Patents by Inventor William A. LEMKE

William A. LEMKE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10303864
    Abstract: A user authentication tool continuously authenticates the user of a computing device during an electronic communication session. A trusted user profile includes keypad pressure applied by the trusted user when depressing characters on a virtual keypad displayed on the computing device touch screen. Keypad pressure applied by the current user of the computing device is continually monitored during the current electronic communication session. The monitored keypad pressure applied by the current user is compared to the keypad pressure in the trusted user profile. A confidence score is generated based upon the compared keypad pressures of the current user and the trusted user, the confidence score being indicative of the likelihood that the current user is the trusted user of the computing device. The computing device is automatically required to re-authenticate the current user as the trusted user if the generated confidence score is below a predefined minimum confidence threshold.
    Type: Grant
    Filed: June 3, 2016
    Date of Patent: May 28, 2019
    Assignee: International Business Machines Corporation
    Inventors: William H. Blake, Gregory J. Boss, Rhonda L. Childress, William A. Lemke, Kevin C. McConnell, Jeffrey D. Schaefer
  • Publication number: 20180198781
    Abstract: A method, computer program product, and system for authenticating one or more frames includes a processor obtaining the frame(s) from a first client with data indicating a location at which the frame(s) was captured, and data indicating a time at which the frame(s) was captured. The processor identifies a clients of third parties within a pre-defined proximity of the location and at a time within a pre-defined proximity to the time at which the frame(s) was captured. The processor determines probabilities of whether the third parties have personal relationships with each other and with a user of the first client. The program code selects clients that have a high statistical probability of not having these personal relationships. The selected clients receive the frame(s) and append the frame(s) with client time and location metadata. The processor received the frame(s) and authenticates the frame(s) based on correlating the data and time data.
    Type: Application
    Filed: January 6, 2017
    Publication date: July 12, 2018
    Inventors: Kulvir S. BHOGAL, Gregory J. BOSS, Rick A. HAMILTON, II, William A. LEMKE
  • Patent number: 9741186
    Abstract: A remote security access procedure for granting access to a wirelessly controlled lock may include one of receiving an address location at a server to setup a temporary access, receiving a security question at the server required to be answered prior to the temporary access being granted, receiving a time window at the server for the temporary access to be granted, encrypting via the server an access credential comprising the address location, the security question and the time window, and transmitting from the server the encrypted access credential to a guest device.
    Type: Grant
    Filed: September 1, 2016
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventor: William A. Lemke
  • Publication number: 20170193211
    Abstract: A user authentication tool continuously authenticates the user of a computing device during an electronic communication session. A trusted user profile includes keypad pressure applied by the trusted user when depressing characters on a virtual keypad displayed on the computing device touch screen. Keypad pressure applied by the current user of the computing device is continually monitored during the current electronic communication session. The monitored keypad pressure applied by the current user is compared to the keypad pressure in the trusted user profile. A confidence score is generated based upon the compared keypad pressures of the current user and the trusted user, the confidence score being indicative of the likelihood that the current user is the trusted user of the computing device. The computing device is automatically required to re-authenticate the current user as the trusted user if the generated confidence score is below a predefined minimum confidence threshold.
    Type: Application
    Filed: June 3, 2016
    Publication date: July 6, 2017
    Inventors: William H. Blake, Gregory J. Boss, Rhonda L. Childress, William A. Lemke, Kevin C. McConnell, Jeffrey D. Schaefer
  • Patent number: 9392460
    Abstract: A user authentication tool continuously authenticates the user of a mobile device during an electronic communication session. A trusted user profile includes keypad pressure applied by the trusted user when depressing characters on a virtual keypad displayed on the mobile device touch screen. Keypad pressure applied by the current user of the mobile device is continually monitored during the current electronic communication session. The monitored keypad pressure applied by the current user is compared to the keypad pressure in the trusted user profile. A confidence score is generated based upon the compared keypad pressures of the current user and the trusted user, the confidence score being indicative of the likelihood that the current user is the trusted user of the mobile device. The mobile device is automatically required to re-authenticate the current user as the trusted user if the generated confidence score is below a predefined minimum confidence threshold.
    Type: Grant
    Filed: January 2, 2016
    Date of Patent: July 12, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: William H. Blake, Gregory J. Boss, Rhonda L. Childress, William A. Lemke, Kevin C. McConnell, Jeffrey D. Schaefer
  • Publication number: 20160179573
    Abstract: A method is disclosed for controlling a computing apparatus in the execution of a plurality of programs in an ordered fashion, the execution performed in a manner that emulates the processing of batch jobs described with a job control language on a mainframe computer system, the method utilizing a standardized user directory and file structure in providing a batch execution environment.
    Type: Application
    Filed: December 22, 2014
    Publication date: June 23, 2016
    Inventors: TODD BRADLEY KNEISEL, Russell W. Guenthner, Brian William Lemke
  • Patent number: 9088543
    Abstract: A computer-implemented method, computer program product, and computer system for implementing coordinated management of network security controls. The computer system determines a plurality of managed network devices affected by coordinated security policies in a network. The computer system converts the coordinated security policies to firewall rule configuration for each of the managed network devices affected. The computer system adds the firewall rule configuration to a set of firewall rules for the each of the managed network devices affected.
    Type: Grant
    Filed: June 3, 2013
    Date of Patent: July 21, 2015
    Assignee: International Business Machines Corporation
    Inventors: William A. Lemke, Neil I. Readshaw
  • Patent number: 9069969
    Abstract: A computer hardware-implemented method, system, and/or computer program product manages software patches. A computer monitoring hardware system receives a notification of a new release of a software patch. The computer monitoring hardware system scores a security posture of a monitored computer system to generate a security posture value based on a set of computer system parameters for the monitored computer system. In response to patch control logic within the computer monitoring hardware system determining that the monitored computer system is authorized to install the software patch and that the security posture value exceeds the predetermined value, the computer monitoring hardware system retrieves and installs the software patch in the monitored computer system.
    Type: Grant
    Filed: June 13, 2012
    Date of Patent: June 30, 2015
    Assignee: International Business Machines Corporation
    Inventors: Naga A. Ayachitula, William A. Lemke, Rajeev Puri
  • Publication number: 20140359693
    Abstract: A computer-implemented method, computer program product, and computer system for implementing coordinated management of network security controls. The computer system determines a plurality of managed network devices affected by coordinated security policies in a network. The computer system converts the coordinated security policies to firewall rule configuration for each of the managed network devices affected. The computer system adds the firewall rule configuration to a set of firewall rules for the each of the managed network devices affected.
    Type: Application
    Filed: June 3, 2013
    Publication date: December 4, 2014
    Inventors: William A. Lemke, Neil I. Readshaw
  • Publication number: 20130340074
    Abstract: A computer hardware-implemented method, system, and/or computer program product manages software patches. A computer monitoring hardware system receives a notification of a new release of a software patch. The computer monitoring hardware system scores a security posture of a monitored computer system to generate a security posture value based on a set of computer system parameters for the monitored computer system. In response to patch control logic within the computer monitoring hardware system determining that the monitored computer system is authorized to install the software patch and that the security posture value exceeds the predetermined value, the computer monitoring hardware system retrieves and installs the software patch in the monitored computer system.
    Type: Application
    Filed: June 13, 2012
    Publication date: December 19, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Naga A. AYACHITULA, William A. LEMKE, Rajeev PURI