Todd Carper - Cupertino CA 95014 David Hemmo - 75013 Paris, FR An Van Le - San Jose CA 95120
International Classification:
G06K 1906
US Classification:
235492, 235380
Abstract:
A set of related routines allows an application to be securely installed on, or de-installed from a smart card or other portable token. The capabilities of a true operating system on the smart card are used to facilitate installation/de-installation.
Method And System For The Secured Distribution Of Multimedia Titles
Amir Herzberg - Ramat Efal, IL Hugo Mario Krawczyk - Haifa, IL Shay Kutten - Haifa, IL An Van Le - San Jose CA Stephen Michael Matyas - Manassas VA Marcel Mordechay Yung - New York NY
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 900
US Classification:
713200, 713187
Abstract:
A method and system for detecting authorized programs within a data processing system. The present invention creates a validation structure for validating a program. The validation structure is embedded in the program and in response to an initiation of the program, a determination is made as to whether the program is an authorized program. The determination is made using the validation structure.
Secure Management Of Keys Using Extended Control Vectors
Stephen M. Matyas - Manassas VA Dennis G. Abraham - Concord NC William C. Arnold - Mahopac NY Donald B. Johnson - Manassas VA Ramesh K. Karne - Herndon VA An V. Le - Arlington VA Rostislaw Prymak - Dumfries VA Steve R. White - New York NY John D. Wilkins - Somerville VA
Assignee:
International Business Machines Coprporation - Armonk NY
International Classification:
H04L 902
US Classification:
380 25
Abstract:
A method and apparatus are disclosed for use in a data processing system which executes a program which outputs cryptographic service requests for operations with cryptographic keys which are associated with control vectors defining the functions which each key is allowed by its originator to perform. The improved method and apparatus enable the use of control vectors having an arbitrary length. It includes a control vector register having an arbitrary length, for storing a control vector of arbitrary length associated with an N-bit cryptographic key. It further includes a control vector checking means having an input coupled to the control vector register, for checking that the control vector authorizes the cryptographic function which is requested by the cryptographic service request. It further includes a hash function generator having an input coupled to the control vector register and an N-bit output, for mapping the control vector output from the control vector register, into an N-bit hash value. A key register is included for storing the N-bit cryptographic key.
Method To Establish And Enforce A Network Cryptographic Security Policy In A Public Key Cryptosystem
Stephen M. Matyas - Manassas VA Donald B. Johnson - Manassas VA An V. Le - Manassas VA Rostislaw Prymak - Dumfries VA William C. Martin - Concord NC William S. Rohland - Charlotte NC John D. Wilkins - Somerville VA
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04K 100
US Classification:
380 25
Abstract:
Device A in a public key cryptographic network will be constrained to continue to faithfully practice a security policy dictated by a network certification center, long after device A's public key PUMa has been certified. If device A alters its operations from the limits encoded in its configuration vector, for example by loading a new configuration vector, device A will be denied participation in the network. To accomplish this enforcement of the network security policy dictated by the certification center, it is necessary for the certification center to verify at the time device A requests certification of its public key PUMa, that device A is configured with the currently authorized configuration vector. Device A is required to transmit to the certification center a copy of device A's current configuration vector, in an audit record. the certification center then compares device A's copy of the configuration vector with the authorized configuration vector for device A stored at the certification center.
Method For Generating Public And Private Key Pairs Without Using A Passphrase
Stephen M. Matyas - Manassas VA Donald B. Johnson - Manassas VA An V. Le - Manassas VA Rostislaw Prymak - Dumfries VA John D. Wilkins - Somerville VA
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04K 100
US Classification:
380 30
Abstract:
A data processing system, program and method are disclosed for managing a public key cryptographic system which includes a public key, private key pair generator. The method includes the step of generating a first public key, private key pair using a first seed value known to a user, the first seed value being generated from a passphrase. A first random number is generated using the first seed value and applied to generating the first key pair. The method then generates a first control vector defining a first use of the first public key, private key pair. The method then continues with the step of generating a second public key, private key pair using a second seed value unknown to the user, the second seed value being a true random number. The second random number is generated using the second seed value in a pseudorandom number generator and applied to generating the second key pair. The method generates a second control vector defining a second use of the second public key, private key pair.
System And Method For Providing An Integrated Gas Stick
Richard S. Adachi - Fremont CA An Le - San Jose CA
Assignee:
Lam Research Corporation - Fremont CA
International Classification:
F16K 4900
US Classification:
137341
Abstract:
The present invention discloses a gas delivery apparatus for control of process and purge gases is disclosed that is suitable for use in a semiconductor processing system. The gas delivery apparatus includes a base plate integrating a printed circuit board and a heating layer. In addition, the gas delivery apparatus includes a plurality of gas stick components mounted on the base plate. Specific gas components are coupled to the integrated printed circuit board, which provides an electrical interface to the control electronics.
Data Cryptography Operations Using Control Vectors
Stephen M. Matyas - Manassas VA Dennis G. Abraham - Concord NC Donald B. Johnson - Manassas VA Ramesh K. Karne - Herndon VA An V. Le - Arlington VA Rostislaw Prymak - Dumfries VA Julian Thomas - Lagrange NY John D. Wilkins - Somerville VA Phil C. Yeh - Poughkeepsie NY
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 900
US Classification:
380 21
Abstract:
Data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorization for the uses of the key intended by the originator of the key. Among the uses specified by the control vector are limitations on encryption, decryption, authentication code generation and verification, translation of the user's data. Complex combinations of data manipulation functions are possible using the control vectors, in accordance with the invention. The system administrator can exercise flexibility in changing the implementation of his security policy by selecting appropriate control vectors in accordance with the invention. Complex scenarios such as encrypted mail box, session protection, file protection, ciphertext translation center, peer-to-peer ciphertext translation, message authentication, message authentication with non-repudiation and many others can be easily implemented by a system designer using the control vectors, in accordance with the invention.
Secure Key Management Using Control Vector Translation
Stephen M. Matyas - Manassas VA Dennis G. Abraham - Concord NC Donald B. Johnson - Manassas VA An V. Le - Arlington VA Rostislaw Prymak - Dumfries VA John D. Wilkins - Somerville VA Phil C. Yeh - Poughkeepsie NY
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04K 100
US Classification:
380 23
Abstract:
A cryptographic system and method is provided which accepts a key K encrypted under a key formed by exclusive-ORing a key-encrypting key KK with a first control vector C5 and outputs the same key K encrypted under a key formed by exclusive-ORing KK with a second control vector C6. The set (C5, C6) represents a mapping of the type and usage of the key K defined by the control vector C5 to the type and usage defined by the control vector C6. The set of allowable control vector mappings, that is from C5 to C6, are defined in a control vector translation table, which is specified in advance by authorized installation personnel.
Jan 2001 to 2000 Sr. Customer Service Lead/ Technical Support LeadUHP Healthcare Inglewood, CA Jun 1995 to Jan 2001 Healthcare Specialist/ Floor Support ManagerBank of America
Aug 1993 to Jun 1995 Research AnalystCali. State University of Fullerton Fullerton, CA Aug 1991 to May 1993 International Student Assistant
Education:
California State University of Fullerton Fullerton, CA 2001 to 2005 BA in PsychologyWebster University Irvine, CA 1998 to 2001 Master of Healthcare Administration in Business Administration
Skills:
Outstanding Team Player and Interpersonal Communicator; Strong Leadership and Technical Problem Solver; Great Motivator and Endless Compassion of Customer Service Excellence/ Certify Technician/ Speak Vietnamese Fluently.
Hopkins & Carley, A Law Corporation San Jose, CA Jul 2012 to Nov 2012 Litigation Case AssistantUC Davis Phi Alpha Delta Pre-Law
Apr 2011 to Jun 2012 Vice President and Professional ChairDistrict Attorney's Office of County of Sacramento Sacramento, CA Jan 2012 to May 2012 Undergraduate Intern
Education:
De Anza College Sep 2010 to Jun 2012 Law, Business Law, Intellectual Property LawUniversity of California Davis, CA Bachelor of Arts in Philosophy, Psychology
Skills:
LEGAL: LexisNexis, Westlaw, Summation, Relativity. COMPUTER: Microsoft Excel, Word, PowerPoint, Outlook, Access, Adobe Acrobat, WPM over 70
Global Equipment Services Fremont, CA 2008 to 2011 Field Service EngineerFujitsu, Ho Chi Minh City, Vietnam
2005 to 2008 PCB Design Engineer
Education:
Northwestern Polytechnic University Fremont, CA 2011 MBA in Project ManagementNational University Jun 2007 BAPedagogic Technical University Jun 2005 BSEE
San Jose, California San Francisco, California Mountain View, California Los Altos, California Stanford, California Chandler, Arizona Seattle, Washington Munich, Germany London, UK Chicago, IL Boston, MA Knoxville, TN Songkhla, Thailand
Work:
New Relic - Director of BD (2010) MMV - Director of BD (2009-2010) BCG - Consultant (2007-2009) Intel Corporation - Lots of stuff (2001-2007)
Education:
Harvard Business School - MBS, Stanford University - BSEE, Notre Dame San Jose - Highschool, Morrill Middle School - Junior High
About:
Ankle, missankle, anktown, shankles, it's me!
Bragging Rights:
Still kicking
An Le
Work:
IIT - Math TA IIT - Research
Education:
Illinois Institute of Technology - Biomedical Engineering
Relationship:
Single
About:
Right now I don't have much to say about myself. The best way to know me is TALKING TO ME:)
Tagline:
I like simple, and I try to make things as simple as possible.
Bragging Rights:
I am a small girl in a big big world
An Le
Work:
Tinh uy Gia Lai Huyen Krong Pa - CBDA 03 (2010)
Education:
University Tay Nguyen - Kinh te Nong Lam
Relationship:
Single
Bragging Rights:
Dang di lam, chua kiem dc anh nao de bat nat huuuuuuuuuuuuu
An Le
Lived:
Davis, CA San Jose, CA
Education:
University of California, Davis - Philosophy, Psychology, Independence High
An Le
Work:
An Le Studio - Photographer (2010)
Education:
SCAD - Photography
Tagline:
The Photographer
An Le
Lived:
Washington, DC
Education:
Marymount University - MA, Human Resource Mgmt, Rutgers University - History