Patents by Inventor Rick A. Hamilton, II

Rick A. Hamilton, II has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10755707
    Abstract: A method, computer system, and a computer program product for selectively blacklisting audio commands is provided. The present invention may include observing an audible command received by an IoT (Internet of Things) enabled device, wherein the observed audible command appears in a blacklist database. The present invention may also include blacklisting the observed audible command.
    Type: Grant
    Filed: May 14, 2018
    Date of Patent: August 25, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Kulvir S. Bhogal, Jeremy R. Fox, Rick A. Hamilton, II
  • Patent number: 10751945
    Abstract: A selection of a three-dimensional model by a user is received, and an interlocking block framework corresponding to the selected three-dimensional model is determined. The interlocking block framework includes one or more physical construction blocks configured to interlock with one another. A three-dimensional gap model is generated based upon the selected three-dimensional model and the interlocking block framework. The three-dimensional gap model is generated by removing a representation of the determined interlocking block framework from the selected three-dimensional model.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: August 25, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peter G. Finn, Rick A. Hamilton, II, Agueda Martinez Hernandez Magro, James W. Seaman
  • Patent number: 10751944
    Abstract: A selection of a three-dimensional model by a user is received, and an interlocking block framework corresponding to the selected three-dimensional model is determined. The interlocking block framework includes one or more physical construction blocks configured to interlock with one another. A three-dimensional gap model is generated based upon the selected three-dimensional model and the interlocking block framework. The three-dimensional gap model is generated by removing a representation of the determined interlocking block framework from the selected three-dimensional model.
    Type: Grant
    Filed: February 23, 2017
    Date of Patent: August 25, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peter G. Finn, Rick A. Hamilton, II, Agueda Martinez Hernandez Magro, James W. Seaman
  • Patent number: 10747685
    Abstract: Approaches for expiring cached virtual content in a virtual universe are provided. In one approach, there is an expiration tool, including an identification component configured to identify virtual content associated with an avatar in the virtual universe, an analysis component configured to analyze a behavior of the avatar in a region of the virtual universe, the behavior indicating a likely future location of the avatar, and an expiration component configured to expire cached virtual content associated with the avatar based on the behavior of the avatar in the region of the virtual universe, wherein the cached virtual content associated with the avatar in the future location is maintained in the cache longer than cached virtual content associated with the avatar in another region of the virtual universe.
    Type: Grant
    Filed: February 9, 2018
    Date of Patent: August 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ann Corrao, Rick A. Hamilton, II, Brian M. O'Connell, Brian J. Snitzer
  • Patent number: 10743068
    Abstract: A method and system for improving real-time digital media capture and presentation is provided. The method includes retrieving digital media content in real time and dividing the digital media content into groups each including similar digital media portions. A digital tag is assigned to each group and each digital tag digitally describes media elements within each portion of the similar digital media portions. Each portion is analyzed with respect to the media elements and associated metadata is generated. The metadata is assigned to each media element and the groups of similar digital media portions are configured for automated presentation for users.
    Type: Grant
    Filed: September 17, 2018
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Luis C. Cruz Huertas, Rick A Hamilton, II, Ninad Sathaye, Edgar A. Zamora Duran
  • Publication number: 20200234235
    Abstract: A method, system and computer program product related to delivery of packages to online shopping customers. In an embodiment, the invention provides a method comprising identifying a pool of candidate delivery drivers; analyzing driving patterns of the candidate drivers in a geographic area; analyzing activities of specified online shoppers in the geographic area; and sending a message to contact one of the candidate drivers to deliver a package or packages to an online shopper based on a defined matching of the analyzed driving patterns of the candidate drivers with the analyzed activities of the online shoppers. In an embodiment, each of the candidate drivers has an associated mobile communications device; and the analyzing driving patterns of the candidate drivers includes using specified changes in locations of the mobile communication devices associated with the candidate delivery drivers to identify the driving patterns of the candidate drivers.
    Type: Application
    Filed: January 17, 2019
    Publication date: July 23, 2020
    Inventors: Agueda Martinez Hernandez Magro, Kulvir S. Bhogal, Rick A. Hamilton, II, Gregory J. Boss
  • Patent number: 10721334
    Abstract: Disclosed herein is a system and method for data collection in a virtual universe. The system can determine a first virtual universe object in a virtual universe comprises a first data source for a first data feed. The system can determine a first trigger event associated with the first data source. The system can determine permission has been granted to access the first data feed. The system can in response to determining permission has been granted to access the first data feed: determine to capture first data from the first data feed in response to a second virtual universe object performing the first trigger event; determine to create a first data feed file comprising the first data and first information related to the second virtual universe object; and determine to transmit the first data feed file to a user device associated with the first virtual universe object.
    Type: Grant
    Filed: February 4, 2016
    Date of Patent: July 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rick A. Hamilton, II, James R. Kozloski, Brian M. O'Connell, Clifford A. Pickover, Keith R. Walker
  • Patent number: 10699282
    Abstract: A method implemented in a computer infrastructure having computer executable code includes receiving advertising criteria, collecting advertisement cost data, and detecting virtual universe (VU) data. Additionally, the method includes determining optimal advertisement parameters based on the advertising criteria, the advertisement cost data and the VU data, and at least one of displaying the optimal advertisement parameters and invoking an advertisement in the VU in accordance with the optimal advertisement parameters.
    Type: Grant
    Filed: August 5, 2008
    Date of Patent: June 30, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rick A. Hamilton, II, Brian M. O'Connell, Clifford A. Pickover, Anne R. Sand, Keith R. Walker
  • Patent number: 10686809
    Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: June 16, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Patent number: 10672072
    Abstract: A method implemented in a computer infrastructure having computer executable code, includes receiving information in support of a bid and determining if value-add eligibility criteria is met. Additionally, the method includes calculating a bid price based on the information if the value-add eligibility criteria is met, updating a record indicating the bid price and tracking additions and changes to the record.
    Type: Grant
    Filed: June 13, 2014
    Date of Patent: June 2, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rick A. Hamilton, II, Konstantinos Makropoulos, Bryan J. Martin, James W. Seaman
  • Patent number: 10673932
    Abstract: A system and method for abstracting objects in a virtual universe (VU) deployment is provided. The system and method abstracts VU objects for editing in a common abstraction utility and for deploying to one or more VU grids containing one or more VU architectures and/or platforms (servers). The method can be implemented in a computer infrastructure having programming instructions operable to: obtain an object associated with a first virtual universe server; translate the object with syntax specific to at least a second virtual universe server, the syntax being different than that used with the first virtual universe server; and deploy the translated object to the second virtual universe server.
    Type: Grant
    Filed: November 21, 2017
    Date of Patent: June 2, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ankur Chandra, Rick A. Hamilton, II, Nalini K. Kartha, Keith R. Walker
  • Publication number: 20200168012
    Abstract: A computer-implemented method, system, and program product for providing a personal fuel efficiency for a vehicle of interest to a user. Responsive to receiving an input, a particular vehicle having a number of fuel efficiency attributes is identified. Driver attribute data providing information of personal driving behaviors of the user when driving another vehicle is accessed. The driver attribute data is obtained from a number of sensors on the other vehicle. Using the driver attribute data, a predicted impact on the number of fuel efficiency attributes is determined. The number of fuel efficiency attributes is adjusted based on the predicted impact to determine the personal fuel efficiency. The computer renders the personal fuel efficiency on a user device or on a display device located on the particular vehicle.
    Type: Application
    Filed: November 28, 2018
    Publication date: May 28, 2020
    Inventors: Gregory J. Boss, Kulvir Singh Bhogal, Rick A. Hamilton, II, Ninad Sathaye
  • Patent number: 10666670
    Abstract: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: May 26, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Patent number: 10657148
    Abstract: An IoT apparatus in use by a user, which is communicatively linked to a mobile device used by the user, is identified. A determination can be made as to whether documentation for the IoT apparatus is located on the IoT apparatus or on a mobile device. Responsive to determining that the documentation is located on the IoT apparatus or on the mobile device, a determination can be made as to whether the documentation located on the IoT apparatus or on the mobile device is a latest version of the documentation. Responsive to determining that the documentation located on the IoT apparatus or on the mobile device is not the latest version of the documentation, the latest version of the documentation can be automatically accessed from a resource external to the IoT apparatus and the mobile device. Presentation of the latest version of the documentation on a display can be initiated.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: May 19, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rick A. Hamilton, II, Agueda Martinez Hernandez Magro, Jose Roberto Mosqueda Mejia, Victor Adrian Sosa Herrera
  • Publication number: 20200150737
    Abstract: Approaches that manage energy in a data center are provided. In one embodiment, there is an energy management tool, including an analysis component configured to determine a current energy profile of each of a plurality of systems within the data center, the current energy profile comprising an overall rating expressed as an integer value, the overall rating calculated based on a current workload usage and environmental conditions surrounding each of the plurality of systems; and a priority component configured to prioritize a routing of a workload to a set of systems from the plurality of systems within the data center having the least amount of energy present based on a comparison of the overall ratings for each of the plurality of systems within the data center.
    Type: Application
    Filed: January 14, 2020
    Publication date: May 14, 2020
    Inventors: Christopher J. Dawson, Vincenzo V. Diluoffo, Rick A. Hamilton, II, Michael D. Kendzierski
  • Patent number: 10650658
    Abstract: As disclosed herein a dynamic geo-fencing method includes receiving a plurality of geo-fence extent factors, a plurality of extents, and a plurality of violation responses for a geo-fence, determining a first geo-fence extent factor of the plurality of geo-fence extent factors, selecting a first extent for the geo-fence corresponding to the first geo-fence extent factor, determining that the geo-fence is violated, and responsive to determining that the geo-fence is violated, performing a violation response, of the plurality of violation responses, corresponding to the first geo-fence extent factor. A corresponding system and computer program product are also disclosed herein.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: May 12, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Jeremy R. Fox, Gregory J. Boss, Rick A. Hamilton, II
  • Patent number: 10639551
    Abstract: Provided is a method for authentication and verification of a user in a virtual world (VU) based upon such criteria as the physical location of a user in the real world and the logical location of the user's avatar in the VU. The disclosed technology combines physical and application aspects of security to enhance security options within virtual environments. In addition to traditional credential-based authentication, physical constraints corresponding to the real world and logical locations in a VU are employed, wherein an authentication server requires each component to be in the proper association state, location or proximity before authenticating a user. Further, the disclosed technology provides for the termination of a user's authentication if the user moves from an approved physical or VU location to an unapproved location. Techniques are provided to track a user's credentials and real-time physical and logical location of a user.
    Type: Grant
    Filed: February 21, 2017
    Date of Patent: May 5, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rick A. Hamilton, II, Jenny S. Li, Anne R. Sand, James W. Seaman
  • Patent number: 10636282
    Abstract: Security system devices are configured to retrieve historic first sensor data acquired from a protected area in response to receiving a threat alarm notification from a peer security system that is related to an area monitored by the peer security system, wherein the protected area is different from and geographically separate from the area monitored by the peer security system. The system devise determines that a security threat is indicated for the protected area by assessing the retrieved selection of historic first sensor data as a function of a relation of the threat alarm notification from the peer security system to the protected area, wherein assessing the historic first sensor data without the function of the relation of the threat alarm notification from the peer security system to the protected area results in determining that the security threat is not indicated for the protected area.
    Type: Grant
    Filed: May 22, 2019
    Date of Patent: April 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Luis Carlos Cruz Huertas, Rick A Hamilton, II, Ninad Sathaye, Edgar A. Zamora Duran
  • Patent number: 10623998
    Abstract: Methods and systems to establish and execute price offerings among the lenders and borrowers in a bandwidth-sharing ad hoc network for shared bandwidth usage. The method comprises establishing a price offering among a lender and borrower in a bandwidth-sharing ad hoc network for shared bandwidth usage. The method further includes executing the price offering upon acceptance of a lender to the bandwidth-sharing ad hoc network for shared bandwidth usage.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: April 14, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Dawson, Peter G. Finn, Rick A. Hamilton, II, Jenny S. Li
  • Patent number: 10620684
    Abstract: In general, embodiments of the invention provide an approach to proactively adjust timeout settings on a display device based on user activity. Specifically, a system and method are presented to adaptively adjust the inactivity timeout settings on a display device based on the application being used, the content being displayed on the device, and an analysis of the user's history with the application. The present invention calculates an inactivity timeout modifier which is utilized to modify the default operating system timeout value.
    Type: Grant
    Filed: October 17, 2018
    Date of Patent: April 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey D. Amsterdam, Rick A. Hamilton, II, Mauro Marzorati, Brian M. O'Connell, Keith R. Walker