Patents by Inventor Bret W. Dixon

Bret W. Dixon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180299965
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for interpreting text entry for an input/output device. The method includes one or more processors receiving input from a set of sensors. The sensors are grouped in segments corresponding to a finger of a user. The method further includes one or more processors identifying input by a user of a gesture into a sensor of the set of sensors. The method further includes one or more sensors determining a first alphanumeric character that corresponds to the identified gesture input by the user. The method further includes one or more processes generating an input stream of alphanumeric characters, the input stream comprising the determined first alphanumeric character that corresponds to the identified gesture and one or more additional alphanumeric characters determined from identified gestures input by the user.
    Type: Application
    Filed: February 27, 2018
    Publication date: October 18, 2018
    Inventors: AL CHAKRA, Bret W. Dixon, Timothy W. L. Koh
  • Publication number: 20180299964
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for interpreting text entry for an input/output device. The method includes one or more processors receiving input from a set of sensors. The sensors are grouped in segments corresponding to a finger of a user. The method further includes one or more processors identifying input by a user of a gesture into a sensor of the set of sensors. The method further includes one or more sensors determining a first alphanumeric character that corresponds to the identified gesture input by the user. The method further includes one or more processes generating an input stream of alphanumeric characters, the input stream comprising the determined first alphanumeric character that corresponds to the identified gesture and one or more additional alphanumeric characters determined from identified gestures input by the user.
    Type: Application
    Filed: December 18, 2017
    Publication date: October 18, 2018
    Inventors: Al Chakra, Bret W. Dixon, Timothy W. L. Koh
  • Publication number: 20180299961
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for interpreting text entry for an input/output device. The method includes one or more processors receiving input from a set of sensors. The sensors are grouped in segments corresponding to a finger of a user. The method further includes one or more processors identifying input by a user of a gesture into a sensor of the set of sensors. The method further includes one or more sensors determining a first alphanumeric character that corresponds to the identified gesture input by the user. The method further includes one or more processes generating an input stream of alphanumeric characters, the input stream comprising the determined first alphanumeric character that corresponds to the identified gesture and one or more additional alphanumeric characters determined from identified gestures input by the user.
    Type: Application
    Filed: April 18, 2017
    Publication date: October 18, 2018
    Inventors: Al Chakra, Bret W. Dixon, Timothy W. L. Koh
  • Patent number: 10095319
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for interpreting text entry for an input/output device. The method includes one or more processors receiving input from a set of sensors. The sensors are grouped in segments corresponding to a finger of a user. The method further includes one or more processors identifying input by a user of a gesture into a sensor of the set of sensors. The method further includes one or more sensors determining a first alphanumeric character that corresponds to the identified gesture input by the user. The method further includes one or more processes generating an input stream of alphanumeric characters, the input stream comprising the determined first alphanumeric character that corresponds to the identified gesture and one or more additional alphanumeric characters determined from identified gestures input by the user.
    Type: Grant
    Filed: February 27, 2018
    Date of Patent: October 9, 2018
    Assignee: International Business Machines Corporation
    Inventors: Al Chakra, Bret W. Dixon, Timothy W. L. Koh
  • Patent number: 10044837
    Abstract: A method for generating and distributing serialized tokens is provided. The method may include receiving a request from at least one client. The method may further include determining whether the received at least one request is a request for generating names and definitions for a group of serialized tokens, deleting a names and definitions, and/or receiving a group of serialized tokens. Additionally, the method may include enabling the at least one client to generate names and definitions for a group of serialized tokens. The method may also include storing the names and definitions on a server. The method may also include deleting the names and definitions from the server. The method may also include formatting and distributing serialized tokens based on the names and definitions for the serialized tokens. The method may further include sending a response to the client based on the received request.
    Type: Grant
    Filed: July 21, 2017
    Date of Patent: August 7, 2018
    Assignee: International Business Machines Corporation
    Inventors: Bret W. Dixon, Benjamin T. Horwood
  • Publication number: 20180203999
    Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.
    Type: Application
    Filed: December 18, 2017
    Publication date: July 19, 2018
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20180203997
    Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.
    Type: Application
    Filed: January 19, 2017
    Publication date: July 19, 2018
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20180205723
    Abstract: Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection policy configured to process the message within the secure messaging environment is identified. The message protection policy specifies that, within the secure messaging environment, a secured digital certificate, other than a digital certificate of the message sender, is configured with an associated private key to digitally sign the message on behalf of the message sender. Based upon the message protection policy, a determination is made to digitally sign the message using the private key of the secured digital certificate. The message is signed on behalf of the message sender using the private key of the secured digital certificate.
    Type: Application
    Filed: March 15, 2018
    Publication date: July 19, 2018
    Inventor: Bret W. Dixon
  • Publication number: 20180204000
    Abstract: A method for safeguarding a stored file from malware. In one embodiment, the method includes at least one computer processor receiving, to a storage system, a first file from a first computing device. The method further includes analyzing the received first file to determine whether the received first file is suspected of encryption by malware. The method further includes responding to determining that the received first file is suspected of encryption by malware, initiating one or more actions, including suspending replacement of an instance of the first file backed up to the storage system with the received first file. The method further includes storing the received first file to a portion of the storage system designated for file isolation.
    Type: Application
    Filed: February 6, 2018
    Publication date: July 19, 2018
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20180205724
    Abstract: Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection policy configured to process the message within the secure messaging environment is identified. The message protection policy specifies that, within the secure messaging environment, a secured digital certificate, other than a digital certificate of the message sender, is configured with an associated private key to digitally sign the message on behalf of the message sender. Based upon the message protection policy, a determination is made to digitally sign the message using the private key of the secured digital certificate. The message is signed on behalf of the message sender using the private key of the secured digital certificate.
    Type: Application
    Filed: March 15, 2018
    Publication date: July 19, 2018
    Inventor: Bret W. Dixon
  • Patent number: 10001984
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for identifying software updates where a stack trace is received, the stack trace including a first set of metadata. An execution failure is determined to have occurred in the received stack trace, and in response, one or more software updates are received, the one or more software updates including a second set of metadata. One or more matching metadata in the first and second set of metadata is determined. A subset of software updates for display is generated, the subset of software updates being associated with matched metadata, and in response to receiving a selection input from a user, one or more software updates of the generated subset of software updates are executed.
    Type: Grant
    Filed: August 17, 2016
    Date of Patent: June 19, 2018
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 9948635
    Abstract: Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection policy configured to process the message within the secure messaging environment is identified. The message protection policy specifies that, within the secure messaging environment, a secured digital certificate, other than a digital certificate of the message sender, is configured with an associated private key to digitally sign the message on behalf of the message sender. Based upon the message protection policy, a determination is made to digitally sign the message using the private key of the secured digital certificate. The message is signed on behalf of the message sender using the private key of the secured digital certificate.
    Type: Grant
    Filed: January 14, 2017
    Date of Patent: April 17, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Bret W. Dixon
  • Patent number: 9948634
    Abstract: Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection policy configured to process the message within the secure messaging environment is identified. The message protection policy specifies that, within the secure messaging environment, a secured digital certificate, other than a digital certificate of the message sender, is configured with an associated private key to digitally sign the message on behalf of the message sender. Based upon the message protection policy, a determination is made to digitally sign the message using the private key of the secured digital certificate. The message is signed on behalf of the message sender using the private key of the secured digital certificate.
    Type: Grant
    Filed: January 14, 2017
    Date of Patent: April 17, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Bret W. Dixon
  • Publication number: 20180103493
    Abstract: A computer system and computer program product for generating a geographically-bound mobile ad hoc network identification. The computer system and computer program product may include receiving, by a processor, a mobile ad hoc network request. The computer system and computer program product may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The computer system and computer program product may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The computer system and computer program product may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.
    Type: Application
    Filed: December 8, 2017
    Publication date: April 12, 2018
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20180103494
    Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.
    Type: Application
    Filed: December 8, 2017
    Publication date: April 12, 2018
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 9930610
    Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.
    Type: Grant
    Filed: June 16, 2016
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Publication number: 20180052676
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for identifying software updates where a stack trace is received, the stack trace including a first set of metadata. An execution failure is determined to have occurred in the received stack trace, and in response, one or more software updates are received, the one or more software updates including a second set of metadata. One or more matching metadata in the first and second set of metadata is determined. A subset of software updates for display is generated, the subset of software updates being associated with matched metadata, and in response to receiving a selection input from a user, one or more software updates of the generated subset of software updates are executed.
    Type: Application
    Filed: August 17, 2016
    Publication date: February 22, 2018
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 9854612
    Abstract: A method for generating a geographically-bound mobile ad hoc network identification. The method may include receiving, by a processor, a mobile ad hoc network request. The method may also include determining a plurality of geographic coordinates of a device associated with a current location of the device. The method may further include generating a mobile ad hoc network identification based on the determined plurality of geographic coordinates. The method may also include processing the received mobile ad hoc network request using the generated mobile ad hoc network identification.
    Type: Grant
    Filed: January 25, 2016
    Date of Patent: December 26, 2017
    Assignee: Internataionl Business Machines Corporation
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell
  • Patent number: 9848064
    Abstract: A method for generating and distributing serialized tokens is provided. The method may include receiving a request from at least one client. The method may further include determining whether the received at least one request is a request for generating names and definitions for a group of serialized tokens, deleting a names and definitions, and/or receiving a group of serialized tokens. Additionally, the method may include enabling the at least one client to generate names and definitions for a group of serialized tokens. The method may also include storing the names and definitions on a server. The method may also include deleting the names and definitions from the server. The method may also include formatting and distributing serialized tokens based on the names and definitions for the serialized tokens. The method may further include sending a response to the client based on the received request.
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: December 19, 2017
    Assignee: International Business Machines Corporation
    Inventors: Bret W. Dixon, Benjamin T. Horwood
  • Publication number: 20170344386
    Abstract: Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” When paused, the participants are able to interact with the demonstrated software program. When “resumed,” the participants are not able to interact with the demonstrated software program. Spawned virtual machines, wherein the virtual machines control access to the software program being demonstrated, permit participant interaction.
    Type: Application
    Filed: January 18, 2017
    Publication date: November 30, 2017
    Inventors: Graham C. Charters, Bret W. Dixon, Benjamin T. Horwood, Alexander H. Poga, Mark A. Shewell