Patents by Inventor Wesley J. Ho
Wesley J. Ho has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10264094Abstract: A method and system for processing incoming messages. An incoming message is scanned, wherein the incoming message is an email message sent by a sender. One or more resource links in the scanned incoming message are detected, wherein the one or more resource links are in the sender's email signature in the email message. In response to detecting the one or more resource links in the scanned incoming message, it is determined that users of the computer are likely to request a content of the detected one or more resource links, based at least on: a type of the one or more detected resource links, a type of network to which the computer is connected, and a determination that the detected one or more resource links are pointing to one or more files and are not pointing to a corporate website.Type: GrantFiled: August 19, 2016Date of Patent: April 16, 2019Assignee: International Business Machines CorporationInventors: Wesley J. Ho, Jeffrey K. Price, Stanley C. Wood
-
Patent number: 9787697Abstract: Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers.Type: GrantFiled: July 29, 2015Date of Patent: October 10, 2017Assignee: International Business Machines CorporationInventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
-
Publication number: 20160360003Abstract: A method and system for processing incoming messages. An incoming message is scanned, wherein the incoming message is an email message sent by a sender. One or more resource links in the scanned incoming message are detected, wherein the one or more resource links are in the sender's email signature in the email message. In response to detecting the one or more resource links in the scanned incoming message, it is determined that users of the computer are likely to request a content of the detected one or more resource links, based at least on: a type of the one or more detected resource links, a type of network to which the computer is connected, and a determination that the detected one or more resource links are pointing to one or more files and are not pointing to a corporate website.Type: ApplicationFiled: August 19, 2016Publication date: December 8, 2016Inventors: Wesley J. Ho, Jeffrey K. Price, Stanley C. Wood
-
Patent number: 9454506Abstract: A method and system for managing caching at a computer. A computer receives a file from a storage device on a network in response to a request by a first user. The computer may then determine if other users of the computer are likely to request the file, based upon a type of the file and a type of the network. If other users are likely to request the file, the computer may then cache the file at the computer. In one embodiment, the computer may determine if other users of the computer are likely to request the file based upon access permissions to the file at a source of the file. In another embodiment, the computer may determine if other users of the computer are likely to request the file based upon if the file has been previously cached at the computer.Type: GrantFiled: November 27, 2012Date of Patent: September 27, 2016Assignee: International Business Machines CorporationInventors: Wesley J. Ho, Jeffrey K. Price, Stanley C. Wood
-
Publication number: 20150334127Abstract: Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers.Type: ApplicationFiled: July 29, 2015Publication date: November 19, 2015Inventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
-
Patent number: 9129086Abstract: Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers.Type: GrantFiled: March 4, 2010Date of Patent: September 8, 2015Assignee: International Business Machines CorporationInventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
-
Publication number: 20140317398Abstract: Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle encryption/decryption of information for all users in the Cloud computing environment. Typically, the encryption service is implemented between Cloud portals and a storage Cloud. Through the use of a browser/portal plug-in (or the like), the configuration and processing of the security process is managed for the Cloud computing environment user by pointing all traffic for which security is desired to this encryption service so that it can perform encryption (or decryption in the case of document retrieval) as needed (e.g., on the fly) between the user and the Cloud.Type: ApplicationFiled: June 30, 2014Publication date: October 23, 2014Inventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
-
Patent number: 8826001Abstract: Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle encryption/decryption of information for all users in the Cloud computing environment. Typically, the encryption service is implemented between Cloud portals and a storage Cloud. Through the use of a browser/portal plug-in (or the like), the configuration and processing of the security process is managed for the Cloud computing environment user by pointing all traffic for which security is desired to this encryption service so that it can perform encryption (or decryption in the case of document retrieval) as needed (e.g., on the fly) between the user and the Cloud.Type: GrantFiled: April 27, 2010Date of Patent: September 2, 2014Assignee: International Business Machines CorporationInventors: Linda N. Betz, Wesley J. Ho, Charkes S. Lingafelt, David P. Merrill
-
Publication number: 20110264907Abstract: Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle encryption/decryption of information for all users in the Cloud computing environment. Typically, the encryption service is implemented between Cloud portals and a storage Cloud. Through the use of a browser/portal plug-in (or the like), the configuration and processing of the security process is managed for the Cloud computing environment user by pointing all traffic for which security is desired to this encryption service so that it can perform encryption (or decryption in the case of document retrieval) as needed (e.g., on the fly) between the user and the Cloud.Type: ApplicationFiled: April 27, 2010Publication date: October 27, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
-
Publication number: 20110219434Abstract: Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers.Type: ApplicationFiled: March 4, 2010Publication date: September 8, 2011Applicant: International Business Machines CorporationInventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill