Patents by Inventor Paul Harry Abbott

Paul Harry Abbott has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7953970
    Abstract: A method and apparatus for storage of security keys and certificates is provided in which the keys and certificates are fragmented into non-uniform lengths and stored in a data file (110). The fragments (152, 154) of the keys and certificates are intermixed within the data file (110). The fragmentation is carried out according to an algorithm (200) which may be based on a pass phrase (140) to the data file (110). The position of storage of each fragment (152, 154) within the data file (110) is also determined by the algorithm (200).
    Type: Grant
    Filed: January 10, 2002
    Date of Patent: May 31, 2011
    Assignee: International Business Machines Corporation
    Inventor: Paul Harry Abbott
  • Patent number: 7496757
    Abstract: A software security system is arranged to verify the authenticity of each element of a Java Virtual Machine installation. A digital signature is attached to each file of the JVM installation. A loader (20) verifies the digital signature of the JVM DLL (30). The JVM DLL 30 then verifies the digital signature of each other DLL and configuration file to be loaded (40, 50, 60, 70), and only loads those files which have successfully verified digital signatures. In this way the security of the JVM is enhanced, a user has greater confidence that the Java applications will function correctly, and the detection of incorrect or damaged JVM installations is improved.
    Type: Grant
    Filed: January 14, 2002
    Date of Patent: February 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Paul Harry Abbott, Lawrence Koved, Anthony Joseph Nadalin, Marco Pistoia
  • Patent number: 7191441
    Abstract: A computer system includes a software virtual machine (such as Java) for running one or more applications. An object is provided that is responsive to a call from an application for placing the virtual machine and application into a state of suspension. This involves interrupting all current threads, and recording the state of the components of the virtual machine, including heap, threads, and stack, into a serialization data structure. Subsequently the serialization data structure can be invoked to resume the virtual machine and application from the state of suspension. Note that many virtual machines can be cloned from the single stored data structure. One benefit of this approach is that a new virtual machine can effectively be created in an already initialized state.
    Type: Grant
    Filed: August 6, 2002
    Date of Patent: March 13, 2007
    Assignee: International Business Machines Corporation
    Inventors: Paul Harry Abbott, Matthew Paul Chapman
  • Publication number: 20030135746
    Abstract: A software security system is arranged to verify the authenticity of each element of a Java Virtual Machine installation. A digital signature is attached to each file of the JVM installation. A loader (20) verifies the digital signature of the JVM DLL (30). The JVM DLL 30 then verifies the digital signature of each other DLL and configuration file to be loaded (40, 50, 60, 70), and only loads those files which have successfully verified digital signatures. In this way the security of the JVM is enhanced, a user has greater confidence that the Java applications will function correctly, and the detection of incorrect or damaged JVM installations is improved.
    Type: Application
    Filed: January 14, 2002
    Publication date: July 17, 2003
    Applicant: International Business Machines Corporation
    Inventors: Paul Harry Abbott, Lawrence Koved, Anthony Joseph Nadalin, Marco Pistoia
  • Patent number: 6542887
    Abstract: A Java Virtual Machine comprises a class loader and a library file loader. The class loader responds to requests to instantiate a class by searching a classpath in which class files and archived files are stored; and responsive to locating a requested class file in the classpath or within an archived file in the classpath, loads the class into memory. The library file loader responds to requests to load a native code library, by searching a library path in which library files are stored; and responsive to locating a requested library file in the library path, loads the library into memory. According to the invention, the library file loader also searches the classpath; and responsive to locating a requested library file in an archived file in the classpath, loads the library into memory.
    Type: Grant
    Filed: February 24, 2000
    Date of Patent: April 1, 2003
    Assignee: International Business Machines Corporation
    Inventor: Paul Harry Abbott
  • Publication number: 20030033344
    Abstract: A computer system includes a software virtual machine (such as Java) for running one or more applications. An object is provided that is responsive to a call from an application for placing the virtual machine and application into a state of suspension. This involves interrupting all current threads, and recording the state of the components of the virtual machine, including heap, threads, and stack, into a serialization data structure. Subsequently the serialization data structure can be invoked to resume the virtual machine and application from the state of suspension. Note that many virtual machines can be cloned from the single stored data structure. One benefit of this approach is that a new virtual machine can effectively be created in an already initialized state.
    Type: Application
    Filed: August 6, 2002
    Publication date: February 13, 2003
    Applicant: International Business Machines Corporation
    Inventors: Paul Harry Abbott, Matthew Paul Chapman
  • Publication number: 20020129242
    Abstract: A method and apparatus for storage of security keys and certificates is provided in which the keys and certificates are fragmented into non-uniform lengths and stored in a data file (110). The fragments (152, 154) of the keys and certificates are intermixed within the data file (110). The fragmentation is carried out according to an algorithm (200) which may be based on a pass phrase (140) to the data file (110). The position of storage of each fragment (152, 154) within the data file (110) is also determined by the algorithm (200).
    Type: Application
    Filed: January 10, 2002
    Publication date: September 12, 2002
    Applicant: International Business Machines Corporation
    Inventor: Paul Harry Abbott