Patents by Inventor Linda A. Zimmer
Linda A. Zimmer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11030349Abstract: The method, computer program product and computer system may include computing device which may detect a first user within a defined area of a display device and the first user may have a first security level. The computing device may display data on the display device and the data may be associated with a security parameter defining a security level for viewing the data. The computing device may detect a second user within the defined area of the display device and the second user may have a second security level. The computing device may determine that the second security level of the second user does not meet the security parameter for viewing the data and redact the data in response to determining that the second user does not meet the security parameter for viewing the data.Type: GrantFiled: October 26, 2018Date of Patent: June 8, 2021Assignee: International Business Machines CorporationInventors: Vijaya Balakrishna, Ambal Balakrishnan, Brian Clarke, Andrew R. Jones, Linda Zimmer
-
Patent number: 11030351Abstract: The method, computer program product and computer system may include computing device which may detect a first user within a defined area of a display device and the first user may have a first security level. The computing device may display data on the display device and the data may be associated with a security parameter defining a security level for viewing the data. The computing device may detect a second user within the defined area of the display device and the second user may have a second security level. The computing device may determine that the second security level of the second user does not meet the security parameter for viewing the data and redact the data in response to determining that the second user does not meet the security parameter for viewing the data.Type: GrantFiled: July 17, 2019Date of Patent: June 8, 2021Assignee: International Business Machines CorporationInventors: Vijaya Balakrishna, Ambal Balakrishnan, Brian Clarke, Andrew R. Jones, Linda Zimmer
-
Publication number: 20200134238Abstract: The method, computer program product and computer system may include computing device which may detect a first user within a defined area of a display device and the first user may have a first security level. The computing device may display data on the display device and the data may be associated with a security parameter defining a security level for viewing the data. The computing device may detect a second user within the defined area of the display device and the second user may have a second security level. The computing device may determine that the second security level of the second user does not meet the security parameter for viewing the data and redact the data in response to determining that the second user does not meet the security parameter for viewing the data.Type: ApplicationFiled: October 26, 2018Publication date: April 30, 2020Inventors: Vijaya Balakrishna, Ambal Balakrishnan, Brian Clarke, Andrew R. Jones, Linda Zimmer
-
Publication number: 20200134240Abstract: The method, computer program product and computer system may include computing device which may detect a first user within a defined area of a display device and the first user may have a first security level. The computing device may display data on the display device and the data may be associated with a security parameter defining a security level for viewing the data. The computing device may detect a second user within the defined area of the display device and the second user may have a second security level. The computing device may determine that the second security level of the second user does not meet the security parameter for viewing the data and redact the data in response to determining that the second user does not meet the security parameter for viewing the data.Type: ApplicationFiled: July 17, 2019Publication date: April 30, 2020Inventors: Vijaya Balakrishna, Ambal Balakrishnan, Brian Clarke, Andrew R. Jones, Linda Zimmer
-
Patent number: 9122534Abstract: A computer implemented method, data processing system, and computer program product for configuring a partition with needed system resources to enable an application to run and process in a secure environment. Upon receiving a command to create a short lived secure partition for a secure application, a short lived secure partition is created in the data processing system. This short lived secure partition is inaccessible by superusers or other applications. System resources comprising physical resources and virtual allocations of the physical resources are allocated to the short lived secure partition. Hardware and software components needed to run the secure application are loaded into the short lived secure partition.Type: GrantFiled: April 15, 2013Date of Patent: September 1, 2015Assignee: International Business Machines CorporationInventors: Jos M. Accapadi, Andrew Dunshea, Lynne M. Weber, Linda A. Zimmer
-
Publication number: 20130232502Abstract: A computer implemented method, data processing system, and computer program product for configuring a partition with needed system resources to enable an application to run and process in a secure environment. Upon receiving a command to create a short lived secure partition for a secure application, a short lived secure partition is created in the data processing system. This short lived secure partition is inaccessible by superusers or other applications. System resources comprising physical resources and virtual allocations of the physical resources are allocated to the short lived secure partition. Hardware and software components needed to run the secure application are loaded into the short lived secure partition.Type: ApplicationFiled: April 15, 2013Publication date: September 5, 2013Applicant: International Business Machines CorporationInventors: Jos M. Accapadi, Andrew Dunshea, Lynne M. Weber, Linda A. Zimmer
-
Patent number: 8352729Abstract: Disclosed is a computer implemented method and apparatus to secure a routing path. A local node receives a request for secure route identification from an upstream node. Responsive to receiving a request for secure route identification, the local node transmits a local node security level and an authentication key to the upstream node. The local node determines whether at least one downstream node is authentic and has sufficient security level from a second-level downstream node. The local node may then establish a socket to the upstream node.Type: GrantFiled: July 29, 2008Date of Patent: January 8, 2013Assignee: International Business Machines CorporationInventors: Robert S. Manning, Linda A. Zimmer, Jos M. Accapadi
-
Publication number: 20100031019Abstract: Disclosed is a computer implemented method and apparatus to secure a routing path. A local node receives a request for secure route identification from an upstream node. Responsive to receiving a request for secure route identification, the local node transmits a local node security level and an authentication key to the upstream node. The local node determines whether at least one downstream node is authentic and has sufficient security level from a second-level downstream node. The local node may then establish a socket to the upstream node.Type: ApplicationFiled: July 29, 2008Publication date: February 4, 2010Inventors: Robert S. Manning, Linda A. Zimmer, Jos M. Accapadi