Patents by Inventor Mark J. Hoesl
Mark J. Hoesl has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10348733Abstract: Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system allows access to the resource by removing the security restriction on the resource. The security restriction on the resource may be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.Type: GrantFiled: July 5, 2017Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventor: Mark J. Hoesl
-
Publication number: 20170302674Abstract: Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system allows access to the resource by removing the security restriction on the resource. The security restriction on the resource may be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.Type: ApplicationFiled: July 5, 2017Publication date: October 19, 2017Inventor: Mark J. Hoesl
-
Patent number: 9781121Abstract: Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system removes the security restriction from the resource to allow at least one of: access to the IT account of the user, and operation of the apparatus. The security restriction on the resource may be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.Type: GrantFiled: November 24, 2015Date of Patent: October 3, 2017Assignee: International Business Machines CorporationInventor: Mark J. Hoesl
-
Publication number: 20160080388Abstract: Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system removes the security restriction from the resource to allow at least one of: access to the IT account of the user, and operation of the apparatus. The security restriction on the resource may be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.Type: ApplicationFiled: November 24, 2015Publication date: March 17, 2016Inventor: Mark J. Hoesl
-
Patent number: 9253179Abstract: Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system removes the security restriction from the resource to allow at least one of: access to the IT account of the user, and operation of the apparatus. The security restriction on the resource may then be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.Type: GrantFiled: November 27, 2013Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventor: Mark J. Hoesl
-
Patent number: 9024765Abstract: A method, system or computer usable program product for providing alerts of inefficiency of an environmental conditioning system including, responsive to a cycle initiation by the environmental conditioning system, measuring a difference between an intake temperature and an outlet temperature after a predetermined period of time, and responsive to the difference being below a minimum level, generating an alert.Type: GrantFiled: January 11, 2012Date of Patent: May 5, 2015Assignee: International Business Machines CorporationInventor: Mark J. Hoesl
-
Patent number: 8756655Abstract: Embodiments described herein provide security for a user integrated technology (IT) account by integrating a facility's physical access controls with its IT security system to provide authorization and access. When a user is granted facility access, his/her accounts are automatically enabled or provisioned via an IT security system. When the user exits the facility, his/her accounts are automatically disabled or de-provisioned via the IT security system. The IT security system maintains the user IT account in a secured state until the user credentials are verified at an access control point to enable access to the user IT account, and returns the user IT account to the secured state after receiving the user credentials at the access control point to disable access to the user IT account. As such, the user IT account is secured when not needed by the user to reduce periods of vulnerability.Type: GrantFiled: July 13, 2012Date of Patent: June 17, 2014Assignee: International Business Machines CorporationInventor: Mark J. Hoesl
-
Publication number: 20140096204Abstract: Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system removes the security restriction from the resource to allow at least one of: access to the IT account of the user, and operation of the apparatus. The security restriction on the resource may then be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.Type: ApplicationFiled: November 27, 2013Publication date: April 3, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Mark J. Hoesl
-
Publication number: 20140020056Abstract: Embodiments described herein provide security for a user integrated technology (IT) account by integrating a facility's physical access controls with its IT security system to provide authorization and access. When a user is granted facility access, his/her accounts are automatically enabled or provisioned via an IT security system. When the user exits the facility, his/her accounts are automatically disabled or de-provisioned via the IT security system. The IT security system maintains the user IT account in a secured state until the user credentials are verified at an access control point to enable access to the user IT account, and returns the user IT account to the secured state after receiving the user credentials at the access control point to disable access to the user IT account. As such, the user IT account is secured when not needed by the user to reduce periods of vulnerability.Type: ApplicationFiled: July 13, 2012Publication date: January 16, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Mark J. Hoesl
-
Publication number: 20130176130Abstract: A method, system or computer usable program product for providing alerts of inefficiency of an environmental conditioning system including, responsive to a cycle initiation by the environmental conditioning system, measuring a difference between an intake temperature and an outlet temperature after a predetermined period of time, and responsive to the difference being below a minimum level, generating an alert.Type: ApplicationFiled: January 11, 2012Publication date: July 11, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Mark J. Hoesl