Patents by Inventor George C. Wilson

George C. Wilson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10212147
    Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.
    Type: Grant
    Filed: November 29, 2017
    Date of Patent: February 19, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
  • Publication number: 20180365287
    Abstract: A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.
    Type: Application
    Filed: August 23, 2018
    Publication date: December 20, 2018
    Inventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson
  • Publication number: 20180365422
    Abstract: A service processor is provided that includes a processor, a memory coupled to the processor and having instructions for executing an operating system kernel having an integrity management subsystem, secure boot firmware, and a tamper-resistant secure trusted dedicated microprocessor. The secure boot firmware performs a secure boot operation to boot the operating system kernel of the service processor. The secure boot firmware records first measurements of code executed by the secure boot firmware when performing the boot operation, in one or more registers of the tamper-resistant secure trusted dedicated microprocessor. The operating system kernel enables the integrity management subsystem. The integrity management subsystem records second measurements of software executed by the operating system kernel, in the one or more registers of the tamper-resistant secure trusted dedicated microprocessor.
    Type: Application
    Filed: June 15, 2017
    Publication date: December 20, 2018
    Inventors: Patrick J. Callaghan, Kenneth A. Goldman, Guerney D.H. Hunt, Elaine R. Palmer, Dimitrios Pendarakis, David R. Safford, Brian D. Valentine, George C. Wilson, Miriam Zohar
  • Publication number: 20180365424
    Abstract: Mechanisms for booting a service processor are provided. With these mechanisms, the service processor executes a secure boot operation of secure boot firmware to boot an operating system kernel of the service processor. The secure boot firmware records first measurements of code executed by the secure boot firmware when performing the boot operation, in one or more registers of a tamper-resistant secure trusted dedicated microprocessor of the service processor. The operating system kernel executing in the service processor enables an integrity management subsystem of the operating system kernel which records second measurements of software executed by the operating system kernel, in the one or more registers of the tamper-resistant secure trusted dedicated microprocessor.
    Type: Application
    Filed: June 15, 2017
    Publication date: December 20, 2018
    Inventors: Patrick J. Callaghan, Kenneth A. Goldman, Guerney D.H. Hunt, Elaine R. Palmer, Dimitrios Pendarakis, David R. Safford, Brian D. Valentine, George C. Wilson, Miriam Zohar
  • Patent number: 10095734
    Abstract: A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.
    Type: Grant
    Filed: June 10, 2015
    Date of Patent: October 9, 2018
    Assignee: International Business Machines Corporation
    Inventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson
  • Publication number: 20180101679
    Abstract: Detection of a key logger includes determining a count of keystrokes that occur during each of a plurality of time windows. Write activity that occurs during each of the plurality of time windows can be measured. The number of key strokes occurring in window is compared with the write activity occurring during the window. In response to determining that the count of keystrokes in a time window is linearly related to the measurement of write activity in the time window for a threshold number of time windows of the plurality of windows, a notification of a potential presence of a key logger is provided.
    Type: Application
    Filed: October 7, 2016
    Publication date: April 12, 2018
    Inventors: Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker, George C. Wilson
  • Patent number: 9934270
    Abstract: A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.
    Type: Grant
    Filed: August 21, 2017
    Date of Patent: April 3, 2018
    Assignee: International Business Machines Corporation
    Inventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson
  • Publication number: 20180083948
    Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.
    Type: Application
    Filed: November 29, 2017
    Publication date: March 22, 2018
    Inventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
  • Patent number: 9894051
    Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: February 13, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
  • Publication number: 20170371651
    Abstract: A static analysis tool configured to determine a significance of static analysis results. The static analysis tool can perform operations that include performing a static analysis of a computer program and generating the static analysis results in response to the performing the static analysis of the computer program. The operations can further include analyzing a description of a result item from the static analysis results, and based on the analyzing the description of the result item, assigning to the result item information from an ontology scheme. The operations can further include determining a significance value for the result item in response to the assigning the information from the ontology scheme and automatically performing an action associated with the result item based on one or more of the information assigned from the ontology scheme or the significance value.
    Type: Application
    Filed: February 15, 2017
    Publication date: December 28, 2017
    Inventors: Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker, George C. Wilson
  • Publication number: 20170371770
    Abstract: A static analysis tool configured to determine a significance of static analysis results. The static analysis tool includes computer program code to perform a static analysis of a computer program and generate the static analysis results in response to the performance of the static analysis of the computer program. The program code can further analyze a description of a result item from the static analysis results, and based on the analysis of the description of the result item, assigning to the result item information from an ontology scheme. The program code can further include code determine a significance value for the result item in response to the assignment of the information from the ontology scheme and automatically perform an action associated with the result item based on one or more of the information assigned from the ontology scheme or the significance value.
    Type: Application
    Filed: June 27, 2016
    Publication date: December 28, 2017
    Inventors: Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker, George C. Wilson
  • Publication number: 20170346938
    Abstract: Provided are techniques for a user interface (UI) enabling a user to identity and modify previously transmitted electronic message from a first device to a second device; and, responsive to a modification of the previously transmitted outgoing message from the first device, generating a modification message, transmitting the modification message to the second device and, responsive to receiving the modification message on the second device, correlating the modification message to a previously received incoming message on the second device and modifying the previously received incoming message in accordance with information transmitted in conjunction with the modification message to generate a modified message.
    Type: Application
    Filed: May 31, 2016
    Publication date: November 30, 2017
    Applicant: International Business Machines Corporation
    Inventors: John B. Allen, Nathan D. Fontenot, Christy L. Norman Perez, Michael T. Strosaker, George C. WIlson
  • Publication number: 20170344604
    Abstract: A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.
    Type: Application
    Filed: August 21, 2017
    Publication date: November 30, 2017
    Inventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson
  • Patent number: 9811556
    Abstract: A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.
    Type: Grant
    Filed: November 3, 2016
    Date of Patent: November 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson
  • Publication number: 20170170971
    Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.
    Type: Application
    Filed: June 7, 2016
    Publication date: June 15, 2017
    Inventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
  • Publication number: 20170171179
    Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.
    Type: Application
    Filed: December 14, 2015
    Publication date: June 15, 2017
    Inventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
  • Publication number: 20170140795
    Abstract: A stream of data contributions during a period is collected from a social media data source, the period spanning a broadcast of a content. The stream is analyzed to identify a change in a level of the data contributions during a sub-period of the period. A first time is selected to mark a beginning of the sub-period. A second time is selected to mark an ending of the sub-period. A data fragment is extracted from the data contributions occurring during the sub-period in the stream, the data fragment being descriptive of the content during the sub-period. In a recording of the content, a portion of the recording between the starting time and the ending time is selected as a segment of interest. The recording is annotated with the starting time, the ending time, and the data fragment to identify the segment of interest.
    Type: Application
    Filed: November 18, 2015
    Publication date: May 18, 2017
    Applicant: International Business Machines Corporation
    Inventors: NATHAN FONTENOT, Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker, George C. Wilson
  • Publication number: 20170140796
    Abstract: A stream of data contributions during a period is collected from a social media data source, the period spanning a broadcast of a content. The stream is analyzed to identify a change in a level of the data contributions during a sub-period of the period. A first time is selected to mark a beginning of the sub-period. A second time is selected to mark an ending of the sub-period. A data fragment is extracted from the data contributions occurring during the sub-period in the stream, the data fragment being descriptive of the content during the sub-period. In a recording of the content, a portion of the recording between the starting time and the ending time is selected as a segment of interest. The recording is annotated with the starting time, the ending time, and the data fragment to identify the segment of interest.
    Type: Application
    Filed: February 24, 2016
    Publication date: May 18, 2017
    Applicant: International Business Machines Corporation
    Inventors: Nathan Fontenot, Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker, George C. Wilson
  • Patent number: 9594559
    Abstract: Source code for a function of a computer program is compiled by compilers to generate executable code variants for the function according to different optimization approaches. Each executable code variant is executable on a same processor architecture. A binary file for the computer program is constructed that includes each executable code variant. At runtime of the binary file, one of the executable code variants is selected for the function. The selected executable code variant is used during execution of the computer program, until execution is halted.
    Type: Grant
    Filed: January 7, 2015
    Date of Patent: March 14, 2017
    Assignee: International Business Machines Corporation
    Inventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson
  • Publication number: 20170046250
    Abstract: A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.
    Type: Application
    Filed: November 3, 2016
    Publication date: February 16, 2017
    Inventors: Nathan Fontenot, Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson