Patents by Inventor Neil I. Readshaw
Neil I. Readshaw has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10657469Abstract: In a method for estimating a severity of a current security incident reported by a customer for the customer's computer system, a processor receives from one or more administrators for a plurality of prior security incidents reported by the customer, identifications of a respective plurality of actual severities for the plurality of prior security incidents. The processor estimates, based in part on the plurality of identified actual severities of the prior security incidents, a severity of the current security incident. The processor reports the estimated severity for the current security incident.Type: GrantFiled: April 11, 2014Date of Patent: May 19, 2020Assignee: International Business Machines CorporationInventors: Steven A. Bade, Heather M. Hinton, Neil I. Readshaw, Srinivas B. Tummalapenta
-
Patent number: 10033728Abstract: A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires at least one image depicting a first string of characters including at least a first and second set of one or more characters. A processor assigns a substitute character to be used as input for each of the second set of one or more characters. A processor presents the at least one image and an indication of the substitute character and when to use the substitute character to the user. A processor receives a second string of characters from the user. A processor determines whether the second string of characters substantially matches the first string of characters based on the substitute character assigned to each of the second set of one or more characters and determines whether the user is a human.Type: GrantFiled: March 9, 2016Date of Patent: July 24, 2018Assignee: International Business Machines CorporationInventors: Michael S. Brown, Carlos F. Franca da Fonseca, Neil I. Readshaw
-
Patent number: 10003602Abstract: Monitoring across multiple-channels, used by multiple devices, to determine which email messages being sent to a user are solicited by the user. A broad spectrum of network and telephony access records are analyzed to determine whether an email message is likely being sent as a result of legitimate services access by the user.Type: GrantFiled: June 24, 2014Date of Patent: June 19, 2018Assignee: International Business Machines CorporationInventors: Christopher J. Hockings, Neil I. Readshaw
-
Patent number: 9699176Abstract: A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires at least one image depicting a first string of characters including at least a first and second set of one or more characters. A processor assigns a substitute character to be used as input for each of the second set of one or more characters. A processor presents the at least one image and an indication of the substitute character and when to use the substitute character to the user. A processor receives a second string of characters from the user. A processor determines whether the second string of characters substantially matches the first string of characters based on the substitute character assigned to each of the second set of one or more characters and determines whether the user is a human.Type: GrantFiled: October 20, 2016Date of Patent: July 4, 2017Assignee: International Business Machines CorporationInventors: Michael S. Brown, Carlos F. Franca da Fonseca, Neil I. Readshaw
-
Patent number: 9614875Abstract: A distributed cloud environment system comprising: a repository; a plurality of cloud managed nodes with a client program interface; a plurality of service management components with a service management component interface; a central trusted computing platform service in communication with the repository, the plurality of cloud managed nodes and the plurality of service management components, comprising: a first interface for communication with the client program interface in each of the plurality of cloud managed nodes through a first single touch point; and a second interface for communication with the service management component interface for the plurality of service management components through a second single touch point. The central trusted computing platform service manages interaction of the plurality of service management components with the plurality of cloud managed nodes, and the interaction of the plurality of cloud managed nodes with the repository.Type: GrantFiled: June 9, 2016Date of Patent: April 4, 2017Assignee: International Business Machines CorporationInventors: Venkata R. Jagana, Srinivasa Rao Mangipudi, Neil I. Readshaw, Karthik Sivakumar
-
Publication number: 20170034151Abstract: A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires at least one image depicting a first string of characters including at least a first and second set of one or more characters. A processor assigns a substitute character to be used as input for each of the second set of one or more characters. A processor presents the at least one image and an indication of the substitute character and when to use the substitute character to the user. A processor receives a second string of characters from the user. A processor determines whether the second string of characters substantially matches the first string of characters based on the substitute character assigned to each of the second set of one or more characters and determines whether the user is a human.Type: ApplicationFiled: October 20, 2016Publication date: February 2, 2017Inventors: Michael S. Brown, Carlos F. Franca da Fonseca, Neil I. Readshaw
-
Patent number: 9552480Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: GrantFiled: June 29, 2016Date of Patent: January 24, 2017Assignee: International Business Machines CorporationInventors: Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Patent number: 9542539Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: GrantFiled: June 20, 2016Date of Patent: January 10, 2017Assignee: International Business Machines CorporationInventors: Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Patent number: 9525686Abstract: A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires at least one image depicting a first string of characters including at least a first and second set of one or more characters. A processor assigns a substitute character to be used as input for each of the second set of one or more characters. A processor presents the at least one image and an indication of the substitute character and when to use the substitute character to the user. A processor receives a second string of characters from the user. A processor determines whether the second string of characters substantially matches the first string of characters based on the substitute character assigned to each of the second set of one or more characters and determines whether the user is a human.Type: GrantFiled: May 16, 2016Date of Patent: December 20, 2016Assignee: International Business Machines CorporationInventors: Michael S. Brown, Carlos F. Franca da Fonseca, Neil I. Readshaw
-
Publication number: 20160306970Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: ApplicationFiled: June 29, 2016Publication date: October 20, 2016Inventors: Jerome R. Bell, JR., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Publication number: 20160294878Abstract: A distributed cloud environment system comprising: a repository; a plurality of cloud managed nodes with a client program interface; a plurality of service management components with a service management component interface; a central trusted computing platform service in communication with the repository, the plurality of cloud managed nodes and the plurality of service management components, comprising: a first interface for communication with the client program interface in each of the plurality of cloud managed nodes through a first single touch point; and a second interface for communication with the service management component interface for the plurality of service management components through a second single touch point. The central trusted computing platform service manages interaction of the plurality of service management components with the plurality of cloud managed nodes, and the interaction of the plurality of cloud managed nodes with the repository.Type: ApplicationFiled: June 9, 2016Publication date: October 6, 2016Inventors: Venkata R. Jagana, Srinivasa Rao Mangipudi, Neil I. Readshaw, Karthik Sivakumar
-
Publication number: 20160292401Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: ApplicationFiled: June 20, 2016Publication date: October 6, 2016Inventors: Jerome R. Bell, JR., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Publication number: 20160248763Abstract: A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires at least one image depicting a first string of characters including at least a first and second set of one or more characters. A processor assigns a substitute character to be used as input for each of the second set of one or more characters. A processor presents the at least one image and an indication of the substitute character and when to use the substitute character to the user. A processor receives a second string of characters from the user. A processor determines whether the second string of characters substantially matches the first string of characters based on the substitute character assigned to each of the second set of one or more characters and determines whether the user is a human.Type: ApplicationFiled: May 16, 2016Publication date: August 25, 2016Inventors: Michael S. Brown, Carlos F. Franca da Fonseca, Neil I. Readshaw
-
Patent number: 9411954Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: GrantFiled: January 6, 2016Date of Patent: August 9, 2016Assignee: International Business Machines CorporationInventors: Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Patent number: 9401954Abstract: A distributed cloud environment system comprising: a repository; a plurality of cloud managed nodes with a client program interface; a plurality of service management components with a service management component interface; a central trusted computing platform service in communication with the repository, the plurality of cloud managed nodes and the plurality of service management components, comprising: a first interface for communication with the client program interface in each of the plurality of cloud managed nodes through a first single touch point; and a second interface for communication with the service management component interface for the plurality of service management components through a second single touch point. The central trusted computing platform service manages interaction of the plurality of service management components with the plurality of cloud managed nodes, and the interaction of the plurality of cloud managed nodes with the repository.Type: GrantFiled: November 6, 2013Date of Patent: July 26, 2016Assignee: International Business Machines CorporationInventors: Venkata R. Jagana, Srinivasa R. Mangipudi, Neil I Readshaw, Karthik Sivakumar
-
Publication number: 20160191529Abstract: A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires at least one image depicting a first string of characters including at least a first and second set of one or more characters. A processor assigns a substitute character to be used as input for each of the second set of one or more characters. A processor presents the at least one image and an indication of the substitute character and when to use the substitute character to the user. A processor receives a second string of characters from the user. A processor determines whether the second string of characters substantially matches the first string of characters based on the substitute character assigned to each of the second set of one or more characters and determines whether the user is a human.Type: ApplicationFiled: March 9, 2016Publication date: June 30, 2016Inventors: Michael S. Brown, Carlos F. Franca da Fonseca, Neil I. Readshaw
-
Patent number: 9372974Abstract: A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires at least one image depicting a first string of characters including at least a first and second set of one or more characters. A processor assigns a substitute character to be used as input for each of the second set of one or more characters. A processor presents the at least one image and an indication of the substitute character and when to use the substitute character to the user. A processor receives a second string of characters from the user. A processor determines whether the second string of characters substantially matches the first string of characters based on the substitute character assigned to each of the second set of one or more characters and determines whether the user is a human.Type: GrantFiled: December 21, 2015Date of Patent: June 21, 2016Assignee: International Business Machines CorporationInventors: Michael S. Brown, Carlos F. Franca da Fonseca, Neil I. Readshaw
-
Publication number: 20160132678Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: ApplicationFiled: January 6, 2016Publication date: May 12, 2016Inventors: Jerome R. Bell, JR., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Patent number: 9338162Abstract: A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires at least one image depicting a first string of characters including at least a first and second set of one or more characters. A processor assigns a substitute character to be used as input for each of the second set of one or more characters. A processor presents the at least one image and an indication of the substitute character and when to use the substitute character to the user. A processor receives a second string of characters from the user. A processor determines whether the second string of characters substantially matches the first string of characters based on the substitute character assigned to each of the second set of one or more characters and determines whether the user is a human.Type: GrantFiled: June 13, 2014Date of Patent: May 10, 2016Assignee: International Business Machines CorporationInventors: Michael S. Brown, Carlos F. Franca da Fonseca, Neil I. Readshaw
-
Patent number: 9319430Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: GrantFiled: June 17, 2014Date of Patent: April 19, 2016Assignee: International Business Machines CorporationInventors: Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar