Patents by Inventor Marc A. Dickenson
Marc A. Dickenson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10460103Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.Type: GrantFiled: September 20, 2016Date of Patent: October 29, 2019Assignee: International Business Machines CorporationInventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
-
Publication number: 20190312736Abstract: Embodiments generally relate to securing a geophysical presence of a user. In some embodiments, a method includes receiving information associated with the user in a physical environment. The method further includes generating a unique pattern in response to receiving the information associated with the user. The method further includes sending encoded information containing the unique pattern to a landmark device in the physical environment, where the encoded information causes the landmark device to present the unique pattern. The method further includes receiving captured data from the physical environment. The method further includes verifying an identity and a physical presence of the user in the physical environment based on the captured data, where the captured data includes the landmark device.Type: ApplicationFiled: June 14, 2019Publication date: October 10, 2019Inventors: Marc DICKENSON, Igor RAMOS
-
Publication number: 20190215162Abstract: Embodiments generally relate to securing a geophysical presence of a user. In some embodiments, a method includes receiving information associated with the user in a physical environment. The method further includes generating a unique pattern in response to receiving the information associated with the user. The method further includes sending encoded information containing the unique pattern to a landmark device in the physical environment, where the encoded information causes the landmark device to present the unique pattern. The method further includes receiving captured data from the physical environment. The method further includes verifying an identity and a physical presence of the user in the physical environment based on the captured data, where the captured data includes the landmark device.Type: ApplicationFiled: January 5, 2018Publication date: July 11, 2019Inventors: Marc DICKENSON, Igor RAMOS
-
Publication number: 20190066379Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a cognitive system for generating personalized augmented reality using cognitive analysis. A cognitive analysis engine executing within the cognitive system receives a video feed. A content extraction component of the cognitive analysis engine extracts a portion of content from the video feed. The cognitive analysis engine performs analysis on the portion of content based on personal information of a viewer and a corpus of information to form a response that is relevant to the portion of content and the viewer. A rendering objective engine executing within the cognitive system generates a rendering artifact based on the response.Type: ApplicationFiled: August 24, 2017Publication date: February 28, 2019Inventors: Marc A. Dickenson, Igor S. Ramos
-
Publication number: 20180375889Abstract: Provided are techniques for mitigating security risks utilizing continuous device image reload with data integrity. Continuous reload of a first image on a device in an Internet of Things (IoT) group of devices coupled to an IoT service is performed based on triggers. A trigger from the triggers is received that indicates one of that a period of time has expired, that notification of a known infection has been received, and that there has been failure of an internal onboard security check. A second image is obtained that is not infected from the IoT service. The device is reloaded with the second image to replace the first image with the second image.Type: ApplicationFiled: June 21, 2017Publication date: December 27, 2018Inventors: Marc A. DICKENSON, Timothy J. HAHN
-
Publication number: 20180309614Abstract: In a method for device unavailability management within a network, a network device selects an advocate device as an agent of the network device. The network device defines a set of actions to be executed when the network device ever becomes unavailable. The set of actions is stored in a datastore and associated with the network device. Upon determining that the network device has become unavailable, the advocate device is notified and obtains the set of actions associated with the network device. The advocate device then executes the set of actions by the advocate device.Type: ApplicationFiled: April 25, 2017Publication date: October 25, 2018Inventors: Marc A. DICKENSON, Rahul GUPTA, Timothy J. HAHN, Harrison KURTZ, Hari H. MADDURI, Michael P. ROBERTSON
-
Publication number: 20180302424Abstract: Methods and apparatus, including computer program products, implementing and using techniques for enhancing the security of Internet of Things (IoT) devices. A homogenous and leaderless group of IoT devices sharing one or more common features is defined. During operation of the IoT devices, it is identified whether an IoT device in the group operates outside an expected tolerance for the operation of the IoT devices in the group. In response to identifying that an IoT device in the group operates outside an expected tolerance, an action is performed on the IoT device.Type: ApplicationFiled: April 12, 2017Publication date: October 18, 2018Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Timothy J. Hahn, David B. Kumhyr
-
Publication number: 20180129806Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.Type: ApplicationFiled: January 3, 2018Publication date: May 10, 2018Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
-
Publication number: 20180082059Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.Type: ApplicationFiled: September 20, 2016Publication date: March 22, 2018Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
-
Publication number: 20130332913Abstract: Performance impact of a computing system component on a transient end-to-end system operation is estimated by profiling an overall characteristic for a transient end-to-end system operation, and simultaneously profiling a program code component for a second characteristic, thereby collecting a first pair of data points, repeating the operational period while introducing a known artificial delay into the program code component, and while profiling the overall performance characteristic for the system and for the program code component, thereby collecting pairs of data points for each repetition of the operational period for each of the artificial delays; curve fitting and analyzing intercepts of the collected data points to estimate the effect of the artificial delays in the program code component on the transient end-to-end system operation; and reporting the estimate correlated to potential optimal transient end-to-end system operation.Type: ApplicationFiled: June 11, 2012Publication date: December 12, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORP.Inventors: Marc A. Dickenson, Andrew Geissler, Adriana Kobylak, Aditya Kumar
-
Patent number: 7810081Abstract: A method, system and computer program product for performing error correction are disclosed. The method includes performing on source code a selected compilation operation from among a set of compilation operations and, responsive to encountering an error in the selected compilation operation, running an error handler to isolate the error utilizing data logged for the compilation operation. Responsive to determining that the error handler has not sufficiently isolated the error, a source code modifier is run to modify a portion of the source code selected by reference to the data logged for the compilation operation.Type: GrantFiled: August 22, 2006Date of Patent: October 5, 2010Assignee: International Business Machines CorporationInventors: Marc A. Dickenson, John D. Upton
-
Patent number: 7480829Abstract: A method for correcting a formatting error in a flash memory is disclosed. An error in a first formatting of a first flash memory is discovered, and a second formatting is extracted from a second flash memory storing second data. The erroneous first formatting is replaced with a modification of the second formatting, and first data is stored in the first flash memory with the modification of the second formatting. The first data is different from the second data.Type: GrantFiled: November 15, 2005Date of Patent: January 20, 2009Assignee: International Business Machines CorporationInventors: Marc A. Dickenson, John S. Langford, Atit D. Patel
-
Patent number: 7475278Abstract: A method for correcting a formatting error in a boot sector of a hard disk drive is disclosed. An error in a first formatting of a first hard disk drive is discovered, and a second formatting is extracted from a second hard disk drive storing second data. The erroneous first formatting is replaced with a modification of the second formatting, and first data is stored in the first hard disk drive with the modification of the second formatting. The first data is different from the second data.Type: GrantFiled: November 15, 2005Date of Patent: January 6, 2009Assignee: International Business Machines CorporationInventors: Marc A. Dickenson, John S. Langford, Atit D. Patel
-
Publication number: 20080052695Abstract: A method, system and computer program product for performing error correction are disclosed. The method includes performing on source code a selected compilation operation from among a set of compilation operations and, responsive to encountering an error in the selected compilation operation, running an error handler to isolate the error utilizing data logged for the compilation operation. Responsive to determining that the error handler has not sufficiently isolated the error, a source code modifier is run to modify a portion of the source code selected by reference to the data logged for the compilation operation.Type: ApplicationFiled: August 22, 2006Publication date: February 28, 2008Inventors: Marc A Dickenson, John D. Upton
-
Publication number: 20070168700Abstract: A method for correcting a formatting error in a boot sector of a hard disk drive is disclosed. An error in a first formatting of a first hard disk drive is discovered, and a second formatting is extracted from a second hard disk drive storing second data. The erroneous first formatting is replaced with a modification of the second formatting, and first data is stored in the first hard disk drive with the modification of the second formatting. The first data is different from the second data.Type: ApplicationFiled: November 15, 2005Publication date: July 19, 2007Inventors: Marc Dickenson, John Langford, Atit Patel
-
Publication number: 20070168702Abstract: A method for correcting a formatting error in a flash memory is disclosed. An error in a first formatting of a first flash memory is discovered, and a second formatting is extracted from a second flash memory storing second data. The erroneous first formatting is replaced with a modification of the second formatting, and first data is stored in the first flash memory with the modification of the second formatting. The first data is different from the second data.Type: ApplicationFiled: November 15, 2005Publication date: July 19, 2007Inventors: Marc Dickenson, John Langford, Atit Patel
-
Publication number: 20060095427Abstract: Methods, systems, and media to enhance memory leakage management by identifying a suspect allocation pattern during execution of a task, which may be indicative of memory leakage and implementing measures to protect against memory leakage based upon the suspect allocation pattern, are disclosed. More specifically, embodiments may detect a suspect allocation pattern by monitoring memory allocations and deallocations for tasks. The pattern of memory allocations and deallocations may then be analyzed to determine whether a suspect allocation pattern exists. For instance, the memory allocations and deallocations may be compared to determine whether there is an increasing net residual allocation left by the task after it has reached a quiescent runtime state. In some embodiments, a suspect allocation pattern exists if the total memory allocation for a task continues to rise after a pre-determined time period.Type: ApplicationFiled: October 28, 2004Publication date: May 4, 2006Applicant: International Business Machines CorporationInventor: Marc Dickenson
-
Publication number: 20060080520Abstract: Methods, systems, and media to enhance memory overflow management by identifying a memory overflow condition associated with execution of a task and adjusting memory allocation for the task to attenuate the memory overflow condition are disclosed. In particular, embodiments reduce the impact of repetitious memory overflow conditions caused by a specific task by increasing the memory allocation for that task. The memory overflow may also be reported to a technical service provider to help the technical service provider identify and fix the code that is responsible for the memory overflow. Many embodiments monitor an extent of the overflow and determine an allocation correction term based upon the extent of the overflow. In some situations, application of a correction term to increase the memory allocation for the task may advantageously eliminate the cause of the memory overflow condition. In further situations, the impact of the memory overflow condition is attenuated.Type: ApplicationFiled: October 7, 2004Publication date: April 13, 2006Applicant: International Business Machines CorporationInventor: Marc Dickenson
-
Publication number: 20050240826Abstract: A method, computer program product, and a data processing system for generating a data dump in a data processing system is provided. A system boot of the data processing system is initialized. A firmware that includes fault collection logic is executed. A data dump is created in a persistent storage of the data processing system.Type: ApplicationFiled: April 8, 2004Publication date: October 27, 2005Applicant: International Business Machines CorporationInventors: Marc Dickenson, Brent Jacobs, Michael Lim