Patents by Inventor Patrick R. Wardrop

Patrick R. Wardrop has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11895094
    Abstract: The example embodiments are directed to a system and method for managing blockchain transaction processing. In an example, the method includes one or more of receiving a message transmitted from a client device, the message including a predefined structural format for processing by a service providing computing system, determining a type of the message and detecting one or more sensitive fields within the message based on the determined type of the message, anonymizing values of the one or more sensitive fields within the message while leaving the predefined structural format intact, and transmitting the anonymized message including the one or more anonymized values with the predefined structural format remaining intact to the service providing computing system. The system can anonymize data from a private network before it is transmitted to a public service.
    Type: Grant
    Filed: November 18, 2019
    Date of Patent: February 6, 2024
    Assignee: International Business Machines Corporation
    Inventors: David G. Druker, Matthew Elsner, Ariel Farkash, Igor Gokhman, Brian R. Matthiesen, Patrick R. Wardrop, Ilgen B. Yuceer
  • Patent number: 10681031
    Abstract: A method, system and computer-usable medium for performing an adaptive security operation comprising: performing an authentication operation via a first device, the authentication operation analyzing an obligation performed by a first user; establishing access to a protected resource by the first device based upon the obligation performed by the first user; generating an attribute list comprising at least one attribute of the first device; analyzing a second device to determine whether the second device comprises an attribute corresponding to the at least one attribute of the first device; and, allowing access to the protected resource by the second device when the second device comprises the attribute corresponding to the at least one attribute of the first device.
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: June 9, 2020
    Assignee: International Business Machines Corporation
    Inventors: Pranam C. Sreedhar, Patrick R. Wardrop
  • Publication number: 20200084184
    Abstract: The example embodiments are directed to a system and method for managing blockchain transaction processing. In an example, the method includes one or more of receiving a message transmitted from a client device, the message including a predefined structural format for processing by a service providing computing system, determining a type of the message and detecting one or more sensitive fields within the message based on the determined type of the message, anonymizing values of the one or more sensitive fields within the message while leaving the predefined structural format intact, and transmitting the anonymized message including the one or more anonymized values with the predefined structural format remaining intact to the service providing computing system. The system can anonymize data from a private network before it is transmitted to a public service.
    Type: Application
    Filed: November 18, 2019
    Publication date: March 12, 2020
    Inventors: David G. Druker, Matthew Elsner, Ariel Farkash, Igor Gokhman, Brian R. Matthiesen, Patrick R. Wardrop, Ilgen B. Yuceer
  • Patent number: 10547612
    Abstract: According to a non-limiting embodiment, a multiple identity resolution system includes an IDaaS integrated with a PaaS. The IDaaS is integrated with a cloud-based network, and an application module installed in the cloud-based network. The application module is configured to deliver content to at least one electronic device. The multiple identity resolution system further includes a service module in signal communication with the application module. The service module is configured to identify a physical user operating the at least one electronic device based on at least one user authentication credential received by the at least one electronic user device and at least one device attribute of the at least one electronic device.
    Type: Grant
    Filed: September 21, 2016
    Date of Patent: January 28, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sreedhar C. Pranam, Patrick R. Wardrop
  • Patent number: 10523638
    Abstract: The example embodiments are directed to a system and method for managing blockchain transaction processing. In an example, the method includes one or more of receiving a message transmitted from a client device, the message including a predefined structural format for processing by a service providing computing system, determining a type of the message and detecting one or more sensitive fields within the message based on the determined type of the message, anonymizing values of the one or more sensitive fields within the message while leaving the predefined structural format intact, and transmitting the anonymized message including the one or more anonymized values with the predefined structural format remaining intact to the service providing computing system. The system can anonymize data from a private network before it is transmitted to a public service.
    Type: Grant
    Filed: March 13, 2019
    Date of Patent: December 31, 2019
    Assignee: International Business Machines Corporation
    Inventors: David G. Druker, Matthew Elsner, Ariel Farkash, Igor Gokhman, Brian R. Matthiesen, Patrick R. Wardrop, Ilgen B. Yuceer
  • Publication number: 20190215309
    Abstract: The example embodiments are directed to a system and method for managing blockchain transaction processing. In an example, the method includes one or more of receiving a message transmitted from a client device, the message including a predefined structural format for processing by a service providing computing system, determining a type of the message and detecting one or more sensitive fields within the message based on the determined type of the message, anonymizing values of the one or more sensitive fields within the message while leaving the predefined structural format intact, and transmitting the anonymized message including the one or more anonymized values with the predefined structural format remaining intact to the service providing computing system. The system can anonymize data from a private network before it is transmitted to a public service.
    Type: Application
    Filed: March 13, 2019
    Publication date: July 11, 2019
    Inventors: David G. Druker, Matthew Elsner, Ariel Farkash, Igor Gokhman, Brian R. Matthiesen, Patrick R. Wardrop, Ilgen B. Yuceer
  • Patent number: 10333902
    Abstract: The example embodiments are directed to a system and method for managing blockchain transaction processing. In an example, the method includes one or more of receiving a message transmitted from a client device, the message including a predefined structural format for processing by a service providing computing system, determining a type of the message and detecting one or more sensitive fields within the message based on the determined type of the message, anonymizing values of the one or more sensitive fields within the message while leaving the predefined structural format intact, and transmitting the anonymized message including the one or more anonymized values with the predefined structural format remaining intact to the service providing computing system. The system can anonymize data from a private network before it is transmitted to a public service.
    Type: Grant
    Filed: December 19, 2017
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventors: David G. Druker, Matthew Elsner, Ariel Farkash, Igor Gokhman, Brian R. Matthiesen, Patrick R. Wardrop, Ilgen B. Yuceer
  • Publication number: 20190190890
    Abstract: The example embodiments are directed to a system and method for managing blockchain transaction processing. In an example, the method includes one or more of receiving a message transmitted from a client device, the message including a predefined structural format for processing by a service providing computing system, determining a type of the message and detecting one or more sensitive fields within the message based on the determined type of the message, anonymizing values of the one or more sensitive fields within the message while leaving the predefined structural format intact, and transmitting the anonymized message including the one or more anonymized values with the predefined structural format remaining intact to the service providing computing system. The system can anonymize data from a private network before it is transmitted to a public service.
    Type: Application
    Filed: December 19, 2017
    Publication date: June 20, 2019
    Inventors: David G. Druker, Matthew Elsner, Ariel Farkash, Igor Gokhman, Brian R. Matthiesen, Patrick R. Wardrop, Ilgen B. Yuceer
  • Patent number: 10218690
    Abstract: An enterprise server is provisioned with an authentication response language, where the authentication response language allows the enterprise server to issue instructions for authentication steps to an enterprise client, which enables the enterprise client to execute a set of instructions for navigating an authentication sequence. The set of instructions installed into and served by the enterprise server varies depending on a protocol inherently used by the authentication topology. The enterprise client, when accessing a protected resource, and not already authenticated, receives a set of authentication instructions from the enterprise server formulated in the authentication response language. The client starts to interpret the provided authentication instructions, but controls the presentation layer and interface of any user interactions. The client follows the sequence by sending requests and receiving responses from one or more servers in the topology until the sequence is complete.
    Type: Grant
    Filed: October 17, 2016
    Date of Patent: February 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Simon Helsen, Jose A. Rodriguez, Ritchard L. Schacher, Patrick R. Wardrop
  • Publication number: 20180109506
    Abstract: An enterprise server is provisioned with an authentication response language, where the authentication response language allows the enterprise server to issue instructions for authentication steps to an enterprise client, which enables the enterprise client to execute a set of instructions for navigating an authentication sequence. The set of instructions installed into and served by the enterprise server varies depending on a protocol inherently used by the authentication topology. The enterprise client, when accessing a protected resource, and not already authenticated, receives a set of authentication instructions from the enterprise server formulated in the authentication response language. The client starts to interpret the provided authentication instructions, but controls the presentation layer and interface of any user interactions. The client follows the sequence by sending requests and receiving responses from one or more servers in the topology until the sequence is complete.
    Type: Application
    Filed: October 17, 2016
    Publication date: April 19, 2018
    Inventors: SIMON HELSEN, JOSE A. RODRIGUEZ, RITCHARD L. SCHACHER, PATRICK R. WARDROP
  • Publication number: 20180083940
    Abstract: According to a non-limiting embodiment, a multiple identity crisis resolution system includes an IDaaS integrated with a PaaS. The IDaaS is integrated with a cloud-based network, and an application module installed in the cloud-based network. The application module is configured to deliver content to at least one electronic device. The multiple identity crisis resolution system further includes a service module in signal communication with the application module. The service module is configured to identify a physical user operating the at least one electronic device based on at least one user authentication credential received by the at least one electronic user device and at least one device attribute of the at least one electronic device.
    Type: Application
    Filed: September 21, 2016
    Publication date: March 22, 2018
    Inventors: Sreedhar C. Pranam, Patrick R. Wardrop
  • Patent number: 9742757
    Abstract: A computer receives a request for protected user data with an access token presented by a client as authorization for the client to access the protected user data in a delegated environment. The computer parses the request to create a device fingerprint identifying the device submitting the request for the client. The computer compares the device fingerprint of the request to a previously stored device fingerprint of an authorized device associated with the access token. The computer automatically determines whether to identify the access token as potentially misappropriated based on the comparison of the device fingerprint of the request to the previously stored device fingerprint.
    Type: Grant
    Filed: November 27, 2013
    Date of Patent: August 22, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Simon G. Canning, Pranam C. Sreedhar, Patrick R. Wardrop, Shane B. Weeden
  • Publication number: 20170126662
    Abstract: A method, system and computer-usable medium for performing an adaptive security operation comprising: performing an authentication operation via a first device, the authentication operation analyzing an obligation performed by a first user; establishing access to a protected resource by the first device based upon the obligation performed by the first user; generating an attribute list comprising at least one attribute of the first device; analyzing a second device to determine whether the second device comprises an attribute corresponding to the at least one attribute of the first device; and, allowing access to the protected resource by the second device when the second device comprises the attribute corresponding to the at least one attribute of the first device.
    Type: Application
    Filed: November 2, 2015
    Publication date: May 4, 2017
    Inventors: Pranam C. Sreedhar, Patrick R. Wardrop
  • Publication number: 20160373422
    Abstract: Authentication of users is based at least in part on a comparison of environmental signals of a present location with environmental signals identified earlier for the present location. Verification of the user location supports authentication where a conventional user logon actions are insufficient.
    Type: Application
    Filed: June 22, 2015
    Publication date: December 22, 2016
    Inventors: Austin F. Bruch, Brad J. Fraley, Patrick R. Wardrop, Scott S. Wisson
  • Publication number: 20160373442
    Abstract: Authentication of users is based at least in part on a comparison of environmental signals of a present location with environmental signals identified earlier for the present location. Verification of the user location supports authentication where a conventional user logon actions are insufficient.
    Type: Application
    Filed: December 15, 2015
    Publication date: December 22, 2016
    Inventors: Austin F. Bruch, Brad J. Fraley, Patrick R. Wardrop, Scott S. Wisson
  • Patent number: 9350739
    Abstract: An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a client device. The token pair (B) includes an access token (a2) and a refresh token (r2) and is generated as part of a refresh operation. An aspect also includes storing, in the memory device, a refresh token (r1) that was generated by the server computer before generation of the token pair B. The refresh token (r1) and the refresh token (r2) are each tagged as a valid refresh token. An aspect further includes receiving, at the server computer, a request to access a network resource that includes the access token (a2), invalidating the refresh token (r1), and providing the client device with access to the network resource.
    Type: Grant
    Filed: April 10, 2015
    Date of Patent: May 24, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Hockings, Trevor S. Norvill, Philip A. Nye, Asha Shivalingaiah, Patrick R. Wardrop, Shane B. Weeden
  • Patent number: 9350726
    Abstract: An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a client device. The token pair (B) includes an access token (a2) and a refresh token (r2) and is generated as part of a refresh operation. An aspect also includes storing, in the memory device, a refresh token (r1) that was generated by the server computer before generation of the token pair B. The refresh token (r1) and the refresh token (r2) are each tagged as a valid refresh token. An aspect further includes receiving, at the server computer, a request to access a network resource that includes the access token (a2), invalidating the refresh token (r1), and providing the client device with access to the network resource.
    Type: Grant
    Filed: September 11, 2014
    Date of Patent: May 24, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Hockings, Trevor S. Norvill, Philip A. Nye, Asha Shivalingaiah, Patrick R. Wardrop, Shane B. Weeden
  • Publication number: 20160080383
    Abstract: An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a client device. The token pair (B) includes an access token (a2) and a refresh token (r2) and is generated as part of a refresh operation. An aspect also includes storing, in the memory device, a refresh token (r1) that was generated by the server computer before generation of the token pair B. The refresh token (r1) and the refresh token (r2) are each tagged as a valid refresh token. An aspect further includes receiving, at the server computer, a request to access a network resource that includes the access token (a2), invalidating the refresh token (r1), and providing the client device with access to the network resource.
    Type: Application
    Filed: April 10, 2015
    Publication date: March 17, 2016
    Inventors: Christopher J. Hockings, Trevor S. Norvill, Philip A. Nye, Asha Shivalingaiah, Patrick R. Wardrop, Shane B. Weeden
  • Publication number: 20160080354
    Abstract: An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a client device. The token pair (B) includes an access token (a2) and a refresh token (r2) and is generated as part of a refresh operation. An aspect also includes storing, in the memory device, a refresh token (r1) that was generated by the server computer before generation of the token pair B. The refresh token (r1) and the refresh token (r2) are each tagged as a valid refresh token. An aspect further includes receiving, at the server computer, a request to access a network resource that includes the access token (a2), invalidating the refresh token (r1), and providing the client device with access to the network resource.
    Type: Application
    Filed: September 11, 2014
    Publication date: March 17, 2016
    Inventors: Christopher J. Hockings, Trevor S. Norvill, Philip A. Nye, Asha Shivalingaiah, Patrick R. Wardrop, Shane B. Weeden
  • Publication number: 20150150110
    Abstract: A computer receives a request for protected user data with an access token presented by a client as authorization for the client to access the protected user data in a delegated environment. The computer parses the request to create a device fingerprint identifying the device submitting the request for the client. The computer compares the device fingerprint of the request to a previously stored device fingerprint of an authorized device associated with the access token. The computer automatically determines whether to identify the access token as potentially misappropriated based on the comparison of the device fingerprint of the request to the previously stored device fingerprint.
    Type: Application
    Filed: November 27, 2013
    Publication date: May 28, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: SIMON G. CANNING, PRANAM C. SREEDHAR, PATRICK R. WARDROP, SHANE B. WEEDEN