Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael David Hocker is active.

Publication


Featured researches published by Michael David Hocker.


Ibm Journal of Research and Development | 2012

IBM 4765 cryptographic coprocessor

Todd W. Arnold; Carl Ugo Buscaglia; F. Chan; Vincenzo Condorelli; John C. Dayka; W. Santiago-Fernandez; Nihad Hadzic; Michael David Hocker; Michael J. Jordan; T. E. Morris; Klaus Werner

This paper provides an overview of the 4765 cryptographic coprocessor hardware and firmware architecture, its key design features, and an overview of the IBM System z® secure software stack. The hardware for the 4765 solution is shared across all IBM server platforms offering cryptographic hardware acceleration in a highly programmable coprocessor environment designed to meet the most stringent security requirements. Its internal hardware and firmware can be easily updated to meet new security standards and requirements, as well as new customer-specific functionality. It allows updates and customization to be executed with zero downtime, meeting the highest standard of reliability and availability. Standard cryptographic functions and specialized banking and financial functions are supported.


Ibm Journal of Research and Development | 2007

Cryptographic system enhancements for the IBM System z9

Todd W. Arnold; Anne Dames; Michael David Hocker; Mark D. Marik; Nancy A. Pellicciotti; Klaus Werner

IBM has offered hardware-based cryptographic processors for its mainframe computers for nearly thirty years. Over that period, IBM has continued to update both the hardware and software, providing added features, higher performance, greater physical security, and improved management features. This commitment continues with the System z9TM, as demonstrated by the two improvements described in this paper. The first part of the paper describes enhancements to the System z9 to configure and control cryptographic features. The second part describes a new method for the cryptographic coprocessors to securely manage keys which are distributed to remote devices that are not necessarily in secure or well-controlled environments.


Archive | 1997

Docking method for establishing secure wireless connection between computer devices using a docket port

Michael David Hocker; Brent J. Bahnub


Archive | 1995

Selection facilitation on a graphical interface

Michael David Hocker; Clifford A. Pickover; Daniel James Winarski


Archive | 1997

Docking system for establishing secure wireless connection between computer devices

Michael David Hocker; Brent J. Bahnub


Archive | 1996

Icon aggregation on a graphical user interface

Michael David Hocker; Neal M. Keller; James Gordon McLean; Clifford A. Pickover; Daniel James Winarski


Archive | 2000

Internet web browser with proximity sensitie hyperlink history report

Craig Henry Becker; David Wayne Glass; Michael David Hocker; James Gordon McLean; Clifford A. Pickover; Daniel James Winarski


Archive | 1999

Method and system for variable speed scrolling within a data processing system

Craig Henry Becker; David Wayne Glass; Michael David Hocker; James Gordon McLean; Clifford A. Pickover; Daniel James Winarski


Archive | 2000

Internet web browser with memory enhanced hyperlink display

Craig Henry Becker; David Wayne Glass; Michael David Hocker; James Gordon McLean; Clifford A. Pickover; Daniel James Winarski


Archive | 1999

Variable speed cursor movement

Craig Henry Becker; Michael David Hocker; James Gordon McLean; Clifford A. Pickover; Daniel James Winarski

Researchain Logo
Decentralizing Knowledge