Patents by Inventor Philip A. J. Nye

Philip A. J. Nye has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10255430
    Abstract: A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the information processing device via a network is acquired. On the basis of the acquired statuses, at least one item is selected from a group comprising the terminal serving as a destination for the password, the communication method with the terminal, or the method for inputting the password in the terminal. The password is then sent to the selected terminal via a network.
    Type: Grant
    Filed: August 15, 2017
    Date of Patent: April 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
  • Patent number: 10171457
    Abstract: An indication is received that a user has initiated an access to a website hosted by a service provider. Access to the website requires an authorization of a user identification associated with the user and a password associated with the user. A token is requested. The token provides access to an application programming interface. The token is received. The token is stored by the service provider.
    Type: Grant
    Filed: December 29, 2015
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: David P. Moore, Trevor S. Norvill, Philip A. J. Nye, Robert T. Trotter
  • Patent number: 10079928
    Abstract: A mechanism is provided for authenticating a second terminal based on information sensed by a first terminal. Responsive to receiving an authentication request, a first output request is sent to a second terminal instructing the second terminal to generate information able to be sensed by a sensor in a first terminal. An authentication of the authentication request is performed based on a condition that the sensor in the first terminal has sensed the information generated by the second terminal.
    Type: Grant
    Filed: July 21, 2015
    Date of Patent: September 18, 2018
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
  • Publication number: 20180012015
    Abstract: A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the information processing device via a network is acquired. On the basis of the acquired statuses, at least one item is selected from a group comprising the terminal serving as a destination for the password, the communication method with the terminal, or the method for inputting the password in the terminal. The password is then sent to the selected terminal via a network.
    Type: Application
    Filed: August 15, 2017
    Publication date: January 11, 2018
    Inventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
  • Patent number: 9740851
    Abstract: A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the information processing device via a network is acquired. On the basis of the acquired statuses, at least one item is selected from a group comprising the terminal serving as a destination for the password, the communication method with the terminal, or the method for inputting the password in the terminal. The password is then sent to the selected terminal via a network.
    Type: Grant
    Filed: July 17, 2015
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
  • Publication number: 20170187708
    Abstract: An indication is received that a user has initiated an access to a website hosted by a service provider. Access to the website requires an authorization of a user identification associated with the user and a password associated with the user. A token is requested. The token provides access to an application programming interface. The token is received. The token is stored by the service provider.
    Type: Application
    Filed: December 29, 2015
    Publication date: June 29, 2017
    Inventors: David P. Moore, Trevor S. Norvill, Philip A.J. Nye, Robert T. Trotter
  • Patent number: 9672348
    Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: June 6, 2017
    Assignee: International Business Machines Corporation
    Inventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A. J. Nye
  • Patent number: 9659166
    Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.
    Type: Grant
    Filed: January 30, 2015
    Date of Patent: May 23, 2017
    Assignee: International Business Machines Corporation
    Inventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A. J. Nye
  • Publication number: 20160226914
    Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.
    Type: Application
    Filed: May 27, 2015
    Publication date: August 4, 2016
    Inventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A.J. Nye
  • Publication number: 20160224781
    Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.
    Type: Application
    Filed: January 30, 2015
    Publication date: August 4, 2016
    Inventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A.J. Nye
  • Publication number: 20160036955
    Abstract: A mechanism is provided for authenticating a second terminal based on information sensed by a first terminal. Responsive to receiving an authentication request, a first output request is sent to a second terminal instructing the second terminal to generate information able to be sensed by a sensor in a first terminal. An authentication of the authentication request is performed based on a condition that the sensor in the first terminal has sensed the information generated by the second terminal.
    Type: Application
    Filed: July 21, 2015
    Publication date: February 4, 2016
    Inventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
  • Publication number: 20160034685
    Abstract: A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the information processing device via a network is acquired. On the basis of the acquired statuses, at least one item is selected from a group comprising the terminal serving as a destination for the password, the communication method with the terminal, or the method for inputting the password in the terminal. The password is then sent to the selected terminal via a network.
    Type: Application
    Filed: July 17, 2015
    Publication date: February 4, 2016
    Inventors: Christopher J. Hockings, Philip A. J. Nye, Tadashi Tsumura
  • Publication number: 20140380475
    Abstract: A computer detects fraudulent access to user accounts of a network application. The computer receives user account usage profile information for a plurality of user accounts. Rules are determined, based in part on the user account profile information, that define account usage patterns across two or more user accounts that identify fraudulent user account usage. The computer receives user account usage event information for a plurality of user accounts. Based on the determined rules, the computer identifies fraudulent user account usage patterns in the user account usage event information and transmits a security alert to the user accounts associated with the identified fraudulent user account usage pattern.
    Type: Application
    Filed: June 25, 2013
    Publication date: December 25, 2014
    Inventors: Simon G. Canning, Christopher J. Hockings, Philip A. J. Nye
  • Publication number: 20140380478
    Abstract: A computer detects fraudulent access to user accounts of a network application. The computer receives user account usage profile information for a plurality of user accounts. Rules are determined, based in part on the user account profile information, that define account usage patterns across two or more user accounts that identify fraudulent user account usage. The computer receives user account usage event information for a plurality of user accounts. Based on the determined rules, the computer identifies fraudulent user account usage patterns in the user account usage event information and transmits a security alert to the user accounts associated with the identified fraudulent user account usage pattern.
    Type: Application
    Filed: September 5, 2014
    Publication date: December 25, 2014
    Inventors: Simon G. Canning, Christopher J. Hockings, Philip A. J. Nye
  • Patent number: 8196195
    Abstract: A computer implemented method, data processing system, and computer program product for role-based privilege management is provided. A transformation request is received from a requester to form a received request, and a target environment of the received request is identified. A determination is made whether the target environment matches a predefined environment in a set of role-based privileges and, responsive to a determination that the target environment matches a predefined environment in the set of role-based privileges, the parameterized privileges from the set of role-based privileges are mapped to the target environment and the request is performed.
    Type: Grant
    Filed: July 11, 2008
    Date of Patent: June 5, 2012
    Assignee: International Business Machines Corporation
    Inventors: Timothy Simon Bartley, Peter T. Cogill, Elizabeth M. Hughes, Philip A. J. Nye, Michael Andrew Powell
  • Publication number: 20100011438
    Abstract: In one embodiment, a computer implemented method for role-based privilege management is provided. The computer implemented method receives a transformation request from a requester to form a received request, and identifies a target environment of the received request. The computer implemented method determines whether the target environment matches a predefined environment in a set of role-based privileges and, responsive to a determination that the target environment matches a predefined environment in the set of role-based privileges, maps the parameterized privileges from the set of role-based privileges to the target environment and performs the request.
    Type: Application
    Filed: July 11, 2008
    Publication date: January 14, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Timothy Simon Bartley, Peter T. Cogill, Elizabeth M. Hughes, Philip A. J. Nye, Michael Andrew Powell