Patents by Inventor Susann M. Keohane

Susann M. Keohane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9473513
    Abstract: In one embodiment, a computer-implemented method includes, in response to an attempt by a user to perform a transaction using a computing device, accessing a communication device connected to the computing device. A presence of one or more nearby devices, with respect to the computing device, is detected through use of the communication device connected to the computing device. A mapping of nearby devices to trust levels may be applied to the one or more nearby devices. In the mapping, each group of one or more nearby devices maps to a trust level of two or more trust levels. An assigned trust level for the transaction is determined, by a computer processor, based on applying the mapping of nearby devices to trust levels. The mapping of nearby devices to trust levels is modified based on the one or more nearby devices detected. The modified mapping is used for future transactions.
    Type: Grant
    Filed: June 22, 2015
    Date of Patent: October 18, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Louis T. Fuka, Susann M. Keohane, James R. Kraemer
  • Patent number: 9472241
    Abstract: Each data integrity value, from among a plurality of data integrity values each associated with a separate unit of a program comprising a plurality of units, is checked against a separate recorded portion of a recording of the program corresponding to one of the plurality of units, wherein the recording of the program is recorded from a broadcast of the program. Responsive to a particular data integrity value from among the plurality of data integrity values not matching when checked against a particular separate recorded portion of the program corresponding to a particular unit from among the plurality of units, the recording is corrected by replacing only the particular separate recorded portion of the program from a second recording of only the particular unit from a subsequent broadcast of the program.
    Type: Grant
    Filed: September 9, 2013
    Date of Patent: October 18, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9460599
    Abstract: A school perimeter security system includes a registry database including: registered student mobile device identifiers, registered non-student mobile device identifiers, and a matching of students with authorized non-students with whom the students are permitted to be paired with near the perimeter. At least three beacon devices are located within the school's perimeter, positioned to establish a boundary area near the perimeter, detect and establish communication with mobile devices entering the boundary area, obtain an identifier from each mobile device that enters the boundary area, and facilitate tracking of all mobile devices within the boundary area. The processor and beacon devices interact to identify every mobile device entering the boundary area, track their location within the boundary area, compare the identified mobile devices with identifiers in the registry database and, transmit an alert notice when a condition is satisfied but not transmit that alert when a different condition is satisfied.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: October 4, 2016
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Johnny M. Shieh
  • Publication number: 20160285825
    Abstract: According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention System (HIPS) is provided. The method may include receiving a trusted connection table from the HIPS, wherein the trusted connection table contains a plurality of trusted connection information. The method may also include receiving a network packet from a virtual switch, wherein the network packet has a plurality of connection information. The method may then include determining if the plurality of connection information matches the plurality of trusted connection information. The method may further include sending the network packet to a destination based on determining that the plurality of connection information matches the plurality of trusted connection information.
    Type: Application
    Filed: June 11, 2015
    Publication date: September 29, 2016
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20160285828
    Abstract: According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention System (HIPS) is provided. The method may include receiving a trusted connection table from the HIPS, wherein the trusted connection table contains a plurality of trusted connection information. The method may also include receiving a network packet from a virtual switch, wherein the network packet has a plurality of connection information. The method may then include determining if the plurality of connection information matches the plurality of trusted connection information. The method may further include sending the network packet to a destination based on determining that the plurality of connection information matches the plurality of trusted connection information.
    Type: Application
    Filed: March 26, 2015
    Publication date: September 29, 2016
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9424725
    Abstract: A school perimeter security system includes a registry database. The registry database includes: registered student mobile device identifiers, registered non-student mobile device identifiers, and a matching of students with authorized non-students with whom the students are permitted to be paired with near the perimeter. At least three beacon devices are located within the school perimeter, positioned to establish a boundary area near the perimeter, detect and establish communication with mobile devices entering the boundary area, obtain an identifier from each mobile device that enters the boundary area, and facilitate trilateration of all mobile devices within the boundary area. The processor and beacon devices cooperatively interact to identify every mobile device entering the boundary area, track the location of every mobile device within the boundary area, compare the identified mobile devices with identifiers in the registry database and, transmit an alert notice when a condition is satisfied.
    Type: Grant
    Filed: January 4, 2016
    Date of Patent: August 23, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Shawn P. Mullen, Johnny M. Shieh
  • Publication number: 20160224957
    Abstract: A system for transferring digital rights managed (DRM) files from a first seller device to a buyer device involves a buyer device configured to receive a file package having the DRM file. Some file packages may also have a DRM file access key. The system also has a first seller device having the DRM file stored thereon and configured to receive a request to purchase the DRM file (the request having a DRM file identifier); receive a buyer identifier associated with the request; transfer the file package to a buyer device to the buyer device; detect through a network connection, a digital rights management server; and send, responsive to detecting the digital rights management server, a sale record to the digital rights management server, where the sale record includes the DRM file identifier and the buyer identifier.
    Type: Application
    Filed: March 30, 2016
    Publication date: August 4, 2016
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20160224956
    Abstract: A system for transferring digital rights managed (DRM) files from a first seller device to a buyer device involves a buyer device configured to receive a file package having the DRM file. Some file packages may also have a DRM file access key. The system also has a first seller device having the DRM file stored thereon and configured to receive a request to purchase the DRM file (the request having a DRM file identifier); receive a buyer identifier associated with the request; transfer the file package to a buyer device to the buyer device; detect through a network connection, a digital rights management server; and send, responsive to detecting the digital rights management server, a sale record to the digital rights management server, where the sale record includes the DRM file identifier and the buyer identifier.
    Type: Application
    Filed: January 29, 2015
    Publication date: August 4, 2016
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20160217219
    Abstract: In one embodiment, a computer-implemented method includes, in response to an attempt by a user to perform a transaction using a computing device, accessing a communication device connected to the computing device. A presence of one or more nearby devices, with respect to the computing device, is detected through use of the communication device connected to the computing device. A mapping of nearby devices to trust levels may be applied to the one or more nearby devices. In the mapping, each group of one or more nearby devices maps to a trust level of two or more trust levels. An assigned trust level for the transaction is determined, by a computer processor, based on applying the mapping of nearby devices to trust levels. The mapping of nearby devices to trust levels is modified based on the one or more nearby devices detected. The modified mapping is used for future transactions.
    Type: Application
    Filed: June 22, 2015
    Publication date: July 28, 2016
    Inventors: Louis T. Fuka, Susann M. Keohane, James R. Kraemer
  • Publication number: 20160191540
    Abstract: In one embodiment, a computer-implemented method includes, in response to an attempt by a user to perform a transaction using a computing device, accessing a communication device connected to the computing device. A presence of one or more nearby devices, with respect to the computing device, is detected through use of the communication device connected to the computing device. A mapping of nearby devices to trust levels may be applied to the one or more nearby devices. In the mapping, each group of one or more nearby devices maps to a trust level of two or more trust levels. An assigned trust level for the transaction is determined, by a computer processor, based on applying the mapping of nearby devices to trust levels. The mapping of nearby devices to trust levels is modified based on the one or more nearby devices detected. The modified mapping is used for future transactions.
    Type: Application
    Filed: December 30, 2014
    Publication date: June 30, 2016
    Inventors: Louis T. Fuka, Susann M. Keohane, James R. Kraemer
  • Patent number: 9372933
    Abstract: A mechanism is provided in a data processing system for personalized quantitative measure of accessibility. For a given web site or web application, the mechanism accesses existing crowd sourced user ratings. The mechanism generates a crowd source score for the given web site or web application based on the crowd sourced user ratings. The mechanism generates a compliance score for the given web site or web application based on compliance data published for the given web site or web application. The mechanism obtains a static analysis score for the given web site or web application. The mechanism generates weights for a given user based on user profile information of the given user and applies the weights to the crowd source score, the compliance score, and the static analysis score to form weighted data. The mechanism generates a personalized accessibility score based on the weighted data.
    Type: Grant
    Filed: November 6, 2013
    Date of Patent: June 21, 2016
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Maureen E. Kraft, Holly L. Nielsen, Shunguo Yan
  • Patent number: 9336403
    Abstract: A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a plurality of users, wherein decryption of the encrypted restricted tag element is limited to a selection of at least one user from among the plurality of users. The computer outputs the plurality of content elements for electronic publication through an interface accessible to the plurality of users, wherein the plurality of users are enabled to access the plurality of content elements of the message published through the interface, wherein only the selection of at least one user is enabled to decrypt the encrypted restricted tag element in the plurality of content elements to access the underlying restricted tag element within the message published through the interface.
    Type: Grant
    Filed: November 26, 2013
    Date of Patent: May 10, 2016
    Assignee: GLOBALFOUNDRIES Inc.
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9319364
    Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.
    Type: Grant
    Filed: November 14, 2013
    Date of Patent: April 19, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
  • Publication number: 20160085983
    Abstract: A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a plurality of users, wherein decryption of the encrypted restricted tag element is limited to a selection of at least one user from among the plurality of users. The computer outputs the plurality of content elements for electronic publication through an interface accessible to the plurality of users, wherein the plurality of users are enabled to access the plurality of content elements of the message published through the interface, wherein only the selection of at least one user is enabled to decrypt the encrypted restricted tag element in the plurality of content elements to access the underlying restricted tag element within the message published through the interface.
    Type: Application
    Filed: November 30, 2015
    Publication date: March 24, 2016
    Inventors: SUSANN M. KEOHANE, GERALD F. MCBREARTY, JESSICA C. MURILLO, JOHNNY M. SHIEH
  • Patent number: 9292678
    Abstract: A mechanism is provided for unlocking a locked computing device based on a knowledge of a user. Responsive to detecting an intent to utilize the locked computing device, a subset of the images is randomly selecting in an identified tag category from a plurality of tagged images, the subset of images comprising a plurality of tags in the identified tag category. An order in which the user must gesture to the plurality of tags in the subset of images is randomly selected. The subset of images and the order in which the user must gesture to the plurality of tags in the subset of images to the user is presented to the user. Responsive to the user gesturing to a subset of tags in the subset of images in the selected order, the locked computing device is unlocked.
    Type: Grant
    Filed: March 19, 2014
    Date of Patent: March 22, 2016
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20160034717
    Abstract: An approach is provided in which an information handling system identifies areas of sensitive content in a digital image that is intended to be sent to a recipient. The information handling system retrieves rules corresponding to both the intended recipient and the sensitive content, and modifies the digital image based upon the identified rules. The modification of the digital image includes protecting the sensitive content, such as blurring a person's face on the digital image. In turn, the information handling system sends the modified digital image to the intended first recipient.
    Type: Application
    Filed: July 30, 2014
    Publication date: February 4, 2016
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20150319145
    Abstract: Provided are techniques to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spooling LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to Whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending as heartbeat that is designed to fail unless the heartbeat is received by as spooling device.
    Type: Application
    Filed: July 15, 2015
    Publication date: November 5, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9148395
    Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: September 29, 2015
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
  • Publication number: 20150269376
    Abstract: A mechanism is provided for unlocking a locked computing device based on a knowledge of a user. Responsive to detecting an intent to utilize the locked computing device, a subset of the images is randomly selecting in an identified tag category from a plurality of tagged images, the subset of images comprising a plurality of tags in the identified tag category. An order in which the user must gesture to the plurality of tags in the subset of images is randomly selected. The subset of images and the order in which the user must gesture to the plurality of tags in the subset of images to the user is presented to the user. Responsive to the user gesturing to a subset of tags in the subset of images in the selected order, the locked computing device is unlocked.
    Type: Application
    Filed: March 19, 2014
    Publication date: September 24, 2015
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9130987
    Abstract: Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.
    Type: Grant
    Filed: May 8, 2012
    Date of Patent: September 8, 2015
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh