Patents by Inventor Rhonda L. Childress

Rhonda L. Childress has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10601840
    Abstract: A method and system for determining user security is provided. The method includes registering a first user associated with a service provider system by retrieving identification information for the first user and a first user communication device. In response, Internet of things (IOT) devices belonging to the first user are detected. A second user associated with the service provider system is registered by retrieving identification information for the second user and a second user communication device. In response, IOT devices belonging to the second user are detected. A request for a service provided by the service provider system is received from the first user via the first user communication device belonging to the first user.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: March 24, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Neil Sondhi, Aviad Zlotnick
  • Publication number: 20200092319
    Abstract: A security vulnerability analysis mechanism is provided that ingests content from a plurality of content source computing devices to identify instances of security vulnerability content in the ingested content. The mechanism performs a security trend analysis on the instances of security vulnerability content to identify a relative ranking of security vulnerabilities. The mechanism identifies computing resources of a specified computing infrastructure and a criticality of the computing resources to an operation of the computing infrastructure. The mechanism generates a prioritized listing of security vulnerabilities associated with the computing infrastructure based on the relative ranking of security vulnerabilities and the criticality of the computing resources in the computing infrastructure. The mechanism outputs a notification to a user via a user computing device, indicating the prioritized listing of security vulnerabilities.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 19, 2020
    Inventors: Michael Spisak, Steven D. McKay, Mariya Ali, Rhonda L. Childress, Michelle Rivers, Carlos E. Aguilera
  • Publication number: 20200092282
    Abstract: A method, computer system, and a computer program product for enhanced user authentication is provided. The present invention may include obtaining, from a user device, a user name associated with the user device. The present invention may also include obtaining, from the user device, a system name associated with the user device. The present invention may then include identifying, in a database of a security device in communication with the user device, a password associated with the obtained user name and the obtained system name. The present invention may then include, in response to a login prompt of the user device, automatically injecting the identified password from the security device in communication with the user device into the login prompt.
    Type: Application
    Filed: September 14, 2018
    Publication date: March 19, 2020
    Inventors: Rhonda L. Childress, John R. Feezell, Cesar Augusto Rodriguez Bravo
  • Publication number: 20200089853
    Abstract: A computer-implemented method includes: receiving, by a computer device, biometric data scanned from a guardian and biometric data scanned from a ward; receiving, by the computer device, data defining a relationship between the guardian and the ward; storing, by the computer device, the biometric data scanned from the guardian, the biometric data scanned from the ward, and the data defining the relationship in a record in a secure database; receiving, by the computer device, a request for validation including scanned biometric data; determining, by the computer device, the scanned biometric data matches the record in the secure database; and transmitting, by the computer device and in response to the determining, data defining an authorization based on the relationship.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 19, 2020
    Inventors: Michael Bender, Rhonda L. Childress, Todd R. Palmer, Manjari Roy
  • Publication number: 20200089437
    Abstract: Provided are techniques for grouping devices as a virtual device for providing better quality of device data. A group of devices in an Internet of Things (IoT) network is identified based on one or more attributes of each of the devices. The group of devices is provided as a single virtual device by: collecting data from each of the devices in the group, transforming the data, and using the transformed data to modify a device.
    Type: Application
    Filed: November 21, 2019
    Publication date: March 19, 2020
    Inventors: Rhonda L. Childress, Rahul Gupta, Timothy J. Hahn, Leucir Marin, JR.
  • Patent number: 10590689
    Abstract: Embodiments of the present invention disclose a method, computer system, and computer program product for a processor-implemented method for a movable wall process, the method including collecting a set of rules governing a size of a main room and a size of one or more sub-rooms comprising the main room, determining a starting position of a movable wall, where the movable wall separates the one or more sub-rooms, and where the starting position is determined by the set of rules, determining a location of one or more people, determining a required wall movement for the movable wall, wherein the required wall movement is determined by the set of rules and the location of one or more people, and moving the movable wall to a new position, based on the starting position and the required wall movement.
    Type: Grant
    Filed: June 26, 2017
    Date of Patent: March 17, 2020
    Assignee: International Business Machines Corporation
    Inventors: Risham Y. Chokshi, Rhonda L. Childress
  • Patent number: 10595155
    Abstract: A method and system for determining a driver is provided. The method includes receiving and analyzing GPS data identifying locations of GPS enabled devices of a plurality of users. A group of users are determined to be located within a specified proximity to each other based on the analysis. The group of users are determined, based on an altitude, velocity, and a vector of the group of users, to be located within a vehicle. A position and role for each user with respect to the vehicle is determined. Selected functions of each GPS enabled device are controlled based on each role.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: March 17, 2020
    Assignee: International Business Machines Corporation
    Inventors: Lisa M. Chavez, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Publication number: 20200068402
    Abstract: Approaches presented herein enable challenge-response authentication of a user based on information captured by devices associated with the user. Specifically, in one approach, a plurality of devices associated with the user that each dynamically track and store on-device data points over a period of time are identified. A request initiated by a party claiming to be the user is received to authenticate the party as the user. An authentication question is generated in a natural language, the answer to which is a data point selected from data points on at least one device of the plurality, wherein the selected data point is discoverable by viewing data points on the at least one device. The requesting party is prompted to find the data point by presenting the authentication question to the requesting party. In the case that the requesting party returns the answer, the requesting party is authenticated as the user.
    Type: Application
    Filed: November 4, 2019
    Publication date: February 27, 2020
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Boaz Mizrachi, Clifford A. Pickover, Neil Sondhi
  • Patent number: 10571266
    Abstract: A user may be aided in modifying a product that is an assemblage of parts. This aid may involve a processor obtaining images of a target part captured by the user on a mobile device camera. The processor may compare, based on the captured images and a plurality of images of identified parts, the target part to the identified parts. Based on the comparison, the processor may determine an identity of the target part. This aid may also involve a processor obtaining images of a first configuration of a partial assembly of the product captured by a mobile device camera. The processor may compare, based on the captured images, the first configuration to a correct configuration of the partial assembly. Based on the comparison, the processor may determine that the first configuration does not match the correct configuration and may notify the user accordingly.
    Type: Grant
    Filed: October 4, 2018
    Date of Patent: February 25, 2020
    Assignee: Wayfair LLC
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael J. Spisak
  • Patent number: 10573337
    Abstract: Systems and methods for computer-based escalation detection are disclosed. In embodiments, a method includes: determining an occurrence of an interaction event between a first party and a second party within a recording including audio data; analyzing the audio data; determining, based on the analyzing the audio data, an escalation during the interaction event to generate escalation data; saving the escalation data; partitioning each interaction event into a plurality of sections, wherein a first section represents a start of the interaction event, and another section represents an end of the interaction event; assigning a sentiment score for each of the plurality of sections; and calculating an overall sentiment score for the interaction event by combining the sentiment scores for each of the plurality of sections, wherein the saved escalation data includes the overall sentiment score.
    Type: Grant
    Filed: November 28, 2018
    Date of Patent: February 25, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda L. Childress, Kim A. Eckert, Ryan D. McNair
  • Publication number: 20200050752
    Abstract: A security application may monitor applications attempting to be installed on a user device. In one example, various steps may include at least one of: receiving an application access operation on a computing device, identifying at least one application action associated with the application access operation, retrieving an application security profile stored in memory, identifying at least one application security restriction in the application security profile related to the at least one application action, restricting the at least one application action from occurring based on the at least one application security restriction and notifying a pre-registered device responsive to restricting the at least one application action.
    Type: Application
    Filed: October 16, 2019
    Publication date: February 13, 2020
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Michael John Spisak
  • Publication number: 20200053069
    Abstract: Provided are techniques for authenticating a device. Accepted communication patterns representing accepted modes of communication between devices in an internet of things network are stored. In response to receiving a new communication from a requesting device of the devices, it is determined whether the new communication matches at least one of the accepted communication patterns. In response to determining that the new communication matches, there is a response to the new communication. In response to determining that the new communication does not match, flagging the new communication as an anomaly and determining how to process the new communication based on the flagging.
    Type: Application
    Filed: October 18, 2019
    Publication date: February 13, 2020
    Inventors: Rhonda L. Childress, Rahul Gupta, Hari H. Madduri, Maharaj Mukherjee, Joanna W. NG
  • Publication number: 20200040636
    Abstract: Embodiments of the present invention disclose a method, computer system, and computer program product for a processor-implemented method for a movable wall process, the method including collecting a set of rules governing a size of a main room and a size of one or more sub-rooms comprising the main room, determining a starting position of a movable wall, where the movable wall separates the one or more sub-rooms, and where the starting position is determined by the set of rules, determining a location of one or more people, determining a required wall movement for the movable wall, wherein the required wall movement is determined by the set of rules and the location of one or more people, and moving the movable wall to a new position, based on the starting position and the required wall movement.
    Type: Application
    Filed: October 16, 2019
    Publication date: February 6, 2020
    Inventors: Risham Y. Chokshi, Rhonda L. Childress
  • Publication number: 20200035254
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: activating a streaming media recording buffer that records streaming media of an online conference, the online conference having first second and third user online conference participant users; examining data to return an action decision, the examining data to return an action decision including examining data of the streaming media recording buffer to identify an anomalous sound represented in the recorded media stream data of the streaming media recording buffer; returning an action decision based on the examining data to return an action decision, the action decision being an action to mitigate the anomalous sound; and providing one or more output to mitigate the anomalous sound in accordance with the returned action decision.
    Type: Application
    Filed: July 24, 2018
    Publication date: January 30, 2020
    Inventors: Gregory J. BOSS, Michael BENDER, Rhonda L. CHILDRESS
  • Patent number: 10548011
    Abstract: Approaches presented herein enable challenge-response authentication of a user based on information captured by a personal internet of things (IoT) device set associated with the user. Specifically, in one approach, a personal IoT device set comprising at least one device records and stores data associated with a user. The data is synchronized and stored to a computerized authentication system, which prompts the user with an authentication question based on the synchronized and stored data. The user may find an answer to the authentication question by reviewing data recorded and stored in the device of the personal IoT device set. The user may then enter the found answer to the authentication question, thereby authenticating the user. The personal IoT device set may comprise a single device or may comprise a plurality of devices, the information of one of which may be selected as the basis of the authentication question.
    Type: Grant
    Filed: November 21, 2018
    Date of Patent: January 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Boaz Mizrachi, Clifford A. Pickover, Neil Sondhi
  • Publication number: 20200025524
    Abstract: Systems and methods for dynamic camouflaging are disclosed. A computer-implemented method can be used with the system including determining, by a computing device, if current environment image data is available for a location of one or more users, and instructing, by the computing device, at least one image-enabled clothing system of the one or more users to display a camouflage image based on the determining. The camouflage image is based on the current environment image data when the current environment image data is available, and the camouflage image is based on historic image data associated with the location of the one or more users when the current environment image data is not available.
    Type: Application
    Filed: September 27, 2019
    Publication date: January 23, 2020
    Inventors: Michael Bender, Rhonda L. Childress, Timothy J. Forshee-Lee, Mary E. Rudden
  • Patent number: 10536460
    Abstract: In the sharing of data between connected devices over a network, a network device broadcasts an availability of a set of data collected by a data producing device coupled to the network. The network device receives a request to access the set of data from a data consuming device coupled to the network, and a cognitive computing module of the network device determines a set of terms between the data producing and the data consuming devices for access to the set of data. In response, the network device obtains the set of data and a first key from the data producing device. Upon receiving a second key from the data consuming device, the network device determines that the second key is associated with the first key. In response, the network device provides access to the set of data to the data consuming device according to the set of terms.
    Type: Grant
    Filed: January 20, 2017
    Date of Patent: January 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, Rahul Gupta, Timothy J. Hahn, David B. Kumhyr, Joanna W. Ng
  • Patent number: 10528728
    Abstract: According to one embodiment of the present invention, a system provides security for a device and includes at least one processor. The system monitors a plurality of networked devices for a security risk. Each networked device is associated with a corresponding security risk tolerance. In response to a monitored security risk for one or more of the plurality of networked devices exceeding the corresponding risk tolerance, a network service is initiated to perform one or more actions on each of the one or more networked devices to alleviate the associated security risk. Embodiments of the present invention further include a method and computer program product for providing security to a device in substantially the same manner described above.
    Type: Grant
    Filed: January 3, 2018
    Date of Patent: January 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, Marc A. Dickenson, Thomas J. Fleischman, Timothy J. Hahn
  • Patent number: 10528293
    Abstract: Provided are techniques for grouping devices as a virtual device for providing better quality of device data. A group of devices in an Internet of Things (IoT) network is identified based on one or more attributes of each of the devices. The group of devices is provided as a single virtual device by: collecting data from each of the devices in the group, transforming the data, and using the transformed data to modify a device.
    Type: Grant
    Filed: June 26, 2017
    Date of Patent: January 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Rahul Gupta, Timothy J. Hahn, Leucir Marin, Jr.
  • Publication number: 20200004732
    Abstract: A blockchain may include various transactions which are identified and which require processing. The order of processing such transactions may be optimized by examining content of the transactions. One example operation may include one or more of identifying blockchain transactions, designating each of the blockchain transactions as an independent transaction type or a dependent transaction type, and determining an order to process the blockchain transactions based on the independent transaction type or the dependent transaction type.
    Type: Application
    Filed: September 9, 2019
    Publication date: January 2, 2020
    Inventors: Rhonda L. Childress, Rahul Gupta, David B. Kumhyr, Maharaj Mukherjee