Patents by Inventor David B. Kumhyr

David B. Kumhyr has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10536460
    Abstract: In the sharing of data between connected devices over a network, a network device broadcasts an availability of a set of data collected by a data producing device coupled to the network. The network device receives a request to access the set of data from a data consuming device coupled to the network, and a cognitive computing module of the network device determines a set of terms between the data producing and the data consuming devices for access to the set of data. In response, the network device obtains the set of data and a first key from the data producing device. Upon receiving a second key from the data consuming device, the network device determines that the second key is associated with the first key. In response, the network device provides access to the set of data to the data consuming device according to the set of terms.
    Type: Grant
    Filed: January 20, 2017
    Date of Patent: January 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, Rahul Gupta, Timothy J. Hahn, David B. Kumhyr, Joanna W. Ng
  • Publication number: 20200004732
    Abstract: A blockchain may include various transactions which are identified and which require processing. The order of processing such transactions may be optimized by examining content of the transactions. One example operation may include one or more of identifying blockchain transactions, designating each of the blockchain transactions as an independent transaction type or a dependent transaction type, and determining an order to process the blockchain transactions based on the independent transaction type or the dependent transaction type.
    Type: Application
    Filed: September 9, 2019
    Publication date: January 2, 2020
    Inventors: Rhonda L. Childress, Rahul Gupta, David B. Kumhyr, Maharaj Mukherjee
  • Publication number: 20190379998
    Abstract: A method and system for determining a driver is provided. The method includes receiving and analyzing GPS data identifying locations of GPS enabled devices of a plurality of users. A group of users are determined to be located within a specified proximity to each other based on the analysis. The group of users are determined, based on an altitude, velocity, and a vector of the group of users, to be located within a vehicle. A position and role for each user with respect to the vehicle is determined. Selected functions of each GPS enabled device are controlled based on each role.
    Type: Application
    Filed: August 22, 2019
    Publication date: December 12, 2019
    Inventors: Lisa M. Chavez, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10445302
    Abstract: A blockchain may include various transactions which are identified and which require processing. The order of processing such transactions may be optimized by examining content of the transactions. One example operation may include one or more of identifying blockchain transactions, designating each of the blockchain transactions as an independent transaction type or a dependent transaction type, and determining an order to process the blockchain transactions based on the independent transaction type or the dependent transaction type.
    Type: Grant
    Filed: January 3, 2017
    Date of Patent: October 15, 2019
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Rahul Gupta, David B. Kumhyr, Maharaj Mukherjee
  • Patent number: 10395017
    Abstract: A computer-implemented method improves a computer system's security through use of a simulated digital footprint. One or more processors retrieve a historical digital footprint of a user. The historical digital footprint is a record of past digital data about the user, and describes a pattern of activities of the user. The processor(s) generate a simulated digital footprint for the user. The simulated digital footprint conforms to the pattern of activities of the user, and describes simulated current activities of the user. The processor(s) transmit the simulated digital footprint to the public while a current real digital footprint is being created for the user, such that use of the pattern of activities of the user provides an imperceptible transition from the historical digital footprint to the simulated digital footprint, and where the simulated digital footprint prevents the public from accessing the current real digital footprint of the user.
    Type: Grant
    Filed: February 1, 2017
    Date of Patent: August 27, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, Timothy J. Hahn, David B. Kumhyr
  • Patent number: 10375457
    Abstract: A method, a computing system and a computer program product are provided for utilizing supplemental sensors to monitor conditions of an area employing a sensor network. One or more supplemental sensors that are external to the sensor network are detected in an area. The one or more supplemental sensors are added to the sensor network. Readings pertaining to the conditions of the area are retrieved from the detected one or more supplemental sensors and one or more first sensors included in the sensor network. The readings of the one or more supplemental sensors and the one or more first sensors are compared and a resulting condition of the area is determined based on the comparing.
    Type: Grant
    Filed: February 2, 2017
    Date of Patent: August 6, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rahul Gupta, David B. Kumhyr, Leucir Marin Junior, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
  • Patent number: 10373106
    Abstract: In an approach for suggesting an item to pack, a processor receives an indication that a user is packing a first item of luggage, wherein the indication includes information about a trip. A processor generates a packing list based on the information about the trip. A processor receives a request to link the first item of luggage and a second item of luggage for the trip. A processor links the first and second items of luggage such that contents of each item of luggage are jointly compared to the packing list. A processor receives, via a short-range point-to-point communication reader of the first item of luggage, a signal from a short-range point-to-point communication device operably affixed to a first item. A processor identifies the first item based on the signal. A processor determines that the first item is an item of the packing list.
    Type: Grant
    Filed: November 24, 2015
    Date of Patent: August 6, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10356075
    Abstract: A method, a computing system and a computer program product are provided. A computing device identifies a credential of a first entity and determines one or more second entities, each electronically verifying the credential of the first entity. The computing device determines one or more third entities, each electronically verifying one or more from a group of second entities and other ones of the third entities, wherein the second and third entities form a set of chains of verification from the first entity. The computing device analyzes the set of chains of verification to detect one or more loops within the set of chains among the second and third entities. A verification of the credential is generated by the computing device based on detection of a trusted entity within one of the set of chains and not detecting a loop within the one of the set of chains.
    Type: Grant
    Filed: March 15, 2017
    Date of Patent: July 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Rahul Gupta, David B. Kumhyr, Hari H. Madduri, Maharaj Mukherjee
  • Publication number: 20190166125
    Abstract: Mechanisms are provided for providing a private consolidated cloud service architecture. The mechanisms operate to implement a private consolidated cloud service (PCCS) engine. The PCCS engine generates a private consolidated cloud (PCC) for a consumer based on one or more PCC characteristics specified by a request from the consumer. The PCCS engine also generates, in the PCC, for each of a plurality of public cloud services, a private instance of the public cloud service in the PCC. The PCC receives, from a consumer device, a request for processing of consumer private data by a specified private instance of a public cloud service in the PCC. The private instance of the public cloud service in the PCC performs the requested processing of consumer private data within the PCC without exposing the consumer private data outside the PCC. The PCC provides results of the requested processing to one of the consumer device or the public cloud service.
    Type: Application
    Filed: November 28, 2017
    Publication date: May 30, 2019
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Joanna W. Ng
  • Publication number: 20190098440
    Abstract: A method and system for determining a driver is provided. The method includes receiving and analyzing GPS data identifying locations of GPS enabled devices of a plurality of users. A group of users are determined to be located within a specified proximity to each other based on the analysis. The group of users are determined, based on an altitude, velocity, and a vector of the group of users, to be located within a vehicle. A position and role for each user with respect to the vehicle is determined. Selected functions of each GPS enabled device are controlled based on each role.
    Type: Application
    Filed: November 29, 2018
    Publication date: March 28, 2019
    Inventors: Lisa M. Chavez, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10244109
    Abstract: A mechanism is provided for detection of a spear-phishing phone call. Responsive to an individual receiving a phone call, a determination is made as to whether the phone call has one or more identifiable traits from a set of identifiable traits that are identified as being associated with spear-phishing. Responsive to identifying that the phone call has one or more identifiable traits from the set of identifiable traits that are identified as being associated with spear-phishing, an associated weighted risk value for each of the identified traits associated with the phone call is identified from the set of identifiable traits. A total risk value is calculated using each weighted risk value associated with each identified trait associated with the phone call. Responsive to the total risk value exceeding a predetermined risk value, the individual is notified of the total risk value to enable the individual to take an appropriate action based on the total risk value.
    Type: Grant
    Filed: July 13, 2016
    Date of Patent: March 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Publication number: 20190088114
    Abstract: An apparatus, method, program product, and system are disclosed for cognitive-based incident response. A sensor module captures baseline environment data related to a traffic incident using one or more sensors at a location of the traffic incident. A recommendation module generates and makes available, in real-time, one or more recommendations for responding to the traffic incident using cognitive computing processes based on the baseline environment data, the one or more recommendations comprising precautionary information for managing one or more emergency situations at the traffic incident. An update module continuously captures new environment data for the traffic incident using the one or more sensors, supplements the baseline environment data with the new environment data, and generates and makes available, in real-time, one or more updated recommendations based on the supplemented environment data using the supplemented environment data and the cognitive computing processes.
    Type: Application
    Filed: September 18, 2017
    Publication date: March 21, 2019
    Inventors: DAVID B. KUMHYR, JOHN F. BEHNKEN, LOUIE A. DICKENS, RODOLFO LOPEZ
  • Publication number: 20190033072
    Abstract: A user may be aided in modifying a product that is an assemblage of parts. This aid may involve a processor obtaining images of a target part captured by the user on a mobile device camera. The processor may compare, based on the captured images and a plurality of images of identified parts, the target part to the identified parts. Based on the comparison, the processor may determine an identity of the target part. This aid may also involve a processor obtaining images of a first configuration of a partial assembly of the product captured by a mobile device camera. The processor may compare, based on the captured images, the first configuration to a correct configuration of the partial assembly. Based on the comparison, the processor may determine that the first configuration does not match the correct configuration and may notify the user accordingly.
    Type: Application
    Filed: October 4, 2018
    Publication date: January 31, 2019
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10168152
    Abstract: A user may be aided in modifying a product that is an assemblage of parts. This aid may involve a processor obtaining images of a target part captured by the user on a mobile device camera. The processor may compare, based on the captured images and a plurality of images of identified parts, the target part to the identified parts. Based on the comparison, the processor may determine an identity of the target part. This aid may also involve a processor obtaining images of a first configuration of a partial assembly of the product captured by a mobile device camera. The processor may compare, based on the captured images, the first configuration to a correct configuration of the partial assembly. Based on the comparison, the processor may determine that the first configuration does not match the correct configuration and may notify the user accordingly.
    Type: Grant
    Filed: October 2, 2015
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10171954
    Abstract: A method and system for determining a driver is provided. The method includes receiving and analyzing GPS data identifying locations of GPS enabled devices of a plurality of users. A group of users are determined to be located within a specified proximity to each other based on the analysis. The group of users are determined, based on an altitude, velocity, and a vector of the group of users, to be located within a vehicle. A position and role for each user with respect to the vehicle is determined. Selected functions of each GPS enabled device are controlled based on each role.
    Type: Grant
    Filed: September 6, 2017
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Lisa M. Chavez, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Publication number: 20180332065
    Abstract: Provided are techniques for authenticating an unknown device. For a first device in an internet of things network that includes a second device and forms a list of trusted devices, a distance between the first device and the second device is determined. A level of trust for the second device is identified based on the distance, wherein the level of trust specifies a level of data sharing. Reputation ranking is performed for the second device based on the level of trust. The reputation ranking is used to assign a trust score to the second device. Based on determining that the trust score exceeds a trust threshold, access is provided to the second device.
    Type: Application
    Filed: May 11, 2017
    Publication date: November 15, 2018
    Inventors: Rahul Gupta, David B. Kumhyr, Hari H. Madduri, Maharaj Mukherjee
  • Publication number: 20180309739
    Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.
    Type: Application
    Filed: February 9, 2018
    Publication date: October 25, 2018
    Inventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
  • Publication number: 20180309738
    Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.
    Type: Application
    Filed: April 19, 2017
    Publication date: October 25, 2018
    Inventors: David B. Kumhyr, Arnaud A. Mathieu, Maharaj Mukherjee, Michael P. Robertson
  • Publication number: 20180302424
    Abstract: Methods and apparatus, including computer program products, implementing and using techniques for enhancing the security of Internet of Things (IoT) devices. A homogenous and leaderless group of IoT devices sharing one or more common features is defined. During operation of the IoT devices, it is identified whether an IoT device in the group operates outside an expected tolerance for the operation of the IoT devices in the group. In response to identifying that an IoT device in the group operates outside an expected tolerance, an action is performed on the IoT device.
    Type: Application
    Filed: April 12, 2017
    Publication date: October 18, 2018
    Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Timothy J. Hahn, David B. Kumhyr
  • Publication number: 20180270242
    Abstract: A method, a computing system and a computer program product are provided. A computing device identifies a credential of a first entity and determines one or more second entities, each electronically verifying the credential of the first entity. The computing device determines one or more third entities, each electronically verifying one or more from a group of second entities and other ones of the third entities, wherein the second and third entities form a set of chains of verification from the first entity. The computing device analyzes the set of chains of verification to detect one or more loops within the set of chains among the second and third entities. A verification of the credential is generated by the computing device based on detection of a trusted entity within one of the set of chains and not detecting a loop within the one of the set of chains.
    Type: Application
    Filed: March 15, 2017
    Publication date: September 20, 2018
    Inventors: Rahul Gupta, David B. Kumhyr, Hari H. Madduri, Maharaj Mukherjee