Patents by Inventor Michael C. Thompson

Michael C. Thompson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9729438
    Abstract: A system and computer-implemented method for cloud-based anonymous traffic routing is disclosed. The method may include receiving, from a client application by a router, network traffic identified for a destination. The method may include determining, for a set of internal cloud nodes distinct from both the client application and the destination, a set of internet protocol (IP) addresses including a first IP address for a first internal cloud node of the set of internal cloud nodes. The method may also include establishing an anonymity algorithm for cloud-based anonymous traffic routing, the anonymity algorithm configured to use the set of IP addresses. The method may also include routing, based on the anonymity algorithm, the network traffic to the first internal cloud node using the first IP address. The method may also include routing the network traffic from the set of internal cloud nodes to the destination identified by the client application.
    Type: Grant
    Filed: June 25, 2014
    Date of Patent: August 8, 2017
    Assignee: International Business Machines Corporation
    Inventors: Michal Broz, Steven D. Clay, Federico A. Galarraga, Eduardo N. Spring, Michael C. Thompson
  • Patent number: 9599967
    Abstract: A method, executed by a computer, for deferring an alarm includes determining a user's location relative to an appointment, calculating a required alert time, and setting a deferral duration to less than or equal to a difference between a required alert time and a current time. In some embodiments, a final alarm is activated when the deferral duration has elapsed. The alarm may be deactivated when the appointment occurs or when the user arrives at the appointment location. In some embodiments, the travel time to the appointment is calculated and the mode of transportation is determined. The required alert time may correspond to an amount of time the user requires to prepare for the appointment or for departure to the appointment. A computer program product and computer system corresponding to the above method are also disclosed herein.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: March 21, 2017
    Assignee: International Business Machines Corporation
    Inventors: Dana L. Price, Michael C. Thompson
  • Patent number: 9582407
    Abstract: Mechanisms are provided for performing security role definition testing. An application is received in a container of a runtime environment of the data processing system. The application has methods and security role definitions associated with the methods. A properties object, which specifies a user identifier to security role mapping, is received in the container. A test application is executed, in the container, by the processor, on an execution of the methods of the application based on the user identifier to security role mapping and the security role definitions. The test application tests an operation of the application with regard to the security role definitions. A result of the execution of the test application on the execution of the methods of the application is then output.
    Type: Grant
    Filed: February 25, 2011
    Date of Patent: February 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Paul W. Bennett, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
  • Publication number: 20170031325
    Abstract: A method, executed by a computer, for deferring an alarm includes determining a user's location relative to an appointment, calculating a required alert time, and setting a deferral duration to less than or equal to a difference between a required alert time and a current time. In some embodiments, a final alarm is activated when the deferral duration has elapsed. The alarm may be deactivated when the appointment occurs or when the user arrives at the appointment location. In some embodiments, the travel time to the appointment is calculated and the mode of transportation is determined. The required alert time may correspond to an amount of time the user requires to prepare for the appointment or for departure to the appointment. A computer program product and computer system corresponding to the above method are also disclosed herein.
    Type: Application
    Filed: July 27, 2015
    Publication date: February 2, 2017
    Inventors: Dana L. Price, Michael C. Thompson
  • Patent number: 9292702
    Abstract: Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first security configuration via a thread of execution, wherein a security configuration comprises at least one security parameter. The thread receives an incoming request. The thread switches to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request. The thread stores the second security configuration or a reference to the second security configuration to a stack. The thread authenticates the incoming request based on the second security configuration. The thread grants or denies access to the resource. The thread executes a method referenced in the incoming request. The thread restores to a first security configuration, responsive to completing the method.
    Type: Grant
    Filed: August 20, 2009
    Date of Patent: March 22, 2016
    Assignee: International Business Machines Corporation
    Inventors: Paul W. Bennett, Elisa A. Ferracane, Daniel E. Morris, Michael C. Thompson
  • Publication number: 20150381487
    Abstract: A system and computer-implemented method for cloud-based anonymous traffic routing is disclosed. The method may include receiving, from a client application by a router, network traffic identified for a destination. The method may include determining, for a set of internal cloud nodes distinct from both the client application and the destination, a set of internet protocol (IP) addresses including a first IP address for a first internal cloud node of the set of internal cloud nodes. The method may also include establishing an anonymity algorithm for cloud-based anonymous traffic routing, the anonymity algorithm configured to use the set of IP addresses. The method may also include routing, based on the anonymity algorithm, the network traffic to the first internal cloud node using the first IP address. The method may also include routing the network traffic from the set of internal cloud nodes to the destination identified by the client application.
    Type: Application
    Filed: June 25, 2014
    Publication date: December 31, 2015
    Inventors: Michal Broz, Steven D. Clay, Federico A. Galarraga, Eduardo N. Spring, Michael C. Thompson
  • Patent number: 9147062
    Abstract: A method, data processing system, and computer program product for managing user identification information. A determination is made whether an instance of security information in use on the first application server and referenced by a token that has expired was generated by an application server compatible with a first application server in response to receiving the token. A determination is made whether the instance of the security information is managed by a set of rules for a group of users of the first application server. A determination is made whether a user identifier from the token is authorized to access the first application server. The token is renewed in response to determining that the user identifier is authorized to access the first application server.
    Type: Grant
    Filed: June 29, 2011
    Date of Patent: September 29, 2015
    Assignee: International Business Machines Corporation
    Inventors: Paul W. Bennett, Christopher M. Dettlaff, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
  • Publication number: 20150226004
    Abstract: A system and method for locating and verifying a position of an underground target utilizes a virtual reality display to guide a cutting probe to the target. Initial coordinates of the target may be obtained from prior survey data and a vertical access borehole is excavated at the initial coordinates in a first attempt to verify the target position. If the target it not encountered at the initial coordinates, a lateral sensor is positioned within the vertical access borehole to determine three-dimensional coordinates of the target. A second borehole is then excavated by a cutting head that is guided to the three-dimensional target coordinates with the assistance of a virtual reality display that shows both the target coordinates and a real time position of the cutting head. A down-hole camera or other sensor positioned within the second borehole may verify the presence or condition of the target.
    Type: Application
    Filed: February 10, 2014
    Publication date: August 13, 2015
    Inventor: Michael C. Thompson
  • Patent number: 8955052
    Abstract: A method, system and computer-usable medium are disclosed for managing identity authorizations to access information processing system resources. An application thread requiring access to target resources is initiated and associated with an authenticated client identity and a server identity. The resource authorization attribute of a resource required for execution of the application thread designates the use of a client identity, a server identity, or a client identity and server identity when attempting authorized access of the resource. The client identity, the server identity, or the client identity and server identity is then respectively used to access the target resource and the application thread is executed.
    Type: Grant
    Filed: May 27, 2010
    Date of Patent: February 10, 2015
    Assignee: International Business Machines Corporation
    Inventors: William J. O'Donnell, Elisa Ferracane, Paul W. Bennett, Michael C. Thompson
  • Patent number: 8522307
    Abstract: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    Type: Grant
    Filed: March 6, 2012
    Date of Patent: August 27, 2013
    Assignee: International Business Machines Corporation
    Inventors: Paul W. Bennett, Elisa Ferracane, Daniel E. Morris, Michael C. Thompson
  • Publication number: 20130056385
    Abstract: A pill container and method for staging and storing pills or other small objects includes a plurality of storage cells, where each cell defines a top opening and a bottom refill opening. Pills are staged in a sorting area disposed on a bottom side of the pill container, allowing verification by sight and feel of a correct number and type of pill before being dropped into the storage cells. A slide bar is moved to an open position to align holes in the slide bar with the refill openings in the bottom of the storage cells, thereby allowing the pills to be loaded into the storage cells. The slide bar is moved back to a closed position to seal the holes in the bottom of the storage cells. A locking mechanism is provided to provide protection again accidental against accidental movement of the slide bar.
    Type: Application
    Filed: August 24, 2012
    Publication date: March 7, 2013
    Inventors: Michael C. Thompson, Yung Chung Chen
  • Publication number: 20130007856
    Abstract: A method, data processing system, and computer program product for managing user identification information. A determination is made whether an instance of security information in use on the first application server and referenced by a token that has expired was generated by an application server compatible with a first application server in response to receiving the token. A determination is made whether the instance of the security information is managed by a set of rules for a group of users of the first application server. A determination is made whether a user identifier from the token is authorized to access the first application server. The token is renewed in response to determining that the user identifier is authorized to access the first application server.
    Type: Application
    Filed: June 29, 2011
    Publication date: January 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul W. Bennett, Christopher M. Dettlaff, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
  • Publication number: 20120279506
    Abstract: A mouthguard includes an integrally molded tray having upper and lower portions joined by a hinge along an inner portion of the tray that defines an open-sided channel gap between the upper and lower tray portions. Shock forces tending to deflect the lower portion of the tray toward the upper portion are countered by a moment resistance of the hinge as the channel gap between the upper and lower tray portions closes. Additional energy absorption is provided by a cushion liner attached to an inner surface of the tray that prevents contact between the upper and lower tray portions, as well as an air cell defined by an occlusal pad attached to the lower tray portion. Embodiments include a detachable tether that is received within a tether mount incorporated within the mouthguard.
    Type: Application
    Filed: May 2, 2012
    Publication date: November 8, 2012
    Inventors: Michael C. Thompson, Yung C. Chen
  • Publication number: 20120222015
    Abstract: Mechanisms are provided for performing security role definition testing. An application is received in a container of a runtime environment of the data processing system. The application has methods and security role definitions associated with the methods. A properties object, which specifies a user identifier to security role mapping, is received in the container. A test application is executed, in the container, by the processor, on an execution of the methods of the application based on the user identifier to security role mapping and the security role definitions. The test application tests an operation of the application with regard to the security role definitions. A result of the execution of the test application on the execution of the methods of the application is then output.
    Type: Application
    Filed: February 25, 2011
    Publication date: August 30, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul W. Bennett, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
  • Publication number: 20120198515
    Abstract: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    Type: Application
    Filed: March 6, 2012
    Publication date: August 2, 2012
    Applicant: New Orchard Road
    Inventors: PAUL W. BENNETT, Elisa Ferracane, Daniel E. Morris, Michael C. Thompson
  • Patent number: 8230478
    Abstract: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    Type: Grant
    Filed: August 27, 2009
    Date of Patent: July 24, 2012
    Assignee: International Business Machines Corporation
    Inventors: Paul W. Bennett, Elisa Ferracane, Daniel E. Morris, Michael C. Thompson
  • Publication number: 20120160863
    Abstract: A manually operated object dispenser includes a cover that rotates relative to a base allowing easy access to a storage compartment and allowing stored objects to be dispensed. A rotatable reminder wheel disposed beneath the cover automatically advances to a next position with each use, exposing indicia through a window on the cover. The dispenser comprises two sets of ratchet prongs and teeth: the first set engaged when the cover is rotated to an open position, while the second set is engaged when the cover is subsequently rotated to a closed position. Accordingly, the reminder wheel moves a predetermined distance to incrementally expose indicia through the window with each object that is dispensed. One embodiment of the dispenser includes a storage tray for storing objects and an access port through which the objects are dispensed. Another embodiment of the dispenser is attached to an external storage compartment.
    Type: Application
    Filed: December 23, 2011
    Publication date: June 28, 2012
    Inventors: Michael C. Thompson, Yung C. Chen
  • Publication number: 20120000798
    Abstract: A contact lens case includes manually adjustable counters or time indicators on the left and/or right well caps utilizing voids, cut-outs or apertures to define indicia used to represent time intervals for lens replacement, maintenance, or other activities. A rotatable time indicator dial is connected to the top of the cap in a first embodiment, whereas a rotating indicia dial is confined under a windowed cover in a second embodiment. The dials are indexed by a paw or pin that seats into recesses in the disc and along the centerline of the indicia desired to be accented, windowed or illuminated. Accent of indicia voids by illumination can be by an exterior direct or diffused light source, or internally from chemical luminance or other means.
    Type: Application
    Filed: June 30, 2011
    Publication date: January 5, 2012
    Inventors: Michael C. Thompson, Yung C. Chen
  • Publication number: 20110296496
    Abstract: A method, system and computer-usable medium are disclosed for managing identity authorizations to access information processing system resources. An application thread requiring access to target resources is initiated and associated with an authenticated client identity and a server identity. The resource authorization attribute of a resource required for execution of the application thread designates the use of a client identity, a server identity, or a client identity and server identity when attempting authorized access of the resource. The client identity, the server identity, or the client identity and server identity is then respectively used to access the target resource and the application thread is executed.
    Type: Application
    Filed: May 27, 2010
    Publication date: December 1, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: William J. O'Donnell, Elisa Ferracane, Paul W. Bennett, Michael C. Thompson
  • Publication number: 20110055926
    Abstract: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    Type: Application
    Filed: August 27, 2009
    Publication date: March 3, 2011
    Applicant: International Business Machines Corporation
    Inventors: Paul W. Bennett, Elisa Ferracane, Daniel E. Morris, Michael C. Thompson