Patents by Inventor James J. Whitmore

James J. Whitmore has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240073239
    Abstract: A method for creating and maintaining a Security Knowledge Base and related Security Knowledge Graph for modeling and analysis of security attacks and attack surfaces is described. A Security Knowledge Base can be assembled from a set of source documents, operational artifacts and experiential insights about Information Systems and Security. A Security Attack Knowledge Graph can be created from data in the Security Knowledge Base. The Security Attack Knowledge Graph can take the form of a connected graph used by a Graph Computing system and algorithms. The Graph Computing system can perform traversals to model security attacks for a target system and an attack scenario. The content of the Security Knowledge base can be further used to evaluate the traversal results, and produce reports, recommendations and action plans. The Security Knowledge Base and Security Attack Knowledge Graph can be improved with new source documents, artifacts, and experiential insights.
    Type: Application
    Filed: October 24, 2023
    Publication date: February 29, 2024
    Inventor: James J. Whitmore
  • Patent number: 10068064
    Abstract: Techniques for establishing entitlement to a computer program product are provided, and include providing a client identity in a registration process to produce an entitlement file, obtaining an encoded version of a computer program product, and transforming the computer program product into an installation product in a computer storage medium, wherein the installation product comprises the entitlement file to establish entitled use of the computer program product.
    Type: Grant
    Filed: April 24, 2012
    Date of Patent: September 4, 2018
    Assignee: International Business Machines Corporation
    Inventors: Timothy J. Hahn, Bernard P. Palmer, Jr., Michael P. Waidner, James J. Whitmore
  • Patent number: 9946848
    Abstract: Techniques for establishing entitlement to a computer program product are provided, and include providing a client identity in a registration process to produce an entitlement file, obtaining an encoded version of a computer program product, and transforming the computer program product into an installation product in a computer storage medium, wherein the installation product comprises the entitlement file to establish entitled use of the computer program product.
    Type: Grant
    Filed: February 26, 2009
    Date of Patent: April 17, 2018
    Assignee: International Business Machines Corporation
    Inventors: Timothy J. Hahn, Bernard P. Palmer, Jr., Michael P. Waidner, James J. Whitmore
  • Patent number: 9911093
    Abstract: Mechanisms are provided for dynamically determining one or more automation levels for tasks of a workflow. The mechanisms receive a workflow from a source component and receiving context and state information for an environment in which the workflow is to be performed. One or more tasks and associated task attributes are identified in the workflow and applying one or more automation rules to the context and state information and the task attributes to generate one or more automation level settings from the one or more tasks. The one or more tasks are performed in the environment in accordance with the one or more automation level settings. The automation level settings specify a degree of automation to be used when performing the one or more tasks.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: March 6, 2018
    Assignee: International Business Machines Corporation
    Inventor: James J. Whitmore
  • Patent number: 9898587
    Abstract: Techniques for establishing entitlement to a computer program product are provided, and include providing a client identity in a registration process to produce an entitlement file, obtaining an encoded version of a computer program product, and transforming the computer program product into an installation product in a computer storage medium, wherein the installation product comprises the entitlement file to establish entitled use of the computer program product.
    Type: Grant
    Filed: April 24, 2012
    Date of Patent: February 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Timothy J. Hahn, Bernard P. Palmer, Jr., Michael P. Waidner, James J. Whitmore
  • Patent number: 9436921
    Abstract: Mechanisms are provided for dynamically determining one or more automation levels for tasks of a workflow. The mechanisms receive a workflow from a source component and receiving context and state information for an environment in which the workflow is to be performed. One or more tasks and associated task attributes are identified in the workflow and applying one or more automation rules to the context and state information and the task attributes to generate one or more automation level settings from the one or more tasks. The one or more tasks are performed in the environment in accordance with the one or more automation level settings. The automation level settings specify a degree of automation to be used when performing the one or more tasks.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: September 6, 2016
    Assignee: International Business Machines Corporation
    Inventor: James J. Whitmore
  • Publication number: 20160247103
    Abstract: Mechanisms are provided for dynamically determining one or more automation levels for tasks of a workflow. The mechanisms receive a workflow from a source component and receiving context and state information for an environment in which the workflow is to be performed. One or more tasks and associated task attributes are identified in the workflow and applying one or more automation rules to the context and state information and the task attributes to generate one or more automation level settings from the one or more tasks. The one or more tasks are performed in the environment in accordance with the one or more automation level settings. The automation level settings specify a degree of automation to be used when performing the one or more tasks.
    Type: Application
    Filed: April 29, 2016
    Publication date: August 25, 2016
    Inventor: James J. Whitmore
  • Patent number: 9009472
    Abstract: A method, system, and computer usable program product for providing consistent cryptographic operations in a data processing environment using protected structured data objects are provided in the illustrative embodiments. A data input is received from an originating application by a security plug-in, both the application and the security plug-in executing in the data processing system. A security schema object is received by the security plug-in, the security schema object describing a sequence of cryptographic operations, wherein the security schema object includes a plurality of components each component describing an aspect of the cryptographic operations. The data input is transformed into a secure structured data object by the security plug-in using the sequence of cryptographic operations. A property of the secure structured data object is populated using data about the security schema object. The secure structured data object is transmitted to a consumer application.
    Type: Grant
    Filed: October 13, 2011
    Date of Patent: April 14, 2015
    Assignee: International Business Machines Corporation
    Inventors: Julian Ariel Cerruti, Mariela Claudia Lanza, Guillermo Manzato, Mariano Alejandro Prediletto, James J. Whitmore
  • Patent number: 9009473
    Abstract: Providing consistent cryptographic operations across several applications using secure structured data objects includes a security middleware component, using an application programming interface, receiving a data input from an originating application operating in application space. Both the application and the middleware component execute in the data processing system. A security schema object is retrieved by the security middleware component from an object store, the security schema object describing a sequence of cryptographic operations and includes several components describing aspects of the cryptographic operations. The data input is transformed from a first format to a second format where one of the formats is a secure structured data object formed using the sequence of cryptographic operations. A property of the secure structured data object contains data about the security schema object. The data input is transmitted in the second format to a consumer application operating in application space.
    Type: Grant
    Filed: October 13, 2011
    Date of Patent: April 14, 2015
    Assignee: International Business Machines Corporation
    Inventors: Patricio Marcelo Reyna Almandos, Eduardo Martin Coria, Mariela Claudia Lanza, Guillermo Manzato, Mariano Alejandro Prediletto, James J Whitmore
  • Patent number: 8725521
    Abstract: A system and method for generating an information technology solution. A system for generating a runtime model is provided, comprising: a system for selecting a business pattern; a system for providing a management integration table, wherein the management integration table includes a plurality of cells, each representing at least one management application pattern; and a system for generating a runtime model from the selected business pattern and management integration table, wherein the generating system supplements the business pattern with additive patterns, bridge patterns, and management application patterns in order to generate the runtime model.
    Type: Grant
    Filed: August 13, 2004
    Date of Patent: May 13, 2014
    Assignee: International Business Machines Corporation
    Inventor: James J. Whitmore
  • Publication number: 20130347003
    Abstract: Mechanisms are provided for dynamically determining one or more automation levels for tasks of a workflow. The mechanisms receive a workflow from a source component and receiving context and state information for an environment in which the workflow is to be performed. One or more tasks and associated task attributes are identified in the workflow and applying one or more automation rules to the context and state information and the task attributes to generate one or more automation level settings from the one or more tasks. The one or more tasks are performed in the environment in accordance with the one or more automation level settings. The automation level settings specify a degree of automation to be used when performing the one or more tasks.
    Type: Application
    Filed: June 21, 2012
    Publication date: December 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: James J. Whitmore
  • Publication number: 20130097432
    Abstract: A method, system, and computer usable program product for providing consistent cryptographic operations in a data processing environment using protected structured data objects are provided in the illustrative embodiments. A data input is received from an originating application by a security plug-in, both the application and the security plug-in executing in the data processing system. A security schema object is received by the security plug-in, the security schema object describing a sequence of cryptographic operations, wherein the security schema object includes a plurality of components each component describing an aspect of the cryptographic operations. The data input is transformed into a secure structured data object by the security plug-in using the sequence of cryptographic operations. A property of the secure structured data object is populated using data about the security schema object. The secure structured data object is transmitted to a consumer application.
    Type: Application
    Filed: October 13, 2011
    Publication date: April 18, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Julian Ariel Cerruti, Mariela Claudia Lanza, Guillermo Manzato, Mariano Alejandro Prediletto, James J. Whitmore
  • Publication number: 20130097425
    Abstract: Providing consistent cryptographic operations across several applications using secure structured data objects includes a security middleware component, using an application programming interface, receiving a data input from an originating application operating in application space. Both the application and the middleware component execute in the data processing system. A security schema object is retrieved by the security middleware component from an object store, the security schema object describing a sequence of cryptographic operations and includes several components describing aspects of the cryptographic operations. The data input is transformed from a first format to a second format where one of the formats is a secure structured data object formed using the sequence of cryptographic operations. A property of the secure structured data object contains data about the security schema object. The data input is transmitted in the second format to a consumer application operating in application space.
    Type: Application
    Filed: October 13, 2011
    Publication date: April 18, 2013
    Applicant: International Business Machines Corporation
    Inventors: Patricio Marcelo Reyna Almandos, Eduardo Martin Coria, Mariela Claudia Lanza, Guillermo Manzato, Mariano Alejandro Prediletto, James J. Whitmore
  • Publication number: 20120216294
    Abstract: Techniques for establishing entitlement to a computer program product are provided, and include providing a client identity in a registration process to produce an entitlement file, obtaining an encoded version of a computer program product, and transforming the computer program product into an installation product in a computer storage medium, wherein the installation product comprises the entitlement file to establish entitled use of the computer program product.
    Type: Application
    Filed: April 24, 2012
    Publication date: August 23, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Timothy J. Hahn, Bernard P. Palmer, JR., Michael P. Waidner, James J. Whitmore
  • Publication number: 20120210441
    Abstract: Techniques for establishing entitlement to a computer program product are provided, and include providing a client identity in a registration process to produce an entitlement file, obtaining an encoded version of a computer program product, and transforming the computer program product into an installation product in a computer storage medium, wherein the installation product comprises the entitlement file to establish entitled use of the computer program product.
    Type: Application
    Filed: April 24, 2012
    Publication date: August 16, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Timothy J. Hahn, Bernard P. Palmer, JR., Michael P. Waidner, James J. Whitmore
  • Patent number: 8161525
    Abstract: A system and method of designing a secure solution which meets the needs of a customer but which is appropriate and repeatable and may use components which are insecure or not trusted. In its preferred embodiment, the security system includes subsystems selected from access control, information flow, identity and credentials management, integrity and assurance. In each subsystem, elements are employed to reduce the effect of perils and to provide a repeatable system design.
    Type: Grant
    Filed: May 30, 2007
    Date of Patent: April 17, 2012
    Assignee: International Business Machines Corporation
    Inventors: Arthur Miles Gilbert, James J. Whitmore
  • Patent number: 8150717
    Abstract: An automated method, system, device, and/or computer program for performing risk assessment for an information system. A risk assessment tool can receive a scenario for which to perform a risk assessment. A contextual data model and a set of data instances for the information system can be accessed. The contextual data model can define relationships between physical and logical assets of the information system. The contextual data model and set of data instances can be analyzed in relation to the scenario. An action plan can be generated that addresses the scenario.
    Type: Grant
    Filed: January 14, 2008
    Date of Patent: April 3, 2012
    Assignee: International Business Machines Corporation
    Inventor: James J. Whitmore
  • Publication number: 20100218182
    Abstract: Techniques for establishing entitlement to a computer program product are provided, and include providing a client identity in a registration process to produce an entitlement file, obtaining an encoded version of a computer program product, and transforming the computer program product into an installation product in a computer storage medium, wherein the installation product comprises the entitlement file to establish entitled use of the computer program product.
    Type: Application
    Filed: February 26, 2009
    Publication date: August 26, 2010
    Applicant: International Business Machines Corporation
    Inventors: Timothy J. Hahn, Bernard P. Palmer, JR., Michael P. Waidner, James J. Whitmore
  • Publication number: 20090182593
    Abstract: An automated method, system, device, and/or computer program for performing risk assessment for an information system. A risk assessment tool can receive a scenario for which to perform a risk assessment. A contextual data model and a set of data instances for the information system can be accessed. The contextual data model can define relationships between physical and logical assets of the information system. The contextual data model and set of data instances can be analyzed in relation to the scenario. An action plan can be generated that addresses the scenario.
    Type: Application
    Filed: January 14, 2008
    Publication date: July 16, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: JAMES J. WHITMORE
  • Patent number: 7251831
    Abstract: A system and method of designing a secure solution which meets the needs of a customer but which is appropriate and repeatable and may use components which are insecure or not trusted. In its preferred embodiment, the security system includes subsystems selected from access control, information flow, identity and credentials management, integrity and assurance In each subsystem, elements are employed to reduce the effect of perils and to provide a repeatable system design.
    Type: Grant
    Filed: April 19, 2001
    Date of Patent: July 31, 2007
    Assignee: International Business Machines Corporation
    Inventors: Arthur Miles Gilbert, James J. Whitmore