Patents by Inventor Carole Rhoads Corley
Carole Rhoads Corley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220383683Abstract: A computer-implemented method, a computer system and a computer program product secure access to a restricted area. The method includes capturing, by a camera, a first image of a face of a first person and a second image of a face of a second person. The method also includes determining whether the face of the first person is included in a database of persons authorized to access the restricted area. The method further includes determining whether the second person is in proximity to the first person. In addition, the method includes determining whether the second person is authorized to access the restricted area. Finally, the method includes transmitting a signal that the second person is authorized to access the restricted area in response to determining that the second person is in proximity to the first person and the second person is authorized to access the restricted area.Type: ApplicationFiled: May 26, 2021Publication date: December 1, 2022Inventors: Cristi Nesbitt Ullmann, Brian Chow, Carole Rhoads Corley
-
Patent number: 11514740Abstract: A computer-implemented method, a computer system and a computer program product secure access to a restricted area. The method includes capturing, by a camera, a first image of a face of a first person and a second image of a face of a second person. The method also includes determining whether the face of the first person is included in a database of persons authorized to access the restricted area. The method further includes determining whether the second person is in proximity to the first person. In addition, the method includes determining whether the second person is authorized to access the restricted area. Finally, the method includes transmitting a signal that the second person is authorized to access the restricted area in response to determining that the second person is in proximity to the first person and the second person is authorized to access the restricted area.Type: GrantFiled: May 26, 2021Date of Patent: November 29, 2022Assignee: International Business Machines CorporationInventors: Cristi Nesbitt Ullmann, Brian Chow, Carole Rhoads Corley
-
Patent number: 8635328Abstract: A method and apparatus for determining time-varying thresholds for measured metrics are provided. With the method and apparatus, values of a given metric are captured over time. The behavior of the metric is analyzed to determine its seasonality. Correlated historical values of the metric and additional related metrics (cross-correlation) are used as inputs to a feed-forward back propagation neural network, in order to train the network to generalize the behavior of the metric. From this generalized behavior, point-by-point threshold values are calculated. The metric is monitored and the monitored values are compared with the threshold values to determine if the metric has violated its normal time-varying behavior. If so, an event is generated to notify an administrator of the error condition.Type: GrantFiled: October 31, 2002Date of Patent: January 21, 2014Assignee: International Business Machines CorporationInventors: Carole Rhoads Corley, Mark Wallace Johnson
-
Patent number: 8458337Abstract: Methods and apparatus for providing role-based access control of a resource by a subject in an access control system are provided. The system comprises one or more roles capable of association with one or more subjects, and a plurality of permission sets. One or more of the plurality of permission sets are associated with each of the one or more roles. The system further comprises a plurality of resources. One or more of the plurality of resources are associated with each of the one or more permission sets, and each of the plurality of resources is associated with a set of one or more subjects. A given subject in a set of one or more subjects for a given resource and having a role-permission association with the given resource is provided access control of the given resource.Type: GrantFiled: June 9, 2008Date of Patent: June 4, 2013Assignee: International Business Machines CorporationInventors: Carole Rhoads Corley, Jorge Lobo, Lorraine Phyllis Vassberg, Xiping Wang
-
Publication number: 20080243856Abstract: Methods and apparatus for providing role-based access control of a resource by a subject in an access control system are provided. The system comprises one or more roles capable of association with one or more subjects, and a plurality of permission sets. One or more of the plurality of permission sets are associated with each of the one or more roles. The system further comprises a plurality of resources. One or more of the plurality of resources are associated with each of the one or more permission sets, and each of the plurality of resources is associated with a set of one or more subjects. A given subject in a set of one or more subjects for a given resource and having a role-permission association with the given resource is provided access control of the given resource.Type: ApplicationFiled: June 9, 2008Publication date: October 2, 2008Applicant: International Business Machines CorporationInventors: Carole Rhoads Corley, Jorge Lobo, Lorraine Phyllis Vassberg, Xiping Wang
-
Publication number: 20080005115Abstract: Methods and apparatus for providing role-based access control of a resource by a subject in an access control system are provided. The system comprises one or more roles capable of association with one or more subjects, and a plurality of permission sets. One or more of the plurality of permission sets are associated with each of the one or more roles. The system further comprises a plurality of resources. One or more of the plurality of resources are associated with each of the one or more permission sets, and each of the plurality of resources is associated with a set of one or more subjects. A given subject in a set of one or more subjects for a given resource and having a role-permission association with the given resource is provided access control of the given resource.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Applicant: International Business Machines CorporationInventors: Carole Rhoads Corley, Jorge Lobo, Lorraine Phyllis Vassberg, Xiping Wang
-
Publication number: 20040119757Abstract: A method and apparatus for dynamically building a context sensitive composite icon are provided. A base icon is used to represent a particular object in a graphical user interface. This base icon has addition points where icon additions may be attached to the base icon, such as by superimposing the icon additions over the base icon. By adding icon additions at the addition points of the base icon, a composite icon is generated and then registered with the graphical user interface. The icon additions that are used to generate the composite icon are selected based on a particular context in which the object associated with the base icon is being used. The use of icon additions with the base icon is determined dynamically as the context of the corresponding object changes. In this way, the same base icon may be used to represent a particular object with additions to the base icon being used to provide additional information that is important to the current context of the corresponding object.Type: ApplicationFiled: December 18, 2002Publication date: June 24, 2004Applicant: International Buisness Machines CorporationInventors: Carole Rhoads Corley, David Bruce Kumhyr, Margaret Gardner MacPhail
-
Publication number: 20040088406Abstract: A method and apparatus for determining time-varying thresholds for measured metrics are provided. With the method and apparatus, values of a given metric are captured over time. The behavior of the metric is analyzed to determine its seasonality. Correlated historical values of the metric and additional related metrics (cross-correlation) are used as inputs to a feed-forward back propagation neural network, in order to train the network to generalize the behavior of the metric. From this generalized behavior, point-by-point threshold values are calculated. The metric is monitored and the monitored values are compared with the threshold values to determine if the metric has violated its normal time-varying behavior. If so, an event is generated to notify an administrator of the error condition.Type: ApplicationFiled: October 31, 2002Publication date: May 6, 2004Applicant: International Business Machines CorporationInventors: Carole Rhoads Corley, Mark Wallace Johnson