Patents by Inventor Chris Dotson
Chris Dotson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11941707Abstract: Provided are techniques for determining an effect of a message on a personal brand based on future goals. A message is received from an entity for a social media platform. Additional messages related to the message are identified. A reaction sentiment trend is determined for each topic of the additional messages for a period of time. An effect the message has on a personal brand of the entity in future is predicted based on future goals of the entity and based on the reaction sentiment trend for each topic. An indication of whether the message is aligned with the future goals based on the predicted effect is provided. In response to the message being aligned with the future goals, the message is posted to the social media platform. In response to the message not being aligned with the future goals, one or more suggestions to modify the message are provided.Type: GrantFiled: March 27, 2018Date of Patent: March 26, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nader Nassar, Santosh S. Borse, Chris Dotson, Annette Riffe
-
Patent number: 11636554Abstract: Provided are techniques for determining an effect of a message on a personal brand based on future goals. A message is received from an entity for a social media platform. Additional messages related to the message are identified. A reaction sentiment trend is determined for each topic of the additional messages for a period of time. An effect the message has on a personal brand of the entity in future is predicted based on future goals of the entity and based on the reaction sentiment trend for each topic. An indication of whether the message is aligned with the future goals based on the predicted effect is provided. In response to the message being aligned with the future goals, the message is posted to the social media platform. In response to the message not being aligned with the future goals, one or more suggestions to modify the message are provided.Type: GrantFiled: June 18, 2019Date of Patent: April 25, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nader Nassar, Santosh S. Borse, Chris Dotson, Annette Riffe
-
Publication number: 20230120379Abstract: Examples described herein provide a computer-implemented method that includes receiving source code to implement on the cloud infrastructure. The method includes receiving user-defined requirements. The method further includes determining, based on the source code and the user-defined requirements, multiple suitable cloud architectures from a plurality of cloud providers to operate the source code on the cloud infrastructure. The method further includes presenting, to a user, the multiple suitable cloud architectures. The method further includes implementing a selected cloud architecture for the cloud infrastructure based on a selection by the user.Type: ApplicationFiled: October 20, 2021Publication date: April 20, 2023Inventors: Nader M. Nassar, Chris Dotson, Annuschka Bork, Todd D. Deloach, Samuel S. Grummons
-
Patent number: 11165805Abstract: A method, apparatus and computer program product for use in identifying and blocking operation of compromised or potentially compromised IoT device(s) on a network, such as a local network behind a router or firewall. To this end, the technique provides for automated and seamless on-boarding of a “guard” system for IoT devices, preferably as those devices join (or re-join) into the network via a Dynamic Host Configuration Protocol message exchange. In operation, and in response to receipt of a DHCP discover message that includes a network location, a DHCP server uses the network location to locate and retrieve a set of flow attributes for the device. Those attributes are then associated with the IP address to be assigned to the IoT device in a network control device. The network control device then selectively identifies and/or blocks operation of the IoT device when the IoT device is compromised or potentially compromised, thereby protecting the network (or network resources) from damage or misuse.Type: GrantFiled: June 29, 2019Date of Patent: November 2, 2021Assignee: International Business Machines CorporationInventors: Charles K. Davis, III, Chris Dotson, Steven Lingafelt
-
Patent number: 11140180Abstract: A method, apparatus and computer program product for use in identifying and blocking operation of compromised or potentially compromised IoT device(s) on a network, such as a local network behind a router or firewall. To this end, the technique provides for automated and seamless on-boarding of a “guard” system for IoT devices, preferably as those devices join (or re-join) into the network via a Dynamic Host Configuration Protocol message exchange. In operation, and in response to receipt of a DHCP discover message that includes a network location, a DHCP server uses the network location to locate and retrieve a set of flow attributes for the device. Those attributes are then associated with the IP address to be assigned to the IoT device in a network control device. The network control device then selectively identifies and/or blocks operation of the IoT device when the IoT device is compromised or potentially compromised, thereby protecting the network (or network resources) from damage or misuse.Type: GrantFiled: March 23, 2018Date of Patent: October 5, 2021Assignee: International Business Machines CorporationInventors: Charles K. Davis, III, Chris Dotson, Steven Lingafelt
-
Patent number: 10742653Abstract: A method, apparatus and computer program product for protecting enterprise Information Technology (IT) infrastructures by automatically instantiating individualized network flow controls and/or network access controls specific to an IoT device. In this approach, an IoT device is identified, e.g., via network scanning or other observational sensors, or by receipt of information from a network administrator. In response to receiving information about the new IoT device, a control component obtains applicable network flow control and/or access control rules for the IoT device. These rules are obtained from one or more authoritative (trusted) sources, e.g., querying a website of the IoT vendor, an industry site, or an enterprise site. In this manner, applicable network flow control and/or access control rules are obtained.Type: GrantFiled: March 23, 2018Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Charles K. Davis, III, Chris Dotson, Steven Lingafelt
-
Patent number: 10735422Abstract: A method, apparatus and computer program product for protecting enterprise Information Technology (IT) infrastructures by automatically instantiating individualized network flow controls and/or network access controls specific to an IoT device. In this approach, an IoT device is identified, e.g., via network scanning or other observational sensors, or by receipt of information from a network administrator. In response to receiving information about the new IoT device, a control component obtains applicable network flow control and/or access control rules for the IoT device. These rules are obtained from one or more authoritative (trusted) sources, e.g., querying a website of the IoT vendor, an industry site, or an enterprise site. In this manner, applicable network flow control and/or access control rules are obtained.Type: GrantFiled: June 29, 2019Date of Patent: August 4, 2020Assignee: Internatuonal Business Machines CorporationInventors: Charles K. Davis, III, Chris Dotson, Steven Lingafelt
-
Patent number: 10673882Abstract: A method, apparatus and computer program product for use in monitoring and controlling network behavior of Internet of Things (IoT) devices connected to a network. According to this approach, a set of network characteristics of an IoT device (e.g., as published by the device manufacturer) are assigned various risk values and then monitored over an initial time period to generate a “fingerprint” of the device's network flow. This flow is then transformed into one or more flow control rules representing “normal” or abnormal behavior of the IoT device. Preferably, the rules are instantiated into a network boundary control system (NBCS), such as an enterprise router, gateway, or the like, and then enforced, e.g., to generate alerts or others actions when the rules are triggered. The approach enables dynamic and automated threat detection and prevention based on anomalous and/or known-bad behavior.Type: GrantFiled: January 15, 2018Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Charles K. Davis, III, Chris Dotson, Steven Lingafelt
-
Publication number: 20190327256Abstract: A method, apparatus and computer program product for use in identifying and blocking operation of compromised or potentially compromised IoT device(s) on a network, such as a local network behind a router or firewall. To this end, the technique provides for automated and seamless on-boarding of a “guard” system for IoT devices, preferably as those devices join (or re-join) into the network via a Dynamic Host Configuration Protocol message exchange. In operation, and in response to receipt of a DHCP discover message that includes a network location, a DHCP server uses the network location to locate and retrieve a set of flow attributes for the device. Those attributes are then associated with the IP address to be assigned to the IoT device in a network control device. The network control device then selectively identifies and/or blocks operation of the IoT device when the IoT device is compromised or potentially compromised, thereby protecting the network (or network resources) from damage or misuse.Type: ApplicationFiled: June 29, 2019Publication date: October 24, 2019Applicant: International Business Machines CorporationInventors: Charles K. Davis, III, Chris Dotson, Steven Lingafelt
-
Publication number: 20190327231Abstract: A method, apparatus and computer program product for protecting enterprise Information Technology (IT) infrastructures by automatically instantiating individualized network flow controls and/or network access controls specific to an IoT device. In this approach, an IoT device is identified, e.g., via network scanning or other observational sensors, or by receipt of information from a network administrator. In response to receiving information about the new IoT device, a control component obtains applicable network flow control and/or access control rules for the IoT device. These rules are obtained from one or more authoritative (trusted) sources, e.g., querying a website of the IoT vendor, an industry site, or an enterprise site. In this manner, applicable network flow control and/or access control rules are obtained.Type: ApplicationFiled: June 29, 2019Publication date: October 24, 2019Applicant: International Business Machines CorporationInventors: Charles K. Davis, III, Chris Dotson, Steven Lingafelt
-
Publication number: 20190304034Abstract: Provided are techniques for determining an effect of a message on a personal brand based on future goals. A message is received from an entity for a social media platform. Additional messages related to the message are identified. A reaction sentiment trend is determined for each topic of the additional messages for a period of time. An effect the message has on a personal brand of the entity in future is predicted based on future goals of the entity and based on the reaction sentiment trend for each topic. An indication of whether the message is aligned with the future goals based on the predicted effect is provided. In response to the message being aligned with the future goals, the message is posted to the social media platform. In response to the message not being aligned with the future goals, one or more suggestions to modify the message are provided.Type: ApplicationFiled: March 27, 2018Publication date: October 3, 2019Inventors: Nader Nassar, Santosh S. Borse, Chris Dotson, Annette Riffe
-
Publication number: 20190304036Abstract: Provided are techniques for determining an effect of a message on a personal brand based on future goals. A message is received from an entity for a social media platform. Additional messages related to the message are identified. A reaction sentiment trend is determined for each topic of the additional messages for a period of time. An effect the message has on a personal brand of the entity in future is predicted based on future goals of the entity and based on the reaction sentiment trend for each topic. An indication of whether the message is aligned with the future goals based on the predicted effect is provided. In response to the message being aligned with the future goals, the message is posted to the social media platform. In response to the message not being aligned with the future goals, one or more suggestions to modify the message are provided.Type: ApplicationFiled: June 18, 2019Publication date: October 3, 2019Inventors: Nader Nassar, Santosh S. Borse, Chris Dotson, Annette Riffe
-
Publication number: 20190297078Abstract: A method, apparatus and computer program product for protecting enterprise Information Technology (IT) infrastructures by automatically instantiating individualized network flow controls and/or network access controls specific to an IoT device. In this approach, an IoT device is identified, e.g., via network scanning or other observational sensors, or by receipt of information from a network administrator. In response to receiving information about the new IoT device, a control component obtains applicable network flow control and/or access control rules for the IoT device. These rules are obtained from one or more authoritative (trusted) sources, e.g., querying a website of the IoT vendor, an industry site, or an enterprise site. In this manner, applicable network flow control and/or access control rules are obtained.Type: ApplicationFiled: March 23, 2018Publication date: September 26, 2019Applicant: International Business Machines CorporationInventors: Charles K. Davis, III, Chris Dotson, Steven Lingafelt
-
Publication number: 20190297102Abstract: A method, apparatus and computer program product for use in identifying and blocking operation of compromised or potentially compromised IoT device(s) on a network, such as a local network behind a router or firewall. To this end, the technique provides for automated and seamless on-boarding of a “guard” system for IoT devices, preferably as those devices join (or re-join) into the network via a Dynamic Host Configuration Protocol message exchange. In operation, and in response to receipt of a DHCP discover message that includes a network location, a DHCP server uses the network location to locate and retrieve a set of flow attributes for the device. Those attributes are then associated with the IP address to be assigned to the IoT device in a network control device. The network control device then selectively identifies and/or blocks operation of the IoT device when the IoT device is compromised or potentially compromised, thereby protecting the network (or network resources) from damage or misuse.Type: ApplicationFiled: March 23, 2018Publication date: September 26, 2019Applicant: International Business Machines CorporationInventors: Charles K. Davis, III, Chris Dotson, Steven Lingafelt
-
Publication number: 20190222594Abstract: A method, apparatus and computer program product for use in monitoring and controlling network behavior of Internet of Things (IoT) devices connected to a network. According to this approach, a set of network characteristics of an IoT device (e.g., as published by the device manufacturer) are assigned various risk values and then monitored over an initial time period to generate a “fingerprint” of the device's network flow. This flow is then transformed into one or more flow control rules representing “normal” or abnormal behavior of the IoT device. Preferably, the rules are instantiated into a network boundary control system (NBCS), such as an enterprise router, gateway, or the like, and then enforced, e.g., to generate alerts or others actions when the rules are triggered. The approach enables dynamic and automated threat detection and prevention based on anomalous and/or known-bad behavior.Type: ApplicationFiled: January 15, 2018Publication date: July 18, 2019Applicant: International Business Machines CorporationInventors: Charles K. Davis, III, Chris Dotson, Steven Lingafelt
-
Patent number: 8499940Abstract: A rotatable article display device for displaying an article such as a piece of jewelry or the like includes a platen defining a display surface. The platen is configured to rotate about a first axis substantially perpendicular to the display surface. A camera mount is provided which is configured to secure a camera to the device such that the camera is rotatable about a second axis substantially parallel to the display surface. In a method for use, at least one article of jewelry is positioned on the display surface and viewed while the platen is rotated about the perpendicular axis and the camera is rotated about the parallel axis.Type: GrantFiled: April 6, 2011Date of Patent: August 6, 2013Assignee: America's Collectibles NetworkInventors: Eric L. Johnson, Walter Walsh, III, Chris Dotson
-
Publication number: 20120086913Abstract: A rotatable article display device for displaying an article such as a piece of jewelry or the like includes a platen defining a display surface. The platen is configured to rotate about a first axis substantially perpendicular to the display surface. A camera mount is provided which is configured to secure a camera to the device such that the camera is rotatable about a second axis substantially parallel to the display surface. In a method for use, at least one article of jewelry is positioned on the display surface and viewed while the platen is rotated about the perpendicular axis and the camera is rotated about the parallel axis.Type: ApplicationFiled: April 6, 2011Publication date: April 12, 2012Applicant: America's Collectibles NetworkInventors: Eric JOHNSON, Walter Walsh, III, Chris Dotson
-
Patent number: 8069094Abstract: An apparatus for a virtual turntable system for computer generated broadcast video streams for a multiple product sales display. The virtual turntable system collects data, including images and status information, and generates a video stream for presenting product information sequentially on a video monitor. In one embodiment, the virtual turntable system reads the data, including the turntable list, formats and updates the data, and then outputs the data in a video stream. In one embodiment, the virtual turntable system includes a data storage device for storing the data for the virtual turntable system, a computer system for accessing the data and creating item containers for the items on the current item list that are to be displayed on a monitor, and a video imager for creating a video stream for displaying a plurality of current items in a rotating or other sequential manner.Type: GrantFiled: November 15, 2005Date of Patent: November 29, 2011Assignee: America's Collectibles NetworkInventors: Eric L. Johnson, Paul Izbicki, Chris Dotson
-
Patent number: 7942276Abstract: A rotatable article display device for displaying an article such as a piece of jewelry or the like includes a platen defining a display surface. The platen is configured to rotate about a first axis substantially perpendicular to the display surface and a second axis parallel to the displays surface. First and second drive mechanisms, together with suitable connectors, are provided to mechanically rotate the platen about the perpendicular and parallel axes. In a method for use, at least one article of jewelry is positioned on the display surface and viewed while the platen is rotated about at least one of the perpendicular and parallel axes.Type: GrantFiled: July 31, 2007Date of Patent: May 17, 2011Inventors: Eric Johnson, Dianna Dean, Walter Walsh, III, Chris Dotson
-
Publication number: 20090032478Abstract: A rotatable article display device for displaying an article such as a piece of jewelry or the like includes a platen defining a display surface. The platen is configured to rotate about a first axis substantially perpendicular to the display surface and a second axis parallel to the displays surface. First and second drive mechanisms, together with suitable connectors, are provided to mechanically rotate the platen about the perpendicular and parallel axes. In a method for use, at least one article of jewelry is positioned on the display surface and viewed while the platen is rotated about at least one of the perpendicular and parallel axes.Type: ApplicationFiled: July 31, 2007Publication date: February 5, 2009Inventors: Eric Johnson, Dianna Dean, Walter Walsh, III, Chris Dotson