Patents by Inventor Benjamin T. Horwood
Benjamin T. Horwood has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10999363Abstract: An indication to determine a device to host at least one shared content found on a first device is received. The first device is connected to a network. The network includes two or more devices. To each device of the two or more devices connected to the network, a request to host the at least one shared content found on the first device is transmitted. Responsive to transmitting the request, a response to host from at least one device of the two or more devices connected to the network is received. An optimal device of the at least one device to host the at least one shared content is determined. The at least one shared content is transmitted to the optimal device.Type: GrantFiled: March 22, 2016Date of Patent: May 4, 2021Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10715318Abstract: A method for a cryptographic service facilitating asymmetric encryption is provided. The cryptographic service is implemented on one or more computer systems. The method includes receiving, by the cryptographic service, one or more unique identifiers. The method also includes determining, by the cryptographic service, whether each of the one or more unique identifiers is valid. The method includes generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid. The method includes sending, by the cryptographic service, a success reply including a public key for each key pair generation.Type: GrantFiled: January 23, 2018Date of Patent: July 14, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10681496Abstract: In an approach to locating nearby computing device users to participate in a fitness activity, one or more computer processors receive from a first computing device of a first user, a selection of a fitness activity and a request to locate at least one second computing device associated with at least one second user in a vicinity of the first computing device to join in a fitness activity. The approach includes one or more computer processors determining the at least one second computing device associated with the least one second user is located in the vicinity of the first computing device. Furthermore, the approach includes one or more computer processors determining directions for the first user and the at least one second user to meet.Type: GrantFiled: July 15, 2019Date of Patent: June 9, 2020Assignee: International Business Machines CorporationInventors: Liam M. Doherty, Benjamin T. Horwood
-
Patent number: 10636320Abstract: A computer system may generate acoustical recommendations for a user. A set of actual acoustical data input may be received and compared with a set of expected acoustical data accessed from memory. The set of actual and expected acoustical data may be corresponding. A set of actual acoustical data vectors may be generated and analyzed against a set of expected acoustical vectors. Deviating portions between the actual and expected may be determined and a set of performance rating vectors may be generated based on each deviating portion. Based on these vectors, and by applying the performance rating vectors to a list of reference ratings, the system can generate a set of acoustical recommendations.Type: GrantFiled: November 20, 2017Date of Patent: April 28, 2020Assignee: International Business Machines CorporationInventors: Graham C. Charters, Benjamin T. Horwood, Mark A. Shewell, Bret W. Dixon, Alexander H. Poga
-
Patent number: 10628183Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.Type: GrantFiled: January 18, 2017Date of Patent: April 21, 2020Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10613880Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.Type: GrantFiled: May 31, 2016Date of Patent: April 7, 2020Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20190342706Abstract: In an approach to locating nearby computing device users to participate in a fitness activity, one or more computer processors receive from a first computing device of a first user, a selection of a fitness activity and a request to locate at least one second computing device associated with at least one second user in a vicinity of the first computing device to join in a fitness activity. The approach includes one or more computer processors determining the at least one second computing device associated with the least one second user is located in the vicinity of the first computing device. Furthermore, the approach includes one or more computer processors determining directions for the first user and the at least one second user to meet.Type: ApplicationFiled: July 15, 2019Publication date: November 7, 2019Inventors: Liam M. Doherty, Benjamin T. Horwood
-
Patent number: 10390176Abstract: In an approach to locating nearby computing device users to participate in a fitness activity, one or more computer processors receive from a first computing device of a first user, a selection of a fitness activity and a request to locate at least one second computing device associated with at least one second user in a vicinity of the first computing device to join in a fitness activity. The approach includes one or more computer processors determining the at least one second computing device associated with the least one second user is located in the vicinity of the first computing device. Furthermore, the approach includes one or more computer processors determining directions for the first user and the at least one second user to meet.Type: GrantFiled: April 27, 2018Date of Patent: August 20, 2019Assignee: International Business Machines CorporationInventors: Liam M. Doherty, Benjamin T. Horwood
-
Publication number: 20190229896Abstract: A method for a cryptographic service facilitating asymmetric encryption is provided. The cryptographic service is implemented on one or more computer systems. The method includes receiving, by the cryptographic service, one or more unique identifiers. The method also includes determining, by the cryptographic service, whether each of the one or more unique identifiers is valid. The method includes generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid. The method includes sending, by the cryptographic service, a success reply including a public key for each key pair generation.Type: ApplicationFiled: January 23, 2018Publication date: July 25, 2019Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20190220597Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: ApplicationFiled: April 3, 2019Publication date: July 18, 2019Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10313948Abstract: A device to deliver data to a network may be identified. The data to be delivered may be identified. Information associated with a device's probability of travelling to the network may be identified. Based on that information, the data to be delivered may be transferred to the device.Type: GrantFiled: July 7, 2016Date of Patent: June 4, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20190156696Abstract: A computer system may generate acoustical recommendations for a user. A set of actual acoustical data input may be received and compared with a set of expected acoustical data accessed from memory. The set of actual and expected acoustical data may be corresponding. A set of actual acoustical data vectors may be generated and analyzed against a set of expected acoustical vectors. Deviating portions between the actual and expected may be determined and a set of performance rating vectors may be generated based on each deviating portion. Based on these vectors, and by applying the performance rating vectors to a list of reference ratings, the system can generate a set of acoustical recommendations.Type: ApplicationFiled: November 20, 2017Publication date: May 23, 2019Inventors: Graham C. Charters, Benjamin T. Horwood, Mark A. Shewell, Bret W. Dixon, Alexander H. Poga
-
Patent number: 10289845Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: GrantFiled: December 18, 2017Date of Patent: May 14, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10289844Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: GrantFiled: January 19, 2017Date of Patent: May 14, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10264500Abstract: A device to deliver data to a network may be identified. The data to be delivered may be identified. Information associated with a device's probability of travelling to the network may be identified. Based on that information, the data to be delivered may be transferred to the device.Type: GrantFiled: March 31, 2016Date of Patent: April 16, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10231269Abstract: A computer system and computer program product for generating a geographically-bound mobile ad hoc network identification. The computer system and computer program product may include receiving, by a processor, a mobile ad hoc network request. The computer system and computer program product may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The computer system and computer program product may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The computer system and computer program product may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.Type: GrantFiled: December 8, 2017Date of Patent: March 12, 2019Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 10143022Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.Type: GrantFiled: December 8, 2017Date of Patent: November 27, 2018Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20180249293Abstract: In an approach to locating nearby computing device users to participate in a fitness activity, one or more computer processors receive from a first computing device of a first user, a selection of a fitness activity and a request to locate at least one second computing device associated with at least one second user in a vicinity of the first computing device to join in a fitness activity. The approach includes one or more computer processors determining the at least one second computing device associated with the least one second user is located in the vicinity of the first computing device. Furthermore, the approach includes one or more computer processors determining directions for the first user and the at least one second user to meet.Type: ApplicationFiled: April 27, 2018Publication date: August 30, 2018Inventors: Liam M. Doherty, Benjamin T. Horwood
-
Patent number: 10044837Abstract: A method for generating and distributing serialized tokens is provided. The method may include receiving a request from at least one client. The method may further include determining whether the received at least one request is a request for generating names and definitions for a group of serialized tokens, deleting a names and definitions, and/or receiving a group of serialized tokens. Additionally, the method may include enabling the at least one client to generate names and definitions for a group of serialized tokens. The method may also include storing the names and definitions on a server. The method may also include deleting the names and definitions from the server. The method may also include formatting and distributing serialized tokens based on the names and definitions for the serialized tokens. The method may further include sending a response to the client based on the received request.Type: GrantFiled: July 21, 2017Date of Patent: August 7, 2018Assignee: International Business Machines CorporationInventors: Bret W. Dixon, Benjamin T. Horwood
-
Publication number: 20180203997Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: ApplicationFiled: January 19, 2017Publication date: July 19, 2018Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell