Patents by Inventor Richard A. Victor

Richard A. Victor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11875200
    Abstract: A message limit value to be used in enqueuing one or more messages on a queue of a device of the computing environment is obtained. The message limit value indicates whether an extended maximum message length is supported by the device. The extended maximum message length is different from a default maximum message length supported by the device. Based on determining that the extended maximum message length is supported and that the obtained message limit value has a defined relationship with a select value, at least one message of an extended length is enqueued on the queue of the device.
    Type: Grant
    Filed: September 23, 2021
    Date of Patent: January 16, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Louis P. Gomes, Damian Osisek, Harald Freudenberger, Richard John Moore, Volker Urban, Michael D. Hocker, Eric David Rossman, Richard Victor Kisley
  • Publication number: 20230403146
    Abstract: A method, a computer program product, and a system are provided that handles host requests on a hardware security module (HSM). The method includes selecting a domain with a longest wait time with a host request for the HSM and selecting an oldest host request requested by the domain. The method also includes determining a hardware engine type required to process the oldest host request and determining a saturation level of the hardware engine type exceeds a saturation threshold. The method further includes selecting a second host request requested by the domain that uses a different hardware engine type based on the saturation level exceeding the saturation threshold and processing the second host request using the different hardware engine type of the HSM. The method further includes selecting unprocessed host requests of the domains to continuously provide efficient selection of those host requests to the HSM.
    Type: Application
    Filed: June 13, 2022
    Publication date: December 14, 2023
    Inventors: Surya V. Duggirala, Richard Victor Kisley, Mark Douglas Marik, Michael Ordway Tingey, JR.
  • Publication number: 20230318814
    Abstract: Aspects of the invention include a computer-implemented method of executing a hybrid quantum safe key exchange system. The computer-implemented method includes initially retrieving an authenticated random value from a trusted source, generating a first Z value using a first elliptic curve (EC) private key and a first certified form of an EC public key with an EC Diffie-Hellman (ECDH) algorithm, deriving a shared key using the authenticated random value and the first Z value with a key derivation function, decrypting the authenticated random value using a quantum safe algorithm (QSA) private key, generating a second Z value using a second EC private key and a second certified form of the EC public key with the ECDH algorithm and deriving the shared key using the authenticated random value and the second Z value with the key derivation function.
    Type: Application
    Filed: June 7, 2023
    Publication date: October 5, 2023
    Inventors: Richard Victor Kisley, Michael Miele, Elizabeth Anne Dames, Silvio Dragone
  • Patent number: 11764972
    Abstract: Processing within a computing environment is facilitated by generating a hybrid security certificate using multiple cryptosystems. The generating includes obtaining data for inclusion in the hybrid security certificate, and generating a first digital signature associated with a first cryptosystem to cover the data, and a second digital signature associated with a second cryptosystem to cover the data. The generating further includes providing the hybrid security certificate, where the hybrid security certificate includes the data, the first digital signature associated with the first cryptosystem, and the second digital signature associated with the second cryptosystem, and where the first digital signature has no dependency on a key of the second cryptosystem or the second digital signature, and the second digital signature has no dependency on a key of the first cryptosystem or the first digital signature.
    Type: Grant
    Filed: February 25, 2021
    Date of Patent: September 19, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan William Edwards, David Wayne Glass, David Howard Evans, Clifford Lee Hansen, James Richard Coon, Richard Victor Kisley
  • Patent number: 11711207
    Abstract: Aspects of the invention include a computer-implemented method of executing a hybrid quantum safe key exchange system. The computer-implemented method includes initially retrieving an authenticated random value from a trusted source, generating a first Z value using a first elliptic curve (EC) private key and a first certified form of an EC public key with an EC Diffie-Hellman (ECDH) algorithm, deriving a shared key using the authenticated random value and the first Z value with a key derivation function, decrypting the authenticated random value using a quantum safe algorithm (QSA) private key, generating a second Z value using a second EC private key and a second certified form of the EC public key with the ECDH algorithm and deriving the shared key using the authenticated random value and the second Z value with the key derivation function.
    Type: Grant
    Filed: March 30, 2021
    Date of Patent: July 25, 2023
    Assignee: International Business Machines Corporation
    Inventors: Richard Victor Kisley, Michael Miele, Elizabeth Anne Dames, Silvio Dragone
  • Publication number: 20230089541
    Abstract: A message limit value to be used in enqueuing one or more messages on a queue of a device of the computing environment is obtained. The message limit value indicates whether an extended maximum message length is supported by the device. The extended maximum message length is different from a default maximum message length supported by the device. Based on determining that the extended maximum message length is supported and that the obtained message limit value has a defined relationship with a select value, at least one message of an extended length is enqueued on the queue of the device.
    Type: Application
    Filed: September 23, 2021
    Publication date: March 23, 2023
    Inventors: Louis P. Gomes, Damian Osisek, Harald Freudenberger, Richard John Moore, Volker Urban, Michael D. Hocker, Eric David Rossman, Richard Victor Kisley
  • Patent number: 11575520
    Abstract: Aspects of the invention include providing a clear key with an attribute that controls usage of the clear key. The clear key includes key data in at least a first 8-byte section and second and third 8-byte sections and a wrapping key for wrapping the clear key. The computer-implemented method further includes chaining the first, second and third 8-byte sections together with zeroes for those 8-byte sections that are unpopulated into chained key data, deriving encryption and authentication keys from the wrapping key, calculating an authentication code over the clear key and the attribute using the authentication key, executing encryption over the chained key data using the encryption key to generated encrypted chained key data and adding the authentication code, the attribute and the encrypted chained key data to form a key block.
    Type: Grant
    Filed: December 14, 2020
    Date of Patent: February 7, 2023
    Assignee: International Business Machines Corporation
    Inventors: Richard Victor Kisley, Michael Miele
  • Patent number: 11533174
    Abstract: At least one secure object of a security module is bound to a secure guest. A trusted component determines whether metadata of the secure guest includes a confidential binding attribute for the security module. Based on determining that the metadata includes the confidential binding attribute, the trusted component configures the security module for the secure guest in a select mode. The select mode prevents certain operations from being intercepted by a hypervisor associated with the secure guest. The trusted component intercepts a security module communication and performs a cryptographic operation on one or more secure objects of the security module communication using the confidential binding attribute to provide a cryptographic result. An outcome of the security module communication, which includes the cryptographic result, is provided to a receiver.
    Type: Grant
    Filed: January 29, 2020
    Date of Patent: December 20, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Reinhard Theodor Buendgen, Richard Victor Kisley, Volker Urban
  • Publication number: 20220385481
    Abstract: Embodiments of the invention provide a computer-implemented method of executing multi-factor authentication (MFA). In embodiments of the invention, the computer-implemented method includes analyzing multiple categories of MFA factors, wherein a first category of the multiple categories of MFA factors includes a something-you-have MFA (SYH-MFA) factor. The SYH-MFA factor is analyzed by receiving, using a processor of an authenticating entity, an SYH certificate from a to-be-authenticated (TBA) entity; and determining, using the processor, that the SYH-MFA factor is satisfied by determining that the SYH certificate possessed by the TBA entity is valid.
    Type: Application
    Filed: June 1, 2021
    Publication date: December 1, 2022
    Inventors: Jonathan William Edwards, David Howard Evans, David Wayne Glass, Richard Victor Kisley, Luna Benarroch Mulat
  • Patent number: 11487556
    Abstract: An adjunct processor dynamically determines, on a per-command basis, whether commands obtained by the adjunct processor are to be processed by the adjunct processor. The adjunct processor obtains a command request of a requester. The command request includes at least one filtering indicator indicating at least one valid command type for processing by the adjunct processor for the requester. The adjunct processor determines using the at least one filtering indicator whether a command of the command request is valid for processing by the adjunct processor for the requester. Based on determining that the command is valid for processing by the adjunct processor, the command is processed by the adjunct processor.
    Type: Grant
    Filed: December 15, 2020
    Date of Patent: November 1, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Louis P. Gomes, Richard Victor Kisley
  • Patent number: 11475167
    Abstract: A security module, such as a cryptographic adapter, is reserved for a secure guest of a computing environment. The reserving includes binding one or more queues of the security module to the secure guest. The one or more queues are then managed based on one or more actions relating to the reservation.
    Type: Grant
    Filed: January 29, 2020
    Date of Patent: October 18, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Reinhard Theodor Buendgen, Volker Urban, Richard Victor Kisley, Jonathan D. Bradbury, Torsten Hendel, Harald Freudenberger, Benedikt Klotz, Klaus Werner, Markus Selve
  • Publication number: 20220321331
    Abstract: Aspects of the invention include a computer-implemented method of executing a hybrid quantum safe key exchange system. The computer-implemented method includes initially retrieving an authenticated random value from a trusted source, generating a first Z value using a first elliptic curve (EC) private key and a first certified form of an EC public key with an EC Diffie-Hellman (ECDH) algorithm, deriving a shared key using the authenticated random value and the first Z value with a key derivation function, decrypting the authenticated random value using a quantum safe algorithm (QSA) private key, generating a second Z value using a second EC private key and a second certified form of the EC public key with the ECDH algorithm and deriving the shared key using the authenticated random value and the second Z value with the key derivation function.
    Type: Application
    Filed: March 30, 2021
    Publication date: October 6, 2022
    Inventors: RICHARD VICTOR KISLEY, MICHAEL MIELE, ELIZABETH ANNE DAMES, SILVIO DRAGONE
  • Publication number: 20220271944
    Abstract: Processing within a computing environment is facilitated by generating a hybrid security certificate using multiple cryptosystems. The generating includes obtaining data for inclusion in the hybrid security certificate, and generating a first digital signature associated with a first cryptosystem to cover the data, and a second digital signature associated with a second cryptosystem to cover the data. The generating further includes providing the hybrid security certificate, where the hybrid security certificate includes the data, the first digital signature associated with the first cryptosystem, and the second digital signature associated with the second cryptosystem, and where the first digital signature has no dependency on a key of the second cryptosystem or the second digital signature, and the second digital signature has no dependency on a key of the first cryptosystem or the first digital signature.
    Type: Application
    Filed: February 25, 2021
    Publication date: August 25, 2022
    Inventors: Jonathan William EDWARDS, David Wayne GLASS, David Howard EVANS, Clifford Lee HANSEN, James Richard COON, Richard Victor KISLEY
  • Publication number: 20220188125
    Abstract: An adjunct processor dynamically determines, on a per-command basis, whether commands obtained by the adjunct processor are to be processed by the adjunct processor. The adjunct processor obtains a command request of a requester. The command request includes at least one filtering indicator indicating at least one valid command type for processing by the adjunct processor for the requester. The adjunct processor determines using the at least one filtering indicator whether a command of the command request is valid for processing by the adjunct processor for the requester. Based on determining that the command is valid for processing by the adjunct processor, the command is processed by the adjunct processor.
    Type: Application
    Filed: December 15, 2020
    Publication date: June 16, 2022
    Inventors: Louis P. Gomes, Richard Victor Kisley
  • Publication number: 20220191039
    Abstract: Aspects of the invention include providing a clear key with an attribute that controls usage of the clear key. The clear key includes key data in at least a first 8-byte section and second and third 8-byte sections and a wrapping key for wrapping the clear key. The computer-implemented method further includes chaining the first, second and third 8-byte sections together with zeroes for those 8-byte sections that are unpopulated into chained key data, deriving encryption and authentication keys from the wrapping key, calculating an authentication code over the clear key and the attribute using the authentication key, executing encryption over the chained key data using the encryption key to generated encrypted chained key data and adding the authentication code, the attribute and the encrypted chained key data to form a key block.
    Type: Application
    Filed: December 14, 2020
    Publication date: June 16, 2022
    Inventors: RICHARD VICTOR KISLEY, MICHAEL MIELE
  • Publication number: 20220169611
    Abstract: The present invention provides MDM2 inhibitor compounds of Formula I, wherein the variables are defined above, which compounds are useful as therapeutic agents, particularly for the treatment of cancers. The present invention also relates to pharmaceutical compositions that contain an MDM2 inhibitor.
    Type: Application
    Filed: February 15, 2022
    Publication date: June 2, 2022
    Inventors: Michael D. Bartberger, Ana Gonzalez Buenrostro, Hilary Plake Beck, Xiaoqi Chen, Richard Victor Connors, Jeffrey Deignan, Jason A. Dequette, I, John Eksterowicz, Benjamin Fisher, Brian M. Fox, Jiasheng Fu, Zice Fu, Felix Gonzalez Lopez De Turiso, Michael W. Gribble, Darin J. Gustin, Julie A. Heath, Xin Huang, XianYun Jiao, Michael G. Johnson, Frank Kayser, David John Kopecky, SuJen Lai, Yihong Li, Zhihong Li, Jiwen Liu, Jonathan D. Low, Brian S. Lucas, Zhihua Ma, Lawrence R. McGee, Josel McIntosh, Dustin L. McMinn, Julio C. Medina, Jeffrey Thomas Mihalic, Steven H. Olson, Yossup Rew, Philip M. Roveto, Daqing Sun, Xiaodong Wang, Yingcai Wang, Xuelei Yan, Ming Yu, Jiang Zhu
  • Publication number: 20210234681
    Abstract: At least one secure object of a security module is bound to a secure guest. A trusted component determines whether metadata of the secure guest includes a confidential binding attribute for the security module. Based on determining that the metadata includes the confidential binding attribute, the trusted component configures the security module for the secure guest in a select mode. The select mode prevents certain operations from being intercepted by a hypervisor associated with the secure guest. The trusted component intercepts a security module communication and performs a cryptographic operation on one or more secure objects of the security module communication using the confidential binding attribute to provide a cryptographic result. An outcome of the security module communication, which includes the cryptographic result, is provided to a receiver.
    Type: Application
    Filed: January 29, 2020
    Publication date: July 29, 2021
    Inventors: Reinhard Theodor Buendgen, Richard Victor Kisley, Volker Urban
  • Publication number: 20210232709
    Abstract: A security module, such as a cryptographic adapter, is reserved for a secure guest of a computing environment. The reserving includes binding one or more queues of the security module to the secure guest. The one or more queues are then managed based on one or more actions relating to the reservation.
    Type: Application
    Filed: January 29, 2020
    Publication date: July 29, 2021
    Inventors: Reinhard Theodor Buendgen, Volker Urban, Richard Victor Kisley, Jonathan D. Bradbury, Torsten Hendel, Harald Freudenberger, Benedikt Klotz, Klaus Werner, Markus Selve
  • Publication number: 20210179560
    Abstract: The present invention provides MDM2 inhibitor compounds of Formula I, wherein the variables are defined above, which compounds are useful as therapeutic agents, particularly for the treatment of cancers. The present invention also relates to pharmaceutical compositions that contain an MDM2 inhibitor.
    Type: Application
    Filed: August 3, 2020
    Publication date: June 17, 2021
    Inventors: Michael D. Bartberger, Ana Gonzalez Buenrostro, Hilary Plake Beck, Xiaoqi Chen, Richard Victor Connors, Jeffrey Deignan, Jason A. Duquette, I, John Eksterowicz, Benjamin Fisher, Brian M. Fox, Jiasheng Fu, Zice Fu, Felix Gonzalez Lopez De Turiso, Michael W. Gribble, Darin J. Gustin, Julie A. Heath, Xin Huang, XianYun Jiao, Michael G. Johnson, Frank Kayser, David John Kopecky, SuJen Lai, Yihong Li, Zhihong Li, Jiwen Liu, Jonathan D. Low, Brian S. Lucas, Zhihua MA, Lawrence R. McGee, Joel McIntosh, Dustin L. McMinn, Julio C. Medina, Jeffrey Thomas Mihalic, Steven H. Olson, Yossup Rew, Philip M. Roveto, Daqing Sun, Xiaodong Wang, Yingcai Wang, Xuelei Yan, Ming Yu, Jiang Zhu
  • Patent number: 10296886
    Abstract: A system and method for provisioning one or more value added services to a postpaid/prepaid mobile account and/or a postpaid/prepaid mobile device using a wireless communication device as a point-of-sale device, is disclosed.
    Type: Grant
    Filed: June 6, 2016
    Date of Patent: May 21, 2019
    Assignee: Utiba PTE, Ltd.
    Inventors: Richard Victor Matotek, Justin Misha Ho, Andrew Charles Barnham