Patents by Inventor Barbara J. Bryant

Barbara J. Bryant has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10684844
    Abstract: A methodology for creating and using information identifying what and how software and/or firmware modules are used in computer systems, called functional exploitation data. The functional exploitation data can be used to identify what modules should be updated and how updates should be implemented. The functional exploitation data can also be used to identify other computer systems as candidates for updates based on similarity to computer systems that have reported problems, and propose implementing similar updates on the candidates. Functional exploitation data can also be used to identify under-utilized modules for enhancements or greater advocacy. The functional exploitation data can be implemented in the form of a concatenated string.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: June 16, 2020
    Assignee: International Business Machines Corporation
    Inventors: Scott B. Compton, William J. Rooney, Dale F. Riedy, Barbara J. Bryant, David H. Surman
  • Publication number: 20190163464
    Abstract: A methodology for creating and using information identifying what and how software and/or firmware modules are used in computer systems, called functional exploitation data. The functional exploitation data can be used to identify what modules should be updated and how updates should be implemented. The functional exploitation data can also be used to identify other computer systems as candidates for updates based on similarity to computer systems that have reported problems, and propose implementing similar updates on the candidates. Functional exploitation data can also be used to identify under-utilized modules for enhancements or greater advocacy. The functional exploitation data can be implemented in the form of a concatenated string.
    Type: Application
    Filed: November 30, 2017
    Publication date: May 30, 2019
    Inventors: Scott B. Compton, William J. Rooney, Dale F. Riedy, Barbara J. Bryant, David H. Surman
  • Patent number: 9710656
    Abstract: A method for providing security vulnerability information is provided. The method may include checking for the security vulnerability information product supplier servers. The method may further include sending alerts to a security vulnerability administrator associated with a client environment. Additionally, the method may include performing a security check on the security vulnerability administrator to authorize the security vulnerability administrator to receive the security vulnerability information. The method may also include authenticating customers associated with the client environment to authorize the customers to receive the security vulnerability information. The method may further include prompting the authorized security vulnerability administrator to acknowledge an information confidentiality reminder. The method may also include sending an audit record to the product supplier server.
    Type: Grant
    Filed: October 20, 2016
    Date of Patent: July 18, 2017
    Assignee: International Business Machines Corporation
    Inventors: Margaret M. Bennett, Barbara J. Bryant, William E. Spencer
  • Patent number: 9710655
    Abstract: A method for providing security vulnerability information is provided. The method may include checking for the security vulnerability information product supplier servers. The method may further include sending alerts to a security vulnerability administrator associated with a client environment. Additionally, the method may include performing a security check on the security vulnerability administrator to authorize the security vulnerability administrator to receive the security vulnerability information. The method may also include authenticating customers associated with the client environment to authorize the customers to receive the security vulnerability information. The method may further include prompting the authorized security vulnerability administrator to acknowledge an information confidentiality reminder. The method may also include sending an audit record to the product supplier server.
    Type: Grant
    Filed: October 20, 2016
    Date of Patent: July 18, 2017
    Assignee: International Business Machines Corporation
    Inventors: Margaret M. Bennett, Barbara J. Bryant, William E. Spencer
  • Publication number: 20170147824
    Abstract: A method for providing security vulnerability information is provided. The method may include checking for the security vulnerability information product supplier servers. The method may further include sending alerts to a security vulnerability administrator associated with a client environment. Additionally, the method may include performing a security check on the security vulnerability administrator to authorize the security vulnerability administrator to receive the security vulnerability information. The method may also include authenticating customers associated with the client environment to authorize the customers to receive the security vulnerability information. The method may further include prompting the authorized security vulnerability administrator to acknowledge an information confidentiality reminder. The method may also include sending an audit record to the product supplier server.
    Type: Application
    Filed: October 20, 2016
    Publication date: May 25, 2017
    Inventors: Margaret M. Bennett, Barbara J. Bryant, William E. Spencer
  • Publication number: 20170147823
    Abstract: A method for providing security vulnerability information is provided. The method may include checking for the security vulnerability information product supplier servers. The method may further include sending alerts to a security vulnerability administrator associated with a client environment. Additionally, the method may include performing a security check on the security vulnerability administrator to authorize the security vulnerability administrator to receive the security vulnerability information. The method may also include authenticating customers associated with the client environment to authorize the customers to receive the security vulnerability information. The method may further include prompting the authorized security vulnerability administrator to acknowledge an information confidentiality reminder. The method may also include sending an audit record to the product supplier server.
    Type: Application
    Filed: October 20, 2016
    Publication date: May 25, 2017
    Inventors: Margaret M. Bennett, Barbara J. Bryant, William E. Spencer
  • Patent number: 9584538
    Abstract: A method for providing security vulnerability information is provided. The method may include checking for the security vulnerability information product supplier servers. The method may further include sending alerts to a security vulnerability administrator associated with a client environment. Additionally, the method may include performing a security check on the security vulnerability administrator to authorize the security vulnerability administrator to receive the security vulnerability information. The method may also include authenticating customers associated with the client environment to authorize the customers to receive the security vulnerability information. The method may further include prompting the authorized security vulnerability administrator to acknowledge an information confidentiality reminder. The method may also include sending an audit record to the product supplier server.
    Type: Grant
    Filed: November 24, 2015
    Date of Patent: February 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Margaret M. Bennett, Barbara J. Bryant, William E. Spencer
  • Patent number: 9531728
    Abstract: A method for providing security vulnerability information is provided. The method may include checking for the security vulnerability information product supplier servers. The method may further include sending alerts to a security vulnerability administrator associated with a client environment. Additionally, the method may include performing a security check on the security vulnerability administrator to authorize the security vulnerability administrator to receive the security vulnerability information. The method may also include authenticating customers associated with the client environment to authorize the customers to receive the security vulnerability information. The method may further include prompting the authorized security vulnerability administrator to acknowledge an information confidentiality reminder. The method may also include sending an audit record to the product supplier server.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: December 27, 2016
    Assignee: International Business Machines Corporation
    Inventors: Margaret M. Bennett, Barbara J. Bryant, William E. Spencer
  • Patent number: 8762783
    Abstract: A method of identifying errors in a computing system operation is provided and includes identifying that a certain record of interest in system trace information has a number of entries that exceeds a predefined number and inferring from the excessive number of entries that a work unit associated with the certain record of interest is affected by an error.
    Type: Grant
    Filed: June 24, 2010
    Date of Patent: June 24, 2014
    Assignee: International Business Machines Corporation
    Inventors: Robert M. Abrams, Barbara J. Bryant, Donald T. Durand, Ming-Yin Ng
  • Patent number: 8291382
    Abstract: A computer-implemented method, system, and computer program product for assessing environment specific maintenance actions are provided. The method includes identifying a maintenance update for a specific environment including one or more computer systems, where the maintenance update addresses one or more known problems. The method also includes applying factors to determine an assessment index for the one or more known problems as a function of the specific environment. The assessment index indicates a level of installation criticality relative to the specific environment. The method further includes outputting an installation recommendation for the identified maintenance update in response to determining the assessment index.
    Type: Grant
    Filed: July 22, 2008
    Date of Patent: October 16, 2012
    Assignee: International Business Machines Corporation
    Inventors: Barbara J. Bryant, Nicole M. Fagen, William E. Spencer
  • Publication number: 20110320873
    Abstract: A method of identifying errors in a computing system operation is provided and includes identifying that a certain record of interest in system trace information has a number of entries that exceeds a predefined number and inferring from the excessive number of entries that a work unit associated with the certain record of interest is affected by an error.
    Type: Application
    Filed: June 24, 2010
    Publication date: December 29, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert M. Abrams, Barbara J. Bryant, Donald T. Durand, Ming-Yin Ng
  • Publication number: 20100023933
    Abstract: A computer-implemented method, system, and computer program product for assessing environment specific maintenance actions are provided. The method includes identifying a maintenance update for a specific environment including one or more computer systems, where the maintenance update addresses one or more known problems. The method also includes applying factors to determine an assessment index for the one or more known problems as a function of the specific environment. The assessment index indicates a level of installation criticality relative to the specific environment. The method further includes outputting an installation recommendation for the identified maintenance update in response to determining the assessment index.
    Type: Application
    Filed: July 22, 2008
    Publication date: January 28, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Barbara J. Bryant, Nicole M. Fagen, William E. Spencer
  • Patent number: 5628023
    Abstract: A virtual storage computer system having token controlled storage protection. The computer system includes a processor, a real storage, and a virtual storage containing a user space and a system space. A virtual storage area in the user space provides a protected view of one or more pages of memory located in the real storage. A virtual storage area in the system space provides a token-accessible view of the corresponding pages of memory. To protect the pages of memory, a user program first requests that token controlled protection be provided via the virtual address in the user space and that a corresponding user token be returned by the processor. The user program stores the user token for later use when accessing the protected pages. When the user program requests access to the protected pages, the processor matches the user token with a system token to obtain a token-accessible view in the system space of the protected pages.
    Type: Grant
    Filed: December 27, 1994
    Date of Patent: May 6, 1997
    Assignee: International Business Machines Corporation
    Inventors: Barbara J. Bryant, Glen E. Garrison, Danny R. Sutherland, Kenneth G. Rubsam
  • Patent number: 5619671
    Abstract: A token controlled page protection technique for use in a virtual memory computer system (99). Generally, this technique assigns a unique token (440) to each program when that program requests a protected page of memory. The token is also assigned to the protected page. This protected page of memory cannot be altered by any process, even the operating system, without presenting the correct token. Subsequently, the program may use the assigned token to access and alter the information stored within a protected page. However, to alter a protected page of memory, a token supplied by the program and a token associated with the protected page must match. In this manner, the protected page cannot be altered by any other programs other than the program having the correct token. Additionally, the program uses a special instruction to alter the protected page of memory such that the program associated with a protected page does not have to remove the page protection to alter the information within the protected page.
    Type: Grant
    Filed: January 31, 1996
    Date of Patent: April 8, 1997
    Assignee: International Business Machines Corporation
    Inventors: Barbara J. Bryant, Glen E. Garrison