GrantFiled: April 29, 1997Date of Patent: August 1, 2000Assignee: International Business Machines CorporationInventor: Marcia Lambert Peters
-
Patent number: 6032175Abstract: Enhanced directory services for large and complex compound WAN/LAN networks includes the use of resource triplet identifications including the resource identification, the identification of the domain in which the resource resides, and the identification of the access node connecting the resource to the compound network. The creation and storage of these identification triplets are automatically initiated as new resources are added to the compound network. Features include the deliberate corruption or modification of triplet identifications to allow prior art directory services to access resources in foreign networks, and the use of these corrupted vectors (as well as the contents of the WAN network topology data base) to allow route selection regardless of the size or complexity of the WAN/LAN network.Type: GrantFiled: October 17, 1996Date of Patent: February 29, 2000Assignee: International Business Machines CorporationInventors: James Corvin Fletcher, Marcia Lambert Peters, John Hoon Shin