Patents by Inventor Marc A. Dickenson

Marc A. Dickenson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10460103
    Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: October 29, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
  • Publication number: 20190312736
    Abstract: Embodiments generally relate to securing a geophysical presence of a user. In some embodiments, a method includes receiving information associated with the user in a physical environment. The method further includes generating a unique pattern in response to receiving the information associated with the user. The method further includes sending encoded information containing the unique pattern to a landmark device in the physical environment, where the encoded information causes the landmark device to present the unique pattern. The method further includes receiving captured data from the physical environment. The method further includes verifying an identity and a physical presence of the user in the physical environment based on the captured data, where the captured data includes the landmark device.
    Type: Application
    Filed: June 14, 2019
    Publication date: October 10, 2019
    Inventors: Marc DICKENSON, Igor RAMOS
  • Publication number: 20190215162
    Abstract: Embodiments generally relate to securing a geophysical presence of a user. In some embodiments, a method includes receiving information associated with the user in a physical environment. The method further includes generating a unique pattern in response to receiving the information associated with the user. The method further includes sending encoded information containing the unique pattern to a landmark device in the physical environment, where the encoded information causes the landmark device to present the unique pattern. The method further includes receiving captured data from the physical environment. The method further includes verifying an identity and a physical presence of the user in the physical environment based on the captured data, where the captured data includes the landmark device.
    Type: Application
    Filed: January 5, 2018
    Publication date: July 11, 2019
    Inventors: Marc DICKENSON, Igor RAMOS
  • Publication number: 20190066379
    Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a cognitive system for generating personalized augmented reality using cognitive analysis. A cognitive analysis engine executing within the cognitive system receives a video feed. A content extraction component of the cognitive analysis engine extracts a portion of content from the video feed. The cognitive analysis engine performs analysis on the portion of content based on personal information of a viewer and a corpus of information to form a response that is relevant to the portion of content and the viewer. A rendering objective engine executing within the cognitive system generates a rendering artifact based on the response.
    Type: Application
    Filed: August 24, 2017
    Publication date: February 28, 2019
    Inventors: Marc A. Dickenson, Igor S. Ramos
  • Publication number: 20180375889
    Abstract: Provided are techniques for mitigating security risks utilizing continuous device image reload with data integrity. Continuous reload of a first image on a device in an Internet of Things (IoT) group of devices coupled to an IoT service is performed based on triggers. A trigger from the triggers is received that indicates one of that a period of time has expired, that notification of a known infection has been received, and that there has been failure of an internal onboard security check. A second image is obtained that is not infected from the IoT service. The device is reloaded with the second image to replace the first image with the second image.
    Type: Application
    Filed: June 21, 2017
    Publication date: December 27, 2018
    Inventors: Marc A. DICKENSON, Timothy J. HAHN
  • Publication number: 20180309614
    Abstract: In a method for device unavailability management within a network, a network device selects an advocate device as an agent of the network device. The network device defines a set of actions to be executed when the network device ever becomes unavailable. The set of actions is stored in a datastore and associated with the network device. Upon determining that the network device has become unavailable, the advocate device is notified and obtains the set of actions associated with the network device. The advocate device then executes the set of actions by the advocate device.
    Type: Application
    Filed: April 25, 2017
    Publication date: October 25, 2018
    Inventors: Marc A. DICKENSON, Rahul GUPTA, Timothy J. HAHN, Harrison KURTZ, Hari H. MADDURI, Michael P. ROBERTSON
  • Publication number: 20180302424
    Abstract: Methods and apparatus, including computer program products, implementing and using techniques for enhancing the security of Internet of Things (IoT) devices. A homogenous and leaderless group of IoT devices sharing one or more common features is defined. During operation of the IoT devices, it is identified whether an IoT device in the group operates outside an expected tolerance for the operation of the IoT devices in the group. In response to identifying that an IoT device in the group operates outside an expected tolerance, an action is performed on the IoT device.
    Type: Application
    Filed: April 12, 2017
    Publication date: October 18, 2018
    Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Timothy J. Hahn, David B. Kumhyr
  • Publication number: 20180129806
    Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.
    Type: Application
    Filed: January 3, 2018
    Publication date: May 10, 2018
    Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
  • Publication number: 20180082059
    Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.
    Type: Application
    Filed: September 20, 2016
    Publication date: March 22, 2018
    Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
  • Publication number: 20130332913
    Abstract: Performance impact of a computing system component on a transient end-to-end system operation is estimated by profiling an overall characteristic for a transient end-to-end system operation, and simultaneously profiling a program code component for a second characteristic, thereby collecting a first pair of data points, repeating the operational period while introducing a known artificial delay into the program code component, and while profiling the overall performance characteristic for the system and for the program code component, thereby collecting pairs of data points for each repetition of the operational period for each of the artificial delays; curve fitting and analyzing intercepts of the collected data points to estimate the effect of the artificial delays in the program code component on the transient end-to-end system operation; and reporting the estimate correlated to potential optimal transient end-to-end system operation.
    Type: Application
    Filed: June 11, 2012
    Publication date: December 12, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORP.
    Inventors: Marc A. Dickenson, Andrew Geissler, Adriana Kobylak, Aditya Kumar
  • Patent number: 7810081
    Abstract: A method, system and computer program product for performing error correction are disclosed. The method includes performing on source code a selected compilation operation from among a set of compilation operations and, responsive to encountering an error in the selected compilation operation, running an error handler to isolate the error utilizing data logged for the compilation operation. Responsive to determining that the error handler has not sufficiently isolated the error, a source code modifier is run to modify a portion of the source code selected by reference to the data logged for the compilation operation.
    Type: Grant
    Filed: August 22, 2006
    Date of Patent: October 5, 2010
    Assignee: International Business Machines Corporation
    Inventors: Marc A. Dickenson, John D. Upton
  • Patent number: 7480829
    Abstract: A method for correcting a formatting error in a flash memory is disclosed. An error in a first formatting of a first flash memory is discovered, and a second formatting is extracted from a second flash memory storing second data. The erroneous first formatting is replaced with a modification of the second formatting, and first data is stored in the first flash memory with the modification of the second formatting. The first data is different from the second data.
    Type: Grant
    Filed: November 15, 2005
    Date of Patent: January 20, 2009
    Assignee: International Business Machines Corporation
    Inventors: Marc A. Dickenson, John S. Langford, Atit D. Patel
  • Patent number: 7475278
    Abstract: A method for correcting a formatting error in a boot sector of a hard disk drive is disclosed. An error in a first formatting of a first hard disk drive is discovered, and a second formatting is extracted from a second hard disk drive storing second data. The erroneous first formatting is replaced with a modification of the second formatting, and first data is stored in the first hard disk drive with the modification of the second formatting. The first data is different from the second data.
    Type: Grant
    Filed: November 15, 2005
    Date of Patent: January 6, 2009
    Assignee: International Business Machines Corporation
    Inventors: Marc A. Dickenson, John S. Langford, Atit D. Patel
  • Publication number: 20080052695
    Abstract: A method, system and computer program product for performing error correction are disclosed. The method includes performing on source code a selected compilation operation from among a set of compilation operations and, responsive to encountering an error in the selected compilation operation, running an error handler to isolate the error utilizing data logged for the compilation operation. Responsive to determining that the error handler has not sufficiently isolated the error, a source code modifier is run to modify a portion of the source code selected by reference to the data logged for the compilation operation.
    Type: Application
    Filed: August 22, 2006
    Publication date: February 28, 2008
    Inventors: Marc A Dickenson, John D. Upton
  • Publication number: 20070168700
    Abstract: A method for correcting a formatting error in a boot sector of a hard disk drive is disclosed. An error in a first formatting of a first hard disk drive is discovered, and a second formatting is extracted from a second hard disk drive storing second data. The erroneous first formatting is replaced with a modification of the second formatting, and first data is stored in the first hard disk drive with the modification of the second formatting. The first data is different from the second data.
    Type: Application
    Filed: November 15, 2005
    Publication date: July 19, 2007
    Inventors: Marc Dickenson, John Langford, Atit Patel
  • Publication number: 20070168702
    Abstract: A method for correcting a formatting error in a flash memory is disclosed. An error in a first formatting of a first flash memory is discovered, and a second formatting is extracted from a second flash memory storing second data. The erroneous first formatting is replaced with a modification of the second formatting, and first data is stored in the first flash memory with the modification of the second formatting. The first data is different from the second data.
    Type: Application
    Filed: November 15, 2005
    Publication date: July 19, 2007
    Inventors: Marc Dickenson, John Langford, Atit Patel
  • Publication number: 20060095427
    Abstract: Methods, systems, and media to enhance memory leakage management by identifying a suspect allocation pattern during execution of a task, which may be indicative of memory leakage and implementing measures to protect against memory leakage based upon the suspect allocation pattern, are disclosed. More specifically, embodiments may detect a suspect allocation pattern by monitoring memory allocations and deallocations for tasks. The pattern of memory allocations and deallocations may then be analyzed to determine whether a suspect allocation pattern exists. For instance, the memory allocations and deallocations may be compared to determine whether there is an increasing net residual allocation left by the task after it has reached a quiescent runtime state. In some embodiments, a suspect allocation pattern exists if the total memory allocation for a task continues to rise after a pre-determined time period.
    Type: Application
    Filed: October 28, 2004
    Publication date: May 4, 2006
    Applicant: International Business Machines Corporation
    Inventor: Marc Dickenson
  • Publication number: 20060080520
    Abstract: Methods, systems, and media to enhance memory overflow management by identifying a memory overflow condition associated with execution of a task and adjusting memory allocation for the task to attenuate the memory overflow condition are disclosed. In particular, embodiments reduce the impact of repetitious memory overflow conditions caused by a specific task by increasing the memory allocation for that task. The memory overflow may also be reported to a technical service provider to help the technical service provider identify and fix the code that is responsible for the memory overflow. Many embodiments monitor an extent of the overflow and determine an allocation correction term based upon the extent of the overflow. In some situations, application of a correction term to increase the memory allocation for the task may advantageously eliminate the cause of the memory overflow condition. In further situations, the impact of the memory overflow condition is attenuated.
    Type: Application
    Filed: October 7, 2004
    Publication date: April 13, 2006
    Applicant: International Business Machines Corporation
    Inventor: Marc Dickenson
  • Publication number: 20050240826
    Abstract: A method, computer program product, and a data processing system for generating a data dump in a data processing system is provided. A system boot of the data processing system is initialized. A firmware that includes fault collection logic is executed. A data dump is created in a persistent storage of the data processing system.
    Type: Application
    Filed: April 8, 2004
    Publication date: October 27, 2005
    Applicant: International Business Machines Corporation
    Inventors: Marc Dickenson, Brent Jacobs, Michael Lim