Patents by Inventor Daniel C. Gurney
Daniel C. Gurney has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10424026Abstract: An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network.Type: GrantFiled: March 3, 2013Date of Patent: September 24, 2019Assignee: International Business Machines CorporationInventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
-
Patent number: 10083322Abstract: An injection engine monitors whether a pattern of a current selection of web address requests in outbound web traffic for a user matches one or more web usage patterns that allow for identifying the user based on the current selection of web address requests. The injection engine, responsive to detecting the pattern of the current selection of web address requests by the user matches the one or more web usage patterns, injects one or more random valid web address requests into the outbound web traffic for the user, wherein the one or more random valid web address requests obscure the current selection of web address requests from using the one or more web usage patterns.Type: GrantFiled: July 30, 2015Date of Patent: September 25, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gary Denner, Daniel C. Gurney, Liam Harpur, Brian A. O'Crowley
-
Publication number: 20170032147Abstract: An injection engine monitors whether a pattern of a current selection of web address requests in outbound web traffic for a user matches one or more web usage patterns that allow for identifying the user based on the current selection of web address requests. The injection engine, responsive to detecting the pattern of the current selection of web address requests by the user matches the one or more web usage patterns, injects one or more random valid web address requests into the outbound web traffic for the user, wherein the one or more random valid web address requests obscure the current selection of web address requests from using the one or more web usage patterns.Type: ApplicationFiled: July 30, 2015Publication date: February 2, 2017Inventors: GARY DENNER, DANIEL C. GURNEY, LIAM HARPUR, BRIAN A. O'CROWLEY
-
Patent number: 9009546Abstract: A request is received by a first computer. The first computer delegates the first request to a second computer. The second computer attempts to process the first request and identifies an imminent fault as a result of the attempt. The second computer sends a message to the first computer indicating an imminent fault as a result of the attempted processing of the first request. The first computer sends a message to a third computer indicating that a second request matching the first request should not be processed.Type: GrantFiled: September 27, 2012Date of Patent: April 14, 2015Assignee: International Business MachinesInventors: Nikolaus K. Brauer, Kenneth E. Brunsen, Daniel C. Gurney, Russell L. Holden, Michael J. Kerrigan, Michael I. Killoran, Peter O. Mierswa, Chester E. Ryder, III, Vinod R. Seraphin
-
Patent number: 8812406Abstract: An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts.Type: GrantFiled: March 3, 2013Date of Patent: August 19, 2014Assignee: International Business Machines CorporationInventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
-
Patent number: 8712921Abstract: An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts.Type: GrantFiled: October 3, 2011Date of Patent: April 29, 2014Assignee: International Business Machines CorporationInventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
-
Patent number: 8706648Abstract: An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network.Type: GrantFiled: October 3, 2011Date of Patent: April 22, 2014Assignee: International Business Machines CorporationInventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
-
Patent number: 8543676Abstract: A router or router process directs computer network traffic by, upon receipt of an access request to a network resource, determining that the request contains at least one routing cookie; determining a cookie scope of the routing cookie; responsive to the cookie scope being unequivalent to a root value, designating the at least one routing cookie as a delegate cookie; adding a path value associated the delegate cookie to a session lookup table entry for a user associated with the network traffic; and subsequently, using the lookup table entry to determine a destination address for redirecting computer network traffic for the user having the delegate cookie to a delegated resource located in the network at the path.Type: GrantFiled: April 20, 2011Date of Patent: September 24, 2013Assignee: International Business Machines CorporationInventors: Jason D LaVoie, Daniel C. Gurney, Daniel M. Jamrog, Chester E. Ryder, III
-
Publication number: 20130086254Abstract: An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts.Type: ApplicationFiled: October 3, 2011Publication date: April 4, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
-
Publication number: 20130085953Abstract: An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network.Type: ApplicationFiled: October 3, 2011Publication date: April 4, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
-
Patent number: 8261329Abstract: In some embodiments, a system includes a database of trust information that internalizes security and trust relationships between a first entity and a second entity in regards to scheduling, and a central trust manager operable to determine from the database of trust information whether a trust relationship exists between a first organization and a second organization, the central trust manager also being operable to provide availability information of a user of the first organization to a second user of the second organization, the central trust manager also being operable to determine whether the second user of the second organization is granted access to requested calendar data and the central trust manager also being operable to provide the requested calendar data.Type: GrantFiled: May 27, 2009Date of Patent: September 4, 2012Assignee: International Business Machines CorporationInventors: Daniel C. Gurney, Carol A Jones, Anthony J Nadalin, Nataraj Nagaratnam, John J Rawls, Robert L. Yates, Alfred Zollar
-
Publication number: 20110202678Abstract: A router or router process directs computer network traffic by, upon receipt of an access request to a network resource, determining that the request contains at least one routing cookie; determining a cookie scope of the routing cookie; responsive to the cookie scope being unequivalent to a root value, designating the at least one routing cookie as a delegate cookie; adding a path value associated the delegate cookie to a session lookup table entry for a user associated with the network traffic; and subsequently, using the lookup table entry to determine a destination address for redirecting computer network traffic for the user having the delegate cookie to a delegated resource located in the network at the path.Type: ApplicationFiled: April 20, 2011Publication date: August 18, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason D LaVoie, Daniel C. Gurney, Daniel M. Jamrog, Chester E. Ryder, III
-
Patent number: 7949957Abstract: An edit selection control. The edit selection control can include a drop down list box coupled to a list of entries of full textual length; an edit box coupled to the drop down list box within the edit selection control and configured to display a selected one of the entries; and, list management logic coupled to the edit box and programmed to accept through the edit box as an alternative selection to the list of entries, a manually specified entry. Importantly, the edit selection control can have a structure configurable for embedding within a markup language document.Type: GrantFiled: December 31, 2002Date of Patent: May 24, 2011Assignee: International Business Machines CorporationInventors: Daniel C. Gurney, Vinod R. Seraphin
-
Publication number: 20100306824Abstract: In some embodiments, a system includes a database of trust information that internalizes security and trust relationships between a first entity and a second entity in regards to scheduling, and a central trust manager operable to determine from the database of trust information whether a trust relationship exists between a first organization and a second organization, the central trust manager also being operable to provide availability information of a user of the first organization to a second user of the second organization, the central trust manager also being operable to determine whether the second user of the second organization is granted access to requested calendar data and the central trust manager also being operable to provide the requested calendar data.Type: ApplicationFiled: May 27, 2009Publication date: December 2, 2010Applicant: International Business Machines CorporationInventors: Daniel C. Gurney, Carol A. Jones, Anthony J. Nadalin, Nataraj Nagaratnam, John J. Rawls, Robert L. Yates, Alfred Zollar
-
Publication number: 20080320086Abstract: The present invention provides a system and method for communications system, such as an instant messaging system, to allow encrypted conversations to be updated in real-time. The messages are encrypted with authentication keys or other security measures. The system and method provide the ability to modify an encrypted instant messaging conversation on the fly, where one user can seamlessly update the text without having to retype the full sentence or part of it. A sender's client may allow a sender client system to modify, for example, automatically or upon sender's input a message that has already been delivered to the recipients involved in the communication session. Once modified, the sender's client may allow the sender client system to deliver the revision to the recipients.Type: ApplicationFiled: June 20, 2007Publication date: December 25, 2008Inventors: Sean Callanan, Gary Denner, Daniel C. Gurney, Patrick J. O'Sullivan
-
Publication number: 20040128309Abstract: An edit selection control. The edit selection control can include a drop down list box coupled to a list of entries of full textual length; an edit box coupled to the drop down list box within the edit selection control and configured to display a selected one of the entries; and, list management logic coupled to the edit box and programmed to accept through the edit box as an alternative selection to the list of entries, a manually specified entry. Importantly, the edit selection control can have a structure configurable for embedding within a markup language document.Type: ApplicationFiled: December 31, 2002Publication date: July 1, 2004Applicant: International Business Machines CorporationInventors: Daniel C. Gurney, Vinod R. Seraphin