Patents by Inventor William J. O'Donnell
William J. O'Donnell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12119535Abstract: A mechanical means for deploying one of two or more feed sources within a test range is presented. The feed source selected for testing is properly positioned for use within the range by rotating one of two or more arms to an upright and locked position. An arm may further include a rotatable antenna wheel with two or more feed sources thereon whereby a selected feed source is rotated into position via the antenna wheel. The antenna wheel includes a center body, feed sources attached to the center body and aligned along a rotational plane, and a shroud disposed about the center body and feed sources. The antenna wheel may include a cooling system for managing heat generated by the feed sources and electronics therefore. In preferred embodiments, the feed source changer is mounted within the range so that a selected feed source communicates an emitted beam onto a reflector which is redirected as a reflected beam toward a device under test.Type: GrantFiled: April 5, 2022Date of Patent: October 15, 2024Assignee: Orbit Advanced Technologies, Inc.Inventors: William Campbell, Thomas McKeown, Per Iversen, Thomas D. Kauffman, Zachary J. Pelli, Thomas P. O'Donnell
-
Patent number: 10740759Abstract: According to one exemplary embodiment, a method for dynamic generation of payment token ratings is provided. The method includes receiving a token request, whereby the token request includes a plurality of metadata. The method also includes analyzing the received plurality of metadata based on at least one predefined rule set. The method further includes generating a token in response to receiving the token request. The method then includes determining an assurance rating for the generated token based on the analyzed received plurality of metadata, whereby the assurance rating indicates a risk of fraud associated with the generated token. The method finally includes assigning a token rating to the generated token based on the determined assurance rating.Type: GrantFiled: December 11, 2015Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Arthur L. De Magalhaes, Nitin Gaur, Wu Ning, William J. O'Donnell
-
Patent number: 10733609Abstract: According to one exemplary embodiment, a method for dynamic generation of payment token ratings is provided. The method includes receiving a token request, whereby the token request includes a plurality of metadata. The method also includes analyzing the received plurality of metadata based on at least one predefined rule set. The method further includes generating a token in response to receiving the token request. The method then includes determining an assurance rating for the generated token based on the analyzed received plurality of metadata, whereby the assurance rating indicates a risk of fraud associated with the generated token. The method finally includes assigning a token rating to the generated token based on the determined assurance rating.Type: GrantFiled: April 27, 2016Date of Patent: August 4, 2020Assignee: International Business Machines CorporationInventors: Arthur L. De Magalhaes, Nitin Gaur, Wu Ning, William J. O'Donnell
-
Patent number: 10218693Abstract: Various embodiments are directed to a computer-implemented method for displaying a map of certificate relationships. A method can include retrieving certificate information for two or more servers and storing the retrieved certificate information in a memory. In addition, the method can include receiving a command to generate a map of certificate relationships. The command includes a command scope that identifies at least a first server of the two or more servers. Further, the method can include generating the map from the retrieved certificate information and rendering the map on a display device. The map includes the first server and a device having a certificate relationship with the first server.Type: GrantFiled: September 3, 2015Date of Patent: February 26, 2019Assignee: International Business Machines CorporationInventors: Robert A. Gibson, J. Peter Neergaard, William J. O'Donnell
-
Patent number: 10218692Abstract: Various embodiments are directed to a computer-implemented method for displaying a map of certificate relationships. A method can include retrieving certificate information for two or more servers and storing the retrieved certificate information in a memory. In addition, the method can include receiving a command to generate a map of certificate relationships. The command includes a command scope that identifies at least a first server of the two or more servers. Further, the method can include generating the map from the retrieved certificate information and rendering the map on a display device. The map includes the first server and a device having a certificate relationship with the first server.Type: GrantFiled: August 21, 2014Date of Patent: February 26, 2019Assignee: International Business Machines CorporationInventors: Robert A. Gibson, J. Peter Neergaard, William J. O'Donnell
-
Publication number: 20170169430Abstract: According to one exemplary embodiment, a method for dynamic generation of payment token ratings is provided. The method includes receiving a token request, whereby the token request includes a plurality of metadata. The method also includes analyzing the received plurality of metadata based on at least one predefined rule set. The method further includes generating a token in response to receiving the token request. The method then includes determining an assurance rating for the generated token based on the analyzed received plurality of metadata, whereby the assurance rating indicates a risk of fraud associated with the generated token. The method finally includes assigning a token rating to the generated token based on the determined assurance rating.Type: ApplicationFiled: December 11, 2015Publication date: June 15, 2017Inventors: Arthur L. De Magalhaes, Nitin Gaur, Wu Ning, William J. O'Donnell
-
Publication number: 20170169433Abstract: According to one exemplary embodiment, a method for dynamic generation of payment token ratings is provided. The method includes receiving a token request, whereby the token request includes a plurality of metadata. The method also includes analyzing the received plurality of metadata based on at least one predefined rule set. The method further includes generating a token in response to receiving the token request. The method then includes determining an assurance rating for the generated token based on the analyzed received plurality of metadata, whereby the assurance rating indicates a risk of fraud associated with the generated token. The method finally includes assigning a token rating to the generated token based on the determined assurance rating.Type: ApplicationFiled: April 27, 2016Publication date: June 15, 2017Inventors: Arthur L. De Magalhaes, Nitin Gaur, Wu Ning, William J. O'Donnell
-
Publication number: 20170083906Abstract: Embodiments relate to token assurance level based transaction processing. An aspect includes receiving, from a requester by a tokenization server in an electronic payment system, a request for de-tokenization of a token corresponding to a transaction. Another aspect includes determining a token assurance level of the token. Another aspect includes based on the token assurance level of the token; assigning a quality of service to the transaction. Yet another aspect includes performing the de-tokenization based on the assigned quality of service and returning an account number corresponding to the token to the requester.Type: ApplicationFiled: September 21, 2015Publication date: March 23, 2017Inventors: Nitin Gaur, William J. O'Donnell
-
Patent number: 9582407Abstract: Mechanisms are provided for performing security role definition testing. An application is received in a container of a runtime environment of the data processing system. The application has methods and security role definitions associated with the methods. A properties object, which specifies a user identifier to security role mapping, is received in the container. A test application is executed, in the container, by the processor, on an execution of the methods of the application based on the user identifier to security role mapping and the security role definitions. The test application tests an operation of the application with regard to the security role definitions. A result of the execution of the test application on the execution of the methods of the application is then output.Type: GrantFiled: February 25, 2011Date of Patent: February 28, 2017Assignee: International Business Machines CorporationInventors: Paul W. Bennett, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
-
Patent number: 9276869Abstract: An identity provider (IdP) discovery service operative at a service provider (SP) is described. In operation, and as valid requests are received by the SP via normal IdP-initiated flows, the SP builds-up knowledge about the relationship between the IdP (that redirected the request) and the initiator of the request. The IdP instance typically is inferred from an HTTP referrer field, and information about the initiator may be ascertained from client-specific information, such as client system IP address, client DNS domain, a domain of a user e-mail address, a target URL for the incoming request, or the value associated with a particular HTTP header field. This knowledge is maintained in one or more mapping table(s) that associate request attributes-to-IdP instance data. The mappings are then used to facilitate IdP discovery for a new incoming request to the SP that has been determined to originate from other than an IdP.Type: GrantFiled: January 2, 2013Date of Patent: March 1, 2016Assignee: International Business Machines CorporationInventors: William D. Dodd, William J. O'Donnell, Eduardo N. Spring, Chunlong Liang
-
Publication number: 20160057132Abstract: Various embodiments are directed to a computer-implemented method for displaying a map of certificate relationships. A method can include retrieving certificate information for two or more servers and storing the retrieved certificate information in a memory. In addition, the method can include receiving a command to generate a map of certificate relationships. The command includes a command scope that identifies at least a first server of the two or more servers. Further, the method can include generating the map from the retrieved certificate information and rendering the map on a display device. The map includes the first server and a device having a certificate relationship with the first server.Type: ApplicationFiled: August 21, 2014Publication date: February 25, 2016Inventors: Robert A. Gibson, J. Peter Neergaard, William J. O'Donnell
-
Publication number: 20160056965Abstract: Various embodiments are directed to a computer-implemented method for displaying a map of certificate relationships. A method can include retrieving certificate information for two or more servers and storing the retrieved certificate information in a memory. In addition, the method can include receiving a command to generate a map of certificate relationships. The command includes a command scope that identifies at least a first server of the two or more servers. Further, the method can include generating the map from the retrieved certificate information and rendering the map on a display device. The map includes the first server and a device having a certificate relationship with the first server.Type: ApplicationFiled: September 3, 2015Publication date: February 25, 2016Inventors: Robert A. Gibson, J. Peter Neergaard, William J. O'Donnell
-
Patent number: 9147062Abstract: A method, data processing system, and computer program product for managing user identification information. A determination is made whether an instance of security information in use on the first application server and referenced by a token that has expired was generated by an application server compatible with a first application server in response to receiving the token. A determination is made whether the instance of the security information is managed by a set of rules for a group of users of the first application server. A determination is made whether a user identifier from the token is authorized to access the first application server. The token is renewed in response to determining that the user identifier is authorized to access the first application server.Type: GrantFiled: June 29, 2011Date of Patent: September 29, 2015Assignee: International Business Machines CorporationInventors: Paul W. Bennett, Christopher M. Dettlaff, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson
-
Patent number: 8955052Abstract: A method, system and computer-usable medium are disclosed for managing identity authorizations to access information processing system resources. An application thread requiring access to target resources is initiated and associated with an authenticated client identity and a server identity. The resource authorization attribute of a resource required for execution of the application thread designates the use of a client identity, a server identity, or a client identity and server identity when attempting authorized access of the resource. The client identity, the server identity, or the client identity and server identity is then respectively used to access the target resource and the application thread is executed.Type: GrantFiled: May 27, 2010Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: William J. O'Donnell, Elisa Ferracane, Paul W. Bennett, Michael C. Thompson
-
Patent number: 8938791Abstract: A method for dynamically assigning a displayable realm name begins upon receipt of an authentication request to an application, such as a web application, being executed by an application server. In response, a determination is made whether an application realm name has been set in a configuration file associated with the application. If not, a custom display property is then evaluated. If the custom display property is set true, a realm name associated with an active authentication mechanism is retrieved and provided for display in an authentication panel. If the custom display property is set false, a default string is provided for display in the authentication panel. In this manner, an application server administrator can control what realm name is displayed to an end user in the event an application developer has not specified the realm name in the application configuration.Type: GrantFiled: June 10, 2011Date of Patent: January 20, 2015Assignee: International Business Machines CorporationInventors: William J. O'Donnell, Paul William Bennett, Elisa Ferracane, Ajay Reddy Karkala, Ut Van Le, Michael Craig Thompson
-
Publication number: 20140165194Abstract: Protection against an attack which exploits an eXtensible Markup Language (XML) Encryption vulnerability includes receiving a ciphertext request utilizing an EncryptedKey element and detecting either a failure to decrypt the cipher value in the EncryptedData element or a failure to parse the resulting decrypted XML. Upon detecting the failure, a count of failures associated with the EncryptedKey element is incremented, and when the count exceeds a threshold number of failures, subsequent usage of the EncryptedKey element and delivery of the request to an application service are prevented. Optionally, a rejection message is returned to the requester.Type: ApplicationFiled: December 6, 2012Publication date: June 12, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: William Durward Dodd, Chunlong Liang, William J O'Donnell, Eduardo N Spring
-
Patent number: 8707405Abstract: A method for selectively refreshing group membership for an identifier associated with an authenticated user. The identifier represents an application server security context, and it is generated to enable a user credential associated with the authenticated user to be persisted. Following such authentication, the client is provided with a time-bounded, renewable security token. The method begins by configuring an option whether group membership information is refreshed during renewal of an expired security token. During renewal of an expired security token, the method determines whether the option is set. If so, an attempt is made to refresh information. This attempt performs a set of checks to verify certain conditions. If these checks are valid, the identifier is refreshed and the security token renewed with updated group membership information. If any check is not valid, the identifier is refreshed and the security token renewed with existing information.Type: GrantFiled: January 11, 2012Date of Patent: April 22, 2014Assignee: International Business Machines CorporationInventors: William J. O'Donnell, Paul William Bennett, Elisa Ferracane, Michael Craig Thompson, Michael Dettlaff Christopher
-
Patent number: 8645679Abstract: A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints.Type: GrantFiled: June 17, 2011Date of Patent: February 4, 2014Assignee: International Business Machines CorporationInventors: Elisa Ferracane, Paul William Bennett, William J. O'Donnell, Ajay Reddy Karkala, Ut Van Le, Michael Craig Thompson, Maxim Avery Moldenhauer
-
Publication number: 20130179952Abstract: A method for selectively refreshing group membership for an identifier associated with an authenticated user. The identifier represents an application server security context, and it is generated to enable a user credential associated with the authenticated user to be persisted. Following such authentication, the client is provided with a time-bounded, renewable security token. The method begins by configuring an option whether group membership information is refreshed during renewal of an expired security token. During renewal of an expired security token, the method determines whether the option is set. If so, an attempt is made to refresh information. This attempt performs a set of checks to verify certain conditions. If these checks are valid, the identifier is refreshed and the security token renewed with updated group membership information. If any check is not valid, the identifier is refreshed and the security token renewed with existing information.Type: ApplicationFiled: January 11, 2012Publication date: July 11, 2013Applicant: International Business Machines CorporationInventors: William J. O'Donnell, Paul William Bennett, Elisa Ferracane, Michael Craig Thompson, Christopher Michael Dettlaff
-
Publication number: 20130007856Abstract: A method, data processing system, and computer program product for managing user identification information. A determination is made whether an instance of security information in use on the first application server and referenced by a token that has expired was generated by an application server compatible with a first application server in response to receiving the token. A determination is made whether the instance of the security information is managed by a set of rules for a group of users of the first application server. A determination is made whether a user identifier from the token is authorized to access the first application server. The token is renewed in response to determining that the user identifier is authorized to access the first application server.Type: ApplicationFiled: June 29, 2011Publication date: January 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul W. Bennett, Christopher M. Dettlaff, Elisa Ferracane, William J. O'Donnell, Michael C. Thompson