Patents Represented by Attorney, Agent or Law Firm Arthur J. Samodovitz
  • Patent number: 8346769
    Abstract: System, method and program for managing bookmarks. A user hovers a cursor over a primary bookmark displayed on a client computer. In response, the client computer automatically sends a request to a server corresponding to the primary bookmark to identify one or more alternate bookmarks that correspond to the primary bookmark. In response to receipt of the identification of the one or more alternate bookmarks from the server, the client computer displays the one or more alternate bookmarks adjacent to the primary bookmark. If a user selects one of the alternate bookmarks which is displayed, the client computer sends a request to a web server corresponding to the selected alternate bookmark for a web page corresponding to the selected alternate bookmark.
    Type: Grant
    Filed: March 19, 2012
    Date of Patent: January 1, 2013
    Assignee: International Business Machines Corporation
    Inventor: Robert D. Wilhelm
  • Patent number: 8341312
    Abstract: Managing a data transfer from one or more source storage devices to one or more target storage devices. The data transfer comprises concurrent transfer of a multiplicity of data units pursuant to respective data transfer commands. The concurrent transfer of the multiplicity of data units is currently in-progress. A computer determines a currently-overloaded storage component involved in the data transfer. The computer determines a plurality of the data transfer commands that involve the overloaded storage component. The computer determines an approximately-minimum number of the data transfer commands to cancel to stop overload of the overloaded storage component. In response, the computer cancels the minimum number of the data transfer commands.
    Type: Grant
    Filed: April 29, 2011
    Date of Patent: December 25, 2012
    Assignee: International Business Machines Corporation
    Inventors: Gabriel Alatorre, Aameek Singh, Laura Richardson
  • Patent number: 8321554
    Abstract: A system, method and computer program product for determining one of a plurality of servers on which to install and execute an application. First program instructions obtain information from each of the plurality of servers as to amounts of availability of their respective CPUs, RAMs and storage. Second program instructions determine one or more of the servers which have sufficient CPU, RAM and storage to execute the application. Third program instructions determine a weight for each of the amounts for the one or more servers. Fourth program instructions sum together, for each of the one or more servers, the weights for their respective amounts of availability of the CPUs, RAMs and storage. Fifth program instructions determine which of the one or more servers has a highest sum, whereby the server with the highest sum is recommended to execute the application.
    Type: Grant
    Filed: December 17, 2004
    Date of Patent: November 27, 2012
    Assignee: International Business Machines Corporation
    Inventor: Yolanda Kay Dickinson
  • Patent number: 8272059
    Abstract: A system and method to protect web applications from malicious attacks and, in particular, a system and method for identification and blocking of malicious code for web browser script engines. The system includes at least one module configured to protect web applications from malicious attacks by detecting an occurrence of heap spraying and blocking the occurrence of heap spraying.
    Type: Grant
    Filed: May 28, 2008
    Date of Patent: September 18, 2012
    Assignee: International Business Machines Corporation
    Inventor: Robert G. Freeman
  • Patent number: 8266227
    Abstract: A method, system and program product for assigning a resource to a client in a collaborative environment. The method includes defining, using a tool, a threshold value for collaborative attributes for each resource responding to one or more clients and calculating on a periodic basis, using the tool, an updated value for the collaborative attributes for each resource. The method further includes comparing, upon receipt of a collaboration request, the updated value with the threshold value defined for collaborative attributes for a first resource and, if the updated value is less than the threshold value for the first resource, connecting the client to the first resource for establishing a collaborative session. If not, repeating comparing the updated value with the threshold value for the collaborative attributes defined for a next resource and connecting the client to the next resource whose updated value is less than the threshold value.
    Type: Grant
    Filed: July 10, 2008
    Date of Patent: September 11, 2012
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, David Paul Merrill, John Elbert Moore, Jr.
  • Patent number: 8261354
    Abstract: A system, method and program product for dynamically performing an audit and security compliance validation. The method includes providing a tool for performing a compliance check of installed computer applications running on a system, the tool including a first set and a second set of plug-ins. Further, the method includes scanning the system, using plug-ins selected from the first set to obtain a current inventory of applications currently installed on the system and selecting plug-ins from the second set to be run on the system in response to the current inventory of applications obtained, and automatically running the plug-ins selected from the second set for performing the compliance check on the system in response to a scheduling criteria identified for the system, where the second set of plug-ins perform the compliance check for only the applications currently installed on the system.
    Type: Grant
    Filed: September 17, 2008
    Date of Patent: September 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: Christopher N. Kline, Linwood E. Loving
  • Patent number: 8250642
    Abstract: Computer system, method and program for managing a firewall. First program instructions identify a first rule of the firewall. The first rule specifies a permitted message flow through the firewall to or from an IP address of a computer. The computer resides on a network. Second program instructions identify a second rule of the firewall. The second rule specifies a permitted message flow through the firewall to or from an IP address corresponding to the network. Message flows through the firewall to all computers on the network are permitted pursuant to the second rule. Third program instructions delete the first rule from the firewall based on the identification of the second rule and the computer residing on the network. Other program instructions identify and delete stale rules which are not needed. Other program instructions automatically identify rules for a new server added to a cluster.
    Type: Grant
    Filed: October 13, 2010
    Date of Patent: August 21, 2012
    Assignee: International Business Machines Corporation
    Inventors: Erik Bartholomy, Robert M. Castner, Nicolas Edward Fosdick
  • Patent number: 8219802
    Abstract: A first computer sends a request to the second computer to access the application. In response, the second computer determines that the user has not yet been authenticated to the application. In response, the second computer redirects the request to a third computer. In response, the third computer determines that the user has been authenticated to the third computer. In response, the third computer authenticates the user to the application. In response, the second computer returns a session key to the third computer for a session between the application and the user. The session has a scope of the second computer or the application but not a scope of a domain.
    Type: Grant
    Filed: May 7, 2008
    Date of Patent: July 10, 2012
    Assignee: International Business Machines Corporation
    Inventors: Yaser K. Doleh, Christopher G. Kalamaras, Mauro Marzorati
  • Patent number: 8214906
    Abstract: A system, method and program product for evaluating a security risk of an application. A determination is made whether unauthorized access or loss of data maintained or accessed by the application would cause substantial damage. A determination is made whether the application is shared by different customers. A determination is made whether a vulnerability in the application can be exploited by a person or program which has not been authenticated to the application or a system in which the application runs. A numerical value or weight is assigned to each of the foregoing determinations. Each of the numerical values or weights corresponds to a significance of the determination in evaluating said security risk. The numerical values or weights are combined to evaluate the security risk. Other factors can also be considered in evaluating the security risk.
    Type: Grant
    Filed: October 21, 2003
    Date of Patent: July 3, 2012
    Assignee: International Business Machines Corporation
    Inventor: James P. Goddard
  • Patent number: 8201245
    Abstract: Detecting obfuscated attacks on a computer. A first program function is invoked to render static components of a web page and identify program code within the web page or associated file. In response, before executing the identified program code, a malicious-code detector is invoked to scan the identified program code for malicious code. If the malicious-code detector identifies malicious code in the identified program code, the identified program code is not executed. If no malicious code is detected, a second program function generates revised program code from execution of the identified, program code. In response, before executing the revised program code, the malicious-code detector is invoked to scan the revised program code for malicious code. If the malicious-code detector identifies malicious code in the revised program code, the revised program code is not executed.
    Type: Grant
    Filed: December 5, 2007
    Date of Patent: June 12, 2012
    Assignee: International Business Machines Corporation
    Inventors: David Bryan Dewey, Robert G. Freeman, Paul Elliott Griswold
  • Patent number: 8195502
    Abstract: System and computer program product for estimating the cost of an ESD for software and subsequent updates for the software. Various cost factors can be considered such as one or more of the following. First program instructions determine a cost of the ESD associated with packaging together components of the software. Second program instructions receive a selection from an operator whether to push or pull the subsequent updates to a customer, and determine a cost for distributing the subsequent updates based on the selection. Third program instructions estimate a cost of the ESD associated with a type of program used by the customer to create images of the software. Fourth program instructions estimate a cost of the subsequent updates associated with distributing the updates to a remote distribution site, and then distributing the updates from the remote distribution site to the customer based on a type of customer tool used to download the updates from the remote distribution site.
    Type: Grant
    Filed: June 24, 2011
    Date of Patent: June 5, 2012
    Assignee: International Business Machines Corporation
    Inventors: Gerhard Hilkemeyer, Mickey Iqbal, Robert Laurence Johanns, Vernon Lenzini, Robin McCubbin, Patrick Francis Trees
  • Patent number: 8191137
    Abstract: A system and method to protect web applications from malicious attacks and, in particular, a system and method for identification and blocking of malicious DNS servers. The system includes a central processing unit and first program instructions. The first program instructions identify a rogue Domain Name Service (DNS) by identifying that a DNS metric is outside a historical limit. The first program instructions are stored on the computer system for execution by the central processing unit.
    Type: Grant
    Filed: July 30, 2008
    Date of Patent: May 29, 2012
    Assignee: International Business Machines Corporation
    Inventors: Kevin D. Himberger, Benjamin M. Parees
  • Patent number: 8176126
    Abstract: A system, method and program product for managing e-mails from a source suspected of sending spam. The e-mails are received at a firewall or router en route to a mail server. A determination is made whether a source has sent an e-mail which exhibits characteristics of spam. In response, subsequent e-mails from the source destined for the mail server are rate-limiting at the firewall or router such that the firewall or router limits a rate at which the subsequent e-mails are forwarded from the firewall or router to the mail server. The rate is predetermined and less than a maximum rate at which the firewall or router can physically forward e-mails to the mail server absent the rate limit. A determination is made whether another source has sent another e-mail which exhibits more characteristics of spam than the first said e-mail. In response, subsequent e-mails from this other source are blocked at the firewall or router.
    Type: Grant
    Filed: August 26, 2004
    Date of Patent: May 8, 2012
    Assignee: International Business Machines Corporation
    Inventors: John Fred Davis, Kevin David Himberger, Clark Debs Jeffries, Garreth Joseph Jeremiah
  • Patent number: 8166454
    Abstract: A computer method and apparatus defining Business Classes for modeling business activities comprising the steps of representing business activities as the interaction between one or more Business Classes, and entering into a computer and storing in an electronic format the Business Classes and the relationships existing between the Business Classes.
    Type: Grant
    Filed: July 24, 2008
    Date of Patent: April 24, 2012
    Assignee: International Business Machines Corporation
    Inventors: Arun K. Gupta, Rajiv K. Uppal, Devang I. Patrikh
  • Patent number: 8150729
    Abstract: A method, system and program product for displaying advertising content on a portable music player. A method, system and program product for displaying advertising content on a portable music player based on content stored therein. The method includes checking in a meta tag for a music file being downloaded whether a URL corresponding to a content file containing advertising content associated with the music file being downloaded is specified therein.
    Type: Grant
    Filed: May 5, 2008
    Date of Patent: April 3, 2012
    Assignee: International Business Machines Corporation
    Inventor: Robert D. Wilhelm
  • Patent number: 8145579
    Abstract: System, method and program product for estimating a cost of reconciling heterogeneous data sources. A transition cost for integrating together a first program to identify semantic conflicts, a second program to classify semantic conflicts and a third program to reconcile semantic conflicts is estimated. A steady state cost for managing and maintaining the integrated first, second and third programs is estimated. Another system, method and program product for estimating a cost of integrating heterogeneous data sources. A steady state cost of managing and maintaining a first program which identifies semantic conflicts between a cross data source query and schema elements in a data source is estimated. A steady state cost of managing and maintaining a second program which classifies semantic conflicts between the cross data source query and schema elements in the data source is estimated.
    Type: Grant
    Filed: September 1, 2010
    Date of Patent: March 27, 2012
    Assignee: International Business Machines Corporation
    Inventor: Mickey Iqbal
  • Patent number: 8141033
    Abstract: A computer method and apparatus defining Business Classes for modeling business activities comprising the steps of representing business activities as the interaction between one or more Business Classes, and entering into a computer and storing in an electronic format the Business Classes and the relationships existing between the Business Classes.
    Type: Grant
    Filed: July 24, 2008
    Date of Patent: March 20, 2012
    Assignee: International Business Machines Corporation
    Inventors: Arun K. Gupta, Rajiv K. Uppal, Devang I. Parikh
  • Patent number: 8126946
    Abstract: System, method and computer program for initiating a search at a server computer. A data base including a URL of the server computer is stored at a client computer. Information entered by a user into the client computer is received. From the information, a search term and the URL of the server computer are identified. Then, an HTTP search request which includes the URL of the server computer and the search term is generated. Then, the HTTP search request is sent to the server computer. The identifying of the URL of the server computer comprises searching the data base for a character string contained in the information that matches the URL of the server computer. The identifying of the search term comprises identifying a portion of the information appended to the URL of the server. The identifying of the search term also comprises omitting from the portion one or more symbols adjacent to the search term which are inconsistent with a search request using HTTP.
    Type: Grant
    Filed: January 14, 2009
    Date of Patent: February 28, 2012
    Assignee: International Business Machines Corporation
    Inventors: Ian Hughes, Nicholas James Midgley
  • Patent number: 8127356
    Abstract: A computer system and program product for automatically determining if a packet is a new, exploit candidate. First program instructions determine if the packet is a known exploit or portion thereof. Second program instructions determine if the packet is network broadcast traffic presumed to be harmless. Third program instructions determine if the packet is network administration traffic. If the packet is a known exploit or portion thereof, network broadcast traffic, or network administration traffic, the packet is not considered a new, exploit candidate. If the packet is not a known exploit or portion thereof, network broadcast traffic, or network administration traffic, the packet is an exploit candidate. Alternately, the first program instructions determine if the packet is a known exploit or portion thereof. The second program instructions determine if the packet is network broadcast traffic presumed to be harmless.
    Type: Grant
    Filed: August 27, 2003
    Date of Patent: February 28, 2012
    Assignee: International Business Machines Corporation
    Inventors: Frederic G. Thiele, Michael A. Walter
  • Patent number: 8115877
    Abstract: A method for adjusting a viewing angle of a display, includes determining a location of one or more viewers and determining lighting conditions. Additionally, the method includes calculating an optimal viewing position of the display based on the location of the one or more viewers and the lighting conditions and adjusting the display based on the optimal viewing position.
    Type: Grant
    Filed: January 4, 2008
    Date of Patent: February 14, 2012
    Assignee: International Business Machines Corporation
    Inventors: Robert D. Blatchley, Jurij M. Deputat, Donald P. Taylor, III, Stephen E. Zimmerman