Patents by Inventor Lorin Ullman

Lorin Ullman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070094711
    Abstract: A method, system, apparatus, or computer program product is presented for securing computational resources in a data processing system. A first user uses a first computational device, and a user security level is associated with the first user. Likewise, a second user uses a second computational device, and a user security level is associated with the second user. The computational resources on the first computational device are automatically reconfigured based on the second user security level of the second user. A computational security level may be assigned to a computational resource on the first computational device, and the computational security level is dynamically adjusted in response to detected network activity by the second computational device that is being used by the second user. Modified security-related parameters for reconfiguring computational resources on the first computational device are reconfigured based on the adjusted computational security level.
    Type: Application
    Filed: October 20, 2005
    Publication date: April 26, 2007
    Inventors: Carole Corley, Janani Janakiraman, Lorin Ullman
  • Publication number: 20070083915
    Abstract: A method, system, apparatus, or computer program product is presented for performing authorization operations with respect to a set of computational resources in a data processing system. Each person that accesses resources in a data processing system is associated with a personal proximity device, such as an electronic badge, the presence of which can be detected by appropriate detecting devices near the computational resources of the data processing system. A first person is permitted to access an authorized subset of computational resources, and the location of the first person can be determined by the detecting devices. At some point in time, the presence of a second person is detected and the corresponding location is determined. A spatial relationship between the locations of the first person and the second person is computed, e.g., a distance, the authorized privileges of the first person are modified based on the computed spatial relationship.
    Type: Application
    Filed: October 6, 2005
    Publication date: April 12, 2007
    Inventors: Janani Janakiraman, Lorin Ullman, Carole Corley