Patents by Inventor John A. Morganti
John A. Morganti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10523424Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: GrantFiled: September 8, 2017Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Patent number: 10387502Abstract: Aspects include creating a profile for a user from user account data and a user activity log, searching an indexed repository for keywords matching elements from the user account data and the user activity log, and retrieving documents from the indexed repository that are identified based on the searching. Aspects further include creating a custom portal for the user that includes the documents.Type: GrantFiled: March 3, 2016Date of Patent: August 20, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
-
Patent number: 9996536Abstract: Aspects include creating a profile for a user from user account data and a user activity log, searching an indexed repository for keywords matching elements from the user account data and the user activity log, and retrieving documents from the indexed repository that are identified based on the searching. Aspects further include creating a custom portal for the user that includes the documents.Type: GrantFiled: November 10, 2017Date of Patent: June 12, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
-
Patent number: 9922017Abstract: Aspects of processing misaligned annotations include receiving a tokenized document and offset annotation file at a processor. The tokenized document includes a source document and corresponding tokens resulting from a low-level segmentation process. Annotations from the annotation file are applied, in conjunction with tokenization rules, to the source document, and a misalignment responsive to the applying is determined. If the misalignment is caused by an offset mismatch, an offset number of characters between the position counts in the annotation file and the source document is calculated, and the position count in the annotation file is adjusted to coincide with the position count in the source document. If the misalignment is not caused by an offset mismatch, a current position count in the source document is reset to a position count of a previous location in which a most recent alignment between the annotation file and the source document was ascertained.Type: GrantFiled: May 19, 2016Date of Patent: March 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
-
Publication number: 20180060316Abstract: Aspects include creating a profile for a user from user account data and a user activity log, searching an indexed repository for keywords matching elements from the user account data and the user activity log, and retrieving documents from the indexed repository that are identified based on the searching. Aspects further include creating a custom portal for the user that includes the documents.Type: ApplicationFiled: November 10, 2017Publication date: March 1, 2018Inventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
-
Publication number: 20180013548Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: ApplicationFiled: September 8, 2017Publication date: January 11, 2018Inventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Patent number: 9852134Abstract: Aspects include creating a profile for a user from user account data and a user activity log, searching an indexed repository for keywords matching elements from the user account data and the user activity log, and retrieving documents from the indexed repository that are identified based on the searching. Aspects further include creating a custom portal for the user that includes the documents.Type: GrantFiled: January 29, 2016Date of Patent: December 26, 2017Assignee: INTERNATIONAL BUSINESS MACHINCES CORPORATIONInventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
-
Publication number: 20170337167Abstract: Aspects of processing misaligned annotations include receiving a tokenized document and offset annotation file at a processor. The tokenized document includes a source document and corresponding tokens resulting from a low-level segmentation process. Annotations from the annotation file are applied, in conjunction with tokenization rules, to the source document, and a misalignment responsive to the applying is determined. If the misalignment is caused by an offset mismatch, an offset number of characters between the position counts in the annotation file and the source document is calculated, and the position count in the annotation file is adjusted to coincide with the position count in the source document. If the misalignment is not caused by an offset mismatch, a current position count in the source document is reset to a position count of a previous location in which a most recent alignment between the annotation file and the source document was ascertained.Type: ApplicationFiled: May 19, 2016Publication date: November 23, 2017Inventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
-
Patent number: 9794063Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: GrantFiled: January 27, 2014Date of Patent: October 17, 2017Assignee: International Business Machines CorporationInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Publication number: 20170220566Abstract: Aspects include creating a profile for a user from user account data and a user activity log, searching an indexed repository for keywords matching elements from the user account data and the user activity log, and retrieving documents from the indexed repository that are identified based on the searching. Aspects further include creating a custom portal for the user that includes the documents.Type: ApplicationFiled: March 3, 2016Publication date: August 3, 2017Inventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
-
Publication number: 20170220565Abstract: Aspects include creating a profile for a user from user account data and a user activity log, searching an indexed repository for keywords matching elements from the user account data and the user activity log, and retrieving documents from the indexed repository that are identified based on the searching. Aspects further include creating a custom portal for the user that includes the documents.Type: ApplicationFiled: January 29, 2016Publication date: August 3, 2017Inventors: Donna K. Byron, Renee F. Decker, Suzanne L. Estrada, Aditya S. Gaitonde, Daniel M. Jamrog, John A. Morganti, Samir J. Patel, Joseph F. Zaffarano
-
Publication number: 20140177842Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: ApplicationFiled: January 27, 2014Publication date: June 26, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Patent number: 8683222Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: GrantFiled: March 1, 2012Date of Patent: March 25, 2014Assignee: International Business Machines CorporationInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Patent number: 8675875Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: GrantFiled: May 18, 2010Date of Patent: March 18, 2014Assignee: International Business Machines CorporationInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Publication number: 20120159192Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: ApplicationFiled: March 1, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Publication number: 20110289324Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: ApplicationFiled: May 18, 2010Publication date: November 24, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti