Patents by Inventor Melanie R. Diggs

Melanie R. Diggs has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10909552
    Abstract: Approaches are provided for collecting and distributing topical data. An approach includes collecting topical data from one or more mobile applications on a mobile device. The topical data describes areas of interest of a user based on a way in which the one or more mobile applications are used by the user. The approach further includes normalizing the collected topical data into a list of topics of interest for the user. The approach further includes tagging each topic of interest with a non-hierarchical keyword or term. The approach further includes sending the list of tagged topics of interest to one or more remote servers.
    Type: Grant
    Filed: August 15, 2014
    Date of Patent: February 2, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Melanie R. Diggs, Terrence E. White
  • Patent number: 10205756
    Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: February 12, 2019
    Assignee: International Business Machines Corporation
    Inventors: Charles K. Young, Terrence E. White, Melanie R. Diggs, Gerald D. Colar
  • Patent number: 9819707
    Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.
    Type: Grant
    Filed: December 16, 2016
    Date of Patent: November 14, 2017
    Assignee: International Business Machines Corporation
    Inventors: Charles K. Young, Terrence E. White, Melanie R. Diggs, Gerald D. Colar
  • Publication number: 20170270811
    Abstract: A computer-implemented method includes identifying a user interface. The method includes identifying a lesson plan. The lesson plan includes a plurality of questions, each of the plurality of questions having associated therewith a correct answer. The method includes receiving an access request for the user interface. The method includes presenting, via the user interface, one of the plurality of questions. The method includes receiving an answer via the user interface. The method is responsive to the answer meeting one or more correctness criteria. The method includes granting the access request. A corresponding computer program product and computer system are also disclosed.
    Type: Application
    Filed: March 15, 2016
    Publication date: September 21, 2017
    Inventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White
  • Publication number: 20170104794
    Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.
    Type: Application
    Filed: December 16, 2016
    Publication date: April 13, 2017
    Inventors: Charles K. YOUNG, Terrence E. WHITE, Melanie R. DIGGS, Gerald D. COLAR
  • Patent number: 9596271
    Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.
    Type: Grant
    Filed: October 10, 2012
    Date of Patent: March 14, 2017
    Assignee: International Business Machines Corporation
    Inventors: Charles K. Young, Terrence E. White, Melanie R. Diggs, Gerald D. Colar
  • Publication number: 20170063800
    Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.
    Type: Application
    Filed: November 10, 2016
    Publication date: March 2, 2017
    Applicant: International Business Machines Corporation
    Inventors: Charles K. YOUNG, Terrence E. WHITE, Melanie R. DIGGS, Gerald D. COLAR
  • Patent number: 9531766
    Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.
    Type: Grant
    Filed: February 15, 2013
    Date of Patent: December 27, 2016
    Assignee: International Business Machines Corporation
    Inventors: Charles K. Young, Terrence E. White, Melanie R. Diggs, Gerald D. Colar
  • Patent number: 9372982
    Abstract: A system and computer program product for using a multi-user operating system. A user attempts to access the multi-user operating system. The system prompts the user to enter a shared credential associated with the multi-user operating system and an individual credential of the user. The system verifies the entered shared credential and the entered individual credential. The system grants the access to the user if both the entered shared credential and the entered individual credential are verified. The system tracks commands entered by the user granted the access via the entered shared credential while the user is using the multi-user operating system. The tracked commands indicate the entered individual credential.
    Type: Grant
    Filed: August 22, 2013
    Date of Patent: June 21, 2016
    Assignee: International Business Machines Corporation
    Inventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White, Charles K. Young
  • Publication number: 20160048848
    Abstract: Approaches are provided for collecting and distributing topical data. An approach includes collecting topical data from one or more mobile applications on a mobile device. The topical data describes areas of interest of a user based on a way in which the one or more mobile applications are used by the user. The approach further includes normalizing the collected topical data into a list of topics of interest for the user. The approach further includes tagging each topic of interest with a non-hierarchical keyword or term. The approach further includes sending the list of tagged topics of interest to one or more remote servers.
    Type: Application
    Filed: August 15, 2014
    Publication date: February 18, 2016
    Inventors: Melanie R. DIGGS, Terrence E. WHITE
  • Patent number: 9065778
    Abstract: Exemplary embodiments provide methods and systems for dynamically changing a message retrieval scheme during runtime in a client/server electronic messaging system in which the server executes a message retrieval component and incoming messages received from the client is stored in a message queue. Aspects of the exemplary embodiment include accessing messaging business rules from a memory by a message retrieval component at runtime, wherein the messaging business rules define a primary retrieval scheme and a secondary retrieval scheme, and wherein a value provided for each of the primary retrieval scheme and the secondary retrieval scheme are selected from a combination of different message retrieval types including: First In First Out (FIFO), Last In First Out (LIFO), and random. The message retrieval component subdivides the message queue into sub-queues based on at least one of a message quantity limit and a message received time limit specified in the business rules.
    Type: Grant
    Filed: March 20, 2012
    Date of Patent: June 23, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White, Charles K. Young
  • Patent number: 9049164
    Abstract: Exemplary embodiments provide methods and systems for dynamically changing a message retrieval scheme during runtime in a client/server electronic messaging system in which the server executes a message retrieval component and incoming messages received from the client is stored in a message queue. Aspects of the exemplary embodiment include accessing messaging business rules from a memory by a message retrieval component at runtime, wherein the messaging business rules define a primary retrieval scheme and a secondary retrieval scheme, and wherein a value provided for each of the primary retrieval scheme and the secondary retrieval scheme are selected from a combination of different message retrieval types including: First In First Out (FIFO), Last In First Out (LIFO), and random. The message retrieval component subdivides the message queue into sub-queues based on at least one of a message quantity limit and a message received time limit specified in the business rules.
    Type: Grant
    Filed: May 30, 2013
    Date of Patent: June 2, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White, Charles K. Young
  • Publication number: 20140201826
    Abstract: There is provided a system and computer program product for using a multi-user operating system. A user attempts to access the multi-user operating system. The system prompts the user to enter a shared credential associated with the multi-user operating system and an individual credential of the user. The system verifies the entered shared credential and the entered individual credential. The system grants the access to the user if both the entered shared credential and the entered individual credential are verified. The system tracks commands entered by the user granted the access via the entered shared credential while the user is using the multi-user operating system. The tracked commands indicate the entered individual credential.
    Type: Application
    Filed: August 22, 2013
    Publication date: July 17, 2014
    Inventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White, Charles K. Young
  • Publication number: 20140178852
    Abstract: A student personal computer (PC) presents educational questions at break points in a video game. It receives an identifier of a student. It receives a selection by the student of one of a plurality of video games, each of the video games including break points. It correlates the identifier of the student to a corresponding set of educational questions from a plurality of sets of educational questions. It begins execution of the video game. It, responsive to occurrence of a break point, interrupts the execution of the video game and render to the student playing the video game a question of the corresponding set of educational questions. It receives from the student an answer to the educational question of the corresponding set and determines whether the answer is correct. The student PC continues execution of the video game after receiving the answer from the student.
    Type: Application
    Filed: February 7, 2014
    Publication date: June 26, 2014
    Applicant: International Business Machines Corporation
    Inventors: Gerald D. Colar, Melanie R. Diggs, John W. Miller, Terrence E. White, Charles K. Young
  • Publication number: 20140101324
    Abstract: Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information.
    Type: Application
    Filed: October 10, 2012
    Publication date: April 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles K. YOUNG, Terrence E. WHITE, Melanie R. DIGGS, Gerald D. COLAR
  • Publication number: 20130254275
    Abstract: Methods and systems for dynamically changing a message retrieval scheme during runtime include accessing messaging business rules from a memory by a message retrieval component at runtime, wherein the messaging business rules define a primary retrieval scheme and a secondary retrieval scheme, and wherein a value provided for each of the primary retrieval scheme and the secondary retrieval scheme are selected from a combination of different message retrieval types including: First In First Out (FIFO), Last In First Out (LIFO), and random. The message retrieval component subdivides the message queue into sub-queues based on at least one of a message quantity limit and a message received time limit specified in the business rules. Each of the sub-queues is then accessed using the value of the secondary retrieval scheme; and messages from each of the sub-queues are retrieved using the value of the primary retrieval scheme.
    Type: Application
    Filed: March 20, 2012
    Publication date: September 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White, Charles K. Young
  • Publication number: 20130254318
    Abstract: Exemplary embodiments provide methods and systems for dynamically changing a message retrieval scheme during runtime. Aspects of the exemplary embodiment include accessing messaging business rules from a memory by a message retrieval component at runtime, wherein the messaging business rules define a primary retrieval scheme and a secondary retrieval scheme, and wherein a value provided for each of the primary retrieval scheme and the secondary retrieval scheme are selected from a combination of different message retrieval types including: First In First Out (FIFO), Last In First Out (LIFO), and random. The message retrieval component subdivides the message queue into sub-queues based on at least one of a message quantity limit and a message received time limit specified in the business rules. Each of the sub-queues is then accessed using the value of the secondary retrieval scheme; and messages from each of the sub-queues are retrieved using the value of the primary retrieval scheme.
    Type: Application
    Filed: May 30, 2013
    Publication date: September 26, 2013
    Inventors: Gerald D. Colar, Melanie R. Diggs, Terrence E. White, Charles K. Young
  • Publication number: 20120172100
    Abstract: A student personal computer (PC) presents educational questions at break points in a video game. It receives an identifier of a student. It receives a selection by the student of one of a plurality of video games, each of the video games including break points. It correlates the identifier of the student to a corresponding set of educational questions from a plurality of sets of educational questions. It begins execution of the video game. It, responsive to occurrence of a break point, interrupts the execution of the video game and render to the student playing the video game a question of the corresponding set of educational questions. It receives from the student an answer to the educational question of the corresponding set and determine whether the answer is correct. The student PC continues execution of the video game after receiving the answer from the student.
    Type: Application
    Filed: January 3, 2011
    Publication date: July 5, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gerald D. Colar, Melanie R. Diggs, John W. Miller, Terrence E. White, Charles K. Young
  • Publication number: 20120167196
    Abstract: An embodiment of the invention provides a method for secure access to data a VPN. Parameters for connecting to the VPN are established by a VPN manager connected to a local network and a user connected to a remote network, wherein an automatic VPN identification number is generated based on the parameters. A remote IP address is installed on an automatic VPN device of the user. The automatic VPN identification number is tied to an access list; and, the access list is attached to the automatic VPN device of the user. A request to access the VPN is received from the user. Access to the VPN is provided through a secure encryption tunnel if the request includes the automatic VPN identification number. The secure encryption tunnel provides automatic access to multiple sites within the VPN without the user having to re-enter the automatic VPN identification number.
    Type: Application
    Filed: December 23, 2010
    Publication date: June 28, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gerald D. Colar, Melanie R. Diggs, John W. Miller, Charles K. Young