Patents by Inventor Leigh Williamson

Leigh Williamson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10642675
    Abstract: Runtime system statistics logging is dynamically controlled at code and application levels, based on user reviews. Logging of specific code components in specific application instances, identified based on user reviews, is automatically turned on, based on the user reviews indicating defects. Logging for other components or application instances, however, remains off or is automatically turned off.
    Type: Grant
    Filed: July 17, 2019
    Date of Patent: May 5, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Leigh Williamson, Shinoj Zacharias, Roger Snook, Vijay Ekambaram
  • Patent number: 10621074
    Abstract: A computer-implemented facility is provided for intelligent mobile device selection for mobile application testing. The computer-implemented facility determines features of a new mobile application to be tested, and compares the features of the new mobile application with features of multiple known mobile applications to identify one or more known mobile applications with similar features. Based at least in part on automated analysis of user reviews of the one or the more known mobile applications operating in one or more types of mobile devices, the facility provides one or more risk scores for operation of the new mobile application in the one or more types of mobile devices. Further, based on the risk scores, a recommended set of mobile devices in which to test the new mobile application may be generated for use in testing the new mobile application.
    Type: Grant
    Filed: August 7, 2018
    Date of Patent: April 14, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vijay Ekambaram, Roger Snook, Leigh A. Williamson, Shinoj Zacharias
  • Patent number: 10614215
    Abstract: Embodiments of the invention provide for malware collusion detection in a mobile computing device. In one embodiment, a method for malicious inter-application interaction detection in a mobile computing device includes filtering applications installed in a mobile device to a set of related applications and then monitoring in the mobile device execution of the related applications in the set. The method additionally includes computing resource utilization of one of the related applications executing in a background of the mobile device while also computing execution performance of a different one of the related applications. Finally, the method includes responding to a determination that the computed resource utilization is high while the computed execution performance is poor by generating a notification in the display of the mobile device that the one of the related applications is suspected of malware collusion with the different one of the related applications.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: April 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Vijay Ekambaram, Roger C. Snook, Leigh Williamson, Shinoj Zacharias
  • Patent number: 10606731
    Abstract: Disclosed aspects relate to debugging a set of code components of an application program. A set of defect data which indicates a set of defects may be collected with respect to an application program. The set of defect data may be derived from a set of post-compilation users of the application program. A set of test case data which indicates a set of user interface features of the application program may be collected with respect to the application program. The set of test case data may be derived from a set of development tests of the application program. Using both the set of defect data and the set of test case data, a set of fragility data for the set of code components of the application program may be determined. Based on the set of fragility data, the set of code components of the application program may be debugged.
    Type: Grant
    Filed: April 23, 2019
    Date of Patent: March 31, 2020
    Assignee: International Business Machines Corporation
    Inventors: Vijay Ekambaram, Leigh A. Williamson, Shinoj Zacharias
  • Patent number: 10606734
    Abstract: A computer-implemented facility is provided for intelligent mobile device selection for mobile application testing. The computer-implemented facility determines features of a new mobile application to be tested, and compares the features of the new mobile application with features of multiple known mobile applications to identify one or more known mobile applications with similar features. Based at least in part on automated analysis of user reviews of the one or the more known mobile applications operating in one or more types of mobile devices, the facility provides one or more risk scores for operation of the new mobile application in the one or more types of mobile devices. Further, based on the risk scores, a recommended set of mobile devices in which to test the new mobile application may be generated for use in testing the new mobile application.
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: March 31, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vijay Ekambaram, Roger Snook, Leigh A. Williamson, Shinoj Zacharias
  • Publication number: 20200056897
    Abstract: A method, computer program product, and a system where a processor(s) monitors activities of a user operating a vehicle with a navigational device providing route guidance, via a first route, to a geographic destination. The processor(s) identifies driving patterns of the user to generate a driver profile for the user, including a baseline activity pattern. The processor(s) determines, at a given time, that the monitored activities of the user are outside of the baseline activity pattern and enables an integrated image capture device in the vehicle and captures images of an environment outside of a the vehicle. The processor(s) utilizes the image capture device, to capture images and derives data describing environmental conditions, based on performing a semantic analysis of the images. The processor(s) transmits the data to a repository and generates a second route to the destination, based on the driver profile and relevant data from the repository data.
    Type: Application
    Filed: August 14, 2018
    Publication date: February 20, 2020
    Inventors: Leigh Williamson, Vijay Ekambaram, Shinoj Zacharias, Roger Snook, Howard N. Anglin
  • Publication number: 20190377629
    Abstract: Runtime system statistics logging is dynamically controlled at code and application levels, based on user reviews. Logging of specific code components in specific application instances, identified based on user reviews, is automatically turned on, based on the user reviews indicating defects. Logging for other components or application instances, however, remains off or is automatically turned off.
    Type: Application
    Filed: July 17, 2019
    Publication date: December 12, 2019
    Inventors: Leigh Williamson, Shinoj Zacharias, Roger Snook, Vijay Ekambaram
  • Publication number: 20190377628
    Abstract: Runtime system statistics logging is dynamically controlled at code and application levels, based on user reviews. Logging of specific code components in specific application instances, identified based on user reviews, is automatically turned on, based on the user reviews indicating defects. Logging for other components or application instances, however, remains off or is automatically turned off.
    Type: Application
    Filed: June 11, 2018
    Publication date: December 12, 2019
    Inventors: Leigh Williamson, Shinoj Zacharias, Roger Snook, Vijay Ekambaram
  • Publication number: 20190317878
    Abstract: Disclosed aspects relate to debugging a set of code components of an application program. A set of defect data which indicates a set of defects may be collected with respect to an application program. The set of defect data may be derived from a set of post-compilation users of the application program. A set of test case data which indicates a set of user interface features of the application program may be collected with respect to the application program. The set of test case data may be derived from a set of development tests of the application program. Using both the set of defect data and the set of test case data, a set of fragility data for the set of code components of the application program may be determined. Based on the set of fragility data, the set of code components of the application program may be debugged.
    Type: Application
    Filed: April 23, 2019
    Publication date: October 17, 2019
    Inventors: Vijay Ekambaram, Leigh A. Williamson, Shinoj Zacharias
  • Patent number: 10432418
    Abstract: Methods and systems may provide for technology to extract relationship data from one or more social networks and generate a trust network based on the relationship data, wherein the trust network identifies one or more trusted individuals. The technology also grants access to the smart device system with respect to the one or more trusted individuals.
    Type: Grant
    Filed: July 13, 2018
    Date of Patent: October 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Jesus Alva, Leigh Williamson, Ricardo Olivieri
  • Publication number: 20190151758
    Abstract: A set of data associated with one or more real world conditions is received over at least one wireless network and from one or more sources. It is determined, based at least on a quantity of string instances of the set of data that match each other, that a first subset of the set of data surpasses an interest level threshold. A second subset of the set of data does not surpass the interest level threshold. At least one unique virtual entity is generated for use in a virtual environment of a virtual game based on the first subset of data surpassing the interest level threshold.
    Type: Application
    Filed: November 22, 2017
    Publication date: May 23, 2019
    Inventors: Howard N. Anglin, Simon D. Mikulcik, Michael Rowden, Jillian F. Tempelmeyer, Leigh A. Williamson
  • Publication number: 20190114415
    Abstract: Embodiments of the invention provide for malware collusion detection in a mobile computing device. In one embodiment, a method for malicious inter-application interaction detection in a mobile computing device includes filtering applications installed in a mobile device to a set of related applications and then monitoring in the mobile device execution of the related applications in the set. The method additionally includes computing resource utilization of one of the related applications executing in a background of the mobile device while also computing execution performance of a different one of the related applications. Finally, the method includes responding to a determination that the computed resource utilization is high while the computed execution performance is poor by generating a notification in the display of the mobile device that the one of the related applications is suspected of malware collusion with the different one of the related applications.
    Type: Application
    Filed: November 29, 2018
    Publication date: April 18, 2019
    Inventors: Vijay Ekambaram, Roger C. Snook, Leigh Williamson, Shinoj Zacharias
  • Patent number: 10257781
    Abstract: Context-based coordinated data retrieval for mobile devices is provided. An interface between application code of a mobile device and an operating system of the mobile device receives a declarative language based data-retrieval request made by the application code for data from an I/O device of the mobile device. Based on operating context of the mobile device, opportunistic coordination rule(s) are selected from a local rules cache, the rule(s) representative of at least one power-saving option for retrieving data for responding to the request. The rule(s) are evaluated to determine how to retrieve data for responding to the request, and action(s) are performed based on the evaluating, the action(s) including responding to the request.
    Type: Grant
    Filed: November 6, 2017
    Date of Patent: April 9, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vijay Ekambaram, Roger C. Snook, Leigh A. Williamson, Shinoj Zacharias
  • Patent number: 10248546
    Abstract: A computer-implemented facility is provided for intelligent mobile device selection for mobile application testing. The computer-implemented facility determines features of a new mobile application to be tested, and compares the features of the new mobile application with features of multiple known mobile applications to identify one or more known mobile applications with similar features. Based at least in part on automated analysis of user reviews of the one or the more known mobile applications operating in one or more types of mobile devices, the facility provides one or more risk scores for operation of the new mobile application in the one or more types of mobile devices. Further, based on the risk scores, a recommended set of mobile devices in which to test the new mobile application may be generated for use in testing the new mobile application.
    Type: Grant
    Filed: December 15, 2017
    Date of Patent: April 2, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vijay Ekambaram, Roger Snook, Leigh A. Williamson, Shinoj Zacharias
  • Publication number: 20190065341
    Abstract: Disclosed aspects relate to debugging a set of code components of an application program. A set of defect data which indicates a set of defects may be collected with respect to an application program. The set of defect data may be derived from a set of post-compilation users of the application program. A set of test case data which indicates a set of user interface features of the application program may be collected with respect to the application program. The set of test case data may be derived from a set of development tests of the application program. Using both the set of defect data and the set of test case data, a set of fragility data for the set of code components of the application program may be determined. Based on the set of fragility data, the set of code components of the application program may be debugged.
    Type: Application
    Filed: October 30, 2018
    Publication date: February 28, 2019
    Inventors: Vijay Ekambaram, Leigh A. Williamson, Shinoj Zacharias
  • Publication number: 20190057013
    Abstract: Disclosed aspects relate to debugging a set of code components of an application program. A set of defect data which indicates a set of defects may be collected with respect to an application program. The set of defect data may be derived from a set of post-compilation users of the application program. A set of test case data which indicates a set of user interface features of the application program may be collected with respect to the application program. The set of test case data may be derived from a set of development tests of the application program. Using both the set of defect data and the set of test case data, a set of fragility data for the set of code components of the application program may be determined. Based on the set of fragility data, the set of code components of the application program may be debugged.
    Type: Application
    Filed: October 24, 2018
    Publication date: February 21, 2019
    Inventors: Vijay Ekambaram, Leigh A. Williamson, Shinoj Zacharias
  • Publication number: 20190034828
    Abstract: A computer-implemented method comprising receiving and analyzing a data point to determine parameters of the data point, generating an alert ticket based on the analysis of the data point, communicating, via a chatbot, at least some information contained in the alert ticket to one or more users, and categorizing, via the chatbot, the data point that resulted in the alert ticket based on behavior of a device that generated the data point.
    Type: Application
    Filed: November 6, 2017
    Publication date: January 31, 2019
    Inventors: Jonathan A. Cagadas, Alexander D. Lewitt, Simon D. Mikulcik, Karan Shukla, Leigh A. Williamson
  • Publication number: 20190034824
    Abstract: An apparatus comprises a memory and a processor coupled to the memory. The processor is configured to receive input from a cloud service data source, wherein the input comprises at least one data point, analyze the data point via a machine learning model to determine characteristics indicated by the data point, determine whether the characteristics indicated by the data point meet an alert threshold that indicates a problem in a network, generate an alert ticket when the characteristics indicated by the data point meet the alert threshold, wherein the alert ticket indicates the problem in the network, communicate with a user based on contents of the alert ticket, receive feedback from the user relating to the alert ticket, and train the machine learning model according to the feedback received from the user.
    Type: Application
    Filed: July 27, 2017
    Publication date: January 31, 2019
    Inventors: Jonathan A. Cagadas, Alexander D. Lewitt, Simon D. Mikulcik, Karan Shukla, Leigh A. Williamson
  • Patent number: 10169576
    Abstract: Embodiments of the invention provide for malware collusion detection in a mobile computing device. In one embodiment, a method for malicious inter-application interaction detection in a mobile computing device includes filtering applications installed in a mobile device to a set of related applications and then monitoring in the mobile device execution of the related applications in the set. The method additionally includes computing resource utilization of one of the related applications executing in a background of the mobile device while also computing execution performance of a different one of the related applications. Finally, the method includes responding to a determination that the computed resource utilization is high while the computed execution performance is poor by generating a notification in the display of the mobile device that the one of the related applications is suspected of malware collusion with the different one of the related applications.
    Type: Grant
    Filed: November 15, 2016
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Vijay Ekambaram, Roger C. Snook, Leigh Williamson, Shinoj Zacharias
  • Patent number: 10169202
    Abstract: Disclosed aspects relate to debugging a set of code components of an application program. A set of defect data which indicates a set of defects may be collected with respect to an application program. The set of defect data may be derived from a set of post-compilation users of the application program. A set of test case data which indicates a set of user interface features of the application program may be collected with respect to the application program. The set of test case data may be derived from a set of development tests of the application program. Using both the set of defect data and the set of test case data, a set of fragility data for the set of code components of the application program may be determined. Based on the set of fragility data, the set of code components of the application program may be debugged.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Vijay Ekambaram, Leigh A. Williamson, Shinoj Zacharias