Patents by Inventor Shawn P. Mullen

Shawn P. Mullen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240029071
    Abstract: A method for establishing an index of usability associated with a replacement payment card is provided. The method may include receiving a payment card replacement request in a vending facility. The method may further include identifying at least one possible risk factor associated with a user utilizing the replacement payment card. The method may also include creating a risk assessment based on the at least one identified possible risk factor. The method may further include establishing an index of usability for the replacement payment card based on the created assessment, whereby a value of the index of usability correlates to a plurality of restrictions placed on using the replacement payment card. The method may also include storing the established index of usability in a database.
    Type: Application
    Filed: October 6, 2023
    Publication date: January 25, 2024
    Inventors: Itzhack Goldberg, Rick A. Hamilton, II, Shawn P. Mullen, Clifford A. Pickover
  • Patent number: 11816669
    Abstract: A method for establishing an index of usability associated with a replacement payment card is provided. The method may include receiving a payment card replacement request in a vending facility. The method may further include identifying at least one possible risk factor associated with a user utilizing the replacement payment card. The method may also include creating a risk assessment based on the at least one identified possible risk factor. The method may further include establishing an index of usability for the replacement payment card based on the created assessment, whereby a value of the index of usability correlates to a plurality of restrictions placed on using the replacement payment card. The method may also include storing the established index of usability in a database.
    Type: Grant
    Filed: January 19, 2022
    Date of Patent: November 14, 2023
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Rick A. Hamilton, II, Shawn P. Mullen, Clifford A. Pickover
  • Publication number: 20220382875
    Abstract: A method performs a trust review of repositories is provided. A computer system identifies security criteria for the trust review. The computer system applies the security criteria on a repository under evaluation. The computer system determines a recommendation for the repository under evaluation using a comparison of a result of applying the security criteria on the repository under evaluation to a trust baseline for a set of trusted repositories. According to other illustrative embodiments, a trust system and a computer program product for performing a trust review are provided.
    Type: Application
    Filed: May 25, 2021
    Publication date: December 1, 2022
    Inventors: Shawn P. Mullen, Corinne Anne Leopold, Anton Aleksandrov, Zsolt Ádám Czinege
  • Publication number: 20220138757
    Abstract: A method for establishing an index of usability associated with a replacement payment card is provided. The method may include receiving a payment card replacement request in a vending facility. The method may further include identifying at least one possible risk factor associated with a user utilizing the replacement payment card. The method may also include creating a risk assessment based on the at least one identified possible risk factor. The method may further include establishing an index of usability for the replacement payment card based on the created assessment, whereby a value of the index of usability correlates to a plurality of restrictions placed on using the replacement payment card. The method may also include storing the established index of usability in a database.
    Type: Application
    Filed: January 19, 2022
    Publication date: May 5, 2022
    Inventors: Itzhack Goldberg, Rick A. Hamilton, II, Shawn P. Mullen, Clifford A. Pickover
  • Patent number: 11250436
    Abstract: A method for establishing an index of usability associated with a replacement payment card is provided. The method may include receiving a payment card replacement request in a vending facility. The method may further include identifying at least one possible risk factor associated with a user utilizing the replacement payment card. The method may also include creating a risk assessment based on the at least one identified possible risk factor. The method may further include establishing an index of usability for the replacement payment card based on the created assessment, whereby a value of the index of usability correlates to a plurality of restrictions placed on using the replacement payment card. The method may also include storing the established index of usability in a database.
    Type: Grant
    Filed: May 12, 2020
    Date of Patent: February 15, 2022
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Rick A. Hamilton, II, Shawn P. Mullen, Clifford A. Pickover
  • Patent number: 10931453
    Abstract: Authentication of tokens and associated are used to provide a just-in-time key synchronization for user access to a service in a cloud computing environment which includes a plurality of availability zones with an identity service, a storage system, and a keystore. The encryption keys are distributed by the storage system based on a user access request containing a token with a payload and a current user cryptographic key. The token is then sent to the keystore to authenticate the user. The keystore authenticates the user and sends the token with the current cryptographic key to the storage system. The storage system receives the token with the current cryptographic key and grants access to the user for the service.
    Type: Grant
    Filed: March 5, 2018
    Date of Patent: February 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Fernando J. Diaz, Shawn P. Mullen, Michael Perng, Karen Mariela Siles, Elvin Dalipe Tubillara
  • Patent number: 10833859
    Abstract: A encrypted verification system and method includes detecting an attempt to access a service requiring multi-factor authentication from a first user computing device, requesting a trusted platform module (TPM) public key of a second user computing device, the second user computing device being coupled to the first user computing device, generating a nonce in response to receiving the TPM public key of the second user computing device, sending the nonce for signature by a TPM private key of the second user computing device, receiving a signed nonce, wherein the signed nonce is signed by the TPM private key and decrypted using the TPM public key of the second user computing device, and determining that a value of the signed nonce matches a value of the nonce to authenticate the first user computing device and allowing access to the service.
    Type: Grant
    Filed: December 7, 2017
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Shawn P. Mullen, Elvin Dalipe Tubillara, Karen Mariela Siles, Nithya Alagu Renganathan
  • Patent number: 10803460
    Abstract: A method for establishing an index of usability associated with a replacement payment card is provided. The method may include receiving a payment card replacement request in a vending facility. The method may further include identifying at least one possible risk factor associated with a user utilizing the replacement payment card. The method may also include creating a risk assessment based on the at least one identified possible risk factor. The method may further include establishing an index of usability for the replacement payment card based on the created assessment, whereby a value of the index of usability correlates to a plurality of restrictions placed on using the replacement payment card. The method may also include storing the established index of usability in a database.
    Type: Grant
    Filed: July 14, 2016
    Date of Patent: October 13, 2020
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Rick A. Hamilton, II, Shawn P. Mullen, Clifford A. Pickover
  • Publication number: 20200273041
    Abstract: A method for establishing an index of usability associated with a replacement payment card is provided. The method may include receiving a payment card replacement request in a vending facility. The method may further include identifying at least one possible risk factor associated with a user utilizing the replacement payment card. The method may also include creating a risk assessment based on the at least one identified possible risk factor. The method may further include establishing an index of usability for the replacement payment card based on the created assessment, whereby a value of the index of usability correlates to a plurality of restrictions placed on using the replacement payment card. The method may also include storing the established index of usability in a database.
    Type: Application
    Filed: May 12, 2020
    Publication date: August 27, 2020
    Inventors: Itzhack Goldberg, Rick A. Hamilton, II, Shawn P. Mullen, Clifford A. Pickover
  • Patent number: 10747581
    Abstract: Virtual machine volumes may be migrated between software defined storage (SDS) systems by an orchestration engine configured to manage one or more virtual machines. The orchestration engine may identify one or more volumes associated with the one or more virtual machines and resident in a first SDS system to migrate to a second SDS system, and for each identified volume among the one or more identified volumes, the orchestration engine may create a replacement volume for the identified volume on the second SDS system, map the replacement volume to the associated virtual machine for the identified volume, cause the associated virtual machine to discover the replacement volume, mirror data from the identified volume to the replacement volume, unmap the identified volume from the associated virtual machine, and delete the identified volume from the first SDS system.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: August 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 10630539
    Abstract: Coordination of rate limiting calculations and updates, for multiple interrelated services, at a single computer at a single logical location on a computer network, instead of coordinating rate limit calculations by direct data communications among and between the various machines hosting the interrelated services that are subject to rate limiting. In some of these embodiments, advantages to doing this may include: (i) reducing the number and/or bandwidth consumption of data communications needed to perform rate limiting calculations and determinations; and/or (ii) setting appropriate rate limits for only the “highest level” services (that is, the services that are initially called by users, as opposed to the services that the highest level service call (directly or indirectly)).
    Type: Grant
    Filed: August 7, 2018
    Date of Patent: April 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Elvin D. Tubillara, Edward Shvartsman, Bradley O. Simpson, Shawn P. Mullen
  • Patent number: 10613921
    Abstract: Environmental data, associated with a first computer, is received. Social media data, associated with the first computer, is also received. A first severity value, based on the environmental data, is determined. A second severity value, based on the social media data, is determined. A first weighted severity score is determined. The first weighted severity score is a combination of the first and second severity values. One or more actions is determined. The determined action is one of a recovery point objective action or a recovery time objective action. Each action has a threshold. Whether the first weighted severity score is equal to or greater than any threshold associated with any action is determined. In response to determining that the first weighted severity score is equal to or greater than one or more thresholds, each action associated with each threshold is implemented.
    Type: Grant
    Filed: December 15, 2017
    Date of Patent: April 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Eric S. Angeles, Megan L. Bennett, Fabio A. Gomez Diaz, Shawn P. Mullen
  • Patent number: 10609058
    Abstract: A method for sequencing virtual machines in a shared pool of configurable network computing resources includes sequencing at least one computing element for two or more virtual machines into a respective two or more profiles, stored in a security database. Each virtual machine corresponds to a respective profile. The method also includes comparing a profile of a virtual machine corresponding to a security incident in the shared pool of configurable network computing resources with respective profiles of other virtual machines to identify similar profiles and group profiles into first and second groups. The method also includes comparing profiles of the groups of virtual machines and determining an alteration plan based on the comparison of profiles of the groups. The alternation plan includes a plan to modify one or more computing elements for virtual machines in the first group of virtual machines to reduce likelihood of susceptibility to the security incident.
    Type: Grant
    Filed: August 1, 2017
    Date of Patent: March 31, 2020
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20200052957
    Abstract: Coordination of rate limiting calculations and updates, for multiple interrelated services, at a single computer at a single logical location on a computer network, instead of coordinating rate limit calculations by direct data communications among and between the various machines hosting the interrelated services that are subject to rate limiting. In some of these embodiments, advantages to doing this may include: (i) reducing the number and/or bandwidth consumption of data communications needed to perform rate limiting calculations and determinations; and/or (ii) setting appropriate rate limits for only the “highest level” services (that is, the services that are initially called by users, as opposed to the services that the highest level service call (directly or indirectly)).
    Type: Application
    Filed: August 7, 2018
    Publication date: February 13, 2020
    Inventors: Elvin D. Tubillara, Edward Shvartsman, Bradley O. Simpson, Shawn P. Mullen
  • Patent number: 10528917
    Abstract: A sender selection is detected at a sender computer system within a user interface of at least one suggested folder name for a composed electronic message for a recipient receiving the electronic message to select as a folder name for filing the electronic message. The at least one suggested folder name is attached to the electronic message at the sender computer system for distribution to the recipient. The electronic message is sent with the suggested filing folder name from the sender computer system to a recipient, wherein a recipient receiving the electronic message receives the at least one suggested folder name specified by the sender in the electronic message for selecting a folder for filing the electronic message in a messaging filing directory for the recipient.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: January 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica Murillo, Johnny M. Shieh
  • Publication number: 20190273613
    Abstract: Authentication of tokens and associated are used to provide a just-in-time key synchronization for user access to a service in a cloud computing environment.
    Type: Application
    Filed: March 5, 2018
    Publication date: September 5, 2019
    Inventors: Fernando J. Diaz, Shawn P. Mullen, Michael Perng, Karen Mariela Siles, Elvin Dalipe Tubillara
  • Publication number: 20190182044
    Abstract: A encrypted verification system and method includes detecting an attempt to access a service requiring multi-factor authentication from a first user computing device, requesting a trusted platform module (TPM) public key of a second user computing device, the second user computing device being coupled to the first user computing device, generating a nonce in response to receiving the TPM public key of the second user computing device, sending the nonce for signature by a TPM private key of the second user computing device, receiving a signed nonce, wherein the signed nonce is signed by the TPM private key and decrypted using the TPM public key of the second user computing device, and determining that a value of the signed nonce matches a value of the nonce to authenticate the first user computing device and allowing access to the service.
    Type: Application
    Filed: December 7, 2017
    Publication date: June 13, 2019
    Inventors: Shawn P. Mullen, Elvin Dalipe Tubillara, Karen Mariela Siles, Nithya Alagu Renganathan
  • Patent number: 10169570
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Grant
    Filed: November 17, 2017
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Patent number: 10152604
    Abstract: An Attestation Identity Key pair (AIK pair) is created from a hardware identifier of a hardware machine and a geographical location. the AIK pair includes a private AIK and a public AIK. The public AIK and the geographical location are stored in a repository. the public AIK is matched with a key used to sign a data request. A geographical restriction policy corresponding to the geographical location associated with the public AIK is executed. When the geographical restriction policy determines that a type of the data request corresponds to an authorized request type from the geographical location, a service is instructed to process the data request.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: December 11, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Fernando J. Diaz, Shawn P. Mullen, Nithya Alagu Renganathan, Elvin Dalipe Tubillara
  • Publication number: 20180232249
    Abstract: Virtual machine volumes may be migrated between software defined storage (SDS) systems by an orchestration engine configured to manage one or more virtual machines. The orchestration engine may identify one or more volumes associated with the one or more virtual machines and resident in a first SDS system to migrate to a second SDS system, and for each identified volume among the one or more identified volumes, the orchestration engine may create a replacement volume for the identified volume on the second SDS system, map the replacement volume to the associated virtual machine for the identified volume, cause the associated virtual machine to discover the replacement volume, mirror data from the identified volume to the replacement volume, unmap the identified volume from the associated virtual machine, and delete the identified volume from the first SDS system.
    Type: Application
    Filed: February 15, 2017
    Publication date: August 16, 2018
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh