Patents by Inventor Michael C. Thompson
Michael C. Thompson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9729438Abstract: A system and computer-implemented method for cloud-based anonymous traffic routing is disclosed. The method may include receiving, from a client application by a router, network traffic identified for a destination. The method may include determining, for a set of internal cloud nodes distinct from both the client application and the destination, a set of internet protocol (IP) addresses including a first IP address for a first internal cloud node of the set of internal cloud nodes. The method may also include establishing an anonymity algorithm for cloud-based anonymous traffic routing, the anonymity algorithm configured to use the set of IP addresses. The method may also include routing, based on the anonymity algorithm, the network traffic to the first internal cloud node using the first IP address. The method may also include routing the network traffic from the set of internal cloud nodes to the destination identified by the client application.Type: GrantFiled: June 25, 2014Date of Patent: August 8, 2017Assignee: International Business Machines CorporationInventors: Michal Broz, Steven D. Clay, Federico A. Galarraga, Eduardo N. Spring, Michael C. Thompson
-
Patent number: 9599967Abstract: A method, executed by a computer, for deferring an alarm includes determining a user's location relative to an appointment, calculating a required alert time, and setting a deferral duration to less than or equal to a difference between a required alert time and a current time. In some embodiments, a final alarm is activated when the deferral duration has elapsed. The alarm may be deactivated when the appointment occurs or when the user arrives at the appointment location. In some embodiments, the travel time to the appointment is calculated and the mode of transportation is determined. The required alert time may correspond to an amount of time the user requires to prepare for the appointment or for departure to the appointment. A computer program product and computer system corresponding to the above method are also disclosed herein.Type: GrantFiled: July 27, 2015Date of Patent: March 21, 2017Assignee: International Business Machines CorporationInventors: Dana L. Price, Michael C. Thompson
-
Patent number: 9582407Abstract: Mechanisms are provided for performing security role definition testing. An application is received in a container of a runtime environment of the data processing system. The application has methods and security role definitions associated with the methods. A properties object, which specifies a user identifier to security role mapping, is received in the container. A test application is executed, in the container, by the processor, on an execution of the methods of the application based on the user identifier to security role mapping and the security role definitions. The test application tests an operation of the application with regard to the security role definitions. A result of the execution of the test application on the execution of the methods of the application is then output.Type: GrantFiled: February 25, 2011Date of Patent: February 28, 2017Assignee: International Business Machines CorporationInventors: Paul W. Bennett, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
-
Publication number: 20170031325Abstract: A method, executed by a computer, for deferring an alarm includes determining a user's location relative to an appointment, calculating a required alert time, and setting a deferral duration to less than or equal to a difference between a required alert time and a current time. In some embodiments, a final alarm is activated when the deferral duration has elapsed. The alarm may be deactivated when the appointment occurs or when the user arrives at the appointment location. In some embodiments, the travel time to the appointment is calculated and the mode of transportation is determined. The required alert time may correspond to an amount of time the user requires to prepare for the appointment or for departure to the appointment. A computer program product and computer system corresponding to the above method are also disclosed herein.Type: ApplicationFiled: July 27, 2015Publication date: February 2, 2017Inventors: Dana L. Price, Michael C. Thompson
-
Patent number: 9292702Abstract: Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first security configuration via a thread of execution, wherein a security configuration comprises at least one security parameter. The thread receives an incoming request. The thread switches to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request. The thread stores the second security configuration or a reference to the second security configuration to a stack. The thread authenticates the incoming request based on the second security configuration. The thread grants or denies access to the resource. The thread executes a method referenced in the incoming request. The thread restores to a first security configuration, responsive to completing the method.Type: GrantFiled: August 20, 2009Date of Patent: March 22, 2016Assignee: International Business Machines CorporationInventors: Paul W. Bennett, Elisa A. Ferracane, Daniel E. Morris, Michael C. Thompson
-
Publication number: 20150381487Abstract: A system and computer-implemented method for cloud-based anonymous traffic routing is disclosed. The method may include receiving, from a client application by a router, network traffic identified for a destination. The method may include determining, for a set of internal cloud nodes distinct from both the client application and the destination, a set of internet protocol (IP) addresses including a first IP address for a first internal cloud node of the set of internal cloud nodes. The method may also include establishing an anonymity algorithm for cloud-based anonymous traffic routing, the anonymity algorithm configured to use the set of IP addresses. The method may also include routing, based on the anonymity algorithm, the network traffic to the first internal cloud node using the first IP address. The method may also include routing the network traffic from the set of internal cloud nodes to the destination identified by the client application.Type: ApplicationFiled: June 25, 2014Publication date: December 31, 2015Inventors: Michal Broz, Steven D. Clay, Federico A. Galarraga, Eduardo N. Spring, Michael C. Thompson
-
Patent number: 9147062Abstract: A method, data processing system, and computer program product for managing user identification information. A determination is made whether an instance of security information in use on the first application server and referenced by a token that has expired was generated by an application server compatible with a first application server in response to receiving the token. A determination is made whether the instance of the security information is managed by a set of rules for a group of users of the first application server. A determination is made whether a user identifier from the token is authorized to access the first application server. The token is renewed in response to determining that the user identifier is authorized to access the first application server.Type: GrantFiled: June 29, 2011Date of Patent: September 29, 2015Assignee: International Business Machines CorporationInventors: Paul W. Bennett, Christopher M. Dettlaff, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
-
Publication number: 20150226004Abstract: A system and method for locating and verifying a position of an underground target utilizes a virtual reality display to guide a cutting probe to the target. Initial coordinates of the target may be obtained from prior survey data and a vertical access borehole is excavated at the initial coordinates in a first attempt to verify the target position. If the target it not encountered at the initial coordinates, a lateral sensor is positioned within the vertical access borehole to determine three-dimensional coordinates of the target. A second borehole is then excavated by a cutting head that is guided to the three-dimensional target coordinates with the assistance of a virtual reality display that shows both the target coordinates and a real time position of the cutting head. A down-hole camera or other sensor positioned within the second borehole may verify the presence or condition of the target.Type: ApplicationFiled: February 10, 2014Publication date: August 13, 2015Inventor: Michael C. Thompson
-
Patent number: 8955052Abstract: A method, system and computer-usable medium are disclosed for managing identity authorizations to access information processing system resources. An application thread requiring access to target resources is initiated and associated with an authenticated client identity and a server identity. The resource authorization attribute of a resource required for execution of the application thread designates the use of a client identity, a server identity, or a client identity and server identity when attempting authorized access of the resource. The client identity, the server identity, or the client identity and server identity is then respectively used to access the target resource and the application thread is executed.Type: GrantFiled: May 27, 2010Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: William J. O'Donnell, Elisa Ferracane, Paul W. Bennett, Michael C. Thompson
-
Patent number: 8522307Abstract: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.Type: GrantFiled: March 6, 2012Date of Patent: August 27, 2013Assignee: International Business Machines CorporationInventors: Paul W. Bennett, Elisa Ferracane, Daniel E. Morris, Michael C. Thompson
-
Publication number: 20130056385Abstract: A pill container and method for staging and storing pills or other small objects includes a plurality of storage cells, where each cell defines a top opening and a bottom refill opening. Pills are staged in a sorting area disposed on a bottom side of the pill container, allowing verification by sight and feel of a correct number and type of pill before being dropped into the storage cells. A slide bar is moved to an open position to align holes in the slide bar with the refill openings in the bottom of the storage cells, thereby allowing the pills to be loaded into the storage cells. The slide bar is moved back to a closed position to seal the holes in the bottom of the storage cells. A locking mechanism is provided to provide protection again accidental against accidental movement of the slide bar.Type: ApplicationFiled: August 24, 2012Publication date: March 7, 2013Inventors: Michael C. Thompson, Yung Chung Chen
-
Publication number: 20130007856Abstract: A method, data processing system, and computer program product for managing user identification information. A determination is made whether an instance of security information in use on the first application server and referenced by a token that has expired was generated by an application server compatible with a first application server in response to receiving the token. A determination is made whether the instance of the security information is managed by a set of rules for a group of users of the first application server. A determination is made whether a user identifier from the token is authorized to access the first application server. The token is renewed in response to determining that the user identifier is authorized to access the first application server.Type: ApplicationFiled: June 29, 2011Publication date: January 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul W. Bennett, Christopher M. Dettlaff, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
-
Publication number: 20120279506Abstract: A mouthguard includes an integrally molded tray having upper and lower portions joined by a hinge along an inner portion of the tray that defines an open-sided channel gap between the upper and lower tray portions. Shock forces tending to deflect the lower portion of the tray toward the upper portion are countered by a moment resistance of the hinge as the channel gap between the upper and lower tray portions closes. Additional energy absorption is provided by a cushion liner attached to an inner surface of the tray that prevents contact between the upper and lower tray portions, as well as an air cell defined by an occlusal pad attached to the lower tray portion. Embodiments include a detachable tether that is received within a tether mount incorporated within the mouthguard.Type: ApplicationFiled: May 2, 2012Publication date: November 8, 2012Inventors: Michael C. Thompson, Yung C. Chen
-
Publication number: 20120222015Abstract: Mechanisms are provided for performing security role definition testing. An application is received in a container of a runtime environment of the data processing system. The application has methods and security role definitions associated with the methods. A properties object, which specifies a user identifier to security role mapping, is received in the container. A test application is executed, in the container, by the processor, on an execution of the methods of the application based on the user identifier to security role mapping and the security role definitions. The test application tests an operation of the application with regard to the security role definitions. A result of the execution of the test application on the execution of the methods of the application is then output.Type: ApplicationFiled: February 25, 2011Publication date: August 30, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul W. Bennett, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
-
Publication number: 20120198515Abstract: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.Type: ApplicationFiled: March 6, 2012Publication date: August 2, 2012Applicant: New Orchard RoadInventors: PAUL W. BENNETT, Elisa Ferracane, Daniel E. Morris, Michael C. Thompson
-
Patent number: 8230478Abstract: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.Type: GrantFiled: August 27, 2009Date of Patent: July 24, 2012Assignee: International Business Machines CorporationInventors: Paul W. Bennett, Elisa Ferracane, Daniel E. Morris, Michael C. Thompson
-
Publication number: 20120160863Abstract: A manually operated object dispenser includes a cover that rotates relative to a base allowing easy access to a storage compartment and allowing stored objects to be dispensed. A rotatable reminder wheel disposed beneath the cover automatically advances to a next position with each use, exposing indicia through a window on the cover. The dispenser comprises two sets of ratchet prongs and teeth: the first set engaged when the cover is rotated to an open position, while the second set is engaged when the cover is subsequently rotated to a closed position. Accordingly, the reminder wheel moves a predetermined distance to incrementally expose indicia through the window with each object that is dispensed. One embodiment of the dispenser includes a storage tray for storing objects and an access port through which the objects are dispensed. Another embodiment of the dispenser is attached to an external storage compartment.Type: ApplicationFiled: December 23, 2011Publication date: June 28, 2012Inventors: Michael C. Thompson, Yung C. Chen
-
Publication number: 20120000798Abstract: A contact lens case includes manually adjustable counters or time indicators on the left and/or right well caps utilizing voids, cut-outs or apertures to define indicia used to represent time intervals for lens replacement, maintenance, or other activities. A rotatable time indicator dial is connected to the top of the cap in a first embodiment, whereas a rotating indicia dial is confined under a windowed cover in a second embodiment. The dials are indexed by a paw or pin that seats into recesses in the disc and along the centerline of the indicia desired to be accented, windowed or illuminated. Accent of indicia voids by illumination can be by an exterior direct or diffused light source, or internally from chemical luminance or other means.Type: ApplicationFiled: June 30, 2011Publication date: January 5, 2012Inventors: Michael C. Thompson, Yung C. Chen
-
Publication number: 20110296496Abstract: A method, system and computer-usable medium are disclosed for managing identity authorizations to access information processing system resources. An application thread requiring access to target resources is initiated and associated with an authenticated client identity and a server identity. The resource authorization attribute of a resource required for execution of the application thread designates the use of a client identity, a server identity, or a client identity and server identity when attempting authorized access of the resource. The client identity, the server identity, or the client identity and server identity is then respectively used to access the target resource and the application thread is executed.Type: ApplicationFiled: May 27, 2010Publication date: December 1, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: William J. O'Donnell, Elisa Ferracane, Paul W. Bennett, Michael C. Thompson
-
Publication number: 20110055926Abstract: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.Type: ApplicationFiled: August 27, 2009Publication date: March 3, 2011Applicant: International Business Machines CorporationInventors: Paul W. Bennett, Elisa Ferracane, Daniel E. Morris, Michael C. Thompson