Patents by Inventor Colette Manoni

Colette Manoni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11159307
    Abstract: An example operation may include one or more of identifying a group of blockchain member devices attempting to establish a trusted group communication channel, assigning each of the blockchain member devices public/private key pairs, publishing the public keys of the blockchain member devices in a list, identifying a request from a first blockchain member device requesting a private key, associated with a second blockchain member device, be applied to a predetermined nonce value, responsive to identifying a response to the request, verifying, via a public key assigned to the first blockchain member device, that the second blockchain member device is a trusted member of the group of blockchain member devices, and responsive to verifying the second blockchain member device is a trusted member of the group of blockchain member devices, permitting communication between the first blockchain member device and the second blockchain member device on the trusted group communication channel.
    Type: Grant
    Filed: August 8, 2018
    Date of Patent: October 26, 2021
    Assignee: International Business Machines Corporation
    Inventors: Luis Angel D. Bathen, Dulce B. Ponceleon, Marc H. Coq, Colette Manoni, Collin Walling, Corey McQuay, Eugene E. Nitka, Trent Balta
  • Patent number: 10992455
    Abstract: An example operation may include one or more of: creating a document that defines procedures to create an ad-hoc group having an original peer, to add a new peer to the ad-hoc group and to remove of one or more of the original peer and the new peer; maintaining, via a memory, a cryptographic distributed ledger based on the document and peer data associated with the ad-hoc group; encrypting the document; encrypting the cryptographic distributed ledger; providing the encrypted cryptographic distributed ledger to the ad-hoc group; decrypting the encrypted document; modifying the document; decrypting the encrypted cryptographic distributed ledger; updating the cryptographic distributed ledger; encrypting the modified document to create an encrypted modified document; encrypting the updated cryptographic distributed ledger; and providing the updated encrypted cryptographic distributed ledger to the ad-hoc group.
    Type: Grant
    Filed: August 14, 2018
    Date of Patent: April 27, 2021
    Assignee: International Business Machines Corporation
    Inventors: Collin Walling, Trent Balta, Luis Angel D. Bathen, Colette Manoni, Marc H. Coq, Eugene E. Nitka
  • Patent number: 10686844
    Abstract: An example operation may include one or more of storing a unique identification code encapsulating encoded information about a trusted group of member devices within a decentralized network, the unique identification code being generated by the trusted group of member devices, decoding the stored unique identification code to generate decoded information which verifies that the user device is a member device of the trusted group of member devices and provides contact information for other member devices of the trusted group of member devices, and establishing a communication session with the trusted group of member devices based on the contact information obtained by decoding the unique identification code.
    Type: Grant
    Filed: January 17, 2018
    Date of Patent: June 16, 2020
    Assignee: International Business Machines Corporation
    Inventors: Trent Balta, Marc H. Coq, Colette Manoni, Corey McQuay, Eugene Nitka, Collin Walling
  • Publication number: 20200059352
    Abstract: An example operation may include one or more of: creating a document that defines procedures to create an ad-hoc group having an original peer, to add a new peer to the ad-hoc group and to remove of one or more of the original peer and the new peer; maintaining, via a memory, a cryptographic distributed ledger based on the document and peer data associated with the ad-hoc group; encrypting the document; encrypting the cryptographic distributed ledger; providing the encrypted cryptographic distributed ledger to the ad-hoc group; decrypting the encrypted document; modifying the document; decrypting the encrypted cryptographic distributed ledger; updating the cryptographic distributed ledger; encrypting the modified document to create an encrypted modified document; encrypting the updated cryptographic distributed ledger; and providing the updated encrypted cryptographic distributed ledger to the ad-hoc group.
    Type: Application
    Filed: August 14, 2018
    Publication date: February 20, 2020
    Inventors: Collin Walling, Trent Balta, Luis Angel D. Bathen, Colette Manoni, Marc H. Coq, Eugene E. Nitka
  • Publication number: 20200052880
    Abstract: An example operation may include one or more of identifying a group of blockchain member devices attempting to establish a trusted group communication channel, assigning each of the blockchain member devices public/private key pairs, publishing the public keys of the blockchain member devices in a list, identifying a request from a first blockchain member device requesting a private key, associated with a second blockchain member device, be applied to a predetermined nonce value, responsive to identifying a response to the request, verifying, via a public key assigned to the first blockchain member device, that the second blockchain member device is a trusted member of the group of blockchain member devices, and responsive to verifying the second blockchain member device is a trusted member of the group of blockchain member devices, permitting communication between the first blockchain member device and the second blockchain member device on the trusted group communication channel.
    Type: Application
    Filed: August 8, 2018
    Publication date: February 13, 2020
    Inventors: Luis Angel D. Bathen, Dulce B. Ponceleon, Marc H. Coq, Colette Manoni, Collin Walling, Corey McQuay, Eugene E. Nitka, Trent Balta
  • Publication number: 20190222613
    Abstract: An example operation may include one or more of storing a unique identification code encapsulating encoded information about a trusted group of member devices within a decentralized network, the unique identification code being generated by the trusted group of member devices, decoding the stored unique identification code to generate decoded information which verifies that the user device is a member device of the trusted group of member devices and provides contact information for other member devices of the trusted group of member devices, and establishing a communication session with the trusted group of member devices based on the contact information obtained by decoding the unique identification code.
    Type: Application
    Filed: January 17, 2018
    Publication date: July 18, 2019
    Inventors: Trent Balta, Marc H. Coq, Colette Manoni, Corey McQuay, Eugene Nitka, Collin Walling
  • Patent number: 10235530
    Abstract: Techniques are provided for replicating database contents to network-enabled remote systems, and limiting such replication with respect to sensitive database contents. An indication is received that a subset of record fields in a database comprise sensitive data. The subset of indicated record fields are flagged based on the received indication. At least a portion of the database is replicated to multiple remote systems, such that for at least a first of the remote systems, data associated with a larger plurality of record fields is provided to the remote system. For at least a second of the remote systems, based on the flagging of the subset of indicated record fields, only data associated with record fields other than the flagged subset is provided to the remote system.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: March 19, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert O. Dryfoos, Christopher D. Filachek, Bradd A. Kadlecik, Colette A. Manoni
  • Publication number: 20180004968
    Abstract: Techniques are provided for replicating database contents to network-enabled remote systems, and limiting such replication with respect to sensitive database contents. An indication is received that a subset of record fields in a database comprise sensitive data. The subset of indicated record fields are flagged based on the received indication. At least a portion of the database is replicated to multiple remote systems, such that for at least a first of the remote systems, data associated with a larger plurality of record fields is provided to the remote system. For at least a second of the remote systems, based on the flagging of the subset of indicated record fields, only data associated with record fields other than the flagged subset is provided to the remote system.
    Type: Application
    Filed: June 30, 2016
    Publication date: January 4, 2018
    Inventors: Robert O. Dryfoos, Christopher D. Filachek, Bradd A. Kadlecik, Colette A. Manoni
  • Publication number: 20170124214
    Abstract: Embodiment herein relate to generating an offset information tree. The offset information tree includes a plurality of nodes. Each node further includes offset information that corresponds to a data portion of a data area. A node can be identified from the plurality of nodes in response to a request for access to the data area. Further, offset information can be determined from the node identified from the plurality of nodes and that the offset information can be utilized to directly access a desired data portion of the data area.
    Type: Application
    Filed: October 28, 2015
    Publication date: May 4, 2017
    Inventors: ROBERT O. DRYFOOS, BRADD A. KADLECIK, COLETTE A. MANONI
  • Publication number: 20170124219
    Abstract: Embodiment herein relate to generating an offset information tree. The offset information tree includes a plurality of nodes. Each node further includes offset information that corresponds to a data portion of a data area. A node can be identified from the plurality of nodes in response to a request for access to the data area. Further, offset information can be determined from the node identified from the plurality of nodes and that the offset information can be utilized to directly access a desired data portion of the data area.
    Type: Application
    Filed: June 7, 2016
    Publication date: May 4, 2017
    Inventors: ROBERT O. DRYFOOS, BRADD A. KADLECIK, COLETTE A. MANONI
  • Patent number: 9378225
    Abstract: A processor-implemented method for designing, developing, implementing and maintaining a core service related to a database is provided. The processor-implemented method may include displaying a graphical user interface and identifying, from the graphical user interface, the core service. Then the processor-implemented method may include determining, from the graphical user interface, a type of folder request based on the identified core service and accessing a folder based on the determining of the type of folder request. The processor-implemented method may further include determining a lock order based on the accessed folder; and manipulating the accessed folder based on the determining of the lock order.
    Type: Grant
    Filed: August 6, 2013
    Date of Patent: June 28, 2016
    Assignee: International Business Machines Corporation
    Inventors: Daniel S. Gritter, Glenn I. Katzen, Colette A. Manoni
  • Publication number: 20150046501
    Abstract: A processor-implemented method for designing, developing, implementing and maintaining a core service related to a database is provided. The processor-implemented method may include displaying a graphical user interface and identifying, from the graphical user interface, the core service. Then the processor-implemented method may include determining, from the graphical user interface, a type of folder request based on the identified core service and accessing a folder based on the determining of the type of folder request. The processor-implemented method may further include determining a lock order based on the accessed folder; and manipulating the accessed folder based on the determining of the lock order.
    Type: Application
    Filed: August 6, 2013
    Publication date: February 12, 2015
    Applicant: International Business Machines Corporation
    Inventors: Daniel S. Gritter, Glenn I. Katzen, Colette A. Manoni
  • Patent number: 8949868
    Abstract: A method of dynamic linkage including: receiving a request to launch a program; checking a system memory for the program; reserving a unique memory block of the system memory for the program and loading the program into the unique memory block if the program is not found in the memory of the system; performing internal memory relocations for the program if the program is not found in the memory of the system; ensuring that a library required by the program has been loaded into the system memory if the program is not found in the memory of the system; and invoking the program.
    Type: Grant
    Filed: July 10, 2006
    Date of Patent: February 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Robert O. Dryfoos, Dennis Fallon, Colette A. Manoni, Mark Spies
  • Patent number: 8769517
    Abstract: A common symbol table is generated, which includes symbols of a plurality of independent applications. The symbols included in the common symbol table are common symbols of the applications. The bulky information associated with the common symbols are stored in the common symbol table, and stubs used to locate the common symbols are stored in local tables of the applications.
    Type: Grant
    Filed: March 15, 2002
    Date of Patent: July 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: Barry M. Baker, Robert O. Dryfoos, Daniel S. Gritter, Colette A. Manoni, Sunil Shenoi, Gerald B. Strait, Yuk S. Tam, Mei-Hui Wang
  • Patent number: 8769706
    Abstract: A system, method and computer program product for a user to verify that a network resource address is trusted. At least one entity registration is stored at a server. Each entity registration comprises an identity of an entity and entity addressing information associated with the identity of the entity. The existence of at least one entity whose identity is included in the at least one entity registration is confirmed. A query comprising a target addressing information is received from a client. If the target addressing information matches the entity addressing information, the identity of the entity associated with the entity addressing information is determined and a result comprising the identity of the entity associated with the entity addressing information matching the target addressing information is transmitted to the client. If no entity addressing information matches the target addressing information, an indication of such is transmitted to the client.
    Type: Grant
    Filed: July 26, 2007
    Date of Patent: July 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: Hong Deng, Jodi E. Everdon, Colette A. Manoni, Renata Rand McFadden, Jennifer A. Thompson
  • Patent number: 8549233
    Abstract: Managing shared data objects to share data between computer processes, including a method for executing a plurality of independent processes on an application server, the processes including a first process and a second process. A shared memory utilized by the plurality of independent processes is provided. A single copy of the data and metadata are stored in the shared memory. The metadata includes an address of the data. The first process initiates the storing of the data in the shared memory. An address of the metadata is transferred from the first process to the second process to notify the second process about the data. The second process determines the address of the shared memory by reading the metadata. The data in the shared memory is accessed by the second process.
    Type: Grant
    Filed: November 5, 2012
    Date of Patent: October 1, 2013
    Assignee: International Business Machines Corporation
    Inventors: Barry P. Gower, Daniel S. Gritter, Colette A. Manoni, Matthew J. Sykes
  • Patent number: 8443154
    Abstract: A system for sharing data between computer processes. The system includes a processor configured to implement a method that includes executing a plurality of independent processes on an application server, the processes including a first process and a second process. A shared memory utilized by the plurality of independent processes is provided. A single copy of the data and metadata are stored in the shared memory. The metadata includes an address of the data. The first process initiates the storing of the data in the shared memory. An address of the metadata is transferred from the first process to the second process to notify the second process about the data. The second process determines the address of the shared memory by reading the metadata. The data in the shared memory is accessed by the second process.
    Type: Grant
    Filed: December 28, 2010
    Date of Patent: May 14, 2013
    Assignee: International Business Machines Corporation
    Inventors: Barry P. Gower, Daniel S. Gritter, Colette A. Manoni, Matthew J. Sykes
  • Patent number: 8261263
    Abstract: In an embodiment of the present invention the Java Virtual Machine (JVM) System Scope Initializer works on the premise of generating one JVM instance to be used by all processes system wide. An advantage in the present invention is that all processes that would normally otherwise have to instantiate a JVM, which can be on the order of millions of instructions (per process) can in large part be avoided realizing instead a tremendous system resource savings system wide. Another advantage can be that all processes that would normally otherwise have to instantiate a JVM, which can have a memory footprint on the order of megabytes (per process), can share the same memory view again realizing tremendous system resource savings system wide.
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: September 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: Dennis J. Fallon, James D. Johnston, Jr., Colette A. Manoni, Sarat Vemuri
  • Publication number: 20120166738
    Abstract: A system for sharing data between computer processes. The system includes a processor configured to implement a method that includes executing a plurality of independent processes on an application server, the processes including a first process and a second process. A shared memory utilized by the plurality of independent processes is provided. A single copy of the data and metadata are stored in the shared memory. The metadata includes an address of the data. The first process initiates the storing of the data in the shared memory. An address of the metadata is transferred from the first process to the second process to notify the second process about the data. The second process determines the address of the shared memory by reading the metadata. The data in the shared memory is accessed by the second process.
    Type: Application
    Filed: December 28, 2010
    Publication date: June 28, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Barry P. Gower, Daniel S. Gritter, Colette A. Manoni, Matthew J. Sykes
  • Publication number: 20090031033
    Abstract: A system, method and computer program product for a user to verify that a network resource address is trusted. At least one entity registration is stored at a server. Each entity registration comprises an identity of an entity and entity addressing information associated with the identity of the entity. The existence of at least one entity whose identity is included in the at least one entity registration is confirmed. A query comprising a target addressing information is received from a client. If the target addressing information matches the entity addressing information, the identity of the entity associated with the entity addressing information is determined and a result comprising the identity of the entity associated with the entity addressing information matching the target addressing information is transmitted to the client. If no entity addressing information matches the target addressing information, an indication of such is transmitted to the client.
    Type: Application
    Filed: July 26, 2007
    Publication date: January 29, 2009
    Applicant: International Business Machines Corporation
    Inventors: Hong Deng, Jodi E. Everdon, Colette A. Manoni, Renata Rand McFadden, Jennifer A. Thompson