Patents by Inventor David B. Kumhyr

David B. Kumhyr has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10356075
    Abstract: A method, a computing system and a computer program product are provided. A computing device identifies a credential of a first entity and determines one or more second entities, each electronically verifying the credential of the first entity. The computing device determines one or more third entities, each electronically verifying one or more from a group of second entities and other ones of the third entities, wherein the second and third entities form a set of chains of verification from the first entity. The computing device analyzes the set of chains of verification to detect one or more loops within the set of chains among the second and third entities. A verification of the credential is generated by the computing device based on detection of a trusted entity within one of the set of chains and not detecting a loop within the one of the set of chains.
    Type: Grant
    Filed: March 15, 2017
    Date of Patent: July 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Rahul Gupta, David B. Kumhyr, Hari H. Madduri, Maharaj Mukherjee
  • Publication number: 20190166125
    Abstract: Mechanisms are provided for providing a private consolidated cloud service architecture. The mechanisms operate to implement a private consolidated cloud service (PCCS) engine. The PCCS engine generates a private consolidated cloud (PCC) for a consumer based on one or more PCC characteristics specified by a request from the consumer. The PCCS engine also generates, in the PCC, for each of a plurality of public cloud services, a private instance of the public cloud service in the PCC. The PCC receives, from a consumer device, a request for processing of consumer private data by a specified private instance of a public cloud service in the PCC. The private instance of the public cloud service in the PCC performs the requested processing of consumer private data within the PCC without exposing the consumer private data outside the PCC. The PCC provides results of the requested processing to one of the consumer device or the public cloud service.
    Type: Application
    Filed: November 28, 2017
    Publication date: May 30, 2019
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Joanna W. Ng
  • Publication number: 20190098440
    Abstract: A method and system for determining a driver is provided. The method includes receiving and analyzing GPS data identifying locations of GPS enabled devices of a plurality of users. A group of users are determined to be located within a specified proximity to each other based on the analysis. The group of users are determined, based on an altitude, velocity, and a vector of the group of users, to be located within a vehicle. A position and role for each user with respect to the vehicle is determined. Selected functions of each GPS enabled device are controlled based on each role.
    Type: Application
    Filed: November 29, 2018
    Publication date: March 28, 2019
    Inventors: Lisa M. Chavez, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10244109
    Abstract: A mechanism is provided for detection of a spear-phishing phone call. Responsive to an individual receiving a phone call, a determination is made as to whether the phone call has one or more identifiable traits from a set of identifiable traits that are identified as being associated with spear-phishing. Responsive to identifying that the phone call has one or more identifiable traits from the set of identifiable traits that are identified as being associated with spear-phishing, an associated weighted risk value for each of the identified traits associated with the phone call is identified from the set of identifiable traits. A total risk value is calculated using each weighted risk value associated with each identified trait associated with the phone call. Responsive to the total risk value exceeding a predetermined risk value, the individual is notified of the total risk value to enable the individual to take an appropriate action based on the total risk value.
    Type: Grant
    Filed: July 13, 2016
    Date of Patent: March 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Publication number: 20190088114
    Abstract: An apparatus, method, program product, and system are disclosed for cognitive-based incident response. A sensor module captures baseline environment data related to a traffic incident using one or more sensors at a location of the traffic incident. A recommendation module generates and makes available, in real-time, one or more recommendations for responding to the traffic incident using cognitive computing processes based on the baseline environment data, the one or more recommendations comprising precautionary information for managing one or more emergency situations at the traffic incident. An update module continuously captures new environment data for the traffic incident using the one or more sensors, supplements the baseline environment data with the new environment data, and generates and makes available, in real-time, one or more updated recommendations based on the supplemented environment data using the supplemented environment data and the cognitive computing processes.
    Type: Application
    Filed: September 18, 2017
    Publication date: March 21, 2019
    Inventors: DAVID B. KUMHYR, JOHN F. BEHNKEN, LOUIE A. DICKENS, RODOLFO LOPEZ
  • Publication number: 20190033072
    Abstract: A user may be aided in modifying a product that is an assemblage of parts. This aid may involve a processor obtaining images of a target part captured by the user on a mobile device camera. The processor may compare, based on the captured images and a plurality of images of identified parts, the target part to the identified parts. Based on the comparison, the processor may determine an identity of the target part. This aid may also involve a processor obtaining images of a first configuration of a partial assembly of the product captured by a mobile device camera. The processor may compare, based on the captured images, the first configuration to a correct configuration of the partial assembly. Based on the comparison, the processor may determine that the first configuration does not match the correct configuration and may notify the user accordingly.
    Type: Application
    Filed: October 4, 2018
    Publication date: January 31, 2019
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10171954
    Abstract: A method and system for determining a driver is provided. The method includes receiving and analyzing GPS data identifying locations of GPS enabled devices of a plurality of users. A group of users are determined to be located within a specified proximity to each other based on the analysis. The group of users are determined, based on an altitude, velocity, and a vector of the group of users, to be located within a vehicle. A position and role for each user with respect to the vehicle is determined. Selected functions of each GPS enabled device are controlled based on each role.
    Type: Grant
    Filed: September 6, 2017
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Lisa M. Chavez, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10168152
    Abstract: A user may be aided in modifying a product that is an assemblage of parts. This aid may involve a processor obtaining images of a target part captured by the user on a mobile device camera. The processor may compare, based on the captured images and a plurality of images of identified parts, the target part to the identified parts. Based on the comparison, the processor may determine an identity of the target part. This aid may also involve a processor obtaining images of a first configuration of a partial assembly of the product captured by a mobile device camera. The processor may compare, based on the captured images, the first configuration to a correct configuration of the partial assembly. Based on the comparison, the processor may determine that the first configuration does not match the correct configuration and may notify the user accordingly.
    Type: Grant
    Filed: October 2, 2015
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Publication number: 20180332065
    Abstract: Provided are techniques for authenticating an unknown device. For a first device in an internet of things network that includes a second device and forms a list of trusted devices, a distance between the first device and the second device is determined. A level of trust for the second device is identified based on the distance, wherein the level of trust specifies a level of data sharing. Reputation ranking is performed for the second device based on the level of trust. The reputation ranking is used to assign a trust score to the second device. Based on determining that the trust score exceeds a trust threshold, access is provided to the second device.
    Type: Application
    Filed: May 11, 2017
    Publication date: November 15, 2018
    Inventors: Rahul Gupta, David B. Kumhyr, Hari H. Madduri, Maharaj Mukherjee
  • Publication number: 20180309738
    Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.
    Type: Application
    Filed: April 19, 2017
    Publication date: October 25, 2018
    Inventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
  • Publication number: 20180309739
    Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.
    Type: Application
    Filed: February 9, 2018
    Publication date: October 25, 2018
    Inventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
  • Publication number: 20180302424
    Abstract: Methods and apparatus, including computer program products, implementing and using techniques for enhancing the security of Internet of Things (IoT) devices. A homogenous and leaderless group of IoT devices sharing one or more common features is defined. During operation of the IoT devices, it is identified whether an IoT device in the group operates outside an expected tolerance for the operation of the IoT devices in the group. In response to identifying that an IoT device in the group operates outside an expected tolerance, an action is performed on the IoT device.
    Type: Application
    Filed: April 12, 2017
    Publication date: October 18, 2018
    Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Timothy J. Hahn, David B. Kumhyr
  • Publication number: 20180267910
    Abstract: Adaptive control of Input/Output (I/O) operations in a data storage system is provided to enable efficient use of the data storage system. More specifically, an interface is provided in order to adaptively control I/O operations to the data storage system. The interface receives a data request. The interface mediates with the data storage system and employs a handle which references one or more files. The handle designates how to process the data request associated with the referenced one or more files. The interface supports execution of the data request in accordance with the handle. Accordingly, the interface provides adaptive direct management of the data storage system at file granularity and/or at data request granularity as designated in the handle(s).
    Type: Application
    Filed: March 14, 2017
    Publication date: September 20, 2018
    Applicant: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Gregory T. Kishi, David B. Kumhyr, Neil Sondhi
  • Publication number: 20180270242
    Abstract: A method, a computing system and a computer program product are provided. A computing device identifies a credential of a first entity and determines one or more second entities, each electronically verifying the credential of the first entity. The computing device determines one or more third entities, each electronically verifying one or more from a group of second entities and other ones of the third entities, wherein the second and third entities form a set of chains of verification from the first entity. The computing device analyzes the set of chains of verification to detect one or more loops within the set of chains among the second and third entities. A verification of the credential is generated by the computing device based on detection of a trusted entity within one of the set of chains and not detecting a loop within the one of the set of chains.
    Type: Application
    Filed: March 15, 2017
    Publication date: September 20, 2018
    Inventors: Rahul Gupta, David B. Kumhyr, Hari H. Madduri, Maharaj Mukherjee
  • Publication number: 20180225636
    Abstract: Embodiments include a technique for scheduling meeting based on calendaring dependencies. The technique includes receiving prerequisite information for scheduling a meeting, the prerequisite information including a meeting agenda, meeting objective, and location, and validating, by a computing system, the prerequisite information based on an aggregate condition of the prerequisite information. The technique also includes responsive to the validation, scheduling the meeting based on the prerequisite information, otherwise restricting the scheduling of the meeting, and electronically transmitting a meeting request including the prerequisite information based on the validation.
    Type: Application
    Filed: February 8, 2017
    Publication date: August 9, 2018
    Inventors: DAVID B. KUMHYR, KRISHNA K. YELLEPEDDY
  • Publication number: 20180218175
    Abstract: A computer-implemented method improves a computer system's security through use of a simulated digital footprint. One or more processors retrieve a historical digital footprint of a user. The historical digital footprint is a record of past digital data about the user, and describes a pattern of activities of the user. The processor(s) generate a simulated digital footprint for the user. The simulated digital footprint conforms to the pattern of activities of the user, and describes simulated current activities of the user. The processor(s) transmit the simulated digital footprint to the public while a current real digital footprint is being created for the user, such that use of the pattern of activities of the user provides an imperceptible transition from the historical digital footprint to the simulated digital footprint, and where the simulated digital footprint prevents the public from accessing the current real digital footprint of the user.
    Type: Application
    Filed: February 1, 2017
    Publication date: August 2, 2018
    Inventors: MICHAEL BENDER, RHONDA L. CHILDRESS, TIMOTHY J. HAHN, DAVID B. KUMHYR
  • Publication number: 20180220206
    Abstract: A method, a computing system and a computer program product are provided for utilizing supplemental sensors to monitor conditions of an area employing a sensor network. One or more supplemental sensors that are external to the sensor network are detected in an area. The one or more supplemental sensors are added to the sensor network. Readings pertaining to the conditions of the area are retrieved from the detected one or more supplemental sensors and one or more first sensors included in the sensor network. The readings of the one or more supplemental sensors and the one or more first sensors are compared and a resulting condition of the area is determined based on the comparing.
    Type: Application
    Filed: February 2, 2017
    Publication date: August 2, 2018
    Inventors: Michael Bender, Rahul Gupta, David B. Kumhyr, Leucir Marin Junior, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
  • Publication number: 20180212964
    Abstract: In the sharing of data between connected devices over a network, a network device broadcasts an availability of a set of data collected by a data producing device coupled to the network. The network device receives a request to access the set of data from a data consuming device coupled to the network, and a cognitive computing module of the network device determines a set of terms between the data producing and the data consuming devices for access to the set of data. In response, the network device obtains the set of data and a first key from the data producing device. Upon receiving a second key from the data consuming device, the network device determines that the second key is associated with the first key. In response, the network device provides access to the set of data to the data consuming device according to the set of terms.
    Type: Application
    Filed: January 20, 2017
    Publication date: July 26, 2018
    Inventors: Michael BENDER, Rhonda L. CHILDRESS, Rahul GUPTA, Timothy J. HAHN, David B. KUMHYR, Joanna W. NG
  • Publication number: 20180189333
    Abstract: A blockchain may include various transactions which are identified and which require processing. The order of processing such transactions may be optimized by examining content of the transactions. One example operation may include one or more of identifying blockchain transactions, designating each of the blockchain transactions as an independent transaction type or a dependent transaction type, and determining an order to process the blockchain transactions based on the independent transaction type or the dependent transaction type.
    Type: Application
    Filed: January 3, 2017
    Publication date: July 5, 2018
    Inventors: Rhonda L. Childress, Rahul Gupta, David B. Kumhyr, Maharaj Mukherjee
  • Patent number: 9984228
    Abstract: An approach is provided for password re-usage identification based on an Input Method Editor (IME) analysis. The approach analyzes a number of keystrokes received from a user at the IME that is running on the information handling system. A set of keystrokes received at the IME are identified as a possible new password that is being established by the user. A set of existing password data is searched with the search being based on the possible new password. The set of existing passwords are stored in a data store accessible from at least one of the processors of the information handling system. In response to the searching identifying that one of the existing passwords matches the possible new password, a notification, or warning, is displayed to the user.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: May 29, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, David B. Kumhyr, Su Liu, Neil Sondhi