Patents by Inventor Stephen Viselli
Stephen Viselli has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10834133Abstract: A technique to enforce mobile device security policy is based on a “risk profile” of the individual device, where the risk profile is fine-grained and based on the types of applications installed on the device, the services they are accessing, and the operation(s) the user granted the device authorization to perform. Thus, the approach takes into account not only the actual applications installed on the device (and those actively in use), but also the services those applications are accessing, and the scope of operations the user has granted the device authorization to perform. By combining this information to create the risk profile, a suitable security policy, including one that does not unnecessarily degrade device usability, may then be applied.Type: GrantFiled: December 4, 2012Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Simon Gilbert Canning, David Paul Moore, Shane Bradley Weeden, Stephen Viselli
-
Patent number: 10114720Abstract: Power usage is estimated in a computing environment by automatically detecting hardware configuration information by use of a software agent that is translated into power consumption information for implementing a plurality of power estimation models for efficient power consumption and utilization.Type: GrantFiled: October 29, 2013Date of Patent: October 30, 2018Assignee: International Business Machines CorporationInventors: Josephine F. Bayang, Valerio Bellizia, Michael Gaertner, Dillon H. Ginley, Diana J. Hellman, Jeffrey O. Kephart, Attila Kollar, James K. MacKenzie, Wayne B. Riley, Srinivasarao Siddabattini, Stephen Viselli
-
Patent number: 10114719Abstract: Power usage is estimated in a computing environment by automatically detecting hardware configuration information by use of a software agent that is translated into power consumption information for implementing a plurality of power estimation models for efficient power consumption and utilization.Type: GrantFiled: February 21, 2013Date of Patent: October 30, 2018Assignee: International Business Machines CorporationInventors: Josephine F. Bayang, Valerio Bellizia, Michael Gaertner, Dillon H. Ginley, Diana J. Hellman, Jeffrey O. Kephart, Attila Kollar, James K. MacKenzie, Wayne B. Riley, Srinivasarao Siddabattini, Stephen Viselli
-
Patent number: 9172694Abstract: An approach is provided to access resources at legacy systems. In this approach, a resource request destined to a legacy system is receiving from a requestor with the resource request including an access token and being on behalf of a resource owner. A validation process is performed on the access token. If the access token is valid, the approach identifies the resource owner and one or more legacy access tokens used to access the legacy system. Another request is formed with the new request including the legacy access tokens. The new request is transmitted to the legacy system and a response is received back from the legacy system. The response received from the legacy system is transmitted back to the requestor.Type: GrantFiled: May 22, 2012Date of Patent: October 27, 2015Assignee: International Business Machines CorporationInventors: Simon Gilbert Canning, Neil Ian Readshaw, Stephen Viselli, Shane Bradley Weeden
-
Publication number: 20140237269Abstract: Power usage is estimated in a computing environment by automatically detecting hardware configuration information by use of a software agent that is translated into power consumption information for implementing a plurality of power estimation models for efficient power consumption and utilization.Type: ApplicationFiled: October 29, 2013Publication date: August 21, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Josephine F. BAYANG, Valerio BELLIZIA, Michael GAERTNER, Dillon H. GINLEY, Diana J. HELLMAN, Jeffrey O. KEPHART, Attila KOLLAR, James K. MACKENZIE, Wayne B. RILEY, Srinivasarao SIDDABATTINI, Stephen VISELLI
-
Publication number: 20140237283Abstract: Power usage is estimated in a computing environment by automatically detecting hardware configuration information by use of a software agent that is translated into power consumption information for implementing a plurality of power estimation models for efficient power consumption and utilization.Type: ApplicationFiled: February 21, 2013Publication date: August 21, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Josephine F. BAYANG, Valerio BELLIZIA, Michael GAERTNER, Dillon H. GINLEY, Diana J. HELLMAN, Jeffrey O. KEPHART, Attila KOLLAR, James K. MACKENZIE, Wayne B. RILEY, Srinivasarao SIDDABATTINI, Stephen VISELLI
-
Publication number: 20140157351Abstract: A technique to enforce mobile device security policy is based on a “risk profile” of the individual device, where the risk profile is fine-grained and based on the types of applications installed on the device, the services they are accessing, and the operation(s) the user granted the device authorization to perform. Thus, the approach takes into account not only the actual applications installed on the device (and those actively in use), but also the services those applications are accessing, and the scope of operations the user has granted the device authorization to perform. By combining this information to create the risk profile, a suitable security policy, including one that does not unnecessarily degrade device usability, may then be applied.Type: ApplicationFiled: December 4, 2012Publication date: June 5, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Simon Gilbert Canning, David Paul Moore, Shane Bradley Weeden, Stephen Viselli
-
Publication number: 20130318569Abstract: An approach is provided to access resources at legacy systems. In this approach, a resource request destined to a legacy system is receiving from a requestor with the resource request including an access token and being on behalf of a resource owner. A validation process is performed on the access token. If the access token is valid, the approach identifies the resource owner and one or more legacy access tokens used to access the legacy system. Another request is formed with the new request including the legacy access tokens. The new request is transmitted to the legacy system and a response is received back from the legacy system. The response received from the legacy system is transmitted back to the requestor.Type: ApplicationFiled: May 22, 2012Publication date: November 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Simon Gilbert Canning, Neil Ian Readshaw, Stephen Viselli, Shane Bradley Weeden
-
Patent number: 8447857Abstract: An approach is provided where an HTTP request is received and a Request for Security Token (RST) is created. Parameters are selected from the request and mappings are retrieved corresponding to the parameters. Context attributes are created in the RST corresponding to the parameters. A context attribute type value is set based on an HTTP section where the parameter is located within the HTTP request. The RST is sent to a security token service for processing. In another approach, a Request Security Token Response (RSTR) is received and an HTTP response is created. RSTR parameters are selected and parameter mappings are retrieved corresponding to the selected RSTR parameters from a mapping table with a TYPE value being identified based on the retrieved parameter mapping. Context attributes are added to the HTTP response based on the identified TYPE values. The HTTP response is transmitted to a remote computer system.Type: GrantFiled: March 25, 2011Date of Patent: May 21, 2013Assignee: International Business Machines CorporationInventors: Scott Anthony Exton, Davin John Holmes, Stephen Viselli, Shane Bradley Weeden
-
Publication number: 20120246312Abstract: An approach is provided where an HTTP request is received and a Request for Security Token (RST) is created. Parameters are selected from the request and mappings are retrieved corresponding to the parameters. Context attributes are created in the RST corresponding to the parameters. A context attribute type value is set based on an HTTP section where the parameter is located within the HTTP request. The RST is sent to a security token service for processing. In another approach, a Request Security Token Response (RSTR) is received and an HTTP response is created. RSTR parameters are selected and parameter mappings are retrieved corresponding to the selected RSTR parameters from a mapping table with a TYPE value being identified based on the retrieved parameter mapping. Context attributes are added to the HTTP response based on the identified TYPE values. The HTTP response is transmitted to a remote computer system.Type: ApplicationFiled: March 25, 2011Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott Anthony Exton, Davin John Holmes, Stephen Viselli, Shane Bradley Weeden