Patents by Inventor Tyron Jerrod Stading

Tyron Jerrod Stading has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090328199
    Abstract: Provided is an apparatus for detecting fraudulent passwords so that computer break-in attempts can be distinguished from authorized users incorrectly entering their passwords. An actual password is mapped against a computer keyboard and the resultant data is stored in memory. The profile of an entered password is compared to the stored profile. If the profile of the entered password differs significantly from the stored profile. then the login attempt is flagged as an attempted intrusion. In one embodiment of the current invention, passwords are mapped according to the distance subsequent keystrokes arc from each other. Different embodiments may have different mapping schemes. For example, mapping data may correspond to statistical data that corresponds to the likelihood that a particular character is typed by mistake when another character is intended.
    Type: Application
    Filed: April 29, 2008
    Publication date: December 31, 2009
    Inventors: Michael Gilfix, Foluso Olaiva Okunseinde, Tyron Jerrod Stading
  • Patent number: 7552472
    Abstract: A system and method for developing network policy document and assuring up-to-date monitoring and automated refinement and classification of the network policy. The system administrator defines an initial policy document that is provided as the initial symbolic classifier. The classification rules remain in human readable form throughout the process. Network system data is fed through the classifier, which labels the data according to whether a policy constraint is violated. The labels are tagged to the data. The user then reviews the labels to determine whether the classification is satisfactory. If the classification of the data is satisfactory, the label is unaltered; However, if the classification is not satisfactory, the data is re-labeled. The re-labeled data is then introduced into a refinement algorithm, which determines what policy must be modified to correct classification of network events in accordance with the re-labeling.
    Type: Grant
    Filed: December 19, 2002
    Date of Patent: June 23, 2009
    Assignee: International Business Machines Corporation
    Inventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
  • Patent number: 7549581
    Abstract: A mechanism for ensuring the authenticity of written and printed documents. With the mechanism of the present invention, electronic ink is deposited onto a document, wherein the electronic ink deposited comprises at least one mark visible to a user. Current is applied to the electronic ink while the electronic ink is wet. The current is applied to the electronic ink in order to imprint a pattern in the ink. The electronic ink deposited on the document is then allowed to dry. The pattern in the electronic ink may then be examined to verify the authenticity of the document.
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: June 23, 2009
    Assignee: International Business Machines Corporation
    Inventors: Michael A. Gilfix, Tyron Jerrod Stading
  • Patent number: 7549166
    Abstract: A method and system for handling a malicious intrusion to a machine in a networked group of computers. The malicious intrusion is an unauthorized access to the machine, such as a server in a server farm. When the intrusion is detected, the machine is isolated from the rest of the server farm, and the machine is reprovisioned as a decoy system having access to only data that is ersatz or at least non-sensitive. If the intrusion is determined to be non-malicious, then the machine is functionally reconnected to the server farm, and the machine is reprovisioned to a state held before the reprovisioning of the machine as a decoy machine.
    Type: Grant
    Filed: December 5, 2002
    Date of Patent: June 16, 2009
    Assignee: International Business Machines Corporation
    Inventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading, Ronald S. Woan, John D. Wolpert, Shawn L. Young
  • Publication number: 20090144702
    Abstract: An analysis tool extracts class data from Java objects within a potential plagiarizing Java program and the original Java program, and then compares classes common to the potential plagiarizing program and the original across various performance metrics. Similarities disclosed by the analysis tool are output for user or programmatic comparison of the matches between the potentially plagiarizing Java program byte code and the original program's byte code.
    Type: Application
    Filed: February 16, 2009
    Publication date: June 4, 2009
    Applicant: International Business Machines Corporation
    Inventors: Steven Edward Atkin, Margot Bruce Casey, Tyron Jerrod Stading
  • Patent number: 7539975
    Abstract: Java class information is analyzed to determine if the code is standard for its particular class, and thus belongs to impliedly trustworthy software. An analysis tool performs a pre-analysis to train itself on standard class data for standard implementations of the object type and non-standard class data for non-standard implementations of the object type, and then performs a dynamic analysis of a received Java program to determine if its class data matches the criteria for a standard implementation of the object class.
    Type: Grant
    Filed: June 30, 2004
    Date of Patent: May 26, 2009
    Assignee: International Business Machines Corporation
    Inventors: Steven Edward Atkin, Margot Bruce Casey, Tyron Jerrod Stading
  • Patent number: 7493596
    Abstract: An analysis tool extracts class data from Java objects within a potential plagiarizing Java program and the original Java program, and then compares classes common to the potential plagiarizing program and the original across various performance metrics. Similarities disclosed by the analysis tool are output for user or programmatic comparison of the matches between the potentially plagiarizing Java program byte code and the original program's byte code.
    Type: Grant
    Filed: June 30, 2004
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Steven Edward Atkin, Margot Bruce Casey, Tyron Jerrod Stading
  • Publication number: 20080243787
    Abstract: In a particular illustrative embodiment, a method of presenting search results is disclosed that includes identifying data related to search results from one or more data sources. The one or more data sources include at least one document data source. The method also includes providing an interface to present multiple views of the data. A first view and a second view of the multiple views present the data in different contexts.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventor: Tyron Jerrod Stading
  • Publication number: 20080243786
    Abstract: In a particular embodiment, a method of goal-oriented searching is disclosed that includes providing a graphical user interface including an input and a selectable indicator. The selectable indicator is related to a pre-defined query associated with a particular goal. The particular goal includes multiple criteria. The method also includes receiving data related to the input and inserting the data into the pre-defined query to produce a goal-oriented query to identify one or more documents that satisfy the multiple criteria.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventor: Tyron Jerrod Stading
  • Publication number: 20080243799
    Abstract: In a particular embodiment, a system includes an interface responsive to a network to receive data related to a first document and includes processing logic and memory accessible to the processing logic. The memory stores a plurality of modules executable by the processing logic to recursively retrieve documents, extract directed links and attributes, and traverse the directed links to identify a first set of search results. The plurality of modules includes a search module to retrieve one or more documents and includes an attribute extraction module to extract directed links and other attributes from the one or more documents. The plurality of modules further includes a backward/forward link traversal module to bi-directionally traverse directed links to identify documents and includes a graphical user interface (GUI) module to generate a GUI including data related to the first set of search results and to provide the GUI to a destination device via the network.
    Type: Application
    Filed: April 30, 2008
    Publication date: October 2, 2008
    Applicant: Innography, Inc.
    Inventors: Ryan Rozich, Roji John, Tyron Jerrod Stading
  • Publication number: 20080243785
    Abstract: In a particular embodiment, a system is disclosed to search one or more data sources. The system includes an interface to a network, a visualization system to provide a search interface to a destination device via the network, and a search system. The search system communicates with the interface to receive a query from the destination device. The search system proxies the query to search multiple data sources, receives search results from the multiple data sources, and extracts data from the search results. The system also includes a personalization system to personalize the search results from the multiple data sources to a particular user.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventor: Tyron Jerrod Stading
  • Publication number: 20080244429
    Abstract: In a particular embodiment, a system to present search results is disclosed that includes a search system to retrieve search results from multiple data sources and to extract data from the search results. The system also includes a visualization system to generate a graphical user interface (GUI) including a visualization of data related to the search results and including multiple control options. The multiple control options include a first option and a second option related to the extracted data, where the first option is accessible to alter the visualization.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventor: Tyron Jerrod Stading
  • Publication number: 20080243784
    Abstract: In a particular embodiment, a system is disclosed that includes processing logic and memory accessible to the processing logic. The memory includes instructions executable by the processing logic to receive data related to search results and to automatically generate a query based on the received data and without explicit user query input. The memory also includes instructions executable by the processing logic to generate at least one visualization of second data related to search results from the generated query.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventor: Tyron Jerrod Stading
  • Publication number: 20080230610
    Abstract: A mechanism for ensuring the authenticity of written and printed documents. With the mechanism of the present invention, electronic ink is deposited onto a document, wherein the electronic ink deposited comprises at least one mark visible to a user. Current is applied to the electronic ink while the electronic ink is wet. The current is applied to the electronic ink in order to imprint a pattern in the ink. The electronic ink deposited on the document is then allowed to dry. The pattern in the electronic ink may then be examined to verify the authenticity of the document.
    Type: Application
    Filed: March 28, 2008
    Publication date: September 25, 2008
    Inventors: Michael A. Gilfix, Tyron Jerrod Stading
  • Publication number: 20080216164
    Abstract: A method for providing access control to a single sign-on computer network is disclosed. A user is assigned to multiple groups within a computer network. In response to an access request by the user, the computer network determines a group pass count based on a user profile of the user. The group pass count is a number of groups in which the access request meets all their access requirements. The computer network grants the access request if the group pass count is greater than a predetermined high group pass threshold value.
    Type: Application
    Filed: April 16, 2008
    Publication date: September 4, 2008
    Inventors: PAUL T. BAFFES, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
  • Patent number: 7389430
    Abstract: A method for providing access control to a single sign-on computer network is disclosed. A user is assigned to multiple groups within a computer network. In response to an access request by the user, the computer network determines a group pass count based on a user profile of the user. The group pass count is a number of groups in which the access request meets all their access requirements. The computer network grants the access request if the group pass count is greater than a predetermined high group pass threshold value.
    Type: Grant
    Filed: December 5, 2002
    Date of Patent: June 17, 2008
    Assignee: International Business Machines Corporation
    Inventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
  • Patent number: 7386892
    Abstract: Provided is an apparatus and method for detecting fraudulent passwords so that computer break-in attempts can be distinguished from authorized users incorrectly entering their passwords. An actual password is mapped against a computer keyboard and the resultant data is stored in memory. The profile of an entered password is compared to the stored profile. If the profile of the entered password differs significantly from the stored profile, then the login attempt is flagged as an attempted intrusion. In one embodiment of the current invention, passwords are mapped according to the distance subsequent keystrokes are from each other. Different embodiments may have different mapping schemes. For example, mapping data may correspond to statistical data that corresponds to the likelihood that a particular character is typed by mistake when another character is intended.
    Type: Grant
    Filed: July 17, 2003
    Date of Patent: June 10, 2008
    Assignee: International Business Machines Corporation
    Inventors: Michael Gilfix, Foluso Olaiya Okunseinde, Tyron Jerrod Stading
  • Patent number: 7376631
    Abstract: Energy consumption meters are associated with owners who hold accounts with a power supplier. The meters are assigned meter identifiers and identifiers for their respective owners. Such a meter may be a parent meter having associated submeters. In response to being plugged into a power source from the power supplier, such a meter reports its owner identifier and meter identifier to the supplier. Also, in response to being plugged into a power source supplied by one of the parent meters, a meter communicates with the parent meter. This establishes that the parent meter is associated with the submeter. The submeter measures energy delivered reports this to the power supplier. Also, the indicated association of the submeter to the parent meter is reported to the power supplier. The receipt of this information enables the power supplier to debit and credit owner accounts in a manner permitting temporary associations of meters.
    Type: Grant
    Filed: May 26, 2005
    Date of Patent: May 20, 2008
    Assignee: International Business Machines Corporation
    Inventors: Jennifer E. King, Robert R. Peterson, Jon F. Richter, Ian P. Spivey, Tyron Jerrod Stading, Rhys Ulerich
  • Patent number: 7350716
    Abstract: A mechanism for ensuring the authenticity of written and printed documents. With the mechanism of the present invention, electronic ink is deposited onto a document, wherein the electronic ink deposited comprises at least one mark visible to a user. Current is applied to the electronic ink while the electronic ink is wet. The current is applied to the electronic ink in order to imprint a pattern in the ink. The electronic ink deposited on the document is then allowed to dry. The pattern in the electronic ink may then be examined to verify the authenticity of the document.
    Type: Grant
    Filed: May 10, 2005
    Date of Patent: April 1, 2008
    Assignee: International Business Machines Corporation
    Inventors: Michael A. Gilfix, Tyron Jerrod Stading
  • Patent number: 7283986
    Abstract: A tool is provided for testing integration logic in a hub-and-spoke integration scheme. The testing tool exercises all spokes of the integration project for all objects in the model. A test document is sent to each adapter, which converts the generic objects to application specific objects and then converts the application specific objects back to generic objects. The testing tool then documents the return document of each spoke. The result is a catalog of total mappings, partial mappings, and empty mappings. These results may be analyzed to identify disagreements, lost data, and unused fields. The model may then be corrected by updating the mappings.
    Type: Grant
    Filed: April 8, 2004
    Date of Patent: October 16, 2007
    Assignee: International Business Machines Corporation
    Inventors: Foluso Olaiya Okunseinde, Tyron Jerrod Stading