Patents by Inventor Charles S. Lingafelt

Charles S. Lingafelt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160103981
    Abstract: A tool for identify verification using computing device collaboration. The tool generates a hash based, at least in part, on device specific information for one or more user owned devices. The tool determines whether a hash for the initial device matches the hash for at least one of the one or more user owned devices, and if so, sends, one or more challenge questions to the initial device, wherein the one or more challenge questions include at least one challenge question based on the device specific information for the one or more user owned devices. The tool determines whether each of one or more responses to the one or more challenge questions is correct.
    Type: Application
    Filed: October 8, 2014
    Publication date: April 14, 2016
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Publication number: 20160092185
    Abstract: A system and method for deploying a software application to a hosting environment that considers the development environment, and bases any decision on data about the development environment to make a selection of hosting environment and/or operational attributes. The system and methods determines and attaches metadata describing the development environment to an application, then uses that metadata to select a deployment model, and to select an operational model. The method assigns a security risk score to a developed application which may be hosted in a virtual hosting environment or a physical hosting environment. The system and method considers security issues in its scoring and focuses on the security risk associated with an application that would be deployed. The method steps convey the application attributes, such as complexity, robustness, likelihood of operational issued, likelihood of compromise, etc. to the deployment and operating entities.
    Type: Application
    Filed: September 30, 2014
    Publication date: March 31, 2016
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, Anji D. Greene, Charles S. Lingafelt, William H. Tworek
  • Patent number: 9298901
    Abstract: A tool for credential validation using multiple computing devices. The tool selects at least one challenge question. The tool selects one or more user owned devices, wherein selecting the one or more user owned devices includes querying a database for each user owned device associated with a user account. The tool selects at least one device order, based, at least in part, on a level of security desired in credential validation. The tool presents the at least one challenge question to the one or more user owned devices, wherein the at least one challenge question includes the at least one device order for returning at least one response. The tools determines whether the at least one response received from the one or more user owned devices is a correct response relative to the at least one challenge question and the at least one device order.
    Type: Grant
    Filed: October 8, 2014
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, Jr.
  • Publication number: 20160071398
    Abstract: In an approach for asset management, a processor identifies the location of an asset. A processor receives information specific to the location of the asset. A processor determines that an alert is required based on at least the asset, the location of the asset, and the information specific to the location of the asset. A processor generates an alert.
    Type: Application
    Filed: September 5, 2014
    Publication date: March 10, 2016
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Patent number: 9270523
    Abstract: Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: February 23, 2016
    Assignee: International Business Machines Corporation
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20160028765
    Abstract: A system for responding to a cyber-attack on a server. A notification is sent to a server administrator that a cyber-attack is occurring and the number of cyber-attacks on the server has exceeded a predetermined threshold. A request is received by a server, from the server administrator, in response to receiving the notification, to obtain a new Internet Protocol (IP) address for the server. The new IP address will be generated following a protocol received by the server from the server administrator. In response to receiving instructions to follow a protocol from the server administrator, the server requests a new IP address from a DHCP system. The DHCP system will obtain a new IP address for the server following the protocol sent by the server to the DHCP system.
    Type: Application
    Filed: July 28, 2014
    Publication date: January 28, 2016
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9246973
    Abstract: Qualities of each of first and second sessions for voice over internet protocol communication between endpoints are assessed and compared, and the endpoints signaled to select the session having the higher assessed quality as a current or primary session for further data packet communication between the endpoints, and to remove the lower quality session from use as a session for the further data packet communication between the endpoints, or to use the lower quality session as a secondary session for data communication between the endpoints. More particularly, the assessed qualities of each of the current and second sessions meet a basic requirement defined to provide voice over internet protocol data packet communication between the endpoints.
    Type: Grant
    Filed: March 13, 2015
    Date of Patent: January 26, 2016
    Assignee: International Business Machines Corporation
    Inventors: Martinianus B. T. Hadinata, Laurent Hayem, Charles S. Lingafelt, John E. Moore, Jr.
  • Patent number: 9231958
    Abstract: An approach is provided for controlling access to a resource. Visual representations of the resource and an entity and a second entity are included in a display. In the display, a movement of the entity visual representation (EVR) to a position proximate to a boundary of the resource visual representation (RVR) is detected. Based on an attribute assigned to the EVR being determined to satisfy an access control requirement (ACR) assigned to the RVR, the EVR is permitted to move across and be placed within the boundary of the RVR. A movement of the second entity visual representation (SEVR) to another position proximate to the boundary of the RVR is detected. Based on an attribute assigned to the SEVR being determined to not satisfy the ACR, the SEVR is prevented from moving across and being placed within the boundary of the RVR.
    Type: Grant
    Filed: July 9, 2015
    Date of Patent: January 5, 2016
    Assignee: International Business Machines Corporation
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, Jr.
  • Publication number: 20150334127
    Abstract: Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers.
    Type: Application
    Filed: July 29, 2015
    Publication date: November 19, 2015
    Inventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
  • Publication number: 20150312261
    Abstract: An approach is provided for controlling access to a resource. Visual representations of the resource and an entity and a second entity are included in a display. In the display, a movement of the entity visual representation (EVR) to a position proximate to a boundary of the resource visual representation (RVR) is detected. Based on an attribute assigned to the EVR being determined to satisfy an access control requirement (ACR) assigned to the RVR, the EVR is permitted to move across and be placed within the boundary of the RVR. A movement of the second entity visual representation (SEVR) to another position proximate to the boundary of the RVR is detected. Based on an attribute assigned to the SEVR being determined to not satisfy the ACR, the SEVR is prevented from moving across and being placed within the boundary of the RVR.
    Type: Application
    Filed: July 9, 2015
    Publication date: October 29, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Publication number: 20150271313
    Abstract: A method and system for using a voicemail system. A command is received, from a first telephone device connected to the voicemail system after a call from a second telephone device was received by the first telephone device,. The command is for the voicemail system to pause a process of recording a voicemail message being spoken by a user using the first telephone device. In response to the receiving the command, the voicemail system is directed to pause the process of recording the voicemail message, which results in the process of recording the voicemail message being paused by a pause/resume invocation system that is remote to the voicemail system.
    Type: Application
    Filed: May 21, 2015
    Publication date: September 24, 2015
    Inventors: Brian M. O'Connell, Charles S. Lingafelt, Keith R. Walker, John E. Moore, Martinianus BudiTjahja Hadinata
  • Patent number: 9137253
    Abstract: An approach is provided for controlling access to a resource. Visual representations of the resource and an entity are included in a display. In the display, a movement of the entity visual representation to a position proximate to a boundary of the resource visual representation is detected. Based on an attribute assigned to the entity visual representation being determined to satisfy an access control requirement assigned to the resource visual representation, the entity is permitted to access the resource. In the display, based on the entity being permitted to access the resource, a movement of the entity visual representation across the boundary of the resource visual representation and a placement of the entity visual representation within the boundary of the resource visual representation are permitted.
    Type: Grant
    Filed: January 7, 2015
    Date of Patent: September 15, 2015
    Assignee: International Business Machines Corporation
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, Jr.
  • Patent number: 9131057
    Abstract: Managing subconference calls within a primary conference call. An approach includes establishing a primary conference call including a plurality of participants, establishing a subconference call including a subset of the plurality of participants, and providing respective output signals to each of the plurality of participants. Members of the primary conference call are provided with audio only of the primary conference call, and members of the subconference call are provided with audio of the subconference call. The approach also includes providing a visual display that shows respective groupings of members of the subconference call and members of the primary conference call.
    Type: Grant
    Filed: January 14, 2014
    Date of Patent: September 8, 2015
    Assignee: International Business Machines Corporation
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, Jr.
  • Patent number: 9129086
    Abstract: Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers.
    Type: Grant
    Filed: March 4, 2010
    Date of Patent: September 8, 2015
    Assignee: International Business Machines Corporation
    Inventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
  • Publication number: 20150242418
    Abstract: A system and method to determine an identity of an individual carrying one or more devices configured to communicate with the system is described. The system includes an input interface to receive information from one or more of the one or more devices, and a database storing data related to the individual in correspondence with the information. The system also includes a processor to determine the identity of the individual based on the information when the information provides the identity directly and to determine the identity of the individual based on the data in the database when the information relates to the respective one or more of the one or more devices. The system may be within or outside of a second device of a second individual.
    Type: Application
    Filed: February 27, 2014
    Publication date: August 27, 2015
    Applicant: International Business Machines Corporation
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, Jr.
  • Publication number: 20150227754
    Abstract: Access control functions for data objects include assigning tags to the data objects associated with a client device. The tags represent security attributes. Upon determining an access attempt for one of the data objects has been initiated by a user of the client device, the access control functions include gathering environmental information associated with conditions surrounding the client device, identifying a tag assigned to the one of the data objects, applying access control rules to the environmental information as a function of the corresponding tag, and performing an access-related function with respect to the access attempt based on results of application of the access control rules.
    Type: Application
    Filed: February 10, 2014
    Publication date: August 13, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Andrew R. Jones, Charles S. Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Publication number: 20150222522
    Abstract: There are provided a system, a method and a computer program product for routing a data packet. A first router includes a routing table having address routes for routing packets of a first network communication protocol and address routes for routing packets of a second network communication protocol. A source router, adjacent to the first router, stores first network communication protocol addresses of routers adjacent to the first router. The system creates a network communication path from the source router to one or more adjacent routers for only routing the data packets according to a corresponding first network communication protocol address route. The system updates the routing table of the first router to remove the second network communication protocol address routes to the adjacent routers. The system routes the data packet according to the created network communication path and the updated routing table of the first router.
    Type: Application
    Filed: February 5, 2014
    Publication date: August 6, 2015
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 9094521
    Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.
    Type: Grant
    Filed: June 13, 2013
    Date of Patent: July 28, 2015
    Assignee: International Business Machines Corporation
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek
  • Publication number: 20150195416
    Abstract: Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g.
    Type: Application
    Filed: March 24, 2015
    Publication date: July 9, 2015
    Inventors: Charles S. Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Publication number: 20150188976
    Abstract: Qualities of each of first and second sessions for voice over internet protocol communication between endpoints are assessed and compared, and the endpoints signaled to select the session having the higher assessed quality as a current or primary session for further data packet communication between the endpoints, and to remove the lower quality session from use as a session for the further data packet communication between the endpoints, or to use the lower quality session as a secondary session for data communication between the endpoints. More particularly, the assessed qualities of each of the current and second sessions meet a basic requirement defined to provide voice over internet protocol data packet communication between the endpoints.
    Type: Application
    Filed: March 13, 2015
    Publication date: July 2, 2015
    Inventors: Martinianus B. T. HADINATA, Laurent HAYEM, Charles S. LINGAFELT, John E. MOORE, JR.