Patents by Inventor Kevin W. Kirkeby
Kevin W. Kirkeby has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230143584Abstract: Techniques for securing user data in a healthcare data management system are described. A client system receives a request to authenticate a user. A login token relating to an authenticated user is maintained at the client system. A role is selected for the user, and an authorization token relating to the selected role is maintained at the client system. A session for the user is initiated. This includes generating an encrypted session cookie relating to the user and the session, storing the encrypted session cookie at the client system, and periodically updating a timestamp for the session cookie.Type: ApplicationFiled: January 3, 2023Publication date: May 11, 2023Inventors: Savy Vath, Gale G. McFarland, Kevin W. Kirkeby, Michael S. Butterbrodt
-
Patent number: 11550891Abstract: Techniques for securing user data in a healthcare data management system are described. A client system receives a request to authenticate a user. The user is associated with applications and roles. The user is authenticated, at the client system, for all applications and all roles. A login token relating to the authenticated user is maintained at the client system. A role is selected for the user, and an authorization token relating to the selected role is maintained at the client system. A session for the user is initiated. This includes generating an encrypted session cookie relating to the user and the session, storing the encrypted session cookie at the client system, and periodically updating a timestamp for the session cookie.Type: GrantFiled: June 19, 2019Date of Patent: January 10, 2023Assignee: Preventice Solutions, Inc.Inventors: Savy Vath, Gale G. Mcfarland, Kevin W. Kirkeby, Michael S. Butterbrodt
-
Patient care systems employing control devices to identify and configure sensor devices for patients
Patent number: 10929510Abstract: Embodiments provide techniques for authenticating and configuring a care plan device in a care plan environment. Embodiments receive, from the care plan device, a care plan device identifier written to a memory of the care plan device by a manufacturer. The care plan device is authenticated with a remote server, based on matching a reference identifier within a patient care plan with the care plan device identifier. Upon authenticating the care plan device, embodiments receive, from the remote server, the configuration information for the care plan device. The care plan device is configured in accordance with the patient care plan, based on the received configuration information.Type: GrantFiled: December 17, 2015Date of Patent: February 23, 2021Assignee: Preventice Technologies, Inc.Inventors: Gale G. McFarland, Kevin W. Kirkeby, James D. Hutchins, Richard M. Smith -
Publication number: 20200401684Abstract: Techniques for securing user data in a healthcare data management system are described. A client system receives a request to authenticate a user. The user is associated with applications and roles. The user is authenticated, at the client system, for all applications and all roles. A login token relating to the authenticated user is maintained at the client system. A role is selected for the user, and an authorization token relating to the selected role is maintained at the client system. A session for the user is initiated. This includes generating an encrypted session cookie relating to the user and the session, storing the encrypted session cookie at the client system, and periodically updating a timestamp for the session cookie.Type: ApplicationFiled: June 19, 2019Publication date: December 24, 2020Inventors: Savy VATH, Gale G. MCFARLAND, Kevin W. KIRKEBY, Michael S. BUTTERBRODT
-
PATIENT CARE SYSTEMS EMPLOYING CONTROL DEVICES TO IDENTIFY AND CONFIGURE SENSOR DEVICES FOR PATIENTS
Publication number: 20170177811Abstract: Embodiments provide techniques for authenticating and configuring a care plan device in a care plan environment. Embodiments receive, from the care plan device, a care plan device identifier written to a memory of the care plan device by a manufacturer. The care plan device is authenticated with a remote server, based on matching a reference identifier within a patient care plan with the care plan device identifier. Upon authenticating the care plan device, embodiments receive, from the remote server, the configuration information for the care plan device. The care plan device is configured in accordance with the patient care plan, based on the received configuration information.Type: ApplicationFiled: December 17, 2015Publication date: June 22, 2017Inventors: Gale G. MCFARLAND, Kevin W. KIRKEBY, James D. HUTCHINS, Richard M. SMITH -
Patent number: 8904377Abstract: A method and apparatus for installing an application on a computer are disclosed. Following receipt of a request to install an application, a software state, comprising the new application and several of the applications installed on the computer, is derived. Then, the method determines whether the software state can be implemented on the computer. If the software state cannot be implemented on the computer, then the method derives another software state. This is repeated until the derived software state can be implemented on the computer system, or until determining that no software state exists which can be implemented on the computer system.Type: GrantFiled: February 26, 2013Date of Patent: December 2, 2014Assignee: International Business Machines CorporationInventors: Michael R. Burke, Nicholas F. Campion, Kevin W. Kirkeby, Joseph H. Peterson
-
Patent number: 8782635Abstract: A method and apparatus for installing an application on a computer are disclosed. Following receipt of a request to install an application, a software state, comprising the new application and several of the applications installed on the computer, is derived. Then, the method determines whether the software state can be implemented on the computer. If the software state cannot be implemented on the computer, then the method derives another software state. This is repeated until the derived software state can be implemented on the computer system, or until determining that no software state exists which can be implemented on the computer system.Type: GrantFiled: January 19, 2011Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Michael R. Burke, Nicholas F. Campion, Kevin W. Kirkeby, Joseph H. Peterson
-
Patent number: 8775623Abstract: Systems, methods and articles of manufacture are disclosed for identifying and resolving port conflicts during application deployment. The port conflicts may be identified based on application documentation and active port information. The port conflicts may be resolved by identifying an available port and providing information about the available port to a conflicting application. The port conflicts may also be resolved by identifying an available IP address and providing a port on the available IP address to a conflicting application. Further, if conflicting applications allow port sharing, the port conflicts may be resolved by providing port sharing information to the conflicting applications.Type: GrantFiled: May 28, 2009Date of Patent: July 8, 2014Assignee: International Business Machines CorporationInventors: David A. Christenson, Christopher T. Gloe, John C. Kasperski, Kevin W. Kirkeby, Frances E. Stewart, Alicia L. Williams, Paul A. Wolf
-
Patent number: 8655991Abstract: A method and apparatus for managing distribution and use of software applications. An application manager at an administrator computer may be configured to receive requests for registering an application from a client computer. The application manager may determine whether the request should be approved based on historical responses to similar registration requests. A response to the request may accordingly be sent automatically to the requesting client computer.Type: GrantFiled: October 14, 2009Date of Patent: February 18, 2014Assignee: International Business Machines CorporationInventors: Wade S. Fode, Kevin W. Kirkeby, Kevin G. Paterson, Michael D. Rahn
-
Publication number: 20120185843Abstract: A method and apparatus for installing an application on a computer are disclosed. Following receipt of a request to install an application, a software state, comprising the new application and several of the applications installed on the computer, is derived. Then, the method determines whether the software state can be implemented on the computer. If the software state cannot be implemented on the computer, then the method derives another software state. This is repeated until the derived software state can be implemented on the computer system, or until determining that no software state exists which can be implemented on the computer system.Type: ApplicationFiled: January 19, 2011Publication date: July 19, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: MICHAEL R. BURKE, NICHOLAS F. CAMPION, KEVIN W. KIRKEBY, JOSEPH H. PETERSON
-
Publication number: 20120123898Abstract: A computer-implemented method includes receiving, at a configuration server, requirements data identifying computing requirements of a customer. The computer-implemented method includes receiving, at the configuration server, inventory information descriptive of a computing inventory of the customer. The computer-implemented method also includes accessing compatibility rules that specify hardware and software to enable particular computing requirements. The computer-implemented method further includes determining a plurality of configuration options to implement the computing requirements of the customer based on at least one of the requirements data, the computing inventory, and the compatibility rules. The plurality of configuration options include at least one customer premises equipment (CPE)-based configuration, at least one cloud computing-based configuration, and at least one hybrid CPE-cloud computing-based configuration.Type: ApplicationFiled: November 17, 2010Publication date: May 17, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kevin W. Kirkeby, Richard M. Smith
-
Patent number: 7996887Abstract: In a first aspect, a first method of improving security of a network system is provided. The first method includes the steps of (1) providing a plurality of devices coupled via a network, wherein one or more of the devices are adapted to execute at least one client and one or more of the devices are adapted to execute at least one server in a client-server relationship; and (2) employing software, functionality of which is based on client-specific criteria or operational condition criteria of the system, to reduce a number of times a user of a client of the system must provide first authentication data to access data from one or more servers of the system. Numerous other aspects are provided.Type: GrantFiled: August 15, 2006Date of Patent: August 9, 2011Assignee: International Business Machines CorporationInventors: Zachary Adam Garbow, Kevin W. Kirkeby
-
Publication number: 20110087760Abstract: A method and apparatus for managing distribution and use of software applications. An application manager at an administrator computer may be configured to receive requests for registering an application from a client computer. The application manager may determine whether the request should be approved based on historical responses to similar registration requests. A response to the request may accordingly be sent automatically to the requesting client computer.Type: ApplicationFiled: October 14, 2009Publication date: April 14, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Wade S. Fode, Kevin W. Kirkeby, Kevin G. Paterson, Michael D. Rahn
-
Publication number: 20100306378Abstract: Systems, methods and articles of manufacture are disclosed for identifying and resolving port conflicts during application deployment. The port conflicts may be identified based on application documentation and active port information. The port conflicts may be resolved by identifying an available port and providing information about the available port to a conflicting application. The port conflicts may also be resolved by identifying an available IP address and providing a port on the available IP address to a conflicting application. Further, if conflicting applications allow port sharing, the port conflicts may be resolved by providing port sharing information to the conflicting applications.Type: ApplicationFiled: May 28, 2009Publication date: December 2, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David A. Christenson, Christopher T. Gloe, John C. Kasperski, Kevin W. Kirkeby, Frances E. Stewart, Alicia L. Williams, Paul A. Wolf
-
Publication number: 20090319635Abstract: A method, apparatus and program product manages application entitlement data by storing entitlement data received from a plurality of application providers. Inventory data associated with a networked computing device or an application executable on the networked computing device is monitored. Delivery of the entitlement data to the networked computing device is enabled according to the inventory data.Type: ApplicationFiled: June 18, 2009Publication date: December 24, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas D. Christopherson, Bradley A. Goss, Randy L. Grimm, Kevin W. Kirkeby, Mark A. Pasch, Richard M. Smith
-
Publication number: 20080072300Abstract: In a first aspect, a first method of improving security of a network system is provided. The first method includes the steps of (1) providing a plurality of devices coupled via a network, wherein one or more of the devices are adapted to execute at least one client and one or more of the devices are adapted to execute at least one server in a client-server relationship; and (2) employing software, functionality of which is based on client-specific criteria or operational condition criteria of the system, to reduce a number of times a user of a client of the system must provide first authentication data to access data from one or more servers of the system. Numerous other aspects are provided.Type: ApplicationFiled: August 15, 2006Publication date: March 20, 2008Inventors: Zachary Adam Garbow, Kevin W. Kirkeby