Patents by Inventor JOHNNY SHIEH

JOHNNY SHIEH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11902356
    Abstract: Computer technology for performing a download of a set of file(s) by multiple computer devices. Different computer devices respectively download different parts of the set of files and respectively encapsulate them with file wrappers to create multiple “sealed off portions.” Each sealed off portion indicates what portion of the code of the set of file(s) is in that sealed off portion. The multiple sealed off portions are transferred (for example, over a local area network) to another computer device, which may, or may not, be one of the multiple computers that created one of the sealed off portions, and this computer device assembles the sealed off portions to re-create the set of file(s).
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: February 13, 2024
    Assignee: International Business Machines Corporation
    Inventors: Johnny Shieh, Kelley Anders, Jessica Murillo
  • Patent number: 11902319
    Abstract: A computer-implemented process, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor determines a quantity of consecutive unsuccessful attempts to access the targeted item protected by a password. Responsive to the quantity of consecutive unsuccessful attempts to access the targeted item exceeding a predefined threshold, the computer processor acquires a new password for access to the targeted item, wherein the new password is based on a more complex set of password generation rules than a current password. The computer processor changing the current password of the targeted item to the new password, and in response to changing the current password of the targeted item to the new password, the computer processor sends an encrypted message regarding the new password to a user associated with the targeted item.
    Type: Grant
    Filed: March 9, 2021
    Date of Patent: February 13, 2024
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
  • Patent number: 11418539
    Abstract: A method, computer program product, and a system where a processor(s) determines that a destination has been retained as a link in an application. The processor(s) monitors connections of the application to the destination retained as the link, where connecting is providing a locator of the destination to a server(s) to obtain an address for the destination. The processor(s) determines an average time period measured from providing the locator to the server(s) to obtaining the address. The processor(s) retains the returned address for each connection within a given time period. The processor(s) determines that the application has initiated a new connection to the destination and the new connection is incomplete after a time period calculated relative to the average time period has lapsed. The processor(s) provides selectable options in a user interface of the application that are the retained address(es).
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: August 16, 2022
    Assignee: International Business Machines Corporation
    Inventor: Johnny Shieh
  • Patent number: 11206234
    Abstract: In an approach to validating proposed recipients based on message contents, a number of keywords in a message under construction that are not in a keyword database for each addressee in the message under construction are counted. Responsive to determining that the number of keywords that are not in the keyword database for each addressee in the message under construction is above a threshold, notifying the user of a possible incorrect addressee.
    Type: Grant
    Filed: January 13, 2020
    Date of Patent: December 21, 2021
    Assignee: International Business Machines Corporation
    Inventors: Jessica Murillo, Johnny Shieh
  • Patent number: 11119887
    Abstract: A computer-implemented method includes: receiving, by a computer device, input to tag at least one line of code with one of plural predefined types of metadata tags, wherein the at least one line of code is a subset of a source code that is stored in a code repository and editable by plural different users via a client source code editor program; tagging, by the computer device, the at least one line of code with the one of the plural predefined types of metadata tags; detecting, by the computer device, a change to the at least one line of code after the tagging; and generating, by the computer device, an alert based on the detecting the change to the at least one line of code.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: September 14, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Leslie Lundquist, Barbara Elizabeth Wang, Priya Ajay Ingle, Sangeetha Srikanth, Johnny Shieh
  • Publication number: 20210218698
    Abstract: In an approach to validating proposed recipients based on message contents, a number of keywords in a message under construction that are not in a keyword database for each addressee in the message under construction are counted. Responsive to determining that the number of keywords that are not in the keyword database for each addressee in the message under construction is above a threshold, notifying the user of a possible incorrect addressee.
    Type: Application
    Filed: January 13, 2020
    Publication date: July 15, 2021
    Inventors: Jessica Murillo, Johnny Shieh
  • Publication number: 20210218768
    Abstract: A computer-implemented process, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor determines a quantity of consecutive unsuccessful attempts to access the targeted item protected by a password. Responsive to the quantity of consecutive unsuccessful attempts to access the targeted item exceeding a predefined threshold, the computer processor acquires a new password for access to the targeted item, wherein the new password is based on a more complex set of password generation rules than a current password. The computer processor changing the current password of the targeted item to the new password, and in response to changing the current password of the targeted item to the new password, the computer processor sends an encrypted message regarding the new password to a user associated with the targeted item.
    Type: Application
    Filed: March 9, 2021
    Publication date: July 15, 2021
    Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
  • Patent number: 10992663
    Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.
    Type: Grant
    Filed: November 16, 2017
    Date of Patent: April 27, 2021
    Assignee: International Business Machines Corporation
    Inventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
  • Patent number: 10992662
    Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.
    Type: Grant
    Filed: October 9, 2017
    Date of Patent: April 27, 2021
    Assignee: International Business Machines Corporation
    Inventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
  • Patent number: 10972498
    Abstract: A method, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor monitors a password protected account. A frequency of access attempts to the account is determined and in response to the frequency of access attempts exceeding a first threshold, a brute force password attack against the account is determined. A quantity of consecutive unsuccessful access attempts is tracked and responsive to the unsuccessful access attempts exceeding a second predefined threshold, a new password of the account is acquired, in which the new password follows a more complex set of password generation rules than the current password. An encrypted message regarding the new password is sent to a user of the account, the password of the account is reset to the new password, and the quantity of consecutive unsuccessful attempts to access the account is reset to zero.
    Type: Grant
    Filed: October 8, 2018
    Date of Patent: April 6, 2021
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
  • Publication number: 20200258050
    Abstract: Computer-implemented methods, systems, and computer program products are disclosed in which a first computing device sends a meeting request for person(s) to a second computing device. The first computing device receives from the second computing device, first token(s) granting limited access to calendar information for the person(s) sufficient for conflict clearance, the token(s) having restriction(s). The restriction(s) include one or more of a lifespan for the limited access, an identification of which calendar entries are accessible, an indication of how much of a calendar entry is accessible, a use count for the limited access, showing only available time and encryption of the calendar information. The first computing device sends to the second computing device, a meeting invitation for the person(s) based on the limited access. The first computing device then receives from the second computing device, an acceptance for the meeting invitation.
    Type: Application
    Filed: February 11, 2019
    Publication date: August 13, 2020
    Inventors: Barbara Elizabeth WANG, Priya Ajay INGLE, Sangeetha SRIKANTH, Johnny SHIEH, Leslie LUNDQUIST
  • Publication number: 20200259859
    Abstract: A method, computer program product, and a system where a processor(s) determines that a destination has been retained as a link in an application. The processor(s) monitors connections of the application to the destination retained as the link, where connecting is providing a locator of the destination to a server(s) to obtain an address for the destination. The processor(s) determines an average time period measured from providing the locator to the server(s) to obtaining the address. The processor(s) retains the returned address for each connection within a given time period. The processor(s) determines that the application has initiated a new connection to the destination and the new connection is incomplete after a time period calculated relative to the average time period has lapsed. The processor(s) provides selectable options in a user interface of the application that are the retained address(es).
    Type: Application
    Filed: February 7, 2019
    Publication date: August 13, 2020
    Inventor: Johnny Shieh
  • Publication number: 20200174907
    Abstract: A computer-implemented method includes: receiving, by a computer device, input to tag at least one line of code with one of plural predefined types of metadata tags, wherein the at least one line of code is a subset of a source code that is stored in a code repository and editable by plural different users via a client source code editor program; tagging, by the computer device, the at least one line of code with the one of the plural predefined types of metadata tags; detecting, by the computer device, a change to the at least one line of code after the tagging; and generating, by the computer device, an alert based on the detecting the change to the at least one line of code.
    Type: Application
    Filed: November 29, 2018
    Publication date: June 4, 2020
    Inventors: Leslie Lundquist, Barbara Elizabeth Wang, Priya Ajay INGLE, Sangeetha Srikanth, Johnny Shieh
  • Publication number: 20200112585
    Abstract: A method, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor monitors a password protected account. A frequency of access attempts to the account is determined and in response to the frequency of access attempts exceeding a first threshold, a brute force password attack against the account is determined. A quantity of consecutive unsuccessful access attempts is tracked and responsive to the unsuccessful access attempts exceeding a second predefined threshold, a new password of the account is acquired, in which the new password follows a more complex set of password generation rules than the current password. An encrypted message regarding the new password is sent to a user of the account, the password of the account is reset to the new password, and the quantity of consecutive unsuccessful attempts to access the account is reset to zero.
    Type: Application
    Filed: October 8, 2018
    Publication date: April 9, 2020
    Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
  • Publication number: 20190109845
    Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.
    Type: Application
    Filed: October 9, 2017
    Publication date: April 11, 2019
    Inventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
  • Publication number: 20190109846
    Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.
    Type: Application
    Filed: November 16, 2017
    Publication date: April 11, 2019
    Inventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
  • Publication number: 20180206120
    Abstract: An apparatus for marking electronic messages includes an identity module that determines an identity of a device user attempting to send an electronic message from an electronic communication device of an authorized user and a verification module that verifies that the device user is an authorized proxy user. The apparatus includes a marking module that marks the electronic message being sent with an identifier in response to verifying that the device user is an authorized proxy user. The identifier signifies that the electronic message is from the authorized proxy user, and the identifier is in addition to an identifier associated with the authorized user.
    Type: Application
    Filed: January 16, 2017
    Publication date: July 19, 2018
    Inventor: JOHNNY SHIEH
  • Patent number: 9146722
    Abstract: A system and method for efficiently reinstalling computer software, which tracks frequency of utilization for each software application loaded onto the computer and reinstalls applications based on frequency of utilization, with the option to reinstall a computer operating system first or to reinstall computer applications along with libraries, so that computer users can resume working as soon as possible instead of waiting many hours for the entire reinstallation image to complete before a computer system reboot allows for continuation of computer usage.
    Type: Grant
    Filed: April 16, 2008
    Date of Patent: September 29, 2015
    Assignee: International Business Machines Corporation
    Inventors: Charisse Lu, Emily J. Ratliff, Johnny Shieh
  • Publication number: 20090265702
    Abstract: A system and method for efficiently reinstalling computer software, which tracks frequency of utilization for each software application loaded onto the computer and reinstalls applications based on frequency of utilization, with the option to reinstall a computer operating system first or to reinstall computer applications along with libraries, so that computer users can resume working as soon as possible instead of waiting many hours for the entire reinstallation image to complete before a computer system reboot allows for continuation of computer usage.
    Type: Application
    Filed: April 16, 2008
    Publication date: October 22, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: CHARISSE LU, EMILY J. RATLIFF, JOHNNY SHIEH
  • Publication number: 20080147469
    Abstract: An electronic calendar management system for managing a plurality of meeting invitees to limit meeting attendance to a predetermined number of attendees. A meeting planner schedules a meeting using an electronic calendar. A meeting attendee profile (MAP) is defined, comprising parameters that determine the criteria for selecting meeting invitees. The parameters of the MAP are applied against a pool of potential invitee profiles stored in a database to select invitees to the meeting. An electronic mail (email) meeting invitation is then generated and sent to the selected invitees. Invitee responses for each MAP are managed to limit meeting attendance to a predetermined number of attendees. The MAP can be revised by a remedial action, such as the generation of a revised email meeting invitation.
    Type: Application
    Filed: December 13, 2006
    Publication date: June 19, 2008
    Inventors: Jessica C. Murillo, Gerald F. McBrearty, Susann Keohane, Johnny Shieh, Shawn Mullen