Patents by Inventor Scott M. Andrews
Scott M. Andrews has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180262534Abstract: A policy enforcement point includes fraud prevention information associated with devices and/or users which is collected from: (i) many cloud fraud services located in the cloud; and/or (ii) authorization processing of users and/or devices. The policy enforcement point is consulted when a user/device undergoes authorization processing for a transaction with an application (for example, an application that serves protected content such as financial records, email, etc.). Fraud prevention information is added to session data, associated with the attempted authorization to the application, for the user/device as the user/device proceeds its attempted authorization to the application. In some cases, the authorization to the application may be refused based on the data added to the session data by the policy enforcement point or the policy enforcement point will propagate fraud prevention information to the application to make the decision.Type: ApplicationFiled: May 11, 2018Publication date: September 13, 2018Inventors: Scott M. Andrews, Timothy J. Ashton, Leigh Doddy, Christopher J. Hockings, Trevor S. Norvill
-
Patent number: 10063593Abstract: A policy enforcement point includes fraud prevention information associated with devices and/or users which is collected from: (i) many cloud fraud services located in the cloud; and/or (ii) authorization processing of users and/or devices. The policy enforcement point is consulted when a user/device undergoes authorization processing for a transaction with an application (for example, an application that serves protected content such as financial records, email, etc.). Fraud prevention information is added to session data, associated with the attempted authorization to the application, for the user/device as the user/device proceeds its attempted authorization to the application. In some cases, the authorization to the application may be refused based on the data added to the session data by the policy enforcement point or the policy enforcement point will propagate fraud prevention information to the application to make the decision.Type: GrantFiled: December 29, 2015Date of Patent: August 28, 2018Assignee: International Business Machines CorporationInventors: Scott M. Andrews, Timothy J. Ashton, Leigh Doddy, Christopher J. Hockings, Trevor S. Norvill
-
Patent number: 10038690Abstract: A first user request may be received to access a particular resource. A first authentication credential from a first client device may be received based on a first authentication challenge being issued to a user of the first client device. A second client device of the user may be notified to prompt the user to provide a second authentication credential to complete at least a second authentication challenge. The access to the particular resource may require at least successfully completing the first authentication challenge on the first client device and the second authentication challenge on the second client device.Type: GrantFiled: May 31, 2016Date of Patent: July 31, 2018Assignee: International Business Machines CorporationInventors: Scott M. Andrews, Christopher J. Hockings, Sumana Srinath Narasipur, Codur Sreedhar Pranam
-
Publication number: 20170346815Abstract: A first user request may be received to access a particular resource. A first authentication credential from a first client device may be received based on a first authentication challenge being issued to a user of the first client device. A second client device of the user may be notified to prompt the user to provide a second authentication credential to complete at least a second authentication challenge. The access to the particular resource may require at least successfully completing the first authentication challenge on the first client device and the second authentication challenge on the second client device.Type: ApplicationFiled: May 31, 2016Publication date: November 30, 2017Inventors: Scott M. Andrews, Christopher J. Hockings, Sumana Srinath Narasipur, Codur Sreedhar Pranam
-
Publication number: 20170187751Abstract: A policy enforcement point includes fraud prevention information associated with devices and/or users which is collected from: (i) many cloud fraud services located in the cloud; and/or (ii) authorization processing of users and/or devices. The policy enforcement point is consulted when a user/device undergoes authorization processing for a transaction with an application (for example, an application that serves protected content such as financial records, email, etc.). Fraud prevention information is added to session data, associated with the attempted authorization to the application, for the user/device as the user/device proceeds its attempted authorization to the application. In some cases, the authorization to the application may be refused based on the data added to the session data by the policy enforcement point or the policy enforcement point will propagate fraud prevention information to the application to make the decision.Type: ApplicationFiled: December 29, 2015Publication date: June 29, 2017Inventors: Scott M. Andrews, Timothy J. Ashton, Leigh Doddy, Christopher J. Hockings, Trevor S. Norvill
-
Patent number: 8692114Abstract: A wiring harness conduit shield assembly that provides shield continuity for a transition from one or more main wire bundle conduits into two or more wire bundle conduit branches. The assembly includes a pre-branch shield sock disposed over at least one main wire bundle conduit and two or more post-branch shield socks, one each disposed around each of the wire bundle conduit branches. An interconnect ring is coaxially disposed around the main wire bundle conduit at the branching point, and the post-branch shield socks have a tail portion that is disposed over the outer surface of the interconnect ring. The pre-branch shield sock is likewise disposed over the interconnect ring, overlapping the tail portions, and a retaining ring is tightly placed over both to clamp them onto the interconnect ring in metal-to-metal contact with one another so as to create shield continuity between the pre-branch shield sock and the post-branch shield socks.Type: GrantFiled: June 27, 2011Date of Patent: April 8, 2014Inventors: Lucian Popescu, Dennis L. Baney, Scott M. Andrews
-
Patent number: 8681780Abstract: An electronically authenticated internet voice connection can be initiated on an institution's website. Authentication of the customer's identity can be determined based upon already established credentials, such as a username and password. Upon verifying the identity of the customer, the institution's web server can generate and transmit a unique identifier to the customer's browser. The unique identifier can be an encrypted identifier used to authenticate the customer when establishing a subsequent voice connection.Type: GrantFiled: February 12, 2009Date of Patent: March 25, 2014Assignee: International Business Machines CorporationInventors: Scott M. Andrews, Anthony B. Ferguson, David P. Moore, John T. Robertson
-
Publication number: 20140076628Abstract: A rigidified flexible cable including flexible portions and one or more rigid segments, including a primary flexible cable with ends and end fittings, and at least one rigid medial section integral with the flexible portion and formed by coating the flexible cable material with a composite matrix material. Lateral transitions can be incorporated into the cable run and customized to the installation site specifications.Type: ApplicationFiled: March 11, 2013Publication date: March 20, 2014Applicant: ICORE INTERNATIONAL, INC.Inventors: Mark McGrath, Gregory S. Baeder, Scott M. Andrews
-
Publication number: 20120325360Abstract: A rigidified flexible conduit for a conduit run having a predetermined configuration and length, the apparatus including a flexible conduit having a first end and a second end, end fittings disposed at each end, composite bends as required at the ends, at least one rigid medial section disposed in the flexible conduit, and at least one multiple leg transition. The rigid medial section and composite bends, and the multiple leg transitions, if any, are formed from the flexible conduit and an applied coating of a composite matrix material.Type: ApplicationFiled: June 8, 2012Publication date: December 27, 2012Applicant: ICORE INTERNATIONAL, INC.Inventors: Mark McGrath, Gregory S. Baeder, Scott M. Andrews
-
Publication number: 20100202596Abstract: An electronically authenticated internet voice connection can be initiated on an institution's website. Authentication of the customer's identity can be determined based upon already established credentials, such as a username and password. Upon verifying the identity of the customer, the institution's web server can generate and transmit a unique identifier to the customer's browser. The unique identifier can be an encrypted identifier used to authenticate the customer when establishing a subsequent voice connection.Type: ApplicationFiled: February 12, 2009Publication date: August 12, 2010Applicant: International Business Machines CorporationInventors: Scott M. Andrews, Anthony B. Ferguson, David P. Moore, John T. Robertson