Patents by Inventor Stephen Viselli

Stephen Viselli has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10834133
    Abstract: A technique to enforce mobile device security policy is based on a “risk profile” of the individual device, where the risk profile is fine-grained and based on the types of applications installed on the device, the services they are accessing, and the operation(s) the user granted the device authorization to perform. Thus, the approach takes into account not only the actual applications installed on the device (and those actively in use), but also the services those applications are accessing, and the scope of operations the user has granted the device authorization to perform. By combining this information to create the risk profile, a suitable security policy, including one that does not unnecessarily degrade device usability, may then be applied.
    Type: Grant
    Filed: December 4, 2012
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Simon Gilbert Canning, David Paul Moore, Shane Bradley Weeden, Stephen Viselli
  • Patent number: 10114720
    Abstract: Power usage is estimated in a computing environment by automatically detecting hardware configuration information by use of a software agent that is translated into power consumption information for implementing a plurality of power estimation models for efficient power consumption and utilization.
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: October 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Josephine F. Bayang, Valerio Bellizia, Michael Gaertner, Dillon H. Ginley, Diana J. Hellman, Jeffrey O. Kephart, Attila Kollar, James K. MacKenzie, Wayne B. Riley, Srinivasarao Siddabattini, Stephen Viselli
  • Patent number: 10114719
    Abstract: Power usage is estimated in a computing environment by automatically detecting hardware configuration information by use of a software agent that is translated into power consumption information for implementing a plurality of power estimation models for efficient power consumption and utilization.
    Type: Grant
    Filed: February 21, 2013
    Date of Patent: October 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Josephine F. Bayang, Valerio Bellizia, Michael Gaertner, Dillon H. Ginley, Diana J. Hellman, Jeffrey O. Kephart, Attila Kollar, James K. MacKenzie, Wayne B. Riley, Srinivasarao Siddabattini, Stephen Viselli
  • Patent number: 9172694
    Abstract: An approach is provided to access resources at legacy systems. In this approach, a resource request destined to a legacy system is receiving from a requestor with the resource request including an access token and being on behalf of a resource owner. A validation process is performed on the access token. If the access token is valid, the approach identifies the resource owner and one or more legacy access tokens used to access the legacy system. Another request is formed with the new request including the legacy access tokens. The new request is transmitted to the legacy system and a response is received back from the legacy system. The response received from the legacy system is transmitted back to the requestor.
    Type: Grant
    Filed: May 22, 2012
    Date of Patent: October 27, 2015
    Assignee: International Business Machines Corporation
    Inventors: Simon Gilbert Canning, Neil Ian Readshaw, Stephen Viselli, Shane Bradley Weeden
  • Publication number: 20140237269
    Abstract: Power usage is estimated in a computing environment by automatically detecting hardware configuration information by use of a software agent that is translated into power consumption information for implementing a plurality of power estimation models for efficient power consumption and utilization.
    Type: Application
    Filed: October 29, 2013
    Publication date: August 21, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Josephine F. BAYANG, Valerio BELLIZIA, Michael GAERTNER, Dillon H. GINLEY, Diana J. HELLMAN, Jeffrey O. KEPHART, Attila KOLLAR, James K. MACKENZIE, Wayne B. RILEY, Srinivasarao SIDDABATTINI, Stephen VISELLI
  • Publication number: 20140237283
    Abstract: Power usage is estimated in a computing environment by automatically detecting hardware configuration information by use of a software agent that is translated into power consumption information for implementing a plurality of power estimation models for efficient power consumption and utilization.
    Type: Application
    Filed: February 21, 2013
    Publication date: August 21, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Josephine F. BAYANG, Valerio BELLIZIA, Michael GAERTNER, Dillon H. GINLEY, Diana J. HELLMAN, Jeffrey O. KEPHART, Attila KOLLAR, James K. MACKENZIE, Wayne B. RILEY, Srinivasarao SIDDABATTINI, Stephen VISELLI
  • Publication number: 20140157351
    Abstract: A technique to enforce mobile device security policy is based on a “risk profile” of the individual device, where the risk profile is fine-grained and based on the types of applications installed on the device, the services they are accessing, and the operation(s) the user granted the device authorization to perform. Thus, the approach takes into account not only the actual applications installed on the device (and those actively in use), but also the services those applications are accessing, and the scope of operations the user has granted the device authorization to perform. By combining this information to create the risk profile, a suitable security policy, including one that does not unnecessarily degrade device usability, may then be applied.
    Type: Application
    Filed: December 4, 2012
    Publication date: June 5, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Simon Gilbert Canning, David Paul Moore, Shane Bradley Weeden, Stephen Viselli
  • Publication number: 20130318569
    Abstract: An approach is provided to access resources at legacy systems. In this approach, a resource request destined to a legacy system is receiving from a requestor with the resource request including an access token and being on behalf of a resource owner. A validation process is performed on the access token. If the access token is valid, the approach identifies the resource owner and one or more legacy access tokens used to access the legacy system. Another request is formed with the new request including the legacy access tokens. The new request is transmitted to the legacy system and a response is received back from the legacy system. The response received from the legacy system is transmitted back to the requestor.
    Type: Application
    Filed: May 22, 2012
    Publication date: November 28, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Simon Gilbert Canning, Neil Ian Readshaw, Stephen Viselli, Shane Bradley Weeden
  • Patent number: 8447857
    Abstract: An approach is provided where an HTTP request is received and a Request for Security Token (RST) is created. Parameters are selected from the request and mappings are retrieved corresponding to the parameters. Context attributes are created in the RST corresponding to the parameters. A context attribute type value is set based on an HTTP section where the parameter is located within the HTTP request. The RST is sent to a security token service for processing. In another approach, a Request Security Token Response (RSTR) is received and an HTTP response is created. RSTR parameters are selected and parameter mappings are retrieved corresponding to the selected RSTR parameters from a mapping table with a TYPE value being identified based on the retrieved parameter mapping. Context attributes are added to the HTTP response based on the identified TYPE values. The HTTP response is transmitted to a remote computer system.
    Type: Grant
    Filed: March 25, 2011
    Date of Patent: May 21, 2013
    Assignee: International Business Machines Corporation
    Inventors: Scott Anthony Exton, Davin John Holmes, Stephen Viselli, Shane Bradley Weeden
  • Publication number: 20120246312
    Abstract: An approach is provided where an HTTP request is received and a Request for Security Token (RST) is created. Parameters are selected from the request and mappings are retrieved corresponding to the parameters. Context attributes are created in the RST corresponding to the parameters. A context attribute type value is set based on an HTTP section where the parameter is located within the HTTP request. The RST is sent to a security token service for processing. In another approach, a Request Security Token Response (RSTR) is received and an HTTP response is created. RSTR parameters are selected and parameter mappings are retrieved corresponding to the selected RSTR parameters from a mapping table with a TYPE value being identified based on the retrieved parameter mapping. Context attributes are added to the HTTP response based on the identified TYPE values. The HTTP response is transmitted to a remote computer system.
    Type: Application
    Filed: March 25, 2011
    Publication date: September 27, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Scott Anthony Exton, Davin John Holmes, Stephen Viselli, Shane Bradley Weeden