1
Joseph Celi Jr, Mark McGloin, Olgierd Stanislaw Pieczul: Application and data removal system. International Business Machines Corporation, David A Mims Jr, Damion Jospehs, Robert V Wilder, October 28, 2014: US08875304 (8 worldwide citation)

A method, programmed medium and system are provided for a server-based security manager application to support a self-cleaning operation on a remote computerized device. When a computer device has been reported as being missing for example, the security manager server application will cause the devi ...


2
Stephen Paul Kruger, Olgierd Stanislaw Pieczul: Mask based challenge response test. International Business Machines Corporation, Steven L Nichols, Van Cott Bagley Cornwall & McCarthy P C, October 21, 2014: US08869246 (4 worldwide citation)

A method for providing a challenge response test associated with a computer resource performed by a physical computing system includes, with the physical computing system, generating a challenge response test image comprising a plurality of well-formed construct elements forming a well-formed constr ...


3
Olgierd Stanislaw Pieczul, Brent Allan Hepburn, David Scott Kern, Mark McGloin, Mark Lawrence Rovelli: Cross-domain inactivity tracking for integrated web applications. International Business Machines Corporation, David B Woycechowsky, David H Judson, October 4, 2016: US09462068 (2 worldwide citation)

In a cloud computing environment, a user authenticates to multiple cloud services concurrently. A master service has knowledge of or tracks the cloud service(s) to which a user is authenticated. Each cloud service may enforce its own inactivity period, and the inactivity period of at least first and ...


4
Olgierd Stanislaw Pieczul, Mary Ellen Zurko: Increasing chosen password strength. International Business Machines Corporation, VanLeeuwen & VanLeeuwen, Jeffrey S LaBaw, April 14, 2015: US09009815 (1 worldwide citation)

An approach is provided to increase password strength in a group of users. The approach detects a password event corresponding to one of the users. In response to the detected password event, the approach identifies a strength of the user's password and compares it to one or more password strength m ...


5
Olgierd Stanislaw Pieczul, Mark Alexander McGloin, Mary Ellen Zurko: Authenticating a rich client from within an existing browser session. International Business Machines Corporation, Jeffrey S LaBaw, David H Judson, June 17, 2014: US08756665 (1 worldwide citation)

A user authenticates to a Web- or cloud-based application from a browser-based client. The browser-based client has an associated rich client. After a session is initiated from the browser-based client (and a credential obtained), the user can discover that the rich client is available and cause it ...


6
Joseph Celi Jr, Mark Alexander McGloin, Harshita Nersu, Olgierd Stanislaw Pieczul: Device identification for externalizing password from device coupled with user control of external password service. International Business Machines Corporation, Robert H Frantz, Jeffrey S LaBaw, January 6, 2015: US08931081 (1 worldwide citation)

Information and data stored by a mobile device is protected by comprising applying password-protection to the locally-stored information without persistently storing the corresponding password locally. Rather, the corresponding password is stored by a remote password server. In response to a trigger ...


7
Stephen Paul Kruger, Olgierd Stanislaw Pieczul: Mask based challenge response test. International Business Machines Corporation, Steven L Nichols, Van Cott Bagley Cornwall & McCarthy P C, November 25, 2014: US08898740 (1 worldwide citation)

A computing system includes a processor; and a memory communicatively coupled to the processor. The processor is configured to: generate a challenge response test image comprising a plurality of well-formed construct elements forming a well-formed construct and a plurality of random construct elemen ...


8
Olgierd Stanislaw Pieczul, Joseph Celi Jr, Mark McGloin: Mobile device-based keypad for enhanced security. International Business Machines Corporation, David B Woycechowsky, David H Judson, August 9, 2016: US09413534 (1 worldwide citation)

An authentication channel is established between a mobile device and a transaction terminal that uses a keypad for access control. The terminal keypad is assumed to be untrusted, whereas the mobile device has a trusted interface that only the device user can access and use. The transaction terminal ...


9
Olgierd Stanislaw Pieczul, Mark Alexander McGloin, Mary Ellen Zurko, David Scott Kern, Brent Allan Hepburn: Method and system for authenticating a rich client to a web or cloud application. International Business Machines Corporation, David B Woycechowsky, David H Judson, Jeffrey S LaBaw, July 4, 2017: US09699168 (1 worldwide citation)

A rich client performs single sign-on (SSO) to access a web- or cloud-based application. According to the described SSO approach, the rich client delegates to its native application server the task of obtaining a credential, such as a SAML assertion. The native server, acting on behalf of the user, ...


10
Mark Alexander McGloin, Olgierd Stanislaw Pieczul, Mary Ellen Zurko: Identifying guests in web meetings. International Business Machines Corporation, Jeffrey S LaBaw, David H Judson, October 8, 2013: US08555339 (1 worldwide citation)

A technique that identifies registered or guest users in web meetings of the type wherein users must follow a supplied URL to attend the meeting. Registered and guest users are provided different forms of the meeting invite URL. Each registered user receives a common web meeting link (a URL) that he ...