Patents by Inventor Hyun Kyu Seo
Hyun Kyu Seo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190163919Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: ApplicationFiled: January 30, 2019Publication date: May 30, 2019Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Publication number: 20190163920Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: ApplicationFiled: January 30, 2019Publication date: May 30, 2019Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Publication number: 20190163921Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: ApplicationFiled: January 30, 2019Publication date: May 30, 2019Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Patent number: 10268825Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: GrantFiled: December 1, 2016Date of Patent: April 23, 2019Assignee: International Business Machines CorporationInventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Patent number: 10223535Abstract: A computer-implemented method improves a computer system's security. A description of real-time trends, for multiple computer security issues from a third party resource is associated with multiple security routines for a computer system. The multiple security routines are sorted according to the real-time trends, such that the sorting establishes an order of priority for running each of the multiple security routines based on the real-time trends. A percentage of sorted security routines to execute on the computer system is executed in their order of priority to identify one or more computer security issues for the computer system. One or more processors then execute a resolution program to resolve the one or more computer security issues that are identified for the computer system.Type: GrantFiled: December 14, 2016Date of Patent: March 5, 2019Assignee: International Business Machines CorporationInventors: Elizabeth A. Holz, Hyun Kyu Seo, Ronald B. Williams
-
Publication number: 20190028689Abstract: A system, computer program product and computer-implemented method for presenting data. The system includes a sensor that obtains a measurement related to a viewing parameter of a viewer in the environment, a presentation surface that provides data for viewing by the viewer, and a processor. The viewing parameter of the viewer indicates the viewer's ability to perceive the data. The processor determines the viewing parameter of the viewer from the obtained measurement and dynamically alters a presentation parameter of the presentation surface based at least in part on the viewing parameter of the viewer.Type: ApplicationFiled: July 19, 2017Publication date: January 24, 2019Inventors: Andrew S. Aaron, Hariklia Deligianni, David O.S. Melville, Mark E. Podlaseck, Hyun Kyu Seo
-
Patent number: 10171054Abstract: An approach is provided that compares inputs received at a system to a set of rules. The rules include both static rules as well as dynamic rules. The approach retrieves audio adjustments based on the comparison of inputs to the rules. The approach then automatically adjusts an output of an audio system based on the retrieved audio adjustment.Type: GrantFiled: August 24, 2017Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Kathryn Orenstein, Hyun Kyu Seo
-
Patent number: 10089452Abstract: A fingerprint scanner includes a fingerprint scanner plate, a rotating platform aligned below the fingerprint scanner plate, a light mounted on the rotating platform, a camera, one or more processors, and a memory device. The camera captures multiple images of shadows in grooves in a fingerprint of a user's finger that is pressed against the fingerprint scanner plate as the light moves on the rotating platform. The one or more processors analyze the multiple images of the shadows in the grooves in the fingerprint to determine a depth and shape of the grooves in the fingerprint, and then generate an original digital fingerprint file that represents the shape and depth of the fingerprint grooves on the user's fingerprint. The processor(s) store the original digital fingerprint file for use in future biometric verification of the user.Type: GrantFiled: September 2, 2016Date of Patent: October 2, 2018Assignee: International Business Machines CorporationInventor: Hyun Kyu Seo
-
Publication number: 20180276361Abstract: A method and/or computer system generates a three-dimensional image of a fingerprint. One or more sensors detect a first user's finger being pressed against a first fingerprint scanner, where the first user's finger has a first user's fingerprint that comprises fingerprint ridges that form fingerprint grooves. A light source on a rotating platform transmits offset light against the first user's finger as the light source rotates on the rotating platform. A camera captures shadow images of shadows in the fingerprint grooves. One or more processors receive and analyze the shadow images in order to determine a shape and depth of the fingerprint grooves. The processor(s) generate a first digital fingerprint file that represents the shape and depth of the fingerprint grooves, and store the first digital fingerprint file for use in future biometric verification of the first user.Type: ApplicationFiled: May 29, 2018Publication date: September 27, 2018Inventor: HYUN KYU SEO
-
Publication number: 20180165457Abstract: A computer-implemented method improves a computer system's security. A description of real-time trends, for multiple computer security issues from a third party resource is associated with multiple security routines for a computer system. The multiple security routines are sorted according to the real-time trends, such that the sorting establishes an order of priority for running each of the multiple security routines based on the real-time trends. A percentage of sorted security routines to execute on the computer system is executed in their order of priority to identify one or more computer security issues for the computer system. One or more processors then execute a resolution program to resolve the one or more computer security issues that are identified for the computer system.Type: ApplicationFiled: December 14, 2016Publication date: June 14, 2018Inventors: ELIZABETH A. HOLZ, HYUN KYU SEO, RONALD B. WILLIAMS
-
Publication number: 20180157842Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.Type: ApplicationFiled: December 1, 2016Publication date: June 7, 2018Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
-
Patent number: 9954882Abstract: Software that automatically detects anomalous attributes indicative of a potential intrusion in a computing system. The software performs the following operations: (i) determining a baseline pattern for one or more attributes of a computing system, based on a first set of statistical thresholds determined for received values of the one or more attributes, wherein the received values correspond to one or more time periods, and on a second set of statistical thresholds determined for a first subset of values of the received values of the one or more attributes, wherein each value of the first subset exceeds the first set of statistical thresholds; and (ii) in response to identifying, based on the determined baseline pattern, anomalous values in monitored additional values of the one or more attributes, sending an alert to a user of the computing system indicating that a potential intrusion in the computing system has occurred.Type: GrantFiled: July 27, 2016Date of Patent: April 24, 2018Assignee: International Business Machines CorporationInventors: Hyun Kyu Seo, Ronald B. Williams, Gideon Zenz
-
Publication number: 20180068100Abstract: A fingerprint scanner includes a fingerprint scanner plate, a rotating platform aligned below the fingerprint scanner plate, a light mounted on the rotating platform, a camera, one or more processors, and a memory device. The camera captures multiple images of shadows in grooves in a fingerprint of a user's finger that is pressed against the fingerprint scanner plate as the light moves on the rotating platform. The one or more processors analyze the multiple images of the shadows in the grooves in the fingerprint to determine a depth and shape of the grooves in the fingerprint, and then generate an original digital fingerprint file that represents the shape and depth of the fingerprint grooves on the user's fingerprint. The processor(s) store the original digital fingerprint file for use in future biometric verification of the user.Type: ApplicationFiled: September 2, 2016Publication date: March 8, 2018Inventor: HYUN KYU SEO
-
Publication number: 20170155674Abstract: Software that automatically detects anomalous attributes indicative of a potential intrusion in a computing system. The software performs the following operations: (i) determining a baseline pattern for one or more attributes of a computing system, based on a first set of statistical thresholds determined for received values of the one or more attributes, wherein the received values correspond to one or more time periods, and on a second set of statistical thresholds determined for a first subset of values of the received values of the one or more attributes, wherein each value of the first subset exceeds the first set of statistical thresholds; and (ii) in response to identifying, based on the determined baseline pattern, anomalous values in monitored additional values of the one or more attributes, sending an alert to a user of the computing system indicating that a potential intrusion in the computing system has occurred.Type: ApplicationFiled: July 27, 2016Publication date: June 1, 2017Inventors: Hyun Kyu Seo, Ronald B. Williams, Gideon Zenz
-
Patent number: 9471778Abstract: Software that automatically creates baselines from time series data of computer system activity, thereby providing immediate value from observed system data. The software performs the following operations: (i) receiving values of one or more attributes of a computing system that correspond to one or more time periods; (ii) determining a first set of statistical thresholds for the received values, wherein the received values include a subset of values that exceed the first set of statistical thresholds; (iii) determining a second set of statistical thresholds for the subset of values that exceed the first set of statistical thresholds; and (iv) determining a baseline pattern for the one or more attributes based, at least in part, on the determined first set of statistical thresholds and the determined second set of statistical thresholds.Type: GrantFiled: November 30, 2015Date of Patent: October 18, 2016Assignee: International Business Machines CorporationInventors: Hyun Kyu Seo, Ronald B. Williams, Gideon Zenz