Patents by Inventor John J. Ponzo
John J. Ponzo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9569546Abstract: A method for sharing documents includes initiating a sharing session with a first participant and a second participant, wherein the first participant is communicatively connected to the second participant via a server, receiving a control request having an action from the first participant, determining whether the control request includes a share page action, and retrieving components of the page with available component types and sending components associated with preferences of the first participant to the first participant and components associated with preferences of the second participant to the second participant responsive to determining that the control request includes the share page action.Type: GrantFiled: September 10, 2012Date of Patent: February 14, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul C. Castro, Yun-Wu Huang, Peter Kissa, John J. Ponzo, Gegi Thomas
-
Patent number: 9569543Abstract: A method for sharing documents includes initiating a sharing session with a first participant and a second participant, wherein the first participant is communicatively connected to the second participant via a server, receiving a control request having an action from the first participant, determining whether the control request includes a share page action, and retrieving components of the page with available component types and sending components associated with preferences of the first participant to the first participant and components associated with preferences of the second participant to the second participant responsive to determining that the control request includes the share page action.Type: GrantFiled: January 14, 2011Date of Patent: February 14, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul C. Castro, Yun-Wu Huang, Peter Kissa, John J. Ponzo, Gegi Thomas
-
Patent number: 9531600Abstract: Managing user applications is provided. A visual model of user interface display screens of a user application is generated by mapping components displayed within the user interface display screens to screen position coordinates and by mapping the screen position coordinates corresponding to the components to original source code of the user application. A runtime policy for each component in a selected set of components within the user interface display screens of the user application is generated based on user interaction with the generated visual model of the user interface display screens. The generated runtime policy for each component in the selected set of components is sent to a client device via a network. Activity of each component in the selected set of components in the client device is tracked using data that is tracked and logged on the client device based the generated runtime policy for each selected component.Type: GrantFiled: August 17, 2013Date of Patent: December 27, 2016Assignee: International Business Machines CorporationInventors: Joseph W. Ligman, Marco Pistoia, John J. Ponzo, Gegi Thomas
-
Patent number: 9459990Abstract: Automatic application logging, in one aspect, may receive a directive for logging data associated with an application. One or more runtime objects of an instance of the application running on a processor may be modified according to the directive to collect the data. The data may be collected via the modified one or more runtime objects.Type: GrantFiled: March 27, 2012Date of Patent: October 4, 2016Assignee: International Business Machines CorporationInventors: Joseph W. Ligman, Marco Pistoia, John J. Ponzo, Umut Topkara
-
Patent number: 9369349Abstract: Managing user applications is provided. Images are captured of displayed user interface display screens of a running user application on the data processing system. An embedded instrumentation library in the running user application is used to capture the images of the displayed user interface display screens. Screen position coordinates corresponding to components within the displayed user interface display screens of the running user application are calculated. A display screen data package is generated that includes the captured images of the displayed user interface display screens of the running user application and the calculated screen position coordinates corresponding to the components within the displayed user interface display screens.Type: GrantFiled: May 6, 2015Date of Patent: June 14, 2016Assignee: International Business Machines CorporationInventors: Joseph W. Ligman, Marco Pistoia, John J. Ponzo, Gegi Thomas
-
Patent number: 9338063Abstract: Managing user applications is provided. A display screen data package that includes images of user interface display screens of a user application located on a client device and screen position coordinates corresponding to components displayed within the user interface display screens is received from the client device via a network. The display screen data package is parsed to identify each component within each of the user interface display screens. A visual model of user interface display screens of a user application is generated. A runtime policy for each component in a selected set of components within the user interface display screens of the user application is generated based on user interaction with the generated visual model of the user interface display screens. The generated runtime policy for each component in the selected set of components is sent to the client device via the network.Type: GrantFiled: May 6, 2015Date of Patent: May 10, 2016Assignee: International Business Machines CorporationInventors: Joseph W. Ligman, Marco Pistoia, John J. Ponzo, Gegi Thomas
-
Patent number: 9246885Abstract: A method, system, apparatus and computer programs are disclosed to process content for an enterprise. The method includes reviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data and, in response to identifying secure data, modifying the content to be sent to the public service such that a presence of secure data will be visually imperceptible when the content is rendered at the public service. The step of modifying can include steganographically embedding the secure data or a link to the secure data in a container such as image data.Type: GrantFiled: April 2, 2013Date of Patent: January 26, 2016Assignee: International Business Machines CorporationInventors: Paul C Castro, Marco Pistoia, John J. Ponzo, Gregory L. Truty
-
Patent number: 9178856Abstract: A method, system, apparatus and computer programs are disclosed to process content for an enterprise. The method includes reviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data and, in response to identifying secure data, modifying the content to be sent to the public service such that a presence of secure data will be visually imperceptible when the content is rendered at the public service. The step of modifying can include steganographically embedding the secure data or a link to the secure data in a container such as image data.Type: GrantFiled: September 4, 2013Date of Patent: November 3, 2015Assignee: International Business Machines CorporationInventors: Paul C. Castro, Marco Pistoia, John J. Ponzo, Gregory L. Truty
-
Patent number: 9141792Abstract: An example includes intercepting one or more activities performed by an application on a computing device. The intercepting uses an instrumentation layer separating the application from an operating system on the computing device. The one or more activities are compared with one or more anomaly detection policies in a policy configuration file to detect or not detect presence of one or more anomalies. In response to the comparison detecting presence of one or more anomalies, indication(s) of the one or more anomalies are stored. Another example includes receiving indication(s) of anomaly(ies) experienced by an application on computing device(s) and analyzing the indication(s) of the anomaly(ies) to determine whether corrective action(s) should be issued. Responsive to a determination corrective action(s) should be issued based on the analyzing, the corrective action(s) are issued to the computing device(s). Methods, program products, and apparatus are disclosed.Type: GrantFiled: September 18, 2013Date of Patent: September 22, 2015Assignee: International Business Machines CorporationInventors: Mauro Baluda, Paul C. Castro, Marco Pistoia, John J. Ponzo
-
Publication number: 20150236924Abstract: Managing user applications is provided. Images are captured of displayed user interface display screens of a running user application on the data processing system. An embedded instrumentation library in the running user application is used to capture the images of the displayed user interface display screens. Screen position coordinates corresponding to components within the displayed user interface display screens of the running user application are calculated. A display screen data package is generated that includes the captured images of the displayed user interface display screens of the running user application and the calculated screen position coordinates corresponding to the components within the displayed user interface display screens.Type: ApplicationFiled: May 6, 2015Publication date: August 20, 2015Inventors: Joseph W. Ligman, Marco Pistoia, John J. Ponzo, Gegi Thomas
-
Publication number: 20150236923Abstract: Managing user applications is provided. A display screen data package that includes images of user interface display screens of a user application located on a client device and screen position coordinates corresponding to components displayed within the user interface display screens is received from the client device via a network. The display screen data package is parsed to identify each component within each of the user interface display screens. A visual model of user interface display screens of a user application is generated. A runtime policy for each component in a selected set of components within the user interface display screens of the user application is generated based on user interaction with the generated visual model of the user interface display screens. The generated runtime policy for each component in the selected set of components is sent to the client device via the network.Type: ApplicationFiled: May 6, 2015Publication date: August 20, 2015Inventors: Joseph W. Ligman, Marco Pistoia, John J. Ponzo, Gegi Thomas
-
Patent number: 9094400Abstract: Systems and methods are provided for controlling access to a network. An access request is received from a client application running on a computing device for accessing a remote network. The access request is received over a secure virtual private network (VPN) connection established by a user-mode VPN client running in non-privileged user space of the computing device. The access request includes contextual information for use in authenticating a user to access a remote network, wherein the contextual information includes contextual information about the client application requesting access to the remote network. An authentication process is performed using the contextual information to authenticate the user, and a secure VPN connection is established between the client application and the remote network, if the user is authenticated.Type: GrantFiled: January 16, 2013Date of Patent: July 28, 2015Assignee: International Business Machines CorporationInventors: Eric J. Barkie, Benjamin L. Fletcher, Marco Pistoia, John J. Ponzo, Andrew P. Wyskida
-
Automatically generating challenge questions inferred from user history data for user authentication
Patent number: 8955058Abstract: User authentication is provided. At least one of a social network and a business network of each user in a plurality of users is accessed. User history data of each user in the plurality of users is monitored in the at least one of the social network and the business network. Challenge questions requiring a user response are generated based on monitoring the user history data of the users. The user response to a generated challenge question is evaluated. A set of events is triggered based on evaluating the user response.Type: GrantFiled: November 15, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Paul C. Castro, Joseph W. Ligman, David M. Lubensky, Marco Pistoia, John J. Ponzo, Umut Topkara -
Patent number: 8931101Abstract: An example includes intercepting one or more activities performed by an application on a computing device. The intercepting uses an instrumentation layer separating the application from an operating system on the computing device. The one or more activities are compared with one or more anomaly detection policies in a policy configuration file to detect or not detect presence of one or more anomalies. In response to the comparison detecting presence of one or more anomalies, indication(s) of the one or more anomalies are stored. Another example includes receiving indication(s) of anomaly(ies) experienced by an application on computing device(s) and analyzing the indication(s) of the anomaly(ies) to determine whether corrective action(s) should be issued. Responsive to a determination corrective action(s) should be issued based on the analyzing, the corrective action(s) are issued to the computing device(s). Methods, program products, and apparatus are disclosed.Type: GrantFiled: November 14, 2012Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Mauro Baluda, Paul C. Castro, Marco Pistoia, John J. Ponzo
-
Publication number: 20140298477Abstract: A method, system, apparatus and computer programs are disclosed to process content for an enterprise. The method includes reviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data and, in response to identifying secure data, modifying the content to be sent to the public service such that a presence of secure data will be visually imperceptible when the content is rendered at the public service. The step of modifying can include steganographically embedding the secure data or a link to the secure data in a container such as image data.Type: ApplicationFiled: September 4, 2013Publication date: October 2, 2014Applicant: International Business Machines CorporationInventors: Paul C. Castro, Marco Pistoia, John J. Ponzo, Gregory L. Truty
-
Publication number: 20140298476Abstract: A method, system, apparatus and computer programs are disclosed to process content for an enterprise. The method includes reviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data and, in response to identifying secure data, modifying the content to be sent to the public service such that a presence of secure data will be visually imperceptible when the content is rendered at the public service. The step of modifying can include steganographically embedding the secure data or a link to the secure data in a container such as image data.Type: ApplicationFiled: April 2, 2013Publication date: October 2, 2014Applicant: International Business Machines CorporationInventors: Paul C. Castro, Marco Pistoia, John J. Ponzo, Gregory L. Truty
-
Publication number: 20140215344Abstract: Managing user applications is provided. A visual model of user interface display screens of a user application is generated by mapping components displayed within the user interface display screens to screen position coordinates and by mapping the screen position coordinates corresponding to the components to original source code of the user application. A runtime policy for each component in a selected set of components within the user interface display screens of the user application is generated based on user interaction with the generated visual model of the user interface display screens. The generated runtime policy for each component in the selected set of components is sent to a client device via a network. Activity of each component in the selected set of components in the client device is tracked using data that is tracked and logged on the client device based the generated runtime policy for each selected component.Type: ApplicationFiled: August 17, 2013Publication date: July 31, 2014Applicant: International Business Machines CorporationInventors: Joseph W. Ligman, Marco Pistoia, John J. Ponzo, Gegi Thomas
-
Patent number: 8745584Abstract: The illustrative embodiments provide dependency injection by static transformation. Information about a first software module among several software modules is identified. The first software module has a dependency on at least one other software module among the several software modules. Information about the dependency of the first software module on at least one other software module is identified. Using the information about the first software module and the information about the dependency, code is generated for the first software module to resolve the dependency.Type: GrantFiled: May 3, 2007Date of Patent: June 3, 2014Assignee: International Business Machines CorporationInventors: Yunwu Huang, John J. Ponzo
-
Publication number: 20140137239Abstract: An example includes intercepting one or more activities performed by an application on a computing device. The intercepting uses an instrumentation layer separating the application from an operating system on the computing device. The one or more activities are compared with one or more anomaly detection policies in a policy configuration file to detect or not detect presence of one or more anomalies. In response to the comparison detecting presence of one or more anomalies, indication(s) of the one or more anomalies are stored. Another example includes receiving indication(s) of anomaly(ies) experienced by an application on computing device(s) and analyzing the indication(s) of the anomaly(ies) to determine whether corrective action(s) should be issued. Responsive to a determination corrective action(s) should be issued based on the analyzing, the corrective action(s) are issued to the computing device(s). Methods, program products, and apparatus are disclosed.Type: ApplicationFiled: November 14, 2012Publication date: May 15, 2014Applicant: International Business Machines CorporationInventors: Mauro Baluda, Paul C. Castro, Marco Pistoia, John J. Ponzo
-
Publication number: 20140137246Abstract: An example includes intercepting one or more activities performed by an application on a computing device. The intercepting uses an instrumentation layer separating the application from an operating system on the computing device. The one or more activities are compared with one or more anomaly detection policies in a policy configuration file to detect or not detect presence of one or more anomalies. In response to the comparison detecting presence of one or more anomalies, indication(s) of the one or more anomalies are stored. Another example includes receiving indication(s) of anomaly(ies) experienced by an application on computing device(s) and analyzing the indication(s) of the anomaly(ies) to determine whether corrective action(s) should be issued. Responsive to a determination corrective action(s) should be issued based on the analyzing, the corrective action(s) are issued to the computing device(s). Methods, program products, and apparatus are disclosed.Type: ApplicationFiled: September 18, 2013Publication date: May 15, 2014Applicant: International Business Machines CorporationInventors: Mauro Baluda, Paul C. Castro, Marco Pistoia, John J. Ponzo