Patents by Inventor Charles S. Lingafelt

Charles S. Lingafelt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9924023
    Abstract: A method and system for using a voicemail system. A command is received, from a first telephone device connected to the voicemail system after a call from a second telephone device was received by the first telephone device. The command is for the voicemail system to pause a process of recording a voicemail message being spoken by a user using the first telephone device. In response to the receiving the command, the voicemail system is directed to pause the process of recording the voicemail message, which results in the process of recording the voicemail message being paused by a pause/resume invocation system that is remote to the voicemail system.
    Type: Grant
    Filed: May 21, 2015
    Date of Patent: March 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Brian M. O'Connell, Charles S. Lingafelt, Keith R. Walker, John E. Moore, Martinianus BudiTjahja Hadinata
  • Publication number: 20180032221
    Abstract: Systems and methods for visualization and control of application interactions are disclosed. An approach includes receiving a selection of a primary application, retrieving information regarding a relationship between the selected primary application and at least one of another application and a computer device resource, and calculating a thickness value for the relationship, wherein the thickness value represents at least one parameter of interest to a user. The approach includes displaying icons representing the selected primary application and the other application(s) and computer device resource(s), and displaying at least one relationship line between the selected primary application and the other application(s)/computer device resource(s), wherein the at least one relationship line has a line weight based on the thickness value.
    Type: Application
    Filed: October 12, 2017
    Publication date: February 1, 2018
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Patent number: 9836186
    Abstract: Systems and methods for visualization and control of application interactions are disclosed. An approach includes receiving a selection of a primary application, retrieving information regarding a relationship between the selected primary application and at least one of another application and a computer device resource, and calculating a thickness value for the relationship, wherein the thickness value represents at least one parameter of interest to a user. The approach includes displaying icons representing the selected primary application and the other application(s) and computer device resource(s), and displaying at least one relationship line between the selected primary application and the other application(s)/computer device resource(s), wherein the at least one relationship line has a line weight based on the thickness value.
    Type: Grant
    Filed: November 19, 2015
    Date of Patent: December 5, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, Jr.
  • Publication number: 20170331949
    Abstract: An indication of a call from a first device to a second device is received. The indication includes making the call by a first user using the first device to a second user using the second device. Contextual information about the first user of the first device is received. User preferences of the second user receiving the call using the second device are determined. Responsive to determining the user preferences of the second user of the second device, an action the second device will take is determined based on the user preferences of the second user and the contextual information about the first user.
    Type: Application
    Filed: May 11, 2016
    Publication date: November 16, 2017
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Publication number: 20170324864
    Abstract: An indication of a call from a first device to a second device is received. The indication includes making the call by a first user using the first device to a second user using the second device. User preferences of the second user receiving the call using the second device is determined. A mode based on the user preferences of the second user is determined. Responsive to determining the mode, a question to transmit to the first device is determined. The question is transmitted to the first device. A response to the question from the first device is received. Responsive to receiving a response to the question from the first device, an action the second device will take is determined based on the received response from the first device.
    Type: Application
    Filed: July 27, 2017
    Publication date: November 9, 2017
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Publication number: 20170318154
    Abstract: An indication of a call from a first device to a second device is received. The indication includes making the call by a first user using the first device to a second user using the second device. User preferences of the second user receiving the call using the second device is determined. A mode based on the user preferences of the second user is determined. Responsive to determining the mode, a question to transmit to the first device is determined. The question is transmitted to the first device. A response to the question from the first device is received. Responsive to receiving a response to the question from the first device, an action the second device will take is determined based on the received response from the first device.
    Type: Application
    Filed: April 28, 2016
    Publication date: November 2, 2017
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Patent number: 9787697
    Abstract: Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers.
    Type: Grant
    Filed: July 29, 2015
    Date of Patent: October 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
  • Patent number: 9781609
    Abstract: Embodiments for testing a wireless network location by a processor. A collection of candidate wireless network test locations is selected for testing wireless network communication according to defined constraints, conditions, testing parameters, or a combination thereof. A self-directed, mobile wireless access point (WAP) is dispatched to at least one stationary location from the collection. A self-directed, testing receiver may be commanded to progressively move to each candidate test location along a testing route of the collection. The testing attributes relating to wireless network communication performance are measured for each of the candidate test locations along the testing route of the collection. Qualified WAP locations are identified from the candidate test locations based on the measured testing attributes.
    Type: Grant
    Filed: August 8, 2016
    Date of Patent: October 3, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rachele S. Kurtz, Charles S. Lingafelt, James W. Murray, James T. Swantek
  • Publication number: 20170274730
    Abstract: A vehicle climate control system. An air conditioner and heater are operatively connected to a controller and control the temperature of the cabin area of a vehicle. A processor, operatively connected to the controller, determines the amount of time for an operator of the vehicle to travel between their location and the location of the vehicle. The processor determines an amount of time required to adjust the temperature of the cabin area of the vehicle to a selected temperature by using one of the air conditioner and the heater. The processor automatically operates one of the air conditioner and the heater to begin adjusting the temperature of the cabin area to the selected temperature when the amount of time required for the operator to travel between their location and the location of the vehicle is less than or equal to the amount of time required to adjust the temperature of the cabin area vehicle to the selected temperature.
    Type: Application
    Filed: June 9, 2017
    Publication date: September 28, 2017
    Applicant: GLOBALFOUNDRIES INC.
    Inventors: GREGORY J. BOSS, ANDREW R. JONES, CHARLES S. LINGAFELT, KEVIN C. MCCONNELL, JOHN E. MOORE, JR.
  • Publication number: 20170249552
    Abstract: In an approach for providing a response based on situational context, a computer determines that an individual is within a proximity of a computing device. The computer identifies an identity associated with the determined individual within the proximity of the computing device. The computer determines a location associated with the identified identity. The computer identifies an entry within a table based on at least in part on the identified identity and the determined location. The computer determines a stimulus associated with the identified entry occurs. The computer provides a response based on determining the stimulus associated with the identified entry occurs.
    Type: Application
    Filed: February 29, 2016
    Publication date: August 31, 2017
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Patent number: 9738136
    Abstract: A vehicle climate control system. An air conditioner and heater are operatively connected to a controller and control the temperature of the cabin area of a vehicle. A processor, operatively connected to the controller, determines the amount of time for an operator of the vehicle to travel between their location and the location of the vehicle. The processor determines an amount of time required to adjust the temperature of the cabin area of the vehicle to a selected temperature by using one of the air conditioner and the heater. The processor automatically operates one of the air conditioner and the heater to begin adjusting the temperature of the cabin area to the selected temperature when the amount of time required for the operator to travel between their location and the location of the vehicle is less than or equal to the amount of time required to adjust the temperature of the cabin area vehicle to the selected temperature.
    Type: Grant
    Filed: November 14, 2013
    Date of Patent: August 22, 2017
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, Jr.
  • Patent number: 9686146
    Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.
    Type: Grant
    Filed: January 14, 2016
    Date of Patent: June 20, 2017
    Assignee: International Business Machines Corporation
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20170161858
    Abstract: Embodiments include method, systems and computer program products for selective retention of data in a computational system. Aspects include receiving a monitored data element. Aspects also include assigning an initial storage ranking to the monitored data element to create a ranked data element. Aspects also include determining a threshold storage ranking. Aspects also include comparing the initial storage ranking to the threshold storage ranking. Aspects also include, based on the comparison indicating that the initial storage ranking is greater than the threshold storage ranking, storing the ranked data element in a long-term storage. Aspects also include based upon the comparison indicating that the initial storage ranking is less than the threshold storage ranking, discarding the ranked data element.
    Type: Application
    Filed: December 4, 2015
    Publication date: June 8, 2017
    Inventors: Suzanne C. Deffeyes, Amir Khan, Charles S. Lingafelt, Gary K. Thornton
  • Publication number: 20170149828
    Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.
    Type: Application
    Filed: November 24, 2015
    Publication date: May 25, 2017
    Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
  • Publication number: 20170149834
    Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.
    Type: Application
    Filed: November 4, 2016
    Publication date: May 25, 2017
    Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
  • Publication number: 20170147667
    Abstract: Systems and methods for visualization and control of application interactions are disclosed. An approach includes receiving a selection of a primary application, retrieving information regarding a relationship between the selected primary application and at least one of another application and a computer device resource, and calculating a thickness value for the relationship, wherein the thickness value represents at least one parameter of interest to a user. The approach includes displaying icons representing the selected primary application and the other application(s) and computer device resource(s), and displaying at least one relationship line between the selected primary application and the other application(s)/computer device resource(s), wherein the at least one relationship line has a line weight based on the thickness value.
    Type: Application
    Filed: November 19, 2015
    Publication date: May 25, 2017
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Publication number: 20170139393
    Abstract: A computer-implemented method includes: monitoring, by a computing device, communication flows within an industrial processing system; identifying, by the computing device, a hazardous command based on monitoring the communication flows, wherein identifying the hazardous command includes running a simulation with the communication flows as an input to the simulation; generating, by the computing device, a set of one or more mitigating commands based on identifying the hazardous command; and outputting, by the computing device, the set of one or more mitigating commands to components within the industrial processing system, wherein outputting the set of the one or more mitigating commands reduces a level of hazard caused by the hazardous command.
    Type: Application
    Filed: November 13, 2015
    Publication date: May 18, 2017
    Inventors: Gregory J. BOSS, Andrew R. JONES, Charles S. LINGAFELT, Kevin C. MCCONNELL, John E. MOORE, JR.
  • Patent number: 9654514
    Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.
    Type: Grant
    Filed: November 4, 2016
    Date of Patent: May 16, 2017
    Assignee: International Business Machines Corporation
    Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
  • Publication number: 20170131871
    Abstract: An approach is provided for controlling a first application's access of a second application of a mobile device. Based on first and second icons representing the first and second applications, respectively, having been placed into a graphical element displayed by the mobile device, an attribute included in attributes assigned to the graphical element is obtained. The attribute specifies an exchange of information permitted between the first and second applications. If access control settings of the first application are automatically configurable, the access control settings are automatically configured based on the obtained attribute; otherwise, the obtained attribute is applied to the first application by utilizing resource controls of the mobile device operating system. Based on the configured access control settings or the attribute applied to the first application, an access of the second application by the first application is controlled.
    Type: Application
    Filed: January 13, 2017
    Publication date: May 11, 2017
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Patent number: 9645806
    Abstract: A system and method for deploying a software application to a hosting environment that considers the development environment, and bases any decision on data about the development environment to make a selection of hosting environment and/or operational attributes. The system and methods determines and attaches metadata describing the development environment to an application, then uses that metadata to select a deployment model, and to select an operational model. The method assigns a security risk score to a developed application which may be hosted in a virtual hosting environment or a physical hosting environment. The system and method considers security issues in its scoring and focuses on the security risk associated with an application that would be deployed. The method steps convey the application attributes, such as complexity, robustness, likelihood of operational issued, likelihood of compromise, etc. to the deployment and operating entities.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: May 9, 2017
    Assignee: International Business Machines Corporation
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, Anji D. Greene, Charles S. Lingafelt, William H. Tworek