Patents by Inventor Philip A. J. Nye
Philip A. J. Nye has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10255430Abstract: A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the information processing device via a network is acquired. On the basis of the acquired statuses, at least one item is selected from a group comprising the terminal serving as a destination for the password, the communication method with the terminal, or the method for inputting the password in the terminal. The password is then sent to the selected terminal via a network.Type: GrantFiled: August 15, 2017Date of Patent: April 9, 2019Assignee: International Business Machines CorporationInventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
-
Patent number: 10171457Abstract: An indication is received that a user has initiated an access to a website hosted by a service provider. Access to the website requires an authorization of a user identification associated with the user and a password associated with the user. A token is requested. The token provides access to an application programming interface. The token is received. The token is stored by the service provider.Type: GrantFiled: December 29, 2015Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: David P. Moore, Trevor S. Norvill, Philip A. J. Nye, Robert T. Trotter
-
Patent number: 10079928Abstract: A mechanism is provided for authenticating a second terminal based on information sensed by a first terminal. Responsive to receiving an authentication request, a first output request is sent to a second terminal instructing the second terminal to generate information able to be sensed by a sensor in a first terminal. An authentication of the authentication request is performed based on a condition that the sensor in the first terminal has sensed the information generated by the second terminal.Type: GrantFiled: July 21, 2015Date of Patent: September 18, 2018Assignee: International Business Machines CorporationInventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
-
Publication number: 20180012015Abstract: A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the information processing device via a network is acquired. On the basis of the acquired statuses, at least one item is selected from a group comprising the terminal serving as a destination for the password, the communication method with the terminal, or the method for inputting the password in the terminal. The password is then sent to the selected terminal via a network.Type: ApplicationFiled: August 15, 2017Publication date: January 11, 2018Inventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
-
Patent number: 9740851Abstract: A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the information processing device via a network is acquired. On the basis of the acquired statuses, at least one item is selected from a group comprising the terminal serving as a destination for the password, the communication method with the terminal, or the method for inputting the password in the terminal. The password is then sent to the selected terminal via a network.Type: GrantFiled: July 17, 2015Date of Patent: August 22, 2017Assignee: International Business Machines CorporationInventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
-
Publication number: 20170187708Abstract: An indication is received that a user has initiated an access to a website hosted by a service provider. Access to the website requires an authorization of a user identification associated with the user and a password associated with the user. A token is requested. The token provides access to an application programming interface. The token is received. The token is stored by the service provider.Type: ApplicationFiled: December 29, 2015Publication date: June 29, 2017Inventors: David P. Moore, Trevor S. Norvill, Philip A.J. Nye, Robert T. Trotter
-
Patent number: 9672348Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.Type: GrantFiled: May 27, 2015Date of Patent: June 6, 2017Assignee: International Business Machines CorporationInventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A. J. Nye
-
Patent number: 9659166Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.Type: GrantFiled: January 30, 2015Date of Patent: May 23, 2017Assignee: International Business Machines CorporationInventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A. J. Nye
-
Publication number: 20160224781Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.Type: ApplicationFiled: January 30, 2015Publication date: August 4, 2016Inventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A.J. Nye
-
Publication number: 20160226914Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.Type: ApplicationFiled: May 27, 2015Publication date: August 4, 2016Inventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A.J. Nye
-
Publication number: 20160034685Abstract: A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the information processing device via a network is acquired. On the basis of the acquired statuses, at least one item is selected from a group comprising the terminal serving as a destination for the password, the communication method with the terminal, or the method for inputting the password in the terminal. The password is then sent to the selected terminal via a network.Type: ApplicationFiled: July 17, 2015Publication date: February 4, 2016Inventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
-
Publication number: 20160036955Abstract: A mechanism is provided for authenticating a second terminal based on information sensed by a first terminal. Responsive to receiving an authentication request, a first output request is sent to a second terminal instructing the second terminal to generate information able to be sensed by a sensor in a first terminal. An authentication of the authentication request is performed based on a condition that the sensor in the first terminal has sensed the information generated by the second terminal.Type: ApplicationFiled: July 21, 2015Publication date: February 4, 2016Inventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
-
Publication number: 20140380475Abstract: A computer detects fraudulent access to user accounts of a network application. The computer receives user account usage profile information for a plurality of user accounts. Rules are determined, based in part on the user account profile information, that define account usage patterns across two or more user accounts that identify fraudulent user account usage. The computer receives user account usage event information for a plurality of user accounts. Based on the determined rules, the computer identifies fraudulent user account usage patterns in the user account usage event information and transmits a security alert to the user accounts associated with the identified fraudulent user account usage pattern.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Inventors: Simon G. Canning, Christopher J. Hockings, Philip A. J. Nye
-
Publication number: 20140380478Abstract: A computer detects fraudulent access to user accounts of a network application. The computer receives user account usage profile information for a plurality of user accounts. Rules are determined, based in part on the user account profile information, that define account usage patterns across two or more user accounts that identify fraudulent user account usage. The computer receives user account usage event information for a plurality of user accounts. Based on the determined rules, the computer identifies fraudulent user account usage patterns in the user account usage event information and transmits a security alert to the user accounts associated with the identified fraudulent user account usage pattern.Type: ApplicationFiled: September 5, 2014Publication date: December 25, 2014Inventors: Simon G. Canning, Christopher J. Hockings, Philip A. J. Nye
-
Patent number: 8196195Abstract: A computer implemented method, data processing system, and computer program product for role-based privilege management is provided. A transformation request is received from a requester to form a received request, and a target environment of the received request is identified. A determination is made whether the target environment matches a predefined environment in a set of role-based privileges and, responsive to a determination that the target environment matches a predefined environment in the set of role-based privileges, the parameterized privileges from the set of role-based privileges are mapped to the target environment and the request is performed.Type: GrantFiled: July 11, 2008Date of Patent: June 5, 2012Assignee: International Business Machines CorporationInventors: Timothy Simon Bartley, Peter T. Cogill, Elizabeth M. Hughes, Philip A. J. Nye, Michael Andrew Powell
-
Publication number: 20100011438Abstract: In one embodiment, a computer implemented method for role-based privilege management is provided. The computer implemented method receives a transformation request from a requester to form a received request, and identifies a target environment of the received request. The computer implemented method determines whether the target environment matches a predefined environment in a set of role-based privileges and, responsive to a determination that the target environment matches a predefined environment in the set of role-based privileges, maps the parameterized privileges from the set of role-based privileges to the target environment and performs the request.Type: ApplicationFiled: July 11, 2008Publication date: January 14, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Timothy Simon Bartley, Peter T. Cogill, Elizabeth M. Hughes, Philip A. J. Nye, Michael Andrew Powell