Patents by Inventor Rick A. Hamilton, II

Rick A. Hamilton, II has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10686809
    Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: June 16, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Patent number: 10672072
    Abstract: A method implemented in a computer infrastructure having computer executable code, includes receiving information in support of a bid and determining if value-add eligibility criteria is met. Additionally, the method includes calculating a bid price based on the information if the value-add eligibility criteria is met, updating a record indicating the bid price and tracking additions and changes to the record.
    Type: Grant
    Filed: June 13, 2014
    Date of Patent: June 2, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rick A. Hamilton, II, Konstantinos Makropoulos, Bryan J. Martin, James W. Seaman
  • Patent number: 10673932
    Abstract: A system and method for abstracting objects in a virtual universe (VU) deployment is provided. The system and method abstracts VU objects for editing in a common abstraction utility and for deploying to one or more VU grids containing one or more VU architectures and/or platforms (servers). The method can be implemented in a computer infrastructure having programming instructions operable to: obtain an object associated with a first virtual universe server; translate the object with syntax specific to at least a second virtual universe server, the syntax being different than that used with the first virtual universe server; and deploy the translated object to the second virtual universe server.
    Type: Grant
    Filed: November 21, 2017
    Date of Patent: June 2, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ankur Chandra, Rick A. Hamilton, II, Nalini K. Kartha, Keith R. Walker
  • Publication number: 20200168012
    Abstract: A computer-implemented method, system, and program product for providing a personal fuel efficiency for a vehicle of interest to a user. Responsive to receiving an input, a particular vehicle having a number of fuel efficiency attributes is identified. Driver attribute data providing information of personal driving behaviors of the user when driving another vehicle is accessed. The driver attribute data is obtained from a number of sensors on the other vehicle. Using the driver attribute data, a predicted impact on the number of fuel efficiency attributes is determined. The number of fuel efficiency attributes is adjusted based on the predicted impact to determine the personal fuel efficiency. The computer renders the personal fuel efficiency on a user device or on a display device located on the particular vehicle.
    Type: Application
    Filed: November 28, 2018
    Publication date: May 28, 2020
    Inventors: Gregory J. Boss, Kulvir Singh Bhogal, Rick A. Hamilton, II, Ninad Sathaye
  • Patent number: 10666670
    Abstract: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: May 26, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Patent number: 10657148
    Abstract: An IoT apparatus in use by a user, which is communicatively linked to a mobile device used by the user, is identified. A determination can be made as to whether documentation for the IoT apparatus is located on the IoT apparatus or on a mobile device. Responsive to determining that the documentation is located on the IoT apparatus or on the mobile device, a determination can be made as to whether the documentation located on the IoT apparatus or on the mobile device is a latest version of the documentation. Responsive to determining that the documentation located on the IoT apparatus or on the mobile device is not the latest version of the documentation, the latest version of the documentation can be automatically accessed from a resource external to the IoT apparatus and the mobile device. Presentation of the latest version of the documentation on a display can be initiated.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: May 19, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rick A. Hamilton, II, Agueda Martinez Hernandez Magro, Jose Roberto Mosqueda Mejia, Victor Adrian Sosa Herrera
  • Publication number: 20200150737
    Abstract: Approaches that manage energy in a data center are provided. In one embodiment, there is an energy management tool, including an analysis component configured to determine a current energy profile of each of a plurality of systems within the data center, the current energy profile comprising an overall rating expressed as an integer value, the overall rating calculated based on a current workload usage and environmental conditions surrounding each of the plurality of systems; and a priority component configured to prioritize a routing of a workload to a set of systems from the plurality of systems within the data center having the least amount of energy present based on a comparison of the overall ratings for each of the plurality of systems within the data center.
    Type: Application
    Filed: January 14, 2020
    Publication date: May 14, 2020
    Inventors: Christopher J. Dawson, Vincenzo V. Diluoffo, Rick A. Hamilton, II, Michael D. Kendzierski
  • Patent number: 10650658
    Abstract: As disclosed herein a dynamic geo-fencing method includes receiving a plurality of geo-fence extent factors, a plurality of extents, and a plurality of violation responses for a geo-fence, determining a first geo-fence extent factor of the plurality of geo-fence extent factors, selecting a first extent for the geo-fence corresponding to the first geo-fence extent factor, determining that the geo-fence is violated, and responsive to determining that the geo-fence is violated, performing a violation response, of the plurality of violation responses, corresponding to the first geo-fence extent factor. A corresponding system and computer program product are also disclosed herein.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: May 12, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Jeremy R. Fox, Gregory J. Boss, Rick A. Hamilton, II
  • Patent number: 10639551
    Abstract: Provided is a method for authentication and verification of a user in a virtual world (VU) based upon such criteria as the physical location of a user in the real world and the logical location of the user's avatar in the VU. The disclosed technology combines physical and application aspects of security to enhance security options within virtual environments. In addition to traditional credential-based authentication, physical constraints corresponding to the real world and logical locations in a VU are employed, wherein an authentication server requires each component to be in the proper association state, location or proximity before authenticating a user. Further, the disclosed technology provides for the termination of a user's authentication if the user moves from an approved physical or VU location to an unapproved location. Techniques are provided to track a user's credentials and real-time physical and logical location of a user.
    Type: Grant
    Filed: February 21, 2017
    Date of Patent: May 5, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rick A. Hamilton, II, Jenny S. Li, Anne R. Sand, James W. Seaman
  • Patent number: 10636282
    Abstract: Security system devices are configured to retrieve historic first sensor data acquired from a protected area in response to receiving a threat alarm notification from a peer security system that is related to an area monitored by the peer security system, wherein the protected area is different from and geographically separate from the area monitored by the peer security system. The system devise determines that a security threat is indicated for the protected area by assessing the retrieved selection of historic first sensor data as a function of a relation of the threat alarm notification from the peer security system to the protected area, wherein assessing the historic first sensor data without the function of the relation of the threat alarm notification from the peer security system to the protected area results in determining that the security threat is not indicated for the protected area.
    Type: Grant
    Filed: May 22, 2019
    Date of Patent: April 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Luis Carlos Cruz Huertas, Rick A Hamilton, II, Ninad Sathaye, Edgar A. Zamora Duran
  • Patent number: 10623998
    Abstract: Methods and systems to establish and execute price offerings among the lenders and borrowers in a bandwidth-sharing ad hoc network for shared bandwidth usage. The method comprises establishing a price offering among a lender and borrower in a bandwidth-sharing ad hoc network for shared bandwidth usage. The method further includes executing the price offering upon acceptance of a lender to the bandwidth-sharing ad hoc network for shared bandwidth usage.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: April 14, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Dawson, Peter G. Finn, Rick A. Hamilton, II, Jenny S. Li
  • Patent number: 10620684
    Abstract: In general, embodiments of the invention provide an approach to proactively adjust timeout settings on a display device based on user activity. Specifically, a system and method are presented to adaptively adjust the inactivity timeout settings on a display device based on the application being used, the content being displayed on the device, and an analysis of the user's history with the application. The present invention calculates an inactivity timeout modifier which is utilized to modify the default operating system timeout value.
    Type: Grant
    Filed: October 17, 2018
    Date of Patent: April 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey D. Amsterdam, Rick A. Hamilton, II, Mauro Marzorati, Brian M. O'Connell, Keith R. Walker
  • Patent number: 10621646
    Abstract: A process is provided for identifying by a cognitive recommendation engine one or more complementary products. The process includes obtaining an indication that an individual has selected a product, and based on obtaining the indication, performing by the cognitive recommendation engine analytics on prior products-related data for the individual to produce a complementary items list of one or more complementary items to the product that are personal to the individual. Further, the processing includes identifying, by the cognitive recommendation engine, one or more commercially available complementary products corresponding to one or more items within the complementary items list, and providing identifying information for at least one commercially available product of the one or more commercially available products to the individual.
    Type: Grant
    Filed: April 4, 2017
    Date of Patent: April 14, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael Bender, Gregory J. Boss, Jeremy R. Fox, Rick A. Hamilton, II
  • Patent number: 10610787
    Abstract: A system and method in a virtual universe system for triggering scans of virtual items and inventories of virtual items and for scanning the virtual items and inventories wherein the scans may be triggered by an avatar moving or teleporting from one region to another, or by an avatar picking up, dropping off, or accepting or purchasing an item. The degree of scanning may depend upon factors such as location where these scan triggers occur. The signature of the item may be identified by the scan process. The item signature may be compared against signatures of known malicious items stored in an inventory item signatures database and a summary of the signature comparison may be sent to a resident and stored in the resident's inventory.
    Type: Grant
    Filed: June 11, 2018
    Date of Patent: April 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rick A. Hamilton, II, Brian M. O'Connell, Clifford A. Pickover, Keith R. Walker
  • Patent number: 10614405
    Abstract: Managing misuse of machinery by an operator is disclosed. A system learns a set of safety conditions which are associated with tasks completed by an operator using machinery. Inappropriate usage of the machinery can be identified and the machinery can be remotely shut down and reports of the inappropriate usage of the machinery can be sent to a responsible party.
    Type: Grant
    Filed: February 10, 2017
    Date of Patent: April 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rick A. Hamilton, II, Agueda Martinez Hernandez Magro, Jose Roberto Mosqueda Mejia, Victor Adrian Sosa Herrera
  • Patent number: 10614471
    Abstract: Approaches are provided for tracking and measuring the influence of social networking members on groups of friends to engage in electronic commerce. An approach includes receiving unique identifier information and activity information for a user that referred a social media link to one or more other users. The approach further includes generating a reference identifier for the referrer of the social media link to the one or more other users. The approach further includes embedding the generated reference identifier into the social media link. The generated reference identifier includes a concatenation of the unique identifier information, the activity information, and information pertaining to referrals of the social media link prior to the referrer to the one or more other users.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: April 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Luis C. Cruz Huertas, Edgar A. Zamora Duran
  • Publication number: 20200104279
    Abstract: A method includes a digital subscription management system (DSMS) receiving from a source system a request to perform an edit of at least one data object, the DSMS sending a request for response (RFR) to subscribing systems having a copy of the at least one data object, the DSMS receiving a response from the subscribing systems, and the DSMS performing the edit.
    Type: Application
    Filed: December 2, 2019
    Publication date: April 2, 2020
    Inventors: Erick S. AMADOR, Rick A. HAMILTON, II, Garfield W. VAUGHN, Timothy M. WATERS
  • Patent number: 10606643
    Abstract: The system and method generally relate to reducing heat dissipated within a data center, and more particularly, to a system and method for reducing heat dissipated within a data center through service level agreement analysis, and resultant reprioritization of jobs to maximize energy efficiency. A computer implemented method includes performing a service level agreement (SLA) analysis for one or more currently processing or scheduled processing jobs of a data center using a processor of a computer device. Additionally, the method includes identifying one or more candidate processing jobs for a schedule modification from amongst the one or more currently processing or scheduled processing jobs using the processor of the computer device. Further, the method includes performing the schedule modification for at least one of the one or more candidate processing jobs using the processor of the computer device.
    Type: Grant
    Filed: August 6, 2018
    Date of Patent: March 31, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Dawson, Vincenzo V. Di Luoffo, Rick A. Hamilton, II, Michael D. Kendzierski
  • Publication number: 20200097606
    Abstract: A computing entity storing a user profile data store and an informational content data store receives new event information corresponding to a user. The new event information is associated with a user identifier and is provided via user interaction with an interactive user interface (IUI). Using the user identifier, the computing entity identifies and accesses a user profile from the user profile data store that comprises profile information corresponding to the user. Based on the new event information and/or the profile information stored in the user profile, the computing entity prioritizes a plurality of informational content items stored in the informational content data store. Based on the prioritization of the plurality of informational content items, the computing entity selects one or more informational content items that are of high priority for the user and provides a selected informational content item for presentation to the user via the IUI.
    Type: Application
    Filed: September 20, 2018
    Publication date: March 26, 2020
    Inventors: Rick A. Hamilton, II, Kathleen E. Uske, Patrick J. Hafford, Scott E. Washburn
  • Publication number: 20200100110
    Abstract: A method, system and computer program product are disclosed for sharing a crowd sourced wireless network, wherein a first user uses a first device to access a wireless network, and the first device includes an application to grant automatically access to the wireless network to all of a defined group of people. In an embodiment, the method comprises restricting the automatic grant of access to the wireless network by, when one person of said group of people requests access to the network, a network control obtaining a determined strength of a defined relationship between the first user and that person, and granting the person access to the wireless network only if the determined strength of the defined relationship meets one or more set criteria. In an embodiment, the first device uploads a series of relationship scores to a server, and network control receives these scores from the server.
    Type: Application
    Filed: November 26, 2019
    Publication date: March 26, 2020
    Inventors: Kulvir S. Bhogal, Gregory J. Boss, Rick A. Hamilton, II, Christopher D. Wyble