Patents by Inventor JOHNNY SHIEH
JOHNNY SHIEH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11902356Abstract: Computer technology for performing a download of a set of file(s) by multiple computer devices. Different computer devices respectively download different parts of the set of files and respectively encapsulate them with file wrappers to create multiple “sealed off portions.” Each sealed off portion indicates what portion of the code of the set of file(s) is in that sealed off portion. The multiple sealed off portions are transferred (for example, over a local area network) to another computer device, which may, or may not, be one of the multiple computers that created one of the sealed off portions, and this computer device assembles the sealed off portions to re-create the set of file(s).Type: GrantFiled: December 21, 2022Date of Patent: February 13, 2024Assignee: International Business Machines CorporationInventors: Johnny Shieh, Kelley Anders, Jessica Murillo
-
Patent number: 11902319Abstract: A computer-implemented process, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor determines a quantity of consecutive unsuccessful attempts to access the targeted item protected by a password. Responsive to the quantity of consecutive unsuccessful attempts to access the targeted item exceeding a predefined threshold, the computer processor acquires a new password for access to the targeted item, wherein the new password is based on a more complex set of password generation rules than a current password. The computer processor changing the current password of the targeted item to the new password, and in response to changing the current password of the targeted item to the new password, the computer processor sends an encrypted message regarding the new password to a user associated with the targeted item.Type: GrantFiled: March 9, 2021Date of Patent: February 13, 2024Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
-
Patent number: 11418539Abstract: A method, computer program product, and a system where a processor(s) determines that a destination has been retained as a link in an application. The processor(s) monitors connections of the application to the destination retained as the link, where connecting is providing a locator of the destination to a server(s) to obtain an address for the destination. The processor(s) determines an average time period measured from providing the locator to the server(s) to obtaining the address. The processor(s) retains the returned address for each connection within a given time period. The processor(s) determines that the application has initiated a new connection to the destination and the new connection is incomplete after a time period calculated relative to the average time period has lapsed. The processor(s) provides selectable options in a user interface of the application that are the retained address(es).Type: GrantFiled: February 7, 2019Date of Patent: August 16, 2022Assignee: International Business Machines CorporationInventor: Johnny Shieh
-
Patent number: 11206234Abstract: In an approach to validating proposed recipients based on message contents, a number of keywords in a message under construction that are not in a keyword database for each addressee in the message under construction are counted. Responsive to determining that the number of keywords that are not in the keyword database for each addressee in the message under construction is above a threshold, notifying the user of a possible incorrect addressee.Type: GrantFiled: January 13, 2020Date of Patent: December 21, 2021Assignee: International Business Machines CorporationInventors: Jessica Murillo, Johnny Shieh
-
Patent number: 11119887Abstract: A computer-implemented method includes: receiving, by a computer device, input to tag at least one line of code with one of plural predefined types of metadata tags, wherein the at least one line of code is a subset of a source code that is stored in a code repository and editable by plural different users via a client source code editor program; tagging, by the computer device, the at least one line of code with the one of the plural predefined types of metadata tags; detecting, by the computer device, a change to the at least one line of code after the tagging; and generating, by the computer device, an alert based on the detecting the change to the at least one line of code.Type: GrantFiled: November 29, 2018Date of Patent: September 14, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Leslie Lundquist, Barbara Elizabeth Wang, Priya Ajay Ingle, Sangeetha Srikanth, Johnny Shieh
-
Publication number: 20210218698Abstract: In an approach to validating proposed recipients based on message contents, a number of keywords in a message under construction that are not in a keyword database for each addressee in the message under construction are counted. Responsive to determining that the number of keywords that are not in the keyword database for each addressee in the message under construction is above a threshold, notifying the user of a possible incorrect addressee.Type: ApplicationFiled: January 13, 2020Publication date: July 15, 2021Inventors: Jessica Murillo, Johnny Shieh
-
Publication number: 20210218768Abstract: A computer-implemented process, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor determines a quantity of consecutive unsuccessful attempts to access the targeted item protected by a password. Responsive to the quantity of consecutive unsuccessful attempts to access the targeted item exceeding a predefined threshold, the computer processor acquires a new password for access to the targeted item, wherein the new password is based on a more complex set of password generation rules than a current password. The computer processor changing the current password of the targeted item to the new password, and in response to changing the current password of the targeted item to the new password, the computer processor sends an encrypted message regarding the new password to a user associated with the targeted item.Type: ApplicationFiled: March 9, 2021Publication date: July 15, 2021Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
-
Patent number: 10992663Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.Type: GrantFiled: November 16, 2017Date of Patent: April 27, 2021Assignee: International Business Machines CorporationInventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
-
Patent number: 10992662Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.Type: GrantFiled: October 9, 2017Date of Patent: April 27, 2021Assignee: International Business Machines CorporationInventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
-
Patent number: 10972498Abstract: A method, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor monitors a password protected account. A frequency of access attempts to the account is determined and in response to the frequency of access attempts exceeding a first threshold, a brute force password attack against the account is determined. A quantity of consecutive unsuccessful access attempts is tracked and responsive to the unsuccessful access attempts exceeding a second predefined threshold, a new password of the account is acquired, in which the new password follows a more complex set of password generation rules than the current password. An encrypted message regarding the new password is sent to a user of the account, the password of the account is reset to the new password, and the quantity of consecutive unsuccessful attempts to access the account is reset to zero.Type: GrantFiled: October 8, 2018Date of Patent: April 6, 2021Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
-
Publication number: 20200258050Abstract: Computer-implemented methods, systems, and computer program products are disclosed in which a first computing device sends a meeting request for person(s) to a second computing device. The first computing device receives from the second computing device, first token(s) granting limited access to calendar information for the person(s) sufficient for conflict clearance, the token(s) having restriction(s). The restriction(s) include one or more of a lifespan for the limited access, an identification of which calendar entries are accessible, an indication of how much of a calendar entry is accessible, a use count for the limited access, showing only available time and encryption of the calendar information. The first computing device sends to the second computing device, a meeting invitation for the person(s) based on the limited access. The first computing device then receives from the second computing device, an acceptance for the meeting invitation.Type: ApplicationFiled: February 11, 2019Publication date: August 13, 2020Inventors: Barbara Elizabeth WANG, Priya Ajay INGLE, Sangeetha SRIKANTH, Johnny SHIEH, Leslie LUNDQUIST
-
Publication number: 20200259859Abstract: A method, computer program product, and a system where a processor(s) determines that a destination has been retained as a link in an application. The processor(s) monitors connections of the application to the destination retained as the link, where connecting is providing a locator of the destination to a server(s) to obtain an address for the destination. The processor(s) determines an average time period measured from providing the locator to the server(s) to obtaining the address. The processor(s) retains the returned address for each connection within a given time period. The processor(s) determines that the application has initiated a new connection to the destination and the new connection is incomplete after a time period calculated relative to the average time period has lapsed. The processor(s) provides selectable options in a user interface of the application that are the retained address(es).Type: ApplicationFiled: February 7, 2019Publication date: August 13, 2020Inventor: Johnny Shieh
-
Publication number: 20200174907Abstract: A computer-implemented method includes: receiving, by a computer device, input to tag at least one line of code with one of plural predefined types of metadata tags, wherein the at least one line of code is a subset of a source code that is stored in a code repository and editable by plural different users via a client source code editor program; tagging, by the computer device, the at least one line of code with the one of the plural predefined types of metadata tags; detecting, by the computer device, a change to the at least one line of code after the tagging; and generating, by the computer device, an alert based on the detecting the change to the at least one line of code.Type: ApplicationFiled: November 29, 2018Publication date: June 4, 2020Inventors: Leslie Lundquist, Barbara Elizabeth Wang, Priya Ajay INGLE, Sangeetha Srikanth, Johnny Shieh
-
Publication number: 20200112585Abstract: A method, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor monitors a password protected account. A frequency of access attempts to the account is determined and in response to the frequency of access attempts exceeding a first threshold, a brute force password attack against the account is determined. A quantity of consecutive unsuccessful access attempts is tracked and responsive to the unsuccessful access attempts exceeding a second predefined threshold, a new password of the account is acquired, in which the new password follows a more complex set of password generation rules than the current password. An encrypted message regarding the new password is sent to a user of the account, the password of the account is reset to the new password, and the quantity of consecutive unsuccessful attempts to access the account is reset to zero.Type: ApplicationFiled: October 8, 2018Publication date: April 9, 2020Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
-
Publication number: 20190109845Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.Type: ApplicationFiled: October 9, 2017Publication date: April 11, 2019Inventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
-
Publication number: 20190109846Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.Type: ApplicationFiled: November 16, 2017Publication date: April 11, 2019Inventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
-
Publication number: 20180206120Abstract: An apparatus for marking electronic messages includes an identity module that determines an identity of a device user attempting to send an electronic message from an electronic communication device of an authorized user and a verification module that verifies that the device user is an authorized proxy user. The apparatus includes a marking module that marks the electronic message being sent with an identifier in response to verifying that the device user is an authorized proxy user. The identifier signifies that the electronic message is from the authorized proxy user, and the identifier is in addition to an identifier associated with the authorized user.Type: ApplicationFiled: January 16, 2017Publication date: July 19, 2018Inventor: JOHNNY SHIEH
-
Patent number: 9146722Abstract: A system and method for efficiently reinstalling computer software, which tracks frequency of utilization for each software application loaded onto the computer and reinstalls applications based on frequency of utilization, with the option to reinstall a computer operating system first or to reinstall computer applications along with libraries, so that computer users can resume working as soon as possible instead of waiting many hours for the entire reinstallation image to complete before a computer system reboot allows for continuation of computer usage.Type: GrantFiled: April 16, 2008Date of Patent: September 29, 2015Assignee: International Business Machines CorporationInventors: Charisse Lu, Emily J. Ratliff, Johnny Shieh
-
Publication number: 20090265702Abstract: A system and method for efficiently reinstalling computer software, which tracks frequency of utilization for each software application loaded onto the computer and reinstalls applications based on frequency of utilization, with the option to reinstall a computer operating system first or to reinstall computer applications along with libraries, so that computer users can resume working as soon as possible instead of waiting many hours for the entire reinstallation image to complete before a computer system reboot allows for continuation of computer usage.Type: ApplicationFiled: April 16, 2008Publication date: October 22, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: CHARISSE LU, EMILY J. RATLIFF, JOHNNY SHIEH
-
Publication number: 20080147469Abstract: An electronic calendar management system for managing a plurality of meeting invitees to limit meeting attendance to a predetermined number of attendees. A meeting planner schedules a meeting using an electronic calendar. A meeting attendee profile (MAP) is defined, comprising parameters that determine the criteria for selecting meeting invitees. The parameters of the MAP are applied against a pool of potential invitee profiles stored in a database to select invitees to the meeting. An electronic mail (email) meeting invitation is then generated and sent to the selected invitees. Invitee responses for each MAP are managed to limit meeting attendance to a predetermined number of attendees. The MAP can be revised by a remedial action, such as the generation of a revised email meeting invitation.Type: ApplicationFiled: December 13, 2006Publication date: June 19, 2008Inventors: Jessica C. Murillo, Gerald F. McBrearty, Susann Keohane, Johnny Shieh, Shawn Mullen