Patents by Inventor Kevin W. Kirkeby

Kevin W. Kirkeby has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230143584
    Abstract: Techniques for securing user data in a healthcare data management system are described. A client system receives a request to authenticate a user. A login token relating to an authenticated user is maintained at the client system. A role is selected for the user, and an authorization token relating to the selected role is maintained at the client system. A session for the user is initiated. This includes generating an encrypted session cookie relating to the user and the session, storing the encrypted session cookie at the client system, and periodically updating a timestamp for the session cookie.
    Type: Application
    Filed: January 3, 2023
    Publication date: May 11, 2023
    Inventors: Savy Vath, Gale G. McFarland, Kevin W. Kirkeby, Michael S. Butterbrodt
  • Patent number: 11550891
    Abstract: Techniques for securing user data in a healthcare data management system are described. A client system receives a request to authenticate a user. The user is associated with applications and roles. The user is authenticated, at the client system, for all applications and all roles. A login token relating to the authenticated user is maintained at the client system. A role is selected for the user, and an authorization token relating to the selected role is maintained at the client system. A session for the user is initiated. This includes generating an encrypted session cookie relating to the user and the session, storing the encrypted session cookie at the client system, and periodically updating a timestamp for the session cookie.
    Type: Grant
    Filed: June 19, 2019
    Date of Patent: January 10, 2023
    Assignee: Preventice Solutions, Inc.
    Inventors: Savy Vath, Gale G. Mcfarland, Kevin W. Kirkeby, Michael S. Butterbrodt
  • Patent number: 10929510
    Abstract: Embodiments provide techniques for authenticating and configuring a care plan device in a care plan environment. Embodiments receive, from the care plan device, a care plan device identifier written to a memory of the care plan device by a manufacturer. The care plan device is authenticated with a remote server, based on matching a reference identifier within a patient care plan with the care plan device identifier. Upon authenticating the care plan device, embodiments receive, from the remote server, the configuration information for the care plan device. The care plan device is configured in accordance with the patient care plan, based on the received configuration information.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: February 23, 2021
    Assignee: Preventice Technologies, Inc.
    Inventors: Gale G. McFarland, Kevin W. Kirkeby, James D. Hutchins, Richard M. Smith
  • Publication number: 20200401684
    Abstract: Techniques for securing user data in a healthcare data management system are described. A client system receives a request to authenticate a user. The user is associated with applications and roles. The user is authenticated, at the client system, for all applications and all roles. A login token relating to the authenticated user is maintained at the client system. A role is selected for the user, and an authorization token relating to the selected role is maintained at the client system. A session for the user is initiated. This includes generating an encrypted session cookie relating to the user and the session, storing the encrypted session cookie at the client system, and periodically updating a timestamp for the session cookie.
    Type: Application
    Filed: June 19, 2019
    Publication date: December 24, 2020
    Inventors: Savy VATH, Gale G. MCFARLAND, Kevin W. KIRKEBY, Michael S. BUTTERBRODT
  • Publication number: 20170177811
    Abstract: Embodiments provide techniques for authenticating and configuring a care plan device in a care plan environment. Embodiments receive, from the care plan device, a care plan device identifier written to a memory of the care plan device by a manufacturer. The care plan device is authenticated with a remote server, based on matching a reference identifier within a patient care plan with the care plan device identifier. Upon authenticating the care plan device, embodiments receive, from the remote server, the configuration information for the care plan device. The care plan device is configured in accordance with the patient care plan, based on the received configuration information.
    Type: Application
    Filed: December 17, 2015
    Publication date: June 22, 2017
    Inventors: Gale G. MCFARLAND, Kevin W. KIRKEBY, James D. HUTCHINS, Richard M. SMITH
  • Patent number: 8904377
    Abstract: A method and apparatus for installing an application on a computer are disclosed. Following receipt of a request to install an application, a software state, comprising the new application and several of the applications installed on the computer, is derived. Then, the method determines whether the software state can be implemented on the computer. If the software state cannot be implemented on the computer, then the method derives another software state. This is repeated until the derived software state can be implemented on the computer system, or until determining that no software state exists which can be implemented on the computer system.
    Type: Grant
    Filed: February 26, 2013
    Date of Patent: December 2, 2014
    Assignee: International Business Machines Corporation
    Inventors: Michael R. Burke, Nicholas F. Campion, Kevin W. Kirkeby, Joseph H. Peterson
  • Patent number: 8782635
    Abstract: A method and apparatus for installing an application on a computer are disclosed. Following receipt of a request to install an application, a software state, comprising the new application and several of the applications installed on the computer, is derived. Then, the method determines whether the software state can be implemented on the computer. If the software state cannot be implemented on the computer, then the method derives another software state. This is repeated until the derived software state can be implemented on the computer system, or until determining that no software state exists which can be implemented on the computer system.
    Type: Grant
    Filed: January 19, 2011
    Date of Patent: July 15, 2014
    Assignee: International Business Machines Corporation
    Inventors: Michael R. Burke, Nicholas F. Campion, Kevin W. Kirkeby, Joseph H. Peterson
  • Patent number: 8775623
    Abstract: Systems, methods and articles of manufacture are disclosed for identifying and resolving port conflicts during application deployment. The port conflicts may be identified based on application documentation and active port information. The port conflicts may be resolved by identifying an available port and providing information about the available port to a conflicting application. The port conflicts may also be resolved by identifying an available IP address and providing a port on the available IP address to a conflicting application. Further, if conflicting applications allow port sharing, the port conflicts may be resolved by providing port sharing information to the conflicting applications.
    Type: Grant
    Filed: May 28, 2009
    Date of Patent: July 8, 2014
    Assignee: International Business Machines Corporation
    Inventors: David A. Christenson, Christopher T. Gloe, John C. Kasperski, Kevin W. Kirkeby, Frances E. Stewart, Alicia L. Williams, Paul A. Wolf
  • Patent number: 8655991
    Abstract: A method and apparatus for managing distribution and use of software applications. An application manager at an administrator computer may be configured to receive requests for registering an application from a client computer. The application manager may determine whether the request should be approved based on historical responses to similar registration requests. A response to the request may accordingly be sent automatically to the requesting client computer.
    Type: Grant
    Filed: October 14, 2009
    Date of Patent: February 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: Wade S. Fode, Kevin W. Kirkeby, Kevin G. Paterson, Michael D. Rahn
  • Publication number: 20120185843
    Abstract: A method and apparatus for installing an application on a computer are disclosed. Following receipt of a request to install an application, a software state, comprising the new application and several of the applications installed on the computer, is derived. Then, the method determines whether the software state can be implemented on the computer. If the software state cannot be implemented on the computer, then the method derives another software state. This is repeated until the derived software state can be implemented on the computer system, or until determining that no software state exists which can be implemented on the computer system.
    Type: Application
    Filed: January 19, 2011
    Publication date: July 19, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: MICHAEL R. BURKE, NICHOLAS F. CAMPION, KEVIN W. KIRKEBY, JOSEPH H. PETERSON
  • Publication number: 20120123898
    Abstract: A computer-implemented method includes receiving, at a configuration server, requirements data identifying computing requirements of a customer. The computer-implemented method includes receiving, at the configuration server, inventory information descriptive of a computing inventory of the customer. The computer-implemented method also includes accessing compatibility rules that specify hardware and software to enable particular computing requirements. The computer-implemented method further includes determining a plurality of configuration options to implement the computing requirements of the customer based on at least one of the requirements data, the computing inventory, and the compatibility rules. The plurality of configuration options include at least one customer premises equipment (CPE)-based configuration, at least one cloud computing-based configuration, and at least one hybrid CPE-cloud computing-based configuration.
    Type: Application
    Filed: November 17, 2010
    Publication date: May 17, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kevin W. Kirkeby, Richard M. Smith
  • Patent number: 7996887
    Abstract: In a first aspect, a first method of improving security of a network system is provided. The first method includes the steps of (1) providing a plurality of devices coupled via a network, wherein one or more of the devices are adapted to execute at least one client and one or more of the devices are adapted to execute at least one server in a client-server relationship; and (2) employing software, functionality of which is based on client-specific criteria or operational condition criteria of the system, to reduce a number of times a user of a client of the system must provide first authentication data to access data from one or more servers of the system. Numerous other aspects are provided.
    Type: Grant
    Filed: August 15, 2006
    Date of Patent: August 9, 2011
    Assignee: International Business Machines Corporation
    Inventors: Zachary Adam Garbow, Kevin W. Kirkeby
  • Publication number: 20110087760
    Abstract: A method and apparatus for managing distribution and use of software applications. An application manager at an administrator computer may be configured to receive requests for registering an application from a client computer. The application manager may determine whether the request should be approved based on historical responses to similar registration requests. A response to the request may accordingly be sent automatically to the requesting client computer.
    Type: Application
    Filed: October 14, 2009
    Publication date: April 14, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Wade S. Fode, Kevin W. Kirkeby, Kevin G. Paterson, Michael D. Rahn
  • Publication number: 20100306378
    Abstract: Systems, methods and articles of manufacture are disclosed for identifying and resolving port conflicts during application deployment. The port conflicts may be identified based on application documentation and active port information. The port conflicts may be resolved by identifying an available port and providing information about the available port to a conflicting application. The port conflicts may also be resolved by identifying an available IP address and providing a port on the available IP address to a conflicting application. Further, if conflicting applications allow port sharing, the port conflicts may be resolved by providing port sharing information to the conflicting applications.
    Type: Application
    Filed: May 28, 2009
    Publication date: December 2, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David A. Christenson, Christopher T. Gloe, John C. Kasperski, Kevin W. Kirkeby, Frances E. Stewart, Alicia L. Williams, Paul A. Wolf
  • Publication number: 20090319635
    Abstract: A method, apparatus and program product manages application entitlement data by storing entitlement data received from a plurality of application providers. Inventory data associated with a networked computing device or an application executable on the networked computing device is monitored. Delivery of the entitlement data to the networked computing device is enabled according to the inventory data.
    Type: Application
    Filed: June 18, 2009
    Publication date: December 24, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas D. Christopherson, Bradley A. Goss, Randy L. Grimm, Kevin W. Kirkeby, Mark A. Pasch, Richard M. Smith
  • Publication number: 20080072300
    Abstract: In a first aspect, a first method of improving security of a network system is provided. The first method includes the steps of (1) providing a plurality of devices coupled via a network, wherein one or more of the devices are adapted to execute at least one client and one or more of the devices are adapted to execute at least one server in a client-server relationship; and (2) employing software, functionality of which is based on client-specific criteria or operational condition criteria of the system, to reduce a number of times a user of a client of the system must provide first authentication data to access data from one or more servers of the system. Numerous other aspects are provided.
    Type: Application
    Filed: August 15, 2006
    Publication date: March 20, 2008
    Inventors: Zachary Adam Garbow, Kevin W. Kirkeby