Patents by Inventor Michael J. Spisak

Michael J. Spisak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10339282
    Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: July 2, 2019
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Michael J. Spisak, George E. Stark
  • Patent number: 10275054
    Abstract: A method and computer system for processing a web page. A first web page is parsed. The first web page includes at least one Universal Resource Locator (URL). During the parsing, as each URL of the at least one URL on the first web page is encountered, the first web page is transformed by appending to a link statement of each URL on the first web page an associated two-key code that associates the two-key code with each URL on the first web page. The first web page is displayed on a display screen of the computer system. The display of the web page is initiated after the parsing has been performed.
    Type: Grant
    Filed: June 27, 2012
    Date of Patent: April 30, 2019
    Assignee: International Business Machines Corporation
    Inventor: Michael J. Spisak
  • Patent number: 10262116
    Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: April 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Michael J. Spisak, George E. Stark
  • Publication number: 20190098440
    Abstract: A method and system for determining a driver is provided. The method includes receiving and analyzing GPS data identifying locations of GPS enabled devices of a plurality of users. A group of users are determined to be located within a specified proximity to each other based on the analysis. The group of users are determined, based on an altitude, velocity, and a vector of the group of users, to be located within a vehicle. A position and role for each user with respect to the vehicle is determined. Selected functions of each GPS enabled device are controlled based on each role.
    Type: Application
    Filed: November 29, 2018
    Publication date: March 28, 2019
    Inventors: Lisa M. Chavez, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10244109
    Abstract: A mechanism is provided for detection of a spear-phishing phone call. Responsive to an individual receiving a phone call, a determination is made as to whether the phone call has one or more identifiable traits from a set of identifiable traits that are identified as being associated with spear-phishing. Responsive to identifying that the phone call has one or more identifiable traits from the set of identifiable traits that are identified as being associated with spear-phishing, an associated weighted risk value for each of the identified traits associated with the phone call is identified from the set of identifiable traits. A total risk value is calculated using each weighted risk value associated with each identified trait associated with the phone call. Responsive to the total risk value exceeding a predetermined risk value, the individual is notified of the total risk value to enable the individual to take an appropriate action based on the total risk value.
    Type: Grant
    Filed: July 13, 2016
    Date of Patent: March 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Publication number: 20190033072
    Abstract: A user may be aided in modifying a product that is an assemblage of parts. This aid may involve a processor obtaining images of a target part captured by the user on a mobile device camera. The processor may compare, based on the captured images and a plurality of images of identified parts, the target part to the identified parts. Based on the comparison, the processor may determine an identity of the target part. This aid may also involve a processor obtaining images of a first configuration of a partial assembly of the product captured by a mobile device camera. The processor may compare, based on the captured images, the first configuration to a correct configuration of the partial assembly. Based on the comparison, the processor may determine that the first configuration does not match the correct configuration and may notify the user accordingly.
    Type: Application
    Filed: October 4, 2018
    Publication date: January 31, 2019
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10171954
    Abstract: A method and system for determining a driver is provided. The method includes receiving and analyzing GPS data identifying locations of GPS enabled devices of a plurality of users. A group of users are determined to be located within a specified proximity to each other based on the analysis. The group of users are determined, based on an altitude, velocity, and a vector of the group of users, to be located within a vehicle. A position and role for each user with respect to the vehicle is determined. Selected functions of each GPS enabled device are controlled based on each role.
    Type: Grant
    Filed: September 6, 2017
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Lisa M. Chavez, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10168152
    Abstract: A user may be aided in modifying a product that is an assemblage of parts. This aid may involve a processor obtaining images of a target part captured by the user on a mobile device camera. The processor may compare, based on the captured images and a plurality of images of identified parts, the target part to the identified parts. Based on the comparison, the processor may determine an identity of the target part. This aid may also involve a processor obtaining images of a first configuration of a partial assembly of the product captured by a mobile device camera. The processor may compare, based on the captured images, the first configuration to a correct configuration of the partial assembly. Based on the comparison, the processor may determine that the first configuration does not match the correct configuration and may notify the user accordingly.
    Type: Grant
    Filed: October 2, 2015
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Publication number: 20180365391
    Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
    Type: Application
    Filed: July 30, 2018
    Publication date: December 20, 2018
    Inventors: Rhonda L. Childress, Michael J. Spisak, George E. Stark
  • Publication number: 20180336322
    Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
    Type: Application
    Filed: July 31, 2018
    Publication date: November 22, 2018
    Inventors: Rhonda L. Childress, Michael J. Spisak, George E. Stark
  • Publication number: 20180268309
    Abstract: Mechanisms are provided for modifying response of cognitive systems to user requests based on a determined knowledge level of the user and knowledge level of the concepts referenced in the cognitive system responses. The mechanisms receive a response to a user submitted request received from a client computing system and determine a first knowledge level of the user for a domain of the user submitted request. The mechanisms determine a second knowledge level associated with concepts referenced in the response and whether the first knowledge level is different from the second knowledge level. The mechanism, in response to the first knowledge level being different than the second knowledge level, modify content of the response to include concepts associated with the first knowledge level, to thereby generate a modified response. The modified response is then output to the client computing system associated with the user.
    Type: Application
    Filed: March 17, 2017
    Publication date: September 20, 2018
    Inventors: Rhonda L. Childress, Darren L. Lawless, Crystal N. Moody, Daniel S. Riley, Michael J. Spisak
  • Patent number: 10068067
    Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
    Type: Grant
    Filed: August 3, 2017
    Date of Patent: September 4, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Michael J. Spisak, George E. Stark
  • Patent number: 10061907
    Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
    Type: Grant
    Filed: August 3, 2017
    Date of Patent: August 28, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Michael J. Spisak, George E. Stark
  • Patent number: 9953291
    Abstract: In an approach for suggesting an item to pack, a processor receives an indication that a user is packing a first item of luggage, wherein the indication includes information about a trip. A processor generates a packing list based on the information about the trip. A processor receives a request to link the first item of luggage and a second item of luggage for the trip. A processor links the first and second items of luggage such that contents of each item of luggage are jointly compared to the packing list. A processor receives, via a short-range point-to-point communication reader of the first item of luggage, a signal from a short-range point-to-point communication device operably affixed to a first item. A processor identifies the first item based on the signal. A processor determines that the first item is an item of the packing list.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: April 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 9917754
    Abstract: Embodiments of the present invention provide systems and methods for monitoring decommissioned servers in a shared data environment. Embodiments of the present invention can be used to aggregate information associated with an environment from external resources, and calculate a baseline of server activity from the aggregated information. When new information is received, it is compared to the baseline of server activity in order to determine a possible misuse of the server assets, when inconsistencies are detected between the baseline of activity and the new information.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: March 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Publication number: 20180068093
    Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
    Type: Application
    Filed: October 31, 2017
    Publication date: March 8, 2018
    Inventors: Rhonda L. Childress, Michael J. Spisak, George E. Stark
  • Patent number: 9910967
    Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: March 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Michael J. Spisak, George E. Stark
  • Publication number: 20180020092
    Abstract: A mechanism is provided for detection of a spear-phishing phone call. Responsive to an individual receiving a phone call, a determination is made as to whether the phone call has one or more identifiable traits from a set of identifiable traits that are identified as being associated with spear-phishing. Responsive to identifying that the phone call has one or more identifiable traits from the set of identifiable traits that are identified as being associated with spear-phishing, an associated weighted risk value for each of the identified traits associated with the phone call is identified from the set of identifiable traits. A total risk value is calculated using each weighted risk value associated with each identified trait associated with the phone call. Responsive to the total risk value exceeding a predetermined risk value, the individual is notified of the total risk value to enable the individual to take an appropriate action based on the total risk value.
    Type: Application
    Filed: July 13, 2016
    Publication date: January 18, 2018
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Publication number: 20180012175
    Abstract: In an approach for suggesting an item to pack, a processor receives an indication that a user is packing a first item of luggage, wherein the indication includes information about a trip. A processor generates a packing list based on the information about the trip. A processor receives a request to link the first item of luggage and a second item of luggage for the trip. A processor links the first and second items of luggage such that contents of each item of luggage are jointly compared to the packing list. A processor receives, via a short-range point-to-point communication reader of the first item of luggage, a signal from a short-range point-to-point communication device operably affixed to a first item. A processor identifies the first item based on the signal. A processor determines that the first item is an item of the packing list.
    Type: Application
    Filed: September 29, 2017
    Publication date: January 11, 2018
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 9860708
    Abstract: A method and system for determining a driver is provided. The method includes receiving and analyzing GPS data identifying locations of GPS enabled devices of a plurality of users. A group of users are determined to be located within a specified proximity to each other based on the analysis. The group of users are determined, based on an altitude, velocity, and a vector of the group of users, to be located within a vehicle. A position and role for each user with respect to the vehicle is determined. Selected functions of each GPS enabled device are controlled based on each role.
    Type: Grant
    Filed: February 25, 2014
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Lisa M. Chavez, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak