Patents by Inventor Gerald D. Colar
Gerald D. Colar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10205756Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.Type: GrantFiled: November 10, 2016Date of Patent: February 12, 2019Assignee: International Business Machines CorporationInventors: Charles K. Young, Terrence E. White, Melanie R. Diggs, Gerald D. Colar
-
Patent number: 9819707Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.Type: GrantFiled: December 16, 2016Date of Patent: November 14, 2017Assignee: International Business Machines CorporationInventors: Charles K. Young, Terrence E. White, Melanie R. Diggs, Gerald D. Colar
-
Publication number: 20170270811Abstract: A computer-implemented method includes identifying a user interface. The method includes identifying a lesson plan. The lesson plan includes a plurality of questions, each of the plurality of questions having associated therewith a correct answer. The method includes receiving an access request for the user interface. The method includes presenting, via the user interface, one of the plurality of questions. The method includes receiving an answer via the user interface. The method is responsive to the answer meeting one or more correctness criteria. The method includes granting the access request. A corresponding computer program product and computer system are also disclosed.Type: ApplicationFiled: March 15, 2016Publication date: September 21, 2017Inventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White
-
Publication number: 20170104794Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.Type: ApplicationFiled: December 16, 2016Publication date: April 13, 2017Inventors: Charles K. YOUNG, Terrence E. WHITE, Melanie R. DIGGS, Gerald D. COLAR
-
Patent number: 9596271Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.Type: GrantFiled: October 10, 2012Date of Patent: March 14, 2017Assignee: International Business Machines CorporationInventors: Charles K. Young, Terrence E. White, Melanie R. Diggs, Gerald D. Colar
-
Publication number: 20170063800Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.Type: ApplicationFiled: November 10, 2016Publication date: March 2, 2017Applicant: International Business Machines CorporationInventors: Charles K. YOUNG, Terrence E. WHITE, Melanie R. DIGGS, Gerald D. COLAR
-
Patent number: 9531766Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.Type: GrantFiled: February 15, 2013Date of Patent: December 27, 2016Assignee: International Business Machines CorporationInventors: Charles K. Young, Terrence E. White, Melanie R. Diggs, Gerald D. Colar
-
Patent number: 9372982Abstract: A system and computer program product for using a multi-user operating system. A user attempts to access the multi-user operating system. The system prompts the user to enter a shared credential associated with the multi-user operating system and an individual credential of the user. The system verifies the entered shared credential and the entered individual credential. The system grants the access to the user if both the entered shared credential and the entered individual credential are verified. The system tracks commands entered by the user granted the access via the entered shared credential while the user is using the multi-user operating system. The tracked commands indicate the entered individual credential.Type: GrantFiled: August 22, 2013Date of Patent: June 21, 2016Assignee: International Business Machines CorporationInventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White, Charles K. Young
-
Patent number: 9065778Abstract: Exemplary embodiments provide methods and systems for dynamically changing a message retrieval scheme during runtime in a client/server electronic messaging system in which the server executes a message retrieval component and incoming messages received from the client is stored in a message queue. Aspects of the exemplary embodiment include accessing messaging business rules from a memory by a message retrieval component at runtime, wherein the messaging business rules define a primary retrieval scheme and a secondary retrieval scheme, and wherein a value provided for each of the primary retrieval scheme and the secondary retrieval scheme are selected from a combination of different message retrieval types including: First In First Out (FIFO), Last In First Out (LIFO), and random. The message retrieval component subdivides the message queue into sub-queues based on at least one of a message quantity limit and a message received time limit specified in the business rules.Type: GrantFiled: March 20, 2012Date of Patent: June 23, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White, Charles K. Young
-
Patent number: 9049164Abstract: Exemplary embodiments provide methods and systems for dynamically changing a message retrieval scheme during runtime in a client/server electronic messaging system in which the server executes a message retrieval component and incoming messages received from the client is stored in a message queue. Aspects of the exemplary embodiment include accessing messaging business rules from a memory by a message retrieval component at runtime, wherein the messaging business rules define a primary retrieval scheme and a secondary retrieval scheme, and wherein a value provided for each of the primary retrieval scheme and the secondary retrieval scheme are selected from a combination of different message retrieval types including: First In First Out (FIFO), Last In First Out (LIFO), and random. The message retrieval component subdivides the message queue into sub-queues based on at least one of a message quantity limit and a message received time limit specified in the business rules.Type: GrantFiled: May 30, 2013Date of Patent: June 2, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White, Charles K. Young
-
Publication number: 20140201826Abstract: There is provided a system and computer program product for using a multi-user operating system. A user attempts to access the multi-user operating system. The system prompts the user to enter a shared credential associated with the multi-user operating system and an individual credential of the user. The system verifies the entered shared credential and the entered individual credential. The system grants the access to the user if both the entered shared credential and the entered individual credential are verified. The system tracks commands entered by the user granted the access via the entered shared credential while the user is using the multi-user operating system. The tracked commands indicate the entered individual credential.Type: ApplicationFiled: August 22, 2013Publication date: July 17, 2014Inventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White, Charles K. Young
-
Publication number: 20140178852Abstract: A student personal computer (PC) presents educational questions at break points in a video game. It receives an identifier of a student. It receives a selection by the student of one of a plurality of video games, each of the video games including break points. It correlates the identifier of the student to a corresponding set of educational questions from a plurality of sets of educational questions. It begins execution of the video game. It, responsive to occurrence of a break point, interrupts the execution of the video game and render to the student playing the video game a question of the corresponding set of educational questions. It receives from the student an answer to the educational question of the corresponding set and determines whether the answer is correct. The student PC continues execution of the video game after receiving the answer from the student.Type: ApplicationFiled: February 7, 2014Publication date: June 26, 2014Applicant: International Business Machines CorporationInventors: Gerald D. Colar, Melanie R. Diggs, John W. Miller, Terrence E. White, Charles K. Young
-
Publication number: 20140101324Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.Type: ApplicationFiled: October 10, 2012Publication date: April 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Charles K. YOUNG, Terrence E. WHITE, Melanie R. DIGGS, Gerald D. COLAR
-
Publication number: 20130254275Abstract: Methods and systems for dynamically changing a message retrieval scheme during runtime include accessing messaging business rules from a memory by a message retrieval component at runtime, wherein the messaging business rules define a primary retrieval scheme and a secondary retrieval scheme, and wherein a value provided for each of the primary retrieval scheme and the secondary retrieval scheme are selected from a combination of different message retrieval types including: First In First Out (FIFO), Last In First Out (LIFO), and random. The message retrieval component subdivides the message queue into sub-queues based on at least one of a message quantity limit and a message received time limit specified in the business rules. Each of the sub-queues is then accessed using the value of the secondary retrieval scheme; and messages from each of the sub-queues are retrieved using the value of the primary retrieval scheme.Type: ApplicationFiled: March 20, 2012Publication date: September 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White, Charles K. Young
-
Publication number: 20130254318Abstract: Exemplary embodiments provide methods and systems for dynamically changing a message retrieval scheme during runtime. Aspects of the exemplary embodiment include accessing messaging business rules from a memory by a message retrieval component at runtime, wherein the messaging business rules define a primary retrieval scheme and a secondary retrieval scheme, and wherein a value provided for each of the primary retrieval scheme and the secondary retrieval scheme are selected from a combination of different message retrieval types including: First In First Out (FIFO), Last In First Out (LIFO), and random. The message retrieval component subdivides the message queue into sub-queues based on at least one of a message quantity limit and a message received time limit specified in the business rules. Each of the sub-queues is then accessed using the value of the secondary retrieval scheme; and messages from each of the sub-queues are retrieved using the value of the primary retrieval scheme.Type: ApplicationFiled: May 30, 2013Publication date: September 26, 2013Inventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White, Charles K. Young
-
Publication number: 20120172100Abstract: A student personal computer (PC) presents educational questions at break points in a video game. It receives an identifier of a student. It receives a selection by the student of one of a plurality of video games, each of the video games including break points. It correlates the identifier of the student to a corresponding set of educational questions from a plurality of sets of educational questions. It begins execution of the video game. It, responsive to occurrence of a break point, interrupts the execution of the video game and render to the student playing the video game a question of the corresponding set of educational questions. It receives from the student an answer to the educational question of the corresponding set and determine whether the answer is correct. The student PC continues execution of the video game after receiving the answer from the student.Type: ApplicationFiled: January 3, 2011Publication date: July 5, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gerald D. Colar, Melanie R. Diggs, John W. Miller, Terrence E. White, Charles K. Young
-
Publication number: 20120167196Abstract: An embodiment of the invention provides a method for secure access to data a VPN. Parameters for connecting to the VPN are established by a VPN manager connected to a local network and a user connected to a remote network, wherein an automatic VPN identification number is generated based on the parameters. A remote IP address is installed on an automatic VPN device of the user. The automatic VPN identification number is tied to an access list; and, the access list is attached to the automatic VPN device of the user. A request to access the VPN is received from the user. Access to the VPN is provided through a secure encryption tunnel if the request includes the automatic VPN identification number. The secure encryption tunnel provides automatic access to multiple sites within the VPN without the user having to re-enter the automatic VPN identification number.Type: ApplicationFiled: December 23, 2010Publication date: June 28, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gerald D. Colar, Melanie R. Diggs, John W. Miller, Charles K. Young