David Carroll Challener - Raleigh NC Richard Alan Dayan - Wake Forest NC James Peter Ward - Raleigh NC Michael Vanover - Raleigh NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 900
US Classification:
713168, 713184, 713202
Abstract:
A method for associating a pass phrase with a secured public/private key pair is disclosed. A user public/private key pair is first established for a user. The user public/private key pair includes a user public key and a user private key. Then, the user public/private key pair is encrypted along with a random password, utilizing a chip public key. Next, a first symmetric key is generated. The random password is encrypted utilizing the first symmetric key. A first password is generated by hashing a first pass phrase. Finally, the first password is encrypted along with the first symmetric key, also utilizing the chip public key. As a result, a user can access the user private key to perform an authentication function by providing the first pass phrase.
Method For Associating A Password With A Secured Public/Private Key Pair
David Carroll Challener - Raleigh NC Richard Alan Dayan - Wake Forest NC James Peter Ward - Raleigh NC Michael Vanover - Raleigh NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 932
US Classification:
713184, 713183, 713202
Abstract:
A method for associating a password with a secured public/private key pair is disclosed. A user public/private key pair is first established for a user. The user public/private key pair includes a user public key and a user private key. Then, the user public/private key pair is encrypted along with a random password, utilizing a chip public key. Next, a first password is generated by hashing a pass phrase. Finally, the random password is encrypted along with the first password, also utilizing the chip public key. As a result, a user can assess the user private key to perform an authentication function by providing the pass phrase.
Method And System For Enabling Free Seating Using Biometrics Through A Centralized Authentication
Christopher Britton Gould - Raleigh NC, US Howard Jeffery Locker - Cary NC, US Andy Lloyd Trotter - Raleigh NC, US Michael T. Vanover - Raleigh NC, US James Peter Ward - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F011/30 H04L009/32
US Classification:
713186, 713185, 713182, 713156
Abstract:
A method for providing an authentication of a user of a computer system in a network is disclosed. The method comprises capturing biometric data of a user; encrypting and signing the biometric data with a private key and sending the encrypted and signed data to a central server in the network. The method further comprises accepting and verifying credentials associated with the signed and encrypted data from the server utilizing the public key from the server. The method further comprises installing the credentials into the computer if the credentials are verified. In a method and system in accordance with the present invention, a user can walk up to any client within an enterprise and have their locally captured biometric input authenticated at a central server. The user can then have their individual credentials securely imported to the local client for subsequent use during that time period, without needing any additional identification or memory token such as a smartcard.
Safely Restoring Previously Un-Backed Up Data During System Restore Of A Failing System
Philip Lee Childs - Raleigh NC, US Daryl Carvis Cromer - Apex NC, US Howard Jeffrey Locker - Cary NC, US Michael T. Vanover - Raleigh NC, US Steven R. Welch - Gilroy CA, US
Assignee:
Lenovo (Singapore) Pte Ltd. - Singapore
International Classification:
G06F 17/30
US Classification:
707204, 707 3, 707 8, 707 10, 707203, 707205
Abstract:
A method, computer program product and system for restoring previously un-backed up data during a system restore. A computing system may include a locked partition in its storage medium to store an alternate operating system and backed-up files. The alternate operating system may determine which files have been modified since the most recent backup and run a virus scan on those modified files. The alternate operating system may copy the modified files with no detected viruses as well as those modified files with a detected virus but cleaned by the virus scan. The backup files in the locked partition that have been modified since the most recent backup operation may be replaced with these uncorrupted modified files. In this manner, the system may be able to recover files since the most recent backup while ensuring at least in part that the restored files do not contain any viruses.
Remote Authentication Caching On A Trusted Client Or Gateway System
Philip Lee Childs - Raleigh NC, US Michael T Vanover - Raleigh NC, US
Assignee:
Lenovo Singapore Pte Ltd - Singapore
International Classification:
H04L 9/32
US Classification:
726 2, 726 3, 726 5, 726 18
Abstract:
In a system providing for user access of secure resources upon user authentication by a remote authentication server, a successful user authentication is saved locally for use when the authentication server is not available. The successful user authentication returns an authenticated credential which is stored on the local client utilizing a security method such as Public Key Infrastructure which prevents tampering with the credential. If a gateway machine provides connectivity between the client and the authentication server, the credential is also stored on the gateway.
Richard W. Cheston - Morrisville NC, US Michael T. Vanover - Raleigh NC, US Steven R. Welch - Gilroy CA, US
Assignee:
Lenovo (Singapore) Pte Ltd. - Singapore
International Classification:
H04L 9/32
US Classification:
726 16, 713 1, 713182, 726 2
Abstract:
The loss of a computer's primary O. S. password, BIOS password, or HDD password (or even an application password) is sensed by a secondary O. S. based on a number of failed log on attempts to the affected component. The password can be reset by having the secondary O. S. generate an intermediate password automatically, verify user authorization, and then make the intermediate password available to, e. g. , the primary O. S. , so that the affected component can be accessed and its password reset without help desk personnel intervention.
System And Method For Concurrent Wlan And Wpan Wireless Modes From A Single Device
Daryl Carvis Cromer - Apex NC, US Philip John Jakes - Durham NC, US Howard Jeffrey Locker - Cary NC, US Michael T. Vanover - Raleigh NC, US
Assignee:
Lenovo Singapore Pte. Ltd - Singapore
International Classification:
G06F 13/00
US Classification:
709227, 709219, 709250
Abstract:
A system and method for concurrent WLAN and WPAN wireless modes from a single device is presented. A client uses a Wi-Fi device's infrastructure mode to communicate in a WLAN environment and, during idle WLAN times, uses the Wi-Fi device's adhoc mode to communicate in a WPAN environment. The Wi-Fi device uses a watchdog timer to switch between infrastructure mode and adhoc mode. When the client's Wi-Fi device switches to infrastructure mode, the client's Wi-Fi device uses an infrastructure register and an infrastructure device driver to transfer data over the WLAN environment. Likewise, when the client's Wi-Fi device switches to adhoc mode, the client's Wi-Fi device uses an adhoc register and an adhoc device driver to transfer data over the WLAN environment. The client uses a code shim to act as a virtual device driver at times when either the infrastructure device driver or the adhoc device driver is inactive.
Remote Authentication Caching On A Trusted Client Or Gateway System
Philip Lee Childs - Raleigh NC, US Michael T. Vanover - Raleigh NC, US
Assignee:
Lenovo (Singapore) Pte. Ltd. - Singapore
International Classification:
G06F 15/16
US Classification:
726 12, 726 2, 726 5, 713182
Abstract:
In a system providing for user access of secure resources upon user authentication by a remote authentication server, a successful user authentication is saved locally for use when the authentication server is not available. The successful user authentication returns an authenticated credential which is stored on the local client utilizing a security method such as Public Key Infrastructure which prevents tampering with the credential. If a gateway machine provides connectivity between the client and the authentication server, the credential is also stored on the gateway.
Computer Architecture Leading Small Teams From Concept Validation To Business Unit Adoption Creative Problem Solving Technology Integration Cloud Computing Enterprise Software Looking at the Impossible From the Improbable Angle To Find A Way Storage Coaching and Mentoring Microsoft Office Microsoft Powerpoint Business Development Requirements Gathering Requirements Analysis Software Development Business Model Innovation Technology Transfer Pilot Projects Embedded Systems Idea Incubation Public Speaking Business Strategy Software Design Cross Functional Problem Solving Collaborative Problem Solving Root Cause Problem Solving Android Development Technology Incubation Business Innovation Technological Innovation Customer Driven Innovation New Technology Evaluation Business Opportunity Evaluation Software Contracts C++ Javascript Java Software Development Life Cycle Agile Methodologies Product Management Project Management Integration
Distinguished Engineer, Master Inventor And Visionary
Fairview High School (thru 1991) Camden AR 1985-1989
Community:
Tommy Kelley, Lisa Lovelace, Raymond Hamilton, David Elliott, Stacy Coke, Julie Garcia, Garrick Strickland, Sherri Henry, Felishia Browning, Christa Carver