Patents by Inventor Wesley J. Ho

Wesley J. Ho has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10264094
    Abstract: A method and system for processing incoming messages. An incoming message is scanned, wherein the incoming message is an email message sent by a sender. One or more resource links in the scanned incoming message are detected, wherein the one or more resource links are in the sender's email signature in the email message. In response to detecting the one or more resource links in the scanned incoming message, it is determined that users of the computer are likely to request a content of the detected one or more resource links, based at least on: a type of the one or more detected resource links, a type of network to which the computer is connected, and a determination that the detected one or more resource links are pointing to one or more files and are not pointing to a corporate website.
    Type: Grant
    Filed: August 19, 2016
    Date of Patent: April 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Wesley J. Ho, Jeffrey K. Price, Stanley C. Wood
  • Patent number: 9787697
    Abstract: Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers.
    Type: Grant
    Filed: July 29, 2015
    Date of Patent: October 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
  • Publication number: 20160360003
    Abstract: A method and system for processing incoming messages. An incoming message is scanned, wherein the incoming message is an email message sent by a sender. One or more resource links in the scanned incoming message are detected, wherein the one or more resource links are in the sender's email signature in the email message. In response to detecting the one or more resource links in the scanned incoming message, it is determined that users of the computer are likely to request a content of the detected one or more resource links, based at least on: a type of the one or more detected resource links, a type of network to which the computer is connected, and a determination that the detected one or more resource links are pointing to one or more files and are not pointing to a corporate website.
    Type: Application
    Filed: August 19, 2016
    Publication date: December 8, 2016
    Inventors: Wesley J. Ho, Jeffrey K. Price, Stanley C. Wood
  • Patent number: 9454506
    Abstract: A method and system for managing caching at a computer. A computer receives a file from a storage device on a network in response to a request by a first user. The computer may then determine if other users of the computer are likely to request the file, based upon a type of the file and a type of the network. If other users are likely to request the file, the computer may then cache the file at the computer. In one embodiment, the computer may determine if other users of the computer are likely to request the file based upon access permissions to the file at a source of the file. In another embodiment, the computer may determine if other users of the computer are likely to request the file based upon if the file has been previously cached at the computer.
    Type: Grant
    Filed: November 27, 2012
    Date of Patent: September 27, 2016
    Assignee: International Business Machines Corporation
    Inventors: Wesley J. Ho, Jeffrey K. Price, Stanley C. Wood
  • Publication number: 20150334127
    Abstract: Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers.
    Type: Application
    Filed: July 29, 2015
    Publication date: November 19, 2015
    Inventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
  • Patent number: 9129086
    Abstract: Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers.
    Type: Grant
    Filed: March 4, 2010
    Date of Patent: September 8, 2015
    Assignee: International Business Machines Corporation
    Inventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
  • Publication number: 20140317398
    Abstract: Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle encryption/decryption of information for all users in the Cloud computing environment. Typically, the encryption service is implemented between Cloud portals and a storage Cloud. Through the use of a browser/portal plug-in (or the like), the configuration and processing of the security process is managed for the Cloud computing environment user by pointing all traffic for which security is desired to this encryption service so that it can perform encryption (or decryption in the case of document retrieval) as needed (e.g., on the fly) between the user and the Cloud.
    Type: Application
    Filed: June 30, 2014
    Publication date: October 23, 2014
    Inventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
  • Patent number: 8826001
    Abstract: Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle encryption/decryption of information for all users in the Cloud computing environment. Typically, the encryption service is implemented between Cloud portals and a storage Cloud. Through the use of a browser/portal plug-in (or the like), the configuration and processing of the security process is managed for the Cloud computing environment user by pointing all traffic for which security is desired to this encryption service so that it can perform encryption (or decryption in the case of document retrieval) as needed (e.g., on the fly) between the user and the Cloud.
    Type: Grant
    Filed: April 27, 2010
    Date of Patent: September 2, 2014
    Assignee: International Business Machines Corporation
    Inventors: Linda N. Betz, Wesley J. Ho, Charkes S. Lingafelt, David P. Merrill
  • Publication number: 20110264907
    Abstract: Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle encryption/decryption of information for all users in the Cloud computing environment. Typically, the encryption service is implemented between Cloud portals and a storage Cloud. Through the use of a browser/portal plug-in (or the like), the configuration and processing of the security process is managed for the Cloud computing environment user by pointing all traffic for which security is desired to this encryption service so that it can perform encryption (or decryption in the case of document retrieval) as needed (e.g., on the fly) between the user and the Cloud.
    Type: Application
    Filed: April 27, 2010
    Publication date: October 27, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill
  • Publication number: 20110219434
    Abstract: Embodiments of the present invention allow for the provisioning of security services within a Cloud computing environment by third parties. Specifically, under the present invention, a Cloud provider will publish a set of potential security attributes (e.g., a list), which can be monitored, to the Cloud customer. The Cloud customer will designate/select one or more of those attributes that the Cloud customer wishes to have monitored for one or more Cloud resources that it is using. The Cloud provider will then provide to the Cloud customer a set of third party security service providers capable of monitoring the attributes the Cloud customer designated. The Cloud customer will then select one or more third party providers from the provided set, and the Cloud provider will associate the given Cloud resources with the respective third party providers.
    Type: Application
    Filed: March 4, 2010
    Publication date: September 8, 2011
    Applicant: International Business Machines Corporation
    Inventors: Linda N. Betz, Wesley J. Ho, Charles S. Lingafelt, David P. Merrill