Patents by Inventor Kevin D. Himberger
Kevin D. Himberger has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9948656Abstract: As disclosed herein, a computer program product, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The computer program product further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system.Type: GrantFiled: July 31, 2017Date of Patent: April 17, 2018Assignee: International Business Machines CorporationInventors: Kevin D. Himberger, Jake Palmer, Benjamin M. Parees
-
Patent number: 9942239Abstract: As disclosed herein a computer system, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The computer system further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system.Type: GrantFiled: July 31, 2017Date of Patent: April 10, 2018Assignee: International Business Machines CorporationInventors: Kevin D. Himberger, Jake Palmer, Benjamin M. Parees
-
Publication number: 20170324747Abstract: As disclosed herein, a computer program product, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The computer program product further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system.Type: ApplicationFiled: July 31, 2017Publication date: November 9, 2017Inventors: Kevin D. Himberger, Jake Palmer, Benjamin M. Parees
-
Publication number: 20170324748Abstract: As disclosed herein a computer system, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The computer system further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system.Type: ApplicationFiled: July 31, 2017Publication date: November 9, 2017Inventors: Kevin D. Himberger, Jake Palmer, Benjamin M. Parees
-
Patent number: 9633202Abstract: A method, system, and/or computer program product manages a distributed denial of service attack in a multiprocessor environment. A determination is made of (a) a first upper threshold for a normal number of packets from the multiprocessor environment to multiple destination addresses, (b) a second upper threshold for a normal ratio of the packets from the multiprocessor environment to a single destination address compared to the packets from the multiprocessor environment to the multiple destination addresses, and (c) a third upper threshold for a normal ratio of packets from the multiprocessor environment to a single port at a single destination address compared to packets from the multiprocessor environment to the multiple destination addresses. In response to the first and second thresholds being exceeded, a specific port is monitored to determine if the third upper threshold is being exceeded at that port, thus indicating an apparent distributed denial of service attack.Type: GrantFiled: April 1, 2013Date of Patent: April 25, 2017Assignee: International Business Machines CorporationInventors: Robert W. Danford, Terry D. Escamilla, Kevin D. Himberger, Clark D. Jeffries
-
Publication number: 20170012986Abstract: As disclosed herein a method, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The method further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system. A computer system, and a computer program product corresponding to the above method are also disclosed herein.Type: ApplicationFiled: January 29, 2016Publication date: January 12, 2017Inventors: Kevin D. Himberger, Jake Palmer, Benjamin M. Parees
-
Publication number: 20170012990Abstract: As disclosed herein a method, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The method further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system. A computer system, and a computer program product corresponding to the above method are also disclosed herein.Type: ApplicationFiled: July 8, 2015Publication date: January 12, 2017Inventors: Kevin D. Himberger, Jake Palmer, Benjamin M. Parees
-
Patent number: 9531727Abstract: As disclosed herein a method, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The method further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system. A computer system, and a computer program product corresponding to the above method are also disclosed herein.Type: GrantFiled: January 29, 2016Date of Patent: December 27, 2016Assignee: International Business Machines CorporationInventors: Kevin D. Himberger, Jake Palmer, Benjamin M. Parees
-
Patent number: 8191137Abstract: A system and method to protect web applications from malicious attacks and, in particular, a system and method for identification and blocking of malicious DNS servers. The system includes a central processing unit and first program instructions. The first program instructions identify a rogue Domain Name Service (DNS) by identifying that a DNS metric is outside a historical limit. The first program instructions are stored on the computer system for execution by the central processing unit.Type: GrantFiled: July 30, 2008Date of Patent: May 29, 2012Assignee: International Business Machines CorporationInventors: Kevin D. Himberger, Benjamin M. Parees
-
Patent number: 8108932Abstract: A solution for computing password strength based upon layout positions of input mechanisms of an input device that entered a password. A password including an ordered sequence of at least two characters can be identified. A position of each of the characters of the sequence can be determined relative to a layout of an input device used for password entry. Each position can correspond to an input region (key) of the input device (keyboard). A proximity algorithm can generate a proximately score for the determined positions based upon a pattern produced by the positions given the layout of the input device. A password strength score can be computed based at least in part upon the proximity score.Type: GrantFiled: June 12, 2008Date of Patent: January 31, 2012Assignee: International Business Machines CorporationInventors: Kevin D. Himberger, Benjamin M. Parees
-
Patent number: 7930740Abstract: A router includes a relatively low bandwidth communication connection to a small computer, a relatively high bandwidth communication connection to a communication network; and a processing unit for executing in the router a set of permit rules for permitting flow of communication packets with respect to the connections for user initiated sessions, the permit rules including a default rule for discarding all packets with respect to the small computer in traffic not pertaining to sessions initiated by the small computer.Type: GrantFiled: July 7, 2005Date of Patent: April 19, 2011Assignee: International Business Machines CorporationInventors: John F. Davis, Kevin D. Himberger, Clark D. Jeffries, Mohammad Peyravian
-
Patent number: 7734776Abstract: A detection and response system that generates an Alert if unauthorized scanning is detected on a computer network that includes a look-up table to record state value corresponding to the sequence in which SYN, SYN/ACK and RST packets are observed. A set of algorithms executed on a processing engine adjusts the state value in response to observing the packets. When the state value reaches a predetermined value indicating that all three packets have been seen, the algorithm generates an Alert.Type: GrantFiled: February 29, 2008Date of Patent: June 8, 2010Assignee: International Business Machines CorporationInventors: Alan D. Boulanger, Robert W. Danford, Kevin D. Himberger, Clark D. Jeffries, Raj K. Singh
-
Patent number: 7719423Abstract: System and method for tracking inventory of a multiplicity of products. First RFID tags are associated with respective products or groups of products. Second Active RFID tags are associated with respective first containers for the multiplicity products. A third Active RFID tag is associated with a second container for the first containers. First RFID tags broadcast their respective identifications. Second Active RFID tags hash the identities of the first RFID tags within their respective first containers and broad their hashed values. Third Active RFID tag hash the hashed values broadcast by the second Active RFID tags. An expected value is compared to a result of the third Active RFID tag hashing the hashed values broadcast by the second Active RFID tags.Type: GrantFiled: February 22, 2008Date of Patent: May 18, 2010Assignee: International Business Machines CorporationInventors: Kevin D. Himberger, Clark D. Jeffries, Mohammad Peyravian
-
Patent number: 7711781Abstract: A technique for tracking one or more thresholds relating to the blocking of a particular screen name used on an IM system is disclosed. If the number of people who have blocked a particular screen name reaches a threshold amount, a determination is made that the screen name is being used by a spimmer or other bothersome person, and disciplinary action can be taken. In a preferred embodiment, the email address associated with a user name of a suspected spimmer is identified and all screen names associated with that email address are also subjected to disciplinary action, if desired. Thus, an IM company can suspend all screen names of a spimmer that are tied to the same email address, even though not all (or even none) of the screen names individually have reached a threshold level for discipline/suspension.Type: GrantFiled: November 9, 2004Date of Patent: May 4, 2010Assignee: International Business Machines CorporationInventors: John F. Davis, Kevin D. Himberger, Clark D. Jeffries, Mohammad Peyravian
-
Publication number: 20100031362Abstract: A system and method to protect web applications from malicious attacks and, in particular, a system and method for identification and blocking of malicious DNS servers. The system includes a central processing unit and first program instructions. The first program instructions identify a rogue Domain Name Service (DNS) by identifying that a DNS metric is outside a historical limit. The first program instructions are stored on the computer system for execution by the central processing unit.Type: ApplicationFiled: July 30, 2008Publication date: February 4, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kevin D. HIMBERGER, Benjamin M. Parees
-
Publication number: 20090313696Abstract: A solution for computing password strength based upon layout positions of input mechanisms of an input device that entered a password. A password including an ordered sequence of at least two characters can be identified. A position of each of the characters of the sequence can be determined relative to a layout of an input device used for password entry. Each position can correspond to an input region (key) of the input device (keyboard). A proximity algorithm can generate a proximately score for the determined positions based upon a pattern produced by the positions given the layout of the input device. A password strength score can be computed based at least in part upon the proximity score.Type: ApplicationFiled: June 12, 2008Publication date: December 17, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kevin D. HIMBERGER, Benjamin M. PAREES
-
Patent number: 7474217Abstract: System and method for tracking inventory of a multiplicity of products. First RFID tags are associated with respective products or groups of products. Second Active RFID tags are associated with respective first containers for the multiplicity products. A third Active RFID tag is associated with a second container for the first containers. First RFID tags broadcast their respective identifications. Second Active RFID tags hash the identities of the first RFID tags within their respective first containers and broad their hashed values. Third Active RFID tag hash the hashed values broadcast by the second Active RFID tags. An expected value is compared to a result of the third Active RFID tag hashing the hashed values broadcast by the second Active RFID tags.Type: GrantFiled: November 14, 2007Date of Patent: January 6, 2009Assignee: International Business Machines CorporationInventors: Kevin D. Himberger, Clark D. Jeffries, Mohammad Peyravian
-
Publication number: 20080211673Abstract: System and method for tracking inventory of a multiplicity of products. First RFID tags are associated with respective products or groups of products. Second Active RFID tags are associated with respective first containers for the multiplicity products. A third Active RFID tag is associated with a second container for the first containers. First RFID tags broadcast their respective identifications. Second Active RFID tags hash the identities of the first RFID tags within their respective first containers and broad their hashed values. Third Active RFID tag hash the hashed values broadcast by the second Active RFID tags. An expected value is compared to a result of the third Active RFID tag hashing the hashed values broadcast by the second Active RFID tags.Type: ApplicationFiled: February 22, 2008Publication date: September 4, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kevin D. Himberger, Clark D. Jeffries, Mohammad Peyravian
-
Publication number: 20080148406Abstract: A detection and response system that generates an Alert if unauthorized scanning is detected on a computer network that includes a look-up table to record state value corresponding to the sequence in which SYN, SYN/ACK and RST packets are observed. A set of algorithms executed on a processing engine adjusts the state value in response to observing the packets. When the state value reaches a predetermined value indicating that all three packets have been seen, the algorithm generates an Alert.Type: ApplicationFiled: February 29, 2008Publication date: June 19, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alan D. Boulanger, Robert W. Danford, Kevin D. Himberger, Clark D. Jeffries, Raj K. Singh
-
Patent number: 7356587Abstract: A detection and response system that generates an Alert if unauthorized scanning is detected on a computer network that includes a look-up table to record state value corresponding to the sequence in which SYN, SYN/ACK and RST packets are observed. A set of algorithms executed on a processing engine adjusts the state value in response to observing the packets. When the state value reaches a predetermined value indicating that all three packets have been seen, the algorithm generates an Alert.Type: GrantFiled: July 29, 2003Date of Patent: April 8, 2008Assignee: International Business Machines CorporationInventors: Alan D. Boulanger, Robert W. Danford, Kevin D. Himberger, Clark D. Jeffries, Raj K. Singh