Patents by Inventor Marc A. Dickenson
Marc A. Dickenson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11144640Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.Type: GrantFiled: August 9, 2019Date of Patent: October 12, 2021Assignee: International Business Machines CorporationInventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
-
Patent number: 11134092Abstract: Methods and apparatus, including computer program products, implementing and using techniques for enhancing the security of Internet of Things (IoT) devices. A homogenous and leaderless group of IoT devices sharing one or more common features is defined. During operation of the IoT devices, it is identified whether an IoT device in the group operates outside an expected tolerance for the operation of the IoT devices in the group. In response to identifying that an IoT device in the group operates outside an expected tolerance, an action is performed on the IoT device.Type: GrantFiled: April 12, 2017Date of Patent: September 28, 2021Assignee: International Business Machines CorporationInventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Timothy J. Hahn, David B. Kumhyr
-
Patent number: 10623432Abstract: Provided are techniques for mitigating security risks utilizing continuous device image reload with data integrity. Continuous reload of a first image on a device in an Internet of Things (IoT) group of devices coupled to an IoT service is performed based on triggers. A trigger from the triggers is received that indicates one of that a period of time has expired, that notification of a known infection has been received, and that there has been failure of an internal onboard security check. A second image is obtained that is not infected from the IoT service. The device is reloaded with the second image to replace the first image with the second image.Type: GrantFiled: June 21, 2017Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Marc A. Dickenson, Timothy J. Hahn
-
Patent number: 10616037Abstract: In a method for device unavailability management within a network, a network device selects an advocate device as an agent of the network device. The network device defines a set of actions to be executed when the network device ever becomes unavailable. The set of actions is stored in a datastore and associated with the network device. Upon determining that the network device has become unavailable, the advocate device is notified and obtains the set of actions associated with the network device. The advocate device then executes the set of actions by the advocate device.Type: GrantFiled: April 25, 2017Date of Patent: April 7, 2020Assignee: International Business Machines CorporationInventors: Marc A. Dickenson, Rahul Gupta, Timothy J. Hahn, Harrison Kurtz, Hari H. Madduri, Michael P. Robertson
-
Patent number: 10528728Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.Type: GrantFiled: January 3, 2018Date of Patent: January 7, 2020Assignee: International Business Machines CorporationInventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
-
Publication number: 20190362071Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.Type: ApplicationFiled: August 9, 2019Publication date: November 28, 2019Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
-
Patent number: 10467813Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a cognitive system for generating personalized augmented reality using cognitive analysis. A cognitive analysis engine executing within the cognitive system receives a video feed. A content extraction component of the cognitive analysis engine extracts a portion of content from the video feed. The cognitive analysis engine performs analysis on the portion of content based on personal information of a viewer and a corpus of information to form a response that is relevant to the portion of content and the viewer. A rendering objective engine executing within the cognitive system generates a rendering artifact based on the response.Type: GrantFiled: August 24, 2017Date of Patent: November 5, 2019Assignee: International Business Machines CorporationInventors: Marc A. Dickenson, Igor S. Ramos
-
Patent number: 10460103Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.Type: GrantFiled: September 20, 2016Date of Patent: October 29, 2019Assignee: International Business Machines CorporationInventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
-
Publication number: 20190066379Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a cognitive system for generating personalized augmented reality using cognitive analysis. A cognitive analysis engine executing within the cognitive system receives a video feed. A content extraction component of the cognitive analysis engine extracts a portion of content from the video feed. The cognitive analysis engine performs analysis on the portion of content based on personal information of a viewer and a corpus of information to form a response that is relevant to the portion of content and the viewer. A rendering objective engine executing within the cognitive system generates a rendering artifact based on the response.Type: ApplicationFiled: August 24, 2017Publication date: February 28, 2019Inventors: Marc A. Dickenson, Igor S. Ramos
-
Publication number: 20180375889Abstract: Provided are techniques for mitigating security risks utilizing continuous device image reload with data integrity. Continuous reload of a first image on a device in an Internet of Things (IoT) group of devices coupled to an IoT service is performed based on triggers. A trigger from the triggers is received that indicates one of that a period of time has expired, that notification of a known infection has been received, and that there has been failure of an internal onboard security check. A second image is obtained that is not infected from the IoT service. The device is reloaded with the second image to replace the first image with the second image.Type: ApplicationFiled: June 21, 2017Publication date: December 27, 2018Inventors: Marc A. DICKENSON, Timothy J. HAHN
-
Publication number: 20180309614Abstract: In a method for device unavailability management within a network, a network device selects an advocate device as an agent of the network device. The network device defines a set of actions to be executed when the network device ever becomes unavailable. The set of actions is stored in a datastore and associated with the network device. Upon determining that the network device has become unavailable, the advocate device is notified and obtains the set of actions associated with the network device. The advocate device then executes the set of actions by the advocate device.Type: ApplicationFiled: April 25, 2017Publication date: October 25, 2018Inventors: Marc A. DICKENSON, Rahul GUPTA, Timothy J. HAHN, Harrison KURTZ, Hari H. MADDURI, Michael P. ROBERTSON
-
Publication number: 20180302424Abstract: Methods and apparatus, including computer program products, implementing and using techniques for enhancing the security of Internet of Things (IoT) devices. A homogenous and leaderless group of IoT devices sharing one or more common features is defined. During operation of the IoT devices, it is identified whether an IoT device in the group operates outside an expected tolerance for the operation of the IoT devices in the group. In response to identifying that an IoT device in the group operates outside an expected tolerance, an action is performed on the IoT device.Type: ApplicationFiled: April 12, 2017Publication date: October 18, 2018Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Timothy J. Hahn, David B. Kumhyr
-
Publication number: 20180129806Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.Type: ApplicationFiled: January 3, 2018Publication date: May 10, 2018Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
-
Publication number: 20180082059Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.Type: ApplicationFiled: September 20, 2016Publication date: March 22, 2018Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
-
Publication number: 20130332913Abstract: Performance impact of a computing system component on a transient end-to-end system operation is estimated by profiling an overall characteristic for a transient end-to-end system operation, and simultaneously profiling a program code component for a second characteristic, thereby collecting a first pair of data points, repeating the operational period while introducing a known artificial delay into the program code component, and while profiling the overall performance characteristic for the system and for the program code component, thereby collecting pairs of data points for each repetition of the operational period for each of the artificial delays; curve fitting and analyzing intercepts of the collected data points to estimate the effect of the artificial delays in the program code component on the transient end-to-end system operation; and reporting the estimate correlated to potential optimal transient end-to-end system operation.Type: ApplicationFiled: June 11, 2012Publication date: December 12, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORP.Inventors: Marc A. Dickenson, Andrew Geissler, Adriana Kobylak, Aditya Kumar
-
Patent number: 7810081Abstract: A method, system and computer program product for performing error correction are disclosed. The method includes performing on source code a selected compilation operation from among a set of compilation operations and, responsive to encountering an error in the selected compilation operation, running an error handler to isolate the error utilizing data logged for the compilation operation. Responsive to determining that the error handler has not sufficiently isolated the error, a source code modifier is run to modify a portion of the source code selected by reference to the data logged for the compilation operation.Type: GrantFiled: August 22, 2006Date of Patent: October 5, 2010Assignee: International Business Machines CorporationInventors: Marc A. Dickenson, John D. Upton
-
Patent number: 7480829Abstract: A method for correcting a formatting error in a flash memory is disclosed. An error in a first formatting of a first flash memory is discovered, and a second formatting is extracted from a second flash memory storing second data. The erroneous first formatting is replaced with a modification of the second formatting, and first data is stored in the first flash memory with the modification of the second formatting. The first data is different from the second data.Type: GrantFiled: November 15, 2005Date of Patent: January 20, 2009Assignee: International Business Machines CorporationInventors: Marc A. Dickenson, John S. Langford, Atit D. Patel
-
Patent number: 7475278Abstract: A method for correcting a formatting error in a boot sector of a hard disk drive is disclosed. An error in a first formatting of a first hard disk drive is discovered, and a second formatting is extracted from a second hard disk drive storing second data. The erroneous first formatting is replaced with a modification of the second formatting, and first data is stored in the first hard disk drive with the modification of the second formatting. The first data is different from the second data.Type: GrantFiled: November 15, 2005Date of Patent: January 6, 2009Assignee: International Business Machines CorporationInventors: Marc A. Dickenson, John S. Langford, Atit D. Patel
-
Publication number: 20080052695Abstract: A method, system and computer program product for performing error correction are disclosed. The method includes performing on source code a selected compilation operation from among a set of compilation operations and, responsive to encountering an error in the selected compilation operation, running an error handler to isolate the error utilizing data logged for the compilation operation. Responsive to determining that the error handler has not sufficiently isolated the error, a source code modifier is run to modify a portion of the source code selected by reference to the data logged for the compilation operation.Type: ApplicationFiled: August 22, 2006Publication date: February 28, 2008Inventors: Marc A Dickenson, John D. Upton