Patents by Inventor Michael AMISANO

Michael AMISANO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10904754
    Abstract: Systems for cellular network authentication utilizing unlinkable anonymous credentials are disclosed. In embodiments, a computer program product is provided including a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computing device to cause the computing device to: contact a mobile device network with a request to connect to the mobile device network; conduct an interactive credential issuance protocol with an Issuer of the mobile device network to generate an unlinkable anonymous credential; connect to the mobile device network based on a Verifier of the mobile device network verifying the computing device based on the unlinkable anonymous credential; and store a temporary mobile subscriber identity assigned to the mobile device by the mobile device network, wherein the temporary mobile subscriber identity is filled with a null value.
    Type: Grant
    Filed: November 28, 2018
    Date of Patent: January 26, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jeb R. Linton, Michael Amisano, John Melchionne, Dennis Kramer, David K. Wright, John Behnken
  • Publication number: 20200401715
    Abstract: A first request to perform an entity resolution operation is received from a first client. The first request is related to a first record uploaded by the first client. The first record has one or more first attributes. The first record is stored in a secure data store. The first request is transmitted to a first program split of a secure multi-party computation. An entity resolution operation is performed by the first program split of the secure multi-party computation and by a third program split of the secure multi-party computation. The entity resolution operation is performed based on the received request. The entity resolution operation is related to the first record and one or more second records uploaded to the secure data store by a second client. The third program split of the secure multi-party computation operates in the secure data store.
    Type: Application
    Filed: June 24, 2019
    Publication date: December 24, 2020
    Inventors: Jeb R. Linton, Dennis Kramer, Michael Amisano, John Melchionne
  • Publication number: 20200195618
    Abstract: A method, apparatus and computer program product to detect whether specific sensitive data of a client is present in a cloud computing infrastructure is implemented without requiring that data be shared with the cloud provider, or that the cloud provider provide the client access to all data in the cloud. Instead of requiring the client to share its database of sensitive information, preferably the client executes a tool that uses a cryptographic protocol, namely, Private Set Intersection (PSI), to enable the client to detect whether their sensitive information is present on the cloud. Any such information identified by the tool is then used to label a document or utterance, send an alert, and/or redact or tokenize the sensitive data.
    Type: Application
    Filed: December 18, 2018
    Publication date: June 18, 2020
    Applicant: International Business Machines Corporation
    Inventors: Jeb R. Linton, John Behnken, John Melchionne, Dennis Kramer, Michael Amisano, Michael T. Fiori
  • Publication number: 20200175205
    Abstract: Methods for secure data monitoring utilizing secure private set intersections are disclosed. In embodiments, a computer-implemented method includes: generating a garbled circuit program compiled into a first and second half; sending the second half of the garbled circuit program to a client server of a client; receiving social network data from a social network provider; and generating search results, utilizing the first half of the garbled circuit program in cooperation with the second half of the garbled circuit program, based on client data input at the second half of the garbled circuit program. The client data is private with respect to the social network provider and the social network data is private with respect to the client.
    Type: Application
    Filed: July 12, 2019
    Publication date: June 4, 2020
    Inventors: Dennis KRAMER, Jeb R. LINTON, Michael AMISANO, David K. WRIGHT, John MELCHIONNE, John BEHNKEN
  • Publication number: 20200175201
    Abstract: Systems for secure data monitoring utilizing secure private set intersections are disclosed. In embodiments, program instructions are executable by a computing device to cause the computing device to: generate a garbled circuit program compiled into a first half and a second half; send the second half of the garbled circuit program to a client server of a client; receive social network data from a social network provider; index, utilizing the first half of the garbled circuit program in cooperation with the second half of the garbled circuit program at the client server, the social network data based on predetermined intent categories; and generate search results, utilizing the first half of the garbled circuit program in cooperation with the second half of the garbled circuit program at the client server, based on client data at the second half of the garbled circuit program.
    Type: Application
    Filed: November 29, 2018
    Publication date: June 4, 2020
    Inventors: Dennis KRAMER, Jeb R. LINTON, Michael AMISANO, David K. WRIGHT, John MELCHIONNE, John BEHNKEN
  • Publication number: 20200169881
    Abstract: Methods for cellular network authentication utilizing unlinkable anonymous credentials are disclosed. In embodiments, a method includes: contacting, by a computing device, a mobile device network with a request to connect to the mobile device network; conducting, by the computing device, an interactive credential issuance protocol with an Issuer of the mobile device network to generate an unlinkable anonymous credential; and connecting, by the computing device, to the mobile device network based on a Verifier of the mobile device network verifying the computing device based on the unlinkable anonymous credential.
    Type: Application
    Filed: July 12, 2019
    Publication date: May 28, 2020
    Inventors: Jeb R. LINTON, Michael AMISANO, John MELCHIONNE, Dennis KRAMER, David K. WRIGHT, John BEHNKEN
  • Publication number: 20200169879
    Abstract: Systems for cellular network authentication utilizing unlinkable anonymous credentials are disclosed In embodiments, a computer program product is provided including a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computing device to cause the computing device to: contact a mobile device network with a request to connect to the mobile device network; conduct an interactive credential issuance protocol with an Issuer of the mobile device network to generate an unlinkable anonymous credential; connect to the mobile device network based on a Verifier of the mobile device network verifying the computing device based on the unlinkable anonymous credential; and store a temporary mobile subscriber identity assigned to the mobile device by the mobile device network, wherein the temporary mobile subscriber identity is filled with a null value.
    Type: Application
    Filed: November 28, 2018
    Publication date: May 28, 2020
    Inventors: Jeb R. LINTON, Michael AMISANO, John MELCHIONNE, Dennis KRAMER, David K. WRIGHT, John BEHNKEN
  • Patent number: 10560844
    Abstract: In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to limit functionality of a remote controlled device during periods of time that a user of the remote controlled device is not authenticated, and to receive identity information of the user of the remote controlled device via an authentication process, with the identity information establishing an identity of the user. Also, the logic is configured to cause the processing circuit to authenticate the user prior to allowing full functionality of the remote controlled device, send an indication of the identity of the user to the remote controlled device, and provide full functionality of the remote controlled device to the user in response to successfully authenticating the user.
    Type: Grant
    Filed: March 15, 2017
    Date of Patent: February 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John Melchionne, David K. Wright
  • Publication number: 20190378599
    Abstract: A method for implementing a secure system to prevent adverse drug interactions and repeat prescriptions, for a patient, in a multi-party computing environment. The method includes receiving a patient identifier from a provider, authenticating an access by the provider, and retrieving a second patient identifier, wherein the second patient identifier corresponds to the received patient identifier, wherein the received patient identifier and the second patient identifier are different. The method further includes receiving an input from the provider that corresponds to the patient identifier, and accessing a database that contains a stored private ID, wherein the stored private ID is a combination of the received patient identifier and the retrieved second patient identifier, and wherein the database includes data relating to the patient. The method includes searching the database to obtain a search result based on the received input from the provider, and transmitting the search result to the provider.
    Type: Application
    Filed: June 8, 2018
    Publication date: December 12, 2019
    Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John L. Melchionne, David K. Wright
  • Publication number: 20190373468
    Abstract: In one embodiment, a method includes limiting functionality of a remote controlled device during a first period of time where a user of the remote controlled device is not authenticated, receiving, from a separate authentication device, identity information of the user of the remote controlled device and information of the remote controlled device via an authentication process, authenticating the user prior to allowing full functionality of the remote controlled device, sending an indication of the identity of the user to the remote controlled device; and in response to determining during the authenticating that the user is verified as a trainee for the remote controlled device, enabling a trainer/trainee setting that allows a trainer to provide control of the remote controlled device to the trainee without functionality of the remote controlled device being limited.
    Type: Application
    Filed: August 19, 2019
    Publication date: December 5, 2019
    Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John Melchionne, David K. Wright
  • Publication number: 20180270657
    Abstract: In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to limit functionality of a remote controlled device during periods of time that a user of the remote controlled device is not authenticated, and to receive identity information of the user of the remote controlled device via an authentication process, with the identity information establishing an identity of the user. Also, the logic is configured to cause the processing circuit to authenticate the user prior to allowing full functionality of the remote controlled device, send an indication of the identity of the user to the remote controlled device, and provide full functionality of the remote controlled device to the user in response to successfully authenticating the user.
    Type: Application
    Filed: March 15, 2017
    Publication date: September 20, 2018
    Inventors: Michael A. Amisano, John F. Behnken, Jeb R. Linton, John Melchionne, David K. Wright