Patents by Inventor Joseph
Bird
Joseph Bird has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11681810Abstract: Systems, devices, computer-implemented methods, and/or computer program products that facilitate software vulnerability analysis using relationship data extracted from disparate package-related sources. In one example, a system can comprise a processor that executes computer executable components stored in memory. The computer executable components can comprise a knowledge induction component and a vulnerability component. The knowledge induction component can populate a package ontology for a range of packages with relationship data extracted from a plurality of disparate package-related sources. The vulnerability component can identify an implicit vulnerability impacting the range of packages using the package ontology and a vulnerability record regarding an explicit vulnerability for a package within the range of packages.Type: GrantFiled: April 5, 2021Date of Patent: June 20, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yu Deng, Tara Astigarraga, Jens Rathgeber, John Joseph Bird, Soumitra Sarkar
-
Publication number: 20220318396Abstract: Systems, devices, computer-implemented methods, and/or computer program products that facilitate software vulnerability analysis using relationship data extracted from disparate package-related sources. In one example, a system can comprise a processor that executes computer executable components stored in memory. The computer executable components can comprise a knowledge induction component and a vulnerability component. The knowledge induction component can populate a package ontology for a range of packages with relationship data extracted from a plurality of disparate package-related sources. The vulnerability component can identify an implicit vulnerability impacting the range of packages using the package ontology and a vulnerability record regarding an explicit vulnerability for a package within the range of packages.Type: ApplicationFiled: April 5, 2021Publication date: October 6, 2022Inventors: Yu Deng, Tara Astigarraga, Jens Rathgeber, John Joseph Bird, Soumitra Sarkar
-
Publication number: 20110296372Abstract: A server receives a request from a client to provide a price and/or time quote and transmits initial diagnostic questions. The server receives a response to the initial questions and generates a initial cost range and/or time range estimate quote based on weighting pre-assigned in a knowledge base to information included in the response. The weightings assigned to possible responses are based on analysis of historical data. The server transmits the initial cost and/or time estimate quote to the client. Further, the server may refine the initial cost range and/or time range estimate quote in response to a request. Refining may includes generating additional diagnostic questions, receiving a responses, generating a refined quote based on a weighting pre-associated in the knowledge base with information included in the responses, and transmitting the refined quote to the client. Refining the quote may be an iterative process.Type: ApplicationFiled: March 4, 2011Publication date: December 1, 2011Inventors: Terrance Joseph Bird, David Neville Brown, Evan Charles Harter, III
-
Publication number: 20110119120Abstract: A method and apparatus for reducing the balance of a consumer or educational loan obligation using a loyalty reward program is disclosed. Loan obligors can reduce the balances of their loan obligations by purchasing consumer goods and services that they would normally purchase. The method essentially comprises the steps of (a) establishing a site on a global computer network; (b) recognizing at least certain users of the site; (c) directing the recognized users to merchants; (d) enabling accumulation of loyalty points by the recognized users based upon purchases from the merchants; (e) monitoring the purchases by the recognized users from the merchants; (f) tracking the accumulated loyalty points; and (g) permitting selective redemption of the accumulated loyalty points. Users of the site are recognized by requiring them to provide initial registration information. Accumulated loyalty points may be categorized with a status of “pending” or a status of “earned.Type: ApplicationFiled: September 7, 2010Publication date: May 19, 2011Inventors: K. Jon Kern, Joseph Bird, Brooke Hartman
-
Publication number: 20110047527Abstract: Users access a deployment environment utilizing a browser. The deployment environment automatically creates an application based on user input and then deploys the created application in response to an indication from a user. Deployment may include providing an automatically generated reference. When an application is accessed via a browser utilizing such a reference, the deployment environment may execute and deliver access to the referenced application. In some implementations, the deployment environment may allow the user to choose between a wizard and a development tool. The wizard may present a series of prompts that guide the user through a default template for designing an application, which is then automatically created based on the user's responses.Type: ApplicationFiled: August 23, 2010Publication date: February 24, 2011Applicant: Vacava, Inc.Inventors: Terrance Joseph Bird, David Neville Brown, Evan Charles Harter, III
-
Patent number: 7849197Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: GrantFiled: April 16, 2008Date of Patent: December 7, 2010Assignee: International Business Machines CorporationInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Patent number: 7711830Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: GrantFiled: April 16, 2008Date of Patent: May 4, 2010Assignee: International Business Machines CorporationInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Patent number: 7461152Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: GrantFiled: March 31, 2004Date of Patent: December 2, 2008Assignee: International Business Machines CorporationInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Publication number: 20080222298Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: ApplicationFiled: April 16, 2008Publication date: September 11, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Joseph Bird, Bob RIchard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Publication number: 20080215676Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: ApplicationFiled: April 16, 2008Publication date: September 4, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Publication number: 20080215738Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: ApplicationFiled: April 16, 2008Publication date: September 4, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Patent number: 6981144Abstract: A method for providing secure access to console functions of a computer system and authentication of a console device is disclosed. The method comprises first initiating a first EKE sequence to generate a unique shared secret per device utilizing a default device identifier and associated default shared secret on a system-attached device from which a console operation is desired to be enabled. Then, a shared secret is generated from the first EKE sequence, and the generated shared secret is utilized in place of the default device shared secret in subsequent console authentication procedures for that device. Following, the shared secret is securely stored within a storage location of the system and on the system-attached device. The device's shared secret is subsequently replaced on each connection from that device.Type: GrantFiled: April 6, 2001Date of Patent: December 27, 2005Assignee: International Business Machines CorporationInventors: Mark Linus Bauman, John Joseph Bird, Jeffrey Earl Remfert
-
Publication number: 20020161630Abstract: A method and apparatus for reducing the balance of a consumer or educational loan obligation using a loyalty reward program is disclosed. Loan obligors can reduce the balances of their loan obligations by purchasing consumer goods and services that they would normally purchase. The method essentially comprises the steps of (a) establishing a site on a global computer network; (b) recognizing at least certain users of the site; (c) directing the recognized users to merchants; (d) enabling accumulation of loyalty points by the recognized users based upon purchases from the merchants; (e) monitoring the purchases by the recognized users from the merchants; (f) tracking the accumulated loyalty points; and (g) permitting selective redemption of the accumulated loyalty points. Users of the site are recognized by requiring them to provide initial registration information. Accumulated loyalty points may be categorized with a status of "pending" or a status of "earned.Type: ApplicationFiled: September 29, 2000Publication date: October 31, 2002Applicant: Nelnet Loan Services, Inc.Inventors: K. Jon Kern , Joseph Bird , Brooke Hartman
-
Publication number: 20020152377Abstract: A method for providing secure access to console functions of a computer system and authentication of a console device is disclosed. The method comprises first initiating a first EKE sequence to generate a unique shared secret per device utilizing a default device identifier and associated default shared secret on a system-attached device from which a console operation is desired to be enabled. Then, a shared secret is generated from the first EKE sequence, and the generated shared secret is utilized in place of the default device shared secret in subsequent console authentication procedures for that device. Following, the shared secret is securely stored within a storage location of the system and on the system-attached device. The device's shared secret is subsequently replaced on each connection from that device.Type: ApplicationFiled: April 6, 2001Publication date: October 17, 2002Applicant: International Business Machines CorporationInventors: Mark Linus Bauman, John Joseph Bird, Jeffrey Earl Remfert
-
Patent number: D1020297Type: GrantFiled: December 9, 2020Date of Patent: April 2, 2024Assignee: The Gillette Company LLCInventors: Christopher Ramm, Bas Joseph Kamp, Roland Alexander Bird