Patents by Inventor Joseph Celi, Jr.

Joseph Celi, Jr. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10102402
    Abstract: An authentication channel is established between a mobile device and a transaction terminal that uses a keypad for access control. The terminal keypad is assumed to be untrusted, whereas the mobile device has a trusted interface that only the device user can access and use. The transaction terminal includes a short-range communication device, and a keypad interface application configured to communicate with an external keypad device in lieu of the transaction terminal's own keypad. The mobile device includes a mobile app. In response to detecting a user access request, a handshake protocol is performed between the keypad interface application in the transaction terminal and the keypad interface function in the mobile device. If the handshake protocol succeeds, the user is notified that the transaction terminal is trusted. The user then enters his or her password and/or PIN on the mobile device in lieu of direct entry via the terminal keypad.
    Type: Grant
    Filed: April 7, 2016
    Date of Patent: October 16, 2018
    Assignee: International Business Machines Corporation
    Inventors: Olgierd Stanislaw Pieczul, Joseph Celi, Jr., Mark McGloin
  • Publication number: 20180288046
    Abstract: A system increases security for personal devices. An authenticating authority receives an authentication request from a personal device. The authenticating authority obtains a current location of the personal device from a location server, where the location server transmits the current location to the authenticating authority. The location server receives location information associated with the personal device, where the location information is transmitted to the location server by a location updating daemon running on the personal device. The authenticating authority compares the current location received from the location server to a zone associated with the personal device to determine processing of the authentication request. The zone is retained by the authenticating authority.
    Type: Application
    Filed: March 30, 2017
    Publication date: October 4, 2018
    Inventors: Joseph CELI, JR., Miriam Margarita CELI
  • Patent number: 9495407
    Abstract: Embodiments of the present invention provide for synchronization client coordination with a change log service (CLS). In an embodiment of the invention, a change tracking thread on a synchronization client provided as part of a pervasive device is initiated. A synchronization message is sent to the CLS upon detecting a change to data. Synchronization is performed and upon completing synchronization, a synchronization stop message is sent to the CLS. Upon sending the synchronization stop message to the CLS, the change tracking thread on the synchronization client is stopped.
    Type: Grant
    Filed: May 19, 2015
    Date of Patent: November 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: Joseph Celi, Jr., Ashok C. Mammen
  • Patent number: 9451454
    Abstract: An embodiment of the invention includes initially registering information with a data system, wherein the registered information pertains to a user of a mobile device and includes credential information, and further includes a message address associated with the user. An enrollment request, together with the specified credential information, is sent to a management server. Responsive thereto, the server sends a message of specified type to the message address associated with the user, wherein such message includes a pin code. The pin code is then sent from the device to the server, and responsive to receiving the pin code, the server is operated to deliver a security token, for use in authenticating the mobile device to selectively access the particular data processing system.
    Type: Grant
    Filed: January 5, 2012
    Date of Patent: September 20, 2016
    Assignee: International Business Machines Corporation
    Inventors: Joseph Celi, Jr., Olgierd S. Pieczul, Mary Ellen Zurko
  • Patent number: 9413534
    Abstract: An authentication channel is established between a mobile device and a transaction terminal that uses a keypad for access control. The terminal keypad is assumed to be untrusted, whereas the mobile device has a trusted interface that only the device user can access and use. The transaction terminal includes a short-range communication device, and a keypad interface application configured to communicate with an external keypad device in lieu of the transaction terminal's own keypad. The mobile device includes a mobile app. In response to detecting a user access request, a handshake protocol is performed between the keypad interface application in the transaction terminal and the keypad interface function in the mobile device. If the handshake protocol succeeds, the user is notified that the transaction terminal is trusted. The user then enters his or her password and/or PIN on the mobile device in lieu of direct entry via the terminal keypad.
    Type: Grant
    Filed: August 25, 2015
    Date of Patent: August 9, 2016
    Assignee: International Business Machines Corporation
    Inventors: Olgierd Stanislaw Pieczul, Joseph Celi, Jr., Mark McGloin
  • Publication number: 20160224809
    Abstract: An authentication channel is established between a mobile device and a transaction terminal that uses a keypad for access control. The terminal keypad is assumed to be untrusted, whereas the mobile device has a trusted interface that only the device user can access and use. The transaction terminal includes a short-range communication device, and a keypad interface application configured to communicate with an external keypad device in lieu of the transaction terminal's own keypad. The mobile device includes a mobile app. In response to detecting a user access request, a handshake protocol is performed between the keypad interface application in the transaction terminal and the keypad interface function in the mobile device. If the handshake protocol succeeds, the user is notified that the transaction terminal is trusted. The user then enters his or her password and/or PIN on the mobile device in lieu of direct entry via the terminal keypad.
    Type: Application
    Filed: April 7, 2016
    Publication date: August 4, 2016
    Inventors: Olgierd Stanislaw Pieczul, Joseph Celi, Jr., Mark McGloin
  • Patent number: 9344279
    Abstract: An authentication channel is established between a mobile device and a transaction terminal that uses a keypad for access control. The terminal keypad is assumed to be untrusted, whereas the mobile device has a trusted interface that only the device user can access and use. The transaction terminal includes a short-range communication device, and a keypad interface application configured to communicate with an external keypad device in lieu of the transaction terminal's own keypad. The mobile device includes a mobile app. In response to detecting a user access request, a handshake protocol is performed between the keypad interface application in the transaction terminal and the keypad interface function in the mobile device. If the handshake protocol succeeds, the user is notified that the transaction terminal is trusted. The user then enters his or her password and/or PIN on the mobile device in lieu of direct entry via the terminal keypad.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: May 17, 2016
    Assignee: International Business Machines Corporation
    Inventors: Olgierd Stanislaw Pieczul, Joseph Celi, Jr., Mark McGloin
  • Publication number: 20160080152
    Abstract: An authentication channel is established between a mobile device and a transaction terminal that uses a keypad for access control. The terminal keypad is assumed to be untrusted, whereas the mobile device has a trusted interface that only the device user can access and use. The transaction terminal includes a short-range communication device, and a keypad interface application configured to communicate with an external keypad device in lieu of the transaction terminal's own keypad. The mobile device includes a mobile app. In response to detecting a user access request, a handshake protocol is performed between the keypad interface application in the transaction terminal and the keypad interface function in the mobile device. If the handshake protocol succeeds, the user is notified that the transaction terminal is trusted. The user then enters his or her password and/or PIN on the mobile device in lieu of direct entry via the terminal keypad.
    Type: Application
    Filed: September 12, 2014
    Publication date: March 17, 2016
    Inventors: Olgierd Stanislaw Pieczul, Joseph Celi, JR., Mark McGloin
  • Publication number: 20160080937
    Abstract: An authentication channel is established between a mobile device and a transaction terminal that uses a keypad for access control. The terminal keypad is assumed to be untrusted, whereas the mobile device has a trusted interface that only the device user can access and use. The transaction terminal includes a short-range communication device, and a keypad interface application configured to communicate with an external keypad device in lieu of the transaction terminal's own keypad. The mobile device includes a mobile app. In response to detecting a user access request, a handshake protocol is performed between the keypad interface application in the transaction terminal and the keypad interface function in the mobile device. If the handshake protocol succeeds, the user is notified that the transaction terminal is trusted. The user then enters his or her password and/or PIN on the mobile device in lieu of direct entry via the terminal keypad.
    Type: Application
    Filed: August 25, 2015
    Publication date: March 17, 2016
    Inventors: Olgierd Stanislaw Pieczul, Joseph Celi, Jr., Mark McGloin
  • Patent number: 9253056
    Abstract: In for enhancing performance of applications, a cloud application programming interface (API) abstraction layer receives a request from an application of a given entity for core services shared among a plurality of entities. A requestor of the request is determined, and the performance level information for the requestor is determined based on entity specific performance rules defined by the given entity. The entity specific performance rules defined by the given entity are applied to requests from the application of the given entity and are not applied to requests from the other entities of the plurality of entities. The performance level information is included in the request. The request is routed for servicing by one or more of the core services using the performance level information in the request without affecting servicing of requests from other entities of the plurality of entities.
    Type: Grant
    Filed: September 13, 2014
    Date of Patent: February 2, 2016
    Assignee: International Business Machines Corporation
    Inventors: Joseph Celi, Jr., Bharat B. Purohit
  • Patent number: 9246778
    Abstract: In for enhancing performance of applications, a cloud application programming interface (API) abstraction layer receives a request from an application of a given entity for core services shared among a plurality of entities. A requestor of the request is determined, and the performance level information for the requestor is determined based on entity specific performance rules defined by the given entity. The entity specific performance rules defined by the given entity are applied to requests from the application of the given entity and are not applied to requests from the other entities of the plurality of entities. The performance level information is included in the request. The request is routed for servicing by one or more of the core services using the performance level information in the request without affecting servicing of requests from other entities of the plurality of entities.
    Type: Grant
    Filed: August 12, 2013
    Date of Patent: January 26, 2016
    Assignee: International Business Machines Corporation
    Inventors: Joseph Celi, Jr., Bharat B. Purohit
  • Patent number: 9208325
    Abstract: A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a “data protection profile” for the device. This profile defines at least one security event (criteria or condition) associated with the device, and at least one protection action that should occur to protect data on the device upon the triggering of the event. Once defined in a profile, the application monitors for the occurrence of the security event. Upon the occurrence of the specified event, the protection action is enforced on the device to protect the data.
    Type: Grant
    Filed: July 26, 2012
    Date of Patent: December 8, 2015
    Assignee: International Business Machines Corporation
    Inventors: Mark Alexander McGloin, Olgierd Stanislaw Pieczul, Joseph Celi, Jr.
  • Publication number: 20150269217
    Abstract: Embodiments of the present invention provide for synchronization client coordination with a change log service (CLS). In an embodiment of the invention, a change tracking thread on a synchronization client provided as part of a pervasive device is initiated. A synchronization message is sent to the CLS upon detecting a change to data. Synchronization is performed and upon completing synchronization, a synchronization stop message is sent to the CLS. Upon sending the synchronization stop message to the CLS, the change tracking thread on the synchronization client is stopped.
    Type: Application
    Filed: May 19, 2015
    Publication date: September 24, 2015
    Inventors: Joseph Celi, JR., Ashok C. Mammen
  • Patent number: 9037605
    Abstract: Embodiments of the present invention provide for embedded change logging for data synchronization. In an embodiment of the invention, an embedded change logging data processing system can include a change embedded database (EDB) disposed in a pervasive device. The EDB can store entries for notified changes in data for multiple different end-user applications in the pervasive device. The system also can include a change log service (CLS) disposed in the pervasive device and coupled to the EDB. The CLS can include program code enabled to register with multiple different end-user applications in the pervasive device to receive notifications of changes, and to write entries to the EDB responsive to the notifications. Finally, the system can include a synchronization client disposed in the pervasive device separately from the CLS. The synchronization client can include program code enabled to directly access the EDB to perform data synchronization with a remote host.
    Type: Grant
    Filed: April 2, 2013
    Date of Patent: May 19, 2015
    Assignee: International Business Machines Corporation
    Inventors: Joseph Celi, Jr., Ashok C. Mammen
  • Publication number: 20150046583
    Abstract: In for enhancing performance of applications, a cloud application programming interface (API) abstraction layer receives a request from an application of a given entity for core services shared among a plurality of entities. A requestor of the request is determined, and the performance level information for the requestor is determined based on entity specific performance rules defined by the given entity. The entity specific performance rules defined by the given entity are applied to requests from the application of the given entity and are not applied to requests from the other entities of the plurality of entities. The performance level information is included in the request. The request is routed for servicing by one or more of the core services using the performance level information in the request without affecting servicing of requests from other entities of the plurality of entities.
    Type: Application
    Filed: September 13, 2014
    Publication date: February 12, 2015
    Inventors: Joseph CELI, JR., Bharat B. PUROHIT
  • Publication number: 20150046574
    Abstract: In for enhancing performance of applications, a cloud application programming interface (API) abstraction layer receives a request from an application of a given entity for core services shared among a plurality of entities. A requestor of the request is determined, and the performance level information for the requestor is determined based on entity specific performance rules defined by the given entity. The entity specific performance rules defined by the given entity are applied to requests from the application of the given entity and are not applied to requests from the other entities of the plurality of entities. The performance level information is included in the request. The request is routed for servicing by one or more of the core services using the performance level information in the request without affecting servicing of requests from other entities of the plurality of entities.
    Type: Application
    Filed: August 12, 2013
    Publication date: February 12, 2015
    Applicant: International Business Machines Corporation
    Inventors: Joseph CELI, JR., Bharat B. PUROHIT
  • Patent number: 8931081
    Abstract: Information and data stored by a mobile device is protected by comprising applying password-protection to the locally-stored information without persistently storing the corresponding password locally. Rather, the corresponding password is stored by a remote password server. In response to a trigger event on the mobile device, such as an unlocking action by the user, a request is sent by the mobile device to the password server to retrieve the corresponding server, and the corresponding password is returned to the mobile device. The mobile device can then use the password to access the protected information. If the user determines that the mobile device is lost, stolen, or out of the user's physical control, the user may access the password server and disable the sending of the password to the mobile device, thereby thwarting attempts to access the protected data on the mobile device.
    Type: Grant
    Filed: August 21, 2012
    Date of Patent: January 6, 2015
    Assignee: International Business Machines Corporation
    Inventors: Joseph Celi, Jr., Mark Alexander McGloin, Harshita Nersu, Olgierd Stanislaw Pieczul
  • Patent number: 8903360
    Abstract: The illustrative embodiments provide a method, apparatus, and computer program product for validating a mobile device. Voice data is received from the mobile device. The voice data comprises a recording of a pass phrase spoken by a user at the mobile device. A determination is made as to whether the mobile device is a valid mobile device using the voice data. An access code to the mobile device is sent in response to a determination that the mobile device is the valid mobile device.
    Type: Grant
    Filed: May 17, 2012
    Date of Patent: December 2, 2014
    Assignee: International Business Machines Corporation
    Inventors: Joseph Celi, Jr., Brett Gavagni, Mary Ellen Zurko
  • Patent number: 8875304
    Abstract: A method, programmed medium and system are provided for a server-based security manager application to support a self-cleaning operation on a remote computerized device. When a computer device has been reported as being missing for example, the security manager server application will cause the device to take pro-determined actions such as un-installing predetermined applications contained on the device and removing all persisted data associated with such predetermined applications.
    Type: Grant
    Filed: November 8, 2012
    Date of Patent: October 28, 2014
    Assignee: International Business Machines Corporation
    Inventors: Joseph Celi, Jr., Mark McGloin, Olgierd Stanislaw Pieczul
  • Patent number: 8825006
    Abstract: The different illustrative embodiments provide a method, computer program product, and apparatus for managing an authentication request. A determination is made whether additional authentication is to be performed responsive to receiving the authentication request to access an application from a mobile device. A phone number to call is sent to the mobile device responsive to a determination that the additional authentication is to be performed. A determination is made whether an incoming call to the phone number is from the mobile device and within a selected period of time. The authentication request to access the application from the mobile device is granted responsive to a determination that the incoming call to the phone number is from the mobile device and within the selected period of time.
    Type: Grant
    Filed: May 30, 2012
    Date of Patent: September 2, 2014
    Assignee: International Business Machines Corporation
    Inventors: Joseph Celi, Jr., Mark McGloin, Olgierd S. Pieczul