Patents by Inventor Rick A. Hamilton, II
Rick A. Hamilton, II has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9929913Abstract: Methods, computer program products, and systems are presented. Data characteristics describing data from IoT devices are identified. Data profiles representing the IoT devices are generated. The data profiles are grouped into data profile groupings based on one or more of analytics and machine learning. A mapping of the data profile groupings to virtual servers is determined.Type: GrantFiled: March 28, 2016Date of Patent: March 27, 2018Assignee: International Business Machines CorporationInventors: Christopher J. Dawson, Eli M. Dow, Rick A. Hamilton, II, Jenny S. Li
-
Patent number: 9928528Abstract: Systems and methods for advertising, and, more particularly, systems and methods for managing ephemeral locations in a virtual universe. A method for managing ephemeral locations in a virtual universe (VU) includes causing a computer infrastructure to: render an ephemeral location upon a triggering in the VU; teleport a VU user avatar to the ephemeral location; permit the user avatar to interact in the ephemeral location; teleport the user avatar out of the ephemeral location; and un-render the ephemeral location.Type: GrantFiled: May 1, 2017Date of Patent: March 27, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rick A. Hamilton, II, Brian M. O'Connell, Clifford A. Pickover, Anne R. Sand, Keith R. Walker
-
Publication number: 20180083989Abstract: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.Type: ApplicationFiled: November 30, 2017Publication date: March 22, 2018Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M.H. Magro
-
Patent number: 9923908Abstract: Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.Type: GrantFiled: April 29, 2015Date of Patent: March 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
-
Publication number: 20180073878Abstract: An approach for determining a route is provided. A rule is retrieved which indicates a number of recommended routes passing through a constrained area is not permitted to exceed a threshold. N+1 recommended routes passing through the constrained area are determined. Based in part on a determination that N+1 does not exceed the threshold, an (N+2)-th route passing through the constrained area is determined. It is determined that (N+2) is greater than the threshold. Responsive to determining that N+2 is greater than the threshold, the constrained area is identified as having congested traffic, the (N+2)-th route is determined to pass through the constrained area having congested traffic, and a fee is determined to charge a vendor whose location is included in the (N+2)-th route. The fee promotes a reduction in additional vehicles entering the constrained area.Type: ApplicationFiled: November 15, 2017Publication date: March 15, 2018Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jacquelyn A. Martino, Clifford A. Pickover, Anne R. Sand
-
Publication number: 20180067730Abstract: An approach for integrated development environment (IDE)-based program code library searching and selection in multiple programming languages in a networked computing environment is provided. In a typical embodiment, a search request (e.g., to locate a desired program code library) will be received in an IDE and parsed. The search request generally includes a set of annotations corresponding to at least one of: a primary program code language of the program code library, an alternate program code language of the program code library, or a method pair associated with the program code library. A search of at least one program code library repository will then be conducted based on the set of annotations, and a set of matching results will be generated. The set of matching results may include one or more program code libraries, and may be provided to a device hosting the IDE.Type: ApplicationFiled: November 9, 2017Publication date: March 8, 2018Inventors: Swaminathan Balasubramanian, Rick A. Hamilton, II, Brian M. O'Connell, Keith R. Walker
-
Publication number: 20180069858Abstract: In an approach for sending a media list to a transportation vehicle for a user, a processor determines a media list for travel for a user, wherein the media list includes at least one media content item, and wherein the media list has associated access credentials that are set by the user. A processor receives a travel reservation for the user, wherein the travel reservation includes, at least, a departure location and a destination location. A processor determines a transportation vehicle associated with the travel reservation. A processor receives the access credentials to the media list. A processor uses the access credentials to access the media list. A processor send the media list to the transportation vehicle, wherein the media list is associated with the user, and wherein the media list is accessible to the user.Type: ApplicationFiled: September 8, 2016Publication date: March 8, 2018Inventors: Keyur D. Dalal, Galina Grunin, Rick A. Hamilton, II, Alan W. Newman
-
Publication number: 20180069863Abstract: In an approach for sending a media list to a transportation vehicle for a user, a processor determines a media list for travel for a user, wherein the media list includes at least one media content item, and wherein the media list has associated access credentials that are set by the user. A processor receives a travel reservation for the user, wherein the travel reservation includes, at least, a departure location and a destination location. A processor determines a transportation vehicle associated with the travel reservation. A processor receives the access credentials to the media list. A processor uses the access credentials to access the media list. A processor send the media list to the transportation vehicle, wherein the media list is associated with the user, and wherein the media list is accessible to the user.Type: ApplicationFiled: September 7, 2017Publication date: March 8, 2018Inventors: Keyur D. Dalal, Galina Grunin, Rick A. Hamilton, II, Alan W. Newman
-
Patent number: 9911282Abstract: A system for detecting inappropriate content in a virtual world environment has, and a corresponding method utilizes, a rating unit for rating each of one or more virtual objects based upon its content. The system has, and the method utilizes, a tagging unit for tagging each of the one or more virtual objects with its respective rating, an object tagging database for storing ratings of the one or more virtual objects, and a policy database for storing policies associated with the ratings and the regions. Further, the system has, and the method utilizes, an object monitor for monitoring the movement of each of the one or more virtual objects, a security scanner for scanning each of the one or more virtual objects to determine the rating of each of the one or more virtual objects, and an enforcement module to enforce the policies of the policy database based upon the rating and the respective region.Type: GrantFiled: July 18, 2016Date of Patent: March 6, 2018Assignee: International Business Machines CorporationInventors: Neal J. Alewine, Rick A. Hamilton, II, Robert A. Hood, James W. Seaman
-
Patent number: 9912703Abstract: A method and system for improving usage of a security compliance framework is provided. The method includes authenticating a user for: access to the security compliance frame work, access to an authoritative source component of the compliance framework, and access to a data store component of the compliance framework. A functionality status of the security compliance framework and a request associated with contents of the data store are presented to a user via a dashboard interface. In response, the request is triggered and associated results are generated.Type: GrantFiled: June 15, 2017Date of Patent: March 6, 2018Assignee: International Business Machines CorporationInventors: Rick A. Hamilton, II, Heather M. Hinton, Darren J. Moore, Neil Toussaint
-
Patent number: 9909885Abstract: An approach for determining a route is provided. A rule is retrieved, which indicates a number of recommended routes passing through a constrained area is not permitted to exceed a threshold. After a receipt of N requests from N respective users for N routes, N recommended routes passing through the constrained area are determined and presented to the N users. After determining the N recommended routes and based on a receipt of a request from an (N+1)-th user for an (N+1)-th route, the (N+1)-th route, which passes through the constrained area, is determined. Based on the retrieved rule and the (N+1)-th route passing through the constrained area, N+1 is determined to not exceed the second number. Responsive to determining N+1 does not exceed the threshold, the (N+1)-th route is designated as an (N+1)-th recommended route.Type: GrantFiled: July 15, 2015Date of Patent: March 6, 2018Assignee: International Business Machines CorporationInventors: Gregory J. Boss, Rick A. Hamilton, II, Jacquelyn A. Martino, Clifford A. Pickover, Anne R. Sand
-
Patent number: 9904442Abstract: A settings controller outputs a settings interface through which a user may select from among multiple selectable options to specify one or more data associations in databases accessed by an asset location controller to selectively assign a detected user interaction in another world to a displayable rendering in a virtual world based on a selection of the one or more data associations applicable to the detected user interaction and the virtual world. The settings controller, responsive to a user selecting, through the settings interface, one or more particular selectable options to enter one or more particular data associations for one or more particular databases, assigns the one or more particular data associations to the one or more particular databases for specifying the displayable rendering of the detected user interaction in the another world to the displayable rendering in the virtual world.Type: GrantFiled: July 30, 2015Date of Patent: February 27, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rick A Hamilton, II, James R Kozloski, Brian M O'Connell, Clifford A Pickover, Keith R Walker
-
Publication number: 20180052970Abstract: Approaches presented herein enable identifying an individual exposed to an illness carried by another individual by securely tracking interactions between individuals and using this information during a public health emergency to alert a public health authority and/or individuals who might be at risk of exposure to an illness. Specifically, a first mobile device of a user detects a second mobile device of another individual via low-energy radio frequency communication. The first device records contact data, including an identification of the second device, a distance between the devices, and a duration that the devices are within a specified distance from one another, and then encrypts and stores this contact data. In response to a public health emergency, the first device conducts an exposure analysis of the stored set of data using distance and duration thresholds to determine if the user came into contact with an individual carrying an illness.Type: ApplicationFiled: August 16, 2016Publication date: February 22, 2018Inventors: Gregory J. Boss, Peter G. Finn, Rick A. Hamilton, II, James R. Kozloski
-
Patent number: 9900750Abstract: Communicating with isolated mobile devices in indoor positioning systems is provided. Information is received from a first mobile device connected to both a first network of a designated environment and a second mobile device that is not connected to the first network. The information includes one or more identifiers of the second mobile device. An estimated location of the second mobile device is determined based, at least in part, on the information received from the first mobile device.Type: GrantFiled: February 16, 2017Date of Patent: February 20, 2018Assignee: International Business Machines CorporationInventors: Lambert S. Berentsen, Gregory J. Boss, Rick A. Hamilton, II, James R. Kozloski
-
Publication number: 20180046510Abstract: Systems and methods for resolving application multitasking degradation are disclosed. In aspects, a computer implemented method is used with a user device including a multitasking operating system, shared user device resources, a first application and a second application. The method includes: running, simultaneously, the first application and the second application; measuring performance parameters for one or more application tasks of the first and second applications; and determining that one or more of the performance parameters of the one or more application tasks falls below a performance threshold value of an associated key performance indicator (KPI). The determination indicates degradation in performance of at least one of the first application and second application. The method further includes instructing the operating system to modify an allocation of the shared user device resources to address the degradation in performance of the at least one of the first application and second application.Type: ApplicationFiled: August 12, 2016Publication date: February 15, 2018Inventors: Gregory J. Boss, Christopher J. Dawson, Rick A. Hamilton, II, Ninad D. Sathaye
-
Patent number: 9891896Abstract: An approach for integrated development environment (IDE)-based program code library searching and selection in multiple programming languages in a networked computing environment is provided. In a typical embodiment, a search request (e.g., to locate a desired program code library) will be received in an IDE and parsed. The search request generally includes a set of annotations corresponding to at least one of: a primary program code language of the program code library, an alternate program code language of the program code library, or a method pair associated with the program code library. A search of at least one program code library repository will then be conducted based on the set of annotations, and a set of matching results will be generated. The set of matching results may include one or more program code libraries, and may be provided to a device hosting the IDE.Type: GrantFiled: January 27, 2017Date of Patent: February 13, 2018Assignee: International Business Machines CorporationInventors: Swaminathan Balasubramanian, Rick A. Hamilton, II, Brian M. O'Connell, Keith R. Walker
-
Patent number: 9894086Abstract: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.Type: GrantFiled: August 30, 2016Date of Patent: February 13, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
-
Patent number: 9894145Abstract: In response to a teleport request, teleport destination characteristics are determined and compared against preferences, characteristics and restrictions of an avatar as indicated by metadata or tags to determine if the teleport destination is suitable for teleportation of that avatar. If the destination is found unsuitable, a search is conducted, preferably based on unmatched metadata of the avatar or the destination to suggest or directly substitute a suitable teleportation destination. Metadata for the avatar and the destination can include metadata which is dynamic (such as destination occupancy or processing capacity) adaptively developed or based on current or historical usage and virtual universe system status.Type: GrantFiled: September 9, 2014Date of Patent: February 13, 2018Assignee: International Business Machines CorporationInventors: Christopher J. Dawson, Barry M. Graham, Rick A. Hamilton, II, Clifford A. Pickover
-
Publication number: 20180033314Abstract: A method and system for automatically controlling a vehicle is provided. The method includes generating an original route of travel for a first vehicle for travel from an original location to a destination location. The vehicle is directed from the original location to the destination location such that the vehicle initiates motion and navigates the original route of travel towards the destination location in accordance with the original route of travel. Monitored vehicular attributes of the first vehicle are received and environmental attributes associated with the original route of travel are monitored with respect the first vehicle. Navigational issues associated with the vehicle traveling along the original route of travel are determined based on the monitored vehicular attributes and results of monitoring the environmental attributes. The navigational issues are used to determine if the vehicle should continue to travel along the original route of travel.Type: ApplicationFiled: July 28, 2016Publication date: February 1, 2018Inventors: Gregory J. Boss, Luis C. Cruz Huertas, Rick A. Hamilton, II, Edgar A. Zamora Duran
-
Patent number: 9882961Abstract: A system and method for abstracting objects in a virtual universe (VU) deployment is provided. The system and method abstracts VU objects for editing in a common abstraction utility and for deploying to one or more VU grids containing one or more VU architectures and/or platforms (servers). The method can be implemented in a computer infrastructure having programming instructions operable to: obtain an object associated with a first virtual universe server; translate the object with syntax specific to at least a second virtual universe server, the syntax being different than that used with the first virtual universe server; and deploy the translated object to the second virtual universe server.Type: GrantFiled: May 9, 2013Date of Patent: January 30, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ankur Chandra, Rick A. Hamilton, II, Nalini K. Kartha, Keith R. Walker