Patents by Inventor Richard A. Victor
Richard A. Victor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11875200Abstract: A message limit value to be used in enqueuing one or more messages on a queue of a device of the computing environment is obtained. The message limit value indicates whether an extended maximum message length is supported by the device. The extended maximum message length is different from a default maximum message length supported by the device. Based on determining that the extended maximum message length is supported and that the obtained message limit value has a defined relationship with a select value, at least one message of an extended length is enqueued on the queue of the device.Type: GrantFiled: September 23, 2021Date of Patent: January 16, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Louis P. Gomes, Damian Osisek, Harald Freudenberger, Richard John Moore, Volker Urban, Michael D. Hocker, Eric David Rossman, Richard Victor Kisley
-
Publication number: 20230403146Abstract: A method, a computer program product, and a system are provided that handles host requests on a hardware security module (HSM). The method includes selecting a domain with a longest wait time with a host request for the HSM and selecting an oldest host request requested by the domain. The method also includes determining a hardware engine type required to process the oldest host request and determining a saturation level of the hardware engine type exceeds a saturation threshold. The method further includes selecting a second host request requested by the domain that uses a different hardware engine type based on the saturation level exceeding the saturation threshold and processing the second host request using the different hardware engine type of the HSM. The method further includes selecting unprocessed host requests of the domains to continuously provide efficient selection of those host requests to the HSM.Type: ApplicationFiled: June 13, 2022Publication date: December 14, 2023Inventors: Surya V. Duggirala, Richard Victor Kisley, Mark Douglas Marik, Michael Ordway Tingey, JR.
-
Publication number: 20230318814Abstract: Aspects of the invention include a computer-implemented method of executing a hybrid quantum safe key exchange system. The computer-implemented method includes initially retrieving an authenticated random value from a trusted source, generating a first Z value using a first elliptic curve (EC) private key and a first certified form of an EC public key with an EC Diffie-Hellman (ECDH) algorithm, deriving a shared key using the authenticated random value and the first Z value with a key derivation function, decrypting the authenticated random value using a quantum safe algorithm (QSA) private key, generating a second Z value using a second EC private key and a second certified form of the EC public key with the ECDH algorithm and deriving the shared key using the authenticated random value and the second Z value with the key derivation function.Type: ApplicationFiled: June 7, 2023Publication date: October 5, 2023Inventors: Richard Victor Kisley, Michael Miele, Elizabeth Anne Dames, Silvio Dragone
-
Patent number: 11764972Abstract: Processing within a computing environment is facilitated by generating a hybrid security certificate using multiple cryptosystems. The generating includes obtaining data for inclusion in the hybrid security certificate, and generating a first digital signature associated with a first cryptosystem to cover the data, and a second digital signature associated with a second cryptosystem to cover the data. The generating further includes providing the hybrid security certificate, where the hybrid security certificate includes the data, the first digital signature associated with the first cryptosystem, and the second digital signature associated with the second cryptosystem, and where the first digital signature has no dependency on a key of the second cryptosystem or the second digital signature, and the second digital signature has no dependency on a key of the first cryptosystem or the first digital signature.Type: GrantFiled: February 25, 2021Date of Patent: September 19, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jonathan William Edwards, David Wayne Glass, David Howard Evans, Clifford Lee Hansen, James Richard Coon, Richard Victor Kisley
-
Patent number: 11711207Abstract: Aspects of the invention include a computer-implemented method of executing a hybrid quantum safe key exchange system. The computer-implemented method includes initially retrieving an authenticated random value from a trusted source, generating a first Z value using a first elliptic curve (EC) private key and a first certified form of an EC public key with an EC Diffie-Hellman (ECDH) algorithm, deriving a shared key using the authenticated random value and the first Z value with a key derivation function, decrypting the authenticated random value using a quantum safe algorithm (QSA) private key, generating a second Z value using a second EC private key and a second certified form of the EC public key with the ECDH algorithm and deriving the shared key using the authenticated random value and the second Z value with the key derivation function.Type: GrantFiled: March 30, 2021Date of Patent: July 25, 2023Assignee: International Business Machines CorporationInventors: Richard Victor Kisley, Michael Miele, Elizabeth Anne Dames, Silvio Dragone
-
Publication number: 20230089541Abstract: A message limit value to be used in enqueuing one or more messages on a queue of a device of the computing environment is obtained. The message limit value indicates whether an extended maximum message length is supported by the device. The extended maximum message length is different from a default maximum message length supported by the device. Based on determining that the extended maximum message length is supported and that the obtained message limit value has a defined relationship with a select value, at least one message of an extended length is enqueued on the queue of the device.Type: ApplicationFiled: September 23, 2021Publication date: March 23, 2023Inventors: Louis P. Gomes, Damian Osisek, Harald Freudenberger, Richard John Moore, Volker Urban, Michael D. Hocker, Eric David Rossman, Richard Victor Kisley
-
Patent number: 11575520Abstract: Aspects of the invention include providing a clear key with an attribute that controls usage of the clear key. The clear key includes key data in at least a first 8-byte section and second and third 8-byte sections and a wrapping key for wrapping the clear key. The computer-implemented method further includes chaining the first, second and third 8-byte sections together with zeroes for those 8-byte sections that are unpopulated into chained key data, deriving encryption and authentication keys from the wrapping key, calculating an authentication code over the clear key and the attribute using the authentication key, executing encryption over the chained key data using the encryption key to generated encrypted chained key data and adding the authentication code, the attribute and the encrypted chained key data to form a key block.Type: GrantFiled: December 14, 2020Date of Patent: February 7, 2023Assignee: International Business Machines CorporationInventors: Richard Victor Kisley, Michael Miele
-
Patent number: 11533174Abstract: At least one secure object of a security module is bound to a secure guest. A trusted component determines whether metadata of the secure guest includes a confidential binding attribute for the security module. Based on determining that the metadata includes the confidential binding attribute, the trusted component configures the security module for the secure guest in a select mode. The select mode prevents certain operations from being intercepted by a hypervisor associated with the secure guest. The trusted component intercepts a security module communication and performs a cryptographic operation on one or more secure objects of the security module communication using the confidential binding attribute to provide a cryptographic result. An outcome of the security module communication, which includes the cryptographic result, is provided to a receiver.Type: GrantFiled: January 29, 2020Date of Patent: December 20, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Reinhard Theodor Buendgen, Richard Victor Kisley, Volker Urban
-
Publication number: 20220385481Abstract: Embodiments of the invention provide a computer-implemented method of executing multi-factor authentication (MFA). In embodiments of the invention, the computer-implemented method includes analyzing multiple categories of MFA factors, wherein a first category of the multiple categories of MFA factors includes a something-you-have MFA (SYH-MFA) factor. The SYH-MFA factor is analyzed by receiving, using a processor of an authenticating entity, an SYH certificate from a to-be-authenticated (TBA) entity; and determining, using the processor, that the SYH-MFA factor is satisfied by determining that the SYH certificate possessed by the TBA entity is valid.Type: ApplicationFiled: June 1, 2021Publication date: December 1, 2022Inventors: Jonathan William Edwards, David Howard Evans, David Wayne Glass, Richard Victor Kisley, Luna Benarroch Mulat
-
Patent number: 11487556Abstract: An adjunct processor dynamically determines, on a per-command basis, whether commands obtained by the adjunct processor are to be processed by the adjunct processor. The adjunct processor obtains a command request of a requester. The command request includes at least one filtering indicator indicating at least one valid command type for processing by the adjunct processor for the requester. The adjunct processor determines using the at least one filtering indicator whether a command of the command request is valid for processing by the adjunct processor for the requester. Based on determining that the command is valid for processing by the adjunct processor, the command is processed by the adjunct processor.Type: GrantFiled: December 15, 2020Date of Patent: November 1, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Louis P. Gomes, Richard Victor Kisley
-
Patent number: 11475167Abstract: A security module, such as a cryptographic adapter, is reserved for a secure guest of a computing environment. The reserving includes binding one or more queues of the security module to the secure guest. The one or more queues are then managed based on one or more actions relating to the reservation.Type: GrantFiled: January 29, 2020Date of Patent: October 18, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Reinhard Theodor Buendgen, Volker Urban, Richard Victor Kisley, Jonathan D. Bradbury, Torsten Hendel, Harald Freudenberger, Benedikt Klotz, Klaus Werner, Markus Selve
-
Publication number: 20220321331Abstract: Aspects of the invention include a computer-implemented method of executing a hybrid quantum safe key exchange system. The computer-implemented method includes initially retrieving an authenticated random value from a trusted source, generating a first Z value using a first elliptic curve (EC) private key and a first certified form of an EC public key with an EC Diffie-Hellman (ECDH) algorithm, deriving a shared key using the authenticated random value and the first Z value with a key derivation function, decrypting the authenticated random value using a quantum safe algorithm (QSA) private key, generating a second Z value using a second EC private key and a second certified form of the EC public key with the ECDH algorithm and deriving the shared key using the authenticated random value and the second Z value with the key derivation function.Type: ApplicationFiled: March 30, 2021Publication date: October 6, 2022Inventors: RICHARD VICTOR KISLEY, MICHAEL MIELE, ELIZABETH ANNE DAMES, SILVIO DRAGONE
-
Publication number: 20220271944Abstract: Processing within a computing environment is facilitated by generating a hybrid security certificate using multiple cryptosystems. The generating includes obtaining data for inclusion in the hybrid security certificate, and generating a first digital signature associated with a first cryptosystem to cover the data, and a second digital signature associated with a second cryptosystem to cover the data. The generating further includes providing the hybrid security certificate, where the hybrid security certificate includes the data, the first digital signature associated with the first cryptosystem, and the second digital signature associated with the second cryptosystem, and where the first digital signature has no dependency on a key of the second cryptosystem or the second digital signature, and the second digital signature has no dependency on a key of the first cryptosystem or the first digital signature.Type: ApplicationFiled: February 25, 2021Publication date: August 25, 2022Inventors: Jonathan William EDWARDS, David Wayne GLASS, David Howard EVANS, Clifford Lee HANSEN, James Richard COON, Richard Victor KISLEY
-
Publication number: 20220188125Abstract: An adjunct processor dynamically determines, on a per-command basis, whether commands obtained by the adjunct processor are to be processed by the adjunct processor. The adjunct processor obtains a command request of a requester. The command request includes at least one filtering indicator indicating at least one valid command type for processing by the adjunct processor for the requester. The adjunct processor determines using the at least one filtering indicator whether a command of the command request is valid for processing by the adjunct processor for the requester. Based on determining that the command is valid for processing by the adjunct processor, the command is processed by the adjunct processor.Type: ApplicationFiled: December 15, 2020Publication date: June 16, 2022Inventors: Louis P. Gomes, Richard Victor Kisley
-
Publication number: 20220191039Abstract: Aspects of the invention include providing a clear key with an attribute that controls usage of the clear key. The clear key includes key data in at least a first 8-byte section and second and third 8-byte sections and a wrapping key for wrapping the clear key. The computer-implemented method further includes chaining the first, second and third 8-byte sections together with zeroes for those 8-byte sections that are unpopulated into chained key data, deriving encryption and authentication keys from the wrapping key, calculating an authentication code over the clear key and the attribute using the authentication key, executing encryption over the chained key data using the encryption key to generated encrypted chained key data and adding the authentication code, the attribute and the encrypted chained key data to form a key block.Type: ApplicationFiled: December 14, 2020Publication date: June 16, 2022Inventors: RICHARD VICTOR KISLEY, MICHAEL MIELE
-
Publication number: 20220169611Abstract: The present invention provides MDM2 inhibitor compounds of Formula I, wherein the variables are defined above, which compounds are useful as therapeutic agents, particularly for the treatment of cancers. The present invention also relates to pharmaceutical compositions that contain an MDM2 inhibitor.Type: ApplicationFiled: February 15, 2022Publication date: June 2, 2022Inventors: Michael D. Bartberger, Ana Gonzalez Buenrostro, Hilary Plake Beck, Xiaoqi Chen, Richard Victor Connors, Jeffrey Deignan, Jason A. Dequette, I, John Eksterowicz, Benjamin Fisher, Brian M. Fox, Jiasheng Fu, Zice Fu, Felix Gonzalez Lopez De Turiso, Michael W. Gribble, Darin J. Gustin, Julie A. Heath, Xin Huang, XianYun Jiao, Michael G. Johnson, Frank Kayser, David John Kopecky, SuJen Lai, Yihong Li, Zhihong Li, Jiwen Liu, Jonathan D. Low, Brian S. Lucas, Zhihua Ma, Lawrence R. McGee, Josel McIntosh, Dustin L. McMinn, Julio C. Medina, Jeffrey Thomas Mihalic, Steven H. Olson, Yossup Rew, Philip M. Roveto, Daqing Sun, Xiaodong Wang, Yingcai Wang, Xuelei Yan, Ming Yu, Jiang Zhu
-
Publication number: 20210234681Abstract: At least one secure object of a security module is bound to a secure guest. A trusted component determines whether metadata of the secure guest includes a confidential binding attribute for the security module. Based on determining that the metadata includes the confidential binding attribute, the trusted component configures the security module for the secure guest in a select mode. The select mode prevents certain operations from being intercepted by a hypervisor associated with the secure guest. The trusted component intercepts a security module communication and performs a cryptographic operation on one or more secure objects of the security module communication using the confidential binding attribute to provide a cryptographic result. An outcome of the security module communication, which includes the cryptographic result, is provided to a receiver.Type: ApplicationFiled: January 29, 2020Publication date: July 29, 2021Inventors: Reinhard Theodor Buendgen, Richard Victor Kisley, Volker Urban
-
Publication number: 20210232709Abstract: A security module, such as a cryptographic adapter, is reserved for a secure guest of a computing environment. The reserving includes binding one or more queues of the security module to the secure guest. The one or more queues are then managed based on one or more actions relating to the reservation.Type: ApplicationFiled: January 29, 2020Publication date: July 29, 2021Inventors: Reinhard Theodor Buendgen, Volker Urban, Richard Victor Kisley, Jonathan D. Bradbury, Torsten Hendel, Harald Freudenberger, Benedikt Klotz, Klaus Werner, Markus Selve
-
Publication number: 20210179560Abstract: The present invention provides MDM2 inhibitor compounds of Formula I, wherein the variables are defined above, which compounds are useful as therapeutic agents, particularly for the treatment of cancers. The present invention also relates to pharmaceutical compositions that contain an MDM2 inhibitor.Type: ApplicationFiled: August 3, 2020Publication date: June 17, 2021Inventors: Michael D. Bartberger, Ana Gonzalez Buenrostro, Hilary Plake Beck, Xiaoqi Chen, Richard Victor Connors, Jeffrey Deignan, Jason A. Duquette, I, John Eksterowicz, Benjamin Fisher, Brian M. Fox, Jiasheng Fu, Zice Fu, Felix Gonzalez Lopez De Turiso, Michael W. Gribble, Darin J. Gustin, Julie A. Heath, Xin Huang, XianYun Jiao, Michael G. Johnson, Frank Kayser, David John Kopecky, SuJen Lai, Yihong Li, Zhihong Li, Jiwen Liu, Jonathan D. Low, Brian S. Lucas, Zhihua MA, Lawrence R. McGee, Joel McIntosh, Dustin L. McMinn, Julio C. Medina, Jeffrey Thomas Mihalic, Steven H. Olson, Yossup Rew, Philip M. Roveto, Daqing Sun, Xiaodong Wang, Yingcai Wang, Xuelei Yan, Ming Yu, Jiang Zhu
-
Patent number: 10296886Abstract: A system and method for provisioning one or more value added services to a postpaid/prepaid mobile account and/or a postpaid/prepaid mobile device using a wireless communication device as a point-of-sale device, is disclosed.Type: GrantFiled: June 6, 2016Date of Patent: May 21, 2019Assignee: Utiba PTE, Ltd.Inventors: Richard Victor Matotek, Justin Misha Ho, Andrew Charles Barnham