1
Nathan Fontenot, Fionnuala G Gunter, Michael T Strosaker, George C Wilson: Source code search engine. International Business Machines Corporation, Stosch Sabo, Steven L Bennett, June 28, 2016: US09378242 (5 worldwide citation)

A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.


2
Rajiv Augu, Steven A Bade, Jeb R Linton, Dimitrios Pendarakis, George C Wilson, Lee Hardy Wilson: Virtual machine images encryption using trusted computing group sealing. International Business Machines Corporation, David Mims, Robert C Rolnik, April 8, 2014: US08694786 (4 worldwide citation)

A host machine provisions a virtual machine from a catalog of stock virtual machines. The host machine instantiates the virtual machine. The host machine configures the virtual machine, based on customer inputs, to form a customer's configured virtual machine. The host machine creates an image from ...


3
Nathan D Fontenot, Jeffrey D George, Ryan P Grimm, Joel H Schopp, Michael T Strosaker, George C Wilson: Intermediate trust state. International Business Machines Corporation, Lieberman & Brandsdorfer, October 27, 2015: US09172719 (1 worldwide citation)

Embodiments of the invention relate to implementation of an intermediate trusted state of an electronic account based upon questionable account communication(s). A profile of malicious or unauthorized activity is created, and a profile of account activity is created. As account activity takes place, ...


4
Nathan Fontenot, Robert C Jennings Jr, Joel H Schopp, Michael T Strosaker, George C Wilson: Post-return asynchronous code execution. International Business Machines Corporation, Nicholas D Bowman, January 24, 2017: US09552223

A method, system, and computer program product for the prioritization of code execution. The method includes accessing a thread in a context containing a set of code instances stored in memory; identifying sections of the set of code instances that correspond to deferrable code tasks; executing the ...


5
Nathan D Fontenot, Joel H Schopp, Michael T Strosaker, George C Wilson: Extending platform trust during program updates. International Business Machines Corporation, VanLeeuwen & VanLeeuwen, Damion C Josephs, December 1, 2015: US09201642

An approach is provided in which a computer system generates a current hash value of a computer program in response to receiving a request to execute the computer program. Next, the computer system determines that the current hash value fails to match a reference hash value that was previously gener ...


6
Nathan Fontenot, Jeffrey D George, Ryan P Grimm, Joel H Schopp, Michael T Strosker, George C Wilson: Controlled password modification method and apparatus. International Business Machines Corporation, Steven Bennett, Damion Jospehs, Daniel McConnell, February 10, 2015: US08955070

Apparatus which control modification of passwords by implementing a procedure by which end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and Linkedln. Contacts so identified are used as a set of potential identity verifier ...


7
Nathan Fortenot, Jeffrey D George, Ryan P Grimm, Joel H Schopp, Michael T Strosker, George C Wilson: Controlled password modification method. International Business Machines Corporation, Steven Bennett, Damion Josephs, Daniel E McConnell, February 10, 2015: US08955071

A method which controls modification of passwords. An end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or ...


8
Philip F Estes, George C Wilson: Intrusion management. International Business Machines Corporation, Jay Wahlquist, Steven L Bennett, September 20, 2016: US09450974

A computer implemented method for managing a network intrusion is disclosed. The method can include monitoring, by an intrusion management system, a set of nodes of a computer network. The method can also include determining a node workload for the set of nodes. Further, the method can include class ...


9
Nathan Fontenot, Fionnuala G Gunter, Michael T Strosaker, George C Wilson: Source code search engine. International Business Machines Corporation, Stosch Sabo, April 3, 2018: US09934270

A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. The second pass comprises a semantic measure of similarity. The query source code is a user-selected portion of source code. The results may be ranked and output to an I/O device.


10
Reinhard T Buendgen, Jeffrey A Frey, Jeb R Linton, James A O Connor, William J Rooney, George C Wilson: Extending shrouding capability of hosting system. INTERNATIONAL BUSINESS MACHINES CORPORATION, Cantor Colburn, William A Kinnaman Jr, February 13, 2018: US09894051

Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a g ...