Patents by Inventor Steven A. Bade

Steven A. Bade has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20050257073
    Abstract: Multiple trusted platform modules within a data processing system are used in a redundant manner that provides a reliable mechanism for securely storing secret data at rest that is used to bootstrap a system trusted platform module. A hypervisor requests each trusted platform module to encrypt a copy of the secret data, thereby generating multiple versions of encrypted secret data values, which are then stored within a non-volatile memory within the trusted platform. At some later point in time, the encrypted secret data values are retrieved, decrypted by the trusted platform module that performed the previous encryption, and then compared to each other. If any of the decrypted values do not match a quorum of values from the comparison operation, then a corresponding trusted platform module for a non-matching decrypted value is designated as defective because it has not been able to correctly decrypt a value that it previously encrypted.
    Type: Application
    Filed: April 29, 2004
    Publication date: November 17, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Steven Bade, Linda Betz, Andrew Kegel, David Safford, Leendert Doorn
  • Publication number: 20050246525
    Abstract: An architecture for a distributed data processing system comprises a system-level service processor along with one or more node-level service processors; each are uniquely associated with a node, and each is extended to comprise any components that are necessary for operating the nodes as trusted platforms, such as a TPM and a CRTM in accordance with the security model of the Trusted Computing Group. These node-level service processors then inter-operate with the system-level service processor, which also contains any components that are necessary for operating the system as a whole as a trusted platform. A TPM within the system-level service processor aggregates integrity metrics that are gathered by the node-level service processors, thereafter reporting integrity metrics as requested, e.g., to a hypervisor, thereby allowing a large distributed data processing system to be validated as a trusted computing environment while allowing its highly parallelized initialization process to proceed.
    Type: Application
    Filed: April 29, 2004
    Publication date: November 3, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Steven Bade, Ryan Catherman, James Hoff, William Terrell
  • Publication number: 20050246521
    Abstract: A method is presented for implementing a trusted computing environment within a data processing system. A hypervisor is initialized within the data processing system, and the hypervisor supervises a plurality of logical, partitionable, runtime environments within the data processing system. The hypervisor reserves a logical partition for a hypervisor-based trusted platform module (TPM) and presents the hypervisor-based trusted platform module to other logical partitions as a virtual device via a device interface. Each time that the hypervisor creates a logical partition within the data processing system, the hypervisor also instantiates a logical TPM within the reserved partition such that the logical TPM is anchored to the hypervisor-based TPM. The hypervisor manages multiple logical TPM's within the reserved partition such that each logical TPM is uniquely associated with a logical partition.
    Type: Application
    Filed: April 29, 2004
    Publication date: November 3, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Steven Bade, Ryan Catherman, James Hoff, Nia Kelley, Emily Ratliff
  • Publication number: 20050246552
    Abstract: A method, an apparatus, a system, and a computer program product is presented for virtualizing trusted platform modules within a data processing system. A virtual trusted platform module along with a virtual endorsement key is created within a physical trusted platform module within the data processing system using a platform signing key of the physical trusted platform module, thereby providing a transitive trust relationship between the virtual trusted platform module and the core root of trust for the trusted platform. The virtual trusted platform module can be uniquely associated with a partition in a partitionable runtime environment within the data processing system.
    Type: Application
    Filed: April 29, 2004
    Publication date: November 3, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Steven Bade, Linda Betz, Andrew Kegel, Michael Kelly, William Terrell
  • Publication number: 20050234909
    Abstract: A method, computer program product, and a data processing system for logging audit events in a data processing system. A sequence of audit records including a final audit record are written to a first log file stored by a data processing system. A respective first hash value of each audit record is calculated. Responsive to calculating each respective first hash value, a corresponding second hash value is calculated from the first hash value and a value of a register associated with the data processing system. The second hash value is written to the register. A second log file is opened in response to closing the first log file. A final second hash value corresponding to a first hash value of the final audit record is written to a first record of the second log file.
    Type: Application
    Filed: April 15, 2004
    Publication date: October 20, 2005
    Applicant: International Business Machines Corporation
    Inventors: Steven Bade, Ryan Catherman, James Hoff, Nia Kelley, Emily Ratliff
  • Patent number: 6898628
    Abstract: The present invention is embodied in a system and method for providing positional authentication for client-server systems, such as extranets. In general, an authentication system of the present invention controls and authenticates access rights to a host server from a client machine that desires access to the host server via a network connection, such as an extranet connection. Specifically, the present invention includes a client machine coupled to a host server, via any suitable connection, such as an extranet, and a wireless positioning system, such as a global positioning satellite (GPS). The client machine can be any suitable client computer machine, such as a desktop computer, portable notebook computer or the like. The client machine includes a positioning receiver and a positional relation module. The host server includes an authentication module with predefined access parameters for standard and positional authentication.
    Type: Grant
    Filed: March 22, 2001
    Date of Patent: May 24, 2005
    Assignee: International Business Machines Corporation
    Inventors: Steven A. Bade, Robert H. LeGrand, III, Mark-David J. McLaughlin
  • Publication number: 20050039100
    Abstract: A method and system for automatic address error recovery in an electronic mail system where electronic mail messages are transferred by identifying an address which includes a user name and a domain name which includes a top level domain suffix. In the event an electronic mail message destination cannot be determined, likely appropriate destinations are automatically determined by systematically determining common alternate spellings of the user name, likely alternate domain names or an alternate top level domain suffix. Alternately, a table of expired addresses and corresponding new addresses can be maintained and examined to determine a likely appropriate address. At least one likely appropriate address is presented to a sender and the electronic mail message is then transmitted to a destination by the sender.
    Type: Application
    Filed: August 14, 2003
    Publication date: February 17, 2005
    Inventors: Steven Bade, Janice Girouard, Emily Ratliff
  • Publication number: 20050010812
    Abstract: A method and apparatus for automatically collecting, combining, and storing operating system environment information in a trusted location on the data processing system to provide a persistent store record of all operating system events leading up to the detection of a problem. The software for the ‘black box’ device is a combination of existing system software and logging capability with the added ‘black box’ specific software functions required to generate, time-stamp, cryptographically sign and log events to the secure logging device. Operating system environment information is collected, entered into a log, and stored in a trusted location on the system. The information in this log may be used to analyze system crashes caused by security breaches. Determinations can be made from the log if the system was at correct security software ‘patch’ level or if network services were incorrectly configured or enabled.
    Type: Application
    Filed: June 19, 2003
    Publication date: January 13, 2005
    Applicant: International Business Machines Corporation
    Inventors: William Terrell, Steven Bade
  • Patent number: 6778837
    Abstract: The present invention includes as one embodiment a method for automatically controlling access to a mobile computing device with pertinent data. The method includes predefining access parameters of the mobile computing device, determining an actual location of the mobile computing device and using the actual location of the mobile computing device to automatically control access to the mobile computing device based on the predefined access parameters. Also, the method includes storing the predefined access parameters in a private Internet networked location, accessing and updating the predefined access parameters and sending the updated access parameters to the mobile computing device.
    Type: Grant
    Filed: March 22, 2001
    Date of Patent: August 17, 2004
    Assignee: International Business Machines Corporation
    Inventors: Steven A. Bade, Robert H. LeGrand, III, Mark-David J. McLaughlin
  • Publication number: 20030217258
    Abstract: A method, system and apparatus for securely transferring security relevant data items (SRDIs) between two hardware security modules (HSMs) attached to a computer system. When a first HSM needs to transfer SRDIs to a second HSM, it indicates so to the second HSM are provided. The second HSM then generates an ephemeral public key/private key pair and transfer the public key to the first HSM. The first HSM then uses the transferred public key to encrypt the SRDIs before transferring them to the second HSM. When generating the public key/private key pair, the first HSM also starts a timer. The timer is used to ascertain that the ephemeral keys are not used any longer than they should.
    Type: Application
    Filed: May 16, 2002
    Publication date: November 20, 2003
    Applicant: International Business Machines Corporation
    Inventor: Steven A. Bade
  • Publication number: 20030177401
    Abstract: A system and method for using a unique identifier for encryption key derivation is presented. An application sends a password and a request for an encryption key to a hardware security module (HSM). The HSM uses the password to generate a tied application data encryption key (ADEK). The tied ADEK includes an encryption key and a known value that is “tied” to the password. The HSM encrypts the tied ADEK with a hardware master key and sends it to the application. When the application requests to encrypt or decrypt data, the application sends the encrypted tied ADEK and a password to the HSM. The password corresponds to the password used to generate the tied ADEK. The HSM uses an identical hardware master key and the password to recover the ADEK. The HSM also verifies that the known value is correct.
    Type: Application
    Filed: March 14, 2002
    Publication date: September 18, 2003
    Applicant: International Business Machines Corporation
    Inventors: Todd Weston Arnold, Steven A. Bade
  • Publication number: 20030005282
    Abstract: A data processing system, method, and product are disclosed for pre-encrypting static information transmitted by secure Web sites. The data processing system includes a server computer system coupled to a client computer system utilizing a network. The server computer system receives a request for a secure Web page that is maintained by the server. The secure Web page includes dynamically-changing information and static information. The server encrypts and transmits the encrypted dynamically-changing information. The server determines whether the static information has been pre-encrypted. If the static information has been pre-encrypted, the server bypasses the encryption step and transmits the pre-encrypted static information.
    Type: Application
    Filed: June 27, 2001
    Publication date: January 2, 2003
    Applicant: International Business Machines Corporation
    Inventor: Steven A. Bade
  • Publication number: 20020138598
    Abstract: The present invention is embodied in a system and method for automatically and dynamically modifying the functionality of the mobile device based on positional data, such as modifying software applications running on the mobile devices. In general, the present invention allows the user of a mobile electronic device to receive information relative to a position, and to have this information modified as the position of the device changes. This is accomplished by automatically and dynamically tracking the electronic device, within a working domain, using a predefined coordinate system. Every portion of the domain is “live”, meaning that each portion can be associated with specific data. Thus, when the electronic device moves from position to position, data relevant to that position is accessed and used to automatically and dynamically modify applications running on the mobile electronic device.
    Type: Application
    Filed: March 22, 2001
    Publication date: September 26, 2002
    Applicant: International Business Machines Corporation
    Inventors: Steven A. Bade, Mark-David J. McLaughlin
  • Publication number: 20020138632
    Abstract: The present invention is embodied in a system and method for providing positional authentication for client-server systems, such as extranets. In general, an authentication system of the present invention controls and authenticates access rights to a host server from a client machine that desires access to the host server via a network connection, such as an extranet connection. Specifically, the present invention includes a client machine coupled to a host server, via any suitable connection, such as an extranet, and a wireless positioning system, such as a global positioning satellite (GPS). The client machine can be any suitable client computer machine, such as a desktop computer, portable notebook computer or the like. The client machine includes a positioning receiver and a positional relation module. The host server includes an authentication module with predefined access parameters for standard and positional authentication.
    Type: Application
    Filed: March 22, 2001
    Publication date: September 26, 2002
    Applicant: International Business Machines Corporation
    Inventors: Steven A. Bade, Robert H. LeGrand, Mark-David J. McLaughlin
  • Publication number: 20020137524
    Abstract: The present invention is embodied in a system and method for providing access to mobile devices based on positional data. Namely, an authentication system of the present invention controls and authenticates access rights to the mobile devices. In general, the present invention includes a mobile electronic device and a wireless positioning system, such as a global positioning satellite (GPS). The electronic mobile device can be any suitable portable electronic device, such as a wireless telephone, personal data assistant, portable notebook computer or the like. The electronic mobile device includes a positioning receiver and an authentication module.
    Type: Application
    Filed: March 22, 2001
    Publication date: September 26, 2002
    Applicant: International Business Machines Corporation
    Inventors: Steven A. Bade, Robert H. LeGrand, Mark-David J. McLaughlin