Patents by Inventor Christopher V. DeRobertis
Christopher V. DeRobertis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210034794Abstract: A system is provided. The system includes a computing resource, a cable insertable into the computing resource, a locking element and a controller. The locking element is configured to assume a locked condition in which the cable is locked to the computing resource or prevented from insertion into the computing resource and an unlocked condition in which the cable is removable from the computing resource and permitted to be inserted into the computing resource. The controller is configured to define rules for users. The rules are associated with respective identifiers (IDs) of each of the users and establish criteria associated with each user for causing the locking element to assume one of the locked and unlocked conditions.Type: ApplicationFiled: July 29, 2019Publication date: February 4, 2021Inventors: Andrew C. M. Hicks, RYAN THOMAS RAWLINS, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
-
Publication number: 20210034785Abstract: A system is provided and includes a securable resource, a locking element configured to assume a locked condition in which the securable resource is locked and an unlocked condition in which the securable resource is unlocked, a controller and a physical authentication interface. The controller is receptive of an instruction to authorize users to unlock the securable resource and configured to perform operating system (OS) level authentication of the users and OS level control of the locking element in accordance with the instruction to authorize users and the OS level authentication. The physical authentication interface is configured to enable or disable a capability of the controller to perform the OS level authentication.Type: ApplicationFiled: July 29, 2019Publication date: February 4, 2021Inventors: Andrew C. M. Hicks, RYAN THOMAS RAWLINS, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
-
Patent number: 10764330Abstract: An apparatus for managing network security includes an inventory module, a survey module, an observation module, and a security module. The inventory module identifies each node of a network. The survey module gathers information for each node of the network. The security module generates notifications to one or more users in response to the observation module detecting one or more irregularities.Type: GrantFiled: March 1, 2019Date of Patent: September 1, 2020Assignee: International Business Machines CorporationInventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
-
Patent number: 10679750Abstract: A system that includes one or more processors and one or more memories storing code that is executable by the one or more processors to: access a data log corresponding to a diet of a user over a predetermined period; determine a diet context for the user based at least in part on the data log; analyze the data log to determine a variance in the diet context; determine a potential medical issue in response to the variance; and generate predictive feedback for the user in response to the potential medical issue.Type: GrantFiled: August 9, 2016Date of Patent: June 9, 2020Assignee: International Business Machines CorporationInventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Jose R. Mosqueda Mejia, Daniel J. Winarski
-
Patent number: 10678926Abstract: An example system includes a processor to receive a source code and history information, wherein the history information includes a version control history or a defect history, or a combination of the version control history and the defect history. The processor is to also divide the source code into security-related components and security-non-related components. The processor is to further calculate security metrics for each of the security-related components and each of the security-non-related components based on the history information. The processor is also to compare the security metrics of the security-related components with the security metrics of the security-non-related components. The processor is to further generate a visual representation comprising a highlighted area of concern based on the comparison.Type: GrantFiled: January 9, 2017Date of Patent: June 9, 2020Assignee: International Business Machines CorporationInventors: Aharon Brodie, Christopher V Derobertis, Orna Raz
-
Publication number: 20200082677Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.Type: ApplicationFiled: November 13, 2019Publication date: March 12, 2020Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Donald G. Grice, Jose R. Mosqueda Mejia, Daniel J. Winarski
-
Patent number: 10586447Abstract: Smart traffic signal methods are provided. One method includes determining a stopping distance for a vehicle approaching a geographic location and, in response to determining the stopping distance, determining whether the first vehicle will stop prior to reaching the geographic location. The method further includes, in response to determining that the vehicle will not stop prior to reaching the geographic location, modifying a signal of a traffic light located at the geographic location. Systems and computer program products for performing the above method are also provided.Type: GrantFiled: July 25, 2017Date of Patent: March 10, 2020Assignee: International Business Machines CorporationInventors: Tara Astigarraga, Christopher V. DeRobertis, Itzhack Goldberg, Jose R. Mosqueda Mejia, Daniel J. Winarski
-
Patent number: 10567406Abstract: A computer-implemented method according to one embodiment includes identifying a cloud computing environment, establishing a baseline associated with input and output requests within the cloud computing environment, monitoring activity associated with the cloud computing environment, comparing the activity to the baseline, and performing one or more actions, based on the comparing.Type: GrantFiled: August 16, 2016Date of Patent: February 18, 2020Assignee: International Business Machines CorporationInventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
-
Patent number: 10529194Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.Type: GrantFiled: November 1, 2017Date of Patent: January 7, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Donald G. Grice, Jose R. Mosqueda Mejia, Daniel J. Winarski
-
Patent number: 10530791Abstract: A computer-implemented method according to one embodiment includes identifying a storage environment, establishing a baseline associated with input and output requests within the storage environment, monitoring activity associated with the storage environment, comparing the activity to the baseline, and performing one or more actions, based on the comparing.Type: GrantFiled: August 16, 2016Date of Patent: January 7, 2020Assignee: International Business Machines CorporationInventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
-
Publication number: 20190355222Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.Type: ApplicationFiled: July 30, 2019Publication date: November 21, 2019Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Donald G. Grice, Jose R. Mosqueda Mejia, Daniel J. Winarski
-
Patent number: 10424172Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.Type: GrantFiled: July 18, 2017Date of Patent: September 24, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Donald G. Grice, Jose R. Mosqueda Mejia, Daniel J. Winarski
-
Publication number: 20190207982Abstract: An apparatus for managing network security includes an inventory module, a survey module, an observation module, and a security module. The inventory module identifies each node of a network. The survey module gathers information for each node of the network. The security module generates notifications to one or more users in response to the observation module detecting one or more irregularities.Type: ApplicationFiled: March 1, 2019Publication date: July 4, 2019Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
-
Patent number: 10291709Abstract: A manager node provides discovery, translation, and mapping services for supported Ethernet protocol layers. The manager node discovers other nodes within the cloud environment and issues commands to each of the discovered nodes to obtain storage device specific information associated to storage devices communicatively connected to the discovered nodes. The storage device information obtained may include such things as device function (initiator or target), device model number, device capacity, and available storage (free), etc. When the manager node has gathered the storage device specific information it may create a list of all feasible storage devices that could be utilized within the cloud environment. The manager node may determine which of the discovered storage devices will be enabled. Subsequently, the manager node map may serve as an address translator and/or a gateway between protocols.Type: GrantFiled: May 2, 2018Date of Patent: May 14, 2019Assignee: International Business Machines CorporationInventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
-
Patent number: 10243996Abstract: An apparatus for managing network security includes an inventory module, a survey module, an observation module, and a security module. The inventory module identifies each node of a network. The survey module gathers information for each node of the network. The security module generates notifications to one or more users in response to the observation module detecting one or more irregularities.Type: GrantFiled: January 5, 2016Date of Patent: March 26, 2019Assignee: International Business Machines CorporationInventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
-
Publication number: 20190089728Abstract: A computer-implemented method according to one embodiment includes identifying a storage environment, establishing a baseline associated with input and output requests within the storage environment, monitoring activity associated with the storage environment, comparing the activity to the baseline, and performing one or more actions, based on the comparing.Type: ApplicationFiled: November 20, 2018Publication date: March 21, 2019Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Daniel J. Winarski
-
Patent number: 10229230Abstract: A SAN testing application may be provided to restrict the utilization of one or more SAN device resources. The restricted, or throttled, resource(s) enables a smaller load to stress a SAN switch to effectively emulate a larger load. Resource throttling may, for example, result in the rapid filling of switch buffers and corresponding computational stress. The emulated load allows for all ports of a SAN switch to be simultaneously tested without the need or expense of a large number computing devices stressing the SAN. The SAN device with throttled resource(s) may be located within a testing environment or may be located in a functioning SAN to determine SAN bottlenecks prior to critical loading.Type: GrantFiled: January 6, 2015Date of Patent: March 12, 2019Assignee: International Business Machines CorporationInventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Michael E. Starling, Daniel J. Winarski
-
Publication number: 20190059724Abstract: Methods, systems and computer program products for detecting contagious diseases in a wildlife population using a drone are provided. Aspects include monitoring, by a drone, a geographic area and capture images of the geographic area and analyzing the captured images to identify a deceased wildlife in a region of the geographic area. Aspects also include performing increased monitoring of the region and capture supplemental images of the region using the drone and analyzing the supplemental images to identify a number of deceased wildlife in the region. Based on a determination that number of deceased wildlife in the region, greater than a threshold number, a corrective action is taken.Type: ApplicationFiled: August 29, 2017Publication date: February 28, 2019Inventors: TARA ASTIGARRAGA, CHRISTOPHER V. DEROBERTIS, LOUIE A. DICKENS, JOSE R. MOSQUEDA MEJIA, DANIEL J. WINARSKI
-
Publication number: 20190035270Abstract: Smart traffic signal methods are provided. One method includes determining a stopping distance for a vehicle approaching a geographic location and, in response to determining the stopping distance, determining whether the first vehicle will stop prior to reaching the geographic location. The method further includes, in response to determining that the vehicle will not stop prior to reaching the geographic location, modifying a signal of a traffic light located at the geographic location. Systems and computer program products for performing the above method are also provided.Type: ApplicationFiled: July 25, 2017Publication date: January 31, 2019Inventors: Tara Astigarraga, Christopher V. DeRobertis, Itzhack Goldberg, Jose R. Mosqueda Mejia, Daniel J. Winarski
-
Publication number: 20190026997Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.Type: ApplicationFiled: November 1, 2017Publication date: January 24, 2019Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Donald G. Grice, Jose R. Mosqueda Mejia, Daniel J. Winarski