Patents by Inventor Susann M. Keohane
Susann M. Keohane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11902319Abstract: A computer-implemented process, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor determines a quantity of consecutive unsuccessful attempts to access the targeted item protected by a password. Responsive to the quantity of consecutive unsuccessful attempts to access the targeted item exceeding a predefined threshold, the computer processor acquires a new password for access to the targeted item, wherein the new password is based on a more complex set of password generation rules than a current password. The computer processor changing the current password of the targeted item to the new password, and in response to changing the current password of the targeted item to the new password, the computer processor sends an encrypted message regarding the new password to a user associated with the targeted item.Type: GrantFiled: March 9, 2021Date of Patent: February 13, 2024Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
-
Patent number: 11783948Abstract: A computer-implemented method, system, and computer program product are provided for determining cognitive issues. The method includes building, by a processor device with social network data, a patient model for social interactions between a patient and other people. The method also includes computing, by the processor device, changes between the patient model and new social network data. The method additionally includes evaluating, by the processor device, the changes between the patient model and new social network data to generate evaluated changes. The method further includes determining, by the processor device, a patient metric score responsive the evaluated changes. The method also includes controlling an operation of a processor-controlled device responsive to the patient metric score.Type: GrantFiled: December 17, 2018Date of Patent: October 10, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann M. Keohane, Nicola Palmarini, Khwaja Jawahar Jahangir Shaik
-
Patent number: 11226968Abstract: A mechanism is provided in a data processing system for presentation delivery. The mechanism receives a search request comprising one or more search terms from a user. The mechanism determines the current stage of a project of the user. The mechanism determines a user role and skill level of the user. The mechanism searches a corpus of information to generate search results based on the one or more search terms. The mechanism presents the search results to the user based on the current stage of the project, the user role and skill level of the user.Type: GrantFiled: April 17, 2019Date of Patent: January 18, 2022Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Maureen E. Kraft, Brent N. Shiver
-
Publication number: 20210218768Abstract: A computer-implemented process, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor determines a quantity of consecutive unsuccessful attempts to access the targeted item protected by a password. Responsive to the quantity of consecutive unsuccessful attempts to access the targeted item exceeding a predefined threshold, the computer processor acquires a new password for access to the targeted item, wherein the new password is based on a more complex set of password generation rules than a current password. The computer processor changing the current password of the targeted item to the new password, and in response to changing the current password of the targeted item to the new password, the computer processor sends an encrypted message regarding the new password to a user associated with the targeted item.Type: ApplicationFiled: March 9, 2021Publication date: July 15, 2021Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
-
Patent number: 10972498Abstract: A method, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor monitors a password protected account. A frequency of access attempts to the account is determined and in response to the frequency of access attempts exceeding a first threshold, a brute force password attack against the account is determined. A quantity of consecutive unsuccessful access attempts is tracked and responsive to the unsuccessful access attempts exceeding a second predefined threshold, a new password of the account is acquired, in which the new password follows a more complex set of password generation rules than the current password. An encrypted message regarding the new password is sent to a user of the account, the password of the account is reset to the new password, and the quantity of consecutive unsuccessful attempts to access the account is reset to zero.Type: GrantFiled: October 8, 2018Date of Patent: April 6, 2021Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
-
Patent number: 10957132Abstract: According to one or more embodiments described herein, a computer-implemented method includes detecting a trigger event occurring at a physical space. The method further includes generating, by the processing system, a temporary network and a temporary authorization code to permit access to the physical space based at least in part on an analysis of information associated with the detected trigger event. The method further includes transmitting, by the processing system, information about the temporary network and the temporary authorization code to a second processing system. The method further includes implementing, by the processing system, an automation routine responsive to detecting the trigger event.Type: GrantFiled: November 13, 2018Date of Patent: March 23, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann M. Keohane, Cristi N. Ullmann, Karthik Pallapothu, Tiffany Cross
-
Patent number: 10917427Abstract: The present disclosure relates to techniques for helping targeted users determine whether it is safe to supply personal information requested by a web site. In one embodiment, a method generally includes extracting textual content from a web page that requests information from a user and determining, based on the textual content, the type of information requested. A service type the web page provides is also determined based on the textual content. The service type and the information type are then compared to a set of predefined rules to determine a risk level associated with the web page. A visual indicator of the risk level is then displayed with the web page.Type: GrantFiled: May 20, 2019Date of Patent: February 9, 2021Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gary P. Noble, Johnny Meng-Han Shieh, Adam J. Storm
-
Patent number: 10747581Abstract: Virtual machine volumes may be migrated between software defined storage (SDS) systems by an orchestration engine configured to manage one or more virtual machines. The orchestration engine may identify one or more volumes associated with the one or more virtual machines and resident in a first SDS system to migrate to a second SDS system, and for each identified volume among the one or more identified volumes, the orchestration engine may create a replacement volume for the identified volume on the second SDS system, map the replacement volume to the associated virtual machine for the identified volume, cause the associated virtual machine to discover the replacement volume, mirror data from the identified volume to the replacement volume, unmap the identified volume from the associated virtual machine, and delete the identified volume from the first SDS system.Type: GrantFiled: February 15, 2017Date of Patent: August 18, 2020Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20200259948Abstract: A method, computer system, and a computer program product for managing at least one notification received on a user mobile device is provided. The present invention may include determining a user state associated with a user. The present invention may also include determining at least one personal preference setting associated with the determined user state, wherein the at least one personal preference setting was previously provided. The present invention may then include receiving, on the user mobile device, the at least one notification. The present invention may also include analyzing the received at least one notification. The present invention may further include determining whether the user will accept at least one notification from the user mobile device based on the determined at least one personal preference setting associated with the determined user state.Type: ApplicationFiled: February 12, 2019Publication date: August 13, 2020Inventors: Susann M. Keohane, Gerald F. McBrearty, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20200194123Abstract: A computer-implemented method, system, and computer program product are provided for determining cognitive issues. The method includes building, by a processor device with social network data, a patient model for social interactions between a patient and other people. The method also includes computing, by the processor device, changes between the patient model and new social network data. The method additionally includes evaluating, by the processor device, the changes between the patient model and new social network data to generate evaluated changes. The method further includes determining, by the processor device, a patient metric score responsive the evaluated changes. The method also includes controlling an operation of a processor-controlled device responsive to the patient metric score.Type: ApplicationFiled: December 17, 2018Publication date: June 18, 2020Inventors: Susann M. Keohane, Nicola Palmarini, Khwaja Jawahar Jahangir Shaik
-
Publication number: 20200151976Abstract: According to one or more embodiments described herein, a computer-implemented method includes detecting a trigger event occurring at a physical space. The method further includes generating, by the processing system, a temporary network and a temporary authorization code to permit access to the physical space based at least in part on an analysis of information associated with the detected trigger event. The method further includes transmitting, by the processing system, information about the temporary network and the temporary authorization code to a second processing system. The method further includes implementing, by the processing system, an automation routine responsive to detecting the trigger event.Type: ApplicationFiled: November 13, 2018Publication date: May 14, 2020Inventors: Susann M. Keohane, Cristi N. Ullmann, Karthik Pallapothu, Tiffany Cross
-
Publication number: 20200112585Abstract: A method, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor monitors a password protected account. A frequency of access attempts to the account is determined and in response to the frequency of access attempts exceeding a first threshold, a brute force password attack against the account is determined. A quantity of consecutive unsuccessful access attempts is tracked and responsive to the unsuccessful access attempts exceeding a second predefined threshold, a new password of the account is acquired, in which the new password follows a more complex set of password generation rules than the current password. An encrypted message regarding the new password is sent to a user of the account, the password of the account is reset to the new password, and the quantity of consecutive unsuccessful attempts to access the account is reset to zero.Type: ApplicationFiled: October 8, 2018Publication date: April 9, 2020Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
-
Patent number: 10609058Abstract: A method for sequencing virtual machines in a shared pool of configurable network computing resources includes sequencing at least one computing element for two or more virtual machines into a respective two or more profiles, stored in a security database. Each virtual machine corresponds to a respective profile. The method also includes comparing a profile of a virtual machine corresponding to a security incident in the shared pool of configurable network computing resources with respective profiles of other virtual machines to identify similar profiles and group profiles into first and second groups. The method also includes comparing profiles of the groups of virtual machines and determining an alteration plan based on the comparison of profiles of the groups. The alternation plan includes a plan to modify one or more computing elements for virtual machines in the first group of virtual machines to reduce likelihood of susceptibility to the security incident.Type: GrantFiled: August 1, 2017Date of Patent: March 31, 2020Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 10528917Abstract: A sender selection is detected at a sender computer system within a user interface of at least one suggested folder name for a composed electronic message for a recipient receiving the electronic message to select as a folder name for filing the electronic message. The at least one suggested folder name is attached to the electronic message at the sender computer system for distribution to the recipient. The electronic message is sent with the suggested filing folder name from the sender computer system to a recipient, wherein a recipient receiving the electronic message receives the at least one suggested folder name specified by the sender in the electronic message for selecting a folder for filing the electronic message in a messaging filing directory for the recipient.Type: GrantFiled: August 30, 2016Date of Patent: January 7, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica Murillo, Johnny M. Shieh
-
Publication number: 20190387057Abstract: A system is provided for inferring sensor topology in a structure. The system includes a receiver, a server communicatively coupled to the receiver and a sensor topology engine communicatively coupled to the receiver and the server. The receiver is configured to receive identification information that sensors have been and deployed throughout the structure to sense a presence of an operator and to receive sensor readings from the sensors and couple the sensor readings to the sensor topology engine. The sensor topology engine is further configured analyze the identification information and the sensor readings to infer zones of the multiple spaces in which the presence of the operator is sensed by at least one of the sensors, borders of each of the zones, and dead zones adjacent to one or more of the zones in which the presence of the operator is not sensed and build a topological graph.Type: ApplicationFiled: June 14, 2018Publication date: December 19, 2019Inventors: Samuel S. Adams, Scott Gerard, Aliza R. Heching, Susann M. Keohane
-
Publication number: 20190273759Abstract: The present disclosure relates to techniques for helping targeted users determine whether it is safe to supply personal information requested by a web site. In one embodiment, a method generally includes extracting textual content from a web page that requests information from a user and determining, based on the textual content, the type of information requested. A service type the web page provides is also determined based on the textual content. The service type and the information type are then compared to a set of predefined rules to determine a risk level associated with the web page. A visual indicator of the risk level is then displayed with the web page.Type: ApplicationFiled: May 20, 2019Publication date: September 5, 2019Inventors: Susann M. KEOHANE, Gary P. NOBLE, Johnny Meng-Han SHIEH, Adam J. STORM
-
Publication number: 20190243837Abstract: A mechanism is provided in a data processing system for presentation delivery. The mechanism receives a search request comprising one or more search terms from a user. The mechanism determines the current stage of a project of the user. The mechanism determines a user role and skill level of the user. The mechanism searches a corpus of information to generate search results based on the one or more search terms. The mechanism presents the search results to the user based on the current stage of the project, the user role and skill level of the user.Type: ApplicationFiled: April 17, 2019Publication date: August 8, 2019Inventors: Susann M. Keohane, Maureen E. Kraft, Brent N. Shiver
-
Patent number: 10362049Abstract: The present disclosure relates to techniques for helping targeted users determine whether it is safe to supply personal information requested by a web site. In one embodiment, a method generally includes extracting textual content from a web page that requests information from a user and determining, based on the textual content, the type of information requested. A service type the web page provides is also determined based on the textual content. The service type and the information type are then compared to a set of predefined rules to determine a risk level associated with the web page. A visual indicator of the risk level is then displayed with the web page.Type: GrantFiled: October 12, 2016Date of Patent: July 23, 2019Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gary P. Noble, Johnny Meng-Han Shieh, Adam J. Storm
-
Publication number: 20190163973Abstract: Information is detected from additional devices within a detectable vicinity of a first smart device. The additional devices are identified by analyzing the information detected from the additional devices. Contextual information corresponding to the first smart device is accessed and expected patterns corresponding to the first smart device are learned, based on compiling combinations of detected additional devices in the vicinity of the first smart device and the contextual information corresponding to the detectable vicinity of the first smart device. Responsive to determining inconsistency between the expected patterns corresponding to the first smart device over time, and the information detected from the additional devices within a current detectable vicinity of the first smart device in combination with the current contextual information corresponding to the first smart device, a notification indicating an unexpected pattern of the first smart is generated.Type: ApplicationFiled: November 29, 2017Publication date: May 30, 2019Inventors: Susann M. Keohane, Jeb R. Linton, Dave K. Wright
-
Patent number: 10268728Abstract: A mechanism is provided in a data processing system for presentation delivery. The mechanism receives a search request comprising one or more search terms from a user. The mechanism determines the current stage of a project of the user. The mechanism determines a user role and skill level of the user. The mechanism searches a corpus of information to generate search results based on the one or more search terms. The mechanism presents the search results to the user based on the current stage of the project, the user role and skill level of the user.Type: GrantFiled: November 4, 2015Date of Patent: April 23, 2019Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Maureen E. Kraft, Brent N. Shiver