Patents by Inventor Peter G. Spera
Peter G. Spera has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240091653Abstract: An anonymous leaderboard for a monitored computing environments is provided. In response to an entity registering with the monitored computing environment (MCE), an encrypted identity and a dynamic non-fungible token (NFT) are generated for the registered entity, where the dynamic NFT has an associated blockchain technology data structure. The blockchain technology data structure is associated with the encrypted identity. A progress element notification is received from the MCE in response to the entity satisfying criteria for a predefined progress element associated with the MCE. In response, a static NFT, corresponding to the predefined progress element, is generated and stored as a block in the blockchain technology data structure. An entry in an anonymous leaderboard output is generated based on the blockchain technology data structure, where the entry identifies the entity by the encrypted identity.Type: ApplicationFiled: September 15, 2022Publication date: March 21, 2024Inventors: Sneha Kanaujia, Al Chakra, Bryan Childs, GREGORY C. CREMINS, Travis Biro, Andrew C. M. Hicks, Cecilia Carranza Lewis, Peter G. Spera
-
Patent number: 11182447Abstract: Methods, systems and computer program products for providing a customized display of social media content that is automatically filtered based on emotional content are provided. Aspects include receiving a plurality of social media posts that have been published for display by a social media service. Aspects also include receiving an emotional profile including social media post filtering preferences that are based on emotional content of social media posts. In response to performing an emotional content analysis of each of the plurality of social media posts, aspects include identifying a set of emotionally acceptable social media posts and a set of emotionally unacceptable social media. Aspects also include causing the set of emotionally acceptable social media posts to be displayed in a primary news feed window of the social media service in association with an account of the user of the social media service.Type: GrantFiled: November 6, 2018Date of Patent: November 23, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bryan Childs, Elizabeth Noel, Peter G. Spera
-
Publication number: 20200143000Abstract: Methods, systems and computer program products for providing a customized display of social media content that is automatically filtered based on emotional content are provided. Aspects include receiving a plurality of social media posts that have been published for display by a social media service. Aspects also include receiving an emotional profile including social media post filtering preferences that are based on emotional content of social media posts. In response to performing an emotional content analysis of each of the plurality of social media posts, aspects include identifying a set of emotionally acceptable social media posts and a set of emotionally unacceptable social media. Aspects also include causing the set of emotionally acceptable social media posts to be displayed in a primary news feed window of the social media service in association with an account of the user of the social media service.Type: ApplicationFiled: November 6, 2018Publication date: May 7, 2020Inventors: Bryan Childs, Elizabeth Noel, Peter G. Spera
-
Patent number: 9998459Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.Type: GrantFiled: November 17, 2017Date of Patent: June 12, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
-
Patent number: 9971572Abstract: Embodiments of the present invention provide methods, program products, and systems for modifying source code by managing symbols indicating executable instructions. Embodiments of the present invention can be used to receive one or more symbols indicating executable instructions to be implemented via source code and generate a visual display comprising a dialog box supporting modification of source code that implements the executable instructions indicated by the one or more symbols. Responsive to receiving a user interaction with the dialog box resulting in modified source code, embodiments of the present invention can be used to generate modified source code or a representation of the modified source code that is shorter than the modified source code.Type: GrantFiled: October 30, 2015Date of Patent: May 15, 2018Assignee: International Business Machines CorporationInventors: Bryan C. Childs, Peter J. Relson, Peter G. Spera
-
Patent number: 9967288Abstract: A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer architecture is received from a management console. The security policy is stored on a policy server that is communicatively connected, by a management network, to a plurality of hardware platforms of the of the heterogeneous computer architecture. The security policy is distributed to a plurality of policy agents of the heterogeneous computer architecture over the management network. The security policy includes a security policy administrator role that permits management of (i) one or more subjects in a plurality of security zones and (ii) one or more objects in the plurality of security zones. The security policy also includes security zone administrator roles, wherein each security zone administrator role (i) is associated with a respective security zone and (ii) permits management of object(s) in the respective security zone.Type: GrantFiled: November 5, 2015Date of Patent: May 8, 2018Assignee: International Business Machines CorporationInventors: Brian W. Hugenbruch, Peter G. Spera
-
Patent number: 9921812Abstract: Embodiments of the present invention provide methods, program products, and systems for modifying source code by managing symbols indicating executable instructions. Embodiments of the present invention can be used to receive one or more symbols indicating executable instructions to be implemented via source code and generate a visual display comprising a dialog box supporting modification of source code that implements the executable instructions indicated by the one or more symbols. Responsive to receiving a user interaction with the dialog box resulting in modified source code, embodiments of the present invention can be used to generate modified source code or a representation of the modified source code that is shorter than the modified source code.Type: GrantFiled: April 14, 2016Date of Patent: March 20, 2018Assignee: International Business Machines CorporationInventors: Bryan C. Childs, Peter J. Relson, Peter G. Spera
-
Publication number: 20180063136Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.Type: ApplicationFiled: November 17, 2017Publication date: March 1, 2018Inventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
-
Publication number: 20180040030Abstract: Systems, methods, and computer-readable media for integrating e-commerce capabilities with social media services using a central trusted service are disclosed. A client application executable on a client device interacts with a central trusted e-commerce/social media service executing on one or more servers. The central trusted service receives social networking credentials associated with a user from the client application and identifies a particular user profile associated with the user based at least in part on the received social networking credentials. The central trusted service determines a trusted group of user profiles linked to the particular user profile and analyzes various types of data associated with the trusted group of user profiles to identify products to recommend to the particular user profile. In addition, the central trusted service provides a direct, centralized conduit to online retailers to allow the user to purchase a product via a trusted and secure mechanism.Type: ApplicationFiled: August 5, 2016Publication date: February 8, 2018Inventors: Bryan C. Childs, Benjamin P. Segal, Peter G. Spera
-
Patent number: 9882901Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.Type: GrantFiled: December 14, 2015Date of Patent: January 30, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
-
Patent number: 9851955Abstract: Embodiments of the present invention provide methods, program products, and systems for modifying source code by managing symbols indicating executable instructions. Embodiments of the present invention can be used to receive one or more symbols indicating executable instructions to be implemented via source code and generate a visual display comprising a dialog box supporting modification of source code that implements the executable instructions indicated by the one or more symbols. Responsive to receiving a user interaction with the dialog box resulting in modified source code, embodiments of the present invention can be used to generate modified source code or a representation of the modified source code that is shorter than the modified source code.Type: GrantFiled: January 24, 2017Date of Patent: December 26, 2017Assignee: International Business Machines CorporationInventors: Bryan C. Childs, Peter J. Relson, Peter G. Spera
-
Patent number: 9769212Abstract: A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer architecture is received from a management console. The security policy is stored on a policy server that is communicatively connected, by a management network, to a plurality of hardware platforms of the of the heterogeneous computer architecture. The security policy is distributed to a plurality of policy agents of the heterogeneous computer architecture over the management network. The security policy includes a security policy administrator role that permits management of (i) one or more subjects in a plurality of security zones and (ii) one or more objects in the plurality of security zones. The security policy also includes security zone administrator roles, wherein each security zone administrator role (i) is associated with a respective security zone and (ii) permits management of object(s) in the respective security zone.Type: GrantFiled: January 19, 2017Date of Patent: September 19, 2017Assignee: International Business Machines CorporationInventors: Brian W. Hugenbruch, Peter G. Spera
-
Patent number: 9769211Abstract: A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer architecture is received from a management console. The security policy is stored on a policy server that is communicatively connected, by a management network, to a plurality of hardware platforms of the of the heterogeneous computer architecture. The security policy is distributed to a plurality of policy agents of the heterogeneous computer architecture over the management network. The security policy includes a security policy administrator role that permits management of (i) one or more subjects in a plurality of security zones and (ii) one or more objects in the plurality of security zones. The security policy also includes security zone administrator roles, wherein each security zone administrator role (i) is associated with a respective security zone and (ii) permits management of object(s) in the respective security zone.Type: GrantFiled: January 19, 2017Date of Patent: September 19, 2017Assignee: International Business Machines CorporationInventors: Brian W. Hugenbruch, Peter G. Spera
-
Publication number: 20170171197Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.Type: ApplicationFiled: December 14, 2015Publication date: June 15, 2017Inventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
-
Publication number: 20170134426Abstract: A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer architecture is received from a management console. The security policy is stored on a policy server that is communicatively connected, by a management network, to a plurality of hardware platforms of the of the heterogeneous computer architecture. The security policy is distributed to a plurality of policy agents of the heterogeneous computer architecture over the management network. The security policy includes a security policy administrator role that permits management of (i) one or more subjects in a plurality of security zones and (ii) one or more objects in the plurality of security zones. The security policy also includes security zone administrator roles, wherein each security zone administrator role (i) is associated with a respective security zone and (ii) permits management of object(s) in the respective security zone.Type: ApplicationFiled: November 5, 2015Publication date: May 11, 2017Inventors: Brian W. Hugenbruch, Peter G. Spera
-
Publication number: 20170134432Abstract: A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer architecture is received from a management console. The security policy is stored on a policy server that is communicatively connected, by a management network, to a plurality of hardware platforms of the of the heterogeneous computer architecture. The security policy is distributed to a plurality of policy agents of the heterogeneous computer architecture over the management network. The security policy includes a security policy administrator role that permits management of (i) one or more subjects in a plurality of security zones and (ii) one or more objects in the plurality of security zones. The security policy also includes security zone administrator roles, wherein each security zone administrator role (i) is associated with a respective security zone and (ii) permits management of object(s) in the respective security zone.Type: ApplicationFiled: January 19, 2017Publication date: May 11, 2017Inventors: Brian W. Hugenbruch, Peter G. Spera
-
Publication number: 20170134433Abstract: A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer architecture is received from a management console. The security policy is stored on a policy server that is communicatively connected, by a management network, to a plurality of hardware platforms of the of the heterogeneous computer architecture. The security policy is distributed to a plurality of policy agents of the heterogeneous computer architecture over the management network. The security policy includes a security policy administrator role that permits management of (i) one or more subjects in a plurality of security zones and (ii) one or more objects in the plurality of security zones. The security policy also includes security zone administrator roles, wherein each security zone administrator role (i) is associated with a respective security zone and (ii) permits management of object(s) in the respective security zone.Type: ApplicationFiled: January 19, 2017Publication date: May 11, 2017Inventors: Brian W. Hugenbruch, Peter G. Spera
-
Publication number: 20170123766Abstract: Embodiments of the present invention provide methods, program products, and systems for modifying source code by managing symbols indicating executable instructions. Embodiments of the present invention can be used to receive one or more symbols indicating executable instructions to be implemented via source code and generate a visual display comprising a dialog box supporting modification of source code that implements the executable instructions indicated by the one or more symbols. Responsive to receiving a user interaction with the dialog box resulting in modified source code, embodiments of the present invention can be used to generate modified source code or a representation of the modified source code that is shorter than the modified source code.Type: ApplicationFiled: January 24, 2017Publication date: May 4, 2017Inventors: Bryan C. Childs, Peter J. Relson, Peter G. Spera
-
Publication number: 20170123761Abstract: Embodiments of the present invention provide methods, program products, and systems for modifying source code by managing symbols indicating executable instructions. Embodiments of the present invention can be used to receive one or more symbols indicating executable instructions to be implemented via source code and generate a visual display comprising a dialog box supporting modification of source code that implements the executable instructions indicated by the one or more symbols. Responsive to receiving a user interaction with the dialog box resulting in modified source code, embodiments of the present invention can be used to generate modified source code or a representation of the modified source code that is shorter than the modified source code.Type: ApplicationFiled: October 30, 2015Publication date: May 4, 2017Inventors: Bryan C. Childs, Peter J. Relson, Peter G. Spera
-
Publication number: 20170123763Abstract: Embodiments of the present invention provide methods, program products, and systems for modifying source code by managing symbols indicating executable instructions. Embodiments of the present invention can be used to receive one or more symbols indicating executable instructions to be implemented via source code and generate a visual display comprising a dialog box supporting modification of source code that implements the executable instructions indicated by the one or more symbols. Responsive to receiving a user interaction with the dialog box resulting in modified source code, embodiments of the present invention can be used to generate modified source code or a representation of the modified source code that is shorter than the modified source code.Type: ApplicationFiled: April 14, 2016Publication date: May 4, 2017Inventors: Bryan C. Childs, Peter J. Relson, Peter G. Spera