Paul D. Hand - Stanfordville NY, US George M. Harmuth - Hopewell Junction NY, US Gary T. Leonardi - Yorktown Heights NY, US Glenn M. Stefanski - Hopewell Junction NY, US Andrew P. Wyskida - Yorktown Heights NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G08B 13/14
US Classification:
3405721, 2291173, 62 451, 206701
Abstract:
A system and a method for safeguarding wafers and photomasks. The system includes a container for storing an article, the article being a wafer or a photomask; a flashing unit for flashing light with a pre-determined light pattern; an anti-theft unit capable of performing an anti-theft function, the anti-theft unit being attached to the container; and a trigger unit electrically connected to the anti-theft unit for triggering the anti-theft function of the anti-theft unit, in response to detecting the pre-determined light pattern of the flashing unit. The method includes providing a container having an anti-theft unit capable of performing an anti-theft function; storing an article in the container, the article being a wafer or a photomask; providing a flashing light with a pre-determined light pattern; detecting the pre-determined light pattern; and performing the anti-theft function by the anti-theft unit, in response to detecting the pre-determined light pattern.
Secure Access To A Private Network Through A Public Wireless Network
Marc Segre - Raleigh NC, US Andrew Paul Wyskida - Fishkill NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/00
US Classification:
726 15
Abstract:
A system, method and computer-program product for a client device to securely access a private network through a public wireless network. The system establishes a first network tunnel between the client device and a gateway of the public wireless network and then authenticates the client device with an authentication server of the private network using the first tunnel. The authentication is proxied by an authentication server of the public network. Once the authentication is successful, a second tunnel is established between the client device and a gateway of the private network for secure access by the client device to the private network.
Systems And Methods For Generating And Validating Configuration Files For Computing Devices
Eric James Barkie - Morrisville NC, US Gary Thomas Leonardi - LaGrangeville NY, US Andrew Paul Wyskida - Fishkill NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/32
US Classification:
726 7
Abstract:
Systems and methods are provided for real-time automated generating and validating configuration files for provisioning computing devices. For example, method for provisioning a computing device includes receiving a user request to configure a computing device to access a service, generating a device configuration file to enable access to the service, validating the configuration file before deploying the configuration file to the computing device by testing configuration settings of the configuration file against the service for which the configuration file is generated to access, and deploying the configuration file to the computing device when the configuration file is deemed valid.
Systems And Methods For Establishing Secure Virtual Private Network Communications Using Non-Privileged Vpn Client
Eric J. Barkie - Morrisville NC, US Benjamin L. Fletcher - Elmsford NY, US Andrew P. Wyskida - Fishkill NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 21/00
US Classification:
726 15
Abstract:
Systems and methods are provided for establishing secure VPN communications using processes executing in unprivileged user space. For example, systems and methods for establishing secure VPN communications implement user mode VPN clients and user mode network protocol stacks (e.g., TCP/IP stacks) that operate in user space without root access to an operating system of a computing device.
System And Method For Safeguarding Wafers And Photomasks
International Business Machines Corporation - Armonk NY, US George M. Harmuth - Hopewell Junction NY, US Gary T. Leonardi - Yorktown Heights NY, US Glenn M. Stefanski - Hopewell Junction NY, US Andrew P. Wyskida - Yorktown Heights NY, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G08B 13/14
US Classification:
3405721, 3405681
Abstract:
A system and a method for safeguarding wafers and photomasks. The system includes a container for storing an article, the article being a wafer or a photomask; a flashing unit for flashing light with a pre-determined light pattern; an anti-theft unit capable of performing an anti-theft function, the anti-theft unit being attached to the container; and a trigger unit electrically connected to the anti-theft unit for triggering the anti-theft function of the anti-theft unit, in response to detecting the pre-determined light pattern of the flashing unit. The method includes providing a container having an anti-theft unit capable of performing an anti-theft function; storing an article in the container, the article being a wafer or a photomask; providing a flashing light with a pre-determined light pattern; detecting the pre-determined light pattern; and performing the anti-theft function by the anti-theft unit, in response to detecting the pre-determined light pattern.
International Business Machines Corporation - Armonk NY, US Benjamin L. Fletcher - Elmsford NY, US Marco Pistoia - Amawalk NY, US John J. Ponzo - Yorktown Heights NY, US Andrew P. Wyskida - Fishkill NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/06
US Classification:
726 4
Abstract:
Systems and methods are provided for controlling access to a network. An access request is received from a client application running on a computing device for accessing a remote network. The access request is received over a secure virtual private network connection (VPN) connection established by a user-mode VPN client running in non-privileged user space of the computing device. The access request includes contextual information for use in authenticating a user to access a remote network, wherein the contextual information includes contextual information about the client application requesting access to the remote network. An authentication process is performed using the contextual information to authenticate the user, and a secure VPN connection is established between the client application and the remote network, if the user is authenticated.
Contemporaneous Facial Gesture And Keyboard Entry Authentication
- Armonk NY, US Neal KELLER - Pleasantville NY, US James R. KOZLOSKI - New Fairfield CY, US Matthew A. McCARTHY - Holly Springs NC, US Clifford A. PICKOVER - Yorktown Heights NY, US Andrew WYSKIDA - Fishkill NY, US
Assignee:
International Business Machines Corporation - Armonk NY
A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. The password may be shorted based upon the context of the authentication as well as any gestures occurring during password entry. The gestures may be learned by the restricted access device during the password entry process.
Contextual Contemporaneous Gesture And Keyboard Entry Authentication
- Armonk NY, US Neal KELLER - Pleasantville NY, US James R. KOZLOSKI - New Fairfield CY, US Matthew A. McCARTHY - Holly Springs NC, US Clifford A. PICKOVER - Yorktown Heights NY, US Andrew WYSKIDA - Fishkill NY, US
A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. The password may be shorted based upon the context of the authentication as well as any gestures occurring during password entry. The gestures may be learned by the restricted access device during the password entry process.