Patents by Inventor Susann M. Keohane

Susann M. Keohane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11902319
    Abstract: A computer-implemented process, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor determines a quantity of consecutive unsuccessful attempts to access the targeted item protected by a password. Responsive to the quantity of consecutive unsuccessful attempts to access the targeted item exceeding a predefined threshold, the computer processor acquires a new password for access to the targeted item, wherein the new password is based on a more complex set of password generation rules than a current password. The computer processor changing the current password of the targeted item to the new password, and in response to changing the current password of the targeted item to the new password, the computer processor sends an encrypted message regarding the new password to a user associated with the targeted item.
    Type: Grant
    Filed: March 9, 2021
    Date of Patent: February 13, 2024
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
  • Patent number: 11783948
    Abstract: A computer-implemented method, system, and computer program product are provided for determining cognitive issues. The method includes building, by a processor device with social network data, a patient model for social interactions between a patient and other people. The method also includes computing, by the processor device, changes between the patient model and new social network data. The method additionally includes evaluating, by the processor device, the changes between the patient model and new social network data to generate evaluated changes. The method further includes determining, by the processor device, a patient metric score responsive the evaluated changes. The method also includes controlling an operation of a processor-controlled device responsive to the patient metric score.
    Type: Grant
    Filed: December 17, 2018
    Date of Patent: October 10, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Nicola Palmarini, Khwaja Jawahar Jahangir Shaik
  • Patent number: 11226968
    Abstract: A mechanism is provided in a data processing system for presentation delivery. The mechanism receives a search request comprising one or more search terms from a user. The mechanism determines the current stage of a project of the user. The mechanism determines a user role and skill level of the user. The mechanism searches a corpus of information to generate search results based on the one or more search terms. The mechanism presents the search results to the user based on the current stage of the project, the user role and skill level of the user.
    Type: Grant
    Filed: April 17, 2019
    Date of Patent: January 18, 2022
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Maureen E. Kraft, Brent N. Shiver
  • Publication number: 20210218768
    Abstract: A computer-implemented process, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor determines a quantity of consecutive unsuccessful attempts to access the targeted item protected by a password. Responsive to the quantity of consecutive unsuccessful attempts to access the targeted item exceeding a predefined threshold, the computer processor acquires a new password for access to the targeted item, wherein the new password is based on a more complex set of password generation rules than a current password. The computer processor changing the current password of the targeted item to the new password, and in response to changing the current password of the targeted item to the new password, the computer processor sends an encrypted message regarding the new password to a user associated with the targeted item.
    Type: Application
    Filed: March 9, 2021
    Publication date: July 15, 2021
    Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
  • Patent number: 10972498
    Abstract: A method, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor monitors a password protected account. A frequency of access attempts to the account is determined and in response to the frequency of access attempts exceeding a first threshold, a brute force password attack against the account is determined. A quantity of consecutive unsuccessful access attempts is tracked and responsive to the unsuccessful access attempts exceeding a second predefined threshold, a new password of the account is acquired, in which the new password follows a more complex set of password generation rules than the current password. An encrypted message regarding the new password is sent to a user of the account, the password of the account is reset to the new password, and the quantity of consecutive unsuccessful attempts to access the account is reset to zero.
    Type: Grant
    Filed: October 8, 2018
    Date of Patent: April 6, 2021
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
  • Patent number: 10957132
    Abstract: According to one or more embodiments described herein, a computer-implemented method includes detecting a trigger event occurring at a physical space. The method further includes generating, by the processing system, a temporary network and a temporary authorization code to permit access to the physical space based at least in part on an analysis of information associated with the detected trigger event. The method further includes transmitting, by the processing system, information about the temporary network and the temporary authorization code to a second processing system. The method further includes implementing, by the processing system, an automation routine responsive to detecting the trigger event.
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: March 23, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Cristi N. Ullmann, Karthik Pallapothu, Tiffany Cross
  • Patent number: 10917427
    Abstract: The present disclosure relates to techniques for helping targeted users determine whether it is safe to supply personal information requested by a web site. In one embodiment, a method generally includes extracting textual content from a web page that requests information from a user and determining, based on the textual content, the type of information requested. A service type the web page provides is also determined based on the textual content. The service type and the information type are then compared to a set of predefined rules to determine a risk level associated with the web page. A visual indicator of the risk level is then displayed with the web page.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: February 9, 2021
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gary P. Noble, Johnny Meng-Han Shieh, Adam J. Storm
  • Patent number: 10747581
    Abstract: Virtual machine volumes may be migrated between software defined storage (SDS) systems by an orchestration engine configured to manage one or more virtual machines. The orchestration engine may identify one or more volumes associated with the one or more virtual machines and resident in a first SDS system to migrate to a second SDS system, and for each identified volume among the one or more identified volumes, the orchestration engine may create a replacement volume for the identified volume on the second SDS system, map the replacement volume to the associated virtual machine for the identified volume, cause the associated virtual machine to discover the replacement volume, mirror data from the identified volume to the replacement volume, unmap the identified volume from the associated virtual machine, and delete the identified volume from the first SDS system.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: August 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20200259948
    Abstract: A method, computer system, and a computer program product for managing at least one notification received on a user mobile device is provided. The present invention may include determining a user state associated with a user. The present invention may also include determining at least one personal preference setting associated with the determined user state, wherein the at least one personal preference setting was previously provided. The present invention may then include receiving, on the user mobile device, the at least one notification. The present invention may also include analyzing the received at least one notification. The present invention may further include determining whether the user will accept at least one notification from the user mobile device based on the determined at least one personal preference setting associated with the determined user state.
    Type: Application
    Filed: February 12, 2019
    Publication date: August 13, 2020
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20200194123
    Abstract: A computer-implemented method, system, and computer program product are provided for determining cognitive issues. The method includes building, by a processor device with social network data, a patient model for social interactions between a patient and other people. The method also includes computing, by the processor device, changes between the patient model and new social network data. The method additionally includes evaluating, by the processor device, the changes between the patient model and new social network data to generate evaluated changes. The method further includes determining, by the processor device, a patient metric score responsive the evaluated changes. The method also includes controlling an operation of a processor-controlled device responsive to the patient metric score.
    Type: Application
    Filed: December 17, 2018
    Publication date: June 18, 2020
    Inventors: Susann M. Keohane, Nicola Palmarini, Khwaja Jawahar Jahangir Shaik
  • Publication number: 20200151976
    Abstract: According to one or more embodiments described herein, a computer-implemented method includes detecting a trigger event occurring at a physical space. The method further includes generating, by the processing system, a temporary network and a temporary authorization code to permit access to the physical space based at least in part on an analysis of information associated with the detected trigger event. The method further includes transmitting, by the processing system, information about the temporary network and the temporary authorization code to a second processing system. The method further includes implementing, by the processing system, an automation routine responsive to detecting the trigger event.
    Type: Application
    Filed: November 13, 2018
    Publication date: May 14, 2020
    Inventors: Susann M. Keohane, Cristi N. Ullmann, Karthik Pallapothu, Tiffany Cross
  • Publication number: 20200112585
    Abstract: A method, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor monitors a password protected account. A frequency of access attempts to the account is determined and in response to the frequency of access attempts exceeding a first threshold, a brute force password attack against the account is determined. A quantity of consecutive unsuccessful access attempts is tracked and responsive to the unsuccessful access attempts exceeding a second predefined threshold, a new password of the account is acquired, in which the new password follows a more complex set of password generation rules than the current password. An encrypted message regarding the new password is sent to a user of the account, the password of the account is reset to the new password, and the quantity of consecutive unsuccessful attempts to access the account is reset to zero.
    Type: Application
    Filed: October 8, 2018
    Publication date: April 9, 2020
    Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
  • Patent number: 10609058
    Abstract: A method for sequencing virtual machines in a shared pool of configurable network computing resources includes sequencing at least one computing element for two or more virtual machines into a respective two or more profiles, stored in a security database. Each virtual machine corresponds to a respective profile. The method also includes comparing a profile of a virtual machine corresponding to a security incident in the shared pool of configurable network computing resources with respective profiles of other virtual machines to identify similar profiles and group profiles into first and second groups. The method also includes comparing profiles of the groups of virtual machines and determining an alteration plan based on the comparison of profiles of the groups. The alternation plan includes a plan to modify one or more computing elements for virtual machines in the first group of virtual machines to reduce likelihood of susceptibility to the security incident.
    Type: Grant
    Filed: August 1, 2017
    Date of Patent: March 31, 2020
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 10528917
    Abstract: A sender selection is detected at a sender computer system within a user interface of at least one suggested folder name for a composed electronic message for a recipient receiving the electronic message to select as a folder name for filing the electronic message. The at least one suggested folder name is attached to the electronic message at the sender computer system for distribution to the recipient. The electronic message is sent with the suggested filing folder name from the sender computer system to a recipient, wherein a recipient receiving the electronic message receives the at least one suggested folder name specified by the sender in the electronic message for selecting a folder for filing the electronic message in a messaging filing directory for the recipient.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: January 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica Murillo, Johnny M. Shieh
  • Publication number: 20190387057
    Abstract: A system is provided for inferring sensor topology in a structure. The system includes a receiver, a server communicatively coupled to the receiver and a sensor topology engine communicatively coupled to the receiver and the server. The receiver is configured to receive identification information that sensors have been and deployed throughout the structure to sense a presence of an operator and to receive sensor readings from the sensors and couple the sensor readings to the sensor topology engine. The sensor topology engine is further configured analyze the identification information and the sensor readings to infer zones of the multiple spaces in which the presence of the operator is sensed by at least one of the sensors, borders of each of the zones, and dead zones adjacent to one or more of the zones in which the presence of the operator is not sensed and build a topological graph.
    Type: Application
    Filed: June 14, 2018
    Publication date: December 19, 2019
    Inventors: Samuel S. Adams, Scott Gerard, Aliza R. Heching, Susann M. Keohane
  • Publication number: 20190273759
    Abstract: The present disclosure relates to techniques for helping targeted users determine whether it is safe to supply personal information requested by a web site. In one embodiment, a method generally includes extracting textual content from a web page that requests information from a user and determining, based on the textual content, the type of information requested. A service type the web page provides is also determined based on the textual content. The service type and the information type are then compared to a set of predefined rules to determine a risk level associated with the web page. A visual indicator of the risk level is then displayed with the web page.
    Type: Application
    Filed: May 20, 2019
    Publication date: September 5, 2019
    Inventors: Susann M. KEOHANE, Gary P. NOBLE, Johnny Meng-Han SHIEH, Adam J. STORM
  • Publication number: 20190243837
    Abstract: A mechanism is provided in a data processing system for presentation delivery. The mechanism receives a search request comprising one or more search terms from a user. The mechanism determines the current stage of a project of the user. The mechanism determines a user role and skill level of the user. The mechanism searches a corpus of information to generate search results based on the one or more search terms. The mechanism presents the search results to the user based on the current stage of the project, the user role and skill level of the user.
    Type: Application
    Filed: April 17, 2019
    Publication date: August 8, 2019
    Inventors: Susann M. Keohane, Maureen E. Kraft, Brent N. Shiver
  • Patent number: 10362049
    Abstract: The present disclosure relates to techniques for helping targeted users determine whether it is safe to supply personal information requested by a web site. In one embodiment, a method generally includes extracting textual content from a web page that requests information from a user and determining, based on the textual content, the type of information requested. A service type the web page provides is also determined based on the textual content. The service type and the information type are then compared to a set of predefined rules to determine a risk level associated with the web page. A visual indicator of the risk level is then displayed with the web page.
    Type: Grant
    Filed: October 12, 2016
    Date of Patent: July 23, 2019
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gary P. Noble, Johnny Meng-Han Shieh, Adam J. Storm
  • Publication number: 20190163973
    Abstract: Information is detected from additional devices within a detectable vicinity of a first smart device. The additional devices are identified by analyzing the information detected from the additional devices. Contextual information corresponding to the first smart device is accessed and expected patterns corresponding to the first smart device are learned, based on compiling combinations of detected additional devices in the vicinity of the first smart device and the contextual information corresponding to the detectable vicinity of the first smart device. Responsive to determining inconsistency between the expected patterns corresponding to the first smart device over time, and the information detected from the additional devices within a current detectable vicinity of the first smart device in combination with the current contextual information corresponding to the first smart device, a notification indicating an unexpected pattern of the first smart is generated.
    Type: Application
    Filed: November 29, 2017
    Publication date: May 30, 2019
    Inventors: Susann M. Keohane, Jeb R. Linton, Dave K. Wright
  • Patent number: 10268728
    Abstract: A mechanism is provided in a data processing system for presentation delivery. The mechanism receives a search request comprising one or more search terms from a user. The mechanism determines the current stage of a project of the user. The mechanism determines a user role and skill level of the user. The mechanism searches a corpus of information to generate search results based on the one or more search terms. The mechanism presents the search results to the user based on the current stage of the project, the user role and skill level of the user.
    Type: Grant
    Filed: November 4, 2015
    Date of Patent: April 23, 2019
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Maureen E. Kraft, Brent N. Shiver