Patents by Inventor John R. Pavesi
John R. Pavesi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9686262Abstract: A method and system for authenticating a user to a target server. A request is received from a user computer system to authenticate the user for access to a target server at level N of N levels (N?2). Each record of a stored authentication plan associated with the user has authentication records each having information relating to authentication of the user for access to N?1 target servers at respective levels 1 through N?1. Each record of a received current authentication plan for the user has authentication records each having current information relating to authentication of the user for access to the N?1 target servers at respective levels 1 through N?1. It is determined that there is at least a partial match between the stored and current authentication plans, and in response, the user is authenticated for access to the target server at level N.Type: GrantFiled: May 7, 2015Date of Patent: June 20, 2017Assignee: International Business Machines CorporationInventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Patent number: 9146723Abstract: A method for installation and configuration of a software product includes installing a software product and determining configuration settings of the software product based upon a social network of peers. A system for installation and configuration of at least one software product includes at least one client install package capable of utilizing a social network for at least one of installing software; transmitting configuration settings; transmitting post-installation configuration settings; or responding to post-installation configuration modifications; and a server that stores and aggregates the configuration settings of a plurality of users, forming at least one social network.Type: GrantFiled: June 3, 2013Date of Patent: September 29, 2015Assignee: International Business Machines CorporationInventors: Gregory J. Boss, Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Publication number: 20150244701Abstract: A method and system for authenticating a user to a target server. A request is received from a user computer system to authenticate the user for access to a target server at level N of N levels (N?2). Each record of a stored authentication plan associated with the user has authentication records each having information relating to authentication of the user for access to N?1 target servers at respective levels 1 through N?1. Each record of a received current authentication plan for the user has authentication records each having current information relating to authentication of the user for access to the N?1 target servers at respective levels 1 through N?1. It is determined that there is at least a partial match between the stored and current authentication plans, and in response, the user is authenticated for access to the target server at level N.Type: ApplicationFiled: May 7, 2015Publication date: August 27, 2015Inventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Patent number: 9094393Abstract: A method and system for authenticating a user to a target server. A request is received from a user computer system to authenticate the user for access to a target server at level N of N levels (N?2). Each record of a stored authentication plan associated with the user has authentication records each having expected information relating to authentication of the user for access to the N?1 target servers at respective levels 1 through N?1. Each record of a received current authentication plan for the user has authentication records each having current information relating to authentication of the user for access to the N?1 target servers at respective levels 1 through N?1. It is determined that that there is at least a partial match between the stored and current authentication plans, and in response, the user is authenticated for access to the target server at level N.Type: GrantFiled: November 11, 2013Date of Patent: July 28, 2015Assignee: International Business Machines CorporationInventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Patent number: 8726347Abstract: Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other servers are disclosed. Embodiments of a method for authenticating a user to a server may include receiving a request to authenticate the user to the server and determining whether authenticating the user requires matching an authentication plan. If a plan is required, the method may also include accessing a stored authentication plan with authentication records each having expected information relating to user access to a different server. The method may also include receiving an indication of the user's current authentication plan from an authentication store where the plan has authorization records each having current information relating to user access. Embodiments of the method may also include comparing the stored authentication plan with the received current authentication plan to determine whether they match and, in response to a match, authenticating the user.Type: GrantFiled: April 27, 2007Date of Patent: May 13, 2014Assignee: International Business Machines CorporationInventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Patent number: 8713665Abstract: A method and system for controlling a firewall for a user computer system. One or more processors of the user computer system receive a control request to control a program of the user computer system by the firewall. The control request includes a condition pertaining to at least one process of a remote computer system. The at least one process is configured to be executed on the remote computer system. The firewall protects the user computer system from external threats. The processors store a remote system condition associated with the program of the user computer system. The remote system condition includes the condition pertaining to the at least one process. The processors ascertain whether the remote system condition is satisfied. The processors direct the firewall to block or allow the transmission of data if it is ascertained that the remote system condition is not satisfied or satisfied, respectively.Type: GrantFiled: September 4, 2012Date of Patent: April 29, 2014Assignee: International Business Machines CorporationInventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Publication number: 20140068730Abstract: A method and system for authenticating a user to a target server. A request is received from a user computer system to authenticate the user for access to a target server at level N of N levels (N?2). Each record of a stored authentication plan associated with the user has authentication records each having expected information relating to authentication of the user for access to the N?1 target servers at respective levels 1 through N?1. Each record of a received current authentication plan for the user has authentication records each having current information relating to authentication of the user for access to the N?1 target servers at respective levels 1 through N?1. It is determined that that there is at least a partial match between the stored and current authentication plans, and in response, the user is authenticated for access to the target server at level N.Type: ApplicationFiled: November 11, 2013Publication date: March 6, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Publication number: 20130263111Abstract: A method for installation and configuration of a software product includes installing a software product and determining configuration settings of the software product based upon a social network of peers. A system for installation and configuration of at least one software product includes at least one client install package capable of utilizing a social network for at least one of installing software; transmitting configuration settings; transmitting post-installation configuration settings; or responding to post-installation configuration modifications; and a server that stores and aggregates the configuration settings of a plurality of users, forming at least one social network.Type: ApplicationFiled: June 3, 2013Publication date: October 3, 2013Inventors: Gregory J. Boss, Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Patent number: 8473944Abstract: A method for installation and configuration of a software product includes installing a software product and determining configuration settings of the software product based upon a social network of peers. A system for installation and configuration of at least one software product includes at least one client install package capable of utilizing a social network for at least one of installing software; transmitting configuration settings; transmitting post-installation configuration settings; or responding to post-installation configuration modifications; and a server that stores and aggregates the configuration settings of a plurality of users, forming at least one social network.Type: GrantFiled: December 2, 2011Date of Patent: June 25, 2013Assignee: International Business Machines CorporationInventors: Gregory J. Boss, Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Publication number: 20120331541Abstract: A method and system for controlling a firewall for a user computer system. One or more processors of the user computer system receive a control request to control a program of the user computer system by the firewall. The control request includes a condition pertaining to at least one process of a remote computer system. The at least one process is configured to be executed on the remote computer system. The firewall protects the user computer system from external threats. The processors store a remote system condition associated with the program of the user computer system. The remote system condition includes the condition pertaining to the at least one process. The processors ascertain whether the remote system condition is satisfied. The processors direct the firewall to block or allow the transmission of data if it is ascertained that the remote system condition is not satisfied or satisfied, respectively.Type: ApplicationFiled: September 4, 2012Publication date: December 27, 2012Applicant: International Business Machines CorporationInventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Patent number: 8327430Abstract: Generally speaking, systems, methods and media for implementing a firewall control system responsive to remote system information are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program and determining whether a remote system condition exists for the associated program, where the remote system condition includes a condition to be satisfied based on information received from a particular remote system. Embodiments may also include, in response to determining that a remote system condition exists, determining whether the remote system condition is satisfied based on information received from the particular remote system. Embodiments may also include, in response to determining whether the remote system condition is satisfied, performing one or more firewall actions.Type: GrantFiled: June 19, 2007Date of Patent: December 4, 2012Assignee: International Business Machines CorporationInventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Patent number: 8272041Abstract: Generally speaking, systems, methods and media for implementing a firewall control system responsive to process interrogations are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program and determining whether a process rule exists for the associated program, where the process rule includes a condition to be satisfied for a process of the user computer system. Embodiments may also include, in response to determining that a process rule does exist, determining a method for evaluating a status of the process and determining a current status of the process. Embodiments may also include determining whether the process rule is satisfied based on the current status of the process and using the determined evaluation method. Embodiments may also include, in response to determining whether the condition of the process rule is satisfied, performing one or more firewall actions.Type: GrantFiled: June 21, 2007Date of Patent: September 18, 2012Assignee: International Business Machines CorporationInventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Patent number: 8272043Abstract: Generally speaking, systems, methods and media for implementing a firewall control system responsive to user authentications are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program. Embodiments may include determining whether an authentication plan is required to be matched for the associated program and, if so, accessing a stored authentication plan associated with the program and having one or more authentication records each having expected information relating to user access to a particular server. Embodiments may include accessing a current authentication plan from an authentication store, the current authentication plan having one or more authentication records each having information relating to user access to a particular server.Type: GrantFiled: June 21, 2007Date of Patent: September 18, 2012Assignee: International Business Machines CorporationInventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Publication number: 20120079477Abstract: A method for installation and configuration of a software product includes installing a software product and determining configuration settings of the software product based upon a social network of peers. A system for installation and configuration of at least one software product includes at least one client install package capable of utilizing a social network for at least one of installing software; transmitting configuration settings; transmitting post-installation configuration settings; or responding to post-installation configuration modifications; and a server that stores and aggregates the configuration settings of a plurality of users, forming at least one social network.Type: ApplicationFiled: December 2, 2011Publication date: March 29, 2012Applicant: International Business Machines CorporationInventors: Gregory J. Boss, Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
System and methods for applying social computing paradigm to software installation and configuration
Patent number: 8136090Abstract: A method for installation and configuration of a software product includes installing a software product and determining configuration settings of the software product based upon a social network of peers. A system for installation and configuration of at least one software product includes at least one client install package capable of utilizing a social network for at least one of installing software; transmitting configuration settings; transmitting post-installation configuration settings; or responding to post-installation configuration modifications; and a server that stores and aggregates the configuration settings of a plurality of users, forming at least one social network.Type: GrantFiled: December 21, 2006Date of Patent: March 13, 2012Assignee: International Business Machines CorporationInventors: Gregory J. Boss, Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker -
Publication number: 20080320581Abstract: Generally speaking, systems, methods and media for implementing a firewall control system responsive to process interrogations are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program and determining whether a process rule exists for the associated program, where the process rule includes a condition to be satisfied for a process of the user computer system. Embodiments may also include, in response to determining that a process rule does exist, determining a method for evaluating a status of the process and determining a current status of the process. Embodiments may also include determining whether the process rule is satisfied based on the current status of the process and using the determined evaluation method. Embodiments may also include, in response to determining whether the condition of the process rule is satisfied, performing one or more firewall actions.Type: ApplicationFiled: June 21, 2007Publication date: December 25, 2008Inventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Publication number: 20080320580Abstract: Generally speaking, systems, methods and media for implementing a firewall control system responsive to remote system information are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program and determining whether a remote system condition exists for the associated program, where the remote system condition includes a condition to be satisfied based on information received from a particular remote system. Embodiments may also include, in response to determining that a remote system condition exists, determining whether the remote system condition is satisfied based on information received from the particular remote system. Embodiments may also include, in response to determining whether the remote system condition is satisfied, performing one or more firewall actions.Type: ApplicationFiled: June 19, 2007Publication date: December 25, 2008Inventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Publication number: 20080320584Abstract: Generally speaking, systems, methods and media for implementing a firewall control system responsive to user authentications are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program. Embodiments may include determining whether an authentication plan is required to be matched for the associated program and, if so, accessing a stored authentication plan associated with the program and having one or more authentication records each having expected information relating to user access to a particular server. Embodiments may include accessing a current authentication plan from an authentication store, the current authentication plan having one or more authentication records each having information relating to user access to a particular server.Type: ApplicationFiled: June 21, 2007Publication date: December 25, 2008Inventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Publication number: 20080271117Abstract: Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other servers are disclosed. Embodiments of a method for authenticating a user to a server may include receiving a request to authenticate the user to the server and determining whether authenticating the user requires matching an authentication plan. If a plan is required, the method may also include accessing a stored authentication plan with authentication records each having expected information relating to user access to a different server. The method may also include receiving an indication of the user's current authentication plan from an authentication store where the plan has authorization records each having current information relating to user access. Embodiments of the method may also include comparing the stored authentication plan with the received current authentication plan to determine whether they match and, in response to a match, authenticating the user.Type: ApplicationFiled: April 27, 2007Publication date: October 30, 2008Inventors: Rick A. Hamilton, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
System and Methods for Applying Social Computing Paradigm to Software Installation and Configuration
Publication number: 20080155534Abstract: A method for installation and configuration of a software product includes installing a software product and determining configuration settings of the software product based upon a social network of peers. A system for installation and configuration of at least one software product includes at least one client install package capable of utilizing a social network for at least one of installing software; transmitting configuration settings; transmitting post-installation configuration settings; or responding to post-installation configuration modifications; and a server that stores and aggregates the configuration settings of a plurality of users, forming at least one social network.Type: ApplicationFiled: December 21, 2006Publication date: June 26, 2008Applicant: International Business Machines CorporationInventors: Gregory J. Boss, Rick A. Hamilton, Brian M. O'Connell, John R. Pavesi, Keith R. Walker