Patents by Inventor James McCarty
James McCarty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230419803Abstract: According to one embodiment, a method, computer system, and computer program product for intrusion movement prediction is provided. The embodiment may include receiving environmental sensor data corresponding to a monitored space as captured by a plurality of sensors affixed to an airflow component. The embodiment may also include generating a three-dimensional model of the monitored space using the received environmental data. The method may further include, in response to determining a disturbance is present in the three-dimensional model, performing a security action.Type: ApplicationFiled: September 6, 2023Publication date: December 28, 2023Inventors: Doga Tav, Cesar Augusto Rodriguez Bravo, Richard James McCarty
-
Publication number: 20230367883Abstract: Systems are provided for generating, modifying and using SBOMs for facilitating risk assessment and threat mitigation for corresponding programs, and particularly for large programming builds. The creation and modification of the SBOMs includes processes for omitting declarations referenced in chunk SBOMs of program chunks incorporated into a final programming build associated with a build SBOM, but which are not actually utilized by the final programming build, as well as processes for adding new declarations for code segments that are not declared in the related chunk SBOMs, even though the code segments are utilized by the final programming build. Systems are also configured to use SBOMs in combination with configuration restriction records to assess and resolve threat events in a manner that can prevent unnecessary remedial actions for threat events that appear to be relevant to one or more files or dependencies incorporated into a program.Type: ApplicationFiled: May 16, 2022Publication date: November 16, 2023Inventors: Frank Joseph BUSSELL, Henry James LYONS, Nicholas Allan SCHWERZLER, Sencer Nuri YERALAN, Dale Russel ROLF, Minh Trong TRAN, David John JANSON, Thomas George YARYAN, Ian James MCCARTY
-
Publication number: 20230367882Abstract: Systems are provided for generating, modifying and using SBOMs for facilitating risk assessment and threat mitigation for corresponding programs, and particularly for large programming builds. The creation and modification of the SBOMs includes processes for omitting declarations referenced in chunk SBOMs of program chunks incorporated into a final programming build associated with a build SBOM, but which are not actually utilized by the final programming build, as well as processes for adding new declarations for code segments that are not declared in the related chunk SBOMs, even though the code segments are utilized by the final programming build. Systems are also configured to use SBOMs in combination with configuration restriction records to assess and resolve threat events in a manner that can prevent unnecessary remedial actions for threat events that appear to be relevant to one or more files or dependencies incorporated into a program.Type: ApplicationFiled: May 16, 2022Publication date: November 16, 2023Inventors: Frank Joseph BUSSELL, Henry James LYONS, Nicholas Allan SCHWERZLER, Sencer Nuri YERALAN, Dale Russel ROLF, Minh Trong TRAN, David John JANSON, Thomas George YARYAN, Ian James MCCARTY
-
Publication number: 20230367881Abstract: Systems are provided for generating, modifying and using SBOMs for facilitating risk assessment and threat mitigation for corresponding programs, and particularly for large programming builds. The creation and modification of the SBOMs includes processes for omitting declarations referenced in chunk SBOMs of program chunks incorporated into a final programming build associated with a build SBOM, but which are not actually utilized by the final programming build, as well as processes for adding new declarations for code segments that are not declared in the related chunk SBOMs, even though the code segments are utilized by the final programming build. Systems are also configured to use SBOMs in combination with configuration restriction records to assess and resolve threat events in a manner that can prevent unnecessary remedial actions for threat events that appear to be relevant to one or more files or dependencies incorporated into a program.Type: ApplicationFiled: May 16, 2022Publication date: November 16, 2023Inventors: Frank Joseph BUSSELL, Henry James LYONS, Nicholas Allan SCHWERZLER, Sencer Nuri YERALAN, Dale Russel ROLF, Minh Trong TRAN, David John JANSON, Thomas George YARYAN, Ian James MCCARTY
-
Publication number: 20230343196Abstract: According to one embodiment, a method, computer system, and computer program product for intrusion movement prediction is provided. The embodiment may include receiving environmental sensor data corresponding to a monitored space as captured by a plurality of sensors affixed to an airflow component. The embodiment may also include generating a three-dimensional model of the monitored space using the received environmental data. The method may further include, in response to determining a disturbance is present in the three-dimensional model, performing a security action.Type: ApplicationFiled: April 26, 2022Publication date: October 26, 2023Inventors: Doga Tav, Cesar Augusto Rodriguez Bravo, Richard James McCarty
-
Patent number: 11790744Abstract: According to one embodiment, a method, computer system, and computer program product for intrusion movement prediction is provided. The embodiment may include receiving environmental sensor data corresponding to a monitored space as captured by a plurality of sensors affixed to an airflow component. The embodiment may also include generating a three-dimensional model of the monitored space using the received environmental data. The method may further include, in response to determining a disturbance is present in the three-dimensional model, performing a security action.Type: GrantFiled: April 26, 2022Date of Patent: October 17, 2023Assignee: International Business Machines CorporationInventors: Doga Tav, Cesar Augusto Rodriguez Bravo, Richard James McCarty
-
Patent number: 11782068Abstract: A computer-implemented method, a system, and a computer program product for detecting objects are disclosed. The method can include receiving, by a computer communicatively connected to a plurality of anemometers positioned throughout the space, first sensor data from the plurality of anemometers, creating a baseline profile of airflow in the space based on the first sensor data, and receiving second sensor data from the plurality of anemometers at a different time than the first sensor data. The method can include comparing the second sensor data with the first sensor data to determine first different data, rendering, in response to determining that the second sensor data is different from the first sensor data, a representation of the object using the first different data and first location data related to the first different data, and calculating a vector associated with the object using the first different data and the first location data.Type: GrantFiled: June 9, 2021Date of Patent: October 10, 2023Assignee: International Business Machines CorporationInventors: Doga Tav, Richard James McCarty, Cesar Augusto Rodriguez Bravo
-
Patent number: 11722527Abstract: An application-centric authorization model utilizes locally-evaluated rules derived from non-local policies and provided to the application via an authorization object, preferably in the subject's session context. Preferably, the approach does not involve a runtime determination regarding the policy or policies; rather, one or more existing policies are merely used to derive authorization rules associated with a subject, and which are then evaluated and enforced at runtime in a computationally-efficient manner within the local runtime context of the application or service.Type: GrantFiled: September 26, 2021Date of Patent: August 8, 2023Assignee: International Business Machines CorporationInventors: Richard James McCarty, Pradeep Kadiyala
-
Publication number: 20220397586Abstract: A computer-implemented method, a system, and a computer program product for detecting objects are disclosed. The method can include receiving, by a computer communicatively connected to a plurality of anemometers positioned throughout the space, first sensor data from the plurality of anemometers, creating a baseline profile of airflow in the space based on the first sensor data, and receiving second sensor data from the plurality of anemometers at a different time than the first sensor data. The method can include comparing the second sensor data with the first sensor data to determine first different data, rendering, in response to determining that the second sensor data is different from the first sensor data, a representation of the object using the first different data and first location data related to the first different data, and calculating a vector associated with the object using the first different data and the first location data.Type: ApplicationFiled: June 9, 2021Publication date: December 15, 2022Inventors: Doga Tav, Richard James McCarty, Cesar Augusto Rodriguez Bravo
-
Patent number: 11522832Abstract: A system includes a plurality of secure gateways that each use a plurality of datasets to determine how to process messages between devices on a network and websites on the internet. A version control server in the system automatically sends a dataset to each secure gateway in the plurality of secure gateways.Type: GrantFiled: November 29, 2018Date of Patent: December 6, 2022Assignee: Target Brands, Inc.Inventors: Gordon James McCarty, Dmitri Aleksandrovich Zadvornov, DeYung Quoc Le
-
Publication number: 20220014564Abstract: An application-centric authorization model utilizes locally-evaluated rules derived from non-local policies and provided to the application via an authorization object, preferably in the subject's session context. Preferably, the approach does not involve a runtime determination regarding the policy or policies; rather, one or more existing policies are merely used to derive authorization rules associated with a subject, and which are then evaluated and enforced at runtime in a computationally-efficient manner within the local runtime context of the application or service.Type: ApplicationFiled: September 26, 2021Publication date: January 13, 2022Applicant: International Business Machines CorporationInventors: Richard James McCarty, Pradeep Kadiyala
-
Publication number: 20210392168Abstract: A cookie compliance management system enables automated evaluation of cookie compliance within an enterprise. The system determines whether a cookie set by an application in the environment is compliant with a policy. It comprises a workflow engine, a cookie discovery engine (CDE), a cookie characterization engine (CCE), a cookie policy engine (PE), and a cookie registry. The workflow engine receives a request to initiate an evaluation of an application for cookie compliance. The CDE is invoked and returns cookies that are set by the application. The CCE receives a set of base attributes associated with a cookie discovered by the CDE, and computes a set of descriptive attributes determined to be required to enable evaluation of the cookie according to a policy. The policy engine receives policy rules and the set of descriptive attributes and, in response, determines whether the cookie is compliant with the policy. The cookie registry stores cookie data.Type: ApplicationFiled: August 27, 2021Publication date: December 16, 2021Applicant: International Business Machines CorporationInventors: Richard James McCarty, Ning Yan, Vishwas Chouhan
-
Patent number: 11146593Abstract: An application-centric authorization model utilizes locally-evaluated rules derived from non-local policies and provided to the application via an authorization object, preferably in the subject's session context. Preferably, the approach does not involve a runtime determination regarding the policy or policies; rather, one or more existing policies are merely used to derive authorization rules associated with a subject, and which are then evaluated and enforced at runtime in a computationally-efficient manner within the local runtime context of the application or service.Type: GrantFiled: May 10, 2019Date of Patent: October 12, 2021Assignee: International Business Machines CorporationInventors: Richard James McCarty, Pradeep Kadiyala
-
Patent number: 11122086Abstract: A cookie compliance management system enables automated evaluation of cookie compliance within an enterprise. The system determines whether a cookie set by an application in the environment is compliant with a policy. It comprises a workflow engine, a cookie discovery engine (CDE), a cookie characterization engine (CCE), a cookie policy engine (PE), and a cookie registry. The workflow engine receives a request to initiate an evaluation of an application for cookie compliance. The CDE is invoked and returns cookies that are set by the application. The CCE receives a set of base attributes associated with a cookie discovered by the CDE, and computes a set of descriptive attributes determined to be required to enable evaluation of the cookie according to a policy. The policy engine receives policy rules and the set of descriptive attributes and, in response, determines whether the cookie is compliant with the policy. The cookie registry stores cookie data.Type: GrantFiled: May 30, 2019Date of Patent: September 14, 2021Assignee: International Business Machines CorporationInventors: Richard James McCarty, Ning Yan, Vishwas Chouhan
-
Publication number: 20200382554Abstract: A cookie compliance management system enables automated evaluation of cookie compliance within an enterprise. The system determines whether a cookie set by an application in the environment is compliant with a policy. It comprises a workflow engine, a cookie discovery engine (CDE), a cookie characterization engine (CCE), a cookie policy engine (PE), and a cookie registry. The workflow engine receives a request to initiate an evaluation of an application for cookie compliance. The CDE is invoked and returns cookies that are set by the application. The CCE receives a set of base attributes associated with a cookie discovered by the CDE, and computes a set of descriptive attributes determined to be required to enable evaluation of the cookie according to a policy. The policy engine receives policy rules and the set of descriptive attributes and, in response, determines whether the cookie is compliant with the policy. The cookie registry stores cookie data.Type: ApplicationFiled: May 30, 2019Publication date: December 3, 2020Applicant: International Business Machines CorporationInventors: Richard James McCarty, Ning Yan, Vishwas Chouhan
-
Publication number: 20200358823Abstract: An application-centric authorization model utilizes locally-evaluated rules derived from non-local policies and provided to the application via an authorization object, preferably in the subject's session context. Preferably, the approach does not involve a runtime determination regarding the policy or policies; rather, one or more existing policies are merely used to derive authorization rules associated with a subject, and which are then evaluated and enforced at runtime in a computationally-efficient manner within the local runtime context of the application or service.Type: ApplicationFiled: May 10, 2019Publication date: November 12, 2020Applicant: International Business Machines CorporationInventors: Richard James McCarty, Pradeep Kadiyala
-
Publication number: 20200177544Abstract: A system includes a plurality of secure gateways that each use a plurality of datasets to determine how to process messages between devices on a network and websites on the internet. A version control server in the system automatically sends a dataset to each secure gateway in the plurality of secure gateways.Type: ApplicationFiled: November 29, 2018Publication date: June 4, 2020Inventors: Gordon James McCarty, Dmitri Aleksandrovich Zadvornov, DeYung Quoc Le
-
Patent number: 10375111Abstract: Anonymous containers are discussed herein. An operating system running on a computing device, also referred to herein as a host operating system running on a host device, prevents an application from accessing personal information (e.g., user information or corporate information) by activating an anonymous container that is isolated from the host operating system. In order to create and activate the anonymous container, a container manager anonymizes the configuration and settings data of the host operating system, and injects the anonymous configuration and settings data into the anonymous container. Such anonymous configuration and settings data may include, by way of example and not limitation, application data, machine configuration data, and user settings data. The host operating system then allows the application to run in the anonymous container.Type: GrantFiled: February 10, 2017Date of Patent: August 6, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Benjamin M. Schultz, Frederick Justus Smith, Daniel Vasquez Lopez, Abhinav Mishra, Ian James McCarty, John A. Starks, Joshua David Ebersol, Ankit Srivastava, Hari R. Pulapaka, Mehmet Iyigun, Stephen E. Bensley, Giridhar Viswanathan
-
Publication number: 20180139238Abstract: Anonymous containers are discussed herein. An operating system running on a computing device, also referred to herein as a host operating system running on a host device, prevents an application from accessing personal information (e.g., user information or corporate information) by activating an anonymous container that is isolated from the host operating system. In order to create and activate the anonymous container, a container manager anonymizes the configuration and settings data of the host operating system, and injects the anonymous configuration and settings data into the anonymous container. Such anonymous configuration and settings data may include, by way of example and not limitation, application data, machine configuration data, and user settings data. The host operating system then allows the application to run in the anonymous container.Type: ApplicationFiled: February 10, 2017Publication date: May 17, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Benjamin M. Schultz, Frederick Justus Smith, Daniel Vasquez Lopez, Abhinav Mishra, Ian James McCarty, John A. Starks, Joshua David Ebersol, Ankit Srivastava, Hari R. Pulapaka, Mehmet Iyigun, Stephen E. Bensley, Giridhar Viswanathan
-
Patent number: 9596123Abstract: A proxy is integrated within an F-SSO environment and interacts with an external identity provider (IdP) instance discovery service. The proxy proxies IdP instance requests to the discovery service and receives responses that include the IdP instance assignments. The proxy maintains a cache of the instance assignment(s). As new instance requests are received, the cached assignment data is used to provide appropriate responses in lieu of proxying these requests to the discovery service, thereby reducing the time needed to identify the required IdP instance. The proxy dynamically maintains and manages its cache by subscribing to updates from the discovery service. The updates identify IdP instance changes (such as servers being taken offline for maintenance, new services being added, etc.) occurring within the set of geographically-distributed instances that comprise the IdP service. The updates are provided via a publication-subscription model such that the proxy receives change notifications proactively.Type: GrantFiled: March 1, 2013Date of Patent: March 14, 2017Assignee: International Business Machines CorporationInventors: Heather Maria Hinton, Richard James McCarty, Clifton Steve Looney