Patents by Inventor Bret W. Dixon
Bret W. Dixon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180299965Abstract: Aspects of the present invention disclose a method, computer program product, and system for interpreting text entry for an input/output device. The method includes one or more processors receiving input from a set of sensors. The sensors are grouped in segments corresponding to a finger of a user. The method further includes one or more processors identifying input by a user of a gesture into a sensor of the set of sensors. The method further includes one or more sensors determining a first alphanumeric character that corresponds to the identified gesture input by the user. The method further includes one or more processes generating an input stream of alphanumeric characters, the input stream comprising the determined first alphanumeric character that corresponds to the identified gesture and one or more additional alphanumeric characters determined from identified gestures input by the user.Type: ApplicationFiled: February 27, 2018Publication date: October 18, 2018Inventors: AL CHAKRA, Bret W. Dixon, Timothy W. L. Koh
-
Publication number: 20180299964Abstract: Aspects of the present invention disclose a method, computer program product, and system for interpreting text entry for an input/output device. The method includes one or more processors receiving input from a set of sensors. The sensors are grouped in segments corresponding to a finger of a user. The method further includes one or more processors identifying input by a user of a gesture into a sensor of the set of sensors. The method further includes one or more sensors determining a first alphanumeric character that corresponds to the identified gesture input by the user. The method further includes one or more processes generating an input stream of alphanumeric characters, the input stream comprising the determined first alphanumeric character that corresponds to the identified gesture and one or more additional alphanumeric characters determined from identified gestures input by the user.Type: ApplicationFiled: December 18, 2017Publication date: October 18, 2018Inventors: Al Chakra, Bret W. Dixon, Timothy W. L. Koh
-
Publication number: 20180299961Abstract: Aspects of the present invention disclose a method, computer program product, and system for interpreting text entry for an input/output device. The method includes one or more processors receiving input from a set of sensors. The sensors are grouped in segments corresponding to a finger of a user. The method further includes one or more processors identifying input by a user of a gesture into a sensor of the set of sensors. The method further includes one or more sensors determining a first alphanumeric character that corresponds to the identified gesture input by the user. The method further includes one or more processes generating an input stream of alphanumeric characters, the input stream comprising the determined first alphanumeric character that corresponds to the identified gesture and one or more additional alphanumeric characters determined from identified gestures input by the user.Type: ApplicationFiled: April 18, 2017Publication date: October 18, 2018Inventors: Al Chakra, Bret W. Dixon, Timothy W. L. Koh
-
Patent number: 10095319Abstract: Aspects of the present invention disclose a method, computer program product, and system for interpreting text entry for an input/output device. The method includes one or more processors receiving input from a set of sensors. The sensors are grouped in segments corresponding to a finger of a user. The method further includes one or more processors identifying input by a user of a gesture into a sensor of the set of sensors. The method further includes one or more sensors determining a first alphanumeric character that corresponds to the identified gesture input by the user. The method further includes one or more processes generating an input stream of alphanumeric characters, the input stream comprising the determined first alphanumeric character that corresponds to the identified gesture and one or more additional alphanumeric characters determined from identified gestures input by the user.Type: GrantFiled: February 27, 2018Date of Patent: October 9, 2018Assignee: International Business Machines CorporationInventors: Al Chakra, Bret W. Dixon, Timothy W. L. Koh
-
Patent number: 10044837Abstract: A method for generating and distributing serialized tokens is provided. The method may include receiving a request from at least one client. The method may further include determining whether the received at least one request is a request for generating names and definitions for a group of serialized tokens, deleting a names and definitions, and/or receiving a group of serialized tokens. Additionally, the method may include enabling the at least one client to generate names and definitions for a group of serialized tokens. The method may also include storing the names and definitions on a server. The method may also include deleting the names and definitions from the server. The method may also include formatting and distributing serialized tokens based on the names and definitions for the serialized tokens. The method may further include sending a response to the client based on the received request.Type: GrantFiled: July 21, 2017Date of Patent: August 7, 2018Assignee: International Business Machines CorporationInventors: Bret W. Dixon, Benjamin T. Horwood
-
Publication number: 20180203999Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: ApplicationFiled: December 18, 2017Publication date: July 19, 2018Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20180203997Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: ApplicationFiled: January 19, 2017Publication date: July 19, 2018Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20180205723Abstract: Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection policy configured to process the message within the secure messaging environment is identified. The message protection policy specifies that, within the secure messaging environment, a secured digital certificate, other than a digital certificate of the message sender, is configured with an associated private key to digitally sign the message on behalf of the message sender. Based upon the message protection policy, a determination is made to digitally sign the message using the private key of the secured digital certificate. The message is signed on behalf of the message sender using the private key of the secured digital certificate.Type: ApplicationFiled: March 15, 2018Publication date: July 19, 2018Inventor: Bret W. Dixon
-
Publication number: 20180204000Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.Type: ApplicationFiled: February 6, 2018Publication date: July 19, 2018Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20180205724Abstract: Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection policy configured to process the message within the secure messaging environment is identified. The message protection policy specifies that, within the secure messaging environment, a secured digital certificate, other than a digital certificate of the message sender, is configured with an associated private key to digitally sign the message on behalf of the message sender. Based upon the message protection policy, a determination is made to digitally sign the message using the private key of the secured digital certificate. The message is signed on behalf of the message sender using the private key of the secured digital certificate.Type: ApplicationFiled: March 15, 2018Publication date: July 19, 2018Inventor: Bret W. Dixon
-
Patent number: 10001984Abstract: Embodiments of the present invention disclose a method, computer program product, and system for identifying software updates where a stack trace is received, the stack trace including a first set of metadata. An execution failure is determined to have occurred in the received stack trace, and in response, one or more software updates are received, the one or more software updates including a second set of metadata. One or more matching metadata in the first and second set of metadata is determined. A subset of software updates for display is generated, the subset of software updates being associated with matched metadata, and in response to receiving a selection input from a user, one or more software updates of the generated subset of software updates are executed.Type: GrantFiled: August 17, 2016Date of Patent: June 19, 2018Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 9948635Abstract: Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection policy configured to process the message within the secure messaging environment is identified. The message protection policy specifies that, within the secure messaging environment, a secured digital certificate, other than a digital certificate of the message sender, is configured with an associated private key to digitally sign the message on behalf of the message sender. Based upon the message protection policy, a determination is made to digitally sign the message using the private key of the secured digital certificate. The message is signed on behalf of the message sender using the private key of the secured digital certificate.Type: GrantFiled: January 14, 2017Date of Patent: April 17, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Bret W. Dixon
-
Patent number: 9948634Abstract: Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection policy configured to process the message within the secure messaging environment is identified. The message protection policy specifies that, within the secure messaging environment, a secured digital certificate, other than a digital certificate of the message sender, is configured with an associated private key to digitally sign the message on behalf of the message sender. Based upon the message protection policy, a determination is made to digitally sign the message using the private key of the secured digital certificate. The message is signed on behalf of the message sender using the private key of the secured digital certificate.Type: GrantFiled: January 14, 2017Date of Patent: April 17, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Bret W. Dixon
-
Publication number: 20180103493Abstract: A computer system and computer program product for generating a geographically-bound mobile ad hoc network identification. The computer system and computer program product may include receiving, by a processor, a mobile ad hoc network request. The computer system and computer program product may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The computer system and computer program product may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The computer system and computer program product may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.Type: ApplicationFiled: December 8, 2017Publication date: April 12, 2018Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20180103494Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.Type: ApplicationFiled: December 8, 2017Publication date: April 12, 2018Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 9930610Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.Type: GrantFiled: June 16, 2016Date of Patent: March 27, 2018Assignee: International Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Publication number: 20180052676Abstract: Embodiments of the present invention disclose a method, computer program product, and system for identifying software updates where a stack trace is received, the stack trace including a first set of metadata. An execution failure is determined to have occurred in the received stack trace, and in response, one or more software updates are received, the one or more software updates including a second set of metadata. One or more matching metadata in the first and second set of metadata is determined. A subset of software updates for display is generated, the subset of software updates being associated with matched metadata, and in response to receiving a selection input from a user, one or more software updates of the generated subset of software updates are executed.Type: ApplicationFiled: August 17, 2016Publication date: February 22, 2018Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 9854612Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.Type: GrantFiled: January 25, 2016Date of Patent: December 26, 2017Assignee: Internataionl Business Machines CorporationInventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
-
Patent number: 9848064Abstract: A method for generating and distributing serialized tokens is provided. The method may include receiving a request from at least one client. The method may further include determining whether the received at least one request is a request for generating names and definitions for a group of serialized tokens, deleting a names and definitions, and/or receiving a group of serialized tokens. Additionally, the method may include enabling the at least one client to generate names and definitions for a group of serialized tokens. The method may also include storing the names and definitions on a server. The method may also include deleting the names and definitions from the server. The method may also include formatting and distributing serialized tokens based on the names and definitions for the serialized tokens. The method may further include sending a response to the client based on the received request.Type: GrantFiled: November 5, 2015Date of Patent: December 19, 2017Assignee: International Business Machines CorporationInventors: Bret W. Dixon, Benjamin T. Horwood
-
Publication number: 20170344386Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.Type: ApplicationFiled: January 18, 2017Publication date: November 30, 2017Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell