Patents by Inventor Rhonda L. Childress

Rhonda L. Childress has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180312162
    Abstract: A method, system, and/or computer program product controls positioning of cargo being loaded onto a cargo vehicle based on sensor readings from another cargo vehicle. One or more processors receive output from a cargo sensor that describes shifting experienced by a first cargo while being transported by a first cargo vehicle, and based on the output, determine that the first cargo has shifted beyond a predetermined amount. The processor(s) transmit instructions to a robotic cargo loader of second cargo being loaded onto a second cargo vehicle to adjust a positioning of the second cargo while being loaded onto the second cargo vehicle based on the first cargo shifting beyond the predetermined amount while being transported by the first cargo vehicle, where the positioning of the second cargo in the second cargo vehicle is different from a positioning of the first cargo on the first cargo vehicle.
    Type: Application
    Filed: June 20, 2018
    Publication date: November 1, 2018
    Inventors: EVELYN R. ANDERSON, MICHAEL BENDER, MICHAEL BOONE, RHONDA L. CHILDRESS
  • Patent number: 10116668
    Abstract: A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware processor. Following assignment of the sensitivity value to the communication, the communication is formatted for display. When sensitivity value exceeds a security threshold, the communication is parsed into a sequence of fragments. The communication is transmitted as the sequence of fragments when said sensitivity value exceeds the security threshold.
    Type: Grant
    Filed: June 20, 2017
    Date of Patent: October 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, James R. Kozloski, Clifford A. Pickover, Neil Sondhi, Maja Vukovic
  • Patent number: 10106151
    Abstract: A method, system, and/or computer program product controls positioning of cargo being loaded onto a cargo vehicle based on sensor readings from another cargo vehicle. One or more processors receive output from a cargo sensor that describes shifting experienced by a first cargo while being transported by a first cargo vehicle and based on the output, determine that the first cargo has shifted beyond a predetermined amount. The processor(s) receive output from vehicle sensors that describe movement of the first cargo vehicle and then determine that the movement has caused the first cargo to shift beyond the predetermined amount. The processor(s) transmit instructions to a robotic cargo loader of second cargo being loaded onto a second cargo vehicle to adjust positioning of the second cargo, where the positioning of the second cargo in the second cargo vehicle is different from positioning of the first cargo on the first cargo vehicle.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: October 23, 2018
    Assignee: International Business Machines Corporation
    Inventors: Evelyn R. Anderson, Michael Bender, Michael Boone, Rhonda L. Childress
  • Publication number: 20180302424
    Abstract: Methods and apparatus, including computer program products, implementing and using techniques for enhancing the security of Internet of Things (IoT) devices. A homogenous and leaderless group of IoT devices sharing one or more common features is defined. During operation of the IoT devices, it is identified whether an IoT device in the group operates outside an expected tolerance for the operation of the IoT devices in the group. In response to identifying that an IoT device in the group operates outside an expected tolerance, an action is performed on the IoT device.
    Type: Application
    Filed: April 12, 2017
    Publication date: October 18, 2018
    Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Timothy J. Hahn, David B. Kumhyr
  • Publication number: 20180302386
    Abstract: Methods and apparatus, including computer program products, implementing and using techniques for processing of data in an intermediary server. Data is received from an Internet of Things (IoT) enabled device. The data includes a readable header and an encrypted payload. An opaque algorithm is selected to process the payload, based on information contained in the header of the data. The selected opaque algorithm processes the encrypted payload of the data, wherein the opaque algorithm is invisible to the intermediary server. The processing includes: decrypting the encrypted payload, applying the opaque algorithm to the decrypted payload, and encrypting the results from processing the decrypted payload by the opaque algorithm. A new readable header is added to the encrypted results. The data, including the new readable header and the encrypted results, is forwarded to a different server, based on the information in the new readable header.
    Type: Application
    Filed: April 17, 2017
    Publication date: October 18, 2018
    Inventors: Rhonda L. Childress, Hari H. Madduri
  • Patent number: 10095869
    Abstract: A method, system and computer-usable medium for generating a security analysis effort, cost and process scope estimates, comprising: analyzing a software system; identifying a complexity level of a security analysis, the complexity level of the security analysis comprising identification of an effort level for the security analysis; and, generating the security analysis effort estimate, the security analysis effort estimate comprising an estimate of an effort expenditure to perform a security analysis on the software system at the identified complexity level.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: October 9, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Sharon Hagi, Jeffrey C. Turnham
  • Publication number: 20180286387
    Abstract: A computer-implemented method is provided for facilitating an interaction between a first and second entity. The method includes instructing, by a cognitive recommendation engine, a communication aspect of the interaction between the first entity and the second entity. The instructing includes obtaining, by the cognitive recommendation engine, interaction preference data of the first entity related to the communication aspect of the interaction, and based on the interaction preference data, determining by the cognitive recommendation engine, an instruction recommendation. The instruction recommendation facilitates, from the first entity's view, the interaction between the first and second entities. Further, the instructing includes providing by the cognitive recommendation engine the instruction recommendation to the second entity for use by the second entity during the interaction with the first entity.
    Type: Application
    Filed: March 29, 2017
    Publication date: October 4, 2018
    Inventors: Michael BENDER, Edward T. CHILDRESS, Rhonda L. CHILDRESS, Charles D. WRISKA
  • Patent number: 10089880
    Abstract: A driver action system for monitoring traffic and capturing specific information about the car and the driver from a GPS device and other IoT sensors. Driver history and tendencies can provide insight into a driver's intention while on the road. The system will analyze the collected information and broadcast an alert to other drivers in the same area. A broadcast to the other devices or users in the area would include the probability or percentage of the driver taking a particular action or a lack of familiarity with the area.
    Type: Grant
    Filed: November 8, 2016
    Date of Patent: October 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Edward T. Childress, Rhonda L. Childress, Donald L. Muchmore
  • Patent number: 10081390
    Abstract: A parking assistance management system and method for assisting a parking of a vehicle based on a customized egress requirements is provided. The method includes the steps of identifying a user entering a vehicle, calculating a minimum egress space of the user, required for an egress of the user from the vehicle, detecting a parking space proximate at least one object, determining a viability of the parking space based on the minimum egress space, verifying that a distance between the vehicle and the at least one object is greater than the minimum egress space, when the vehicle is parked in the parking space, and broadcasting the minimum egress space to be received by other vehicles.
    Type: Grant
    Filed: May 15, 2017
    Date of Patent: September 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Evelyn R. Anderson, Michael Bender, Rhonda L. Childress, Ea-Ee Jan
  • Publication number: 20180268309
    Abstract: Mechanisms are provided for modifying response of cognitive systems to user requests based on a determined knowledge level of the user and knowledge level of the concepts referenced in the cognitive system responses. The mechanisms receive a response to a user submitted request received from a client computing system and determine a first knowledge level of the user for a domain of the user submitted request. The mechanisms determine a second knowledge level associated with concepts referenced in the response and whether the first knowledge level is different from the second knowledge level. The mechanism, in response to the first knowledge level being different than the second knowledge level, modify content of the response to include concepts associated with the first knowledge level, to thereby generate a modified response. The modified response is then output to the client computing system associated with the user.
    Type: Application
    Filed: March 17, 2017
    Publication date: September 20, 2018
    Inventors: Rhonda L. Childress, Darren L. Lawless, Crystal N. Moody, Daniel S. Riley, Michael J. Spisak
  • Publication number: 20180262873
    Abstract: An approach includes contacting a predefined contact information when a mobile device, which is password protected, is lost and subsequently found. The approach includes receiving an activation event predefined for a specified password protected mobile device, and receiving predefined contact information stored in the mobile device while the mobile device remains password protected, upon the receipt of the activation event.
    Type: Application
    Filed: May 11, 2018
    Publication date: September 13, 2018
    Inventors: Rhonda L. Childress, Itzhack GOLDBERG, Clifford A. PICKOVER, Neil SONDHI, Maja VUKOVIC
  • Publication number: 20180260815
    Abstract: A method, computer program product, and system includes a processor(s) receiving user identification data, identification data related to personal computing devices, and credential information for accessing data collected by the one or more personal computing devices. The processor(s) obtains an indication of program(s) initiating a transaction initiated on behalf of the user. The processor(s) utilize the credential information to access data related to the user collected by the personal computing devices contemporaneously with the initiating the transaction. The processor(s) determines a risk of fraud associated with the transaction, based on a portion of the data related to the user, where the risk of fraud indicates a likelihood that the transaction is fraudulent. The processor(s) alert the program(s) initiating the transaction of the risk of fraud.
    Type: Application
    Filed: March 9, 2017
    Publication date: September 13, 2018
    Inventors: Michael BENDER, Rhonda L. CHILDRESS
  • Publication number: 20180262531
    Abstract: Training a random forest model to relate settings of a network security device to undesirable behavior of the network security device is provided. A determination of a corresponding set of settings associated with each region of lowest incident probability is made using a random forest. The plurality of identified desired settings are presented as options for changing the network security device from the as-is settings to the identified desired settings. A choice is received from the plurality of options. The choice informs the random forest model. The random forest model ranks for a new problematic network security device the plurality of options for changing the new problematic network security device from as-is settings to desired settings by aggregating an identified cost of individual configuration changes, thereby identifying a most cost-effective setting for the network security device to achieve a desired output of the network security device.
    Type: Application
    Filed: March 9, 2017
    Publication date: September 13, 2018
    Inventors: Rhonda L. Childress, Michael E. Nidd, Michelle Rivers, George E. Stark, Srinivas B. Tummalapenta, Dorothea Wiesmann
  • Patent number: 10069840
    Abstract: A method and system for determining user security is provided. The method includes registering a first user associated with a service provider system by retrieving identification information for the first user and a first user communication device. In response, Internet of things (IOT) devices belonging to the first user are detected. A second user associated with the service provider system is registered by retrieving identification information for the second user and a second user communication device. In response, IOT devices belonging to the second user are detected. A request for a service provided by the service provider system is received from the first user via the first user communication device belonging to the first user.
    Type: Grant
    Filed: April 26, 2016
    Date of Patent: September 4, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Neil Sondhi, Aviad Zlotnick
  • Patent number: 10068067
    Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
    Type: Grant
    Filed: August 3, 2017
    Date of Patent: September 4, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Michael J. Spisak, George E. Stark
  • Publication number: 20180246527
    Abstract: A method, system, and/or computer program product controls operations of a vehicle based on a condition of cargo being transported. One or more processors receive output from vehicle sensors on a first cargo vehicle, where the output from the vehicle sensors describes a movement of the first cargo vehicle. The processor(s) determine that the movement of the first cargo vehicle has caused cargo in the first cargo vehicle to shift beyond a predetermined amount, and transmit instructions to a second cargo vehicle to adjust initial cargo loading operations on the second cargo vehicle based on determining that the movement of the first cargo vehicle has caused the cargo to shift beyond the predetermined amount in the first cargo vehicle.
    Type: Application
    Filed: April 30, 2018
    Publication date: August 30, 2018
    Inventors: EVELYN R. ANDERSON, MICHAEL BENDER, MICHAEL BOONE, RHONDA L. CHILDRESS
  • Patent number: 10061907
    Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
    Type: Grant
    Filed: August 3, 2017
    Date of Patent: August 28, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Michael J. Spisak, George E. Stark
  • Patent number: 10054953
    Abstract: A method, system, and/or computer program product controls operations of a vehicle based on a condition of cargo being transported. One or more processors receive output from vehicle sensors on a first cargo vehicle, wherein the output from the vehicle sensors describes a movement of the first cargo vehicle. The processor(s) determine that the movement of the first cargo vehicle has caused cargo in the first cargo vehicle to shift beyond a predetermined amount, and instruct a second cargo vehicle to adjust operations of the second cargo vehicle based on determining that the movement of the first cargo vehicle has caused the cargo to shift beyond the predetermined amount in the first cargo vehicle.
    Type: Grant
    Filed: January 9, 2018
    Date of Patent: August 21, 2018
    Assignee: International Business Machines Corporation
    Inventors: Evelyn R. Anderson, Michael Bender, Michael Boone, Rhonda L. Childress
  • Publication number: 20180218175
    Abstract: A computer-implemented method improves a computer system's security through use of a simulated digital footprint. One or more processors retrieve a historical digital footprint of a user. The historical digital footprint is a record of past digital data about the user, and describes a pattern of activities of the user. The processor(s) generate a simulated digital footprint for the user. The simulated digital footprint conforms to the pattern of activities of the user, and describes simulated current activities of the user. The processor(s) transmit the simulated digital footprint to the public while a current real digital footprint is being created for the user, such that use of the pattern of activities of the user provides an imperceptible transition from the historical digital footprint to the simulated digital footprint, and where the simulated digital footprint prevents the public from accessing the current real digital footprint of the user.
    Type: Application
    Filed: February 1, 2017
    Publication date: August 2, 2018
    Inventors: MICHAEL BENDER, RHONDA L. CHILDRESS, TIMOTHY J. HAHN, DAVID B. KUMHYR
  • Patent number: 10038971
    Abstract: An approach includes contacting a predefined contact information when a mobile device, which is password protected, is lost and subsequently found. The approach includes receiving an activation event predefined for a specified password protected mobile device, and receiving predefined contact information stored in the mobile device while the mobile device remains password protected, upon the receipt of the activation event.
    Type: Grant
    Filed: March 24, 2015
    Date of Patent: July 31, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Clifford A. Pickover, Neil Sondhi, Maja Vukovic