Patents by Inventor Timothy R. Seeger

Timothy R. Seeger has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11074348
    Abstract: A set of root keys is loaded as a first part of a secure boot process of a secure system. a first trusted key from a set of trusted keys is verified using a first root key from the set of root keys as a second part of the secure boot process. The set of trusted keys is loaded when an affirmative verification for a subset of trusted keys is received. The subset of trusted keys includes the first trusted key. As a third part of the secure boot process, an immutable portion of a file is validated using the first trusted key. As a fourth part of the secure boot process, the file is loaded when each portion of the file is successfully validated. The first, second, third, and fourth parts of the secure boot process occur before an integrity management configuration takes over the secure boot process.
    Type: Grant
    Filed: August 24, 2017
    Date of Patent: July 27, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Timothy V. Bolan, Patrick J. Callaghan, Pu Liu, Timothy R. Seeger
  • Publication number: 20190065750
    Abstract: A set of root keys is loaded as a first part of a secure boot process of a secure system. a first trusted key from a set of trusted keys is verified using a first root key from the set of root keys as a second part of the secure boot process. The set of trusted keys is loaded when an affirmative verification for a subset of trusted keys is received. The subset of trusted keys includes the first trusted key. As a third part of the secure boot process, an immutable portion of a file is validated using the first trusted key. As a fourth part of the secure boot process, the file is loaded when each portion of the file is successfully validated. The first, second, third, and fourth parts of the secure boot process occur before an integrity management configuration takes over the secure boot process.
    Type: Application
    Filed: August 24, 2017
    Publication date: February 28, 2019
    Applicant: International Business Machines Corporation
    Inventors: Timothy V. Bolan, Patrick J. Callaghan, Pu Liu, Timothy R. Seeger
  • Patent number: 7719976
    Abstract: Methods, apparatus, and computer program products for variable dynamic throttling of network traffic for intrusion prevention are disclosed that include initializing, as throttling parameters, a predefined time interval, a packet count, a packet count threshold, a throttle rate, a keepers count, and a discards count; starting a timer, the timer remaining on no longer than the predefined time interval; maintaining, while the timer is on, statistics including the packet count, the keepers count, and the discards count; for each data communications packet received by the network host, determining, in dependence upon the statistics and the throttle rate, whether to discard the packet and determining whether the packet count exceeds the packet count threshold; and if the packet count exceeds the packet count threshold: resetting the statistics, incrementing the throttle rate, and restarting the timer.
    Type: Grant
    Filed: May 24, 2007
    Date of Patent: May 18, 2010
    Assignee: International Business Machines Corporation
    Inventors: David A. Christenson, James R. Coon, Christopher T. Gloe, Daniel P. Kolz, Scott D. McCreadie, Timothy R. Seeger, Kyong J. Shim
  • Publication number: 20080291934
    Abstract: Methods, apparatus, and computer program products for variable dynamic throttling of network traffic for intrusion prevention are disclosed that include initializing, as throttling parameters, a predefined time interval, a packet count, a packet count threshold, a throttle rate, a keepers count, and a discards count; starting a timer, the timer remaining on no longer than the predefined time interval; maintaining, while the timer is on, statistics including the packet count, the keepers count, and the discards count; for each data communications packet received by the network host, determining, in dependence upon the statistics and the throttle rate, whether to discard the packet and determining whether the packet count exceeds the packet count threshold; and if the packet count exceeds the packet count threshold: resetting the statistics, incrementing the throttle rate, and restarting the timer.
    Type: Application
    Filed: May 24, 2007
    Publication date: November 27, 2008
    Inventors: David A. Christenson, James R. Coon, Christopher T. Gloe, Daniel P. Kolz, Scott D. McCreadie, Timothy R. Seeger, Kyong J. Shim