Patents by Inventor Daniel E. Morris

Daniel E. Morris has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10343062
    Abstract: Updating contact information for a first communication device according to metadata associated with a virtual world is provided. In response to an avatar of a first user interacting with an avatar of a second user in the virtual world, information comprising a name of the avatar of the second user and metadata associated with the avatar of the second user is sent to the first user. In response to receiving the information, contact information associated with the name of the avatar of the second user is determined. The contact information is organized based on the metadata. The organized contact information is prioritized according to the metadata. A speed dial setting corresponding to the prioritized contact information is assigned. The assigned speed dial setting is assigned to the first communication device. The assigned speed dial setting is stored in the first communication device.
    Type: Grant
    Filed: November 3, 2015
    Date of Patent: July 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael N. Abernethy, Jr., Travis M. Grigsby, Daniel E. Morris, Nazgol Sedghi
  • Patent number: 9292702
    Abstract: Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first security configuration via a thread of execution, wherein a security configuration comprises at least one security parameter. The thread receives an incoming request. The thread switches to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request. The thread stores the second security configuration or a reference to the second security configuration to a stack. The thread authenticates the incoming request based on the second security configuration. The thread grants or denies access to the resource. The thread executes a method referenced in the incoming request. The thread restores to a first security configuration, responsive to completing the method.
    Type: Grant
    Filed: August 20, 2009
    Date of Patent: March 22, 2016
    Assignee: International Business Machines Corporation
    Inventors: Paul W. Bennett, Elisa A. Ferracane, Daniel E. Morris, Michael C. Thompson
  • Publication number: 20160051893
    Abstract: Updating contact information for a first communication device according to metadata associated with a virtual world is provided. In response to an avatar of a first user interacting with an avatar of a second user in the virtual world, information comprising a name of the avatar of the second user and metadata associated with the avatar of the second user is sent to the first user. In response to receiving the information, contact information associated with the name of the avatar of the second user is determined. The contact information is organized based on the metadata. The organized contact information is prioritized according to the metadata. A speed dial setting corresponding to the prioritized contact information is assigned. The assigned speed dial setting is assigned to the first communication device. The assigned speed dial setting is stored in the first communication device.
    Type: Application
    Filed: November 3, 2015
    Publication date: February 25, 2016
    Inventors: Michael N. Abernethy, Jr., Travis M. Grigsby, Daniel E. Morris, Nazgol Sedghi
  • Patent number: 9180372
    Abstract: The present invention provides a method, system, and computer program product for updating contact information according to metadata associated with a virtual world. In response to an avatar of a first user interacting with an avatar of a second user in a virtual world, information comprising a name of the avatar of the second user and metadata associated with the avatar of the second user is sent to the first user. In response to receiving the information, contact information associated with the name of the avatar of the second user is determined. The contact information is organized based on the metadata to form organized contact information. The organized contact information is prioritized according to the metadata to form prioritized contact information. The prioritized contact information is stored.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: November 10, 2015
    Assignee: International Business Machines Corporation
    Inventors: Michael Negley Abernethy, Jr., Travis M. Grigsby, Daniel E. Morris, Nazgol Sedghi
  • Patent number: 8522307
    Abstract: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    Type: Grant
    Filed: March 6, 2012
    Date of Patent: August 27, 2013
    Assignee: International Business Machines Corporation
    Inventors: Paul W. Bennett, Elisa Ferracane, Daniel E. Morris, Michael C. Thompson
  • Publication number: 20120198515
    Abstract: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    Type: Application
    Filed: March 6, 2012
    Publication date: August 2, 2012
    Applicant: New Orchard Road
    Inventors: PAUL W. BENNETT, Elisa Ferracane, Daniel E. Morris, Michael C. Thompson
  • Patent number: 8230478
    Abstract: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    Type: Grant
    Filed: August 27, 2009
    Date of Patent: July 24, 2012
    Assignee: International Business Machines Corporation
    Inventors: Paul W. Bennett, Elisa Ferracane, Daniel E. Morris, Michael C. Thompson
  • Publication number: 20110055926
    Abstract: A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    Type: Application
    Filed: August 27, 2009
    Publication date: March 3, 2011
    Applicant: International Business Machines Corporation
    Inventors: Paul W. Bennett, Elisa Ferracane, Daniel E. Morris, Michael C. Thompson
  • Publication number: 20110047589
    Abstract: Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first security configuration via a thread of execution, wherein a security configuration comprises at least one security parameter. The thread receives an incoming request. The thread switches to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request. The thread stores the second security configuration or a reference to the second security configuration to a stack. The thread authenticates the incoming request based on the second security configuration. The thread grants or denies access to the resource. The thread executes a method referenced in the incoming request. The thread restores to a first security configuration, responsive to completing the method.
    Type: Application
    Filed: August 20, 2009
    Publication date: February 24, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul W. Bennett, Elisa A. Ferracane, Daniel E. Morris, Michael C. Thompson
  • Patent number: 7839742
    Abstract: It has been discovered that damage to an optical disc can be used as a damage signature for that optical disc. The damage signature can be digitally represented to uniquely identify the optical disc in combination with other identifying information that identifies the optical disc. Services, such as a restore service, can be provided to a user after validation of a digital damage signature of an optical disc.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: November 23, 2010
    Assignee: International Business Machines Corporation
    Inventors: Howard Anglin, Travis M. Grigsby, Daniel E. Morris, Frank A. Nuzzi
  • Patent number: 7827165
    Abstract: Mechanisms for providing a social network aware input dictionary are provided. A social network of users is monitored to determine the words and terms utilized by the users as part of their communication and interaction within the social network. Words and terms are ranked, or prioritized, within the social network based on a determined increase/decrease in popularity of the words/terms as determined from the monitoring of the social network. Based on the ranking of these words/terms, individual input dictionaries associated with devices used by the users of the social network may be automatically updated to include/remove these words/terms and/or increase/decrease a relative priority of the words/terms within the input dictionaries. Such automatic updating may be performed regardless of whether the particular user has used the word/term or not.
    Type: Grant
    Filed: September 17, 2007
    Date of Patent: November 2, 2010
    Assignee: International Business Machines Corporation
    Inventors: Michael N. Abernethy, Jr., Travis M. Grigsby, Daniel E. Morris, Frank A. Nuzzi
  • Patent number: 7724621
    Abstract: It has been discovered that inaccurate representations of content read from an optical disc can be restored. A representation of content read from a damaged optical disc may include data that corresponds to misread data sections. The data for the misread data sections can be replaced with portions of an accurate representation of the content. The portions can be extracted from an accurate representation maintained online or at a local repository of digital representations of content.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: May 25, 2010
    Assignee: International Business Machines Corporation
    Inventors: Howard Anglin, Travis M. Grigsby, Daniel E. Morris, Frank A. Nuzzi
  • Publication number: 20090113313
    Abstract: The present invention provides a method, system, and computer program product for updating contact information according to metadata associated with a virtual world. In response to an avatar of a first user interacting with an avatar of a second user in a virtual world, information comprising a name of the avatar of the second user and metadata associated with the avatar of the second user is sent to the first user. In response to receiving the information, contact information associated with the name of the avatar of the second user is determined. The contact information is organized based on the metadata to form organized contact information. The organized contact information is prioritized according to the metadata to form prioritized contact information. The prioritized contact information is stored.
    Type: Application
    Filed: October 30, 2007
    Publication date: April 30, 2009
    Inventors: Michael Negley Abernethy, JR., Travis M. Grigsby, Daniel E. Morris, Nazgol Sedghi
  • Patent number: 7519472
    Abstract: Aggregated navigation system data can be used by an artifact repository to infer the presence of a static traffic artifact. Static traffic artifact can include traffic lights, traffic signs, special traffic zones, railroad crossings, and the like. Metric data collected from multiple global positioning systems (GPS) devices can provide sampling data for inferring a static traffic artifact on a road. Metrics can include driving behavior, travel direction, velocity, timestamps, delay, and the like. For example, if thirty percent of the data collected about an intersection indicates drivers come to a stop at an intersection, the system can infer a traffic light exists at the intersection. Each traffic artifact can have an associated confidence factor which can indicate the degree of accuracy of the inferred artifact. Confidence factor can be increased or decreased based on the re-evaluation of sample data for the artifact.
    Type: Grant
    Filed: May 15, 2008
    Date of Patent: April 14, 2009
    Assignee: International Business Machines Corporation
    Inventors: Travis M. Grigsby, Steven M. Miller, Daniel E. Morris, Lisa A. Seacat
  • Publication number: 20090077130
    Abstract: A system and method for providing a social network aware input dictionary are provided. A social network of users is monitored to determine the words and terms utilized by the users as part of their communication and interaction within the social network. Words and terms are ranked, or prioritized, within the social network based on a determined increase/decrease in popularity of the words/terms as determined from the monitoring of the social network. Based on the ranking of these words/terms, individual input dictionaries associated with devices used by the users of the social network may be automatically updated to include/remove these words/terms and/or increase/decrease a relative priority of the words/terms within the input dictionaries. Such automatic updating may be performed regardless of whether the particular user has used the word/term or not.
    Type: Application
    Filed: September 17, 2007
    Publication date: March 19, 2009
    Inventors: Michael N. Abernethy, JR., Travis M. Grigsby, Daniel E. Morris, Frank A. Nuzzi
  • Publication number: 20090034385
    Abstract: It has been discovered that damage to an optical disc can be used as a damage signature for that optical disc. The damage signature can be digitally represented to uniquely identify the optical disc in combination with other identifying information that identifies the optical disc. Services, such as a restore service, can be provided to a user after validation of a digital damage signature of an optical disc.
    Type: Application
    Filed: July 31, 2007
    Publication date: February 5, 2009
    Applicant: International Business Machines Corporation
    Inventors: Howard Anglin, Travis M. Grigsby, Daniel E. Morris, Frank A. Nuzzi
  • Publication number: 20090034386
    Abstract: It has been discovered that inaccurate representations of content read from an optical disc can be restored. A representation of content read from a damaged optical disc may include data that corresponds to misread data sections. The data for the misread data sections can be replaced with portions of an accurate representation of the content. The portions can be extracted from an accurate representation maintained online or at a local repository of digital representations of content.
    Type: Application
    Filed: July 31, 2007
    Publication date: February 5, 2009
    Applicant: International Business Machines Corporation
    Inventors: Howard Anglin, Travis M. Grigsby, Daniel E. Morris, Frank A. Nuzzi