Patents by Inventor Paul Wanish

Paul Wanish has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060085841
    Abstract: A computing environment security agent is provided for automatically determining whether to grant access to an asset, deny access to the asset, or grant access to a transformed asset responsive to an asset request by a user of the computing environment. The security agent includes logic for authenticating a user for computing environment access, for receiving a request from the authenticated user to access an asset, and for determining whether the authenticated user is authorized to access the asset, and if so, for determining whether to transform the asset responsive to the request to access the asset by the authenticated user. The security agent can further include logic for transparently transforming the requested asset or for defining at least one transformation rule for the requested asset and saving the at least one transformation rule in a transformation list accessible by the authenticated user.
    Type: Application
    Filed: October 15, 2004
    Publication date: April 20, 2006
    Applicant: International Business Machines Corporation
    Inventors: Ira Chavis, Frank De Gilio, Margaret Radford, Paul Wanish
  • Publication number: 20050108528
    Abstract: A computer network and a method for transmitting data through the computer network is provided. The computer network includes a first computer and a second computer both having a message sequence number stored therein. The method includes transmitting a message containing a message identifier, and encrypted message sequence number, and encrypted data from the first computer to the second computer. The method further includes decrypting in the encrypted message sequence number to authenticate the identity of the sending party who transmitted the message. Finally, the method includes the second computer initiating transmission of the message sequence number and the encrypted data to a third computer when the identity of the sending party is authenticated.
    Type: Application
    Filed: November 19, 2003
    Publication date: May 19, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul Wanish, Frank DeGilio