Patents by Inventor Steven Lingafelt

Steven Lingafelt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8875229
    Abstract: An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are received from a user, the request including a user identification. The metadata includes: information obtained from a history of prior accesses to an application access system, information obtained from a history of prior accesses to a wireless authentication system, and/or confirmation of the user identification by an entity physically proximate to the user. A database is queried with the user identification and the metadata to identify relationship data. The relationship data indicates the relationship between the individual assigned the user identification and an entity owning the system, an entity leasing the system, and/or an entity operating the system. The relationship data is input into a rules engine; and, security measure(s) are selected with the rules engine based on the relationship data.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: October 28, 2014
    Assignee: International Business Machines Corporation
    Inventors: Carlos Hoyos, Charles Steven Lingafelt
  • Publication number: 20140244484
    Abstract: Automated information collection and notification ancillary to the acquisition of a product or service includes determining transaction and information thresholds for application to attributes of a transaction for goods or services, a card account used to purchase an item or service pursuant to the transaction and associated with application of the thresholds. When the purchase of the item or service is accomplished, additional informational items to be retained are determined in response to an attribute of the additional informational items meeting the information threshold, an attribute of the transaction meeting the transaction threshold, and execution of the transaction via the identified card account. Authoritative source locations for retrieval of copies of the additional information, and ancillary storage devices for holding copies of or links to the additional information items, are identified.
    Type: Application
    Filed: February 28, 2013
    Publication date: August 28, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Andrew R. Jones, C. Steven Lingafelt, Kevin C. McConnell, John E. Moore, Jr.
  • Patent number: 8806628
    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least one alert database and at least one associated signature set to each alert database; an analytics module in communication to the computer readable storage medium, the analytics module analyzes at least one alert database present on the computer storage medium to determine whether any signatures from the signature set associated with the alert database being analyzed are ineffective based at least on a ratio of valid alerts to false positive alerts for individual signatures selected from a group including a plurality of signatures present in the signature set; and an adjustment module in communication to the computer readable storage medium and the analytics module, the adjustment module removes at least one ineffective signature from the signature set.
    Type: Grant
    Filed: January 4, 2013
    Date of Patent: August 12, 2014
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Publication number: 20140215575
    Abstract: A method of controlling access to a remote system includes granting a connecting device full access to the system upon determining the device is registered to a user, upon determining the device is not registered, determining whether the device has connected to the system before, granting the device full access to the system if the device has connected before and a trust index based on a trust level for the device and a trust level of a location the device is currently connecting from exceeds a threshold, and granting the device limited access to the system otherwise.
    Type: Application
    Filed: March 11, 2013
    Publication date: July 31, 2014
    Applicant: International Business Machines Corporation
    Inventors: Carlos A. Hoyos, Steven Lingafelt
  • Publication number: 20140215558
    Abstract: A method of controlling access to a remote system includes granting a connecting device full access to the system upon determining the device is registered to a user, upon determining the device is not registered, determining whether the device has connected to the system before, granting the device full access to the system if the device has connected before and a trust index based on a trust level for the device and a trust level of a location the device is currently connecting from exceeds a threshold, and granting the device limited access to the system otherwise.
    Type: Application
    Filed: January 30, 2013
    Publication date: July 31, 2014
    Applicant: International Business Machines Corporation
    Inventors: Carlos A. Hoyos, Steven Lingafelt
  • Patent number: 8769679
    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example method includes gaining access to or creating an alert database and a signature set by an analytics module and an adjustment module, where the alert database includes an alert validity attribute for each alert; quantifying for each signature contained in the signature set an effect on the change in the number of alerts from its removal; determining with an analytics module whether any signature has a ratio of valid to false positive alerts less than a threshold; and when at least one signature has the ratio less than the first threshold identifying and removing with an adjustment module at least one signature from the signature database having a ratio less than the threshold where the signature is removed from the signature set, and repeating quantifying and determining.
    Type: Grant
    Filed: December 17, 2012
    Date of Patent: July 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Publication number: 20140181890
    Abstract: An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are received from a user, the request including a user identification. The metadata includes: information obtained from a history of prior accesses to an application access system, information obtained from a history of prior accesses to a wireless authentication system, and/or confirmation of the user identification by an entity physically proximate to the user. A database is queried with the user identification and the metadata to identify relationship data. The relationship data indicates the relationship between the individual assigned the user identification and an entity owning the system, an entity leasing the system, and/or an entity operating the system. The relationship data is input into a rules engine; and, security measure(s) are selected with the rules engine based on the relationship data.
    Type: Application
    Filed: December 21, 2012
    Publication date: June 26, 2014
    Applicant: International Business Machines Corporation
    Inventors: Carlos Hoyos, Charles Steven Lingafelt
  • Publication number: 20140176314
    Abstract: An embodiment of the invention provides a method including receiving in an antenna of a smart device first wireless command and control data from a first electronic device. The antenna receives additional wireless command and control data from at least one second electronic device. The first wireless command and control data and the additional wireless command and control data are automatically received from the first electronic device and the at least one second electronic device without input to the smart device from a user. A universal interface is created in the smart device based on the first command and control data and the additional command and control data, wherein the first electronic device and the at least one second electronic device are controllable by the universal interface.
    Type: Application
    Filed: December 21, 2012
    Publication date: June 26, 2014
    Applicant: International Business Machines Corporation
    Inventors: Carlos E. Hoyos, Charles Steven Lingafelt
  • Publication number: 20140173724
    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example method includes gaining access to or creating an alert database and a signature set by an analytics module and an adjustment module, where the alert database includes an alert validity attribute for each alert; quantifying for each signature contained in the signature set an effect on the change in the number of alerts from its removal; determining with an analytics module whether any signature has a ratio of valid to false positive alerts less than a threshold; and when at least one signature has the ratio less than the first threshold identifying and removing with an adjustment module at least one signature from the signature database having a ratio less than the threshold where the signature is removed from the signature set, and repeating quantifying and determining.
    Type: Application
    Filed: December 17, 2012
    Publication date: June 19, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Publication number: 20140173727
    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least one alert database and at least one associated signature set to each alert database; an analytics module in communication to the computer readable storage medium, the analytics module analyzes at least one alert database present on the computer storage medium to determine whether any signatures from the signature set associated with the alert database being analyzed are ineffective based at least on a ratio of valid alerts to false positive alerts for individual signatures selected from a group including a plurality of signatures present in the signature set; and an adjustment module in communication to the computer readable storage medium and the analytics module, the adjustment module removes at least one ineffective signature from the signature set.
    Type: Application
    Filed: January 4, 2013
    Publication date: June 19, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Publication number: 20140139703
    Abstract: An embodiment of the invention provides a method for determining picture resolution to optimize storage, wherein input is received from a user interface. The input includes a selected picture destination, such as a printer, a photograph processing service provider, a web application, a website, and/or a display. Attributes of the picture destination are determined with a processor, wherein the attributes of the picture destination include a print resolution, a print size, a screen resolution, and/or a image size. The processor determines the picture resolution based on the attributes of the picture destination.
    Type: Application
    Filed: November 21, 2012
    Publication date: May 22, 2014
    Applicant: International Business Machines Corporation
    Inventors: Gregory Jensen Boss, Andrew R. Jones, Charles Steven Lingafelt, Kevin C. McConnell, John Elbert Moore, JR.
  • Publication number: 20140139704
    Abstract: An embodiment of the invention provides a method for determining picture resolution to optimize storage, wherein input is received from a user interface. The input includes a selected picture destination, such as a printer, a photograph processing service provider, a web application, a website, and/or a display. Attributes of the picture destination are determined with a processor, wherein the attributes of the picture destination include a print resolution, a print size, a screen resolution, and/or a image size. The processor determines the picture resolution based on the attributes of the picture destination.
    Type: Application
    Filed: January 17, 2013
    Publication date: May 22, 2014
    Applicant: International Business Machines Corporation
    Inventors: Gregory Jensen Boss, Andrew R. Jones, Charles Steven Lingafelt, Kevin C. McConnell, John Elbert Moore, JR.
  • Patent number: 8676923
    Abstract: Method, system, and product for remotely communicating with and identifying owners of objects on an IP network by providing a database identifying owners of objects on an IP network, discovery scanning the IP network for logical objects, sending a message to an unlisted logical object requesting a registration action of the recipient, receiving the registration action indicating an owner of the logical object, and updating the database with the received indication of the owner of the object. The method, system, or product may be embodied in a software application (such as an operating system element), a dedicated processor, or a dedicated processor with dedicated code.
    Type: Grant
    Filed: March 8, 2005
    Date of Patent: March 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, Scott Alex Creeley, Charles Victor Jolla, Mark Alan Techmeier, Ronald Jerome Walter, Ashley A. Brock
  • Patent number: 8635683
    Abstract: An embodiment of the invention provides a method for detecting fraudulent use of a moderator passcode in a conference calling system. The method sets a threshold number of moderator passcodes permitted in a conference call. The total number of moderator passcodes entered into the conference call is determined and compared to the threshold number with a processor. The conference call is allowed to continue if the threshold number exceeds the total number of moderator passcodes entered into the conference call. If, however, the total number of moderator passcodes exceeds the threshold number of moderator passcodes, the processor performs validation actions and/or alert actions.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: January 21, 2014
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek
  • Publication number: 20130332561
    Abstract: An embodiment of the invention provides a method for sending a data object to an endpoint, wherein rules are added to the data object with a processor. The rules include a requisite endpoint attribute and/or a requisite user attribute of the endpoint, and wherein the requisite user attribute of the endpoint includes an approved role. The data object is sent to the endpoint with a communications module; and a rule-analyzing module determines whether the endpoint satisfies the rules. If the endpoint satisfies a threshold number of rules, the data object is received, stored in a memory device, and/or displayed on a display at the endpoint. The processor changes at least one of the rules after a threshold period of time that the data object is created, sent, and/or received.
    Type: Application
    Filed: June 11, 2012
    Publication date: December 12, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew R. Jones, Gregory J. Boss, C. Steven Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Publication number: 20130332564
    Abstract: An embodiment of the invention provides a method for sending a data object to an endpoint, wherein rules are added to the data object with a processor. The rules include a requisite endpoint attribute and/or a requisite user attribute of the endpoint, and wherein the requisite user attribute of the endpoint includes an approved role. The data object is sent to the endpoint with a communications module; and a rule-analyzing module determines whether the endpoint satisfies the rules. If the endpoint satisfies a threshold number of rules, the data object is received, stored in a memory device, and/or displayed on a display at the endpoint. The processor changes at least one of the rules after a threshold period of time that the data object is created, sent, and/or received.
    Type: Application
    Filed: September 6, 2012
    Publication date: December 12, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew R. Jones, Gregory J. Boss, C. Steven Lingafelt, Kevin C. McConnell, John E. Moore, JR.
  • Publication number: 20130291067
    Abstract: A method for identifying unauthorized and/or misconfigured wireless access points (WAPs) in a communication network includes the steps of: an agent running on an endpoint in the communication network locating one or more WAPs in the communication network; the agent reporting at least one located WAP to a central entity; and the central entity performing steps of applying prescribed criteria to determine whether the located WAP needs to be probed, and initiating active probing of the located WAP when it is determined that the located WAP needs to be probed to thereby determine whether the located WAP is unauthorized and/or misconfigured.
    Type: Application
    Filed: April 30, 2012
    Publication date: October 31, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Terry Dwain Escamilla, Charles Steven Lingafelt, David Robert Safford
  • Publication number: 20130291063
    Abstract: A system for identifying unauthorized and/or misconfigured wireless access points (WAPs) in a communication network includes multiple network endpoints and multiple agents running on endpoints. The agents are adapted to periodically locate WAPs and to report located WAPs to a central entity. The system further includes a central entity operative to receive information from the agents regarding located WAPs, to determine whether at least a given one of the located WAPs needs to be probed, and to initiate active probing of located WAPs when it is determined that the given one of the located WAPs needs to be probed.
    Type: Application
    Filed: April 25, 2012
    Publication date: October 31, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Terry Dwain Escamilla, Charles Steven Lingafelt, David Robert Safford
  • Publication number: 20130262250
    Abstract: A method for allocation of application licenses includes establishing a computing environment comprising a licensed application or service accessed by at least two users, each user having an associated computer system; establishing an ordered list of users for a licensed application or service, in which users have a predefined priority based on a business value or function; establishing at least one user attribute comprising whether a user's virtual machine will be archived and saved for later resumption if the user's license is at least one of suspended, removed, or reallocated; and establishing at least one disqualification threshold for at least one user.
    Type: Application
    Filed: March 29, 2012
    Publication date: October 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Steven Lingafelt, James W. Murray, James Swantek, James S. Worley
  • Patent number: 8494142
    Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: July 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek