Patents by Inventor Jeffrey R. Hoy

Jeffrey R. Hoy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10834100
    Abstract: A method, apparatus and computer program product for managing a plurality of VPN tunnels between a first cloud and a second cloud in a hybrid cloud environment is described. In a first virtual private network (VPN) manager a request is received from a first cloud application resident in the first cloud. The request includes a first set of requirements for a first VPN tunnel in the plurality of VPN tunnels. The VPN manager sends a first VPN manager request to a first system in a first cloud, wherein the first system creates the first VPN tunnel according to the first set of requirements. The VPN manager receives a request from a second cloud application resident in the first cloud. The request includes a second set of requirements for a VPN tunnel in the plurality of VPN tunnels. The VPN manager sends a second VPN manager request to the system in a first cloud, wherein the second VPN manager request contains the second set of requirements.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey R Hoy, Sreekanth R Iyer, Kaushal K Kapadia, Ravi K Muthukrishnan, Nataraj Nagaratnam
  • Patent number: 10834108
    Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
    Type: Grant
    Filed: July 12, 2019
    Date of Patent: November 10, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Patent number: 10824652
    Abstract: Identifying content in an incoming message on a social network includes categorizing a sender-recipient relationship between a sender and a recipient of an incoming message in an activity stream in a display.
    Type: Grant
    Filed: July 9, 2019
    Date of Patent: November 3, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Patent number: 10686809
    Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: June 16, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Patent number: 10666670
    Abstract: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: May 26, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Publication number: 20200159799
    Abstract: Adjusting system actions based on an absence of relationship acceptance may include detecting absence of connection acceptance by one or more first users in a computer-implemented social networking system. Patterns of the absence of connection acceptance of the one or more first users may be correlated. Users with common patterns of absence of connection acceptance may be clustered into a cluster of users. Absence of connection acceptance by a second user may be detected. Responsive to determining that a pattern of the absence of connection acceptance associated with the second user matches with the common patterns, a profile associated with the second user may be updated according to a template profile associated with the cluster. System actions of the social networking system may be activated for the second user based on the profile updated according to the template profile.
    Type: Application
    Filed: January 23, 2020
    Publication date: May 21, 2020
    Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
  • Patent number: 10630624
    Abstract: A method, system and/or computer program product predicts viewing activity of a new posting to an activity stream. A first computer transmits a new posting to an activity stream in a second computer, where the new posting is available to a potential viewer set. Based on identified viewer information about one or more members of the potential viewer set, a prediction is made of viewing activity of the new posting by the potential viewer set. This predicted viewing activity is based on identified viewer information about members of the potential viewer set, and describes a predicted likelihood of the potential viewer set viewing the new posting. The derived predicted viewing activity of the new posting by the potential viewer set is then presented at the first computer.
    Type: Grant
    Filed: June 23, 2016
    Date of Patent: April 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Publication number: 20200067877
    Abstract: A method, apparatus and computer program product for managing a plurality of VPN tunnels between a first cloud and a second cloud in a hybrid cloud environment is described. In a first virtual private network (VPN) manager a request is received from a first cloud application resident in the first cloud. The request includes a first set of requirements for a first VPN tunnel in the plurality of VPN tunnels. The VPN manager sends a first VPN manager request to a first system in a first cloud, wherein the first system creates the first VPN tunnel according to the first set of requirements. The VPN manager receives a request from a second cloud application resident in the first cloud. The request includes a second set of requirements for a VPN tunnel in the plurality of VPN tunnels. The VPN manager sends a second VPN manager request to the system in a first cloud, wherein the second VPN manager request contains the second set of requirements.
    Type: Application
    Filed: October 28, 2019
    Publication date: February 27, 2020
    Inventors: Jeffrey R. Hoy, Sreekanth R. Iyer, Kaushal K. Kapadia, Ravi K. Muthukrishnan, Nataraj Nagaratnam
  • Patent number: 10565272
    Abstract: Adjusting system actions based on an absence of relationship acceptance may include detecting absence of connection acceptance by one or more first users in a computer-implemented social networking system. Patterns of the absence of connection acceptance of the one or more first users may be correlated. Users with common patterns of absence of connection acceptance may be clustered into a cluster of users. Absence of connection acceptance by a second user may be detected. Responsive to determining that a pattern of the absence of connection acceptance associated with the second user matches with the common patterns, a profile associated with the second user may be updated according to a template profile associated with the cluster. System actions of the social networking system may be activated for the second user based on the profile updated according to the template profile.
    Type: Grant
    Filed: October 26, 2015
    Date of Patent: February 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
  • Patent number: 10560725
    Abstract: An indication is received, from a content viewing device used by a remote viewer, that specifies a video content sub-area of interest within streamed video content viewed by the remote viewer. Original video content outside of the video content sub-area of interest is designated as a region not of interest (RNOI) within the streamed video content. A transmission rate of image changes of the original video content within the RNOI is reduced within the streamed video content. Image disparity between the video content sub-area of interest and the RNOI is reduced by continuing to transmit the image changes of the original video content within the RNOI at the reduced transmission rate. Bandwidth consumed to transmit the streamed video content is reduced in relation to the reduced transmission rate of the image changes of the original video content within the RNOI.
    Type: Grant
    Filed: December 9, 2018
    Date of Patent: February 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Kulvir S. Bhogal, Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
  • Patent number: 10552751
    Abstract: A method for conversation branching may include storing a plurality of messages communicated in an online conversation and generating a fingerprint for each message. The fingerprint for each message may be stored in a lookup table. The method may also include detecting a new message from one of the users and processing the new message to generate an artifact that correlates to the new message. The lookup table may be queried using the artifact to determine a similarity between the new message and each of the stored messages. One or more proposed reply messages to the new message may be generated for branching the online conversation to a new conversation point that corresponds to a selected one of the one or more proposed reply messages. The one or more proposed reply messages are based on one of the stored messages that has a closest similarity to the new message.
    Type: Grant
    Filed: November 5, 2018
    Date of Patent: February 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Paul R. Bastide, Kulvir S. Bhogal, Jeffrey R. Hoy, Asima Silva
  • Patent number: 10540596
    Abstract: A method for conversation branching may include storing a plurality of messages communicated in an online conversation and generating a fingerprint for each message. The fingerprint for each message may be stored in a lookup table. The method may also include detecting a new message from one of the users and processing the new message to generate an artifact that correlates to the new message. The lookup table may be queried using the artifact to determine a similarity between the new message and each of the stored messages. One or more proposed reply messages to the new message may be generated for branching the online conversation to a new conversation point that corresponds to a selected one of the one or more proposed reply messages. The one or more proposed reply messages are based on one of the stored messages that has a closest similarity to the new message.
    Type: Grant
    Filed: November 5, 2018
    Date of Patent: January 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Paul R. Bastide, Kulvir S. Bhogal, Jeffrey R. Hoy, Asima Silva
  • Patent number: 10536469
    Abstract: Approaches for providing security in a networked computing environment are provided. The method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes identifying a second system in the in the networked computing environment as an at-risk system based on a proximity of the second system to the first system. The method additionally includes re-generating, by the at least one computer device, the second system as a new system at a new location in the networked computing environment. The method further includes converting, by the at least one computer device, the second system to a decoy system.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: January 14, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Publication number: 20200014647
    Abstract: A social network activity mode that is implemented using social network activity rules is identified. The social network activity rules allow only social network posts of relevance to a particular activity of a user to be presented to the user. The social network activity mode is applied to a group of social network posts. Based upon applying the social network activity mode to the group of social network posts, social network posts that comply with the social network activity rules of the social network activity mode are provided to the user and social network posts that do not comply with the social network activity rules of the social network activity mode are blocked.
    Type: Application
    Filed: September 15, 2019
    Publication date: January 9, 2020
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Patent number: 10505904
    Abstract: A method, apparatus and computer program product manage a plurality of VPN tunnels between a first cloud and a second cloud in a hybrid cloud environment is described. A first virtual private network (VPN) agent manages a first VPN tunnel in a plurality of VPN tunnels. The first VPN tunnel provides communication for traffic between a first node in a first cloud and a second node in a second cloud in a hybrid cloud environment. The agent receives a request from a VPN manager which includes a first set of requirements for a first cloud application for the first VPN tunnel in the plurality of VPN tunnels. The agent creates the first VPN tunnel according to the first set of requirements. Next, the agent receives a modification request from the VPN manager containing a second set of requirements for a second cloud application.
    Type: Grant
    Filed: October 14, 2018
    Date of Patent: December 10, 2019
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey R Hoy, Sreekanth R Iyer, Kaushal K Kapadia, Ravi K Muthukrishnan, Nataraj Nagaratnam
  • Publication number: 20190342309
    Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
    Type: Application
    Filed: July 12, 2019
    Publication date: November 7, 2019
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M.H. Magro
  • Patent number: 10469399
    Abstract: Cloud security may be provided remotely via a device with network capabilities. Virtual resources managed by the cloud configuration may also be modified and updated based on status changes to the device that may be managed by an administrator. One example may include at least one of associating a virtual resource with a physical device, configuring the virtual resource based on an initial state of the physical device, detecting a change in the initial state of the physical device to a different state of the physical device, and updating the virtual resource based on the different state of the physical device.
    Type: Grant
    Filed: December 29, 2015
    Date of Patent: November 5, 2019
    Assignee: International Business Machines Corporation
    Inventors: Joshua A. Alger, Alan R. Buss, Jeffrey R. Hoy, Belinda M. Vennam
  • Publication number: 20190332613
    Abstract: Identifying content in an incoming message on a social network includes categorizing a sender-recipient relationship between a sender and a recipient of an incoming message in an activity stream in a display.
    Type: Application
    Filed: July 9, 2019
    Publication date: October 31, 2019
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Patent number: 10452687
    Abstract: Identifying content in an incoming message on a social network includes categorizing a sender-recipient relationship between a sender and a recipient of an incoming message in an activity stream in a display.
    Type: Grant
    Filed: July 12, 2016
    Date of Patent: October 22, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Patent number: 10454865
    Abstract: A social network activity mode that is implemented using social network activity rules is identified. The social network activity rules allow only social network posts of relevance to a particular activity of a user to be presented to the user. The social network activity mode is applied to a group of social network posts. Based upon applying the social network activity mode to the group of social network posts, social network posts that comply with the social network activity rules of the social network activity mode are provided to the user and social network posts that do not comply with the social network activity rules of the social network activity mode are blocked.
    Type: Grant
    Filed: December 19, 2014
    Date of Patent: October 22, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy, Stephanie L. Trunzo