Patents by Inventor Rick A. Hamilton, II

Rick A. Hamilton, II has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9929913
    Abstract: Methods, computer program products, and systems are presented. Data characteristics describing data from IoT devices are identified. Data profiles representing the IoT devices are generated. The data profiles are grouped into data profile groupings based on one or more of analytics and machine learning. A mapping of the data profile groupings to virtual servers is determined.
    Type: Grant
    Filed: March 28, 2016
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Dawson, Eli M. Dow, Rick A. Hamilton, II, Jenny S. Li
  • Patent number: 9928528
    Abstract: Systems and methods for advertising, and, more particularly, systems and methods for managing ephemeral locations in a virtual universe. A method for managing ephemeral locations in a virtual universe (VU) includes causing a computer infrastructure to: render an ephemeral location upon a triggering in the VU; teleport a VU user avatar to the ephemeral location; permit the user avatar to interact in the ephemeral location; teleport the user avatar out of the ephemeral location; and un-render the ephemeral location.
    Type: Grant
    Filed: May 1, 2017
    Date of Patent: March 27, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rick A. Hamilton, II, Brian M. O'Connell, Clifford A. Pickover, Anne R. Sand, Keith R. Walker
  • Publication number: 20180083989
    Abstract: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.
    Type: Application
    Filed: November 30, 2017
    Publication date: March 22, 2018
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M.H. Magro
  • Patent number: 9923908
    Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
    Type: Grant
    Filed: April 29, 2015
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Publication number: 20180073878
    Abstract: An approach for determining a route is provided. A rule is retrieved which indicates a number of recommended routes passing through a constrained area is not permitted to exceed a threshold. N+1 recommended routes passing through the constrained area are determined. Based in part on a determination that N+1 does not exceed the threshold, an (N+2)-th route passing through the constrained area is determined. It is determined that (N+2) is greater than the threshold. Responsive to determining that N+2 is greater than the threshold, the constrained area is identified as having congested traffic, the (N+2)-th route is determined to pass through the constrained area having congested traffic, and a fee is determined to charge a vendor whose location is included in the (N+2)-th route. The fee promotes a reduction in additional vehicles entering the constrained area.
    Type: Application
    Filed: November 15, 2017
    Publication date: March 15, 2018
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jacquelyn A. Martino, Clifford A. Pickover, Anne R. Sand
  • Publication number: 20180067730
    Abstract: An approach for integrated development environment (IDE)-based program code library searching and selection in multiple programming languages in a networked computing environment is provided. In a typical embodiment, a search request (e.g., to locate a desired program code library) will be received in an IDE and parsed. The search request generally includes a set of annotations corresponding to at least one of: a primary program code language of the program code library, an alternate program code language of the program code library, or a method pair associated with the program code library. A search of at least one program code library repository will then be conducted based on the set of annotations, and a set of matching results will be generated. The set of matching results may include one or more program code libraries, and may be provided to a device hosting the IDE.
    Type: Application
    Filed: November 9, 2017
    Publication date: March 8, 2018
    Inventors: Swaminathan Balasubramanian, Rick A. Hamilton, II, Brian M. O'Connell, Keith R. Walker
  • Publication number: 20180069858
    Abstract: In an approach for sending a media list to a transportation vehicle for a user, a processor determines a media list for travel for a user, wherein the media list includes at least one media content item, and wherein the media list has associated access credentials that are set by the user. A processor receives a travel reservation for the user, wherein the travel reservation includes, at least, a departure location and a destination location. A processor determines a transportation vehicle associated with the travel reservation. A processor receives the access credentials to the media list. A processor uses the access credentials to access the media list. A processor send the media list to the transportation vehicle, wherein the media list is associated with the user, and wherein the media list is accessible to the user.
    Type: Application
    Filed: September 8, 2016
    Publication date: March 8, 2018
    Inventors: Keyur D. Dalal, Galina Grunin, Rick A. Hamilton, II, Alan W. Newman
  • Publication number: 20180069863
    Abstract: In an approach for sending a media list to a transportation vehicle for a user, a processor determines a media list for travel for a user, wherein the media list includes at least one media content item, and wherein the media list has associated access credentials that are set by the user. A processor receives a travel reservation for the user, wherein the travel reservation includes, at least, a departure location and a destination location. A processor determines a transportation vehicle associated with the travel reservation. A processor receives the access credentials to the media list. A processor uses the access credentials to access the media list. A processor send the media list to the transportation vehicle, wherein the media list is associated with the user, and wherein the media list is accessible to the user.
    Type: Application
    Filed: September 7, 2017
    Publication date: March 8, 2018
    Inventors: Keyur D. Dalal, Galina Grunin, Rick A. Hamilton, II, Alan W. Newman
  • Patent number: 9911282
    Abstract: A system for detecting inappropriate content in a virtual world environment has, and a corresponding method utilizes, a rating unit for rating each of one or more virtual objects based upon its content. The system has, and the method utilizes, a tagging unit for tagging each of the one or more virtual objects with its respective rating, an object tagging database for storing ratings of the one or more virtual objects, and a policy database for storing policies associated with the ratings and the regions. Further, the system has, and the method utilizes, an object monitor for monitoring the movement of each of the one or more virtual objects, a security scanner for scanning each of the one or more virtual objects to determine the rating of each of the one or more virtual objects, and an enforcement module to enforce the policies of the policy database based upon the rating and the respective region.
    Type: Grant
    Filed: July 18, 2016
    Date of Patent: March 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Neal J. Alewine, Rick A. Hamilton, II, Robert A. Hood, James W. Seaman
  • Patent number: 9912703
    Abstract: A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security compliance frame work, access to an authoritative source component of the compliance framework, and access to a data store component of the compliance framework. A functionality status of the security compliance framework and a request associated with contents of the data store are presented to a user via a dashboard interface. In response, the request is triggered and associated results are generated.
    Type: Grant
    Filed: June 15, 2017
    Date of Patent: March 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rick A. Hamilton, II, Heather M. Hinton, Darren J. Moore, Neil Toussaint
  • Patent number: 9909885
    Abstract: An approach for determining a route is provided. A rule is retrieved, which indicates a number of recommended routes passing through a constrained area is not permitted to exceed a threshold. After a receipt of N requests from N respective users for N routes, N recommended routes passing through the constrained area are determined and presented to the N users. After determining the N recommended routes and based on a receipt of a request from an (N+1)-th user for an (N+1)-th route, the (N+1)-th route, which passes through the constrained area, is determined. Based on the retrieved rule and the (N+1)-th route passing through the constrained area, N+1 is determined to not exceed the second number. Responsive to determining N+1 does not exceed the threshold, the (N+1)-th route is designated as an (N+1)-th recommended route.
    Type: Grant
    Filed: July 15, 2015
    Date of Patent: March 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jacquelyn A. Martino, Clifford A. Pickover, Anne R. Sand
  • Patent number: 9904442
    Abstract: A settings controller outputs a settings interface through which a user may select from among multiple selectable options to specify one or more data associations in databases accessed by an asset location controller to selectively assign a detected user interaction in another world to a displayable rendering in a virtual world based on a selection of the one or more data associations applicable to the detected user interaction and the virtual world. The settings controller, responsive to a user selecting, through the settings interface, one or more particular selectable options to enter one or more particular data associations for one or more particular databases, assigns the one or more particular data associations to the one or more particular databases for specifying the displayable rendering of the detected user interaction in the another world to the displayable rendering in the virtual world.
    Type: Grant
    Filed: July 30, 2015
    Date of Patent: February 27, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rick A Hamilton, II, James R Kozloski, Brian M O'Connell, Clifford A Pickover, Keith R Walker
  • Publication number: 20180052970
    Abstract: Approaches presented herein enable identifying an individual exposed to an illness carried by another individual by securely tracking interactions between individuals and using this information during a public health emergency to alert a public health authority and/or individuals who might be at risk of exposure to an illness. Specifically, a first mobile device of a user detects a second mobile device of another individual via low-energy radio frequency communication. The first device records contact data, including an identification of the second device, a distance between the devices, and a duration that the devices are within a specified distance from one another, and then encrypts and stores this contact data. In response to a public health emergency, the first device conducts an exposure analysis of the stored set of data using distance and duration thresholds to determine if the user came into contact with an individual carrying an illness.
    Type: Application
    Filed: August 16, 2016
    Publication date: February 22, 2018
    Inventors: Gregory J. Boss, Peter G. Finn, Rick A. Hamilton, II, James R. Kozloski
  • Patent number: 9900750
    Abstract: Communicating with isolated mobile devices in indoor positioning systems is provided. Information is received from a first mobile device connected to both a first network of a designated environment and a second mobile device that is not connected to the first network. The information includes one or more identifiers of the second mobile device. An estimated location of the second mobile device is determined based, at least in part, on the information received from the first mobile device.
    Type: Grant
    Filed: February 16, 2017
    Date of Patent: February 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Lambert S. Berentsen, Gregory J. Boss, Rick A. Hamilton, II, James R. Kozloski
  • Publication number: 20180046510
    Abstract: Systems and methods for resolving application multitasking degradation are disclosed. In aspects, a computer implemented method is used with a user device including a multitasking operating system, shared user device resources, a first application and a second application. The method includes: running, simultaneously, the first application and the second application; measuring performance parameters for one or more application tasks of the first and second applications; and determining that one or more of the performance parameters of the one or more application tasks falls below a performance threshold value of an associated key performance indicator (KPI). The determination indicates degradation in performance of at least one of the first application and second application. The method further includes instructing the operating system to modify an allocation of the shared user device resources to address the degradation in performance of the at least one of the first application and second application.
    Type: Application
    Filed: August 12, 2016
    Publication date: February 15, 2018
    Inventors: Gregory J. Boss, Christopher J. Dawson, Rick A. Hamilton, II, Ninad D. Sathaye
  • Patent number: 9891896
    Abstract: An approach for integrated development environment (IDE)-based program code library searching and selection in multiple programming languages in a networked computing environment is provided. In a typical embodiment, a search request (e.g., to locate a desired program code library) will be received in an IDE and parsed. The search request generally includes a set of annotations corresponding to at least one of: a primary program code language of the program code library, an alternate program code language of the program code library, or a method pair associated with the program code library. A search of at least one program code library repository will then be conducted based on the set of annotations, and a set of matching results will be generated. The set of matching results may include one or more program code libraries, and may be provided to a device hosting the IDE.
    Type: Grant
    Filed: January 27, 2017
    Date of Patent: February 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Rick A. Hamilton, II, Brian M. O'Connell, Keith R. Walker
  • Patent number: 9894086
    Abstract: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: February 13, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Patent number: 9894145
    Abstract: In response to a teleport request, teleport destination characteristics are determined and compared against preferences, characteristics and restrictions of an avatar as indicated by metadata or tags to determine if the teleport destination is suitable for teleportation of that avatar. If the destination is found unsuitable, a search is conducted, preferably based on unmatched metadata of the avatar or the destination to suggest or directly substitute a suitable teleportation destination. Metadata for the avatar and the destination can include metadata which is dynamic (such as destination occupancy or processing capacity) adaptively developed or based on current or historical usage and virtual universe system status.
    Type: Grant
    Filed: September 9, 2014
    Date of Patent: February 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Dawson, Barry M. Graham, Rick A. Hamilton, II, Clifford A. Pickover
  • Publication number: 20180033314
    Abstract: A method and system for automatically controlling a vehicle is provided. The method includes generating an original route of travel for a first vehicle for travel from an original location to a destination location. The vehicle is directed from the original location to the destination location such that the vehicle initiates motion and navigates the original route of travel towards the destination location in accordance with the original route of travel. Monitored vehicular attributes of the first vehicle are received and environmental attributes associated with the original route of travel are monitored with respect the first vehicle. Navigational issues associated with the vehicle traveling along the original route of travel are determined based on the monitored vehicular attributes and results of monitoring the environmental attributes. The navigational issues are used to determine if the vehicle should continue to travel along the original route of travel.
    Type: Application
    Filed: July 28, 2016
    Publication date: February 1, 2018
    Inventors: Gregory J. Boss, Luis C. Cruz Huertas, Rick A. Hamilton, II, Edgar A. Zamora Duran
  • Patent number: 9882961
    Abstract: A system and method for abstracting objects in a virtual universe (VU) deployment is provided. The system and method abstracts VU objects for editing in a common abstraction utility and for deploying to one or more VU grids containing one or more VU architectures and/or platforms (servers). The method can be implemented in a computer infrastructure having programming instructions operable to: obtain an object associated with a first virtual universe server; translate the object with syntax specific to at least a second virtual universe server, the syntax being different than that used with the first virtual universe server; and deploy the translated object to the second virtual universe server.
    Type: Grant
    Filed: May 9, 2013
    Date of Patent: January 30, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ankur Chandra, Rick A. Hamilton, II, Nalini K. Kartha, Keith R. Walker