Patents by Inventor Mark A. McGloin
Mark A. McGloin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11050573Abstract: Embodiments of the present invention include determining whether a cryptographic certificate can be trusted. A cryptographic certificate is received at a client device. The client device performs a first check on a first set of attributes of the cryptographic certificate. In addition, the client device sends the cryptographic certificate to a central verification server, which performs a second check on a second set of attributes of the cryptographic certificate. In the case that the first set of attributes passes the first check, and the second set of attributes passes the second check, the client device determines that the cryptographic certificate can be trusted.Type: GrantFiled: September 5, 2019Date of Patent: June 29, 2021Assignee: International Business Machines CorporationInventors: David S. Kern, Juan G. Lara, Mark A. McGloin, Olgierd S. Pieczul
-
Patent number: 11050783Abstract: A malware detection method for detecting client participation in malware activity, in respect of a target subjected to a given attack by a client system, which is operable to run a given host application is disclosed a given security service provider is configured, which is operably coupled to the client system, to make accessible given attack information that is reported by a given attack target. An attack status query is transmitted to the security service provider from an agent that is operably coupled to the client system. In response to receiving the attack status query, the security service provider is configured to send attack information reported in respect of a given attack target to the agent, and configuring the agent to diagnose whether its corresponding client system potentially comprises an attack source of the given attack subjected on the attack target, on a basis of the received attack information.Type: GrantFiled: January 31, 2018Date of Patent: June 29, 2021Assignee: International Business Machines CorporationInventors: Mark A. McGloin, Olgierd S. Pieczul, Kamil Stepinski
-
Patent number: 10761837Abstract: Embodiments of the present invention provide systems and methods for self-certification by a developer that the software components used during development are used in a secure manner, through the use of annotations. Input and return conditions are defined in an annotation for the software components of a system. The input and return conditions are compared for a match and a warning is generated when the input and return conditions do not match.Type: GrantFiled: April 28, 2016Date of Patent: September 1, 2020Assignee: International Business Machines CorporationInventors: Brendan P. Arthurs, Mark A. McGloin, Andrew T. Penrose, Olgierd S. Pieczul
-
Patent number: 10754644Abstract: Embodiments of the present invention provide systems and methods for self-certification by a developer that the software components used during development are used in a secure manner, through the use of annotations. Input and return conditions are defined in an annotation for the software components of a system. The input and return conditions are compared for a match and a warning is generated when the input and return conditions do not match.Type: GrantFiled: August 4, 2015Date of Patent: August 25, 2020Assignee: International Business Machines CorporationInventors: Brendan P. Arthurs, Mark A. McGloin, Andrew T. Penrose, Olgierd S. Pieczul
-
Patent number: 10673893Abstract: A method and associated systems for isolating a source of an attack that originates from a shared computing environment. A computer-security system tags outgoing packets originating from within the shared computing environment in a tamper-proof manner in order to identify which tenant of the shared environment is the true source of each packet. If one of those tenants transmits malicious packets to an external recipient, either because the tenant has malicious intent or becomes infected with malware, the transmitted malicious packets' tags allow the recipient to determine which tenant is the source of the unwanted transmissions. The recipient may then block further communications from the problematic tenant without blocking communications from other tenants of the shared environment.Type: GrantFiled: August 31, 2016Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Juan G. Lara, Mark A. McGloin, Olgierd S. Pieczul, Ralph L. Topete
-
Publication number: 20200052909Abstract: Embodiments of the present invention include determining whether a cryptographic certificate can be trusted. A cryptographic certificate is received at a client device. The client device performs a first check on a first set of attributes of the cryptographic certificate. In addition, the client device sends the cryptographic certificate to a central verification server, which performs a second check on a second set of attributes of the cryptographic certificate. In the case that the first set of attributes passes the first check, and the second set of attributes passes the second check, the client device determines that the cryptographic certificate can be trusted.Type: ApplicationFiled: September 5, 2019Publication date: February 13, 2020Inventors: David S. Kern, Juan G. Lara, MARK A. MCGLOIN, OLGIERD S. PIECZUL
-
Patent number: 10447485Abstract: Embodiments of the present invention include determining whether a cryptographic certificate can be trusted. A cryptographic certificate is received at a client device. The client device performs a first check on a first set of attributes of the cryptographic certificate. In addition, the client device sends the cryptographic certificate to a central verification server, which performs a second check on a second set of attributes of the cryptographic certificate. In the case that the first set of attributes passes the first check, and the second set of attributes passes the second check, the client device determines that the cryptographic certificate can be trusted.Type: GrantFiled: November 5, 2015Date of Patent: October 15, 2019Assignee: International Business Machines CorporationInventors: David S. Kern, Juan G. Lara, Mark A. McGloin, Olgierd S. Pieczul
-
Publication number: 20190238561Abstract: A malware detection method for detecting client participation in malware activity, in respect of a target subjected to a given attack by a client system, which is operable to run a given host application is disclosed a given security service provider is configured, which is operably coupled to the client system, to make accessible given attack information that is reported by a given attack target. An attack status query is transmitted to the security service provider from an agent that is operably coupled to the client system. In response to receiving the attack status query, the security service provider is configured to send attack information reported in respect of a given attack target to the agent, and configuring the agent to diagnose whether its corresponding client system potentially comprises an attack source of the given attack subjected on the attack target, on a basis of the received attack information.Type: ApplicationFiled: January 31, 2018Publication date: August 1, 2019Inventors: Mark A. McGloin, Olgierd S. Pieczul, Kamil Stepinski
-
Publication number: 20180063199Abstract: A method and associated systems for isolating a source of an attack that originates from a shared computing environment. A computer-security system tags outgoing packets originating from within the shared computing environment in a tamper-proof manner in order to identify which tenant of the shared environment is the true source of each packet. If one of those tenants transmits malicious packets to an external recipient, either because the tenant has malicious intent or becomes infected with malware, the transmitted malicious packets' tags allow the recipient to determine which tenant is the source of the unwanted transmissions. The recipient may then block further communications from the problematic tenant without blocking communications from other tenants of the shared environment.Type: ApplicationFiled: August 31, 2016Publication date: March 1, 2018Inventors: Juan G. Lara, Mark A. McGloin, Olgierd S. Pieczul, Ralph L. Topete
-
Publication number: 20170134173Abstract: Embodiments of the present invention include determining whether a cryptographic certificate can be trusted. A cryptographic certificate is received at a client device. The client device performs a first check on a first set of attributes of the cryptographic certificate. In addition, the client device sends the cryptographic certificate to a central verification server, which performs a second check on a second set of attributes of the cryptographic certificate. In the case that the first set of attributes passes the first check, and the second set of attributes passes the second check, the client device determines that the cryptographic certificate can be trusted.Type: ApplicationFiled: November 5, 2015Publication date: May 11, 2017Inventors: David S. Kern, Juan G. Lara, Mark A. McGloin, Olgierd S. Pieczul
-
Publication number: 20170039064Abstract: Embodiments of the present invention provide systems and methods for self-certification by a developer that the software components used during development are used in a secure manner, through the use of annotations. Input and return conditions are defined in an annotation for the software components of a system. The input and return conditions are compared for a match and a warning is generated when the input and return conditions do not match.Type: ApplicationFiled: August 4, 2015Publication date: February 9, 2017Inventors: Brendan P. Arthurs, Mark A. McGloin, Andrew T. Penrose, Olgierd S. Pieczul
-
Publication number: 20170039065Abstract: Embodiments of the present invention provide systems and methods for self-certification by a developer that the software components used during development are used in a secure manner, through the use of annotations. Input and return conditions are defined in an annotation for the software components of a system. The input and return conditions are compared for a match and a warning is generated when the input and return conditions do not match.Type: ApplicationFiled: April 28, 2016Publication date: February 9, 2017Inventors: Brendan P. Arthurs, Mark A. McGloin, Andrew T. Penrose, Olgierd S. Pieczul
-
Patent number: 9514294Abstract: A method, and an associated computer system and computer program product. A login request is received from a user, to log into a computing resource, wherein the login request includes a password and a user identifier of the user. The received password is compared with a stored password to determine whether to grant access to the computing resource. Responsive to determining that the received password does not match the stored password, an authenticity of the login request is determined, based on one or more characteristics of the user and/or one or more checks performed against the received password. A score is calculated based on the determined authenticity of the login request. The login request is denied. Based on the calculated score, it is decided whether to lock the user and deny the user further access to the computing resource.Type: GrantFiled: November 12, 2015Date of Patent: December 6, 2016Assignee: International Business Machines CorporationInventors: Brent A. Hepburn, Juan G. Lara, Mark A. McGloin, Olgierd S. Pieczul
-
Patent number: 9298896Abstract: A web application user is authenticated directly upon selecting a link in a notification email. In this approach, the user's web browser stores a first data string provided by the web application (e.g., in a cookie) during a prior session. The first data string encodes first data about the user that can be verified by the application. Later, the user receives the notification email that includes the link. The link encodes a second data string from which second data about the user can be verified by the application. When the end user selects the link, an authentication request is transmitted to the application. The authentication request includes both the first and second data strings. If both the first data and the second data (as obtained from their respective data strings) can be verified, the user is authenticated without having to perform any additional steps (e.g., manual entry of credentials).Type: GrantFiled: January 2, 2013Date of Patent: March 29, 2016Assignee: International Business Machines CorporationInventors: Olgierd S. Pieczul, Mark A. McGloin, Mary E. Zurko
-
Publication number: 20140189820Abstract: A web application user is authenticated directly upon selecting a link in a notification email. In this approach, the user's web browser stores a first data string provided by the web application (e.g., in a cookie) during a prior session. The first data string encodes first data about the user that can be verified by the application. Later, the user receives the notification email that includes the link. The link encodes a second data string from which second data about the user can be verified by the application. When the end user selects the link, an authentication request is transmitted to the application. The authentication request includes both the first and second data strings. If both the first data and the second data (as obtained from their respective data strings) can be verified, the user is authenticated without having to perform any additional steps (e.g., manual entry of credentials).Type: ApplicationFiled: January 2, 2013Publication date: July 3, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Olgierd S. Pieczul, Mark A. McGloin, Mary E. Zurko
-
Patent number: 8578448Abstract: A technique that identifies registered or guest users in web meetings. Registered and guest users are provided different forms of a meeting invite URL. A guest user receives a unique URL for the meeting that is generated with a nonce value associated with the user's contact information. The nonce value does not expose the contact information. To join the web meeting, each registered user follows a common web meeting link and authenticates. Information obtained during authentication is used to identify the registered user, whose identity is then displayed. Each guest user follows his or her unique URL to join the meeting. The web meeting service receives the nonce in the unique URL and maps it to the guest user's contact details. The service displays the guest user's contact details as the guest user's identity.Type: GrantFiled: October 26, 2012Date of Patent: November 5, 2013Assignee: International Business Machines CorporationInventors: Mark A. McGloin, Olgierd S. Pieczul, Mary E. Zurko