Patents by Inventor Paul A. Ashley

Paul A. Ashley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140380044
    Abstract: A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the exchange of security keys, the home TSM delegates to the roaming TSM access to the second partition of the SIM.
    Type: Application
    Filed: June 25, 2013
    Publication date: December 25, 2014
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
  • Publication number: 20140376722
    Abstract: A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the exchange of security keys, the home TSM delegates to the roaming TSM access to the second partition of the SIM.
    Type: Application
    Filed: September 2, 2014
    Publication date: December 25, 2014
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
  • Publication number: 20140351370
    Abstract: A technique to at least partial transfer an active network communication session associated with a server and an authenticated user communicating through a first device. The at least partial transfer includes the following actions (not necessarily in the following order): (i) recording the network communication session on an inline network device; (ii) associating the network communication session with the second device on the inline network device; and (iii) sending session continuation information from the inline network device to at least the second device and/or the server. The first device is in data communication with the inline network device during at least a portion of the recording step. The session continuation information sent at the sending step includes information enabling the user to continue the active network communication session through the second device.
    Type: Application
    Filed: May 24, 2013
    Publication date: November 27, 2014
    Applicant: International Business Machines Corporation
    Inventors: Paul A. Ashley, Christopher Y. Choi, John W. Court, Simon W. Gee
  • Publication number: 20140317730
    Abstract: An approach is provided to verify a network address. In the approach, a network address is received from a domain name service (DNS) based on a requested uniform resource locator (URL) that corresponds to a requested domain. A set of one or more network addresses previously established as corresponding to the requested domain is retrieved from a data store accessible from the information handling system. The information handling system is automatically connected to the network address in response to the received network address matching one of the set of one or more retrieved network addresses.
    Type: Application
    Filed: April 17, 2013
    Publication date: October 23, 2014
    Applicant: International Business Machines Corporation
    Inventors: Paul A. Ashley, Carsten Hagemann
  • Publication number: 20140123676
    Abstract: An end-wall component of the mainstream gas annulus of a gas turbine engine has a cooling arrangement including one or more circumferentially extending rows of ballistic cooling holes through which, in use, dilution cooling air is jetted into the mainstream gas to reduce the mainstream gas temperature adjacent the end-wall. A portion of the cooling holes are first cooling holes angled such that the direction of the dilution cooling air jetted therethrough has, on entry into the mainstream gas annulus, a component in one tangential direction. A portion of the cooling holes are second cooling holes angled such that the direction of the dilution cooling air jetted therethrough has, on entry into the mainstream gas annulus, a component in the opposite tangential direction. The first and second cooling holes are arranged such that the cooling air from jets having entry components in opposing tangential directions collide and coalesce.
    Type: Application
    Filed: November 4, 2013
    Publication date: May 8, 2014
    Applicant: ROLLS-ROYCE PLC
    Inventors: Dougal JACKSON, Paul Ashley DENMAN, Vivek Ross SAVARIANADAM
  • Patent number: 8276192
    Abstract: A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: September 25, 2012
    Assignee: International Business Machines Corporation
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Genady Ya. Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Grant Wagner
  • Patent number: 8135766
    Abstract: A random number generator (RNG) resistant to side channel attacks includes an activation pseudo random number generator (APRNG) having an activation output connected to an activation seed input to provide a next seed to the activation seed input. A second random number generator includes a second seed input, which receives the next seed and a random data output, which outputs random data in accordance with the next seed. An input seed memory is connected to the activation seed input and a feedback connection from the activation output so that the next seed is stored in the input seed memory to be used by the APRNG as the activation seed input at a next startup cycle.
    Type: Grant
    Filed: June 2, 2008
    Date of Patent: March 13, 2012
    Assignee: International Business Machines Corporation
    Inventors: Suresh Narayana Chari, Vincenzo Valentino Diluoffo, Paul Ashley Karger, Elaine Rivette Palmer, Tal Rabin, Josyula Ramachandra Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David Claude Toll
  • Patent number: 8099781
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Grant
    Filed: July 23, 2009
    Date of Patent: January 17, 2012
    Assignee: International Business Machines Corporation
    Inventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Patent number: 8087090
    Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range by mapping the effectiveness of performing the mitigation measures to determine a residual risk after a mitigation measure has been implemented.
    Type: Grant
    Filed: June 2, 2008
    Date of Patent: December 27, 2011
    Assignee: International Business Machines Corporation
    Inventors: Pau-Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Patent number: 7832007
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Grant
    Filed: January 10, 2006
    Date of Patent: November 9, 2010
    Assignee: International Business Machines Corporation
    Inventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Publication number: 20090282487
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Application
    Filed: July 23, 2009
    Publication date: November 12, 2009
    Applicant: International Business Machines Corporation
    Inventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Patent number: 7530110
    Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range.
    Type: Grant
    Filed: May 6, 2005
    Date of Patent: May 5, 2009
    Assignee: International Business Machines Corporation
    Inventors: Pau-Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Publication number: 20090055890
    Abstract: A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
    Type: Application
    Filed: May 30, 2008
    Publication date: February 26, 2009
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Genady Ya. Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktotovich Riabov, Pankai Rohatgi, Angela Marie Schuett, Grant Wagner
  • Patent number: 7496616
    Abstract: A random number generator (RNG) resistant to side channel attacks includes an activation pseudo random number generator (APRNG) having an activation output connected to an activation seed input to provide a next seed to the activation seed input. A second random number generator includes a second seed input, which receives the next seed and a random data output, which outputs random data in accordance with the next seed. An input seed memory is connected to the activation seed input and a feedback connection from the activation output so that the next seed is stored in the input seed memory to be used by the APRNG as the activation seed input at a next startup cycle.
    Type: Grant
    Filed: November 12, 2004
    Date of Patent: February 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Suresh Narayana Chari, Vincenzo Valentino Diluoffo, Paul Ashley Karger, Elaine Rivette Palmer, Tal Rabin, Josyula Ramachandra Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David Claude Toll
  • Publication number: 20090049111
    Abstract: A random number generator (RNG) resistant to side channel attacks includes an activation pseudo random number generator (APRNG) having an activation output connected to an activation seed input to provide a next seed to the activation seed input. A second random number generator includes a second seed input, which receives the next seed and a random data output, which outputs random data in accordance with the next seed. An input seed memory is connected to the activation seed input and a feedback connection from the activation output so that the next seed is stored in the input seed memory to be used by the APRNG as the activation seed input at a next startup cycle.
    Type: Application
    Filed: June 2, 2008
    Publication date: February 19, 2009
    Inventors: Suresh Narayana Chari, Vincenzo Valentino Diluoffo, Paul Ashley Karger, Elaine Rivette Palmer, Tal Rabin, Josyula Ramachandra Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David Claude Toll
  • Publication number: 20080263662
    Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range.
    Type: Application
    Filed: June 2, 2008
    Publication date: October 23, 2008
    Inventors: Pau-Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Publication number: 20080016547
    Abstract: A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
    Type: Application
    Filed: July 11, 2006
    Publication date: January 17, 2008
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Genady Ya. Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Grant Wagner
  • Publication number: 20070057146
    Abstract: An image analysis and enhancement system is provided with an image processor, imaging metrics, an image storage depository, and a reconfigurable sensor device that can be present at the same location. A remote reconfigurable sensor device is connected to the image processor via a communication link. Both the reconfigurable sensor device and the remote reconfigurable sensor device are equipped with selectable optical elements and imaging elements that are selected in a desired combination and orientation to capture desired image frames from a target scene or object. The selectable optical and imaging elements are provided with actuating devices to move and translate the selected optical and imaging elements into a desired orientation with one another, so that a desired imaging technique can be employed to obtain an enhanced image. The system is applicable to industrial, medical and military use.
    Type: Application
    Filed: September 13, 2005
    Publication date: March 15, 2007
    Inventors: Paul Ashley, William Pittman
  • Patent number: 7171553
    Abstract: A method of providing a secure communication between first and second devices is described. The method includes encrypting a random key using an encryption key at a first device and transferring the encrypted random key to the second device for encryption of data communicated from the second device to the first device. The encrypted data received from the second device is decrypted using the random key. The method typically includes transferring a control word encrypted with an encryption key to the second device for decryption, and encryption using the random key. The encrypted control word received from the second device is then decrypted using the random key. The invention extends to a method of enabling a decoder, and to a decoder, to decode a data stream. It also extends, inter alia, to a method of authenticating an enabling device and to an enabling device.
    Type: Grant
    Filed: March 18, 2002
    Date of Patent: January 30, 2007
    Assignee: Irdeto Access B.V.
    Inventors: Simon Paul Ashley Rix, Andrew Glasspool, Donald Watts Davies
  • Publication number: 20070015357
    Abstract: A process for adhesive bonding of polymer layers between silicon substrates is disclosed for forming three-dimensional micro-structures on a silicon wafer. A base substrate such as a silicon wafer is provided and a coating step places at least one polymer thereon. At least one pattern is created in the polymer to form a plurality of channels and gaps in the polymer layer prior to precuring and curing. A second substrate is aligned adjacent to the base substrate and having the patterned polymer therebetween. The substrates and patterned polymer are cured under a vacuum and at selected temperatures to induce compression of the polymer between the substrates while retaining voids, channels and gaps in the polymer layer. Cooling forms layered polymer layers having voids, channels and gaps therein, forming three-dimensional micro-structures actuated by one or more optical, mechanical and fluidic forces to accomplish complex functions by the micro-structures.
    Type: Application
    Filed: July 15, 2005
    Publication date: January 18, 2007
    Inventors: Paul Ashley, Mark Temmen, Gerald Tuck