Patents by Inventor Ramesh K. Karne
Ramesh K. Karne has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20090083766Abstract: Systems for performing bare machine computing are disclosed. A system may include a bare machine computing platform that includes a processor, one or more input/output devices, and a storage medium. The bare machine computing platform does not include an operating system. The system may further include a processor readable storage medium including one or more instructions for implementing an application object. The application object may contain data and one or more instructions for enabling an operating environment and executing an application within the operating environment.Type: ApplicationFiled: January 31, 2008Publication date: March 26, 2009Applicant: TOWSON UNIVERSITYInventors: Ramesh K. Karne, Alexander L. Wijesinha, Gholam H. Khaksari
-
Patent number: 5133077Abstract: A data processor is disclosed which enables the selective simultaneous or asynchronous execution of mutually independent instructions of different classes in parallel coupled execution units and which enables the sequential execution of mutually dependent instructions of different classes by delaying the execution of a dependent instruction in a second execution unit until the completion of execution of a precursor instruction in a first execution unit. The instructions are dispatched to respective ones of a plurality of parallel coupled execution units, in accordance with their instruction class.Type: GrantFiled: June 5, 1990Date of Patent: July 21, 1992Assignee: International Business Machines CorporationInventors: Ramesh K. Karne, Sastry S. Vedula
-
Patent number: 5103478Abstract: A requested cryptographic function is validated for performance in conjunction with a cryptographic key, by inputting a first portion of an associated control vector into a first control vector checker, which outputs a first authorization signal if the requested cryptographic function has been authorized by the originator of the key. A second portion of the control vector is input to a second control vector checker, which outputs a second authorization signal if the requested cryptographic function has been authorized by the originator of the key. Both the first and the second authorization signals are applied to a cryptographic processor which initiates the execution of the requested cryptographic function.Type: GrantFiled: October 12, 1990Date of Patent: April 7, 1992Assignee: International Business Machines CorporationInventors: Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, An V. Le, Patrick J. McCormack, Rostislaw Prymak, John D. Wilkins
-
Patent number: 4941176Abstract: The invention is an apparatus and method for validating that key management functions requested for a cryptographic key by the program have been authorized by the originator of the key. The invention includes a cryptographic facility characterized by a secure boundary through which passes an input path for receiving the cryptographic service requests, cryptographic keys and their associated control vectors, and an output path for providing responses thereto. There can be included within the boundary a cryptographic instruction storage coupled to the input path, a control vector checking unit and a cryptographic processing unit coupled to the instruction storage, and a master key storage coupled to the processing means, for providing a secure location for executing key management functions in response to the received service requests. The cryptographic instruction storage receives over the input path a cryptographic service request for performing a key management function on a cryptographic key.Type: GrantFiled: August 11, 1988Date of Patent: July 10, 1990Assignee: International Business Machines CorporationInventors: Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, An V. Le, Rostislaw Prymak, Julian Thomas, John D. Wilkins, Phil C. Yeh
-
Patent number: 4924515Abstract: A method and apparatus are disclosed for use in a data processing system which executes a program which outputs cryptographic service requests for operations with cryptographic keys which are associated with control vectors defining the functions which each key is allowed by its originator to perform. The improved method and apparatus enable the use of control vectors having an arbitrary length. It includes a control vector register having an arbitrary length, for storing a control vector of arbitrary length associated with an N-bit cryptographic key. It further includes a control vector checking means having an input coupled to the control vector register, for checking that the control vector authorizes the cryptographic function which is requested by the cryptographic service request. It further includes a hash function generator having an input coupled to the control vector register and an N-bit output, for mapping the control vector output from the control vector register, into an N-bit hash value.Type: GrantFiled: August 24, 1989Date of Patent: May 8, 1990Assignee: International Business Machines CoprporationInventors: Stephen M. Matyas, Dennis G. Abraham, William C. Arnold, Donald B. Johnson, Ramesh K. Karne, An V. Le, Rostislaw Prymak, Steve R. White, John D. Wilkins
-
Patent number: 4924514Abstract: Cryptographic PIN processing is achieved in an improved manner by associating control vectors with the PIN generating (verification) keys and PIN encrypting keys which provide authorization for the uses of the keys intended by the originator of the keys. The originator may be the local cryptographic facility (CF) and a utility program under the control of a security administrator, or the originator may be another network node which uses the key management methods described in the above-referenced copending patent applications to distribute said keys.Among the uses specified by the control vector are limitations on the authority to use the associated key with certain PIN processing instructions, such as PIN generation, verification, translation and PIN block creation. Furthermore, the control vector may limit the authority of certain instructions to process clear PIN inputs (such as in PIN verification).Type: GrantFiled: August 24, 1989Date of Patent: May 8, 1990Assignee: International Business Machines CorporationInventors: Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, An V. Le, Rostislaw Prymak, Julian Thomas, John D. Wilkins, Phil C. Yeh, Ronald M. Smith
-
Patent number: 4918728Abstract: Data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorization for the uses of the key intended by the originator of the key. Among the uses specified by the control vector are limitations on encryption, decryption, authentication code generation and verification, translation of the user's data. Complex combinations of data manipulation functions are possible using the control vectors, in accordance with the invention. The system administrator can exercise flexibility in changing the implementation of his security policy by selecting appropriate control vectors in accordance with the invention.Type: GrantFiled: August 30, 1989Date of Patent: April 17, 1990Assignee: International Business Machines CorporationInventors: Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, An V. Le, Rostislaw Prymak, Julian Thomas, John D. Wilkins, Phil C. Yeh