Patents by Inventor Peter G. Spera

Peter G. Spera has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240091653
    Abstract: An anonymous leaderboard for a monitored computing environments is provided. In response to an entity registering with the monitored computing environment (MCE), an encrypted identity and a dynamic non-fungible token (NFT) are generated for the registered entity, where the dynamic NFT has an associated blockchain technology data structure. The blockchain technology data structure is associated with the encrypted identity. A progress element notification is received from the MCE in response to the entity satisfying criteria for a predefined progress element associated with the MCE. In response, a static NFT, corresponding to the predefined progress element, is generated and stored as a block in the blockchain technology data structure. An entry in an anonymous leaderboard output is generated based on the blockchain technology data structure, where the entry identifies the entity by the encrypted identity.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 21, 2024
    Inventors: Sneha Kanaujia, Al Chakra, Bryan Childs, GREGORY C. CREMINS, Travis Biro, Andrew C. M. Hicks, Cecilia Carranza Lewis, Peter G. Spera
  • Patent number: 11182447
    Abstract: Methods, systems and computer program products for providing a customized display of social media content that is automatically filtered based on emotional content are provided. Aspects include receiving a plurality of social media posts that have been published for display by a social media service. Aspects also include receiving an emotional profile including social media post filtering preferences that are based on emotional content of social media posts. In response to performing an emotional content analysis of each of the plurality of social media posts, aspects include identifying a set of emotionally acceptable social media posts and a set of emotionally unacceptable social media. Aspects also include causing the set of emotionally acceptable social media posts to be displayed in a primary news feed window of the social media service in association with an account of the user of the social media service.
    Type: Grant
    Filed: November 6, 2018
    Date of Patent: November 23, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bryan Childs, Elizabeth Noel, Peter G. Spera
  • Publication number: 20200143000
    Abstract: Methods, systems and computer program products for providing a customized display of social media content that is automatically filtered based on emotional content are provided. Aspects include receiving a plurality of social media posts that have been published for display by a social media service. Aspects also include receiving an emotional profile including social media post filtering preferences that are based on emotional content of social media posts. In response to performing an emotional content analysis of each of the plurality of social media posts, aspects include identifying a set of emotionally acceptable social media posts and a set of emotionally unacceptable social media. Aspects also include causing the set of emotionally acceptable social media posts to be displayed in a primary news feed window of the social media service in association with an account of the user of the social media service.
    Type: Application
    Filed: November 6, 2018
    Publication date: May 7, 2020
    Inventors: Bryan Childs, Elizabeth Noel, Peter G. Spera
  • Patent number: 9998459
    Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.
    Type: Grant
    Filed: November 17, 2017
    Date of Patent: June 12, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
  • Patent number: 9971572
    Abstract: Embodiments of the present invention provide methods, program products, and systems for modifying source code by managing symbols indicating executable instructions. Embodiments of the present invention can be used to receive one or more symbols indicating executable instructions to be implemented via source code and generate a visual display comprising a dialog box supporting modification of source code that implements the executable instructions indicated by the one or more symbols. Responsive to receiving a user interaction with the dialog box resulting in modified source code, embodiments of the present invention can be used to generate modified source code or a representation of the modified source code that is shorter than the modified source code.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: May 15, 2018
    Assignee: International Business Machines Corporation
    Inventors: Bryan C. Childs, Peter J. Relson, Peter G. Spera
  • Patent number: 9967288
    Abstract: A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer architecture is received from a management console. The security policy is stored on a policy server that is communicatively connected, by a management network, to a plurality of hardware platforms of the of the heterogeneous computer architecture. The security policy is distributed to a plurality of policy agents of the heterogeneous computer architecture over the management network. The security policy includes a security policy administrator role that permits management of (i) one or more subjects in a plurality of security zones and (ii) one or more objects in the plurality of security zones. The security policy also includes security zone administrator roles, wherein each security zone administrator role (i) is associated with a respective security zone and (ii) permits management of object(s) in the respective security zone.
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: May 8, 2018
    Assignee: International Business Machines Corporation
    Inventors: Brian W. Hugenbruch, Peter G. Spera
  • Patent number: 9921812
    Abstract: Embodiments of the present invention provide methods, program products, and systems for modifying source code by managing symbols indicating executable instructions. Embodiments of the present invention can be used to receive one or more symbols indicating executable instructions to be implemented via source code and generate a visual display comprising a dialog box supporting modification of source code that implements the executable instructions indicated by the one or more symbols. Responsive to receiving a user interaction with the dialog box resulting in modified source code, embodiments of the present invention can be used to generate modified source code or a representation of the modified source code that is shorter than the modified source code.
    Type: Grant
    Filed: April 14, 2016
    Date of Patent: March 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Bryan C. Childs, Peter J. Relson, Peter G. Spera
  • Publication number: 20180063136
    Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.
    Type: Application
    Filed: November 17, 2017
    Publication date: March 1, 2018
    Inventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
  • Publication number: 20180040030
    Abstract: Systems, methods, and computer-readable media for integrating e-commerce capabilities with social media services using a central trusted service are disclosed. A client application executable on a client device interacts with a central trusted e-commerce/social media service executing on one or more servers. The central trusted service receives social networking credentials associated with a user from the client application and identifies a particular user profile associated with the user based at least in part on the received social networking credentials. The central trusted service determines a trusted group of user profiles linked to the particular user profile and analyzes various types of data associated with the trusted group of user profiles to identify products to recommend to the particular user profile. In addition, the central trusted service provides a direct, centralized conduit to online retailers to allow the user to purchase a product via a trusted and secure mechanism.
    Type: Application
    Filed: August 5, 2016
    Publication date: February 8, 2018
    Inventors: Bryan C. Childs, Benjamin P. Segal, Peter G. Spera
  • Patent number: 9882901
    Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: January 30, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
  • Patent number: 9851955
    Abstract: Embodiments of the present invention provide methods, program products, and systems for modifying source code by managing symbols indicating executable instructions. Embodiments of the present invention can be used to receive one or more symbols indicating executable instructions to be implemented via source code and generate a visual display comprising a dialog box supporting modification of source code that implements the executable instructions indicated by the one or more symbols. Responsive to receiving a user interaction with the dialog box resulting in modified source code, embodiments of the present invention can be used to generate modified source code or a representation of the modified source code that is shorter than the modified source code.
    Type: Grant
    Filed: January 24, 2017
    Date of Patent: December 26, 2017
    Assignee: International Business Machines Corporation
    Inventors: Bryan C. Childs, Peter J. Relson, Peter G. Spera
  • Patent number: 9769212
    Abstract: A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer architecture is received from a management console. The security policy is stored on a policy server that is communicatively connected, by a management network, to a plurality of hardware platforms of the of the heterogeneous computer architecture. The security policy is distributed to a plurality of policy agents of the heterogeneous computer architecture over the management network. The security policy includes a security policy administrator role that permits management of (i) one or more subjects in a plurality of security zones and (ii) one or more objects in the plurality of security zones. The security policy also includes security zone administrator roles, wherein each security zone administrator role (i) is associated with a respective security zone and (ii) permits management of object(s) in the respective security zone.
    Type: Grant
    Filed: January 19, 2017
    Date of Patent: September 19, 2017
    Assignee: International Business Machines Corporation
    Inventors: Brian W. Hugenbruch, Peter G. Spera
  • Patent number: 9769211
    Abstract: A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer architecture is received from a management console. The security policy is stored on a policy server that is communicatively connected, by a management network, to a plurality of hardware platforms of the of the heterogeneous computer architecture. The security policy is distributed to a plurality of policy agents of the heterogeneous computer architecture over the management network. The security policy includes a security policy administrator role that permits management of (i) one or more subjects in a plurality of security zones and (ii) one or more objects in the plurality of security zones. The security policy also includes security zone administrator roles, wherein each security zone administrator role (i) is associated with a respective security zone and (ii) permits management of object(s) in the respective security zone.
    Type: Grant
    Filed: January 19, 2017
    Date of Patent: September 19, 2017
    Assignee: International Business Machines Corporation
    Inventors: Brian W. Hugenbruch, Peter G. Spera
  • Publication number: 20170171197
    Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.
    Type: Application
    Filed: December 14, 2015
    Publication date: June 15, 2017
    Inventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
  • Publication number: 20170134426
    Abstract: A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer architecture is received from a management console. The security policy is stored on a policy server that is communicatively connected, by a management network, to a plurality of hardware platforms of the of the heterogeneous computer architecture. The security policy is distributed to a plurality of policy agents of the heterogeneous computer architecture over the management network. The security policy includes a security policy administrator role that permits management of (i) one or more subjects in a plurality of security zones and (ii) one or more objects in the plurality of security zones. The security policy also includes security zone administrator roles, wherein each security zone administrator role (i) is associated with a respective security zone and (ii) permits management of object(s) in the respective security zone.
    Type: Application
    Filed: November 5, 2015
    Publication date: May 11, 2017
    Inventors: Brian W. Hugenbruch, Peter G. Spera
  • Publication number: 20170134432
    Abstract: A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer architecture is received from a management console. The security policy is stored on a policy server that is communicatively connected, by a management network, to a plurality of hardware platforms of the of the heterogeneous computer architecture. The security policy is distributed to a plurality of policy agents of the heterogeneous computer architecture over the management network. The security policy includes a security policy administrator role that permits management of (i) one or more subjects in a plurality of security zones and (ii) one or more objects in the plurality of security zones. The security policy also includes security zone administrator roles, wherein each security zone administrator role (i) is associated with a respective security zone and (ii) permits management of object(s) in the respective security zone.
    Type: Application
    Filed: January 19, 2017
    Publication date: May 11, 2017
    Inventors: Brian W. Hugenbruch, Peter G. Spera
  • Publication number: 20170134433
    Abstract: A common security policy for a heterogeneous computer architecture environment is provided. A configuration of a security policy of a heterogeneous computer architecture is received from a management console. The security policy is stored on a policy server that is communicatively connected, by a management network, to a plurality of hardware platforms of the of the heterogeneous computer architecture. The security policy is distributed to a plurality of policy agents of the heterogeneous computer architecture over the management network. The security policy includes a security policy administrator role that permits management of (i) one or more subjects in a plurality of security zones and (ii) one or more objects in the plurality of security zones. The security policy also includes security zone administrator roles, wherein each security zone administrator role (i) is associated with a respective security zone and (ii) permits management of object(s) in the respective security zone.
    Type: Application
    Filed: January 19, 2017
    Publication date: May 11, 2017
    Inventors: Brian W. Hugenbruch, Peter G. Spera
  • Publication number: 20170123766
    Abstract: Embodiments of the present invention provide methods, program products, and systems for modifying source code by managing symbols indicating executable instructions. Embodiments of the present invention can be used to receive one or more symbols indicating executable instructions to be implemented via source code and generate a visual display comprising a dialog box supporting modification of source code that implements the executable instructions indicated by the one or more symbols. Responsive to receiving a user interaction with the dialog box resulting in modified source code, embodiments of the present invention can be used to generate modified source code or a representation of the modified source code that is shorter than the modified source code.
    Type: Application
    Filed: January 24, 2017
    Publication date: May 4, 2017
    Inventors: Bryan C. Childs, Peter J. Relson, Peter G. Spera
  • Publication number: 20170123761
    Abstract: Embodiments of the present invention provide methods, program products, and systems for modifying source code by managing symbols indicating executable instructions. Embodiments of the present invention can be used to receive one or more symbols indicating executable instructions to be implemented via source code and generate a visual display comprising a dialog box supporting modification of source code that implements the executable instructions indicated by the one or more symbols. Responsive to receiving a user interaction with the dialog box resulting in modified source code, embodiments of the present invention can be used to generate modified source code or a representation of the modified source code that is shorter than the modified source code.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Bryan C. Childs, Peter J. Relson, Peter G. Spera
  • Publication number: 20170123763
    Abstract: Embodiments of the present invention provide methods, program products, and systems for modifying source code by managing symbols indicating executable instructions. Embodiments of the present invention can be used to receive one or more symbols indicating executable instructions to be implemented via source code and generate a visual display comprising a dialog box supporting modification of source code that implements the executable instructions indicated by the one or more symbols. Responsive to receiving a user interaction with the dialog box resulting in modified source code, embodiments of the present invention can be used to generate modified source code or a representation of the modified source code that is shorter than the modified source code.
    Type: Application
    Filed: April 14, 2016
    Publication date: May 4, 2017
    Inventors: Bryan C. Childs, Peter J. Relson, Peter G. Spera