Patents by Inventor William J. O'Donnell

William J. O'Donnell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10740759
    Abstract: According to one exemplary embodiment, a method for dynamic generation of payment token ratings is provided. The method includes receiving a token request, whereby the token request includes a plurality of metadata. The method also includes analyzing the received plurality of metadata based on at least one predefined rule set. The method further includes generating a token in response to receiving the token request. The method then includes determining an assurance rating for the generated token based on the analyzed received plurality of metadata, whereby the assurance rating indicates a risk of fraud associated with the generated token. The method finally includes assigning a token rating to the generated token based on the determined assurance rating.
    Type: Grant
    Filed: December 11, 2015
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Arthur L. De Magalhaes, Nitin Gaur, Wu Ning, William J. O'Donnell
  • Patent number: 10733609
    Abstract: According to one exemplary embodiment, a method for dynamic generation of payment token ratings is provided. The method includes receiving a token request, whereby the token request includes a plurality of metadata. The method also includes analyzing the received plurality of metadata based on at least one predefined rule set. The method further includes generating a token in response to receiving the token request. The method then includes determining an assurance rating for the generated token based on the analyzed received plurality of metadata, whereby the assurance rating indicates a risk of fraud associated with the generated token. The method finally includes assigning a token rating to the generated token based on the determined assurance rating.
    Type: Grant
    Filed: April 27, 2016
    Date of Patent: August 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Arthur L. De Magalhaes, Nitin Gaur, Wu Ning, William J. O'Donnell
  • Patent number: 10218692
    Abstract: Various embodiments are directed to a computer-implemented method for displaying a map of certificate relationships. A method can include retrieving certificate information for two or more servers and storing the retrieved certificate information in a memory. In addition, the method can include receiving a command to generate a map of certificate relationships. The command includes a command scope that identifies at least a first server of the two or more servers. Further, the method can include generating the map from the retrieved certificate information and rendering the map on a display device. The map includes the first server and a device having a certificate relationship with the first server.
    Type: Grant
    Filed: August 21, 2014
    Date of Patent: February 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Robert A. Gibson, J. Peter Neergaard, William J. O'Donnell
  • Patent number: 10218693
    Abstract: Various embodiments are directed to a computer-implemented method for displaying a map of certificate relationships. A method can include retrieving certificate information for two or more servers and storing the retrieved certificate information in a memory. In addition, the method can include receiving a command to generate a map of certificate relationships. The command includes a command scope that identifies at least a first server of the two or more servers. Further, the method can include generating the map from the retrieved certificate information and rendering the map on a display device. The map includes the first server and a device having a certificate relationship with the first server.
    Type: Grant
    Filed: September 3, 2015
    Date of Patent: February 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Robert A. Gibson, J. Peter Neergaard, William J. O'Donnell
  • Publication number: 20170169430
    Abstract: According to one exemplary embodiment, a method for dynamic generation of payment token ratings is provided. The method includes receiving a token request, whereby the token request includes a plurality of metadata. The method also includes analyzing the received plurality of metadata based on at least one predefined rule set. The method further includes generating a token in response to receiving the token request. The method then includes determining an assurance rating for the generated token based on the analyzed received plurality of metadata, whereby the assurance rating indicates a risk of fraud associated with the generated token. The method finally includes assigning a token rating to the generated token based on the determined assurance rating.
    Type: Application
    Filed: December 11, 2015
    Publication date: June 15, 2017
    Inventors: Arthur L. De Magalhaes, Nitin Gaur, Wu Ning, William J. O'Donnell
  • Publication number: 20170169433
    Abstract: According to one exemplary embodiment, a method for dynamic generation of payment token ratings is provided. The method includes receiving a token request, whereby the token request includes a plurality of metadata. The method also includes analyzing the received plurality of metadata based on at least one predefined rule set. The method further includes generating a token in response to receiving the token request. The method then includes determining an assurance rating for the generated token based on the analyzed received plurality of metadata, whereby the assurance rating indicates a risk of fraud associated with the generated token. The method finally includes assigning a token rating to the generated token based on the determined assurance rating.
    Type: Application
    Filed: April 27, 2016
    Publication date: June 15, 2017
    Inventors: Arthur L. De Magalhaes, Nitin Gaur, Wu Ning, William J. O'Donnell
  • Publication number: 20170083906
    Abstract: Embodiments relate to token assurance level based transaction processing. An aspect includes receiving, from a requester by a tokenization server in an electronic payment system, a request for de-tokenization of a token corresponding to a transaction. Another aspect includes determining a token assurance level of the token. Another aspect includes based on the token assurance level of the token; assigning a quality of service to the transaction. Yet another aspect includes performing the de-tokenization based on the assigned quality of service and returning an account number corresponding to the token to the requester.
    Type: Application
    Filed: September 21, 2015
    Publication date: March 23, 2017
    Inventors: Nitin Gaur, William J. O'Donnell
  • Patent number: 9582407
    Abstract: Mechanisms are provided for performing security role definition testing. An application is received in a container of a runtime environment of the data processing system. The application has methods and security role definitions associated with the methods. A properties object, which specifies a user identifier to security role mapping, is received in the container. A test application is executed, in the container, by the processor, on an execution of the methods of the application based on the user identifier to security role mapping and the security role definitions. The test application tests an operation of the application with regard to the security role definitions. A result of the execution of the test application on the execution of the methods of the application is then output.
    Type: Grant
    Filed: February 25, 2011
    Date of Patent: February 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Paul W. Bennett, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
  • Patent number: 9276869
    Abstract: An identity provider (IdP) discovery service operative at a service provider (SP) is described. In operation, and as valid requests are received by the SP via normal IdP-initiated flows, the SP builds-up knowledge about the relationship between the IdP (that redirected the request) and the initiator of the request. The IdP instance typically is inferred from an HTTP referrer field, and information about the initiator may be ascertained from client-specific information, such as client system IP address, client DNS domain, a domain of a user e-mail address, a target URL for the incoming request, or the value associated with a particular HTTP header field. This knowledge is maintained in one or more mapping table(s) that associate request attributes-to-IdP instance data. The mappings are then used to facilitate IdP discovery for a new incoming request to the SP that has been determined to originate from other than an IdP.
    Type: Grant
    Filed: January 2, 2013
    Date of Patent: March 1, 2016
    Assignee: International Business Machines Corporation
    Inventors: William D. Dodd, William J. O'Donnell, Eduardo N. Spring, Chunlong Liang
  • Publication number: 20160057132
    Abstract: Various embodiments are directed to a computer-implemented method for displaying a map of certificate relationships. A method can include retrieving certificate information for two or more servers and storing the retrieved certificate information in a memory. In addition, the method can include receiving a command to generate a map of certificate relationships. The command includes a command scope that identifies at least a first server of the two or more servers. Further, the method can include generating the map from the retrieved certificate information and rendering the map on a display device. The map includes the first server and a device having a certificate relationship with the first server.
    Type: Application
    Filed: August 21, 2014
    Publication date: February 25, 2016
    Inventors: Robert A. Gibson, J. Peter Neergaard, William J. O'Donnell
  • Publication number: 20160056965
    Abstract: Various embodiments are directed to a computer-implemented method for displaying a map of certificate relationships. A method can include retrieving certificate information for two or more servers and storing the retrieved certificate information in a memory. In addition, the method can include receiving a command to generate a map of certificate relationships. The command includes a command scope that identifies at least a first server of the two or more servers. Further, the method can include generating the map from the retrieved certificate information and rendering the map on a display device. The map includes the first server and a device having a certificate relationship with the first server.
    Type: Application
    Filed: September 3, 2015
    Publication date: February 25, 2016
    Inventors: Robert A. Gibson, J. Peter Neergaard, William J. O'Donnell
  • Patent number: 9147062
    Abstract: A method, data processing system, and computer program product for managing user identification information. A determination is made whether an instance of security information in use on the first application server and referenced by a token that has expired was generated by an application server compatible with a first application server in response to receiving the token. A determination is made whether the instance of the security information is managed by a set of rules for a group of users of the first application server. A determination is made whether a user identifier from the token is authorized to access the first application server. The token is renewed in response to determining that the user identifier is authorized to access the first application server.
    Type: Grant
    Filed: June 29, 2011
    Date of Patent: September 29, 2015
    Assignee: International Business Machines Corporation
    Inventors: Paul W. Bennett, Christopher M. Dettlaff, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
  • Patent number: 8955052
    Abstract: A method, system and computer-usable medium are disclosed for managing identity authorizations to access information processing system resources. An application thread requiring access to target resources is initiated and associated with an authenticated client identity and a server identity. The resource authorization attribute of a resource required for execution of the application thread designates the use of a client identity, a server identity, or a client identity and server identity when attempting authorized access of the resource. The client identity, the server identity, or the client identity and server identity is then respectively used to access the target resource and the application thread is executed.
    Type: Grant
    Filed: May 27, 2010
    Date of Patent: February 10, 2015
    Assignee: International Business Machines Corporation
    Inventors: William J. O'Donnell, Elisa Ferracane, Paul W. Bennett, Michael C. Thompson
  • Patent number: 8938791
    Abstract: A method for dynamically assigning a displayable realm name begins upon receipt of an authentication request to an application, such as a web application, being executed by an application server. In response, a determination is made whether an application realm name has been set in a configuration file associated with the application. If not, a custom display property is then evaluated. If the custom display property is set true, a realm name associated with an active authentication mechanism is retrieved and provided for display in an authentication panel. If the custom display property is set false, a default string is provided for display in the authentication panel. In this manner, an application server administrator can control what realm name is displayed to an end user in the event an application developer has not specified the realm name in the application configuration.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: January 20, 2015
    Assignee: International Business Machines Corporation
    Inventors: William J. O'Donnell, Paul William Bennett, Elisa Ferracane, Ajay Reddy Karkala, Ut Van Le, Michael Craig Thompson
  • Publication number: 20140165194
    Abstract: Protection against an attack which exploits an eXtensible Markup Language (XML) Encryption vulnerability includes receiving a ciphertext request utilizing an EncryptedKey element and detecting either a failure to decrypt the cipher value in the EncryptedData element or a failure to parse the resulting decrypted XML. Upon detecting the failure, a count of failures associated with the EncryptedKey element is incremented, and when the count exceeds a threshold number of failures, subsequent usage of the EncryptedKey element and delivery of the request to an application service are prevented. Optionally, a rejection message is returned to the requester.
    Type: Application
    Filed: December 6, 2012
    Publication date: June 12, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: William Durward Dodd, Chunlong Liang, William J O'Donnell, Eduardo N Spring
  • Patent number: 8707405
    Abstract: A method for selectively refreshing group membership for an identifier associated with an authenticated user. The identifier represents an application server security context, and it is generated to enable a user credential associated with the authenticated user to be persisted. Following such authentication, the client is provided with a time-bounded, renewable security token. The method begins by configuring an option whether group membership information is refreshed during renewal of an expired security token. During renewal of an expired security token, the method determines whether the option is set. If so, an attempt is made to refresh information. This attempt performs a set of checks to verify certain conditions. If these checks are valid, the identifier is refreshed and the security token renewed with updated group membership information. If any check is not valid, the identifier is refreshed and the security token renewed with existing information.
    Type: Grant
    Filed: January 11, 2012
    Date of Patent: April 22, 2014
    Assignee: International Business Machines Corporation
    Inventors: William J. O'Donnell, Paul William Bennett, Elisa Ferracane, Michael Craig Thompson, Michael Dettlaff Christopher
  • Patent number: 8645679
    Abstract: A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints.
    Type: Grant
    Filed: June 17, 2011
    Date of Patent: February 4, 2014
    Assignee: International Business Machines Corporation
    Inventors: Elisa Ferracane, Paul William Bennett, William J. O'Donnell, Ajay Reddy Karkala, Ut Van Le, Michael Craig Thompson, Maxim Avery Moldenhauer
  • Publication number: 20130179952
    Abstract: A method for selectively refreshing group membership for an identifier associated with an authenticated user. The identifier represents an application server security context, and it is generated to enable a user credential associated with the authenticated user to be persisted. Following such authentication, the client is provided with a time-bounded, renewable security token. The method begins by configuring an option whether group membership information is refreshed during renewal of an expired security token. During renewal of an expired security token, the method determines whether the option is set. If so, an attempt is made to refresh information. This attempt performs a set of checks to verify certain conditions. If these checks are valid, the identifier is refreshed and the security token renewed with updated group membership information. If any check is not valid, the identifier is refreshed and the security token renewed with existing information.
    Type: Application
    Filed: January 11, 2012
    Publication date: July 11, 2013
    Applicant: International Business Machines Corporation
    Inventors: William J. O'Donnell, Paul William Bennett, Elisa Ferracane, Michael Craig Thompson, Christopher Michael Dettlaff
  • Publication number: 20130007856
    Abstract: A method, data processing system, and computer program product for managing user identification information. A determination is made whether an instance of security information in use on the first application server and referenced by a token that has expired was generated by an application server compatible with a first application server in response to receiving the token. A determination is made whether the instance of the security information is managed by a set of rules for a group of users of the first application server. A determination is made whether a user identifier from the token is authorized to access the first application server. The token is renewed in response to determining that the user identifier is authorized to access the first application server.
    Type: Application
    Filed: June 29, 2011
    Publication date: January 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul W. Bennett, Christopher M. Dettlaff, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
  • Publication number: 20120324528
    Abstract: A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints.
    Type: Application
    Filed: June 17, 2011
    Publication date: December 20, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Elisa Ferracane, Paul William Bennett, William J. O'Donnell, Ajay Reddy Karkala, Ut Van Le, Michael Craig Thompson, Maxim Avery Moldenhauer