Patents by Inventor Susann M. Keohane
Susann M. Keohane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9473513Abstract: In one embodiment, a computer-implemented method includes, in response to an attempt by a user to perform a transaction using a computing device, accessing a communication device connected to the computing device. A presence of one or more nearby devices, with respect to the computing device, is detected through use of the communication device connected to the computing device. A mapping of nearby devices to trust levels may be applied to the one or more nearby devices. In the mapping, each group of one or more nearby devices maps to a trust level of two or more trust levels. An assigned trust level for the transaction is determined, by a computer processor, based on applying the mapping of nearby devices to trust levels. The mapping of nearby devices to trust levels is modified based on the one or more nearby devices detected. The modified mapping is used for future transactions.Type: GrantFiled: June 22, 2015Date of Patent: October 18, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Louis T. Fuka, Susann M. Keohane, James R. Kraemer
-
Patent number: 9472241Abstract: Each data integrity value, from among a plurality of data integrity values each associated with a separate unit of a program comprising a plurality of units, is checked against a separate recorded portion of a recording of the program corresponding to one of the plurality of units, wherein the recording of the program is recorded from a broadcast of the program. Responsive to a particular data integrity value from among the plurality of data integrity values not matching when checked against a particular separate recorded portion of the program corresponding to a particular unit from among the plurality of units, the recording is corrected by replacing only the particular separate recorded portion of the program from a second recording of only the particular unit from a subsequent broadcast of the program.Type: GrantFiled: September 9, 2013Date of Patent: October 18, 2016Assignee: GLOBALFOUNDRIES INC.Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 9460599Abstract: A school perimeter security system includes a registry database including: registered student mobile device identifiers, registered non-student mobile device identifiers, and a matching of students with authorized non-students with whom the students are permitted to be paired with near the perimeter. At least three beacon devices are located within the school's perimeter, positioned to establish a boundary area near the perimeter, detect and establish communication with mobile devices entering the boundary area, obtain an identifier from each mobile device that enters the boundary area, and facilitate tracking of all mobile devices within the boundary area. The processor and beacon devices interact to identify every mobile device entering the boundary area, track their location within the boundary area, compare the identified mobile devices with identifiers in the registry database and, transmit an alert notice when a condition is satisfied but not transmit that alert when a different condition is satisfied.Type: GrantFiled: May 27, 2016Date of Patent: October 4, 2016Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Shawn P. Mullen, Johnny M. Shieh
-
Publication number: 20160285825Abstract: According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention System (HIPS) is provided. The method may include receiving a trusted connection table from the HIPS, wherein the trusted connection table contains a plurality of trusted connection information. The method may also include receiving a network packet from a virtual switch, wherein the network packet has a plurality of connection information. The method may then include determining if the plurality of connection information matches the plurality of trusted connection information. The method may further include sending the network packet to a destination based on determining that the plurality of connection information matches the plurality of trusted connection information.Type: ApplicationFiled: June 11, 2015Publication date: September 29, 2016Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20160285828Abstract: According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention System (HIPS) is provided. The method may include receiving a trusted connection table from the HIPS, wherein the trusted connection table contains a plurality of trusted connection information. The method may also include receiving a network packet from a virtual switch, wherein the network packet has a plurality of connection information. The method may then include determining if the plurality of connection information matches the plurality of trusted connection information. The method may further include sending the network packet to a destination based on determining that the plurality of connection information matches the plurality of trusted connection information.Type: ApplicationFiled: March 26, 2015Publication date: September 29, 2016Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 9424725Abstract: A school perimeter security system includes a registry database. The registry database includes: registered student mobile device identifiers, registered non-student mobile device identifiers, and a matching of students with authorized non-students with whom the students are permitted to be paired with near the perimeter. At least three beacon devices are located within the school perimeter, positioned to establish a boundary area near the perimeter, detect and establish communication with mobile devices entering the boundary area, obtain an identifier from each mobile device that enters the boundary area, and facilitate trilateration of all mobile devices within the boundary area. The processor and beacon devices cooperatively interact to identify every mobile device entering the boundary area, track the location of every mobile device within the boundary area, compare the identified mobile devices with identifiers in the registry database and, transmit an alert notice when a condition is satisfied.Type: GrantFiled: January 4, 2016Date of Patent: August 23, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann M. Keohane, Shawn P. Mullen, Johnny M. Shieh
-
Publication number: 20160224957Abstract: A system for transferring digital rights managed (DRM) files from a first seller device to a buyer device involves a buyer device configured to receive a file package having the DRM file. Some file packages may also have a DRM file access key. The system also has a first seller device having the DRM file stored thereon and configured to receive a request to purchase the DRM file (the request having a DRM file identifier); receive a buyer identifier associated with the request; transfer the file package to a buyer device to the buyer device; detect through a network connection, a digital rights management server; and send, responsive to detecting the digital rights management server, a sale record to the digital rights management server, where the sale record includes the DRM file identifier and the buyer identifier.Type: ApplicationFiled: March 30, 2016Publication date: August 4, 2016Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20160224956Abstract: A system for transferring digital rights managed (DRM) files from a first seller device to a buyer device involves a buyer device configured to receive a file package having the DRM file. Some file packages may also have a DRM file access key. The system also has a first seller device having the DRM file stored thereon and configured to receive a request to purchase the DRM file (the request having a DRM file identifier); receive a buyer identifier associated with the request; transfer the file package to a buyer device to the buyer device; detect through a network connection, a digital rights management server; and send, responsive to detecting the digital rights management server, a sale record to the digital rights management server, where the sale record includes the DRM file identifier and the buyer identifier.Type: ApplicationFiled: January 29, 2015Publication date: August 4, 2016Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20160217219Abstract: In one embodiment, a computer-implemented method includes, in response to an attempt by a user to perform a transaction using a computing device, accessing a communication device connected to the computing device. A presence of one or more nearby devices, with respect to the computing device, is detected through use of the communication device connected to the computing device. A mapping of nearby devices to trust levels may be applied to the one or more nearby devices. In the mapping, each group of one or more nearby devices maps to a trust level of two or more trust levels. An assigned trust level for the transaction is determined, by a computer processor, based on applying the mapping of nearby devices to trust levels. The mapping of nearby devices to trust levels is modified based on the one or more nearby devices detected. The modified mapping is used for future transactions.Type: ApplicationFiled: June 22, 2015Publication date: July 28, 2016Inventors: Louis T. Fuka, Susann M. Keohane, James R. Kraemer
-
Publication number: 20160191540Abstract: In one embodiment, a computer-implemented method includes, in response to an attempt by a user to perform a transaction using a computing device, accessing a communication device connected to the computing device. A presence of one or more nearby devices, with respect to the computing device, is detected through use of the communication device connected to the computing device. A mapping of nearby devices to trust levels may be applied to the one or more nearby devices. In the mapping, each group of one or more nearby devices maps to a trust level of two or more trust levels. An assigned trust level for the transaction is determined, by a computer processor, based on applying the mapping of nearby devices to trust levels. The mapping of nearby devices to trust levels is modified based on the one or more nearby devices detected. The modified mapping is used for future transactions.Type: ApplicationFiled: December 30, 2014Publication date: June 30, 2016Inventors: Louis T. Fuka, Susann M. Keohane, James R. Kraemer
-
Patent number: 9372933Abstract: A mechanism is provided in a data processing system for personalized quantitative measure of accessibility. For a given web site or web application, the mechanism accesses existing crowd sourced user ratings. The mechanism generates a crowd source score for the given web site or web application based on the crowd sourced user ratings. The mechanism generates a compliance score for the given web site or web application based on compliance data published for the given web site or web application. The mechanism obtains a static analysis score for the given web site or web application. The mechanism generates weights for a given user based on user profile information of the given user and applies the weights to the crowd source score, the compliance score, and the static analysis score to form weighted data. The mechanism generates a personalized accessibility score based on the weighted data.Type: GrantFiled: November 6, 2013Date of Patent: June 21, 2016Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Maureen E. Kraft, Holly L. Nielsen, Shunguo Yan
-
Patent number: 9336403Abstract: A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a plurality of users, wherein decryption of the encrypted restricted tag element is limited to a selection of at least one user from among the plurality of users. The computer outputs the plurality of content elements for electronic publication through an interface accessible to the plurality of users, wherein the plurality of users are enabled to access the plurality of content elements of the message published through the interface, wherein only the selection of at least one user is enabled to decrypt the encrypted restricted tag element in the plurality of content elements to access the underlying restricted tag element within the message published through the interface.Type: GrantFiled: November 26, 2013Date of Patent: May 10, 2016Assignee: GLOBALFOUNDRIES Inc.Inventors: Susann M. Keohane, Gerald F. McBrearty, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 9319364Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.Type: GrantFiled: November 14, 2013Date of Patent: April 19, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
-
Publication number: 20160085983Abstract: A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a plurality of users, wherein decryption of the encrypted restricted tag element is limited to a selection of at least one user from among the plurality of users. The computer outputs the plurality of content elements for electronic publication through an interface accessible to the plurality of users, wherein the plurality of users are enabled to access the plurality of content elements of the message published through the interface, wherein only the selection of at least one user is enabled to decrypt the encrypted restricted tag element in the plurality of content elements to access the underlying restricted tag element within the message published through the interface.Type: ApplicationFiled: November 30, 2015Publication date: March 24, 2016Inventors: SUSANN M. KEOHANE, GERALD F. MCBREARTY, JESSICA C. MURILLO, JOHNNY M. SHIEH
-
Patent number: 9292678Abstract: A mechanism is provided for unlocking a locked computing device based on a knowledge of a user. Responsive to detecting an intent to utilize the locked computing device, a subset of the images is randomly selecting in an identified tag category from a plurality of tagged images, the subset of images comprising a plurality of tags in the identified tag category. An order in which the user must gesture to the plurality of tags in the subset of images is randomly selected. The subset of images and the order in which the user must gesture to the plurality of tags in the subset of images to the user is presented to the user. Responsive to the user gesturing to a subset of tags in the subset of images in the selected order, the locked computing device is unlocked.Type: GrantFiled: March 19, 2014Date of Patent: March 22, 2016Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20160034717Abstract: An approach is provided in which an information handling system identifies areas of sensitive content in a digital image that is intended to be sent to a recipient. The information handling system retrieves rules corresponding to both the intended recipient and the sensitive content, and modifies the digital image based upon the identified rules. The modification of the digital image includes protecting the sensitive content, such as blurring a person's face on the digital image. In turn, the information handling system sends the modified digital image to the intended first recipient.Type: ApplicationFiled: July 30, 2014Publication date: February 4, 2016Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20150319145Abstract: Provided are techniques to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spooling LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to Whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending as heartbeat that is designed to fail unless the heartbeat is received by as spooling device.Type: ApplicationFiled: July 15, 2015Publication date: November 5, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 9148395Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.Type: GrantFiled: March 12, 2013Date of Patent: September 29, 2015Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
-
Publication number: 20150269376Abstract: A mechanism is provided for unlocking a locked computing device based on a knowledge of a user. Responsive to detecting an intent to utilize the locked computing device, a subset of the images is randomly selecting in an identified tag category from a plurality of tagged images, the subset of images comprising a plurality of tags in the identified tag category. An order in which the user must gesture to the plurality of tags in the subset of images is randomly selected. The subset of images and the order in which the user must gesture to the plurality of tags in the subset of images to the user is presented to the user. Responsive to the user gesturing to a subset of tags in the subset of images in the selected order, the locked computing device is unlocked.Type: ApplicationFiled: March 19, 2014Publication date: September 24, 2015Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 9130987Abstract: Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.Type: GrantFiled: May 8, 2012Date of Patent: September 8, 2015Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh