Patents by Inventor Gisela C. Cheng
Gisela C. Cheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10769285Abstract: Technical solutions are described for securing data by a communication apparatus. An example computer-implemented method includes receiving, by an encryption engine, a request to apply cryptography to input data. The computer-implemented method also includes generating metadata for the input data, where the metadata identifies characteristics of content included in the input data. The method further includes applying a cryptographic technique to the input data to generate output data, and outputting the output data and metadata in response to the request.Type: GrantFiled: May 18, 2016Date of Patent: September 8, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
-
Patent number: 10733324Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.Type: GrantFiled: March 19, 2019Date of Patent: August 4, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
-
Publication number: 20190213358Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.Type: ApplicationFiled: March 19, 2019Publication date: July 11, 2019Inventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
-
Patent number: 10255459Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.Type: GrantFiled: May 18, 2016Date of Patent: April 9, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor G. Alonzo, Zachary A. Burns, Yuk L. Chan, Gisela C. Cheng, Kin K. Choi, Kin Ng
-
Patent number: 10142404Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.Type: GrantFiled: September 20, 2016Date of Patent: November 27, 2018Assignee: International Business Machines CorporationInventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
-
Publication number: 20180088982Abstract: Examples of techniques for invoking a restricted access service through a RESTful interface are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: measuring, by the processing device, an idle time that represents an amount of time that an application is idle; measuring, by the processing device, an execution time that represents an amount of time that the application takes to execute a RESTful application program interface request; calculating, by the processing device, an average time for the application, wherein the average time is based on the idle time and the execution time over a selectable interval; and responsive to determining that the average time does not exceed a first threshold, initiating, by the processing device, a new instance of the application.Type: ApplicationFiled: February 13, 2017Publication date: March 29, 2018Inventors: Robert M. Abrams, Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
-
Publication number: 20180088960Abstract: Examples of techniques for invoking a restricted access service through a RESTful interface are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: measuring, by the processing device, an idle time that represents an amount of time that an application is idle; measuring, by the processing device, an execution time that represents an amount of time that the application takes to execute a RESTful application program interface request; calculating, by the processing device, an average time for the application, wherein the average time is based on the idle time and the execution time over a selectable interval; and responsive to determining that the average time does not exceed a first threshold, initiating, by the processing device, a new instance of the application.Type: ApplicationFiled: September 23, 2016Publication date: March 29, 2018Inventors: Robert M. Abrams, Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
-
Publication number: 20170337382Abstract: Technical solutions are described for securing data by a communication apparatus. An example computer-implemented method includes receiving, by an encryption engine, a request to apply cryptography to input data. The computer-implemented method also includes generating metadata for the input data, where the metadata identifies characteristics of content included in the input data. The method further includes applying a cryptographic technique to the input data to generate output data, and outputting the output data and metadata in response to the request.Type: ApplicationFiled: May 18, 2016Publication date: November 23, 2017Inventors: VICTOR G. ALONZO, ZACHARY A. BURNS, YUK L. CHAN, GISELA C. CHENG, KIN K. CHOI, KIN NG
-
Publication number: 20170337399Abstract: Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. The data transmission request is associated with transmission data. The method further includes securing the transmission data, where the securing includes identifying a content of a predetermined type in the transmission data, and generating secured transmission data. The secured transmission data includes a corresponding modified version of the content of the predetermined type. The computer-implemented method also includes transmitting the secured transmission data in response to the data transmission request.Type: ApplicationFiled: May 18, 2016Publication date: November 23, 2017Inventors: VICTOR G. ALONZO, ZACHARY A. BURNS, YUK L. CHAN, GISELA C. CHENG, KIN K. CHOI, KIN NG
-
Patent number: 9736231Abstract: Examples of techniques for routing a representational state transfer (REST) request among a plurality of virtual processing systems are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: receiving, at a load balancer, the REST request; assigning, by the load balancer, the REST request to one of a plurality of web servers, each of the plurality of web servers executing on a virtual processing system; routing, by the one of the plurality of web servers, the REST request to one of the plurality of virtual processing systems; and storing, by the one of the plurality of web servers, state information regarding the REST request to a data store.Type: GrantFiled: September 23, 2016Date of Patent: August 15, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert M. Abrams, Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
-
Patent number: 9723068Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.Type: GrantFiled: September 20, 2016Date of Patent: August 1, 2017Assignee: International Business Machines CorporationInventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
-
Patent number: 9720750Abstract: Examples of techniques for invoking a restricted access service through a representational state transfer (RESTful) interface are disclosed. In one example implementation according to aspects of the present disclosure, a method may include: receiving, at a web server, a RESTful application program interface (API) request to access a RESTful API from a user on a mobile device; determining whether the user is authorized to access the RESTful API using an authorization service; responsive to determining that the user is authorized to access the RESTful API, routing the RESTful API request from the web server to the restricted access service to process the request; receiving, by the web server, return data from the restricted access service after processing the request; and invoking a data transformer associated with the RESTful API to transform the return data into transformed data.Type: GrantFiled: September 23, 2016Date of Patent: August 1, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert M. Abrams, Victor G. Alonzo, Gisela C. Cheng, Kin Ng, Vaughn C. Page
-
Patent number: 9716747Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.Type: GrantFiled: September 20, 2016Date of Patent: July 25, 2017Assignee: International Business Machines CorporationInventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
-
Publication number: 20170111438Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.Type: ApplicationFiled: September 20, 2016Publication date: April 20, 2017Inventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
-
Publication number: 20170111439Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.Type: ApplicationFiled: September 20, 2016Publication date: April 20, 2017Inventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
-
Publication number: 20170111440Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.Type: ApplicationFiled: September 20, 2016Publication date: April 20, 2017Inventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
-
Patent number: 9558004Abstract: A computer-implemented method includes identifying a primary computing platform, identifying one or more secondary computing platforms, and identifying a requesting virtual server. The requesting virtual server resides on the primary computing platform and is associated with one or more requesting clients. One or more donating virtual servers are identified. The donating virtual servers reside on the primary computing platform and are associated with one or more donating clients. One or more external virtual servers are identified. The external virtual servers reside on the secondary computing platforms. A resource donation scenario is determined. The resource donation scenario includes one or more resource exchanges between the requesting virtual server and the donating virtual servers. A resource adjustment scenario is determined. The resource adjustment scenario includes one or more resource exchanges between the external virtual servers.Type: GrantFiled: October 16, 2015Date of Patent: January 31, 2017Assignee: International Business Machines CorporationInventors: Victor G. Alonzo, Yuk L. Chan, Gisela C. Cheng, Kin Ng, Vaughn C. Page
-
Patent number: 9183314Abstract: A technique is provided for capturing browsing history of a webpage. A processor receives a webpage from a server, determines that a trigger associated with a user is fulfilled, and captures a page of the webpage responsive to the trigger associated with the user being fulfilled.Type: GrantFiled: April 16, 2012Date of Patent: November 10, 2015Assignee: International Business Machines CorporationInventors: Yuk L. Chan, Gisela C. Cheng, Kin Ng, Derrick L. Washington
-
Publication number: 20150113369Abstract: According to an exemplary embodiment of this disclosure, a computer-implemented method includes capturing a plurality of images from a presentation. Each of the plurality of images is associated with a unique identifier. The unique identifiers are transmitted to one or more remote audience modules. The plurality of images are then transmitted to the audience modules. With a computer processor, a first image from the plurality of images is identified as a next active image. Indications are received from the one or more of the audience modules that the next active image has been received. The audience modules are instructed to update their displays from a current active image to the next active image, after the indications are received.Type: ApplicationFiled: September 30, 2014Publication date: April 23, 2015Inventors: Yuk L. Chan, Gisela C. Cheng, Kin Ng, Derrick L. Washington
-
Publication number: 20150113367Abstract: According to an exemplary embodiment of this disclosure, a computer-implemented method includes capturing a plurality of images from a presentation. Each of the plurality of images is associated with a unique identifier. The unique identifiers are transmitted to one or more remote audience modules. The plurality of images are then transmitted to the audience modules. With a computer processor, a first image from the plurality of images is identified as a next active image. Indications are received from the one or more of the audience modules that the next active image has been received. The audience modules are instructed to update their displays from a current active image to the next active image, after the indications are received.Type: ApplicationFiled: October 17, 2013Publication date: April 23, 2015Applicant: International Business Machines CorporationInventors: Yuk L. Chan, Gisela C. Cheng, Kin Ng, Derrick L. Washington