Janice Girouard - Austin TX, US Dustin Kirkland - Austin TX, US Emily Ratliff - Austin TX, US Kent Yoder - Austin TX, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - ARMONK NY
International Classification:
H04K001/00
US Classification:
713183000
Abstract:
Exemplary embodiments of the present invention include a method for providing a password to an application. Such exemplary embodiments include receiving, from a user, a passkey event uniquely associated with one of a plurality of applications requiring a password, and receiving, from a user, a same master password for access to each of the plurality of applications, applying a hashing algorithm associated with the separate input event to the master password to generate an application specific password, and submitting the application specific password to the application for access by the user. In some embodiments, receiving, from a user, a passkey event uniquely associated with any given one of the plurality of applications includes receiving, from a user, an event created by a user's engaging a keyboard key.
Changing Access Permission Based On Usage Of A Computer Resource
Janice Girouard - Austin TX, US Emily Ratliff - Austin TX, US Kent Yoder - Austin TX, US Jerone Young - Austin TX, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - ARMONK NY
International Classification:
H04L009/00
US Classification:
726002000
Abstract:
Changing access permission based on usage of computer resources including maintaining records of a user's usage of computer resources in a security domain, the user having a scope of access permission for the computer resources; measuring the user's disuse of one or more of the computer resources in the security domain; and degrading the user's scope of access permission for the computer resources in dependence upon the user's disuse. Typical embodiments include receiving from a user a request for access to a requested computer resource, receiving from the user a request to upgrade the user's degraded scope of access permissions to grant access to the requested computer resource and upgrading, in dependence upon the user's request to upgrade the degraded scope of access permissions, the user's degraded scope of access permissions to grant access to the requested computer resource.
System For Paper-Free Verifiable Electronic Voting
Richard J. Cardone - Austin TX, US Michael A. Halcrow - Pflugerville TX, US Benjamin M. Landman - Cedar Park TX, US Kent Yoder - Austin TX, US
International Classification:
G07C 13/00
US Classification:
235386
Abstract:
An apparatus for a paper-free, verifiable, electronic voting system, comprising an electronic voting machine including at least one direct recording electronic device, at least one ballot summary, where each of the ballot summaries representing selections of a voter, at least one ballot verification subsystem that creates, displays, and stores said ballot summaries, at least one ballot summary storage repository for storing said ballot summaries as saved ballot summaries, and an optional network for communication among components of the electronic voting system.
Method For Paper-Free Verifiable Electronic Voting
Richard J. Cardone - Austin TX, US Michael A. Halcrow - Pflugerville TX, US Benjamin M. Landman - Cedar Park TX, US Kent Yoder - Austin TX, US
International Classification:
G07C 13/00
US Classification:
235386, 726 16
Abstract:
A method for a paper-free, verifiable, electronic voting system, the method comprising the steps of submitting votes by a voter using a direct-recording electronic voting machine, requesting a ballot summary from the direct-recording electronic voting machine, creating a ballot summary in a verification subsystem, displaying the ballot summary by the voting machine, casting a ballot by the voter, tallying votes by the electronic voting system, requesting the ballot summary be saved by the voting machine, saving the ballot summary securely by the verification subsystem, and displaying a cast ballot message on the voting machine.
Method For Electronic Voting Using A Trusted Computing Platform
Richard J. Cardone - Austin TX, US Michael A. Halcrow - Pflugerville TX, US Benjamin M. Landman - Cedar Park TX, US Kent Yoder - Austin TX, US
International Classification:
G07C 13/00
US Classification:
235386, 726 17
Abstract:
A method for voting in a trusted electronic voting system under the control of an election authority, the method comprising: casting a ballot having ballot information, the ballot information representing votes by a voter; receiving a request to cast the ballot by a voting machine, the voting machine running as a trusted computing platform; tallying the votes in a tally module; displaying the status of the vote tallying on the voting machine.
System For Electronic Voting Using A Trusted Computing Platform
Richard J. Cardone - Austin TX, US Michael A. Halcrow - Pflugerville TX, US Benjamin M. Landman - Cedar Park TX, US Kent Yoder - Austin TX, US
International Classification:
G07C 13/00
US Classification:
705 12, 235386
Abstract:
An apparatus for executing a trusted electronic voting system under the control of an election authority comprising: at least one electronic voting machine; an election configuration for the voting machine in the electronic voting system; and a trusted computing platform for the voting machine in the electronic voting system.
Systems, Methods And Computer Program Products For Generating Anonymous Assertions
Richard J. Cardone - Austin TX, US Michael A. Halcrow - Pflugerville TX, US Benjamin M. Landman - Cedar Park TX, US Kent E. Yoder - Austin TX, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 21/20
US Classification:
726 9
Abstract:
Systems, methods and computer program products for generating anonymous assertions. Exemplary embodiments include a method for generating anonymous assertions, the method comprising engaging anonymous role authentication via one or more authenticator services, generating an assertion token on a trusted assertion device that is booted into a trusted configuration, and processing the assertion and validating a right of the user to make the assertion for the event.
Techniques For Accessing Features Of A Hardware Adapter
JIANDI AN - ROUND ROCK TX, US OMAR CARDONA - CEDAR PARK TX, US MATTHEW R. OCHS - AUSTIN TX, US KENT E. YODER - AUSTIN TX, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - ARMONK NY
International Classification:
H04L 9/00
US Classification:
380277
Abstract:
A technique for accessing features of a hardware adapter includes reading a first key from a hardware adapter and attempting to decrypt the first key with a second key. In response to the second key successfully decrypting the first key: encrypted code from the hardware adapter is read; the encrypted code is decrypted with the decrypted first key to generate unencrypted code; and a default code in an executable flash sector of the hardware adapter is over-written with the unencrypted code. In this case, the unencrypted code facilitates access to at least one feature of the hardware adapter that is customer specific. In response to the second key not successfully decrypting the first key, the default code in the executable flash sector of the hardware adapter is not over-written. In this case, the default code facilitates access to one or more features that are not customer specific.
Cisco Jun 1, 2013 - May 2015
Software Engineer
Cisco Jun 1, 2013 - May 2015
Technical Lead, Security Research
Ibm Jun 2001 - May 2013
Advisory Software Engineer
Education:
Purdue University 1998 - 2001
Bachelors, Bachelor of Science, Computer Science
Skills:
Trusted Computing Openssl Cryptography Operating Systems Aix Linux C Shell Scripting Servers Linux Kernel Kernel Drivers Public Key Cryptography Pkcs#11 Open Source Development Automake Autoconf Vim Technical Documentation Software Development Open Source Unix Software Engineering Bash Security Ibm Aix Agile Methodologies Tcp/Ip
Jun 2008 to 2000 Staff Software Engineer - Linux Technology Center Security TeamInternational Business Machines Austin, TX Jan 2008 to Jun 2010 Staff Software Engineer - AIX Communications Device Driver TeamInternational Business Machines Austin, TX May 2001 to Oct 2002 Staff Software Engineer - Linux Technology Center Network Device Driver Team
Education:
Purdue University West Lafayette, IN 2001 Bachelor of Science in Computer Science
Name / Title
Company / Classification
Phones & Addresses
Kent Yoder Owner
Deer Creek Landscapes Lawn/Garden Services
1818 S 750 W, Delphi, IN 46923
Kent Yoder Principal
Y&M Nursery LLC Business Services at Non-Commercial Site
1818 S 750 W, Delphi, IN 46923
Youtube
SAFE and Sound: A Holiday Benefit Concert
December 15th, 2019 AISD Performing Arts Center Black Box Theater Pres...
Duration:
1h 10m 34s
1988C
Duration:
1h 4m 32s
1986A
0:02 - Lauretta, Mary Kay, Molly, Kristina at Grandpa Toad's house (Cl...
Duration:
1h 2m 33s
Smoked Meatloaf
shorts Join us for a zesty smoked meatloaf with a ton of flavor. Watch...
Duration:
1m
Joshua Yoder - Fox News - Tucker Carlson - 10...
Joshua Yoder - Fox News - Tucker Carlson - 10.11.21.