Patents by Inventor Christopher V. DeRobertis

Christopher V. DeRobertis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210034794
    Abstract: A system is provided. The system includes a computing resource, a cable insertable into the computing resource, a locking element and a controller. The locking element is configured to assume a locked condition in which the cable is locked to the computing resource or prevented from insertion into the computing resource and an unlocked condition in which the cable is removable from the computing resource and permitted to be inserted into the computing resource. The controller is configured to define rules for users. The rules are associated with respective identifiers (IDs) of each of the users and establish criteria associated with each user for causing the locking element to assume one of the locked and unlocked conditions.
    Type: Application
    Filed: July 29, 2019
    Publication date: February 4, 2021
    Inventors: Andrew C. M. Hicks, RYAN THOMAS RAWLINS, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Publication number: 20210034785
    Abstract: A system is provided and includes a securable resource, a locking element configured to assume a locked condition in which the securable resource is locked and an unlocked condition in which the securable resource is unlocked, a controller and a physical authentication interface. The controller is receptive of an instruction to authorize users to unlock the securable resource and configured to perform operating system (OS) level authentication of the users and OS level control of the locking element in accordance with the instruction to authorize users and the OS level authentication. The physical authentication interface is configured to enable or disable a capability of the controller to perform the OS level authentication.
    Type: Application
    Filed: July 29, 2019
    Publication date: February 4, 2021
    Inventors: Andrew C. M. Hicks, RYAN THOMAS RAWLINS, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Patent number: 10764330
    Abstract: An apparatus for managing network security includes an inventory module, a survey module, an observation module, and a security module. The inventory module identifies each node of a network. The survey module gathers information for each node of the network. The security module generates notifications to one or more users in response to the observation module detecting one or more irregularities.
    Type: Grant
    Filed: March 1, 2019
    Date of Patent: September 1, 2020
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
  • Patent number: 10679750
    Abstract: A system that includes one or more processors and one or more memories storing code that is executable by the one or more processors to: access a data log corresponding to a diet of a user over a predetermined period; determine a diet context for the user based at least in part on the data log; analyze the data log to determine a variance in the diet context; determine a potential medical issue in response to the variance; and generate predictive feedback for the user in response to the potential medical issue.
    Type: Grant
    Filed: August 9, 2016
    Date of Patent: June 9, 2020
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Patent number: 10678926
    Abstract: An example system includes a processor to receive a source code and history information, wherein the history information includes a version control history or a defect history, or a combination of the version control history and the defect history. The processor is to also divide the source code into security-related components and security-non-related components. The processor is to further calculate security metrics for each of the security-related components and each of the security-non-related components based on the history information. The processor is also to compare the security metrics of the security-related components with the security metrics of the security-non-related components. The processor is to further generate a visual representation comprising a highlighted area of concern based on the comparison.
    Type: Grant
    Filed: January 9, 2017
    Date of Patent: June 9, 2020
    Assignee: International Business Machines Corporation
    Inventors: Aharon Brodie, Christopher V Derobertis, Orna Raz
  • Publication number: 20200082677
    Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.
    Type: Application
    Filed: November 13, 2019
    Publication date: March 12, 2020
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Donald G. Grice, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Patent number: 10586447
    Abstract: Smart traffic signal methods are provided. One method includes determining a stopping distance for a vehicle approaching a geographic location and, in response to determining the stopping distance, determining whether the first vehicle will stop prior to reaching the geographic location. The method further includes, in response to determining that the vehicle will not stop prior to reaching the geographic location, modifying a signal of a traffic light located at the geographic location. Systems and computer program products for performing the above method are also provided.
    Type: Grant
    Filed: July 25, 2017
    Date of Patent: March 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Itzhack Goldberg, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Patent number: 10567406
    Abstract: A computer-implemented method according to one embodiment includes identifying a cloud computing environment, establishing a baseline associated with input and output requests within the cloud computing environment, monitoring activity associated with the cloud computing environment, comparing the activity to the baseline, and performing one or more actions, based on the comparing.
    Type: Grant
    Filed: August 16, 2016
    Date of Patent: February 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
  • Patent number: 10529194
    Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.
    Type: Grant
    Filed: November 1, 2017
    Date of Patent: January 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Donald G. Grice, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Patent number: 10530791
    Abstract: A computer-implemented method according to one embodiment includes identifying a storage environment, establishing a baseline associated with input and output requests within the storage environment, monitoring activity associated with the storage environment, comparing the activity to the baseline, and performing one or more actions, based on the comparing.
    Type: Grant
    Filed: August 16, 2016
    Date of Patent: January 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
  • Publication number: 20190355222
    Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.
    Type: Application
    Filed: July 30, 2019
    Publication date: November 21, 2019
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Donald G. Grice, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Patent number: 10424172
    Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.
    Type: Grant
    Filed: July 18, 2017
    Date of Patent: September 24, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Donald G. Grice, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Publication number: 20190207982
    Abstract: An apparatus for managing network security includes an inventory module, a survey module, an observation module, and a security module. The inventory module identifies each node of a network. The survey module gathers information for each node of the network. The security module generates notifications to one or more users in response to the observation module detecting one or more irregularities.
    Type: Application
    Filed: March 1, 2019
    Publication date: July 4, 2019
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
  • Patent number: 10291709
    Abstract: A manager node provides discovery, translation, and mapping services for supported Ethernet protocol layers. The manager node discovers other nodes within the cloud environment and issues commands to each of the discovered nodes to obtain storage device specific information associated to storage devices communicatively connected to the discovered nodes. The storage device information obtained may include such things as device function (initiator or target), device model number, device capacity, and available storage (free), etc. When the manager node has gathered the storage device specific information it may create a list of all feasible storage devices that could be utilized within the cloud environment. The manager node may determine which of the discovered storage devices will be enabled. Subsequently, the manager node map may serve as an address translator and/or a gateway between protocols.
    Type: Grant
    Filed: May 2, 2018
    Date of Patent: May 14, 2019
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
  • Patent number: 10243996
    Abstract: An apparatus for managing network security includes an inventory module, a survey module, an observation module, and a security module. The inventory module identifies each node of a network. The survey module gathers information for each node of the network. The security module generates notifications to one or more users in response to the observation module detecting one or more irregularities.
    Type: Grant
    Filed: January 5, 2016
    Date of Patent: March 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
  • Publication number: 20190089728
    Abstract: A computer-implemented method according to one embodiment includes identifying a storage environment, establishing a baseline associated with input and output requests within the storage environment, monitoring activity associated with the storage environment, comparing the activity to the baseline, and performing one or more actions, based on the comparing.
    Type: Application
    Filed: November 20, 2018
    Publication date: March 21, 2019
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
  • Patent number: 10229230
    Abstract: A SAN testing application may be provided to restrict the utilization of one or more SAN device resources. The restricted, or throttled, resource(s) enables a smaller load to stress a SAN switch to effectively emulate a larger load. Resource throttling may, for example, result in the rapid filling of switch buffers and corresponding computational stress. The emulated load allows for all ports of a SAN switch to be simultaneously tested without the need or expense of a large number computing devices stressing the SAN. The SAN device with throttled resource(s) may be located within a testing environment or may be located in a functioning SAN to determine SAN bottlenecks prior to critical loading.
    Type: Grant
    Filed: January 6, 2015
    Date of Patent: March 12, 2019
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Michael E. Starling, Daniel J. Winarski
  • Publication number: 20190059724
    Abstract: Methods, systems and computer program products for detecting contagious diseases in a wildlife population using a drone are provided. Aspects include monitoring, by a drone, a geographic area and capture images of the geographic area and analyzing the captured images to identify a deceased wildlife in a region of the geographic area. Aspects also include performing increased monitoring of the region and capture supplemental images of the region using the drone and analyzing the supplemental images to identify a number of deceased wildlife in the region. Based on a determination that number of deceased wildlife in the region, greater than a threshold number, a corrective action is taken.
    Type: Application
    Filed: August 29, 2017
    Publication date: February 28, 2019
    Inventors: TARA ASTIGARRAGA, CHRISTOPHER V. DEROBERTIS, LOUIE A. DICKENS, JOSE R. MOSQUEDA MEJIA, DANIEL J. WINARSKI
  • Publication number: 20190035270
    Abstract: Smart traffic signal methods are provided. One method includes determining a stopping distance for a vehicle approaching a geographic location and, in response to determining the stopping distance, determining whether the first vehicle will stop prior to reaching the geographic location. The method further includes, in response to determining that the vehicle will not stop prior to reaching the geographic location, modifying a signal of a traffic light located at the geographic location. Systems and computer program products for performing the above method are also provided.
    Type: Application
    Filed: July 25, 2017
    Publication date: January 31, 2019
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Itzhack Goldberg, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Publication number: 20190026997
    Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.
    Type: Application
    Filed: November 1, 2017
    Publication date: January 24, 2019
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Donald G. Grice, Jose R. Mosqueda Mejia, Daniel J. Winarski