Patents by Inventor Hank Ibell
Hank Ibell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10930100Abstract: A method for monitoring a physical area for unauthorized access by a user of a wireless device, includes scanning for signals from a wireless device, detecting a wireless signal from a wireless device, determining a wireless device ID associated with the wireless signal, determining whether the wireless device ID matches a wireless ID in an authorized or unauthorized ID list and in response to determining that the wireless device ID matches a wireless ID in the unauthorized wireless ID list, activate a security alert. The method may further include in response to determining, that the wireless device ID does not match a wireless ID in the authorized wireless ID list nor the unauthorized wireless ID list, receiving, signal strength information associated with the detected wireless signal for a predetermined time interval and determining a pattern as a function of time of the received signal strength.Type: GrantFiled: November 20, 2019Date of Patent: February 23, 2021Assignee: International Business Machines CorporationInventors: William Lucy, Hank Ibell, John Anthony Feller, Christopher Meyer
-
Patent number: 10601784Abstract: Approaches presented herein enable obscuring a query from an external web service provider. More specifically, a user-submitted query is split into at least two non-identical, secondary search queries. The non-identical search queries are submitted to an external web services provider separately, at different times spread throughout a search timeframe, from different virtual locations, thereby obscuring the original search query from the external web services provider. An internal system receives and merges the search results of the non-identical secondary queries from the external web services provider. The internal system then performs a second search on the merged results using the original user-submitted search query to find the results within the merged results that are most relevant to the original query. These relevant results are then presented to the user.Type: GrantFiled: November 15, 2017Date of Patent: March 24, 2020Assignee: International Business Machines CorporationInventors: John A. Feller, Hank Ibell, William Lucy, Joseph Marrero Corchado
-
Patent number: 10601785Abstract: Approaches presented herein enable obscuring a query from an external web service provider. More specifically, a user-submitted query is split into at least two non-identical, secondary search queries. The non-identical search queries are submitted to an external web services provider separately, at different times spread throughout a search timeframe, from different virtual locations, thereby obscuring the original search query from the external web services provider. An internal system receives and merges the search results of the non-identical secondary queries from the external web services provider. The internal system then performs a second search on the merged results using the original user-submitted search query to find the results within the merged results that are most relevant to the original query. These relevant results are then presented to the user.Type: GrantFiled: December 21, 2017Date of Patent: March 24, 2020Assignee: International Business Machines CorporationInventors: John A. Feller, Hank Ibell, William Lucy, Joseph Marrero Corchado
-
Publication number: 20200090431Abstract: A method for monitoring a physical area for unauthorized access by a user of a wireless device, includes scanning for signals from a wireless device, detecting a wireless signal from a wireless device, determining a wireless device ID associated with the wireless signal, determining whether the wireless device ID matches a wireless ID in an authorized or unauthorized ID list and in response to determining that the wireless device ID matches a wireless ID in the unauthorized wireless ID list, activate a security alert. The method may further include in response to determining, that the wireless device ID does not match a wireless ID in the authorized wireless ID list nor the unauthorized wireless ID list, receiving, signal strength information associated with the detected wireless signal for a predetermined time interval and determining a pattern as a function of time of the received signal strength.Type: ApplicationFiled: November 20, 2019Publication date: March 19, 2020Inventors: William Lucy, Hank Ibell, John Anthony Feller, Christopher Meyer
-
Patent number: 10529152Abstract: Monitoring a physical area for detection of a wireless device includes scanning for signals from a wireless device within a scanning range defining the physical area, detecting a wireless signal from a wireless device within the scanning range, determining a wireless device ID associated with the wireless device detected within the scanning range and determining whether the wireless device ID is unknown. In response to determining that the wireless device ID is unknown, analyzing the wireless signal to determine scan data representative of the wireless signal, monitoring the scan data over time, determining a scan data pattern as a function of time based on the monitored scan data, comparing the scan data pattern to scan data patterns stored in a database and in response to determining that the scan data pattern based on the monitored scan data matches a scan data pattern in the database, activate a first alert.Type: GrantFiled: June 25, 2019Date of Patent: January 7, 2020Assignee: International Business Machines CorporationInventors: William Lucy, Hank Ibell, John Anthony Feller, Christopher Meyer
-
Publication number: 20190311560Abstract: Monitoring a physical area for detection of a wireless device includes scanning for signals from a wireless device within a scanning range defining the physical area, detecting a wireless signal from a wireless device within the scanning range, determining a wireless device ID associated with the wireless device detected within the scanning range and determining whether the wireless device ID is unknown. In response to determining that the wireless device ID is unknown, analyzing the wireless signal to determine scan data representative of the wireless signal, monitoring the scan data over time, determining a scan data pattern as a function of time based on the monitored scan data, comparing the scan data pattern to scan data patterns stored in a database and in response to determining that the scan data pattern based on the monitored scan data matches a scan data pattern in the database, activate a first alert.Type: ApplicationFiled: June 25, 2019Publication date: October 10, 2019Inventors: William Lucy, Hank Ibell, John Anthony Feller, Christopher Meyer
-
Patent number: 10417845Abstract: Monitoring a physical area for unauthorized access by a user of a wireless device includes setting a wireless signal scanning range using at least one wireless scanning device, detecting a wireless signal within the scanning range, determining a status of the wireless device of authorized, unauthorized or unknown, monitoring scan data obtained from the scanning device during the time the wireless signal remains within the scanning range. A scan data pattern based on the monitored scan data is determined and compared to a scan data pattern database containing scan data patterns indicative of suspicious behavior and determining whether the monitored scan data pattern matches a suspicious scan data pattern based on the comparison. The system identifies the wireless device as unauthorized in response to a match with a suspicious scan data pattern and activates a security alert.Type: GrantFiled: February 26, 2018Date of Patent: September 17, 2019Assignee: International Business Machines CorporationInventors: William Lucy, Hank Ibell, John Anthony Feller, Christopher Meyer
-
Publication number: 20190266817Abstract: Monitoring a physical area for unauthorized access by a user of a wireless device includes setting a wireless signal scanning range using at least one wireless scanning device, detecting a wireless signal within the scanning range, determining a status of the wireless device of authorized, unauthorized or unknown, monitoring scan data obtained from the scanning device during the time the wireless signal remains within the scanning range. A scan data pattern based on the monitored scan data is determined and compared to a scan data pattern database containing scan data patterns indicative of suspicious behavior and determining whether the monitored scan data pattern matches a suspicious scan data pattern based on the comparison. The system identifies the wireless device as unauthorized in response to a match with a suspicious scan data pattern and activates a security alert.Type: ApplicationFiled: February 26, 2018Publication date: August 29, 2019Inventors: William Lucy, Hank Ibell, John Anthony Feller, Christopher Meyer
-
Publication number: 20190149522Abstract: Approaches presented herein enable obscuring a query from an external web service provider. More specifically, a user-submitted query is split into at least two non-identical, secondary search queries. The non-identical search queries are submitted to an external web services provider separately, at different times spread throughout a search timeframe, from different virtual locations, thereby obscuring the original search query from the external web services provider. An internal system receives and merges the search results of the non-identical secondary queries from the external web services provider. The internal system then performs a second search on the merged results using the original user-submitted search query to find the results within the merged results that are most relevant to the original query. These relevant results are then presented to the user.Type: ApplicationFiled: December 21, 2017Publication date: May 16, 2019Inventors: John A. Feller, Hank Ibell, William Lucy, Joseph Marrero Corchado
-
Publication number: 20190149520Abstract: Approaches presented herein enable obscuring a query from an external web service provider. More specifically, a user-submitted query is split into at least two non-identical, secondary search queries. The non-identical search queries are submitted to an external web services provider separately, at different times spread throughout a search timeframe, from different virtual locations, thereby obscuring the original search query from the external web services provider. An internal system receives and merges the search results of the non-identical secondary queries from the external web services provider. The internal system then performs a second search on the merged results using the original user-submitted search query to find the results within the merged results that are most relevant to the original query. These relevant results are then presented to the user.Type: ApplicationFiled: November 15, 2017Publication date: May 16, 2019Inventors: John A. Feller, Hank Ibell, William Lucy, Joseph Marrero Corchado