Patents by Inventor Kaleb D. Walton
Kaleb D. Walton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9471837Abstract: A method of identifying and suggesting objects for a user within a user's field of vision of a personal imaging system. A user's field of vision within the system is monitored. The personal imaging system captures biometric data of the user regarding objects that are focused on within the user's field of vision. The biometric data and any identified emotions regarding the objects being focused on from the user is associated with the user's profile which includes at least demographics. A real-time correlation of the user's profile and demographics with other users is performed to provide a correlation interest score. The interest score may be used to recommend and direct the user's attention to other objects within the user's field of vision that the user may be interested in.Type: GrantFiled: October 15, 2014Date of Patent: October 18, 2016Assignee: International Business Machines CorporationInventors: Brian M. Anderson, Randy S. Johnson, Scott B. Katzman, John F. Kelley, Jacob C. Schneider, Kaleb D. Walton
-
Patent number: 9473458Abstract: A connection method is provided. The method includes retrieving by a data retrieval device, unique data comprising an identifier associated with a wireless device. The unique data is transmitted to a router transmitting an authorization request and a configuration request for a configuration change to an authorization service. The authorization request is presented to a user and in response the user transmits an authorization code to the authorization service. In response, the router generates a virtual SSID and preconfigured firewall rules based on the unique data and the wireless device is automatically connected to the router based on the virtual SSID and the preconfigured firewall rules.Type: GrantFiled: September 11, 2015Date of Patent: October 18, 2016Assignee: International Business Machines CorporationInventors: Michal Bartoszewski, Miguel A. Beher Valdivia, Zachary S. Herman, Kaleb D. Walton
-
Patent number: 9454459Abstract: A method, and associated computer system and computer program product, of detecting source code merge conflicts and compilation errors. Uncommitted changes associated with a source code are received periodically at each time of a sequence of times. A temporary branch corresponding to each uncommitted change associated with the source code is created. The temporary branch corresponding to each uncommitted change is merged to corresponding portions of the source code. It is ascertained that no merge conflict resulted from the merging and in response, a compilation of a merged version of the source code is performed, wherein the merged version of the source code includes the temporary branch corresponding to each uncommitted change. It is determined that no compilation error occurred from the compilation and in response, a version of a product that includes the merged version of the source code is created.Type: GrantFiled: August 19, 2015Date of Patent: September 27, 2016Assignee: International Business Machines CorporationInventors: George T. Bigwood, Jason T. McMann, Michael G. Nikitaides, Kaleb D. Walton
-
Patent number: 9450682Abstract: A method and a system of using vibration signatures for pairing two devices. The method and the system include an apparatus that has a master side and a slave side. The slave side has at least one frictional structure. A first device is inserted into the master side. When a second device is inserted through the slave side, a pattern of vibration is generated. Vibration detecting devices on the first and second devices detect the pattern of vibration. A program of the first device validates a master vibration signature and configures the first device as a master device. A program of the second device validates a slave vibration signature and configures the second device as a slave device. The master device and the slave device are automatically paired.Type: GrantFiled: October 7, 2013Date of Patent: September 20, 2016Assignee: International Business Machines CorporationInventors: Zachary S. Herman, Kaleb D. Walton
-
Publication number: 20160267922Abstract: In an approach to determining speech effectiveness, one or more computer processors receive speech input. The one or more computer processors determine, based, at least in part, on the received speech input, a first speaking mode. The one or more computer processors detect, based, at least in part, on the first speaking mode, at least one aspect of the received speech input. The one or more computer processors determine, based, at least in part, on the first speaking mode and the detected at least one aspect of the received speech input, whether a rate of occurrence of the detected at least one aspect of the speech input exceeds a pre-defined threshold. Responsive to determining a rate of occurrence of the detected at least one aspect of the speech input exceeds a pre-defined threshold, the one or more computer processors notify a user.Type: ApplicationFiled: May 18, 2016Publication date: September 15, 2016Inventors: Patrick A. Spizzo, Sara H. Waggoner, Kaleb D. Walton, Aaron T. Wodrich
-
Publication number: 20160254868Abstract: A system of using vibration signatures for pairing two portable computer devices. The system includes an apparatus that has a master side and a slave side. The slave side has a frictional structure. A first portable computer device is inserted into the master side. When a second portable computer device is inserted through the slave side, a pattern of vibration is generated. Vibration detecting devices on the first and second portable computer devices detect the pattern of vibration. A program of the first portable computer device validates a master vibration signature and configures the first portable computer device as a master device. A program of the second portable computer device validates a slave vibration signature and configures the second portable computer device as a slave device. The master device and the slave device are automatically paired.Type: ApplicationFiled: May 11, 2016Publication date: September 1, 2016Inventors: Zachary S. Herman, Kaleb D. Walton
-
Patent number: 9412393Abstract: In an approach to determining speech effectiveness, a computer receives speech input. The computer determines, based, at least in part, on the received speech input, whether the speech input is one of: a conversation with words spoken by two or more people during a predetermined time interval, and a presentation with words spoken by one person and not any other person during a predetermined time interval. The computer detects at least one problem with the speech input. If the speech input is the presentation, the computer weights, by a first factor, the detected at least one problem with the speech input based on the speech input being a presentation and not a conversation, and if the speech input is a conversation, the computer weights, by a second factor, the detected at least one problem with the speech input based on the speech input being a conversation and not a presentation.Type: GrantFiled: April 24, 2014Date of Patent: August 9, 2016Assignee: International Business Machines CorporationInventors: Patrick A. Spizzo, Sara H. Waggoner, Kaleb D. Walton, Aaron T. Wodrich
-
Publication number: 20160227167Abstract: Eye tracking for the purpose of detecting attendee disengagement with respect to a presentation including a visual display communicated over a network. The eye tracking method includes: during a play of the presentation, tracking eye positions of a set of control party(ies); during a play of the presentation, tracking eye positions of a set of non-control party(ies); determining a set of divergence value(s) corresponding to divergence between the eye position(s) of the control party(ies) and the non-control party(ies); and determining a disengagement value corresponding to relative disengagement of the non-control party(ies) based, at least in part on the set of divergence value(s).Type: ApplicationFiled: April 8, 2016Publication date: August 4, 2016Inventors: Gary I. Givental, Kaleb D. Walton
-
Patent number: 9363093Abstract: Eye tracking for the purpose of detecting attendee disengagement with respect to a presentation including a visual display communicated over a network. The eye tracking method includes: during a play of the presentation, tracking eye positions of a set of control party(ies); during a play of the presentation, tracking eye positions of a set of non-control party(ies); determining a set of divergence value(s) corresponding to divergence between the eye position(s) of the control party(ies) and the non-control party(ies); and determining a disengagement value corresponding to relative disengagement of the non-control party(ies) based, at least in part on the set of divergence value(s).Type: GrantFiled: March 21, 2014Date of Patent: June 7, 2016Assignee: International Business Machines CorporationInventors: Gary I. Givental, Kaleb D. Walton
-
Patent number: 9344457Abstract: A computer determines a number of matches returned by a proposed security rule that result from application of the proposed security-rule to historical logged event data. The computer determines a predicted performance of the proposed security rule as part of a network security system based on the number of matches. The computer sends a message during a creation session of the proposed security-rule. The message includes a recommended change for a portion of the proposed security based on the predicted performance of the proposed security rule.Type: GrantFiled: August 31, 2015Date of Patent: May 17, 2016Assignee: International Business Machines CorporationInventors: Daniel E. Chapman, II, Gary I. Givental, Kaleb D. Walton
-
Publication number: 20160065621Abstract: An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a second business are determined. The second business has a second computer system currently or recently under attack. The characteristics include respective industries, sizes, geographical locations, types of sensitive data, and security vulnerabilities associated with the first and second businesses or first and second computer systems, an address of traffic through a device in the first computer system, and an address of an entity responsible for the attack on the second computer system. Based on a similarity between the characteristics of the first and second businesses, a likelihood that the entity responsible for the attack on the second computer system will attack the first computer system of the first business is determined.Type: ApplicationFiled: November 6, 2015Publication date: March 3, 2016Inventors: Nicholas W. Bradley, Gary I. Givental, David M. McMillen, Kaleb D. Walton
-
Publication number: 20160055378Abstract: A method of identifying and suggesting objects for a user within a user's field of vision of a personal imaging system. A user's field of vision within the system is monitored. The personal imaging system captures biometric data of the user regarding objects that are focused on within the user's field of vision. The biometric data and any identified emotions regarding the objects being focused on from the user is associated with the user's profile which includes at least demographics. A real-time correlation of the user's profile and demographics with other users is performed to provide a correlation interest score. The interest score may be used to recommend and direct the user's attention to other objects within the user's field of vision that the user may be interested in.Type: ApplicationFiled: October 15, 2014Publication date: February 25, 2016Inventors: Brian M. Anderson, Randy S. Johnson, Scott B. Katzman, John F. Kelley, Jacob C. Schneider, Kaleb D. Walton
-
Patent number: 9253204Abstract: An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a second business are determined. The second business has a second computer system currently or recently under attack. The characteristics include respective industries, sizes, geographical locations, types of sensitive data, and security vulnerabilities associated with the first and second businesses or first and second computer systems, an address of traffic through a device in the first computer system, and an address of an entity responsible for the attack on the second computer system. Based on a similarity between the characteristics of the first and second businesses, a likelihood that the entity responsible for the attack on the second computer system will attack the first computer system of the first business is determined.Type: GrantFiled: March 19, 2014Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventors: Nicholas W. Bradley, Gary I. Givental, David M. McMillen, Kaleb D. Walton
-
Publication number: 20160006694Abstract: A connection method is provided. The method includes retrieving by a data retrieval device, unique data comprising an identifier associated with a wireless device. The unique data is transmitted to a router transmitting an authorization request and a configuration request for a configuration change to an authorization service. The authorization request is presented to a user and in response the user transmits an authorization code to the authorization service. In response, the router generates a virtual SSID and preconfigured firewall rules based on the unique data and the wireless device is automatically connected to the router based on the virtual SSID and the preconfigured firewall rules.Type: ApplicationFiled: September 11, 2015Publication date: January 7, 2016Inventors: Michal Bartoszewski, Miguel A. Beher Valdivia, Zachary S. Herman, Kaleb D. Walton
-
Publication number: 20150381898Abstract: A method for directing the field of vision based on personal interests. The method includes receiving a keyword and/or an image file and processing the keyword and/or image file to generate data representing a user interest. The method includes receiving a video input from a camera representative of the field of vision of the camera and processing the video input to identify a visible element in the field of vision of the camera. The method further includes comparing the visible element in the field of vision of the camera and the data representing the user interest to determine whether the visible element is of interest to the user. A notification is provided to the user for identified visible elements that are of interest to the user.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventors: Brian M. Anderson, Scott B. Katzman, Jacob C. Schneider, Kaleb D. Walton
-
Publication number: 20150373054Abstract: A computer determines a number of matches returned by a proposed security rule that result from application of the proposed security-rule to historical logged event data. The computer determines a predicted performance of the proposed security rule as part of a network security system based on the number of matches. The computer sends a message during a creation session of the proposed security-rule. The message includes a recommended change for a portion of the proposed security based on the predicted performance of the proposed security rule.Type: ApplicationFiled: August 31, 2015Publication date: December 24, 2015Inventors: Daniel E. Chapman, II, Gary I. Givental, Kaleb D. Walton
-
Publication number: 20150355995Abstract: A method, and associated computer system and computer program product, of detecting source code merge conflicts and compilation errors. Uncommitted changes associated with a source code are received periodically at each time of a sequence of times. A temporary branch corresponding to each uncommitted change associated with the source code is created. The temporary branch corresponding to each uncommitted change is merged to corresponding portions of the source code. It is ascertained that no merge conflict resulted from the merging and in response, a compilation of a merged version of the source code is performed, wherein the merged version of the source code includes the temporary branch corresponding to each uncommitted change. It is determined that no compilation error occurred from the compilation and in response, a version of a product that includes the merged version of the source code is created.Type: ApplicationFiled: August 19, 2015Publication date: December 10, 2015Inventors: George T. Bigwood, Jason T. McMann, Michael G. Nikitaides, Kaleb D. Walton
-
Patent number: 9197671Abstract: A connection method is provided. The method includes retrieving by a data retrieval device, unique data comprising an identifier associated with a wireless device. The unique data is transmitted to a router transmitting an authorization request and a configuration request for a configuration change to an authorization service. The authorization request is presented to a user and in response the user transmits an authorization code to the authorization service. In response, the router generates a virtual SSID and preconfigured firewall rules based on the unique data and the wireless device is automatically connected to the router based on the virtual SSID and the preconfigured firewall rules.Type: GrantFiled: May 12, 2014Date of Patent: November 24, 2015Assignee: International Business Machines CorporationInventors: Michal Bartoszewski, Miguel A. Beher Valdivia, Zachary S. Herman, Kaleb D. Walton
-
Publication number: 20150326610Abstract: A connection method is provided. The method includes retrieving by a data retrieval device, unique data comprising an identifier associated with a wireless device. The unique data is transmitted to a router transmitting an authorization request and a configuration request for a configuration change to an authorization service. The authorization request is presented to a user and in response the user transmits an authorization code to the authorization service. In response, the router generates a virtual SSID and preconfigured firewall rules based on the unique data and the wireless device is automatically connected to the router based on the virtual SSID and the preconfigured firewall rules.Type: ApplicationFiled: May 12, 2014Publication date: November 12, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michal Bartoszewski, Miguel A. Beher Valdivia, Zachary S. Herman, Kaleb D. Walton
-
Patent number: 9183385Abstract: A computer receives entry of a proposed security rule during a security rule entry or editing session and determines that the proposed security rule requires review of a type of security data. The number of matches of the proposed security rule to the logged security data is determined and a user is notified as to the number of matches. The computer searches the security data and applies the proposed security rule to the security data to determine the predicted performance of the proposed security rule. The computer generates a report that may include warnings, recommendations, and information correlated to the security data. The report is presented to a user during the rule editing session, and based on the report a modification to the proposed security rule can be made.Type: GrantFiled: August 22, 2012Date of Patent: November 10, 2015Assignee: International Business Machines CorporationInventors: Daniel E. Chapman, II, Gary I. Givental, Kaleb D. Walton