Patents by Inventor Shawn P. Mullen

Shawn P. Mullen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10019696
    Abstract: A system for transferring digital rights managed (DRM) files from a first seller device to a buyer device involves a buyer device configured to receive a file package having the DRM file. Some file packages may also have a DRM file access key. The system also has a first seller device having the DRM file stored thereon and configured to receive a request to purchase the DRM file (the request having a DRM file identifier); receive a buyer identifier associated with the request; transfer the file package to a buyer device to the buyer device; detect through a network connection, a digital rights management server; and send, responsive to detecting the digital rights management server, a sale record to the digital rights management server, where the sale record includes the DRM file identifier and the buyer identifier.
    Type: Grant
    Filed: January 29, 2015
    Date of Patent: July 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9971887
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: May 15, 2018
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Patent number: 9965616
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: May 8, 2018
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Publication number: 20180107534
    Abstract: Environmental data, associated with a first computer, is received. Social media data, associated with the first computer, is also received. A first severity value, based on the environmental data, is determined. A second severity value, based on the social media data, is determined. A first weighted severity score is determined. The first weighted severity score is a combination of the first and second severity values. One or more actions is determined. The determined action is one of a recovery point objective action or a recovery time objective action. Each action has a threshold. Whether the first weighted severity score is equal to or greater than any threshold associated with any action is determined. In response to determining that the first weighted severity score is equal to or greater than one or more thresholds, each action associated with each threshold is implemented.
    Type: Application
    Filed: December 15, 2017
    Publication date: April 19, 2018
    Inventors: Eric S. Angeles, Megan L. Bennett, Fabio A. Gomez Diaz, Shawn P. Mullen
  • Publication number: 20180096133
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Application
    Filed: November 7, 2017
    Publication date: April 5, 2018
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Publication number: 20180096135
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Application
    Filed: November 17, 2017
    Publication date: April 5, 2018
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Publication number: 20180096134
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Application
    Filed: November 7, 2017
    Publication date: April 5, 2018
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Patent number: 9935971
    Abstract: An approach provides solutions for responding to threats to virtual machines (VMs) and mitigating the risks of potential breaches to VMs that reside in the same neighborhood as VMs that are affected by threats. The approach can provide proactive responsive actions for one or more VMs in a determined neighborhood that help protect those VMs in a selective and prioritized manner.
    Type: Grant
    Filed: February 1, 2017
    Date of Patent: April 3, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rick A. Hamilton, II, Jeffrey R. Hoy, Jenny S. Li, Shawn P. Mullen
  • Patent number: 9898359
    Abstract: Environmental data, associated with a first computer, is received. Social media data, associated with the first computer, is also received. A first severity value, based on the environmental data, is determined. A second severity value, based on the social media data, is determined. A first weighted severity score is determined. The first weighted severity score is a combination of the first and second severity values. One or more actions is determined. The determined action is one of a recovery point objective action or a recovery time objective action. Each action has a threshold. Whether the first weighted severity score is equal to or greater than any threshold associated with any action is determined. In response to determining that the first weighted severity score is equal to or greater than one or more thresholds, each action associated with each threshold is implemented.
    Type: Grant
    Filed: April 26, 2016
    Date of Patent: February 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Eric S. Angeles, Megan L. Bennett, Fabio A. Gomez Diaz, Shawn P. Mullen
  • Patent number: 9886685
    Abstract: A system for transferring digital rights managed (DRM) files from a first seller device to a buyer device involves a buyer device configured to receive a file package having the DRM file. Some file packages may also have a DRM file access key. The system also has a first seller device having the DRM file stored thereon and configured to receive a request to purchase the DRM file (the request having a DRM file identifier); receive a buyer identifier associated with the request; transfer the file package to a buyer device to the buyer device; detect through a network connection, a digital rights management server; and send, responsive to detecting the digital rights management server, a sale record to the digital rights management server, where the sale record includes the DRM file identifier and the buyer identifier.
    Type: Grant
    Filed: March 30, 2016
    Date of Patent: February 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20180025077
    Abstract: A processor may sample a surrounding environment for an identifiable media in response to an activation event. The processor may determine, based on the sampling, whether an identifiable media was detected. The processor may generate reference indicators from environmental conditions. The processor may tag the identifiable media with one or more reference indicators associated with the environmental conditions. The processor may transmit a segment of the identifiable media to a media identification application. The processor may receive information about the identifiable media.
    Type: Application
    Filed: July 20, 2016
    Publication date: January 25, 2018
    Inventors: Luis C. Cruz Huertas, Rick A. Hamilton, II, Shawn P. Mullen, Edgar A. Zamora Duran
  • Publication number: 20180018669
    Abstract: A method for establishing an index of usability associated with a replacement payment card is provided. The method may include receiving a payment card replacement request in a vending facility. The method may further include identifying at least one possible risk factor associated with a user utilizing the replacement payment card. The method may also include creating a risk assessment based on the at least one identified possible risk factor. The method may further include establishing an index of usability for the replacement payment card based on the created assessment, whereby a value of the index of usability correlates to a plurality of restrictions placed on using the replacement payment card. The method may also include storing the established index of usability in a database.
    Type: Application
    Filed: July 14, 2016
    Publication date: January 18, 2018
    Inventors: Itzhack Goldberg, Rick A. Hamilton, II, Shawn P. Mullen, Clifford A. Pickover
  • Publication number: 20180018656
    Abstract: A method for obtaining a replacement payment card is provided. The method may include receiving a request to replace a payment card associated with a user account. The method may also include transmitting an extended claim pin number to a user device based on receiving the request to replace the payment card. The method may further include enabling a vending facility to issue the replacement payment card to a user based on the user redeeming the transmitted extended claim pin number at the enabled vending facility.
    Type: Application
    Filed: July 14, 2016
    Publication date: January 18, 2018
    Inventors: Itzhack Goldberg, Rick A. Hamilton, II, Shawn P. Mullen, Clifford A. Pickover
  • Publication number: 20180012222
    Abstract: An embodiment of the invention may include a method, computer program product and system for transaction authentication. The embodiment may include receiving, by a mobile device from a network server via a wireless access point using a medium-range wireless communication protocol, an indication corresponding to a transaction to execute. The embodiment may include displaying a graphical interface element having an indication of approval to initiate the transaction to execute from a user based on receiving the indication. The embodiment may include authorizing the transaction to execute for a period of time based on receiving the indication of approval to initiate the transaction to execute. The embodiment may include detecting within the period of time, from a point of sale device using a short-range wireless communication protocol, a mobile payment method associated with the transaction to execute. The embodiment may include initiating the transaction based on detecting the mobile payment method.
    Type: Application
    Filed: July 11, 2016
    Publication date: January 11, 2018
    Inventors: Shawn L. Berger, Navneet Gupta, Rick A. Hamilton, II, Shawn P. Mullen, Nithya A. Renganathan, Karen M. Siles
  • Patent number: 9860066
    Abstract: Embodiments of the present invention utilize a data hash and an associated geotag for authentication of geolocation policies for data object storage in a cloud system. The geotag may be an alphanumeric identifier such as a city name, postal (ZIP) code, and/or latitude-longitude pair. Embodiments include a post-authenticate process, in which, after a data object is retrieved from a BMS, the geographic location of the source is confirmed to ensure the location policies have not been violated. Additionally, embodiments include a pre-authenticate process, in which, prior to storing a data object in a BMS, the geographic location of the BMS that is to receive the data object is confirmed to ensure the location policies will not be violated. Embodiments may use pre-authenticate, post-authenticate, or both pre-authenticate and post-authenticate, in order to implement and verify the location policies.
    Type: Grant
    Filed: November 12, 2015
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Shawn L. Berger, Navneet Gupta, Rick A. Hamilton, II, Shawn P. Mullen, Nithya A. Renganathan, Karen M. Siles
  • Patent number: 9852287
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Grant
    Filed: October 4, 2016
    Date of Patent: December 26, 2017
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Patent number: 9836595
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Grant
    Filed: January 23, 2017
    Date of Patent: December 5, 2017
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Publication number: 20170331845
    Abstract: A method for sequencing virtual machines in a shared pool of configurable network computing resources includes sequencing at least one computing element for two or more virtual machines into a respective two or more profiles, stored in a security database. Each virtual machine corresponds to a respective profile. The method also includes comparing a profile of a virtual machine corresponding to a security incident in the shared pool of configurable network computing resources with respective profiles of other virtual machines to identify similar profiles and group profiles into first and second groups. The method also includes comparing profiles of the groups of virtual machines and determining an alteration plan based on the comparison of profiles of the groups. The alternation plan includes a plan to modify one or more computing elements for virtual machines in the first group of virtual machines to reduce likelihood of susceptibility to the security incident.
    Type: Application
    Filed: August 1, 2017
    Publication date: November 16, 2017
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20170308421
    Abstract: Environmental data, associated with a first computer, is received. Social media data, associated with the first computer, is also received. A first severity value, based on the environmental data, is determined. A second severity value, based on the social media data, is determined. A first weighted severity score is determined. The first weighted severity score is a combination of the first and second severity values. One or more actions is determined. The determined action is one of a recovery point objective action or a recovery time objective action. Each action has a threshold. Whether the first weighted severity score is equal to or greater than any threshold associated with any action is determined. In response to determining that the first weighted severity score is equal to or greater than one or more thresholds, each action associated with each threshold is implemented.
    Type: Application
    Filed: April 26, 2016
    Publication date: October 26, 2017
    Inventors: Eric S. Angeles, Megan L. Bennett, Fabio A. Gomez Diaz, Shawn P. Mullen
  • Patent number: 9791861
    Abstract: A method and/or computer program product autonomously drives a self-driving vehicle (SDV) to a service facility. One or more processors receive sensor readings from an SDV equipment maintenance sensor on the SDV. The SDV equipment maintenance sensor detects a state of equipment on the SDV indicative of a need for maintenance service for the SDV. The processor(s) identify a service facility capable of providing the maintenance service, and determine an amount of time required for the SDV to travel to and from a current location of the SDV to the service facility and to receive the maintenance service. The processor(s) identify a time window in which a user of the SDV will not need the SDV, and then direct the SDV to autonomously drive to the service facility during the time window in which the user of the SDV will not need the SDV.
    Type: Grant
    Filed: November 12, 2015
    Date of Patent: October 17, 2017
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh