Patents by Inventor Jeffrey R. Hoy

Jeffrey R. Hoy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180103340
    Abstract: Provided are techniques for controlling message delivery corresponding to a near field communication (NFC) device, comprising establishing, on a mobile computing device, a rule-based session corresponding to a NFC device; executing an application, corresponding to the NFC device, in conjunction with the session; and responsive to detecting a condition meeting a criterion corresponding to the rule-based session, limiting execution of the application on the mobile computing device in conformity with the criterion.
    Type: Application
    Filed: December 13, 2017
    Publication date: April 12, 2018
    Applicant: International Business Machines Corporation
    Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
  • Patent number: 9935971
    Abstract: An approach provides solutions for responding to threats to virtual machines (VMs) and mitigating the risks of potential breaches to VMs that reside in the same neighborhood as VMs that are affected by threats. The approach can provide proactive responsive actions for one or more VMs in a determined neighborhood that help protect those VMs in a selective and prioritized manner.
    Type: Grant
    Filed: February 1, 2017
    Date of Patent: April 3, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rick A. Hamilton, II, Jeffrey R. Hoy, Jenny S. Li, Shawn P. Mullen
  • Publication number: 20180083989
    Abstract: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.
    Type: Application
    Filed: November 30, 2017
    Publication date: March 22, 2018
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M.H. Magro
  • Patent number: 9923908
    Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
    Type: Grant
    Filed: April 29, 2015
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Publication number: 20180077011
    Abstract: A preferred communication application hierarchy that specifies user priorities for application selection for communication sessions and functional communication capabilities of each prioritized application is configured for at least one user of a group of users. A real-time communication request, initiated by a user with a configured preferred communication application hierarchy, is detected that specifies a particular type of communication functionality and that includes an indication of another one of the group of users as a requested communication recipient. Responsive to detecting the real-time communication request that specifies the particular type of communication functionality, a highest-priority application usable to perform the specified particular type of communication functionality with a communication device of the requested communication recipient is selected from the configured preferred communication application hierarchy of the requesting user.
    Type: Application
    Filed: November 20, 2017
    Publication date: March 15, 2018
    Inventors: Kulvir S. Bhogal, Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
  • Patent number: 9894086
    Abstract: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: February 13, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Patent number: 9888340
    Abstract: Provided are techniques for controlling message delivery corresponding to a near field communication (NFC) device, comprising establishing, on a mobile computing device, a rule-based session corresponding to a NFC device; executing an application, corresponding to the NFC device, in conjunction with the session; and responsive to detecting a condition meeting a criterion corresponding to the rule-based session, limiting execution of the application on the mobile computing device in conformity with the criterion.
    Type: Grant
    Filed: October 10, 2015
    Date of Patent: February 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Marit L. Imsdahl, Asima Silva
  • Patent number: 9882979
    Abstract: A method transmits an image file to a target electronic device. One or more processors convert an original image file from a first format into a second format to create a converted image file. A locator address metatag is appended to the converted image file. The locator address metatag provides an address of a copy of the original image file in the first format. The converted image file with the locator address metatag is transmitted, from a source electronic device to a target electronic device, such that the locator address metatag enables the target electronic device to locate and retrieve the copy of the original image file.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: January 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Shadi E. Albouyeh, Jeffrey R. Hoy, Stephanie L. Trunzo
  • Patent number: 9881345
    Abstract: A method, system and computer program product for evaluating an impact of a user's content utilized in a social network. Content in a document (e.g., a presentation) that has been posted on a social network environment is detected as being reused by another user in another document. The author of the reused content is then identified. A counter keeping track of the number of times this content has been adopted in derivative works is then incremented. A score (“impact score”), representing the author's ability to influence other users to adopt the author's content in other users' derivative works, is then generated based on the number of times this content has been adopted in derivative works. Social credit is then provided to the author using the impact score. In this manner, recognition is provided to the author thereby providing motivation for users to post created content in the social network.
    Type: Grant
    Filed: April 11, 2015
    Date of Patent: January 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
  • Publication number: 20180025441
    Abstract: A method, system and computer program product for evaluating an impact of a user's content utilized in a social network. Content in a document (e.g., a presentation) that has been posted on a social network environment is detected as being reused by another user in another document. The author of the reused content is then identified. A counter keeping track of the number of times this content has been adopted in derivative works is then incremented. A score (“impact score”), representing the author's ability to influence other users to adopt the author's content in other users' derivative works, is then generated based on the number of times this content has been adopted in derivative works. Social credit is then provided to the author using the impact score. In this manner, recognition is provided to the author thereby providing motivation for users to post created content in the social network.
    Type: Application
    Filed: September 29, 2017
    Publication date: January 25, 2018
    Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
  • Patent number: 9858625
    Abstract: The present disclosure provides for leveraging knowledge of one or more skipped relationships in a social network. In one example, the knowledge of the one or more skipped relationships may be utilized to change an action that would otherwise have been taken by the social network (that is, to change an action that would otherwise have been taken by the computer system maintaining the social network).
    Type: Grant
    Filed: April 28, 2015
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
  • Publication number: 20170371842
    Abstract: A browser renders web site views dynamically, based on previously consumed content items. When the browser loads a new web site which contains, among other object, content items, those content items which are duplicative of previously consumed content items are suppressed when the web site view is rendered in the browser. Content items that are related to previously consumed content items can be prioritized in the rendered view of the web site.
    Type: Application
    Filed: June 23, 2016
    Publication date: December 28, 2017
    Inventors: JONATHAN F. BRUNN, JEFFREY R. HOY, MARIT L. IMSDAHL, ASIMA SILVA
  • Patent number: 9853860
    Abstract: A preferred communication application hierarchy that specifies user priorities for application selection for communication sessions and functional communication capabilities of each prioritized application is configured for at least one user of a group of users. A real-time communication request, initiated by a user with a configured preferred communication application hierarchy, is detected that specifies a particular type of communication functionality and that includes an indication of another one of the group of users as a requested communication recipient. Responsive to detecting the real-time communication request that specifies the particular type of communication functionality, a highest-priority application usable to perform the specified particular type of communication functionality with a communication device of the requested communication recipient is selected from the configured preferred communication application hierarchy of the requesting user.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: December 26, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kulvir S. Bhogal, Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
  • Patent number: 9838274
    Abstract: A method, system and computer-usable medium are disclosed for controlling access to a node deployed in a cloud environment. A new node, based upon a common image, is created in a cloud computing environment. A unique set of randomized system parameters are then generated for the new node, which is then mapped to a set of generic system parameters. A request to access the new node is intercepted, which contains the generic system parameters. The intercepted access request is then parsed to extract the set of generic system parameters, which are then replaced with the unique set of randomized system parameters associated with the target node to generate a modified access request. The modified access request is then forwarded to the target node.
    Type: Grant
    Filed: November 19, 2014
    Date of Patent: December 5, 2017
    Assignee: International Business Machines Corporation
    Inventors: Joshua A. Alger, Jeffrey R. Hoy, Barry J. Pellas, David M. Stecher
  • Patent number: 9830477
    Abstract: A method for providing audience-based redaction of sensitive information in an electronic document may include receiving a request from a computing device to access an electronic document, retrieving the electronic document, identifying the user(s) associated with the computing device, determining an access level for each user associated with the computing device, determining the lowest access level for the user(s) associated with the computing device, generating a rendering of the electronic document for display on the computing device based on the lowest access level for the user(s) associated with the computing device, and providing the rendering of the electronic document to the computing device for display. When generating the rendering of the electronic document for display, sensitive information in the electronic document is typically redacted based on the lowest access level for the user(s) associated with the computing device.
    Type: Grant
    Filed: March 3, 2017
    Date of Patent: November 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kulvir S. Bhogal, Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
  • Patent number: 9824237
    Abstract: A method for providing audience-based redaction of sensitive information in an electronic document may include receiving a request from a computing device to access an electronic document, retrieving the electronic document, identifying the user(s) associated with the computing device, determining an access level for each user associated with the computing device, determining the lowest access level for the user(s) associated with the computing device, generating a rendering of the electronic document for display on the computing device based on the lowest access level for the user(s) associated with the computing device, and providing the rendering of the electronic document to the computing device for display. When generating the rendering of the electronic document for display, sensitive information in the electronic document is typically redacted based on the lowest access level for the user(s) associated with the computing device.
    Type: Grant
    Filed: March 3, 2017
    Date of Patent: November 21, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kulvir S. Bhogal, Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
  • Publication number: 20170330293
    Abstract: A system and method for managing electronic social networking includes defining content from a first user for communication to other users on an electronic social networking system. Natural language processing (NLP) and analytic analysis are applied to the content to identify a workflow for accessing and responding to the content. The access and the response to the content are based on the workflow.
    Type: Application
    Filed: August 7, 2017
    Publication date: November 16, 2017
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy
  • Publication number: 20170329843
    Abstract: A system and method for managing electronic social networking includes defining content from a first user for communication to other users on an electronic social networking system. Natural language processing (NLP) and analytic analysis are applied to the content to identify a workflow for accessing and responding to the content. The access and the response to the content are based on the workflow.
    Type: Application
    Filed: August 7, 2017
    Publication date: November 16, 2017
    Inventors: Shadi E. Albouyeh, Bernadette A. Carter, Jeffrey R. Hoy
  • Patent number: 9794692
    Abstract: A method is disclosed for determining a relative orientation of speakers that receive audio signals from a portable audio source device. In an embodiment, a microphone coupled with the portable audio source device receives a first sound from a first speaker and a second sound from a second speaker. An orientation detector determines a volume of at least one of the first and second sounds and the portable audio source device detects a movement of the portable audio source device. The orientation detector detects a variation in the determined volume and determines a relative orientation of the first and second speakers based, at least in part, on the detected movement and the detected variation in the determined volume.
    Type: Grant
    Filed: April 30, 2015
    Date of Patent: October 17, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kulvir S. Bhogal, Jonathan F. Brunn, Jeffrey R. Hoy, Asima Silva
  • Publication number: 20170289162
    Abstract: Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and delivering updates about the author specific content to a user specified activity stream.
    Type: Application
    Filed: June 13, 2017
    Publication date: October 5, 2017
    Inventors: Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess, Jeffrey R. Hoy