Patents by Inventor Jeffrey Robert Hoy

Jeffrey Robert Hoy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160156663
    Abstract: A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network and cloud topologies to identify potential security capabilities and needs. Preferably, these options are then surfaced to the user with easy-to-understand, pre-configured templates representing security assurance levels. When a template (e.g., representing a pre-configured assurance level) is selected by the user, the system then applies specific capabilities and controls to translate the user-selected generalized specification (e.g., “high security”) into granular requirements for a specific set of security resources. Preferably, the identification of these security resources is based on system configuration, administration, and information associated with the pre-configured template.
    Type: Application
    Filed: November 28, 2014
    Publication date: June 2, 2016
    Inventors: Nataraj Nagaratnam, Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi
  • Publication number: 20160156662
    Abstract: A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network and cloud topologies to identify potential security capabilities and needs. Preferably, these options are then surfaced to the user with easy-to-understand, pre-configured templates representing security assurance levels. When a template (e.g., representing a pre-configured assurance level) is selected by the user, the system then applies specific capabilities and controls to translate the user-selected generalized specification (e.g., “high security”) into granular requirements for a specific set of security resources. Preferably, the identification of these security resources is based on system configuration, administration, and information associated with the pre-configured template.
    Type: Application
    Filed: November 28, 2014
    Publication date: June 2, 2016
    Inventors: Nataraj Nagaratnam, Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi
  • Publication number: 20160156664
    Abstract: A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network and cloud topologies to identify potential security capabilities and needs. Preferably, these options are then surfaced to the user with easy-to-understand, pre-configured templates representing security assurance levels. When a template (e.g., representing a pre-configured assurance level) is selected by the user, the system then applies specific capabilities and controls to translate the user-selected generalized specification (e.g., “high security”) into granular requirements for a specific set of security resources. Preferably, the identification of these security resources is based on system configuration, administration, and information associated with the pre-configured template.
    Type: Application
    Filed: November 28, 2014
    Publication date: June 2, 2016
    Inventors: Nataraj Nagaratnam, Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi
  • Publication number: 20160156661
    Abstract: A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network and cloud topologies to identify potential security capabilities and needs. Preferably, these options are then surfaced to the user with easy-to-understand, pre-configured templates representing security assurance levels. When a template (e.g., representing a pre-configured assurance level) is selected by the user, the system then applies specific capabilities and controls to translate the user-selected generalized specification (e.g., “high security”) into granular requirements for a specific set of security resources. Preferably, the identification of these security resources is based on system configuration, administration, and information associated with the pre-configured template.
    Type: Application
    Filed: November 28, 2014
    Publication date: June 2, 2016
    Inventors: Nataraj Nagaratnam, Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi
  • Patent number: 9356937
    Abstract: A content filtering mechanism is enhanced to resolve conflicts in filtering rules (e.g., those created by a whitelist, on the one hand, and a blacklist, on the other hand). Preferably, a conflict between or among content filtering rules is resolved by selecting among conflicting rules based on a notion of “risk” associated with the rules. According to this risk-based approach, when two or more rules conflict with one another, the particular rule whose risk value has a predetermined relationship (e.g., aligns most closely) with a risk level associated with the application (applying the rules) then takes precedence. By selecting among conflicting rules based on risk, the potential or actual conflicts are disambiguated, with the result being that the content is filtered appropriately.
    Type: Grant
    Filed: November 13, 2013
    Date of Patent: May 31, 2016
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Robert Hoy, Shadi Eskamaei Albouyeh, Bernadette Alexia Carter, Stephanie Lynn Trunzo
  • Patent number: 9276932
    Abstract: A method for identity mapping across web services uses a delegated authorization protocol, such as OAuth. In response to a request from a first user at a first web service, a connection to a second web service is established using the protocol. The second web service responds by sending information associated with a second user of the first web service who previously logged into the second web service from the first web service using the protocol. The second user may be a “contact” of the first user. The information received from the second web service is a access token that was obtained by the second user during that prior login. The access token is provided in lieu of data associated with the second user's account at the second web service. Thereafter, the first web service uses the access token it received to map to an identity of the second user.
    Type: Grant
    Filed: November 7, 2013
    Date of Patent: March 1, 2016
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Robert Hoy, Jonathan Frederick Brunn, Jessica Whitley Forrester, Stephen Carlyle Hess
  • Publication number: 20150135256
    Abstract: A content filtering mechanism is enhanced to resolve conflicts in filtering rules (e.g., those created by a whitelist, on the one hand, and a blacklist, on the other hand). Preferably, a conflict between or among content filtering rules is resolved by selecting among conflicting rules based on a notion of “risk” associated with the rules. According to this risk-based approach, when two or more rules conflict with one another, the particular rule whose risk value has a predetermined relationship (e.g., aligns most closely) with a risk level associated with the application (applying the rules) then takes precedence. By selecting among conflicting rules based on risk, the potential or actual conflicts are disambiguated, with the result being that the content is filtered appropriately.
    Type: Application
    Filed: November 13, 2013
    Publication date: May 14, 2015
    Applicant: International Business Machines Corporation
    Inventors: Jeffrey Robert Hoy, Shadi Eskamaei Albouyeh, Bernadette Alexia Carter, Stephanie Lynn Trunzo
  • Publication number: 20150128242
    Abstract: A method for identity mapping across web services uses a delegated authorization protocol, such as OAuth. In response to a request from a first user at a first web service, a connection to a second web service is established using the protocol. The second web service responds by sending information associated with a second user of the first web service who previously logged into the second web service from the first web service using the protocol. The second user may be a “contact” of the first user. The information received from the second web service is a access token that was obtained by the second user during that prior login. The access token is provided in lieu of data associated with the second user's account at the second web service. Thereafter, the first web service uses the access token it received to map to an identity of the second user.
    Type: Application
    Filed: November 7, 2013
    Publication date: May 7, 2015
    Applicant: International Business Machines Corporation
    Inventors: Jeffrey Robert Hoy, Jonathan Frederick Brunn, Jessica Whitley Forrester, Stephen Carlyle Hess