Patents by Inventor Christopher J. Hockings
Christopher J. Hockings has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9426241Abstract: A request for a first resource by a user is received. In response to receiving the request for a first resource, a second resource is determined based on the first resource and a resource usage pattern of the user. A response to the request for the first resource is provided. The response includes the first resource and the second resource.Type: GrantFiled: February 11, 2016Date of Patent: August 23, 2016Assignee: International Business Machines CorporationInventors: Ann-Louise Bolger, Scott A. Exton, Yaqian Fang, Christopher J. Hockings
-
Publication number: 20160224781Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.Type: ApplicationFiled: January 30, 2015Publication date: August 4, 2016Inventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A.J. Nye
-
Publication number: 20160226914Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.Type: ApplicationFiled: May 27, 2015Publication date: August 4, 2016Inventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A.J. Nye
-
Patent number: 9350726Abstract: An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a client device. The token pair (B) includes an access token (a2) and a refresh token (r2) and is generated as part of a refresh operation. An aspect also includes storing, in the memory device, a refresh token (r1) that was generated by the server computer before generation of the token pair B. The refresh token (r1) and the refresh token (r2) are each tagged as a valid refresh token. An aspect further includes receiving, at the server computer, a request to access a network resource that includes the access token (a2), invalidating the refresh token (r1), and providing the client device with access to the network resource.Type: GrantFiled: September 11, 2014Date of Patent: May 24, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher J. Hockings, Trevor S. Norvill, Philip A. Nye, Asha Shivalingaiah, Patrick R. Wardrop, Shane B. Weeden
-
Patent number: 9350739Abstract: An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a client device. The token pair (B) includes an access token (a2) and a refresh token (r2) and is generated as part of a refresh operation. An aspect also includes storing, in the memory device, a refresh token (r1) that was generated by the server computer before generation of the token pair B. The refresh token (r1) and the refresh token (r2) are each tagged as a valid refresh token. An aspect further includes receiving, at the server computer, a request to access a network resource that includes the access token (a2), invalidating the refresh token (r1), and providing the client device with access to the network resource.Type: GrantFiled: April 10, 2015Date of Patent: May 24, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher J. Hockings, Trevor S. Norvill, Philip A. Nye, Asha Shivalingaiah, Patrick R. Wardrop, Shane B. Weeden
-
Publication number: 20160080354Abstract: An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a client device. The token pair (B) includes an access token (a2) and a refresh token (r2) and is generated as part of a refresh operation. An aspect also includes storing, in the memory device, a refresh token (r1) that was generated by the server computer before generation of the token pair B. The refresh token (r1) and the refresh token (r2) are each tagged as a valid refresh token. An aspect further includes receiving, at the server computer, a request to access a network resource that includes the access token (a2), invalidating the refresh token (r1), and providing the client device with access to the network resource.Type: ApplicationFiled: September 11, 2014Publication date: March 17, 2016Inventors: Christopher J. Hockings, Trevor S. Norvill, Philip A. Nye, Asha Shivalingaiah, Patrick R. Wardrop, Shane B. Weeden
-
Publication number: 20160080383Abstract: An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a client device. The token pair (B) includes an access token (a2) and a refresh token (r2) and is generated as part of a refresh operation. An aspect also includes storing, in the memory device, a refresh token (r1) that was generated by the server computer before generation of the token pair B. The refresh token (r1) and the refresh token (r2) are each tagged as a valid refresh token. An aspect further includes receiving, at the server computer, a request to access a network resource that includes the access token (a2), invalidating the refresh token (r1), and providing the client device with access to the network resource.Type: ApplicationFiled: April 10, 2015Publication date: March 17, 2016Inventors: Christopher J. Hockings, Trevor S. Norvill, Philip A. Nye, Asha Shivalingaiah, Patrick R. Wardrop, Shane B. Weeden
-
Publication number: 20160036955Abstract: A mechanism is provided for authenticating a second terminal based on information sensed by a first terminal. Responsive to receiving an authentication request, a first output request is sent to a second terminal instructing the second terminal to generate information able to be sensed by a sensor in a first terminal. An authentication of the authentication request is performed based on a condition that the sensor in the first terminal has sensed the information generated by the second terminal.Type: ApplicationFiled: July 21, 2015Publication date: February 4, 2016Inventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
-
Publication number: 20160034685Abstract: A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the information processing device via a network is acquired. On the basis of the acquired statuses, at least one item is selected from a group comprising the terminal serving as a destination for the password, the communication method with the terminal, or the method for inputting the password in the terminal. The password is then sent to the selected terminal via a network.Type: ApplicationFiled: July 17, 2015Publication date: February 4, 2016Inventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
-
Publication number: 20150373031Abstract: Monitoring across multiple-channels, used by multiple devices, to determine which email messages being sent to a user are solicited by the user. A broad spectrum of network and telephony access records are analyzed to determine whether an email message is likely being sent as a result of legitimate services access by the user.Type: ApplicationFiled: June 24, 2014Publication date: December 24, 2015Inventors: Christopher J. Hockings, Neil I. Readshaw
-
Patent number: 9154507Abstract: A role and entitlements mining system uses network intelligence to facilitate role definition. The system records traffic on a network. The traffic is analyzed to identify the user and application involved. The matched data is then provided to an analytics engine, which analyzes that data to attempt to derive an initial set of one or more roles and the application entitlements for each role. Each role derived by the analytics engine identifies one or more users who are identified as belonging to the role, as well as one or more application entitlements. Preferably, one or more directory services are then interrogated for known group and user relationships to detect whether the roles identified by the analytics engine can be modified or enriched. Evaluation of the known group and user relationships provides a way to identify a more granular set of role definitions. A role-based access control policy is then generated.Type: GrantFiled: October 15, 2012Date of Patent: October 6, 2015Assignee: International Business Machines CorporationInventors: Paul A. Ashley, John W. Court, Christopher J. Hockings
-
Patent number: 9043779Abstract: A binary library overload instruction is received at an embedded computing device that executes a write-protected firmware build. The binary library overload instruction specifies a write-protected binary library of the write-protected firmware build to be overloaded by execution of an alternative binary library instead of the write-protected binary library of the write-protected firmware build. The alternative binary library is configured within a random access memory (RAM) storage area to execute instead of the write-protected binary library as specified in the received binary library overload instruction. The write-protected firmware build is executed using the alternative binary library instead of the write-protected binary library specified in the binary library overload instruction.Type: GrantFiled: October 15, 2013Date of Patent: May 26, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott A. Exton, Anthony B. Ferguson, Christopher J. Hockings, Davin J. Holmes
-
Patent number: 8930936Abstract: A binary library overload instruction is received at an embedded computing device that executes a write-protected firmware build. The binary library overload instruction specifies a write-protected binary library of the write-protected firmware build to be overloaded by execution of an alternative binary library instead of the write-protected binary library of the write-protected firmware build. The alternative binary library is configured within a random access memory (RAM) storage area to execute instead of the write-protected binary library as specified in the received binary library overload instruction. The write-protected firmware build is executed using the alternative binary library instead of the write-protected binary library specified in the binary library overload instruction.Type: GrantFiled: November 6, 2012Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Scott A. Exton, Anthony B. Ferguson, Christopher J. Hockings, Davin J. Holmes
-
Publication number: 20140380478Abstract: A computer detects fraudulent access to user accounts of a network application. The computer receives user account usage profile information for a plurality of user accounts. Rules are determined, based in part on the user account profile information, that define account usage patterns across two or more user accounts that identify fraudulent user account usage. The computer receives user account usage event information for a plurality of user accounts. Based on the determined rules, the computer identifies fraudulent user account usage patterns in the user account usage event information and transmits a security alert to the user accounts associated with the identified fraudulent user account usage pattern.Type: ApplicationFiled: September 5, 2014Publication date: December 25, 2014Inventors: Simon G. Canning, Christopher J. Hockings, Philip A. J. Nye
-
Publication number: 20140380475Abstract: A computer detects fraudulent access to user accounts of a network application. The computer receives user account usage profile information for a plurality of user accounts. Rules are determined, based in part on the user account profile information, that define account usage patterns across two or more user accounts that identify fraudulent user account usage. The computer receives user account usage event information for a plurality of user accounts. Based on the determined rules, the computer identifies fraudulent user account usage patterns in the user account usage event information and transmits a security alert to the user accounts associated with the identified fraudulent user account usage pattern.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Inventors: Simon G. Canning, Christopher J. Hockings, Philip A. J. Nye
-
Patent number: 8904547Abstract: A system and method for protecting a user from offensive behavior in communications and notifying the user and/or an enforcement entity of the offensive behavior. The offensive content analysis system monitors communications between users for offensive behavior. The offensive content analysis system may measure the level of current offense in the communication and determine a historical offensive behavior pattern for the user. The offensive content analysis system may then determine if the offensive behavior, both current and historical, rises to a threshold behavior level. The offensive content analysis system may take notification action if the offensive behavior meets the threshold level.Type: GrantFiled: January 5, 2009Date of Patent: December 2, 2014Assignee: International Business Machines CorporationInventors: Leigh T. Doddy, Christopher J. Hockings
-
Publication number: 20140130030Abstract: A binary library overload instruction is received at an embedded computing device that executes a write-protected firmware build. The binary library overload instruction specifies a write-protected binary library of the write-protected firmware build to be overloaded by execution of an alternative binary library instead of the write-protected binary library of the write-protected firmware build. The alternative binary library is configured within a random access memory (RAM) storage area to execute instead of the write-protected binary library as specified in the received binary library overload instruction. The write-protected firmware build is executed using the alternative binary library instead of the write-protected binary library specified in the binary library overload instruction.Type: ApplicationFiled: November 6, 2012Publication date: May 8, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott A. Exton, Anthony B. Ferguson, Christopher J. Hockings, Davin J. Holmes
-
Publication number: 20140130031Abstract: A binary library overload instruction is received at an embedded computing device that executes a write-protected firmware build. The binary library overload instruction specifies a write-protected binary library of the write-protected firmware build to be overloaded by execution of an alternative binary library instead of the write-protected binary library of the write-protected firmware build. The alternative binary library is configured within a random access memory (RAM) storage area to execute instead of the write-protected binary library as specified in the received binary library overload instruction. The write-protected firmware build is executed using the alternative binary library instead of the write-protected binary library specified in the binary library overload instruction.Type: ApplicationFiled: October 15, 2013Publication date: May 8, 2014Applicant: International Business Machines CorporationInventors: Scott A. Exton, Anthony B. Ferguson, Christopher J. Hockings, Davin J. Holmes
-
Patent number: 8468585Abstract: An identity management (“IdM”) system can change the credentials at certain intervals. If credentials change, there is no way for an application that uses the credentials to know that the credentials have changed because the application dependency relationships are unknown. When service account credentials change, credentials are typically manually updated for each dependent application. Some embodiments of the inventive subject matter allow IdM systems to track application dependencies for service accounts. The IdM systems can detect when service account credentials change and automatically notify dependent applications of the new service account credentials.Type: GrantFiled: January 5, 2009Date of Patent: June 18, 2013Assignee: International Business Machines CorporationInventors: Christopher Y. Choi, Christopher J. Hockings, Neil I. Readshaw
-
Patent number: 8229765Abstract: A drug interaction utility can retrieve the patient's current medications from a medication information card on the smart card by interacting with an identity selector on the provider's computer. The identity selector can transmit the current medications to the drug interaction utility without disclosing any information about the current medications to the provider and without disclosing any information identifying the patient to the drug interaction utility.Type: GrantFiled: April 23, 2009Date of Patent: July 24, 2012Assignee: International Business Machines CorporationInventors: Christopher Y. Choi, Christopher J. Hockings, Neil I. Readshaw