Patents by Inventor Jeffrey R. Hoy
Jeffrey R. Hoy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11140534Abstract: Provided are techniques for controlling message delivery corresponding to a near field communication (NFC) device, comprising establishing, on a mobile computing device, a rule-based session corresponding to a NFC device; executing an application, corresponding to the NFC device, in conjunction with the session; and responsive to detecting a condition meeting a criterion corresponding to the rule-based session, limiting execution of the application on the mobile computing device in conformity with the criterion.Type: GrantFiled: December 13, 2017Date of Patent: October 5, 2021Assignee: International Business Machines CorporationInventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
-
Patent number: 11113352Abstract: Adjusting system actions based on an absence of relationship acceptance may include detecting absence of connection acceptance by one or more first users in a computer-implemented social networking system. Patterns of the absence of connection acceptance of the one or more first users may be correlated. Users with common patterns of absence of connection acceptance may be clustered into a cluster of users. Absence of connection acceptance by a second user may be detected. Responsive to determining that a pattern of the absence of connection acceptance associated with the second user matches with the common patterns, a profile associated with the second user may be updated according to a template profile associated with the cluster. System actions of the social networking system may be activated for the second user based on the profile updated according to the template profile.Type: GrantFiled: January 23, 2020Date of Patent: September 7, 2021Assignee: International Business Machines CorporationInventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
-
Patent number: 11057326Abstract: A social network activity mode that is implemented using social network activity rules is identified. The social network activity rules allow only social network posts of relevance to a particular activity of a user to be presented to the user. The social network activity mode is applied to a group of social network posts. Based upon applying the social network activity mode to the group of social network posts, social network posts that comply with the social network activity rules of the social network activity mode are provided to the user and social network posts that do not comply with the social network activity rules of the social network activity mode are blocked.Type: GrantFiled: September 15, 2019Date of Patent: July 6, 2021Assignee: International Business Machines CorporationInventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
-
Patent number: 10972422Abstract: Presenting an electronic message includes receiving an electronic message, the electronic message includes a message originator, a message recipient, and a number of digital stamps wherein each of the number of digital stamps is associated with a social network, validating each digital stamp by contacting the social network associated with that digital stamp, when a digital stamp is validated, identifying a social relationship between the message recipient and the message originator using the social network corresponding to that digital stamp, and displaying, with the electronic message, an indication of the social relationship.Type: GrantFiled: May 21, 2015Date of Patent: April 6, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
-
Patent number: 10834100Abstract: A method, apparatus and computer program product for managing a plurality of VPN tunnels between a first cloud and a second cloud in a hybrid cloud environment is described. In a first virtual private network (VPN) manager a request is received from a first cloud application resident in the first cloud. The request includes a first set of requirements for a first VPN tunnel in the plurality of VPN tunnels. The VPN manager sends a first VPN manager request to a first system in a first cloud, wherein the first system creates the first VPN tunnel according to the first set of requirements. The VPN manager receives a request from a second cloud application resident in the first cloud. The request includes a second set of requirements for a VPN tunnel in the plurality of VPN tunnels. The VPN manager sends a second VPN manager request to the system in a first cloud, wherein the second VPN manager request contains the second set of requirements.Type: GrantFiled: October 28, 2019Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Jeffrey R Hoy, Sreekanth R Iyer, Kaushal K Kapadia, Ravi K Muthukrishnan, Nataraj Nagaratnam
-
Patent number: 10834108Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.Type: GrantFiled: July 12, 2019Date of Patent: November 10, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
-
Patent number: 10824652Abstract: Identifying content in an incoming message on a social network includes categorizing a sender-recipient relationship between a sender and a recipient of an incoming message in an activity stream in a display.Type: GrantFiled: July 9, 2019Date of Patent: November 3, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
-
Patent number: 10686809Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.Type: GrantFiled: May 6, 2019Date of Patent: June 16, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
-
Patent number: 10666670Abstract: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.Type: GrantFiled: May 20, 2019Date of Patent: May 26, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
-
Publication number: 20200159799Abstract: Adjusting system actions based on an absence of relationship acceptance may include detecting absence of connection acceptance by one or more first users in a computer-implemented social networking system. Patterns of the absence of connection acceptance of the one or more first users may be correlated. Users with common patterns of absence of connection acceptance may be clustered into a cluster of users. Absence of connection acceptance by a second user may be detected. Responsive to determining that a pattern of the absence of connection acceptance associated with the second user matches with the common patterns, a profile associated with the second user may be updated according to a template profile associated with the cluster. System actions of the social networking system may be activated for the second user based on the profile updated according to the template profile.Type: ApplicationFiled: January 23, 2020Publication date: May 21, 2020Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
-
Patent number: 10630624Abstract: A method, system and/or computer program product predicts viewing activity of a new posting to an activity stream. A first computer transmits a new posting to an activity stream in a second computer, where the new posting is available to a potential viewer set. Based on identified viewer information about one or more members of the potential viewer set, a prediction is made of viewing activity of the new posting by the potential viewer set. This predicted viewing activity is based on identified viewer information about members of the potential viewer set, and describes a predicted likelihood of the potential viewer set viewing the new posting. The derived predicted viewing activity of the new posting by the potential viewer set is then presented at the first computer.Type: GrantFiled: June 23, 2016Date of Patent: April 21, 2020Assignee: International Business Machines CorporationInventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
-
Publication number: 20200067877Abstract: A method, apparatus and computer program product for managing a plurality of VPN tunnels between a first cloud and a second cloud in a hybrid cloud environment is described. In a first virtual private network (VPN) manager a request is received from a first cloud application resident in the first cloud. The request includes a first set of requirements for a first VPN tunnel in the plurality of VPN tunnels. The VPN manager sends a first VPN manager request to a first system in a first cloud, wherein the first system creates the first VPN tunnel according to the first set of requirements. The VPN manager receives a request from a second cloud application resident in the first cloud. The request includes a second set of requirements for a VPN tunnel in the plurality of VPN tunnels. The VPN manager sends a second VPN manager request to the system in a first cloud, wherein the second VPN manager request contains the second set of requirements.Type: ApplicationFiled: October 28, 2019Publication date: February 27, 2020Inventors: Jeffrey R. Hoy, Sreekanth R. Iyer, Kaushal K. Kapadia, Ravi K. Muthukrishnan, Nataraj Nagaratnam
-
Patent number: 10565272Abstract: Adjusting system actions based on an absence of relationship acceptance may include detecting absence of connection acceptance by one or more first users in a computer-implemented social networking system. Patterns of the absence of connection acceptance of the one or more first users may be correlated. Users with common patterns of absence of connection acceptance may be clustered into a cluster of users. Absence of connection acceptance by a second user may be detected. Responsive to determining that a pattern of the absence of connection acceptance associated with the second user matches with the common patterns, a profile associated with the second user may be updated according to a template profile associated with the cluster. System actions of the social networking system may be activated for the second user based on the profile updated according to the template profile.Type: GrantFiled: October 26, 2015Date of Patent: February 18, 2020Assignee: International Business Machines CorporationInventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
-
Patent number: 10560725Abstract: An indication is received, from a content viewing device used by a remote viewer, that specifies a video content sub-area of interest within streamed video content viewed by the remote viewer. Original video content outside of the video content sub-area of interest is designated as a region not of interest (RNOI) within the streamed video content. A transmission rate of image changes of the original video content within the RNOI is reduced within the streamed video content. Image disparity between the video content sub-area of interest and the RNOI is reduced by continuing to transmit the image changes of the original video content within the RNOI at the reduced transmission rate. Bandwidth consumed to transmit the streamed video content is reduced in relation to the reduced transmission rate of the image changes of the original video content within the RNOI.Type: GrantFiled: December 9, 2018Date of Patent: February 11, 2020Assignee: International Business Machines CorporationInventors: Kulvir S. Bhogal, Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
-
Patent number: 10552751Abstract: A method for conversation branching may include storing a plurality of messages communicated in an online conversation and generating a fingerprint for each message. The fingerprint for each message may be stored in a lookup table. The method may also include detecting a new message from one of the users and processing the new message to generate an artifact that correlates to the new message. The lookup table may be queried using the artifact to determine a similarity between the new message and each of the stored messages. One or more proposed reply messages to the new message may be generated for branching the online conversation to a new conversation point that corresponds to a selected one of the one or more proposed reply messages. The one or more proposed reply messages are based on one of the stored messages that has a closest similarity to the new message.Type: GrantFiled: November 5, 2018Date of Patent: February 4, 2020Assignee: International Business Machines CorporationInventors: Paul R. Bastide, Kulvir S. Bhogal, Jeffrey R. Hoy, Asima Silva
-
Patent number: 10540596Abstract: A method for conversation branching may include storing a plurality of messages communicated in an online conversation and generating a fingerprint for each message. The fingerprint for each message may be stored in a lookup table. The method may also include detecting a new message from one of the users and processing the new message to generate an artifact that correlates to the new message. The lookup table may be queried using the artifact to determine a similarity between the new message and each of the stored messages. One or more proposed reply messages to the new message may be generated for branching the online conversation to a new conversation point that corresponds to a selected one of the one or more proposed reply messages. The one or more proposed reply messages are based on one of the stored messages that has a closest similarity to the new message.Type: GrantFiled: November 5, 2018Date of Patent: January 21, 2020Assignee: International Business Machines CorporationInventors: Paul R. Bastide, Kulvir S. Bhogal, Jeffrey R. Hoy, Asima Silva
-
Patent number: 10536469Abstract: Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes identifying a second system in the in the networked computing environment as an at-risk system based on a proximity of the second system to the first system. The method additionally includes re-generating, by the at least one computer device, the second system as a new system at a new location in the networked computing environment. The method further includes converting, by the at least one computer device, the second system to a decoy system.Type: GrantFiled: November 29, 2018Date of Patent: January 14, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
-
Publication number: 20200014647Abstract: A social network activity mode that is implemented using social network activity rules is identified. The social network activity rules allow only social network posts of relevance to a particular activity of a user to be presented to the user. The social network activity mode is applied to a group of social network posts. Based upon applying the social network activity mode to the group of social network posts, social network posts that comply with the social network activity rules of the social network activity mode are provided to the user and social network posts that do not comply with the social network activity rules of the social network activity mode are blocked.Type: ApplicationFiled: September 15, 2019Publication date: January 9, 2020Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
-
Patent number: 10505904Abstract: A method, apparatus and computer program product manage a plurality of VPN tunnels between a first cloud and a second cloud in a hybrid cloud environment is described. A first virtual private network (VPN) agent manages a first VPN tunnel in a plurality of VPN tunnels. The first VPN tunnel provides communication for traffic between a first node in a first cloud and a second node in a second cloud in a hybrid cloud environment. The agent receives a request from a VPN manager which includes a first set of requirements for a first cloud application for the first VPN tunnel in the plurality of VPN tunnels. The agent creates the first VPN tunnel according to the first set of requirements. Next, the agent receives a modification request from the VPN manager containing a second set of requirements for a second cloud application.Type: GrantFiled: October 14, 2018Date of Patent: December 10, 2019Assignee: International Business Machines CorporationInventors: Jeffrey R Hoy, Sreekanth R Iyer, Kaushal K Kapadia, Ravi K Muthukrishnan, Nataraj Nagaratnam
-
Publication number: 20190342309Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.Type: ApplicationFiled: July 12, 2019Publication date: November 7, 2019Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M.H. Magro