Patents by Inventor Charles Steven Lingafelt

Charles Steven Lingafelt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150026806
    Abstract: In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP address of the computer is changed to the newly assigned IP address.
    Type: Application
    Filed: July 18, 2013
    Publication date: January 22, 2015
    Inventors: Charles Steven Lingafelt, James W. Murray, James T. Swantek, James S. Worley
  • Patent number: 8928776
    Abstract: An embodiment of the invention provides a method for determining picture resolution to optimize storage, wherein input is received from a user interface. The input includes a selected picture destination, such as a printer, a photograph processing service provider, a web application, a website, and/or a display. Attributes of the picture destination are determined with a processor, wherein the attributes of the picture destination include a print resolution, a print size, a screen resolution, and/or a image size. The processor determines the picture resolution based on the attributes of the picture destination.
    Type: Grant
    Filed: November 21, 2012
    Date of Patent: January 6, 2015
    Assignee: International Business Machines Corporation
    Inventors: Gregory Jensen Boss, Andrew R. Jones, Charles Steven Lingafelt, Kevin C. McConnell, John Elbert Moore, Jr.
  • Patent number: 8875229
    Abstract: An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are received from a user, the request including a user identification. The metadata includes: information obtained from a history of prior accesses to an application access system, information obtained from a history of prior accesses to a wireless authentication system, and/or confirmation of the user identification by an entity physically proximate to the user. A database is queried with the user identification and the metadata to identify relationship data. The relationship data indicates the relationship between the individual assigned the user identification and an entity owning the system, an entity leasing the system, and/or an entity operating the system. The relationship data is input into a rules engine; and, security measure(s) are selected with the rules engine based on the relationship data.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: October 28, 2014
    Assignee: International Business Machines Corporation
    Inventors: Carlos Hoyos, Charles Steven Lingafelt
  • Patent number: 8806628
    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least one alert database and at least one associated signature set to each alert database; an analytics module in communication to the computer readable storage medium, the analytics module analyzes at least one alert database present on the computer storage medium to determine whether any signatures from the signature set associated with the alert database being analyzed are ineffective based at least on a ratio of valid alerts to false positive alerts for individual signatures selected from a group including a plurality of signatures present in the signature set; and an adjustment module in communication to the computer readable storage medium and the analytics module, the adjustment module removes at least one ineffective signature from the signature set.
    Type: Grant
    Filed: January 4, 2013
    Date of Patent: August 12, 2014
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Patent number: 8769679
    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example method includes gaining access to or creating an alert database and a signature set by an analytics module and an adjustment module, where the alert database includes an alert validity attribute for each alert; quantifying for each signature contained in the signature set an effect on the change in the number of alerts from its removal; determining with an analytics module whether any signature has a ratio of valid to false positive alerts less than a threshold; and when at least one signature has the ratio less than the first threshold identifying and removing with an adjustment module at least one signature from the signature database having a ratio less than the threshold where the signature is removed from the signature set, and repeating quantifying and determining.
    Type: Grant
    Filed: December 17, 2012
    Date of Patent: July 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Publication number: 20140181890
    Abstract: An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are received from a user, the request including a user identification. The metadata includes: information obtained from a history of prior accesses to an application access system, information obtained from a history of prior accesses to a wireless authentication system, and/or confirmation of the user identification by an entity physically proximate to the user. A database is queried with the user identification and the metadata to identify relationship data. The relationship data indicates the relationship between the individual assigned the user identification and an entity owning the system, an entity leasing the system, and/or an entity operating the system. The relationship data is input into a rules engine; and, security measure(s) are selected with the rules engine based on the relationship data.
    Type: Application
    Filed: December 21, 2012
    Publication date: June 26, 2014
    Applicant: International Business Machines Corporation
    Inventors: Carlos Hoyos, Charles Steven Lingafelt
  • Publication number: 20140176314
    Abstract: An embodiment of the invention provides a method including receiving in an antenna of a smart device first wireless command and control data from a first electronic device. The antenna receives additional wireless command and control data from at least one second electronic device. The first wireless command and control data and the additional wireless command and control data are automatically received from the first electronic device and the at least one second electronic device without input to the smart device from a user. A universal interface is created in the smart device based on the first command and control data and the additional command and control data, wherein the first electronic device and the at least one second electronic device are controllable by the universal interface.
    Type: Application
    Filed: December 21, 2012
    Publication date: June 26, 2014
    Applicant: International Business Machines Corporation
    Inventors: Carlos E. Hoyos, Charles Steven Lingafelt
  • Publication number: 20140173727
    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least one alert database and at least one associated signature set to each alert database; an analytics module in communication to the computer readable storage medium, the analytics module analyzes at least one alert database present on the computer storage medium to determine whether any signatures from the signature set associated with the alert database being analyzed are ineffective based at least on a ratio of valid alerts to false positive alerts for individual signatures selected from a group including a plurality of signatures present in the signature set; and an adjustment module in communication to the computer readable storage medium and the analytics module, the adjustment module removes at least one ineffective signature from the signature set.
    Type: Application
    Filed: January 4, 2013
    Publication date: June 19, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Publication number: 20140173724
    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example method includes gaining access to or creating an alert database and a signature set by an analytics module and an adjustment module, where the alert database includes an alert validity attribute for each alert; quantifying for each signature contained in the signature set an effect on the change in the number of alerts from its removal; determining with an analytics module whether any signature has a ratio of valid to false positive alerts less than a threshold; and when at least one signature has the ratio less than the first threshold identifying and removing with an adjustment module at least one signature from the signature database having a ratio less than the threshold where the signature is removed from the signature set, and repeating quantifying and determining.
    Type: Application
    Filed: December 17, 2012
    Publication date: June 19, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Publication number: 20140139703
    Abstract: An embodiment of the invention provides a method for determining picture resolution to optimize storage, wherein input is received from a user interface. The input includes a selected picture destination, such as a printer, a photograph processing service provider, a web application, a website, and/or a display. Attributes of the picture destination are determined with a processor, wherein the attributes of the picture destination include a print resolution, a print size, a screen resolution, and/or a image size. The processor determines the picture resolution based on the attributes of the picture destination.
    Type: Application
    Filed: November 21, 2012
    Publication date: May 22, 2014
    Applicant: International Business Machines Corporation
    Inventors: Gregory Jensen Boss, Andrew R. Jones, Charles Steven Lingafelt, Kevin C. McConnell, John Elbert Moore, JR.
  • Publication number: 20140139704
    Abstract: An embodiment of the invention provides a method for determining picture resolution to optimize storage, wherein input is received from a user interface. The input includes a selected picture destination, such as a printer, a photograph processing service provider, a web application, a website, and/or a display. Attributes of the picture destination are determined with a processor, wherein the attributes of the picture destination include a print resolution, a print size, a screen resolution, and/or a image size. The processor determines the picture resolution based on the attributes of the picture destination.
    Type: Application
    Filed: January 17, 2013
    Publication date: May 22, 2014
    Applicant: International Business Machines Corporation
    Inventors: Gregory Jensen Boss, Andrew R. Jones, Charles Steven Lingafelt, Kevin C. McConnell, John Elbert Moore, JR.
  • Patent number: 8676923
    Abstract: Method, system, and product for remotely communicating with and identifying owners of objects on an IP network by providing a database identifying owners of objects on an IP network, discovery scanning the IP network for logical objects, sending a message to an unlisted logical object requesting a registration action of the recipient, receiving the registration action indicating an owner of the logical object, and updating the database with the received indication of the owner of the object. The method, system, or product may be embodied in a software application (such as an operating system element), a dedicated processor, or a dedicated processor with dedicated code.
    Type: Grant
    Filed: March 8, 2005
    Date of Patent: March 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, Scott Alex Creeley, Charles Victor Jolla, Mark Alan Techmeier, Ronald Jerome Walter, Ashley A. Brock
  • Patent number: 8635683
    Abstract: An embodiment of the invention provides a method for detecting fraudulent use of a moderator passcode in a conference calling system. The method sets a threshold number of moderator passcodes permitted in a conference call. The total number of moderator passcodes entered into the conference call is determined and compared to the threshold number with a processor. The conference call is allowed to continue if the threshold number exceeds the total number of moderator passcodes entered into the conference call. If, however, the total number of moderator passcodes exceeds the threshold number of moderator passcodes, the processor performs validation actions and/or alert actions.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: January 21, 2014
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek
  • Publication number: 20130291067
    Abstract: A method for identifying unauthorized and/or misconfigured wireless access points (WAPs) in a communication network includes the steps of: an agent running on an endpoint in the communication network locating one or more WAPs in the communication network; the agent reporting at least one located WAP to a central entity; and the central entity performing steps of applying prescribed criteria to determine whether the located WAP needs to be probed, and initiating active probing of the located WAP when it is determined that the located WAP needs to be probed to thereby determine whether the located WAP is unauthorized and/or misconfigured.
    Type: Application
    Filed: April 30, 2012
    Publication date: October 31, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Terry Dwain Escamilla, Charles Steven Lingafelt, David Robert Safford
  • Publication number: 20130291063
    Abstract: A system for identifying unauthorized and/or misconfigured wireless access points (WAPs) in a communication network includes multiple network endpoints and multiple agents running on endpoints. The agents are adapted to periodically locate WAPs and to report located WAPs to a central entity. The system further includes a central entity operative to receive information from the agents regarding located WAPs, to determine whether at least a given one of the located WAPs needs to be probed, and to initiate active probing of located WAPs when it is determined that the given one of the located WAPs needs to be probed.
    Type: Application
    Filed: April 25, 2012
    Publication date: October 31, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Terry Dwain Escamilla, Charles Steven Lingafelt, David Robert Safford
  • Patent number: 8494142
    Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: July 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek
  • Patent number: 8443048
    Abstract: A method, system and program product for assigning a resource to a client in a collaborative environment. The method includes defining, using a tool, a threshold value for collaborative attributes for each resource responding to one or more clients and calculating on a periodic basis, using the tool, an updated value for the collaborative attributes for each resource. The method further includes comparing, upon receipt of a collaboration request, the updated value with the threshold value defined for collaborative attributes for a first resource and, if the updated value is less than the threshold value for the first resource, connecting the client to the first resource for establishing a collaborative session. If not, repeating comparing the updated value with the threshold value for the collaborative attributes defined for a next resource and connecting the client to the next resource whose updated value is less than the threshold value.
    Type: Grant
    Filed: August 1, 2012
    Date of Patent: May 14, 2013
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, David Paul Merrill, John Elbert Moore
  • Patent number: 8369506
    Abstract: A method, a computer program product, and a data processing system inform a teleconference participant that a person-of-interest has become active within the teleconference. A user is identified. A person-of-interest, an alert condition, and a notification method are received from the user. The identification, the alert condition, and the notification method are then stored in a person-of-interest data structure. When a user connects to a teleconference, the person-of-interest data structure is retrieved. The teleconference is then monitored for the occurrence of the alert condition. Upon the occurrence of the alert condition, the notification is delivered to the user according to the notification method.
    Type: Grant
    Filed: March 6, 2009
    Date of Patent: February 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James Thomas Swantek
  • Patent number: 8358659
    Abstract: A computer implemented method, apparatus, and computer usable program product for managing a voice over Internet Protocol call. A selected set of resources associated with a quality of the voice over Internet Protocol call in a data processing system is monitored during the voice over Internet Protocol call. A determination is made as to whether the quality of the voice over Internet Protocol call in a data processing has fallen below a desired level. A corrective action is performed with respect to the selected set of resources in response to the quality of the voice over Internet Protocol call falling below the desired level.
    Type: Grant
    Filed: January 2, 2008
    Date of Patent: January 22, 2013
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, Martinianus BudiTjahja Hadinata, John Elbert Moore, Jr.
  • Publication number: 20120297323
    Abstract: A method, system and program product for assigning a resource to a client in a collaborative environment. The method includes defining, using a tool, a threshold value for collaborative attributes for each resource responding to one or more clients and calculating on a periodic basis, using the tool, an updated value for the collaborative attributes for each resource. The method further includes comparing, upon receipt of a collaboration request, the updated value with the threshold value defined for collaborative attributes for a first resource and, if the updated value is less than the threshold value for the first resource, connecting the client to the first resource for establishing a collaborative session. If not, repeating comparing the updated value with the threshold value for the collaborative attributes defined for a next resource and connecting the client to the next resource whose updated value is less than the threshold value.
    Type: Application
    Filed: August 1, 2012
    Publication date: November 22, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles Steven Lingafelt, David Paul Merrill, John Elbert Moore