Patents by Inventor Carlos E. Aguilera

Carlos E. Aguilera has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11907412
    Abstract: A method of generating a virtual reality (“VR”) experience includes detecting, using external sensors, a real-world spectator that is in a spectator space that is adjacent to a user that is wearing a VR headset and experiencing a VR space. The method also includes detecting a real-world physical state of the spectator, and rendering, in response to detecting, the spectator in the VR space as an avatar that reflects the real-world physical state of the spectator.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: February 20, 2024
    Assignee: International Business Machines Corporation
    Inventors: Zachary A. Silverstein, Cesar Augusto Rodriguez Bravo, Hemant Kumar Sivaswamy, Carlos E Aguilera
  • Publication number: 20220100261
    Abstract: A method of generating a virtual reality (“VR”) experience includes detecting, using external sensors, a real-world spectator that is in a spectator space that is adjacent to a user that is wearing a VR headset and experiencing a VR space. The method also includes detecting a real-world physical state of the spectator, and rendering, in response to detecting, the spectator in the VR space as an avatar that reflects the real-world physical state of the spectator.
    Type: Application
    Filed: September 28, 2020
    Publication date: March 31, 2022
    Inventors: Zachary A. Silverstein, Cesar Augusto Rodriguez Bravo, Hemant Kumar Sivaswamy, Carlos E. Aguilera
  • Patent number: 11265352
    Abstract: A method assigns a particular rule for a previous client to a new client for use in executing a security feature on a computer system used by the new client. One or more processors match a new client profile for the new client to a previous client profile for the previous client. The new client profile is based on types of one or more client assets of the new client and an intrusion detection alert history of the new client. The processor(s) assign the particular rule for the previous client to the new client based on the new client profile matching the previous client profile. The processor(s) receive information indicating that a violation of the particular rule has occurred, and execute a security feature of the computer system used by the new client in order to resolve the violation of the particular rule.
    Type: Grant
    Filed: August 28, 2020
    Date of Patent: March 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Aankur Bhatia, Srinivas B. Tummalapenta, Huyanh D. Ngo, Carlos E. Aguilera
  • Publication number: 20200396261
    Abstract: A method assigns a particular rule for a previous client to a new client for use in executing a security feature on a computer system used by the new client. One or more processors match a new client profile for the new client to a previous client profile for the previous client. The new client profile is based on types of one or more client assets of the new client and an intrusion detection alert history of the new client. The processor(s) assign the particular rule for the previous client to the new client based on the new client profile matching the previous client profile. The processor(s) receive information indicating that a violation of the particular rule has occurred, and execute a security feature of the computer system used by the new client in order to resolve the violation of the particular rule.
    Type: Application
    Filed: August 28, 2020
    Publication date: December 17, 2020
    Inventors: AANKUR BHATIA, SRINIVAS B. TUMMALAPENTA, HUYANH D. NGO, CARLOS E. AGUILERA
  • Patent number: 10834142
    Abstract: A method improves a security of a computer system by building a new set of rules for the computer system. One or more processors input a plurality of client profiles to an artificial intelligence (AI) system, where the plurality of client profiles are based on an analysis of respective client environments comprising client assets and an intrusion detection alert history of a plurality of clients. The processor(s) match a new client profile to a respective client profile from the plurality of client profiles. The processor(s) build a new set of rules for the new client based on a similarity measure of the new client profile to the respective client profile. The processor(s) subsequently receive information indicating that a violation of the new set of rules has occurred and then execute a security feature of the computer system in order to resolve the violation of the new set of rules.
    Type: Grant
    Filed: October 9, 2018
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Aankur Bhatia, Srinivas B. Tummalapenta, Huyanh D. Ngo, Carlos E. Aguilera
  • Patent number: 10771493
    Abstract: A security vulnerability analysis mechanism is provided that ingests content from a plurality of content source computing devices to identify instances of security vulnerability content in the ingested content. The mechanism performs a security trend analysis on the instances of security vulnerability content to identify a relative ranking of security vulnerabilities. The mechanism identifies computing resources of a specified computing infrastructure and a criticality of the computing resources to an operation of the computing infrastructure. The mechanism generates a prioritized listing of security vulnerabilities associated with the computing infrastructure based on the relative ranking of security vulnerabilities and the criticality of the computing resources in the computing infrastructure. The mechanism outputs a notification to a user via a user computing device, indicating the prioritized listing of security vulnerabilities.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: September 8, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Spisak, Steven D. McKay, Mariya Ali, Rhonda L. Childress, Michelle Rivers, Carlos E. Aguilera
  • Publication number: 20200112590
    Abstract: A method improves a security of a computer system by building a new set of rules for the computer system. One or more processors input a plurality of client profiles to an artificial intelligence (AI) system, where the plurality of client profiles are based on an analysis of respective client environments comprising client assets and an intrusion detection alert history of a plurality of clients. The processor(s) match a new client profile to a respective client profile from the plurality of client profiles. The processor(s) build a new set of rules for the new client based on a similarity measure of the new client profile to the respective client profile. The processor(s) subsequently receive information indicating that a violation of the new set of rules has occurred and then execute a security feature of the computer system in order to resolve the violation of the new set of rules.
    Type: Application
    Filed: October 9, 2018
    Publication date: April 9, 2020
    Inventors: AANKUR BHATIA, SRINIVAS B. TUMMALAPENTA, HUYANH D. NGO, CARLOS E. AGUILERA
  • Publication number: 20200092319
    Abstract: A security vulnerability analysis mechanism is provided that ingests content from a plurality of content source computing devices to identify instances of security vulnerability content in the ingested content. The mechanism performs a security trend analysis on the instances of security vulnerability content to identify a relative ranking of security vulnerabilities. The mechanism identifies computing resources of a specified computing infrastructure and a criticality of the computing resources to an operation of the computing infrastructure. The mechanism generates a prioritized listing of security vulnerabilities associated with the computing infrastructure based on the relative ranking of security vulnerabilities and the criticality of the computing resources in the computing infrastructure. The mechanism outputs a notification to a user via a user computing device, indicating the prioritized listing of security vulnerabilities.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 19, 2020
    Inventors: Michael Spisak, Steven D. McKay, Mariya Ali, Rhonda L. Childress, Michelle Rivers, Carlos E. Aguilera