Patents by Inventor Mark Duane Seaborn

Mark Duane Seaborn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11863669
    Abstract: Session resumption for cryptographic communications is provided. Session data and encrypted early data are received from a client. A key is derived using the session data and a one-time pad. The early data is decrypted using the derived key.
    Type: Grant
    Filed: March 28, 2022
    Date of Patent: January 2, 2024
    Assignee: International Business Machines Corporation
    Inventor: Mark Duane Seaborn
  • Publication number: 20230308271
    Abstract: Session resumption for cryptographic communications is provided. Session data and encrypted early data are received from a client. A key is derived using the session data and a one-time pad. The early data is decrypted using the derived key.
    Type: Application
    Filed: March 28, 2022
    Publication date: September 28, 2023
    Inventor: Mark Duane Seaborn
  • Patent number: 11750397
    Abstract: Resource user authentication and authorization is provided. An authentication code is generated based on using a retrieved attribute-based encryption user key as a secret key for a keyed-hash message authentication code digital signature over a set of header fields of a protected resource access request received from a client device of a resource user via a network. The generated authentication code is compared with an authentication code read within an embedded header field of the protected resource access request. It is determined whether a match exists between the generated authentication code and the authentication code read within the embedded header field. In response to determining that a match does exist, the resource user is authenticated. Decryption of an encrypted protected resource corresponding to the protected resource access request is performed using the retrieved attribute-based encryption user key corresponding to the resource user in response to authentication of the resource user.
    Type: Grant
    Filed: January 4, 2021
    Date of Patent: September 5, 2023
    Assignee: International Business Machines Corporation
    Inventor: Mark Duane Seaborn
  • Publication number: 20230179634
    Abstract: A computer-implemented method for secure policy distribution to a cloud system. The method includes defining an access policy for a set of resources on a cloud computing system, where the access policy includes rules to allow access to the set of resources. The method further includes creating, based on the access policy, an activation function and attribute metadata in the cloud computing system, where the attribute metadata includes a set of access attributes for each resource of the set of resources. The method also includes, receiving a request to access a first resource of the set of resources, where the request includes a set of credentials. The method includes comparing, by the activation function, the set of credentials to the set of access attributes. The method further includes processing, based on the comparing, the request the access the first resource.
    Type: Application
    Filed: December 2, 2021
    Publication date: June 8, 2023
    Inventor: Mark Duane Seaborn
  • Patent number: 11558399
    Abstract: A data packet transits through a series of network nodes (a series of intermediate hops) while being transmitted from a source node to a destination node. A network node (router, gateway, server, or any network device) that handles the data packet, adds new information to the file header of the data packet. The new header information identifies the previous and next network nodes in the transmission path. The network node further validates information provided by a previous node, and generates further new header information that attests as to the validity of the information provided by the previous node. The network node secures and signs the new information cryptographically, and adds the new information to the file header. If a malicious actor attempts to tamper with the data packet, or routing thereof, the secured header information renders such tampering discoverable, enabling performance of a responsive action.
    Type: Grant
    Filed: September 30, 2019
    Date of Patent: January 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Mark Duane Seaborn, Amit Lamba, Jason Resch
  • Patent number: 11418327
    Abstract: A key management service creates a key upon user request. The key management service receives a request for a first cryptographic operation. The key management service performs the first cryptographic operation. The key management service returns results of the first cryptographic operation to a dependent service. The key management service receives a notification of key rotation. The key management service receives a request for a second cryptographic operation. The key management service performs the second cryptographic operation. The key management service returns results of the second cryptographic operation to the dependent service. The key management service returns updated key metadata to the dependent service.
    Type: Grant
    Filed: November 14, 2019
    Date of Patent: August 16, 2022
    Assignee: International Business Machines Corporation
    Inventors: Mark Duane Seaborn, Karunakar Bojjireddy, Erlander Lo
  • Publication number: 20220217000
    Abstract: Resource user authentication and authorization is provided. An authentication code is generated based on using a retrieved attribute-based encryption user key as a secret key for a keyed-hash message authentication code digital signature over a set of header fields of a protected resource access request received from a client device of a resource user via a network. The generated authentication code is compared with an authentication code read within an embedded header field of the protected resource access request. It is determined whether a match exists between the generated authentication code and the authentication code read within the embedded header field. In response to determining that a match does exist, the resource user is authenticated. Decryption of an encrypted protected resource corresponding to the protected resource access request is performed using the retrieved attribute-based encryption user key corresponding to the resource user in response to authentication of the resource user.
    Type: Application
    Filed: January 4, 2021
    Publication date: July 7, 2022
    Inventor: Mark Duane Seaborn
  • Publication number: 20210152336
    Abstract: A key management service creates a key upon user request. The key management service receives a request for a first cryptographic operation. The key management service performs the first cryptographic operation. The key management service returns results of the first cryptographic operation to a dependent service. The key management service receives a notification of key rotation. The key management service receives a request for a second cryptographic operation. The key management service performs the second cryptographic operation. The key management service returns results of the second cryptographic operation to the dependent service. The key management service returns updated key metadata to the dependent service.
    Type: Application
    Filed: November 14, 2019
    Publication date: May 20, 2021
    Inventors: Mark Duane Seaborn, Karunakar Bojjireddy, Erlander Lo
  • Publication number: 20210099464
    Abstract: A data packet transits through a series of network nodes (a series of intermediate hops) while being transmitted from a source node to a destination node. A network node (router, gateway, server, or any network device) that handles the data packet, adds new information to the file header of the data packet. The new header information identifies the previous and next network nodes in the transmission path. The network node further validates information provided by a previous node, and generates further new header information that attests as to the validity of the information provided by the previous node. The network node secures and signs the new information cryptographically, and adds the new information to the file header. If a malicious actor attempts to tamper with the data packet, or routing thereof, the secured header information renders such tampering discoverable, enabling performance of a responsive action.
    Type: Application
    Filed: September 30, 2019
    Publication date: April 1, 2021
    Inventors: Mark Duane Seaborn, Amit Lamba, Jason Resch