Patents by Inventor James Ruddy
James Ruddy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10904226Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.Type: GrantFiled: November 20, 2019Date of Patent: January 26, 2021Assignee: International Business Machines CorporationInventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquillo Valdez
-
Publication number: 20200092267Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.Type: ApplicationFiled: November 20, 2019Publication date: March 19, 2020Inventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquillo Valdez
-
Patent number: 10547596Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.Type: GrantFiled: April 5, 2019Date of Patent: January 28, 2020Assignee: International Business Machines CorporationInventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquillo Valdez
-
Patent number: 10523640Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.Type: GrantFiled: December 6, 2018Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquillo Valdez
-
Publication number: 20190230069Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.Type: ApplicationFiled: April 5, 2019Publication date: July 25, 2019Inventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquillo Valdez
-
Patent number: 10298545Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.Type: GrantFiled: September 12, 2013Date of Patent: May 21, 2019Assignee: International Business Machines CorporationInventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquillo Valdez
-
Publication number: 20190116164Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.Type: ApplicationFiled: December 6, 2018Publication date: April 18, 2019Inventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquillo Valdez
-
Patent number: 10158607Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.Type: GrantFiled: September 15, 2015Date of Patent: December 18, 2018Assignee: International Business Machines CorporationInventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquilo Valdez
-
Patent number: 9749212Abstract: A multi-mainframe system problem determination method includes receiving, in a first computing system, a data collection trigger, coordinating, in the first computing system, synchronized diagnostic data collection with a second computing system, and delivering the diagnostic data to a storage medium.Type: GrantFiled: September 30, 2014Date of Patent: August 29, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David D. Chambliss, Joshua W. Knight, Ronald K. Kreuzenstein, John J. Lee, James A. Ruddy, John G. Thompson, Harry M. Yudenfriend
-
Patent number: 9722908Abstract: A multi-mainframe system problem determination method includes recording, in a first computing system, diagnostic data, receiving, in the first computing system, a data collection trigger, responsive to the data collection trigger, coordinating, in the first computing system, synchronized collection of recorded diagnostic data with a second computing system and delivering collected diagnostic data to a storage medium.Type: GrantFiled: October 17, 2013Date of Patent: August 1, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David D. Chambliss, Joshua W. Knight, Ronald K. Kreuzenstein, John J. Lee, James A. Ruddy, John G. Thompson, Harry M. Yudenfriend
-
Publication number: 20160006703Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.Type: ApplicationFiled: September 15, 2015Publication date: January 7, 2016Inventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquilo Valdez
-
Patent number: 9053141Abstract: A multi-mainframe operating system serialization method can include receiving, in a first computing system, a request to access a data set on behalf of a first peer application, sending, in the first computing system, a notification to a second peer application to obtain a normal enqueue, in response to the second peer application obtaining the normal enqueue, obtaining, in the first computing system, a first rider enqueue for the data set and sending, in the first computing system, a communication to peer instances to obtain additional rider enqueues for the data set, the additional rider enqueues corresponding to the first rider enqueue.Type: GrantFiled: October 31, 2011Date of Patent: June 9, 2015Assignee: International Business Machines CorporationInventors: David D. Chambliss, Joshua W. Knight, Ronald K. Kreuzenstein, John J. Lee, Nicholas C. Matsakis, James A. Ruddy, John G. Thompson, Harry M. Yudenfriend
-
Patent number: 9032484Abstract: A heterogeneous computing system includes a first server module having a first operating system, a second server module communicatively coupled to the first server module, the second server module having a second operating system dissimilar to the first operating system, a data set accessible by the first server module and the second server module; and a process residing on the first server module, the process configured to grant access to the second server module, from the first server module, to the data set.Type: GrantFiled: October 31, 2011Date of Patent: May 12, 2015Assignee: International Business Machines CorporationInventors: David D. Chambliss, Joshua W. Knight, Ronald K. Kreuzenstein, John J. Lee, James A. Ruddy, John G. Thompson, Harry M. Yudenfriend
-
Patent number: 9026730Abstract: Embodiments relate to a method for data management. An aspect includes a method for assigning storage types to data based on access frequency. Past or historical data associated with current data usage is also considered prior to assignment. Once data frequency access is determined, the current data is assigned to a first tier of a plurality of hierarchical ordered tiers, each tier corresponding to at least one class of storage. In one embodiment, there may be a condition that overrides the assignment with option to override it. The tier assignment may also be preserved the tier so that the current data can be appropriately assigned in the future.Type: GrantFiled: March 8, 2013Date of Patent: May 5, 2015Assignee: International Business Machines CorporationInventors: David D. Chambliss, Chiahong Chen, Lawrence Y. Chiu, Yu-Cheng Hsu, James A. Ruddy, Harry M. Yudenfriend
-
Publication number: 20150113130Abstract: A multi-mainframe system problem determination method includes receiving, in a first computing system, a data collection trigger, coordinating, in the first computing system, synchronized diagnostic data collection with a second computing system, and delivering the diagnostic data to a storage medium.Type: ApplicationFiled: September 30, 2014Publication date: April 23, 2015Inventors: David D. Chambliss, Joshua W. Knight, Ronald K. Kreuzenstein, John J. Lee, James A. Ruddy, John G. Thompson, Harry M. Yudenfriend
-
Publication number: 20150113116Abstract: A multi-mainframe system problem determination method includes recording, in a first computing system, diagnostic data, receiving, in the first computing system, a data collection trigger, responsive to the data collection trigger, coordinating, in the first computing system, synchronized collection of recorded diagnostic data with a second computing system and delivering collected diagnostic data to a storage medium.Type: ApplicationFiled: October 17, 2013Publication date: April 23, 2015Applicant: International Business Machines CorporationInventors: David D. Chambliss, Joshua W. Knight, Ronald K. Kreuzenstein, John J. Lee, James A. Ruddy, John G. Thompson, Harry M. Yudenfriend
-
Patent number: 9015413Abstract: Embodiments relate to a system and computer program product for data management. An aspect includes a method for assigning storage types to data based on access frequency. Past or historical data associated with current data usage is also considered prior to assignment. Once data frequency access is determined, the current data is assigned to a first tier of a plurality of hierarchical ordered tiers, each tier corresponding to at least one class of storage. In one embodiment, there may be a condition that overrides the assignment with option to override it. The tier assignment may also be preserved so that the current data can be appropriately assigned in the future.Type: GrantFiled: October 2, 2012Date of Patent: April 21, 2015Assignee: International Business Machines CorporationInventors: David D. Chambliss, Chiahong Chen, Lawrence Y. Chiu, Yu-Cheng Hsu, James A. Ruddy, Harry M. Yudenfriend
-
Patent number: 9009138Abstract: A method and apparatus for transparent analytical query acceleration identifies within a database management system (DBMS) if a query is an analytical type. The query is processed with an analytical query processor if the query is the analytical type. In addition, the query is processed within the DBMS if the query is not the analytical type.Type: GrantFiled: June 17, 2011Date of Patent: April 14, 2015Assignee: International Business Machines CorporationInventors: Oliver Draese, Namik Hrle, James A. Ruddy
-
Publication number: 20150074392Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.Type: ApplicationFiled: September 12, 2013Publication date: March 12, 2015Applicant: International Business Machines CorporationInventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquillo Valdez
-
Publication number: 20140095790Abstract: Embodiments relate to a method for data management. An aspect includes a method for assigning storage types to data based on access frequency. Past or historical data associated with current data usage is also considered prior to assignment. Once data frequency access is determined, the current data is assigned to a first tier of a plurality of hierarchical ordered tiers, each tier corresponding to at least one class of storage. In one embodiment, there may be a condition that overrides the assignment with option to override it. The tier assignment may also be preserved the tier so that the current data can be appropriately assigned in the future.Type: ApplicationFiled: March 8, 2013Publication date: April 3, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David D. Chambliss, Chiahong Chen, Lawrence Y. Chiu, Yu-Cheng Hsu, James A. Ruddy, Harry M. Yudenfriend