Patents by Inventor Daniel C. Gurney

Daniel C. Gurney has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10424026
    Abstract: An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network.
    Type: Grant
    Filed: March 3, 2013
    Date of Patent: September 24, 2019
    Assignee: International Business Machines Corporation
    Inventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
  • Patent number: 10083322
    Abstract: An injection engine monitors whether a pattern of a current selection of web address requests in outbound web traffic for a user matches one or more web usage patterns that allow for identifying the user based on the current selection of web address requests. The injection engine, responsive to detecting the pattern of the current selection of web address requests by the user matches the one or more web usage patterns, injects one or more random valid web address requests into the outbound web traffic for the user, wherein the one or more random valid web address requests obscure the current selection of web address requests from using the one or more web usage patterns.
    Type: Grant
    Filed: July 30, 2015
    Date of Patent: September 25, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gary Denner, Daniel C. Gurney, Liam Harpur, Brian A. O'Crowley
  • Publication number: 20170032147
    Abstract: An injection engine monitors whether a pattern of a current selection of web address requests in outbound web traffic for a user matches one or more web usage patterns that allow for identifying the user based on the current selection of web address requests. The injection engine, responsive to detecting the pattern of the current selection of web address requests by the user matches the one or more web usage patterns, injects one or more random valid web address requests into the outbound web traffic for the user, wherein the one or more random valid web address requests obscure the current selection of web address requests from using the one or more web usage patterns.
    Type: Application
    Filed: July 30, 2015
    Publication date: February 2, 2017
    Inventors: GARY DENNER, DANIEL C. GURNEY, LIAM HARPUR, BRIAN A. O'CROWLEY
  • Patent number: 9009546
    Abstract: A request is received by a first computer. The first computer delegates the first request to a second computer. The second computer attempts to process the first request and identifies an imminent fault as a result of the attempt. The second computer sends a message to the first computer indicating an imminent fault as a result of the attempted processing of the first request. The first computer sends a message to a third computer indicating that a second request matching the first request should not be processed.
    Type: Grant
    Filed: September 27, 2012
    Date of Patent: April 14, 2015
    Assignee: International Business Machines
    Inventors: Nikolaus K. Brauer, Kenneth E. Brunsen, Daniel C. Gurney, Russell L. Holden, Michael J. Kerrigan, Michael I. Killoran, Peter O. Mierswa, Chester E. Ryder, III, Vinod R. Seraphin
  • Patent number: 8812406
    Abstract: An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts.
    Type: Grant
    Filed: March 3, 2013
    Date of Patent: August 19, 2014
    Assignee: International Business Machines Corporation
    Inventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
  • Patent number: 8712921
    Abstract: An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts.
    Type: Grant
    Filed: October 3, 2011
    Date of Patent: April 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
  • Patent number: 8706648
    Abstract: An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network.
    Type: Grant
    Filed: October 3, 2011
    Date of Patent: April 22, 2014
    Assignee: International Business Machines Corporation
    Inventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
  • Patent number: 8543676
    Abstract: A router or router process directs computer network traffic by, upon receipt of an access request to a network resource, determining that the request contains at least one routing cookie; determining a cookie scope of the routing cookie; responsive to the cookie scope being unequivalent to a root value, designating the at least one routing cookie as a delegate cookie; adding a path value associated the delegate cookie to a session lookup table entry for a user associated with the network traffic; and subsequently, using the lookup table entry to determine a destination address for redirecting computer network traffic for the user having the delegate cookie to a delegated resource located in the network at the path.
    Type: Grant
    Filed: April 20, 2011
    Date of Patent: September 24, 2013
    Assignee: International Business Machines Corporation
    Inventors: Jason D LaVoie, Daniel C. Gurney, Daniel M. Jamrog, Chester E. Ryder, III
  • Publication number: 20130086254
    Abstract: An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts.
    Type: Application
    Filed: October 3, 2011
    Publication date: April 4, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
  • Publication number: 20130085953
    Abstract: An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network.
    Type: Application
    Filed: October 3, 2011
    Publication date: April 4, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Saurabh Bhola, Mark Crosbie, Gary Denner, Daniel C. Gurney, Rohit Jain
  • Patent number: 8261329
    Abstract: In some embodiments, a system includes a database of trust information that internalizes security and trust relationships between a first entity and a second entity in regards to scheduling, and a central trust manager operable to determine from the database of trust information whether a trust relationship exists between a first organization and a second organization, the central trust manager also being operable to provide availability information of a user of the first organization to a second user of the second organization, the central trust manager also being operable to determine whether the second user of the second organization is granted access to requested calendar data and the central trust manager also being operable to provide the requested calendar data.
    Type: Grant
    Filed: May 27, 2009
    Date of Patent: September 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: Daniel C. Gurney, Carol A Jones, Anthony J Nadalin, Nataraj Nagaratnam, John J Rawls, Robert L. Yates, Alfred Zollar
  • Publication number: 20110202678
    Abstract: A router or router process directs computer network traffic by, upon receipt of an access request to a network resource, determining that the request contains at least one routing cookie; determining a cookie scope of the routing cookie; responsive to the cookie scope being unequivalent to a root value, designating the at least one routing cookie as a delegate cookie; adding a path value associated the delegate cookie to a session lookup table entry for a user associated with the network traffic; and subsequently, using the lookup table entry to determine a destination address for redirecting computer network traffic for the user having the delegate cookie to a delegated resource located in the network at the path.
    Type: Application
    Filed: April 20, 2011
    Publication date: August 18, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jason D LaVoie, Daniel C. Gurney, Daniel M. Jamrog, Chester E. Ryder, III
  • Patent number: 7949957
    Abstract: An edit selection control. The edit selection control can include a drop down list box coupled to a list of entries of full textual length; an edit box coupled to the drop down list box within the edit selection control and configured to display a selected one of the entries; and, list management logic coupled to the edit box and programmed to accept through the edit box as an alternative selection to the list of entries, a manually specified entry. Importantly, the edit selection control can have a structure configurable for embedding within a markup language document.
    Type: Grant
    Filed: December 31, 2002
    Date of Patent: May 24, 2011
    Assignee: International Business Machines Corporation
    Inventors: Daniel C. Gurney, Vinod R. Seraphin
  • Publication number: 20100306824
    Abstract: In some embodiments, a system includes a database of trust information that internalizes security and trust relationships between a first entity and a second entity in regards to scheduling, and a central trust manager operable to determine from the database of trust information whether a trust relationship exists between a first organization and a second organization, the central trust manager also being operable to provide availability information of a user of the first organization to a second user of the second organization, the central trust manager also being operable to determine whether the second user of the second organization is granted access to requested calendar data and the central trust manager also being operable to provide the requested calendar data.
    Type: Application
    Filed: May 27, 2009
    Publication date: December 2, 2010
    Applicant: International Business Machines Corporation
    Inventors: Daniel C. Gurney, Carol A. Jones, Anthony J. Nadalin, Nataraj Nagaratnam, John J. Rawls, Robert L. Yates, Alfred Zollar
  • Publication number: 20080320086
    Abstract: The present invention provides a system and method for communications system, such as an instant messaging system, to allow encrypted conversations to be updated in real-time. The messages are encrypted with authentication keys or other security measures. The system and method provide the ability to modify an encrypted instant messaging conversation on the fly, where one user can seamlessly update the text without having to retype the full sentence or part of it. A sender's client may allow a sender client system to modify, for example, automatically or upon sender's input a message that has already been delivered to the recipients involved in the communication session. Once modified, the sender's client may allow the sender client system to deliver the revision to the recipients.
    Type: Application
    Filed: June 20, 2007
    Publication date: December 25, 2008
    Inventors: Sean Callanan, Gary Denner, Daniel C. Gurney, Patrick J. O'Sullivan
  • Publication number: 20040128309
    Abstract: An edit selection control. The edit selection control can include a drop down list box coupled to a list of entries of full textual length; an edit box coupled to the drop down list box within the edit selection control and configured to display a selected one of the entries; and, list management logic coupled to the edit box and programmed to accept through the edit box as an alternative selection to the list of entries, a manually specified entry. Importantly, the edit selection control can have a structure configurable for embedding within a markup language document.
    Type: Application
    Filed: December 31, 2002
    Publication date: July 1, 2004
    Applicant: International Business Machines Corporation
    Inventors: Daniel C. Gurney, Vinod R. Seraphin