Patents by Inventor Kevin Jimenez Mendez
Kevin Jimenez Mendez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11689523Abstract: Techniques are described with respect to facilitating password creation via a secure device in a defined corporate environment. An associated method includes receiving an authentication request associated with an authorized client of a client system in the defined corporate environment and initializing the secure device with respect to the client system responsive to validating the authentication request. The method further includes creating a password for the client system in compliance with policy criteria associated with the defined corporate environment, encrypting the password, and distributing the password via at least one predetermined technique. In an embodiment, the method further includes creating access control credentials for the client system in compliance with the policy criteria associated with the defined corporate environment.Type: GrantFiled: March 13, 2020Date of Patent: June 27, 2023Assignee: Kyndryl, Inc.Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Ramamohan Chennamsetty, Mauro Marzorati
-
Patent number: 11528280Abstract: A method for preventing unauthorized access of privileged operations of a first device. The method provides for one or more processors to detect an initiating action of a privileged operation of a first device. The one or more processors receive a current location of the first device. The one or more processors determine whether a pre-determined location matches the current location of the first device. In response to determining the current location of the first device fails to match the predetermined location, the one or more processors determine whether a pre-determined connection condition exists between the first device and an authorized device, and in response to determining an absence of the pre-determined connection condition between the first device and the authorized device, the one or more processors perform a first action disabling the privileged operation of the first device.Type: GrantFiled: January 13, 2020Date of Patent: December 13, 2022Assignee: KYNDRYL, INC.Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, David Jaramillo, David Lee
-
Patent number: 11463467Abstract: Disclosed is a computer-implemented method for analyzing server for security vulnerabilities. The method includes selecting a first server from a plurality of servers, wherein the first sever includes a plurality of accounts. The method includes identifying, by a password vulnerability scanner, weak accounts in the plurality of accounts including a first weak account. The method includes determining, by a user risk engine, a user risk score for a user associated with the weak account. The method includes determining, by a server risk engine, a server risk score for the first server, wherein the server risk score is based on a set of server factors and a set of data factors. The method includes generating, by a smart risk scorer, an overall risk score for the first server. The method includes categorizing, based on the overall risk score of the first sever, a risk level for the first server.Type: GrantFiled: January 9, 2020Date of Patent: October 4, 2022Assignee: KYNDRYL, INC.Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, John Richard Feezell, Andre Luis Soares
-
Patent number: 11449800Abstract: Management of machine-learned data between machine-learning devices is facilitated by a processor(s) obtaining a machine-learned data set of a first device, with the machine-learned data set of the first device being categorized machine-learned information. The processor(s) determines one or more device hardware requirements to use the machine-learned data set, and based on receiving a request to provide the machine-learned data set to a second device, determines whether the second device meets the one or more device hardware requirements to use the machine-learned data set of the first device. Based on determining that the second device meets the one or more device hardware requirements, the processor(s) provides the machine-learned data set of the first device to the second device to provide the categorized machine-learned information of the first device to the second device for use by the second device.Type: GrantFiled: February 24, 2020Date of Patent: September 20, 2022Assignee: Kyndryl, Inc.Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Sarbajit K. Rakshit, Craig M. Trim
-
Patent number: 11347671Abstract: A method for protecting a system from a malicious USB device. The method includes one or more computer processors interrupting a universal serial bus (USB) enumeration process corresponding to a first USB device operatively couple to a system. The method further includes determining whether the first USB device is a human interface device (HID) based on a set of descriptor values corresponding to the first USB device. The method further includes responding to determining that that first USB device is a HID by generating a validation challenge. The method further includes presenting the validation challenge to a user of the system. The method further includes responding to determining that the user fulfils one or more actions of the validation challenge by resuming the USB enumeration process corresponding to the first USB device.Type: GrantFiled: July 16, 2020Date of Patent: May 31, 2022Assignee: KYNDRYL, INC.Inventors: Franz Friedrich Liebinger Portela, Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez
-
Publication number: 20220067139Abstract: Embodiments of the present invention disclose solutions that receive a request to boot up an operating system of a computing device and determine whether a hardware component of the computing device is valid. Embodiments of the present invention can also be used to, in response to determining that the hardware component of the computing device is not valid, perform one or more security measures.Type: ApplicationFiled: August 25, 2020Publication date: March 3, 2022Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Romelia H. Flores, David Lee
-
Publication number: 20220019549Abstract: A method for protecting a system from a malicious USB device. The method includes one or more computer processors interrupting a universal serial bus (USB) enumeration process corresponding to a first USB device operatively couple to a system. The method further includes determining whether the first USB device is a human interface device (HID) based on a set of descriptor values corresponding to the first USB device. The method further includes responding to determining that that first USB device is a HID by generating a validation challenge. The method further includes presenting the validation challenge to a user of the system. The method further includes responding to determining that the user fulfils one or more actions of the validation challenge by resuming the USB enumeration process corresponding to the first USB device.Type: ApplicationFiled: July 16, 2020Publication date: January 20, 2022Inventors: Franz Friedrich Liebinger Portela, Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez
-
Publication number: 20210288950Abstract: Techniques are described with respect to facilitating password creation via a secure device in a defined corporate environment. An associated method includes receiving an authentication request associated with an authorized client of a client system in the defined corporate environment and initializing the secure device with respect to the client system responsive to validating the authentication request. The method further includes creating a password for the client system in compliance with policy criteria associated with the defined corporate environment, encrypting the password, and distributing the password via at least one predetermined technique. In an embodiment, the method further includes creating access control credentials for the client system in compliance with the policy criteria associated with the defined corporate environment.Type: ApplicationFiled: March 13, 2020Publication date: September 16, 2021Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Ramamohan Chennamsetty, Mauro Marzorati
-
Publication number: 20210264313Abstract: Management of machine-learned data between machine-learning devices is facilitated by a processor(s) obtaining a machine-learned data set of a first device, with the machine-learned data set of the first device being categorized machine-learned information. The processor(s) determines one or more device hardware requirements to use the machine-learned data set, and based on receiving a request to provide the machine-learned data set to a second device, determines whether the second device meets the one or more device hardware requirements to use the machine-learned data set of the first device. Based on determining that the second device meets the one or more device hardware requirements, the processor(s) provides the machine-learned data set of the first device to the second device to provide the categorized machine-learned information of the first device to the second device for use by the second device.Type: ApplicationFiled: February 24, 2020Publication date: August 26, 2021Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Sarbajit K. Rakshit, Craig M. Trim
-
Patent number: 11082756Abstract: Embodiments describe an approach for crowdsource recording and sharing of media files. Embodiments identify one or more extended audio sources, wherein the one or more extended audio sources are one or more internet of things (IOT) extended audio devices and pair a IOT video capture device with the one or more IOT extended audio devices. Further, embodiments, synchronize an audio recording on the one or more IOT extended audio devices with digital imagery capture on the IOT video capture device and save, the captured digital imagery as one or more media files and the recorded audio as one or more audio files. Additionally, embodiments, process the one or more media files and the one or more audio files by integrating the one or more audio files into the one or more media files and output the processed media file to the IOT video capture device.Type: GrantFiled: June 25, 2019Date of Patent: August 3, 2021Assignee: International Business Machines CorporationInventors: Cesar Augusto Rodriguez Bravo, Shikhar Kwatra, Adam Lee Griffin, Kevin Jimenez Mendez
-
Publication number: 20210218751Abstract: A method for preventing unauthorized access of privileged operations of a first device. The method provides for one or more processors to detect an initiating action of a privileged operation of a first device. The one or more processors receive a current location of the first device. The one or more processors determine whether a pre-determined location matches the current location of the first device. In response to determining the current location of the first device fails to match the predetermined location, the one or more processors determine whether a pre-determined connection condition exists between the first device and an authorized device, and in response to determining an absence of the pre-determined connection condition between the first device and the authorized device, the one or more processors perform a first action disabling the privileged operation of the first device.Type: ApplicationFiled: January 13, 2020Publication date: July 15, 2021Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, David Jaramillo, David Lee
-
Publication number: 20210218765Abstract: Disclosed is a computer-implemented method for analyzing server for security vulnerabilities. The method includes selecting a first server from a plurality of servers, wherein the first sever includes a plurality of accounts. The method includes identifying, by a password vulnerability scanner, weak accounts in the plurality of accounts including a first weak account. The method includes determining, by a user risk engine, a user risk score for a user associated with the weak account. The method includes determining, by a server risk engine, a server risk score for the first server, wherein the server risk score is based on a set of server factors and a set of data factors. The method includes generating, by a smart risk scorer, an overall risk score for the first server. The method includes categorizing, based on the overall risk score of the first sever, a risk level for the first server.Type: ApplicationFiled: January 9, 2020Publication date: July 15, 2021Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, John Richard Feezell, Andre Luis Soares
-
Publication number: 20210211868Abstract: A security system for a computing device is provided. A computing device receives one or more policy decisions from a primary user. A computing device monitors activity associated with one or more applications by a secondary user on a computing device. A computing device detects unauthorized activity by the secondary user on the computing device. In response to a computing device detecting unauthorized activity by the secondary user on the computing device, a computing device activates protected mode on the computing device.Type: ApplicationFiled: January 7, 2020Publication date: July 8, 2021Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Faraz Ahmad, Dino Quintero
-
Patent number: 10896093Abstract: A method and system for improving system maintenance is provided. The method includes detecting software applications, associated processes, and associated services being currently executed via a server system. A script describing the software applications, associated processes, and associated services is generated and a server system reboot process is detected. After the reboot process has executed, it is detected that the server system is currently operational and the script is executed. Each software application is associated with processes and services and it is detected if each software application is fully operational. In response, an operation process associated with the server system is executed.Type: GrantFiled: January 15, 2019Date of Patent: January 19, 2021Assignee: International Business Machines CorporationInventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Erik Rueger
-
Publication number: 20200413161Abstract: Embodiments describe an approach for crowdsource recording and sharing of media files. Embodiments identify one or more extended audio sources, wherein the one or more extended audio sources are one or more internet of things (IOT) extended audio devices and pair a IOT video capture device with the one or more IOT extended audio devices. Further, embodiments, synchronize an audio recording on the one or more IOT extended audio devices with digital imagery capture on the IOT video capture device and save, the captured digital imagery as one or more media files and the recorded audio as one or more audio files. Additionally, embodiments, process the one or more media files and the one or more audio files by integrating the one or more audio files into the one or more media files and output the processed media file to the IOT video capture device.Type: ApplicationFiled: June 25, 2019Publication date: December 31, 2020Inventors: Cesar Augusto Rodriguez Bravo, Shikhar Kwatra, Adam Lee Griffin, Kevin Jimenez Mendez
-
Publication number: 20200226025Abstract: A method and system for improving system maintenance is provided. The method includes detecting software applications, associated processes, and associated services being currently executed via a server system. A script describing the software applications, associated processes, and associated services is generated and a server system reboot process is detected. After the reboot process has executed, it is detected that the server system is currently operational and the script is executed. Each software application is associated with processes and services and it is detected if each software application is fully operational. In response, an operation process associated with the server system is executed.Type: ApplicationFiled: January 15, 2019Publication date: July 16, 2020Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Erik Rueger