Patents by Inventor Trent Jaeger

Trent Jaeger has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070239979
    Abstract: A scheme for protecting policy state information during the lifetime of a virtual machine is presented. In order to protect and preserve the policy state information of the virtual machine, a process creates a source policy, a mapping policy, and a binary policy. These polices are all different representations of a security policy. The different policy representations are chained together via cryptographic hashes.
    Type: Application
    Filed: March 29, 2006
    Publication date: October 11, 2007
    Applicant: International Business Machines Corporation
    Inventors: Stefan Berger, Trent Jaeger, Ronald Perez, Reiner Sailer, Enriquillo Valdez
  • Publication number: 20070162976
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Application
    Filed: January 10, 2006
    Publication date: July 12, 2007
    Applicant: International Business Machines Corporation
    Inventors: Kay Anderson, Pau-Chen Cheng, Mark Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent Jaeger, Paul Karger, Zhen Liu, Ronald Perez, Anton Riabov, Pankaj Rohatgi, Angela Schuett, Michael Steiner, Grant Wagner
  • Publication number: 20070107046
    Abstract: The present invention provides a computer-implemented method system and program product for remotely verifying (e.g., analytic) integrity of a system. Specifically, at startup of the system an access control policy that sets forth information flows within the system is read and a set of trusted subjects that interact with a target application in the system is determined. Based on the access information flows and the set of trusted subjects, an information flow graph of the system is constructed. At runtime of the target application, runtime information and program code loaded into the set of trusted subjects are measured. Measuring the program code that is loaded allows the remote party to verify that the program code is “expected” program code for the set of trusted subjects.
    Type: Application
    Filed: November 7, 2005
    Publication date: May 10, 2007
    Applicant: International Business Machines Corporation
    Inventors: Trent Jaeger, Reiner Sailer, Leendert Van Doorn
  • Publication number: 20060253709
    Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range.
    Type: Application
    Filed: May 6, 2005
    Publication date: November 9, 2006
    Inventors: Pau-Chen Cheng, Shai Halevi, Trent Jaeger, Paul Karger, Ronald Perez, Pankaj Rohatgi, Angela Schuett, Michael Steiner, Grant Wagner
  • Publication number: 20060248519
    Abstract: A unified program analysis framework that facilitates the analysis of complex multi-language software systems, analysis reuse, and analysis comparison, by employing techniques such as program translation and automatic results mapping, is presented. The feasibility and effectiveness of such a framework are demonstrated using a sample application of the framework. The comparison yields new insights into the effectiveness of the techniques employed in both analysis tools. These encouraging results yield the observation that such a unified program analysis framework will prove to be valuable both as a testbed for examining different language analysis techniques, and as a unified toolset for broad program analysis.
    Type: Application
    Filed: May 2, 2005
    Publication date: November 2, 2006
    Applicant: IBM Corporation
    Inventors: Trent Jaeger, Lawrence Koved, Liangzhao Zeng, Xiaolan Zhang