Patents by Inventor Brian D. Goodman
Brian D. Goodman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8856669Abstract: Systems and methods record graphical marks input through a graphic user interface of a computerized device. The graphical marks comprise input other than keyboard button input. The recording includes recording different input times when the graphical marks are input and recording whether the graphic marks are uninterrupted graphic marks, using a processor of the computerized device. An uninterrupted graphical mark is one of the graphical marks that is input through a discrete and continuous user input action, and is made without the user pausing such discrete and continuous user input action. The systems and methods also display the graphical marks, and provide an erasure option on the graphic user interface. The erasure option allows the user to distinguish which of the graphical marks are erased based on the different input times and/or by distinguishing between erasure of different ones of the uninterrupted graphic marks.Type: GrantFiled: July 2, 2012Date of Patent: October 7, 2014Assignee: International Business Machines CorporationInventor: Brian D. Goodman
-
Publication number: 20140297695Abstract: Approaches for routing data to storage are provided. An approach includes determining implicit metadata from explicit metadata received with a request from a user to store a file. The approach also includes determining a storage resource based on the explicit metadata, the implicit metadata, and a registry of storage resources. The approach additionally includes routing data of the file to the determined storage resource.Type: ApplicationFiled: April 2, 2013Publication date: October 2, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ryan G. DEJANA, Lisa Seacat DELUCA, Brian D. GOODMAN, Daniel C. KROOK
-
Patent number: 8849893Abstract: A message received from a user causes a query of a dynamic database such as a FAQ or Relational Database, the results of the query are returned to the user. Furthermore the received message is published to a community of anonymous users. Optionally the user can edit the returned results and store the edited version in the dynamic database or edit the dynamic database via a GUI interface.Type: GrantFiled: October 7, 2005Date of Patent: September 30, 2014Assignee: International Business Machines CorporationInventors: Brian D. Goodman, Konrad C. Lagarde, Eben P. Stewart, Michael Van Der Meulen, Jessica Wu
-
Patent number: 8826143Abstract: A method for enabling logout from websites includes creating at least one meta-data tag for a web page, where said at least one meta-data tag comprises a logout universal resource locator for the web page; reading the at least one meta-data tag for each web application that a user is logged into; recording the logout universal resource locator in a database; and displaying a name of each web application and the corresponding logout universal resource locator in a graphical user interface.Type: GrantFiled: March 14, 2012Date of Patent: September 2, 2014Assignee: International Business Machines CorporationInventors: Brian D. Goodman, Ajay Raina
-
Publication number: 20140173279Abstract: Embodiments of the present invention allow for “end-user” provisioned instances to securely identify themselves beyond a simple user ID and password. Specifically, embodiments of the present invention use a multi-part security approach that includes (among other things): an identifying key (e.g., a shared private key) known by the cloud security system and the instance; and at least one additional security factor such as an identifier found in TCP/IP packets (e.g., an internet protocol address). In a typical embodiment, a request for an instance (e.g., a virtual machine) is received, and a template (e.g., an image) corresponding to the requested instance is identified. From this template, the instance is provisioned. Under the embodiments of the present invention, the instance will be provisioned to include a security key. When a request is thereafter received from the instance, the request is validated using the security key and the additional security factor(s).Type: ApplicationFiled: February 25, 2014Publication date: June 19, 2014Applicant: International Business Machines CorporationInventors: Brian D. Goodman, Lisa Seacat DeLuca
-
Patent number: 8739169Abstract: An embodiment of the invention includes a method for workload optimization in a network (e.g., cloud computing environment). Usage of resources in the network is monitored in order to maintain a metadata catalog of operating experiences of the resources. A request for a resource in the network is received; and, resources that are available in the network are identified. Units that are included in the resources are also identified. The metadata catalog is queried for operating experiences associated with the requested resource. The requested resource is provisioned by the host system based on the operating experiences associated with the resource. This includes assembling the units that are included in the requested resource and/or automatically allocating workloads of the computing modules based on the cataloging of the workloads in the metadata catalog. The metadata catalog is updated with an operating experience associated with the provisioning of the requested resource.Type: GrantFiled: April 20, 2010Date of Patent: May 27, 2014Assignee: International Business Machines CorporationInventors: Milton A. Bonilla, Brian D. Goodman
-
Patent number: 8707302Abstract: A technique for personalizing feed content in virtualized computing environments includes accessing, using a data processing system, metadata associated with a virtual machine instance that is stored in a database. The technique also includes prioritizing, using the data processing system, feed content delivered to a client associated with the virtual machine instance based on the metadata.Type: GrantFiled: January 6, 2011Date of Patent: April 22, 2014Assignee: International Business Machines CorporationInventors: Lisa S. DeLuca, Brian D. Goodman, Soobaek Jang
-
Patent number: 8694777Abstract: Embodiments of the present invention allow for “end-user” provisioned instances to securely identify themselves beyond a simple user ID and password. Specifically, embodiments of the present invention use a multi-part security approach that includes (among other things): an identifying key (e.g., a shared private key) known by the cloud security system and the instance; and at least one additional security factor such as an identifier found in TCP/IP packets (e.g., an internet protocol address). In a typical embodiment, a request for an instance (e.g., a virtual machine) is received, and a template (e.g., an image) corresponding to the requested instance is identified. From this template, the instance is provisioned. Under the embodiments of the present invention, the instance will be provisioned to include a security key. When a request is thereafter received from the instance, the request is validated using the security key and the additional security factor(s).Type: GrantFiled: August 13, 2010Date of Patent: April 8, 2014Assignee: International Business Machines CorporationInventors: Brian D. Goodman, Lisa Seacat DeLuca
-
Publication number: 20140012618Abstract: An embodiment of the invention provides a system and method for displaying the scheduling availability of a user. The system includes an occupancy module for analyzing the schedule of the user to determine the occupancy for a time period in the schedule. The time period includes an available time slot and/or an occupied time slot. A processor connected to the occupancy module determines whether the occupancy for the time period is above a threshold level of occupancy. The threshold level of occupancy includes a maximum number of occupied time slots, a maximum percentage of occupied time slots, a maximum amount of occupied time, and/or a maximum percentage of occupied time. A scheduling module connected to the processor automatically displays the scheduling availability of the user as unavailable for the time slot when the occupancy for the time period is above the threshold level of occupancy.Type: ApplicationFiled: December 27, 2012Publication date: January 9, 2014Applicant: International Business Machines CorporationInventors: Lisa Seacat DeLuca, Brian D. Goodman
-
Publication number: 20140006983Abstract: Systems and methods record graphical marks input through a graphic user interface of a computerized device. The graphical marks comprise input other than keyboard button input. The recording includes recording different input times when the graphical marks are input and recording whether the graphic marks are uninterrupted graphic marks, using a processor of the computerized device. An uninterrupted graphical mark is one of the graphical marks that is input through a discrete and continuous user input action, and is made without the user pausing such discrete and continuous user input action. The systems and methods also display the graphical marks, and provide an erasure option on the graphic user interface. The erasure option allows the user to distinguish which of the graphical marks are erased based on the different input times and/or by distinguishing between erasure of different ones of the uninterrupted graphic marks.Type: ApplicationFiled: July 2, 2012Publication date: January 2, 2014Applicant: International Business Machines CorporationInventor: Brian D. Goodman
-
Publication number: 20130304788Abstract: A computer implemented method, a data processing system, and a computer program product deploy application components within a distributed environment. A Runtime management platform opens an application archive for an application to be deployed onto a distributed computing environment. The runtime management platform identifies a set of application components for the application. The runtime management platform identifies at least one set of rules defining application component deployment patterns for the set of application components. The runtime management platform deploys the set of application components to a set of runtime containers according to the at least one set of rules defining the application component deployment patterns.Type: ApplicationFiled: May 11, 2012Publication date: November 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lisa Seacat DeLuca, Brian D. Goodman, Soobaek Jang
-
Publication number: 20130246943Abstract: A method for enabling logout from websites includes creating at least one meta-data tag for a web page, where said at least one meta-data tag comprises a logout universal resource locator for the web page; reading the at least one meta-data tag for each web application that a user is logged into; recording the logout universal resource locator in a database; and displaying a name of each web application and the corresponding logout universal resource locator in a graphical user interface.Type: ApplicationFiled: March 14, 2012Publication date: September 19, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brian D. Goodman, Ajay Raina
-
Patent number: 8521876Abstract: A peer-to-peer network has a server that maintains a list of addresses of clients connected to the peer-to-peer network. The server generates seed lists for each of the clients connected to the network from the server maintained list. The clients conduct peer-to-peer searches using the seed list provided by the server. The seed lists may be either randomly generated or generated to facilitate network objectives. The clients may periodically request seed list refreshing. The peer-to-peer network may further include authentication and authorization search security checks.Type: GrantFiled: October 30, 2006Date of Patent: August 27, 2013Assignee: International Business Machines CorporationInventors: Brian D. Goodman, John W. Rooney, Ramesh Subramanian, William C. Sweeney
-
Patent number: 8499339Abstract: Verifiable authentication credentials are provided to foreign systems without passing an id and password to the protected resource. A user wishing to access a secure remote site is prompted for credentials, the credentials are authenticated locally and a digitally signed token is created. The token is redirected to the secure remote site by the user's browser using HTTP redirection. The digital signature is verified by the secure remote site preferably by a digital signature web service. The remote site establishes communications with the user if the digital signature is valid.Type: GrantFiled: August 17, 2007Date of Patent: July 30, 2013Assignee: International Business Machines CorporationInventors: Li-Lung Chao, Brian D. Goodman, James K. Kebinger
-
Patent number: 8494276Abstract: An embodiment of the invention provides a method including receiving input from a user, which includes a handwritten symbol. The input is compared to prototype symbols to determine whether the input includes a threshold degree of similarity with a prototype symbol. If the input does not include a threshold degree of similarity with a prototype symbol, the input is stored as a prototype symbol. If the input includes a threshold degree of similarity with a prototype symbol, it is determined whether the input represents a text character. If the input represents a text character, the text character is identified and a prototype text character is identified. The input is mapped to the identified text character and the identified prototype text character. If the input does not represent a text character, the input is mapped to a prototype shape, and the input is mapped to the prototype shape.Type: GrantFiled: September 23, 2011Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventor: Brian D. Goodman
-
Publication number: 20130145304Abstract: A tool for detecting potential unintentional user input. Eye tracking technology is used to keep a record of where on a display a user is looking or if the user is even looking at the display. When input, such as a mouse selection or a tap on a touch screen, is received, the location of the selection is compared to a location of the user's gaze around when the selection was made. If the gaze location is outside of an acceptable range from the selection location, it is determined that the selection may have been in error and the selection is disregarded or a confirmation is requested of the user.Type: ApplicationFiled: December 2, 2011Publication date: June 6, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lisa Seacat DeLuca, Brian D. Goodman, Soobaek Jang
-
Patent number: 8423602Abstract: A system, computer architecture, and method of enabling asynchronous callback and broadcast notification between a server and a client software application in a network, wherein the method comprises processing computer logic instructions in the network; requesting a notification of a completion of the processing of the computer logic instructions; storing the notification request in a registry; queuing the notification request according to a response to the notification request and a list of user endpoints requesting the notification of a completion of the processing of the computer logic instructions; and notifying a recipient system of the completion of the processing of the computer logic instructions upon execution of the queued notification request.Type: GrantFiled: October 13, 2004Date of Patent: April 16, 2013Assignee: International Business Machines CorporationInventors: Brian D. Goodman, Maheshwar Rao Inampudi
-
Publication number: 20130077865Abstract: An embodiment of the invention provides a method including receiving input from a user, which includes a handwritten symbol. The input is compared to prototype symbols to determine whether the input includes a threshold degree of similarity with a prototype symbol. If the input does not include a threshold degree of similarity with a prototype symbol, the input is stored as a prototype symbol. If the input includes a threshold degree of similarity with a prototype symbol, it is determined whether the input represents a text character. If the input represents a text character, the text character is identified and a prototype text character is identified. The input is mapped to the identified text character and the identified prototype text character. If the input does not represent a text character, the input is mapped to a prototype shape, and the input is mapped to the prototype shape.Type: ApplicationFiled: September 23, 2011Publication date: March 28, 2013Applicant: International Business Machines CorporationInventor: Brian D. Goodman
-
Patent number: 8364752Abstract: An embodiment of the invention provides a system and method for displaying the scheduling availability of a user. The system includes an occupancy module for analyzing the schedule of the user to determine the occupancy for a time period in the schedule. The time period includes an available time slot and/or an occupied time slot. A processor connected to the occupancy module determines whether the occupancy for the time period is above a threshold level of occupancy. The threshold level of occupancy includes a maximum number of occupied time slots, a maximum percentage of occupied time slots, a maximum amount of occupied time, and/or a maximum percentage of occupied time. A scheduling module connected to the processor automatically displays the scheduling availability of the user as unavailable for the time slot when the occupancy for the time period is above the threshold level of occupancy.Type: GrantFiled: February 18, 2011Date of Patent: January 29, 2013Assignee: International Business Machines CorporationInventors: Brian D. Goodman, Lisa Seacat DeLuca
-
Patent number: 8364596Abstract: A system and method comprising filtering electronic data on a transaction per transaction basis and replicating the filtered electronic data in response to a request to obtain electronic data on the transaction per transaction basis. The system and method further includes providing the filtered replicated electronic data for viewing.Type: GrantFiled: June 29, 2006Date of Patent: January 29, 2013Assignee: International Business Machines CorporationInventors: Gregory J Boss, Karyn T Corneli, Brian D Goodman, Rick A Hamilton, II