Robert John Paganetti

age ~59

from Scituate, MA

Also known as:
  • Robert J Paganetti
  • Robert Drew Paganetti
  • Robert D Paganetti
  • Bob J Paganetti
  • Rob J Paganetti
  • Robert J Pagnetti
  • Paganetti Paganetti
Phone and address:
273 Tilden Rd, Scituate, MA 02066
7815458016

Robert Paganetti Phones & Addresses

  • 273 Tilden Rd, Scituate, MA 02066 • 7815458016
  • Burlington, MA
  • Westford, MA
  • Hanover, MA
  • 13 Leonard Cir, Lowell, MA 01854 • 9784593780

Work

  • Company:
    Ibm
    Oct 2001
  • Position:
    Senior software engineer

Education

  • School / High School:
    University of Lowell- Lowell, MA
    Jan 1987
  • Specialities:
    MS in Electrical Engineering with Computer Science concentration

Us Patents

  • Method For Enabling An Administrator To Configure A Recovery Password

    view source
  • US Patent:
    8296827, Oct 23, 2012
  • Filed:
    Dec 29, 2005
  • Appl. No.:
    11/323986
  • Inventors:
    Robert J. Paganetti - Scituate MA, US
    David S. Kern - Billerica MA, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    H04L 29/06
  • US Classification:
    726 5
  • Abstract:
    A method is provided for a enabling a user to initiate a password protected backup copy of the user's credentials. The method includes providing a user with a credential store containing information relating to the user's identity, generating a different recovery password of any length for each recovery authority, encrypting the recovery password for each recovery authority, storing the encrypted recovery passwords in the credential store, and sending a copy of the information by the user from the credential store to a central repository.
  • System And Method For Storing User Credentials On A Server Copyright Notice

    view source
  • US Patent:
    20050138367, Jun 23, 2005
  • Filed:
    Dec 19, 2003
  • Appl. No.:
    10/741669
  • Inventors:
    Robert Paganetti - Scituate MA, US
    Alan Eldridge - Hollis NH, US
    Charles Kaufman - Sammamish WA, US
    Mary Zurko - Groton MA, US
    Katherine Emling - Woburn MA, US
    Richard Davies - Wayland MA, US
  • International Classification:
    H04L009/00
  • US Classification:
    713161000
  • Abstract:
    The invention relates generally secure mail operations. More particularly, the invention provides a method for managing a user security credential, the method comprising: storing, in a file contained in a data store communicatively coupled to a mail server, a security credential associated with a user; authorizing a client to access the data store according to an access permission associated with the user; retrieving the security credential from the file; and initiating a security-related mail operation from the client using the security credential without the security credential leaving the server.
  • System And Method For Managing Cross-Certificates Copyright Notice

    view source
  • US Patent:
    20050138388, Jun 23, 2005
  • Filed:
    Dec 19, 2003
  • Appl. No.:
    10/741315
  • Inventors:
    Robert Paganetti - Scituate MA, US
    Alan Eldridge - Hollis NH, US
    Charles Kaufman - Sammamish WA, US
  • International Classification:
    H04K001/00
  • US Classification:
    713185000
  • Abstract:
    The invention provides a method for managing cryptographically generated data tokens, the method comprising: decoding a data file to retrieve a first cryptographically generated data token, identifying a second cryptographically generated data token associated with the first data token, and updating the second data token according to a security preference related to a characteristic of the first or the second data token.
  • Method For Enabling A User To Initiate A Password Protected Backup Of The User's Credentials

    view source
  • US Patent:
    20070168656, Jul 19, 2007
  • Filed:
    Dec 29, 2005
  • Appl. No.:
    11/324026
  • Inventors:
    Robert Paganetti - Scituate MA, US
    David Kern - Billerica MA, US
  • International Classification:
    H04L 9/00
  • US Classification:
    713155000
  • Abstract:
    A method is provided for a enabling a user to initiate a password protected backup copy of the user's credentials. The method includes providing a user with a credential store containing information relating to the user's identity, generating a different recovery password of any length for each recovery authority, encrypting the recovery password for each recovery authority, storing the encrypted recovery passwords in the credential store, and sending a copy of the information by the user from the credential store to a central repository.
  • Method And System For Automating The Recovery Of A Credential Store

    view source
  • US Patent:
    20070255943, Nov 1, 2007
  • Filed:
    Apr 18, 2006
  • Appl. No.:
    11/379088
  • Inventors:
    David Kern - Billerica MA, US
    Shiu Poon - Cambridge MA, US
    Robert Paganetti - Scituate MA, US
  • International Classification:
    H04L 9/00
  • US Classification:
    713155000
  • Abstract:
    A system for automating the recovery of a credential store, in which client software generates a temporary key pair based on a new password, and sends client information including the user's name, the public half of the temporary key pair, and the host name of the client computer system to a server system, from which the client information is passed to a recovery process. The client software process displays a prompt indicating that the user should call a help desk. A help desk administrator verifies the user's identity and approves the user's request by causing an approval message to be sent to the recovery process. The recovery process obtains recovery information consisting of either the decryption key(s) for the credential store, or a decrypted copy of the credential store, and encrypts the recovery information using the temporary public key. The client process downloads the recovery information from the server, and decrypts it using private key of the temporary key pair. The credential store can then be decrypted using the recovery information if necessary, then re-encrypted based on the new password. The encrypted recovery information is stored on the server and re-used for a certain period of time, after which it is deleted, thus allowing multiple copies of the credential store to be conveniently recovered.
  • Extensible Seal Management For Encrypted Data

    view source
  • US Patent:
    20100115261, May 6, 2010
  • Filed:
    Nov 6, 2008
  • Appl. No.:
    12/266470
  • Inventors:
    Richard F. Annicchiarico - Nashua NH, US
    David S. Kern - Billerica MA, US
    Robert J. Paganetti - Scituate MA, US
  • Assignee:
    INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
  • International Classification:
    H04L 9/00
  • US Classification:
    713150
  • Abstract:
    Embodiments of the present invention address deficiencies of the art in respect to seal list management in decrypting encrypted data and provide a method, system and computer program product for extensible seal management for encrypted data. In an embodiment of the invention, a method for extensible seal management for encrypted data can include identifying multiple different seal hints of different seal hint formats for different seals in a seal list associated with encrypted data and selecting from amongst the multiple different seal hints, seal hints of a recognizable seal hint format. The method also can include filtering the seals in the seal list according to the selected seal hints and attempting decryption of the filtered seals with a decryption key specified by the selected seal hints to decrypt one of the filtered seals in order to reveal a bulk key. Finally, the method can include decrypting the encrypted data with the bulk key.
  • System And Method For Normalizing And Merging Credential Stores

    view source
  • US Patent:
    20100268747, Oct 21, 2010
  • Filed:
    Apr 17, 2009
  • Appl. No.:
    12/425860
  • Inventors:
    David Scott Kern - Billerica MA, US
    Richard Francis Annicchiarico - Nashua NH, US
    Nancy Ellen Kho - Belmont MA, US
    Robert John Paganetti - Scituate MA, US
  • International Classification:
    G06F 17/30
  • US Classification:
    707803, 707E17032, 707E17044
  • Abstract:
    One or more data structures are received by a computing device, wherein the one or more data structures include at least one or more user credentials. The one or more user credentials are normalized by the computing device to generate a first graph. One or more nodes of the first graph and one or more nodes of at least a second graph are analyzed by the computing device, wherein analyzing includes at least identifying a logical correlation between the one or more nodes of the first graph and the one or more nodes of at least the second graph. A third graph is generated by the computing device based, at least in part, upon the analysis of the one or more nodes of the first graph and the one or more nodes of at least the second graph. An output data structure is generated by the computing device based, at least in part, upon the third graph.
  • Secure Configuration Catalog Of Trusted Identity Providers

    view source
  • US Patent:
    20140068743, Mar 6, 2014
  • Filed:
    Aug 30, 2012
  • Appl. No.:
    13/599348
  • Inventors:
    Jane B. Marcus - Medford MA, US
    Alan D. Eldridge - Hollis NH, US
    David Scott Kern - Billerica MA, US
    Michael J. Kerrigan - Salem NH, US
    Patrick Charles Mancuso - Center Tuftonboro NH, US
    Robert John Paganetti - Scituate MA, US
  • Assignee:
    INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
  • International Classification:
    G06F 21/00
  • US Classification:
    726 8
  • Abstract:
    A secure database includes a catalog of information about one or more identity providers (IdPs) that are trusted by a service provider (SP) to authenticate users on the SP's behalf. The catalog securely stores one or more IdP configurations. An entry in the database stores information associated with the trusted IdP including artifacts to identify the IdP, artifacts used by the IdP for cryptographic operations, and a specification of one or more website(s) serviced by the trusted identity provider. Upon receipt by the SP of identity information representing a user that has authenticated to an IdP, information in the catalog of information is used to determine whether the IdP is trusted to authenticate the user on the service provider's behalf. The determination verifies that the SP uses the IdP and that a binding between an IdP identifier and at least one IdP cryptographic artifact is valid.

Resumes

Robert Paganetti Photo 1

Smart Cloud Notes Security Architect

view source
Location:
273 Tilden Rd, Scituate, MA 02066
Industry:
Information Technology And Services
Work:
Ibm
Smart Cloud Notes Security Architect, Domino Notes Security Architect


Smart Cloud Notes Security Architect
Education:
University of Massachusetts Lowell 1982 - 1986
Masters, Electrical Engineering, Mathematics
Robert Paganetti Photo 2

Robert Paganetti

view source
Location:
Scituate, MA
Education:
University of Connecticut 2012 - 2016
Robert Paganetti Photo 3

Computer Scientist

view source
Location:
Scituate, MA
Work:

Computer Scientist
Education:
University of Connecticut 2012 - 2016
Bachelors, Bachelor of Science, Computer Science
Skills:
Java
Microsoft Office
C
Php
Mysql
Latex
Robert Paganetti Photo 4

Robert Paganetti Scituate, MA

view source
Work:
IBM

Oct 2001 to 2000
Senior Software Engineer
Iris Associates
Westford, MA
Jul 2000 to Oct 2001
Software Architect
Iris Associates
Westford, MA
Jul 1996 to Jul 2000
Principal Engineer
Imagery Inc.
Lowell, MA
Jan 1994 to Jul 1996
Principal Engineer
Imagery, Inc.
Lowell, MA
Dec 1992 to Dec 1993
Senior Software Engineer
Wang Laboratories
Lowell, MA
Sep 1989 to Nov 1992
Senior Software Engineer
Wang Laboratories
Lowell, MA
Feb 1987 to Aug 1989
Software Engineer II
Education:
University of Lowell
Lowell, MA
Jan 1987 to Jan 1991
MS in Electrical Engineering with Computer Science concentration
University of Lowell
Lowell, MA
Jan 1982 to Jan 1986
BS graduated summa cum laude in Electrical Engineering with Mathematics Minor

Facebook

Robert Paganetti Photo 5

Robert Paganetti

view source

Youtube

R. Schumann "Belsazar" Konstantin Paganetti &...

Robert Schumann (1810 - 1856) "Belsazar" Op.57 Heinrich Heine (1797 - ...

  • Duration:
    4m 34s

What's The Difference Between The P2 and P3 T...

Ultimate Freedom This episode of Friday Q&As responds to a question ...

  • Duration:
    18m 59s

Simon & Garfunkel The Sound of Silence Anasta...

Paul Simon & Arthur Garfunkel "The Sound of Silence" from the album "W...

  • Duration:
    3m 15s

Robert Galston | Food for Thought

Robert Galston presents: Forgotten Architecture in Rural Manitoba on M...

  • Duration:
    1h 7m 10s

P-CON Lecture: Robert Vitalis - "The Hidden H...

"The Hidden History of Race in American International Relations" Deliv...

  • Duration:
    1h 22m 20s

G. Rossini "Duetto buffo di due gatti" Esther...

Gioachino Rossini (1792 - 1868) Duetto buffo di due gatti Esther Valen...

  • Duration:
    3m 3s

Belsazar, op. 57 (Robert Schumann/Heinrei... ...

The Vox Populi presents: Belsazar, op. 59Heinrich Heine's poetic recou...

  • Duration:
    4m 43s

Anti-Americanism

ORIGINALLY RECORDED May 15, 2006 Listen to Professors Robert Keohane a...

  • Duration:
    59m 49s

Myspace

Robert Paganetti Photo 6

Robert Paganetti

view source
Locality:
Coventry, Rhode Island
Gender:
Male
Birthday:
1940

Get Report for Robert John Paganetti from Scituate, MA, age ~59
Control profile