Patents by Inventor Charles Steven Lingafelt
Charles Steven Lingafelt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11665244Abstract: A system and method for selecting a user profile for use with a platform based on an optimal persona of the user includes inferring a context of a user based on data received from a plurality of data sources, determining a persona of the user according to the context of the user from a plurality of user personas, and selecting a user profile associated with a platform that corresponds to the persona, in response to detecting that the user is accessing the platform.Type: GrantFiled: July 11, 2019Date of Patent: May 30, 2023Assignee: KYNDRYL, INC.Inventors: Gregory J. Boss, Charles Steven Lingafelt, John E. Moore, Jr., Andrew R. Jones
-
Publication number: 20230103102Abstract: A system may include a memory and a processor in communication therewith configured to perform operations. The operations may include receiving an audio file and a text file related to the audio file, analyzing the audio file to produce an analysis, and determining a portion of the audio file is similar to a segment of the text file. The operations may include identifying a first terminal signal and corresponding the first terminal signal to a first terminal tag in the text file such that the first terminal tag is aligned with the first terminal signal; the first terminal signal identifies a first portion terminal end of the portion and the first terminal tag identifies a first segment terminal end of the segment. The operations may include generating a converted text from the analysis and inserting the segment into the converted text.Type: ApplicationFiled: September 28, 2021Publication date: March 30, 2023Inventors: Charles Steven Lingafelt, Gina Renee Howard, John E. Moore, Jr., Andrew R. Jones
-
Patent number: 11595444Abstract: A method for dynamically establishing a communication path for a requestor by assessing an authenticity of the requestor and a communication request is provided. The method may include, in response to receiving the communication request, dynamically determining whether to establish a communication path for the requestor to a destination though a communication network by assessing the requestor based on one or more authentication rules, wherein the one or more authentication rules are based on first information associated the communication network, second information about the requestor, and third information from the requestor. The method may further include, in response to determining that the requestor satisfies the one or more authentication rules, dynamically establishing the communication path for the requestor on the communication network according to one or more communication attributes associated with the requestor.Type: GrantFiled: December 3, 2020Date of Patent: February 28, 2023Assignee: International Business Machines CorporationInventors: Gina Renee Howard, Charles Steven Lingafelt, John E. Moore, Jr., Andrew R. Jones
-
Patent number: 11388157Abstract: A computer-implemented method, system and computer program product for utilizing multi-factor authentication to authenticate an Internet of Things (IoT) device. The identity credentials of neighboring IoT device(s) are obtained by the IoT device to be authenticated. Upon providing a request to the authentication system to prove its identity, the IoT device provides the authentication system a first factor credential, such as a username and password. The authentication system, upon confirming the accuracy of the first factor credential, challenges the IoT device to provide the second factor credential. After receiving the challenge from the authentication system to provide the second factor credential, the IoT device returns the second factor credential that was generated based on the obtained identity credentials from the neighboring IoT device(s).Type: GrantFiled: October 21, 2020Date of Patent: July 12, 2022Assignee: International Business Machines CorporationInventors: Gina Renee Howard, Charles Steven Lingafelt, John E. Moore, Jr., Andrew R. Jones
-
Publication number: 20220182414Abstract: A method for dynamically establishing a communication path for a requestor by assessing an authenticity of the requestor and a communication request is provided. The method may include, in response to receiving the communication request, dynamically determining whether to establish a communication path for the requestor to a destination though a communication network by assessing the requestor based on one or more authentication rules, wherein the one or more authentication rules are based on first information associated the communication network, second information about the requestor, and third information from the requestor. The method may further include, in response to determining that the requestor satisfies the one or more authentication rules, dynamically establishing the communication path for the requestor on the communication network according to one or more communication attributes associated with the requestor.Type: ApplicationFiled: December 3, 2020Publication date: June 9, 2022Inventors: Gina Renee Howard, Charles Steven Lingafelt, John E. Moore, JR., Andrew R. Jones
-
Publication number: 20220124080Abstract: A computer-implemented method, system and computer program product for utilizing multi-factor authentication to authenticate an Internet of Things (IoT) device. The identity credentials of neighboring IoT device(s) are obtained by the IoT device to be authenticated. Upon providing a request to the authentication system to prove its identity, the IoT device provides the authentication system a first factor credential, such as a username and password. The authentication system, upon confirming the accuracy of the first factor credential, challenges the IoT device to provide the second factor credential. After receiving the challenge from the authentication system to provide the second factor credential, the IoT device returns the second factor credential that was generated based on the obtained identity credentials from the neighboring IoT device(s).Type: ApplicationFiled: October 21, 2020Publication date: April 21, 2022Inventors: Gina Renee Howard, Charles Steven Lingafelt, John E. Moore, JR., Andrew R. Jones
-
Publication number: 20210227050Abstract: Embodiments for selecting a remote service for a core program are provided. A request for a remote service is received. Information associated with each of a plurality of remote services is received from at least one information source. A score for each of the plurality of remote services is calculated based on the information associated with each of the plurality of remote services and at least one remote service evaluation criteria.Type: ApplicationFiled: January 21, 2020Publication date: July 22, 2021Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Charles Steven LINGAFELT, John E. MOORE, JR., Andrew R. JONES
-
Patent number: 11070646Abstract: Embodiments for selecting a remote service for a core program are provided. A request for a remote service is received. Information associated with each of a plurality of remote services is received from at least one information source. A score for each of the plurality of remote services is calculated based on the information associated with each of the plurality of remote services and at least one remote service evaluation criteria.Type: GrantFiled: January 21, 2020Date of Patent: July 20, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Charles Steven Lingafelt, John E. Moore, Jr., Andrew R. Jones
-
Publication number: 20210014327Abstract: A system and method for selecting a user profile for use with a platform based on an optimal persona of the user includes inferring a context of a user based on data received from a plurality of data sources, determining a persona of the user according to the context of the user from a plurality of user personas, and selecting a user profile associated with a platform that corresponds to the persona, in response to detecting that the user is accessing the platform.Type: ApplicationFiled: July 11, 2019Publication date: January 14, 2021Inventors: Gregory J. Boss, Charles Steven Lingafelt, John E. Moore, JR., Andrew R. Jones
-
Patent number: 10817877Abstract: An embodiment of the invention provides a method for selectively using degree confidence for image validation to authorize transactions, wherein a request to authorize a transaction is received, the request including a user's name, a photo of the user, and a transaction value. A database is queried with the user's name to identify one or more reference photos of the user; and, the received photo of the user is compared to the reference photo of the user with an analysis engine to generate a confidence value. An authorization threshold is determined with a processor based on the transaction value. The transaction is authorized when the confidence value is equal to and/or greater than the authorization threshold.Type: GrantFiled: September 6, 2013Date of Patent: October 27, 2020Assignee: International Business Machines CorporationInventors: Martinianus Budi Tjahja Hadinata, Charles Steven Lingafelt, John Elbert Moore, Jr.
-
Patent number: 9734450Abstract: A method includes a computing device receiving data traffic flow and initializing a subroutine to assess alerts for the received data traffic flow; the computer device determining a collection of rules which produce more than a threshold of false positive alerts and more than a threshold of true positive alerts for the assessed alerts; the computer device determining a logical condition and an atomic rule element to add to the collection of rules; and the computer device implementing the added logical condition and atomic rule element if the number of assessed alerts are decreased below a value.Type: GrantFiled: June 5, 2014Date of Patent: August 15, 2017Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worely
-
Patent number: 9350754Abstract: In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP address of the computer is changed to the newly assigned IP address.Type: GrantFiled: July 18, 2013Date of Patent: May 24, 2016Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.Inventors: Charles Steven Lingafelt, James W. Murray, James T. Swantek, James S. Worley
-
Patent number: 9292891Abstract: Providing reserved routes for a plurality of vehicles, in which the at least a location is monitored and communicated from each of a plurality of vehicles having GPS devices and traveling to destinations on reserved routes with guaranteed arrival times. For a traffic event along one of the reserved routes; determining if any of the plurality of vehicles are affected or will be affected by the traffic event and calculating alternate routes for those vehicles The alternate routes are sent to the GPS devices in the affected or possibly affected vehicles and once the vehicle has reached the destination, comparing an actual arrival time of the vehicle at the destination to the guaranteed arrival time, and if the actual arrival time is later than the guaranteed arrival time, crediting a user of the vehicle for at least a portion of an amount paid for reserving the reserved route.Type: GrantFiled: June 24, 2014Date of Patent: March 22, 2016Assignee: International Business Machines CorporationInventors: Gregory Jensen Boss, Andrew R. Jones, Charles Steven Lingafelt, Kevin C. McConnell, John Elbert Moore, Jr.
-
Publication number: 20160012720Abstract: A method and system of reducing route congestion due to a traffic event during simultaneous rerouting of a route by GPS devices. A computer receives information regarding the traffic event; predicts at least one GPS alternate route which a GPS device would recommend to a user to avoid the traffic event; predicts a number of users that would utilize the at least one GPS alternate route; finds at least one other alternate route; determines a number of existing vehicles already present on the GPS alternate route and on the at least one other alternate route; calculates a reroute weight for each of the GPS alternate routes, calculates modified traffic information for each of the GPS alternate routes by applying the reroute weight for the GPS alternate route to increase the real-time traffic data for the GPS alternate route; and sends the modified traffic information to the GPS devices.Type: ApplicationFiled: July 14, 2014Publication date: January 14, 2016Inventors: Gregory Jensen Boss, Andrew R. Jones, Charles Steven Lingafelt, Kevin C. McConnell, John Elbert Moore, JR.
-
Publication number: 20150371352Abstract: Providing reserved routes for a plurality of vehicles, in which the at least a location is monitored and communicated from each of a plurality of vehicles having GPS devices and traveling to destinations on reserved routes with guaranteed arrival times. For a traffic event along one of the reserved routes; determining if any of the plurality of vehicles are affected or will be affected by the traffic event and calculating alternate routes for those vehicles The alternate routes are sent to the GPS devices in the affected or possibly affected vehicles and once the vehicle has reached the destination, comparing an actual arrival time of the vehicle at the destination to the guaranteed arrival time, and if the actual arrival time is later than the guaranteed arrival time, crediting a user of the vehicle for at least a portion of an amount paid for reserving the reserved route.Type: ApplicationFiled: June 24, 2014Publication date: December 24, 2015Inventors: Gregory Jensen Boss, Andrew R. Jones, Charles Steven Lingafelt, Kevin C. McConnell, John Elbert Moore, JR.
-
Publication number: 20150356445Abstract: A method includes a computing device receiving data traffic flow and initializing a subroutine to assess alerts for the received data traffic flow; the computer device determining a collection of rules which produce more than a threshold of false positive alerts and more than a threshold of true positive alerts for the assessed alerts; the computer device determining a logical condition and an atomic rule element to add to the collection of rules; and the computer device implementing the added logical condition and atomic rule element if the number of assessed alerts are decreased below a value.Type: ApplicationFiled: June 5, 2014Publication date: December 10, 2015Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
-
Publication number: 20150244768Abstract: A method includes a computing device receiving read source content from at least one content provider; the computing device creating a read order file for the received read source content in accordance with at least one selected criteria; the computing device packaging the read order file into a computer readable schema file; and delivering the computer readable schema file to at least one user device.Type: ApplicationFiled: February 24, 2014Publication date: August 27, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gregory Jensen Boss, Andrew R. Jones, Charles Steven Lingafelt, Kevin C. McConnell, John Elbert Moore, JR.
-
Patent number: 9106751Abstract: A method and system for automatically pausing a remote voicemail recording to answer an incoming call and to notify an incoming caller of a user voicemail interaction. A command to pause the voicemail recording can be determined by the user prior to establishing the voicemail recording. Upon receiving an incoming call the user can be notified of the incoming call prior to terminating the voicemail recording. The command for pausing voicemail recording can be sent to a voicemail system to pause the voicemail recording if the user opts to receive the incoming call. When the call is concluded, the user can be returned to the voicemail system with options such as resume recording, playback, delete, or cancel the message.Type: GrantFiled: February 20, 2008Date of Patent: August 11, 2015Assignee: International Business Machines CorporationInventors: Brian M. O'Connell, Charles Steven Lingafelt, Keith R. Walker, John E. Moore, Martinianus BudiTjahja Hadinata
-
Publication number: 20150073985Abstract: An embodiment of the invention provides a method for selectively using degree confidence for image validation to authorize transactions, wherein a request to authorize a transaction is received, the request including a user's name, a photo of the user, and a transaction value. A database is queried with the user's name to identify one or more reference photos of the user; and, the received photo of the user is compared to the reference photo of the user with an analysis engine to generate a confidence value. An authorization threshold is determined with a processor based on the transaction value. The transaction is authorized when the confidence value is equal to and/or greater than the authorization threshold.Type: ApplicationFiled: September 6, 2013Publication date: March 12, 2015Applicant: International Business Machines CorporationInventors: Martinianus Budi Tjahja Hadinata, Charles Steven Lingafelt, John Elbert Moore, JR.
-
Patent number: 8964063Abstract: An embodiment of the invention provides a method for determining picture resolution to optimize storage, wherein input is received from a user interface. The input includes a selected picture destination, such as a printer, a photograph processing service provider, a web application, a website, and/or a display. Attributes of the picture destination are determined with a processor, wherein the attributes of the picture destination include a print resolution, a print size, a screen resolution, and/or a image size. The processor determines the picture resolution based on the attributes of the picture destination.Type: GrantFiled: January 17, 2013Date of Patent: February 24, 2015Assignee: International Business Machines CorporationInventors: Gregory Jensen Boss, Andrew R. Jones, Charles Steven Lingafelt, Kevin C. McConnell, John Elbert Moore, Jr.