Patents by Inventor George C. Wilson
George C. Wilson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10218689Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.Type: GrantFiled: June 7, 2016Date of Patent: February 26, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
-
Patent number: 10212147Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.Type: GrantFiled: November 29, 2017Date of Patent: February 19, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
-
Publication number: 20180365287Abstract: A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.Type: ApplicationFiled: August 23, 2018Publication date: December 20, 2018Inventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson
-
Publication number: 20180365424Abstract: Mechanisms for booting a service processor are provided. With these mechanisms, the service processor executes a secure boot operation of secure boot firmware to boot an operating system kernel of the service processor. The secure boot firmware records first measurements of code executed by the secure boot firmware when performing the boot operation, in one or more registers of a tamper-resistant secure trusted dedicated microprocessor of the service processor. The operating system kernel executing in the service processor enables an integrity management subsystem of the operating system kernel which records second measurements of software executed by the operating system kernel, in the one or more registers of the tamper-resistant secure trusted dedicated microprocessor.Type: ApplicationFiled: June 15, 2017Publication date: December 20, 2018Inventors: Patrick J. Callaghan, Kenneth A. Goldman, Guerney D.H. Hunt, Elaine R. Palmer, Dimitrios Pendarakis, David R. Safford, Brian D. Valentine, George C. Wilson, Miriam Zohar
-
Publication number: 20180365422Abstract: A service processor is provided that includes a processor, a memory coupled to the processor and having instructions for executing an operating system kernel having an integrity management subsystem, secure boot firmware, and a tamper-resistant secure trusted dedicated microprocessor. The secure boot firmware performs a secure boot operation to boot the operating system kernel of the service processor. The secure boot firmware records first measurements of code executed by the secure boot firmware when performing the boot operation, in one or more registers of the tamper-resistant secure trusted dedicated microprocessor. The operating system kernel enables the integrity management subsystem. The integrity management subsystem records second measurements of software executed by the operating system kernel, in the one or more registers of the tamper-resistant secure trusted dedicated microprocessor.Type: ApplicationFiled: June 15, 2017Publication date: December 20, 2018Inventors: Patrick J. Callaghan, Kenneth A. Goldman, Guerney D.H. Hunt, Elaine R. Palmer, Dimitrios Pendarakis, David R. Safford, Brian D. Valentine, George C. Wilson, Miriam Zohar
-
Patent number: 10095734Abstract: A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.Type: GrantFiled: June 10, 2015Date of Patent: October 9, 2018Assignee: International Business Machines CorporationInventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson
-
Publication number: 20180101679Abstract: Detection of a key logger includes determining a count of keystrokes that occur during each of a plurality of time windows. Write activity that occurs during each of the plurality of time windows can be measured. The number of key strokes occurring in window is compared with the write activity occurring during the window. In response to determining that the count of keystrokes in a time window is linearly related to the measurement of write activity in the time window for a threshold number of time windows of the plurality of windows, a notification of a potential presence of a key logger is provided.Type: ApplicationFiled: October 7, 2016Publication date: April 12, 2018Inventors: Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker, George C. Wilson
-
Patent number: 9934270Abstract: A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.Type: GrantFiled: August 21, 2017Date of Patent: April 3, 2018Assignee: International Business Machines CorporationInventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson
-
Publication number: 20180083948Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.Type: ApplicationFiled: November 29, 2017Publication date: March 22, 2018Inventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
-
Patent number: 9894051Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.Type: GrantFiled: December 14, 2015Date of Patent: February 13, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
-
Publication number: 20170371651Abstract: A static analysis tool configured to determine a significance of static analysis results. The static analysis tool can perform operations that include performing a static analysis of a computer program and generating the static analysis results in response to the performing the static analysis of the computer program. The operations can further include analyzing a description of a result item from the static analysis results, and based on the analyzing the description of the result item, assigning to the result item information from an ontology scheme. The operations can further include determining a significance value for the result item in response to the assigning the information from the ontology scheme and automatically performing an action associated with the result item based on one or more of the information assigned from the ontology scheme or the significance value.Type: ApplicationFiled: February 15, 2017Publication date: December 28, 2017Inventors: Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker, George C. Wilson
-
Publication number: 20170371770Abstract: A static analysis tool configured to determine a significance of static analysis results. The static analysis tool includes computer program code to perform a static analysis of a computer program and generate the static analysis results in response to the performance of the static analysis of the computer program. The program code can further analyze a description of a result item from the static analysis results, and based on the analysis of the description of the result item, assigning to the result item information from an ontology scheme. The program code can further include code determine a significance value for the result item in response to the assignment of the information from the ontology scheme and automatically perform an action associated with the result item based on one or more of the information assigned from the ontology scheme or the significance value.Type: ApplicationFiled: June 27, 2016Publication date: December 28, 2017Inventors: Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker, George C. Wilson
-
Publication number: 20170346938Abstract: Provided are techniques for a user interface (UI) enabling a user to identity and modify previously transmitted electronic message from a first device to a second device; and, responsive to a modification of the previously transmitted outgoing message from the first device, generating a modification message, transmitting the modification message to the second device and, responsive to receiving the modification message on the second device, correlating the modification message to a previously received incoming message on the second device and modifying the previously received incoming message in accordance with information transmitted in conjunction with the modification message to generate a modified message.Type: ApplicationFiled: May 31, 2016Publication date: November 30, 2017Applicant: International Business Machines CorporationInventors: John B. Allen, Nathan D. Fontenot, Christy L. Norman Perez, Michael T. Strosaker, George C. WIlson
-
Publication number: 20170344604Abstract: A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.Type: ApplicationFiled: August 21, 2017Publication date: November 30, 2017Inventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson
-
Patent number: 9811556Abstract: A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.Type: GrantFiled: November 3, 2016Date of Patent: November 7, 2017Assignee: International Business Machines CorporationInventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson
-
Publication number: 20170170971Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.Type: ApplicationFiled: June 7, 2016Publication date: June 15, 2017Inventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
-
Publication number: 20170171179Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.Type: ApplicationFiled: December 14, 2015Publication date: June 15, 2017Inventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
-
Publication number: 20170140796Abstract: A stream of data contributions during a period is collected from a social media data source, the period spanning a broadcast of a content. The stream is analyzed to identify a change in a level of the data contributions during a sub-period of the period. A first time is selected to mark a beginning of the sub-period. A second time is selected to mark an ending of the sub-period. A data fragment is extracted from the data contributions occurring during the sub-period in the stream, the data fragment being descriptive of the content during the sub-period. In a recording of the content, a portion of the recording between the starting time and the ending time is selected as a segment of interest. The recording is annotated with the starting time, the ending time, and the data fragment to identify the segment of interest.Type: ApplicationFiled: February 24, 2016Publication date: May 18, 2017Applicant: International Business Machines CorporationInventors: Nathan Fontenot, Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker, George C. Wilson
-
Publication number: 20170140795Abstract: A stream of data contributions during a period is collected from a social media data source, the period spanning a broadcast of a content. The stream is analyzed to identify a change in a level of the data contributions during a sub-period of the period. A first time is selected to mark a beginning of the sub-period. A second time is selected to mark an ending of the sub-period. A data fragment is extracted from the data contributions occurring during the sub-period in the stream, the data fragment being descriptive of the content during the sub-period. In a recording of the content, a portion of the recording between the starting time and the ending time is selected as a segment of interest. The recording is annotated with the starting time, the ending time, and the data fragment to identify the segment of interest.Type: ApplicationFiled: November 18, 2015Publication date: May 18, 2017Applicant: International Business Machines CorporationInventors: NATHAN FONTENOT, Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker, George C. Wilson
-
Patent number: 9594559Abstract: Source code for a function of a computer program is compiled by compilers to generate executable code variants for the function according to different optimization approaches. Each executable code variant is executable on a same processor architecture. A binary file for the computer program is constructed that includes each executable code variant. At runtime of the binary file, one of the executable code variants is selected for the function. The selected executable code variant is used during execution of the computer program, until execution is halted.Type: GrantFiled: January 7, 2015Date of Patent: March 14, 2017Assignee: International Business Machines CorporationInventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson