Patents by Inventor Mark Vandenwauver
Mark Vandenwauver has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8464311Abstract: A method is presented for processing data for a privacy policy concerning management of personally identifiable information. A proxy intercepts a first message from a server to a client and determines that the first message initiates collection of personally identifiable information from a user of the client. The proxy then sends a second message to the client that requests consent from the user to the privacy policy. If the user provides consent within a third message that is received by the proxy from the client, then the proxy sends the intercepted first message to the client. If the user does not provide consent, then the proxy sends a fourth message to the server that fails the collection of personally identifiable information from the client by the server. The proxy may also obtain user preferences for options concerning management of the personally identifiable information by a data processing system.Type: GrantFiled: October 28, 2004Date of Patent: June 11, 2013Assignee: International Business Machines CorporationInventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
-
Patent number: 8095658Abstract: A method, system, and computer program product is presented for providing access to a set of resources in a distributed data processing system. A reverse proxy server receives a resource request from a client and determines whether or not it is managing a session identifier that was previously associated with the client by the reverse proxy server; if so, it retrieves the session identifier, otherwise it obtains a session identifier and associates the session identifier with the client using information that is managed by the reverse proxy server. The reverse proxy server then modifies the resource request to include the session identifier and forwards the modified resource request to an application server.Type: GrantFiled: May 7, 2004Date of Patent: January 10, 2012Assignee: International Business Machines CorporationInventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
-
Patent number: 7921152Abstract: A method, system, apparatus, and computer program product are presented for processing cookies that are transmitted from a server through a proxy server to a client that is operated by a user. The proxy server detects that a response message from the server for the client has an associated cookie. The proxy server extracts a domain identifier associated with the server from the response message, and the proxy server retrieves a set of parameters that contain domain identifiers that are associated with indications of whether to block transmission of cookies from servers associated with the domain identifiers. The proxy server then processes the cookie in the response message in accordance with the retrieved set of parameters and the extracted domain identifier, either blocking or not blocking cookies from the identified domain. Blocked cookies are cached for subsequent use. Multiple sets of parameters may be configured by the user.Type: GrantFiled: July 17, 2003Date of Patent: April 5, 2011Assignee: International Business Machines CorporationInventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
-
Patent number: 7797726Abstract: A method is presented for enforcing a privacy policy concerning management of personally identifiable information in a centralized manner through a privacy proxy agent. A proxy intercepts a message from a first system to a second system, e.g., from a server to a client, and determines whether the message is associated with an operation on personally identifiable information; if not, then the proxy sends the message to the second system, but if so, then the proxy determines whether the operation on the personally identifiable information is compliant with a privacy policy and with user preference information with respect to the privacy policy for a user who is associated the personally identifiable information. If the message is compliant with the privacy policy and user preference data, then the proxy sends the first message to the second system; otherwise, an error indication is returned to the first system.Type: GrantFiled: December 16, 2004Date of Patent: September 14, 2010Assignee: International Business Machines CorporationInventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
-
Patent number: 7734642Abstract: This invention automates the selection of purpose usages when a user agent interacts with a web site that has been enabled for automated purpose usage information exchange. A user first configures the purpose usage automation in his or her user agent. At this stage, which typically occurs off-line, the user decides on a level of automation when specifying the one or more purpose usages. If desired, this preference may depend on how “trusted” the site is to the user. Later, when the user navigates to an organization's web site, the user agent communicates the purpose usage settings to the organization according to the level of purpose usage automation that has been configured. In particular, when a user's agent visits a web site, the user agent detects that “automated purpose usage” is enabled for the web site. The web site then provides the user agent with a list of one or more purpose usage options required or desired by the organization.Type: GrantFiled: April 24, 2007Date of Patent: June 8, 2010Assignee: International Business Machines CorporationInventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
-
Patent number: 7478434Abstract: When a user makes a request to access a protected resource identified by a URL, client-side code in a web browser is used to generate an authentication token, which is then sent to the server along with an identity cookie that was set by that server. The authenticated token is then used by the server to authenticate that the request is properly tied to a given identity contained in the identity cookie. If the authentication token can be validated at the server, an access control decision is then executed to determine whether to invoke the request for the protected resource. If the authentication token cannot be validated, an access denied request is returned to the requesting client.Type: GrantFiled: May 31, 2000Date of Patent: January 13, 2009Assignee: International Business Machines CorporationInventors: Heather Maria Hinton, Mark Vandenwauver
-
Publication number: 20080270802Abstract: The present invention provides a way to protect PII (or, more generally, any user “sensitive” information) throughout its life cycle in an organization. The techniques described herein ensure that a user's PII is protecting during storage, access or transfer of the data. Preferably, this objective is accomplished by associating given metadata with a given piece of PII and then storing the PII and metadata in a “privacy protecting envelope.” The given metadata includes, without limitation, the privacy policy that applies to the PII, as well as a set of one more purpose usages for the PII that the system has collected from an end user's user agent (e.g., a web browser), preferably in an automated manner. Preferably, the PII data, the privacy policy, and the user preferences (the purpose usages) are formatted in a structured document, such as XML.Type: ApplicationFiled: April 24, 2007Publication date: October 30, 2008Inventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
-
Publication number: 20080270414Abstract: This invention automates the selection of purpose usages when a user agent interacts with a web site that has been enabled for automated purpose usage information exchange. A user first configures the purpose usage automation in his or her user agent. At this stage, which typically occurs off-line, the user decides on a level of automation when specifying the one or more purpose usages. If desired, this preference may depend on how “trusted” the site is to the user. Later, when the user navigates to an organization's web site, the user agent communicates the purpose usage settings to the organization according to the level of purpose usage automation that has been configured. In particular, when a user's agent visits a web site, the user agent detects that “automated purpose usage” is enabled for the web site. The web site then provides the user agent with a list of one or more purpose usage options required or desired by the organization.Type: ApplicationFiled: April 24, 2007Publication date: October 30, 2008Inventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
-
Patent number: 7395424Abstract: A method is presented for performing authentication operations. When a client requests a resource from a server, a non-certificate-based authentication operation is performed through an SSL (Secure Sockets Layer) session between the server and the client. When the client requests another resource, the server determines to step up to a more restrictive level of authentication, and a certificate-based authentication operation is performed through the SSL session without exiting or renegotiating the SSL session prior to completion of the certificate-based authentication operation. During the certificate-based authentication procedure, an executable module is downloaded to the client from the server through the SSL session, after which the server receives through the SSL session a digital signature that has been generated by the executable module using a digital certificate at the client. In response to successfully verifying the digital signature at the server, the server provides access to a requested resource.Type: GrantFiled: July 17, 2003Date of Patent: July 1, 2008Assignee: International Business Machines CorporationInventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
-
Publication number: 20060136985Abstract: A method is presented for enforcing a privacy policy concerning management of personally identifiable information in a centralized manner through a privacy proxy agent. A proxy intercepts a message from a first system to a second system, e.g., from a server to a client, and determines whether the message is associated with an operation on personally identifiable information; if not, then the proxy sends the message to the second system, but if so, then the proxy determines whether the operation on the personally identifiable information is compliant with a privacy policy and with user preference information with respect to the privacy policy for a user who is associated the personally identifiable information. If the message is compliant with the privacy policy and user preference data, then the proxy sends the first message to the second system; otherwise, an error indication is returned to the first system.Type: ApplicationFiled: December 16, 2004Publication date: June 22, 2006Inventors: Paul Ashley, Sridhar Muppidi, Mark Vandenwauver
-
Publication number: 20060095956Abstract: A method is presented for processing data for a privacy policy concerning management of personally identifiable information. A proxy intercepts a first message from a server to a client and determines that the first message initiates collection of personally identifiable information from a user of the client. The proxy then sends a second message to the client that requests consent from the user to the privacy policy. If the user provides consent within a third message that is received by the proxy from the client, then the proxy sends the intercepted first message to the client. If the user does not provide consent, then the proxy sends a fourth message to the server that fails the collection of personally identifiable information from the client by the server. The proxy may also obtain user preferences for options concerning management of the personally identifiable information by a data processing system.Type: ApplicationFiled: October 28, 2004Publication date: May 4, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul Ashley, Sridhar Muppidi, Mark Vandenwauver
-
Publication number: 20060031442Abstract: A method, system, and computer program product is presented for providing access to a set of resources in a distributed data processing system. A reverse proxy server receives a resource request from a client and determines whether or not it is managing a session identifier that was previously associated with the client by the reverse proxy server; if so, it retrieves the session identifier, otherwise it obtains a session identifier and associates the session identifier with the client using information that is managed by the reverse proxy server. The reverse proxy server then modifies the resource request to include the session identifier and forwards the modified resource request to an application server.Type: ApplicationFiled: May 7, 2004Publication date: February 9, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul Ashley, Sridhar Muppidi, Mark Vandenwauver
-
Publication number: 20050015594Abstract: A method is presented for performing authentication operations. When a client requests a resource from a server, a non-certificate-based authentication operation is performed through an SSL (Secure Sockets Layer) session between the server and the client. When the client requests another resource, the server determines to step up to a more restrictive level of authentication, and a certificate-based authentication operation is performed through the SSL session without exiting or renegotiating the SSL session prior to completion of the certificate-based authentication operation. During the certificate-based authentication procedure, an executable module is downloaded to the client from the server through the SSL session, after which the server receives through the SSL session a digital signature that has been generated by the executable module using a digital certificate at the client. In response to successfully verifying the digital signature at the server, the server provides access to a requested resource.Type: ApplicationFiled: July 17, 2003Publication date: January 20, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul Ashley, Sridhar Muppidi, Mark Vandenwauver
-
Publication number: 20050015621Abstract: A method, system, and computer program product is presented for restricting access to a set of resources in a distributed data processing system. A server determines a set of authorized resources for which a user is authorized to access; the set of authorized resources is a subset of the set of resources that are operational within the distributed data processing system. An evaluation is made about the availability of the set of authorized resources based upon state information about the set of authorized resources. A list of a set of entitled resources for the user is then generated; the set of entitled resources is a subset of the set of authorized resources. An indication of the set of entitled resources may be sent to the user, after which the system would respond to requests for the user to access the set of entitled resources.Type: ApplicationFiled: July 17, 2003Publication date: January 20, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul Ashley, Sridhar Muppidi, Mark Vandenwauver
-
Publication number: 20050015429Abstract: A method, system, apparatus, and computer program product are presented for processing cookies that are transmitted from a server through a proxy server to a client that is operated by a user. The proxy server detects that a response message from the server for the client has an associated cookie. The proxy server extracts a domain identifier associated with the server from the response message, and the proxy server retrieves a set of parameters that contain domain identifiers that are associated with indications of whether to block transmission of cookies from servers associated with the domain identifiers. The proxy server then processes the cookie in the response message in accordance with the retrieved set of parameters and the extracted domain identifier, either blocking or not blocking cookies from the identified domain. Blocked cookies are cached for subsequent use. Multiple sets of parameters may be configured by the user.Type: ApplicationFiled: July 17, 2003Publication date: January 20, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul Ashley, Sridhar Muppidi, Mark Vandenwauver
-
Publication number: 20040186912Abstract: A method, system, apparatus, and computer program product are presented for transparently adding digital signature functionality to web servers in order to extend the web servers to generate and enforce signatures on transaction data on behalf of web applications that are processing transactions. A server plug-in intercepts transaction data that is submitted by a client to a web application. The plug-in returns a document containing the intercepted transaction data along with an applet that is executable at the client. When the applet is executed at the client, it generates a digital signature on the transaction data using a key that is stored at the client and returns a different document with the intercepted transaction data and with the newly generated signature. The plug-in validates the signature, records the signature in server-side log file, returns a signature receipt to the client, and forwards the transaction data to the destination web application.Type: ApplicationFiled: March 20, 2003Publication date: September 23, 2004Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nicholas George Harlow, Lawrence Wai Leung, Amy Lien McIntyre, Ivan Matthew Milman, Sridhar R. Muppidi, Bryan Thomas, Mark Vandenwauver