Inventors’ Corner: Inventing a Secure Planet

Share this post:

Cybersecurity is a top priority for federal, state, and local governments worldwide, and it is increasingly becoming a primary concern for critical infrastructure industries, such as utilities and telecommunications.

To help clients prepare for emerging cybersecurity challenges, IBM offers a wide range of security technologies and services developed to address the current and future state of security within their information infrastructure.

IBM draws upon it history of invention and innovation to provide this unique combination of technology, industry expertise and services needed to address the cybersecurity concerns and requirements of federal, state, and local governments worldwide.

Below is a sampling of the more than 3,000 patented IBM inventions that can enable clients to secure their business information and processes:

Method for implementing access control for queries to a content management systemU.S. Patent #7,392,246 – this invention describes a technique for implementing access control for queries to a content management system and method for maintaining security rules that limit document and folder access.

Security message authentication control instructionU.S. Patent #7,356,710 – this invention describes a method for using a cryptographic key to compute an authentication code that executes data storage of a computing environment.

System and method for authenticating and configuring computing devicesU.S. Patent #7,287,269 – this invention enables dynamic authentication of computers on a network to increase security.

Keyless encryption of messages using challenge responseU.S. Patent #6,535,980 – this invention provides a method of message encryption to allow secure transmission of data where data security is not available for some technical or legal reason.

Method and apparatus for storing an internet user’s identity and access rights to world wide web resourcesU.S. Patent #6,005,939 – this invention provides a method for securely obtaining and storing user information to conduct secure transactions on the Internet , without having to re-enter the information multiple times

Method and system for protection of digital informationU.S. Patent #5,978,482 – this invention describes a technique used to secure digital information through encryption and decryption in a way that it will only be available to those who have paid for the right to access it.

More information about IBM’s cross-company security initiative is available at:

More stories

A new supercomputing-powered weather model may ready us for Exascale

In the U.S. alone, extreme weather caused some 297 deaths and $53.5 billion in economic damage in 2016. Globally, natural disasters caused $175 billion in damage. It’s essential for governments, business and people to receive advance warning of wild weather in order to minimize its impact, yet today the information we get is limited. Current […]

Continue reading

DREAM Challenge results: Can machine learning help improve accuracy in breast cancer screening?

        Breast Cancer is the most common cancer in women. It is estimated that one out of eight women will be diagnosed with breast cancer in their lifetime. The good news is that 99 percent of women whose breast cancer was detected early (stage 1 or 0) survive beyond five years after […]

Continue reading

Computational Neuroscience

New Issue of the IBM Journal of Research and Development   Understanding the brain’s dynamics is of central importance to neuroscience. Our ability to observe, model, and infer from neuroscientific data the principles and mechanisms of brain dynamics determines our ability to understand the brain’s unusual cognitive and behavioral capabilities. Our guest editors, James Kozloski, […]

Continue reading