Patents by Inventor John A. Morganti

John A. Morganti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10523424
    Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.
    Type: Grant
    Filed: September 8, 2017
    Date of Patent: December 31, 2019
    Assignee: International Business Machines Corporation
    Inventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
  • Patent number: 10387502
    Abstract: Aspects include creating a profile for a user from user account data and a user activity log, searching an indexed repository for keywords matching elements from the user account data and the user activity log, and retrieving documents from the indexed repository that are identified based on the searching. Aspects further include creating a custom portal for the user that includes the documents.
    Type: Grant
    Filed: March 3, 2016
    Date of Patent: August 20, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
  • Patent number: 9996536
    Abstract: Aspects include creating a profile for a user from user account data and a user activity log, searching an indexed repository for keywords matching elements from the user account data and the user activity log, and retrieving documents from the indexed repository that are identified based on the searching. Aspects further include creating a custom portal for the user that includes the documents.
    Type: Grant
    Filed: November 10, 2017
    Date of Patent: June 12, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
  • Patent number: 9922017
    Abstract: Aspects of processing misaligned annotations include receiving a tokenized document and offset annotation file at a processor. The tokenized document includes a source document and corresponding tokens resulting from a low-level segmentation process. Annotations from the annotation file are applied, in conjunction with tokenization rules, to the source document, and a misalignment responsive to the applying is determined. If the misalignment is caused by an offset mismatch, an offset number of characters between the position counts in the annotation file and the source document is calculated, and the position count in the annotation file is adjusted to coincide with the position count in the source document. If the misalignment is not caused by an offset mismatch, a current position count in the source document is reset to a position count of a previous location in which a most recent alignment between the annotation file and the source document was ascertained.
    Type: Grant
    Filed: May 19, 2016
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
  • Publication number: 20180060316
    Abstract: Aspects include creating a profile for a user from user account data and a user activity log, searching an indexed repository for keywords matching elements from the user account data and the user activity log, and retrieving documents from the indexed repository that are identified based on the searching. Aspects further include creating a custom portal for the user that includes the documents.
    Type: Application
    Filed: November 10, 2017
    Publication date: March 1, 2018
    Inventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
  • Publication number: 20180013548
    Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.
    Type: Application
    Filed: September 8, 2017
    Publication date: January 11, 2018
    Inventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
  • Patent number: 9852134
    Abstract: Aspects include creating a profile for a user from user account data and a user activity log, searching an indexed repository for keywords matching elements from the user account data and the user activity log, and retrieving documents from the indexed repository that are identified based on the searching. Aspects further include creating a custom portal for the user that includes the documents.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: December 26, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINCES CORPORATION
    Inventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
  • Publication number: 20170337167
    Abstract: Aspects of processing misaligned annotations include receiving a tokenized document and offset annotation file at a processor. The tokenized document includes a source document and corresponding tokens resulting from a low-level segmentation process. Annotations from the annotation file are applied, in conjunction with tokenization rules, to the source document, and a misalignment responsive to the applying is determined. If the misalignment is caused by an offset mismatch, an offset number of characters between the position counts in the annotation file and the source document is calculated, and the position count in the annotation file is adjusted to coincide with the position count in the source document. If the misalignment is not caused by an offset mismatch, a current position count in the source document is reset to a position count of a previous location in which a most recent alignment between the annotation file and the source document was ascertained.
    Type: Application
    Filed: May 19, 2016
    Publication date: November 23, 2017
    Inventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
  • Patent number: 9794063
    Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.
    Type: Grant
    Filed: January 27, 2014
    Date of Patent: October 17, 2017
    Assignee: International Business Machines Corporation
    Inventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
  • Publication number: 20170220566
    Abstract: Aspects include creating a profile for a user from user account data and a user activity log, searching an indexed repository for keywords matching elements from the user account data and the user activity log, and retrieving documents from the indexed repository that are identified based on the searching. Aspects further include creating a custom portal for the user that includes the documents.
    Type: Application
    Filed: March 3, 2016
    Publication date: August 3, 2017
    Inventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
  • Publication number: 20170220565
    Abstract: Aspects include creating a profile for a user from user account data and a user activity log, searching an indexed repository for keywords matching elements from the user account data and the user activity log, and retrieving documents from the indexed repository that are identified based on the searching. Aspects further include creating a custom portal for the user that includes the documents.
    Type: Application
    Filed: January 29, 2016
    Publication date: August 3, 2017
    Inventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
  • Publication number: 20140177842
    Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.
    Type: Application
    Filed: January 27, 2014
    Publication date: June 26, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
  • Patent number: 8683222
    Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: March 25, 2014
    Assignee: International Business Machines Corporation
    Inventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
  • Patent number: 8675875
    Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.
    Type: Grant
    Filed: May 18, 2010
    Date of Patent: March 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
  • Publication number: 20120159192
    Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.
    Type: Application
    Filed: March 1, 2012
    Publication date: June 21, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
  • Publication number: 20110289324
    Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.
    Type: Application
    Filed: May 18, 2010
    Publication date: November 24, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti