Patents by Inventor W. Arnold

W. Arnold has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170161510
    Abstract: Customer content is securely loaded on a field programmable gate array (FPGA) located on a secure cryptography card. The customer content is loaded such that it may not be extracted. A customer obtains a secure cryptography card that includes a field programmable gate array and a master key generated by the secure cryptography card. The customer loads customer specific content on the field programmable gate array, wherein, based on the loading, the customer specific content is secure from extraction via the master key by at least entities other than the customer.
    Type: Application
    Filed: February 23, 2017
    Publication date: June 8, 2017
    Inventors: Todd W. Arnold, Mark A. Check, Vincenzo Condorelli
  • Patent number: 9647842
    Abstract: A session key is negotiated to secure a user session executed in a host computer. An electronic hardware security module (HSM) located in the host computer generates a first session key. A smart card generates a second session key that matches the first session key. An encrypted copy of the second session key is communicated to an electronic host application module installed in the host computer. The electronic host application module decrypts the encrypted session key to obtain a copy of the session key such that the first and second session keys possessed by the smart card, the host application module and the HSM match one another.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: May 9, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Todd W. Arnold, Richard V. Kisley, Michael J. Miele
  • Patent number: 9633212
    Abstract: A method, computer program product, and system for selecting and generating a key to perform a cryptographic operation are described. The method includes receiving one or more inputs representing criteria for the key, the one or more inputs excluding an explicit identification of the key and one of the one or more inputs specifying the cryptographic operation; retrieving, from a memory device, information corresponding with the one or more inputs; selecting and generating the key based on the one or more inputs and the information; and performing the cryptographic operation using the key.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: April 25, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Todd W. Arnold, Elizabeth A. Dames, Charles D. Helfenberger, Richard V. Kisley, Jimmie R. Mayfield, Jr.
  • Patent number: 9607159
    Abstract: A method, computer program product, and system for selecting and generating a key to perform a cryptographic operation are described. The method includes receiving one or more inputs representing criteria for the key, the one or more inputs excluding an explicit identification of the key and one of the one or more inputs specifying the cryptographic operation; retrieving, from a memory device, information corresponding with the one or more inputs; selecting and generating the key based on the one or more inputs and the information; and performing the cryptographic operation using the key.
    Type: Grant
    Filed: December 10, 2014
    Date of Patent: March 28, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Todd W. Arnold, Elizabeth A. Dames, Charles D. Helfenberger, Richard V. Kisley, Jimmie R. Mayfield, Jr.
  • Publication number: 20170053074
    Abstract: A system is disclosed using a data-driven approach to objectively measure the diagnostic accuracy and value of diagnostic imaging reports using data captured routinely as part of the electronic health record. The system further utilizes the evaluation of the diagnostic accuracy of individual radiologists (imagers), subspecialty sections, modalities, and entire departments based on a comparison against a “precision diagnosis” rendered by other clinical data sources such as pathology, surgery, laboratory tests, etc.
    Type: Application
    Filed: September 1, 2016
    Publication date: February 23, 2017
    Applicant: THE REGENTS OF THE UNIVERSITY OF CALIFORNIA
    Inventors: Dieter Enzmann, William Hsu, Corey W. Arnold, Alex A.T. Bui
  • Publication number: 20160373259
    Abstract: A session key is negotiated to secure a user session executed in a host computer. An electronic hardware security module (HSM) located in the host computer generates a first session key. A smart card generates a second session key that matches the first session key. An encrypted copy of the second session key is communicated to an electronic host application module installed in the host computer. The electronic host application module decrypts the encrypted session key to obtain a copy of the session key such that the first and second session keys possessed by the smart card, the host application module and the HSM match one another.
    Type: Application
    Filed: September 9, 2016
    Publication date: December 22, 2016
    Inventors: Todd W. Arnold, Richard V. Kisley, Michael J. Miele
  • Publication number: 20160357974
    Abstract: A method, computer program product, and system for selecting and generating a key to perform a cryptographic operation are described. The method includes receiving one or more inputs representing criteria for the key, the one or more inputs excluding an explicit identification of the key and one of the one or more inputs specifying the cryptographic operation; retrieving, from a memory device, information corresponding with the one or more inputs; selecting and generating the key based on the one or more inputs and the information; and performing the cryptographic operation using the key.
    Type: Application
    Filed: August 26, 2016
    Publication date: December 8, 2016
    Inventors: Todd W. Arnold, Elizabeth A. Dames, Charles D. Helfenberger, Richard V. Kisley, Jimmie R. Mayfield, Jr.
  • Publication number: 20160321662
    Abstract: Customer content is securely loaded on a field programmable gate array (FPGA) located on a secure cryptography card. The customer content is loaded such that it may not be extracted. A customer obtains a secure cryptography card that includes a field programmable gate array and a master key generated by the secure cryptography card. The customer loads customer specific content on the field programmable gate array, wherein, based on the loading, the customer specific content is secure from extraction via the master key by at least entities other than the customer.
    Type: Application
    Filed: April 28, 2015
    Publication date: November 3, 2016
    Inventors: Todd W. Arnold, Mark A. Check, Vincenzo Condorelli
  • Patent number: 9485091
    Abstract: Embodiments relate to negotiating a session key to secure a user session executed in a host computer. An electronic hardware security module (HSM) located in the host computer generates a first session key. A smart card generates a second session key that matches the first session key. An encrypted copy of the second session key is communicated to an electronic host application module installed in the host computer. The electronic host application module decrypts the encrypted session key to obtain a copy of the session key such that the first and second session keys possessed by the smart card, the host application module and the HSM match one another.
    Type: Grant
    Filed: May 1, 2014
    Date of Patent: November 1, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Todd W. Arnold, Richard V. Kisley, Michael J. Miele
  • Patent number: 9471796
    Abstract: A method, computer program product, and system for selecting and generating a key to perform a cryptographic operation are described. The method includes receiving one or more inputs representing criteria for the key, the one or more inputs excluding an explicit identification of the key and one of the one or more inputs specifying the cryptographic operation; retrieving, from a memory device, information corresponding with the one or more inputs; selecting and generating the key based on the one or more inputs and the information; and performing the cryptographic operation using the key.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: October 18, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Todd W. Arnold, Elizabeth A. Dames, Charles D. Helfenberger, Richard V. Kisley, Jimmie R. Mayfield, Jr.
  • Patent number: 9473299
    Abstract: Embodiments relate to negotiating a session key to secure a user session executed in a host computer. An electronic hardware security module (HSM) located in the host computer generates a first session key. A smart card generates a second session key that matches the first session key. An encrypted copy of the second session key is communicated to an electronic host application module installed in the host computer. The electronic host application module decrypts the encrypted session key to obtain a copy of the session key such that the first and second session keys possessed by the smart card, the host application module and the HSM match one another.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: October 18, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Todd W. Arnold, Richard V. Kisley, Michael J. Miele
  • Patent number: 9415939
    Abstract: A chain driven by two sprockets spaced a short distance apart along their common axial centerline. The chain includes elongated pins that extend beyond the outer surfaces of the chain link plates, on both sides, by a distance about equal to the width of the spaced apart sprockets. The chain is aligned midway between the sprockets, and the sprocket teeth drive on the extended portion of the chain pins. Where a flight is attached to the chain links, the pins are extended still further, to fit into the indentations or holes in the flights. This provides an exposed length of each pin in alignment with the sprocket on each side for driving purposes. The chain has a piece extending between the plates to reduce the likelihood of a pin extending further outside of one side plate or the other. A shoulder on the pin further reduces the likelihood of this happening.
    Type: Grant
    Filed: February 3, 2015
    Date of Patent: August 16, 2016
    Assignee: Joy MM Delaware, Inc.
    Inventors: Randy W. Arnold, James A. Krellner, Michael L. O'Neill
  • Publication number: 20160224795
    Abstract: In one embodiment, a computer-implemented method includes extracting first key derivation data from a first row of data to be stored in a database, where the database includes two or more rows of data. A first encryption subkey is generated, by a computer processor, by combining the first key derivation data with a static key. One or more sensitive fields in each row of the two or more rows of the database are encrypted using a unique corresponding encryption subkey for the row, and the first encryption subkey is unique to the first row among the two or more rows of the database. The one or more sensitive fields in the first row of data are encrypted with format-preserving encryption using the first encryption subkey. The first row of data, including the encrypted one or more sensitive fields, are stored in the database.
    Type: Application
    Filed: January 29, 2015
    Publication date: August 4, 2016
    Inventors: Todd W. Arnold, John C. Dayka, Steven R. Hart, Geoffrey G. Jackson, Eysha S. Powers, James W. Sweeny
  • Publication number: 20160226659
    Abstract: An aspect of cipher text translation includes a memory configured to store predetermined conditions for performing an encryption operation, and a processor communicatively coupled to the memory. The processor is configured to execute computer readable instructions. The computer readable instructions include determining through analysis of an inbound key and an outbound key of the encryption operation that the encryption operation includes a translation from a first class of encryption to a second class of encryption. The second class of encryption is determined to be weaker than the first class of encryption. The instructions also include applying the predetermined conditions to the input key and the output key and authorizing the translation via the processor, based on the applying, when aspects of the predetermined conditions are satisfied.
    Type: Application
    Filed: April 12, 2016
    Publication date: August 4, 2016
    Inventors: Todd W. Arnold, Elizabeth A. Dames, Mark D. Marik
  • Publication number: 20160224802
    Abstract: In one embodiment, a computer-implemented method includes extracting first key derivation data from a first row of data to be stored in a database, where the database includes two or more rows of data. A first encryption subkey is generated, by a computer processor, by combining the first key derivation data with a static key. One or more sensitive fields in each row of the two or more rows of the database are encrypted using a unique corresponding encryption subkey for the row, and the first encryption subkey is unique to the first row among the two or more rows of the database. The one or more sensitive fields in the first row of data are encrypted with format-preserving encryption using the first encryption subkey. The first row of data, including the encrypted one or more sensitive fields, are stored in the database.
    Type: Application
    Filed: September 3, 2015
    Publication date: August 4, 2016
    Inventors: Todd W. Arnold, John C. Dayka, Steven R. Hart, Geoffrey G. Jackson, Eysha S. Powers, James W. Sweeny
  • Publication number: 20160215620
    Abstract: A cutting bit assembly includes a block, a bit sleeve, and a seal. The block includes a first bore and a fluid passage. The fluid passage includes a first portion and a second portion in fluid communication with the first portion. The first portion is oriented obliquely with respect to the first bore, and the second portion extends at least partially around the perimeter of the first bore. The bit sleeve includes a shank, a flange, and a second bore extending through the shank and the flange. The shank is positioned within the first bore of the block such that a surface of the flange engages a first end surface of the block. The seal is positioned between the second portion of the fluid passage and the shank to prevent contact between a fluid in the fluid passage and the outer surface of the shank.
    Type: Application
    Filed: January 28, 2015
    Publication date: July 28, 2016
    Inventors: Randy W. Arnold, Michael L. O'Neill
  • Publication number: 20160171221
    Abstract: A method, computer program product, and system for selecting and generating a key to perform a cryptographic operation are described. The method includes receiving one or more inputs representing criteria for the key, the one or more inputs excluding an explicit identification of the key and one of the one or more inputs specifying the cryptographic operation; retrieving, from a memory device, information corresponding with the one or more inputs; selecting and generating the key based on the one or more inputs and the information; and performing the cryptographic operation using the key.
    Type: Application
    Filed: December 10, 2014
    Publication date: June 16, 2016
    Inventors: Todd W. Arnold, Elizabeth A. Dames, Charles D. Helfenberger, Richard V. Kisley, Jimmie R. Mayfield, JR.
  • Publication number: 20160171251
    Abstract: A method, computer program product, and system for selecting and generating a key to perform a cryptographic operation are described. The method includes receiving one or more inputs representing criteria for the key, the one or more inputs excluding an explicit identification of the key and one of the one or more inputs specifying the cryptographic operation; retrieving, from a memory device, information corresponding with the one or more inputs; selecting and generating the key based on the one or more inputs and the information; and performing the cryptographic operation using the key.
    Type: Application
    Filed: March 7, 2016
    Publication date: June 16, 2016
    Inventors: Todd W. Arnold, Elizabeth A. Dames, Charles D. Helfenberger, Richard V. Kisley, Jimmie R. Mayfield, JR.
  • Publication number: 20160173279
    Abstract: Embodiments relate to negotiating a session key to secure a user session executed in a host computer. An electronic hardware security module (HSM) located in the host computer generates a first session key. A smart card generates a second session key that matches the first session key. An encrypted copy of the second session key is communicated to an electronic host application module installed in the host computer. The electronic host application module decrypts the encrypted session key to obtain a copy of the session key such that the first and second session keys possessed by the smart card, the host application module and the HSM match one another.
    Type: Application
    Filed: March 7, 2016
    Publication date: June 16, 2016
    Inventors: Todd W. Arnold, Richard V. Kisley, Michael J. Miele
  • Patent number: 9369274
    Abstract: A computer system includes memory configured to store information regarding predetermined conditions of an encryption operation and a processor configured to analyze an inbound key and an outbound key of the encryption operation. The processor is also configured to determine that the encryption operation includes a translation from a first class of encryption to a second class of encryption based on the analyzing the inbound key and the outbound key, and to determine whether the translation is permitted based on the predetermined conditions.
    Type: Grant
    Filed: July 6, 2012
    Date of Patent: June 14, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Todd W. Arnold, Elizabeth A. Dames, Mark D. Marik