Mark B. Gunning - Austin TX, US Jason E. Kelley - Austin TX, US Nefaur R. Khandker - Burke VA, US Ivan S. Kornienko - Old Bridge NJ, US Patrick R. Richer - Houston TX, US Jeffrey C. Sneden - Austin TX, US Kenneth Stephen - Round Rock TX, US
International Classification:
G06F 9/46
US Classification:
718103
Abstract:
A project management task prioritization system is provided to refine the prioritization factors for tasks in a project based on changes to the order of performing the tasks. The initial proposed order for performing the tasks is provided by the system to the person responsible for the task in a graphical format that allows the person to drag and drop the tasks, adjusting the order of the tasks to their preferred order. A neural network comparator is used to compare the task prioritization factors associated with each pair of tasks that are altered in order to determine a relative priority. The neural network system updates the task prioritization factors based on the changes in order the tasks are to be performed.
Computer Method And Apparatus For Authenticating Unattended Machines
Peter Theodore Waltenberg - Robina, AU Kenneth Stephen - Round Rock TX, US Timothy Simon Bartley - Worongary, AU
International Classification:
G06F 7/04 H04L 9/32
US Classification:
726 2, 726 29
Abstract:
An unattended computer-based machine is authenticated by the present invention method, system or apparatus. The subject machine may be an auto-restarted machine or similar machine configured to be unattended. Upon receipt of initializing input from a user at a subject computer-based machine, a working process authenticates the user and generates resulting credentials. The working process stores the generated credentials in a memory area of the subject machine. Separate from and independent of the working process is a security monitor of the present invention. A monitoring module of the present invention monitors user activity on the subject machine and upon detecting suspect activity destroys the stored credentials of the working process. Suspect activity includes any activity raising a suspicion of compromise.
Photograph of James Kenneth Stephen in 1892. James Kenneth Stephen (25 February 1859 3 February 1892) was an English poet, and tutor to Prince Albert ...
Name / Title
Company / Classification
Phones & Addresses
Kenneth Stephen Owner
Stephen Life Insurance Association Insurance Agent/Broker
13460 Old Stage Rd, Kennebec, NC 27592
Kenneth Stephen
STANDING IN THE GAP KINGDOM MINISTRIES
Kenneth Stephen Owner, Principal
Complete Financial Solutions O Business Services · Investment Advisory Service
Igate Nov 1996 - Aug 2005
Software Engineer
Ibm Nov 1996 - Aug 2005
Senior Solutions Architect
Tata Consultancy Services Nov 1992 - Oct 1996
Software Engineer