Patents by Inventor William J. Rippon

William J. Rippon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200220893
    Abstract: A security control point (SCP) that protects target computing system is tested in-place and while active. The approach is initiated the SCP receiving and processing one or more “simulated” communication flows. To this end, a test initiator system is configured to generate and transmit communication flows to the SCP being tested. The SCP extracts the encapsulated flow, and then processes that flow through one or more of the SCP's configured protection mechanisms. Thus, the SCP processes the simulated communication flow as though it were a real session, and thus to determine what actions, if any, should be taken with respect to that flow. After processing, the simulated session traffic is shunted or otherwise diverted away from the target computing system. The results of the SCP's processing, however, are output to other systems (e.g., logging or alerting mechanisms), or they are returned to the test initiation system, e.g., for correlation, reporting, and the like.
    Type: Application
    Filed: January 28, 2020
    Publication date: July 9, 2020
    Applicant: International Business Machines Corporation
    Inventors: Ivan Dell'Era, Kevin R. O'Connor, William J. Rippon
  • Patent number: 10594720
    Abstract: A security control point (SCP) that protects target computing system is tested in-place and while active. The approach is initiated the SCP receiving and processing one or more “simulated” communication flows. To this end, a test initiator system is configured to generate and transmit communication flows to the SCP being tested. The SCP extracts the encapsulated flow, and then processes that flow through one or more of the SCP's configured protection mechanisms. Thus, the SCP processes the simulated communication flow as though it were a real session, and thus to determine what actions, if any, should be taken with respect to that flow. After processing, the simulated session traffic is shunted or otherwise diverted away from the target computing system. The results of the SCP's processing, however, are output to other systems (e.g., logging or alerting mechanisms), or they are returned to the test initiation system, e.g., for correlation, reporting, and the like.
    Type: Grant
    Filed: November 3, 2017
    Date of Patent: March 17, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ivan Dell'Era, Kevin R. O'Connor, William J. Rippon
  • Publication number: 20200028870
    Abstract: A security control point (SCP) that protects target computing system is tested in-place and while active. The approach is initiated the SCP receiving and processing one or more “simulated” communication flows. To this end, a test initiator system is configured to generate and transmit communication flows to the SCP being tested. The SCP extracts the encapsulated flow, and then processes that flow through one or more of the SCP's configured protection mechanisms. Thus, the SCP processes the simulated communication flow as though it were a real session, and thus to determine what actions, if any, should be taken with respect to that flow. After processing, the simulated session traffic is shunted or otherwise diverted away from the target computing system. The results of the SCP's processing, however, are output to other systems (e.g., logging or alerting mechanisms), or they are returned to the test initiation system, e.g., for correlation, reporting, and the like.
    Type: Application
    Filed: November 3, 2017
    Publication date: January 23, 2020
    Applicant: International Business Machines Corporation
    Inventors: Ivan Dell'Era, Kevin R. O'Connor, William J. Rippon
  • Publication number: 20160080422
    Abstract: A hierarchically layered group of domain-specific enhanced enterprise ontologies where each domain layer is connected to the immediate domain layer below through a layer policy/control/context translation ontology. Security controls discovery and a mapping ontology is semantically integrated to domain meta models in each layer and a corresponding security controls knowledge base.
    Type: Application
    Filed: June 5, 2015
    Publication date: March 17, 2016
    Inventors: Brian M. Belgodere, Lorraine M. Herger, Shakil M. Khan, Matthew A. McCarthy, William J. Rippon
  • Patent number: 8103291
    Abstract: A power saving and security enabling method, system, computer program product, and program storage device are disclosed. Wireless communication technology transceivers in a multi-mode wireless communication device are activated and deactivated based on a location detected by a location-based service system. A set of wireless network connection profiles control activation and deactivation of the wireless communication technology transceivers. Reduction in power consumption and improvement in security is achieved by only activating wireless communication technology transceivers when need and deactivating any other transceivers which are not currently connected to a wireless communication network.
    Type: Grant
    Filed: August 28, 2008
    Date of Patent: January 24, 2012
    Assignee: International Business Machines Corporation
    Inventors: William J. Rippon, David W. Nielsen
  • Publication number: 20110188649
    Abstract: A computer implemented method that analyzes and improves a dial plan. A dial plan design template system receives an existing dial plan. The dial plan design template system models the existing dial plan as a directed graph. The dial plan design template system analyzes the directed graph to determine compliance with a set of edge rules. The dial plan design template system analyzes the directed graph to determine compliance with a set of connectivity type rules.
    Type: Application
    Filed: January 29, 2010
    Publication date: August 4, 2011
    Applicant: International Business Machines Corporation
    Inventors: George A. DeSimone, Shang Q. Guo, William J. Rippon, Zon-Yin Shae, Kunwadee Sripanidkulchai, Shu Tao
  • Patent number: 7975294
    Abstract: A client attempts to transmit a presence state to a presence server that is behind a firewall of a secure network. If the client is inside the firewall, the presence server instructs resources within the secure network to directly communicate with the client. However, if the client is outside the firewall, then the client must tunnel into the secure network via a Virtual Private Network (VPN) before accessing the resources in the secure network.
    Type: Grant
    Filed: November 19, 2007
    Date of Patent: July 5, 2011
    Assignee: International Business Machines Corporation
    Inventors: Ivan M. Heninger, John D. Kari, William J. Rippon, Galina Rubinshtein
  • Publication number: 20100056181
    Abstract: A power saving and security enabling method, system, computer program product, and program storage device are disclosed. Wireless communication technology transceivers in a multi-mode wireless communication device are activated and deactivated based on a location detected by a location-based service system. A set of wireless network connection profiles control activation and deactivation of the wireless communication technology transceivers. Reduction in power consumption and improvement in security is achieved by only activating wireless communication technology transceivers when need and deactivating any other transceivers which are not currently connected to a wireless communication network.
    Type: Application
    Filed: August 28, 2008
    Publication date: March 4, 2010
    Applicant: International Business Machines Corporation
    Inventors: William J. Rippon, David W. Nielsen
  • Publication number: 20090133115
    Abstract: A client attempts to transmit a presence state to a presence server that is behind a firewall of a secure network. If the client is inside the firewall, the presence server instructs resources within the secure network to directly communicate with the client. However, if the client is outside the firewall, then the client must tunnel into the secure network via a Virtual Private Network (VPN) before accessing the resources in the secure network.
    Type: Application
    Filed: November 19, 2007
    Publication date: May 21, 2009
    Inventors: Ivan M. Heninger, John D. Kari, William J. Rippon, Galina Rubinshtein