Patents by Inventor Kevin Jimenez Mendez

Kevin Jimenez Mendez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11689523
    Abstract: Techniques are described with respect to facilitating password creation via a secure device in a defined corporate environment. An associated method includes receiving an authentication request associated with an authorized client of a client system in the defined corporate environment and initializing the secure device with respect to the client system responsive to validating the authentication request. The method further includes creating a password for the client system in compliance with policy criteria associated with the defined corporate environment, encrypting the password, and distributing the password via at least one predetermined technique. In an embodiment, the method further includes creating access control credentials for the client system in compliance with the policy criteria associated with the defined corporate environment.
    Type: Grant
    Filed: March 13, 2020
    Date of Patent: June 27, 2023
    Assignee: Kyndryl, Inc.
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Ramamohan Chennamsetty, Mauro Marzorati
  • Patent number: 11528280
    Abstract: A method for preventing unauthorized access of privileged operations of a first device. The method provides for one or more processors to detect an initiating action of a privileged operation of a first device. The one or more processors receive a current location of the first device. The one or more processors determine whether a pre-determined location matches the current location of the first device. In response to determining the current location of the first device fails to match the predetermined location, the one or more processors determine whether a pre-determined connection condition exists between the first device and an authorized device, and in response to determining an absence of the pre-determined connection condition between the first device and the authorized device, the one or more processors perform a first action disabling the privileged operation of the first device.
    Type: Grant
    Filed: January 13, 2020
    Date of Patent: December 13, 2022
    Assignee: KYNDRYL, INC.
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, David Jaramillo, David Lee
  • Patent number: 11463467
    Abstract: Disclosed is a computer-implemented method for analyzing server for security vulnerabilities. The method includes selecting a first server from a plurality of servers, wherein the first sever includes a plurality of accounts. The method includes identifying, by a password vulnerability scanner, weak accounts in the plurality of accounts including a first weak account. The method includes determining, by a user risk engine, a user risk score for a user associated with the weak account. The method includes determining, by a server risk engine, a server risk score for the first server, wherein the server risk score is based on a set of server factors and a set of data factors. The method includes generating, by a smart risk scorer, an overall risk score for the first server. The method includes categorizing, based on the overall risk score of the first sever, a risk level for the first server.
    Type: Grant
    Filed: January 9, 2020
    Date of Patent: October 4, 2022
    Assignee: KYNDRYL, INC.
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, John Richard Feezell, Andre Luis Soares
  • Patent number: 11449800
    Abstract: Management of machine-learned data between machine-learning devices is facilitated by a processor(s) obtaining a machine-learned data set of a first device, with the machine-learned data set of the first device being categorized machine-learned information. The processor(s) determines one or more device hardware requirements to use the machine-learned data set, and based on receiving a request to provide the machine-learned data set to a second device, determines whether the second device meets the one or more device hardware requirements to use the machine-learned data set of the first device. Based on determining that the second device meets the one or more device hardware requirements, the processor(s) provides the machine-learned data set of the first device to the second device to provide the categorized machine-learned information of the first device to the second device for use by the second device.
    Type: Grant
    Filed: February 24, 2020
    Date of Patent: September 20, 2022
    Assignee: Kyndryl, Inc.
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Sarbajit K. Rakshit, Craig M. Trim
  • Patent number: 11347671
    Abstract: A method for protecting a system from a malicious USB device. The method includes one or more computer processors interrupting a universal serial bus (USB) enumeration process corresponding to a first USB device operatively couple to a system. The method further includes determining whether the first USB device is a human interface device (HID) based on a set of descriptor values corresponding to the first USB device. The method further includes responding to determining that that first USB device is a HID by generating a validation challenge. The method further includes presenting the validation challenge to a user of the system. The method further includes responding to determining that the user fulfils one or more actions of the validation challenge by resuming the USB enumeration process corresponding to the first USB device.
    Type: Grant
    Filed: July 16, 2020
    Date of Patent: May 31, 2022
    Assignee: KYNDRYL, INC.
    Inventors: Franz Friedrich Liebinger Portela, Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez
  • Publication number: 20220067139
    Abstract: Embodiments of the present invention disclose solutions that receive a request to boot up an operating system of a computing device and determine whether a hardware component of the computing device is valid. Embodiments of the present invention can also be used to, in response to determining that the hardware component of the computing device is not valid, perform one or more security measures.
    Type: Application
    Filed: August 25, 2020
    Publication date: March 3, 2022
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Romelia H. Flores, David Lee
  • Publication number: 20220019549
    Abstract: A method for protecting a system from a malicious USB device. The method includes one or more computer processors interrupting a universal serial bus (USB) enumeration process corresponding to a first USB device operatively couple to a system. The method further includes determining whether the first USB device is a human interface device (HID) based on a set of descriptor values corresponding to the first USB device. The method further includes responding to determining that that first USB device is a HID by generating a validation challenge. The method further includes presenting the validation challenge to a user of the system. The method further includes responding to determining that the user fulfils one or more actions of the validation challenge by resuming the USB enumeration process corresponding to the first USB device.
    Type: Application
    Filed: July 16, 2020
    Publication date: January 20, 2022
    Inventors: Franz Friedrich Liebinger Portela, Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez
  • Publication number: 20210288950
    Abstract: Techniques are described with respect to facilitating password creation via a secure device in a defined corporate environment. An associated method includes receiving an authentication request associated with an authorized client of a client system in the defined corporate environment and initializing the secure device with respect to the client system responsive to validating the authentication request. The method further includes creating a password for the client system in compliance with policy criteria associated with the defined corporate environment, encrypting the password, and distributing the password via at least one predetermined technique. In an embodiment, the method further includes creating access control credentials for the client system in compliance with the policy criteria associated with the defined corporate environment.
    Type: Application
    Filed: March 13, 2020
    Publication date: September 16, 2021
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Ramamohan Chennamsetty, Mauro Marzorati
  • Publication number: 20210264313
    Abstract: Management of machine-learned data between machine-learning devices is facilitated by a processor(s) obtaining a machine-learned data set of a first device, with the machine-learned data set of the first device being categorized machine-learned information. The processor(s) determines one or more device hardware requirements to use the machine-learned data set, and based on receiving a request to provide the machine-learned data set to a second device, determines whether the second device meets the one or more device hardware requirements to use the machine-learned data set of the first device. Based on determining that the second device meets the one or more device hardware requirements, the processor(s) provides the machine-learned data set of the first device to the second device to provide the categorized machine-learned information of the first device to the second device for use by the second device.
    Type: Application
    Filed: February 24, 2020
    Publication date: August 26, 2021
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Sarbajit K. Rakshit, Craig M. Trim
  • Patent number: 11082756
    Abstract: Embodiments describe an approach for crowdsource recording and sharing of media files. Embodiments identify one or more extended audio sources, wherein the one or more extended audio sources are one or more internet of things (IOT) extended audio devices and pair a IOT video capture device with the one or more IOT extended audio devices. Further, embodiments, synchronize an audio recording on the one or more IOT extended audio devices with digital imagery capture on the IOT video capture device and save, the captured digital imagery as one or more media files and the recorded audio as one or more audio files. Additionally, embodiments, process the one or more media files and the one or more audio files by integrating the one or more audio files into the one or more media files and output the processed media file to the IOT video capture device.
    Type: Grant
    Filed: June 25, 2019
    Date of Patent: August 3, 2021
    Assignee: International Business Machines Corporation
    Inventors: Cesar Augusto Rodriguez Bravo, Shikhar Kwatra, Adam Lee Griffin, Kevin Jimenez Mendez
  • Publication number: 20210218751
    Abstract: A method for preventing unauthorized access of privileged operations of a first device. The method provides for one or more processors to detect an initiating action of a privileged operation of a first device. The one or more processors receive a current location of the first device. The one or more processors determine whether a pre-determined location matches the current location of the first device. In response to determining the current location of the first device fails to match the predetermined location, the one or more processors determine whether a pre-determined connection condition exists between the first device and an authorized device, and in response to determining an absence of the pre-determined connection condition between the first device and the authorized device, the one or more processors perform a first action disabling the privileged operation of the first device.
    Type: Application
    Filed: January 13, 2020
    Publication date: July 15, 2021
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, David Jaramillo, David Lee
  • Publication number: 20210218765
    Abstract: Disclosed is a computer-implemented method for analyzing server for security vulnerabilities. The method includes selecting a first server from a plurality of servers, wherein the first sever includes a plurality of accounts. The method includes identifying, by a password vulnerability scanner, weak accounts in the plurality of accounts including a first weak account. The method includes determining, by a user risk engine, a user risk score for a user associated with the weak account. The method includes determining, by a server risk engine, a server risk score for the first server, wherein the server risk score is based on a set of server factors and a set of data factors. The method includes generating, by a smart risk scorer, an overall risk score for the first server. The method includes categorizing, based on the overall risk score of the first sever, a risk level for the first server.
    Type: Application
    Filed: January 9, 2020
    Publication date: July 15, 2021
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, John Richard Feezell, Andre Luis Soares
  • Publication number: 20210211868
    Abstract: A security system for a computing device is provided. A computing device receives one or more policy decisions from a primary user. A computing device monitors activity associated with one or more applications by a secondary user on a computing device. A computing device detects unauthorized activity by the secondary user on the computing device. In response to a computing device detecting unauthorized activity by the secondary user on the computing device, a computing device activates protected mode on the computing device.
    Type: Application
    Filed: January 7, 2020
    Publication date: July 8, 2021
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Faraz Ahmad, Dino Quintero
  • Patent number: 10896093
    Abstract: A method and system for improving system maintenance is provided. The method includes detecting software applications, associated processes, and associated services being currently executed via a server system. A script describing the software applications, associated processes, and associated services is generated and a server system reboot process is detected. After the reboot process has executed, it is detected that the server system is currently operational and the script is executed. Each software application is associated with processes and services and it is detected if each software application is fully operational. In response, an operation process associated with the server system is executed.
    Type: Grant
    Filed: January 15, 2019
    Date of Patent: January 19, 2021
    Assignee: International Business Machines Corporation
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Erik Rueger
  • Publication number: 20200413161
    Abstract: Embodiments describe an approach for crowdsource recording and sharing of media files. Embodiments identify one or more extended audio sources, wherein the one or more extended audio sources are one or more internet of things (IOT) extended audio devices and pair a IOT video capture device with the one or more IOT extended audio devices. Further, embodiments, synchronize an audio recording on the one or more IOT extended audio devices with digital imagery capture on the IOT video capture device and save, the captured digital imagery as one or more media files and the recorded audio as one or more audio files. Additionally, embodiments, process the one or more media files and the one or more audio files by integrating the one or more audio files into the one or more media files and output the processed media file to the IOT video capture device.
    Type: Application
    Filed: June 25, 2019
    Publication date: December 31, 2020
    Inventors: Cesar Augusto Rodriguez Bravo, Shikhar Kwatra, Adam Lee Griffin, Kevin Jimenez Mendez
  • Publication number: 20200226025
    Abstract: A method and system for improving system maintenance is provided. The method includes detecting software applications, associated processes, and associated services being currently executed via a server system. A script describing the software applications, associated processes, and associated services is generated and a server system reboot process is detected. After the reboot process has executed, it is detected that the server system is currently operational and the script is executed. Each software application is associated with processes and services and it is detected if each software application is fully operational. In response, an operation process associated with the server system is executed.
    Type: Application
    Filed: January 15, 2019
    Publication date: July 16, 2020
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Erik Rueger