Patents by Inventor Gisela C. Cheng

Gisela C. Cheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10769285
    Abstract: Technical solutions are described for securing data by a communication apparatus. An example computer-implemented method includes receiving, by an encryption engine, a request to apply cryptography to input data. The computer-implemented method also includes generating metadata for the input data, where the metadata identifies characteristics of content included in the input data. The method further includes applying a cryptographic technique to the input data to generate output data, and outputting the output data and metadata in response to the request.
    Type: Grant
    Filed: May 18, 2016
    Date of Patent: September 8, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
  • Patent number: 10733324
    Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: August 4, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
  • Publication number: 20190213358
    Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.
    Type: Application
    Filed: March 19, 2019
    Publication date: July 11, 2019
    Inventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
  • Patent number: 10255459
    Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.
    Type: Grant
    Filed: May 18, 2016
    Date of Patent: April 9, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
  • Patent number: 10142404
    Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: November 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
  • Publication number: 20180088982
    Abstract: Examples of techniques for invoking a restricted access service through a RESTful interface are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: measuring, by the processing device, an idle time that represents an amount of time that an application is idle; measuring, by the processing device, an execution time that represents an amount of time that the application takes to execute a RESTful application program interface request; calculating, by the processing device, an average time for the application, wherein the average time is based on the idle time and the execution time over a selectable interval; and responsive to determining that the average time does not exceed a first threshold, initiating, by the processing device, a new instance of the application.
    Type: Application
    Filed: February 13, 2017
    Publication date: March 29, 2018
    Inventors: Robert M. Abrams, Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
  • Publication number: 20180088960
    Abstract: Examples of techniques for invoking a restricted access service through a RESTful interface are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: measuring, by the processing device, an idle time that represents an amount of time that an application is idle; measuring, by the processing device, an execution time that represents an amount of time that the application takes to execute a RESTful application program interface request; calculating, by the processing device, an average time for the application, wherein the average time is based on the idle time and the execution time over a selectable interval; and responsive to determining that the average time does not exceed a first threshold, initiating, by the processing device, a new instance of the application.
    Type: Application
    Filed: September 23, 2016
    Publication date: March 29, 2018
    Inventors: Robert M. Abrams, Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
  • Publication number: 20170337382
    Abstract: Technical solutions are described for securing data by a communication apparatus. An example computer-implemented method includes receiving, by an encryption engine, a request to apply cryptography to input data. The computer-implemented method also includes generating metadata for the input data, where the metadata identifies characteristics of content included in the input data. The method further includes applying a cryptographic technique to the input data to generate output data, and outputting the output data and metadata in response to the request.
    Type: Application
    Filed: May 18, 2016
    Publication date: November 23, 2017
    Inventors: VICTOR G. ALONZO, ZACHARY A. BURNS, YUK L. CHAN, GISELA C. CHENG, KIN K. CHOI, KIN NG
  • Publication number: 20170337399
    Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.
    Type: Application
    Filed: May 18, 2016
    Publication date: November 23, 2017
    Inventors: VICTOR G. ALONZO, ZACHARY A. BURNS, YUK L. CHAN, GISELA C. CHENG, KIN K. CHOI, KIN NG
  • Patent number: 9736231
    Abstract: Examples of techniques for routing a representational state transfer (REST) request among a plurality of virtual processing systems are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: receiving, at a load balancer, the REST request; assigning, by the load balancer, the REST request to one of a plurality of web servers, each of the plurality of web servers executing on a virtual processing system; routing, by the one of the plurality of web servers, the REST request to one of the plurality of virtual processing systems; and storing, by the one of the plurality of web servers, state information regarding the REST request to a data store.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: August 15, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert M. Abrams, Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
  • Patent number: 9723068
    Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: August 1, 2017
    Assignee: International Business Machines Corporation
    Inventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
  • Patent number: 9720750
    Abstract: Examples of techniques for invoking a restricted access service through a representational state transfer (RESTful) interface are disclosed. In one example implementation according to aspects of the present disclosure, a method may include: receiving, at a web server, a RESTful application program interface (API) request to access a RESTful API from a user on a mobile device; determining whether the user is authorized to access the RESTful API using an authorization service; responsive to determining that the user is authorized to access the RESTful API, routing the RESTful API request from the web server to the restricted access service to process the request; receiving, by the web server, return data from the restricted access service after processing the request; and invoking a data transformer associated with the RESTful API to transform the return data into transformed data.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: August 1, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert M. Abrams, Victor G. Alonzo, Gisela C. Cheng, Kin Ng, Vaughn C. Page
  • Patent number: 9716747
    Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: July 25, 2017
    Assignee: International Business Machines Corporation
    Inventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
  • Publication number: 20170111438
    Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.
    Type: Application
    Filed: September 20, 2016
    Publication date: April 20, 2017
    Inventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
  • Publication number: 20170111439
    Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.
    Type: Application
    Filed: September 20, 2016
    Publication date: April 20, 2017
    Inventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
  • Publication number: 20170111440
    Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.
    Type: Application
    Filed: September 20, 2016
    Publication date: April 20, 2017
    Inventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
  • Patent number: 9558004
    Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.
    Type: Grant
    Filed: October 16, 2015
    Date of Patent: January 31, 2017
    Assignee: International Business Machines Corporation
    Inventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
  • Patent number: 9183314
    Abstract: A technique is provided for capturing browsing history of a webpage. A processor receives a webpage from a server, determines that a trigger associated with a user is fulfilled, and captures a page of the webpage responsive to the trigger associated with the user being fulfilled.
    Type: Grant
    Filed: April 16, 2012
    Date of Patent: November 10, 2015
    Assignee: International Business Machines Corporation
    Inventors: Yuk L. Chan, Gisela C. Cheng, Kin Ng, Derrick L. Washington
  • Publication number: 20150113369
    Abstract: According to an exemplary embodiment of this disclosure, a computer-implemented method includes capturing a plurality of images from a presentation. Each of the plurality of images is associated with a unique identifier. The unique identifiers are transmitted to one or more remote audience modules. The plurality of images are then transmitted to the audience modules. With a computer processor, a first image from the plurality of images is identified as a next active image. Indications are received from the one or more of the audience modules that the next active image has been received. The audience modules are instructed to update their displays from a current active image to the next active image, after the indications are received.
    Type: Application
    Filed: September 30, 2014
    Publication date: April 23, 2015
    Inventors: Yuk L. Chan, Gisela C. Cheng, Kin Ng, Derrick L. Washington
  • Publication number: 20150113367
    Abstract: According to an exemplary embodiment of this disclosure, a computer-implemented method includes capturing a plurality of images from a presentation. Each of the plurality of images is associated with a unique identifier. The unique identifiers are transmitted to one or more remote audience modules. The plurality of images are then transmitted to the audience modules. With a computer processor, a first image from the plurality of images is identified as a next active image. Indications are received from the one or more of the audience modules that the next active image has been received. The audience modules are instructed to update their displays from a current active image to the next active image, after the indications are received.
    Type: Application
    Filed: October 17, 2013
    Publication date: April 23, 2015
    Applicant: International Business Machines Corporation
    Inventors: Yuk L. Chan, Gisela C. Cheng, Kin Ng, Derrick L. Washington