Deloy Pehrson Bitner - Glendale AZ Kim Clohessy - Scottsdale AZ Mikael Orn - Phoenix AZ
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1200
US Classification:
711103, 711170, 711 5, 707206, 36518511, 36518909
Abstract:
The invention provides a method for removing code (applications and data) from read-only memory, and compacting the remaining code in memory either as an application is deleted or when there is not sufficient room to hold a new application. One or more âspareâ memory segments are reserved for use during compaction. Where the code for removal shares a memory segment with other code that is not to be removed, the other code is copied to a spare memory segment, and then swapped back to its original location. The code can then be compacted to remove the âholesâ left by the erased code.
Technologies For Serializable Binary Data Distribution
- Santa Clara CA, US Deloy P. BITNER - Glendale AZ, US
International Classification:
H04L 9/06 H04L 9/32 G06F 16/9035 G06F 16/907
Abstract:
Technologies for binary data distribution include a source computing device and a recipient computing device. The source computing device profiles a binary file payload to generate a payload fingerprint and generates a text-encoded payload as a function of the binary file payload. The source computing device combines the text-encoded payload and metadata including the payload fingerprint to generate a message data structure, and serializes the message data structure to generate a serialized message. The source computing device may sign the text-encoded payload and the metadata to generate a signature included in the serialized message. The source computing device transmits the serialized message to the recipient computing device, which loads the text-encoded payload and the payload fingerprint from the serialized message, decodes the text-encoded payload to recover the binary file payload, and verifies the binary file payload with the payload fingerprint. Other embodiments are described and claimed.
Technologies For User-Mode Persistence Of Certificates And Keys In Resource-Constrained Devices
- Santa Clara CA, US Deloy P. BITNER - Glendale AZ, US
International Classification:
G06F 21/60 H04L 9/08 H04L 9/32
Abstract:
Technologies for secure certificate management include a computing device that receives a keystore command related to an encryption key, converts the keystore command into an encrypted database command, unlocks an encrypted database stored by the computing device with an obfuscated passphrase, and executes the encrypted database command. The encrypted database includes a key table to store binary copies of encryption keys and a metadata table to store metadata related to the encryption keys. The computing device returns a response to the keystore command in response to executing the encrypted database command. The keystore command may be received and the response may be returned via a command-line interface or a machine-to-machine interface. The computing device may load multiple encoded passphrase segments from corresponding predetermined file system locations, decode the encoded passphrase segments, and compound the decoded passphrase segments to generate the passphrase. Other embodiments are described and claimed.
Intel Corporation
Product Engineering and Tools Developer
Ibm 2003 - Jul 2013
Software Engineer
Object Technology International 1997 - 2003
Software Engineer
Poynting Systems 1989 - 1996
Member Technical Staff
Lynch Communications Systems 1983 - 1987
Manager and Senior Software Engineer
Education:
University of Utah 1977 - 1980
Bachelors, Bachelor of Science In Computer Science, Computer Science
Skills:
Embedded Systems Embedded Software Linux Arm Rtos Java Android Powerpc Vxworks Object Oriented Design Software Development Eclipse Software Engineering Software Design X86 Cvs Multithreading Mips Qnx Android Development Debugging Smalltalk Psos Brew Real Time Enterprise Architecture Nucleus
Interests:
Education
Youtube
Episode 8 ft. Sophie Bitner
Duration:
14m 54s
Southern Super Hub (Bitner, Brandner, Fiechtn...
Frank Anton, Siemens Jakob Bitner, Volt Storage Frederik Brantner, Mag...
Duration:
38m 10s
Workday and Ryan LLC
In this video, Senior Director of Finance Information Systems Justin B...
Duration:
2m 31s
#B2BTalks 2, Part 3 - Technology and Tools to...
Part 3 of #B2BTalks: How to Build a Sales and Marketing Machine Paneli...
Duration:
27m 11s
Prioritizing data, security, and observability.
Tim Eades, CEO of vArmour, sits down with Dave to talk about why all s...