Patents by Inventor William H. Tworek
William H. Tworek has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10635794Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.Type: GrantFiled: November 13, 2017Date of Patent: April 28, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
-
Publication number: 20180068099Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.Type: ApplicationFiled: November 13, 2017Publication date: March 8, 2018Inventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
-
Publication number: 20180039931Abstract: A calendar conflict resolving method, system, and non-transitory computer readable medium, include processing a request for an event for a time slot of a calendar to correlate the requested event with user data, comparing the requested event with a scheduled event to determine a conflict between the scheduled event and the requested event, and resolving the conflict between the requested event and the scheduled event according to a set of rules, the set of rules being based on the user data.Type: ApplicationFiled: August 4, 2016Publication date: February 8, 2018Inventors: Christopher Ray Dotson, Nader M. Nassar, Annette Suzanne Hoag Riffe, William H. Tworek
-
Patent number: 9870454Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.Type: GrantFiled: December 16, 2015Date of Patent: January 16, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
-
Publication number: 20170177845Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.Type: ApplicationFiled: December 16, 2015Publication date: June 22, 2017Inventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
-
Publication number: 20170149834Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.Type: ApplicationFiled: November 4, 2016Publication date: May 25, 2017Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
-
Publication number: 20170149828Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.Type: ApplicationFiled: November 24, 2015Publication date: May 25, 2017Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
-
Patent number: 9654514Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.Type: GrantFiled: November 4, 2016Date of Patent: May 16, 2017Assignee: International Business Machines CorporationInventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
-
Patent number: 9645806Abstract: A system and method for deploying a software application to a hosting environment that considers the development environment, and bases any decision on data about the development environment to make a selection of hosting environment and/or operational attributes. The system and methods determines and attaches metadata describing the development environment to an application, then uses that metadata to select a deployment model, and to select an operational model. The method assigns a security risk score to a developed application which may be hosted in a virtual hosting environment or a physical hosting environment. The system and method considers security issues in its scoring and focuses on the security risk associated with an application that would be deployed. The method steps convey the application attributes, such as complexity, robustness, likelihood of operational issued, likelihood of compromise, etc. to the deployment and operating entities.Type: GrantFiled: September 30, 2014Date of Patent: May 9, 2017Assignee: International Business Machines CorporationInventors: Derek W. Botti, Ramamohan Chennamsetty, Anji D. Greene, Charles S. Lingafelt, William H. Tworek
-
Patent number: 9635058Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.Type: GrantFiled: November 4, 2016Date of Patent: April 25, 2017Assignee: International Business Machines CorporationInventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
-
Patent number: 9565196Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.Type: GrantFiled: July 15, 2016Date of Patent: February 7, 2017Assignee: International Business Machines CorporationInventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
-
Publication number: 20160092185Abstract: A system and method for deploying a software application to a hosting environment that considers the development environment, and bases any decision on data about the development environment to make a selection of hosting environment and/or operational attributes. The system and methods determines and attaches metadata describing the development environment to an application, then uses that metadata to select a deployment model, and to select an operational model. The method assigns a security risk score to a developed application which may be hosted in a virtual hosting environment or a physical hosting environment. The system and method considers security issues in its scoring and focuses on the security risk associated with an application that would be deployed. The method steps convey the application attributes, such as complexity, robustness, likelihood of operational issued, likelihood of compromise, etc. to the deployment and operating entities.Type: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Inventors: Derek W. Botti, Ramamohan Chennamsetty, Anji D. Greene, Charles S. Lingafelt, William H. Tworek
-
Self-optimization and self-healing of voice quality problems utilizing service oriented architecture
Patent number: 7903579Abstract: A method and system for automatically resolving a voice transmission problem in real time in a communication system. Service oriented architecture (SOA)-based reporter services report voice transmission characteristic measurements. An enterprise service bus aggregates the measurements into a combination of measurements. An analyzer that is a SOA service provider determines that the combination of measurements indicates a voice transmission problem. The voice transmission problem determination includes identifying a match between the combination of measurements and a pattern of predefined conditions stored in a database. The database associates the pattern with one or more corrective actions. Using the database, the analyzer identifies the one or more corrective actions that are associated with the pattern of predefined conditions. SOA-based fixer services execute the corrective action(s) to resolve the voice transmission problem.Type: GrantFiled: August 26, 2008Date of Patent: March 8, 2011Assignee: International Business Machines CorporationInventors: Robert C. Hughes, Andrew Liam Massey, William H. Tworek -
SELF-OPTIMIZATION AND SELF-HEALING OF VOICE QUALITY PROBLEMS UTILIZING SERVICE ORIENTED ARCHITECTURE
Publication number: 20100054118Abstract: A method and system for automatically resolving a voice transmission problem in real time in a communication system. Service oriented architecture (SOA)-based reporter services report voice transmission characteristic measurements. An enterprise service bus aggregates the measurements into a combination of measurements. An analyzer that is a SOA service provider determines that the combination of measurements indicates a voice transmission problem. The voice transmission problem determination includes identifying a match between the combination of measurements and a pattern of predefined conditions stored in a database. The database associates the pattern with one or more corrective actions. Using the database, the analyzer identifies the one or more corrective actions that are associated with the pattern of predefined conditions. SOA-based fixer services execute the corrective action(s) to resolve the voice transmission problem.Type: ApplicationFiled: August 26, 2008Publication date: March 4, 2010Inventors: Robert C. Hughes, Andrew Liam Massey, William H. Tworek