Patents by Inventor William H. Tworek

William H. Tworek has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10635794
    Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.
    Type: Grant
    Filed: November 13, 2017
    Date of Patent: April 28, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
  • Publication number: 20180068099
    Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.
    Type: Application
    Filed: November 13, 2017
    Publication date: March 8, 2018
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
  • Publication number: 20180039931
    Abstract: A calendar conflict resolving method, system, and non-transitory computer readable medium, include processing a request for an event for a time slot of a calendar to correlate the requested event with user data, comparing the requested event with a scheduled event to determine a conflict between the scheduled event and the requested event, and resolving the conflict between the requested event and the scheduled event according to a set of rules, the set of rules being based on the user data.
    Type: Application
    Filed: August 4, 2016
    Publication date: February 8, 2018
    Inventors: Christopher Ray Dotson, Nader M. Nassar, Annette Suzanne Hoag Riffe, William H. Tworek
  • Patent number: 9870454
    Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.
    Type: Grant
    Filed: December 16, 2015
    Date of Patent: January 16, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
  • Publication number: 20170177845
    Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.
    Type: Application
    Filed: December 16, 2015
    Publication date: June 22, 2017
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
  • Publication number: 20170149834
    Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.
    Type: Application
    Filed: November 4, 2016
    Publication date: May 25, 2017
    Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
  • Publication number: 20170149828
    Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.
    Type: Application
    Filed: November 24, 2015
    Publication date: May 25, 2017
    Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
  • Patent number: 9654514
    Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.
    Type: Grant
    Filed: November 4, 2016
    Date of Patent: May 16, 2017
    Assignee: International Business Machines Corporation
    Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
  • Patent number: 9645806
    Abstract: A system and method for deploying a software application to a hosting environment that considers the development environment, and bases any decision on data about the development environment to make a selection of hosting environment and/or operational attributes. The system and methods determines and attaches metadata describing the development environment to an application, then uses that metadata to select a deployment model, and to select an operational model. The method assigns a security risk score to a developed application which may be hosted in a virtual hosting environment or a physical hosting environment. The system and method considers security issues in its scoring and focuses on the security risk associated with an application that would be deployed. The method steps convey the application attributes, such as complexity, robustness, likelihood of operational issued, likelihood of compromise, etc. to the deployment and operating entities.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: May 9, 2017
    Assignee: International Business Machines Corporation
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, Anji D. Greene, Charles S. Lingafelt, William H. Tworek
  • Patent number: 9635058
    Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.
    Type: Grant
    Filed: November 4, 2016
    Date of Patent: April 25, 2017
    Assignee: International Business Machines Corporation
    Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
  • Patent number: 9565196
    Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.
    Type: Grant
    Filed: July 15, 2016
    Date of Patent: February 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
  • Publication number: 20160092185
    Abstract: A system and method for deploying a software application to a hosting environment that considers the development environment, and bases any decision on data about the development environment to make a selection of hosting environment and/or operational attributes. The system and methods determines and attaches metadata describing the development environment to an application, then uses that metadata to select a deployment model, and to select an operational model. The method assigns a security risk score to a developed application which may be hosted in a virtual hosting environment or a physical hosting environment. The system and method considers security issues in its scoring and focuses on the security risk associated with an application that would be deployed. The method steps convey the application attributes, such as complexity, robustness, likelihood of operational issued, likelihood of compromise, etc. to the deployment and operating entities.
    Type: Application
    Filed: September 30, 2014
    Publication date: March 31, 2016
    Inventors: Derek W. Botti, Ramamohan Chennamsetty, Anji D. Greene, Charles S. Lingafelt, William H. Tworek
  • Patent number: 7903579
    Abstract: A method and system for automatically resolving a voice transmission problem in real time in a communication system. Service oriented architecture (SOA)-based reporter services report voice transmission characteristic measurements. An enterprise service bus aggregates the measurements into a combination of measurements. An analyzer that is a SOA service provider determines that the combination of measurements indicates a voice transmission problem. The voice transmission problem determination includes identifying a match between the combination of measurements and a pattern of predefined conditions stored in a database. The database associates the pattern with one or more corrective actions. Using the database, the analyzer identifies the one or more corrective actions that are associated with the pattern of predefined conditions. SOA-based fixer services execute the corrective action(s) to resolve the voice transmission problem.
    Type: Grant
    Filed: August 26, 2008
    Date of Patent: March 8, 2011
    Assignee: International Business Machines Corporation
    Inventors: Robert C. Hughes, Andrew Liam Massey, William H. Tworek
  • Publication number: 20100054118
    Abstract: A method and system for automatically resolving a voice transmission problem in real time in a communication system. Service oriented architecture (SOA)-based reporter services report voice transmission characteristic measurements. An enterprise service bus aggregates the measurements into a combination of measurements. An analyzer that is a SOA service provider determines that the combination of measurements indicates a voice transmission problem. The voice transmission problem determination includes identifying a match between the combination of measurements and a pattern of predefined conditions stored in a database. The database associates the pattern with one or more corrective actions. Using the database, the analyzer identifies the one or more corrective actions that are associated with the pattern of predefined conditions. SOA-based fixer services execute the corrective action(s) to resolve the voice transmission problem.
    Type: Application
    Filed: August 26, 2008
    Publication date: March 4, 2010
    Inventors: Robert C. Hughes, Andrew Liam Massey, William H. Tworek