Patents Represented by Attorney Dillon & Yudell LLP
  • Patent number: 7868768
    Abstract: A Genetically Modified Organism (GMO) is tracked using Radio Frequency Identification (RFID) tags. A bulk load of GMOs, which is intended for consumption by livestock only, is laced with RFID tags at or near a time of harvest. If the RFID tags appear in a product that is intended for human consumption, then the product is pulled from distribution, since it contains GMOs that are potentially harmful to humans if eaten.
    Type: Grant
    Filed: March 6, 2008
    Date of Patent: January 11, 2011
    Assignee: International Business Machines Corporation
    Inventors: Robert L. Angell, James R. Kraemer
  • Patent number: 7870235
    Abstract: A cluster system is treated as a set of resource groups, each resource group including a highly available application and the resources upon which it depends. A resource group may have between 2 and M data processing systems, where M is small relative to the cluster size N of the total cluster. Configuration and status information for the resource group is fully replicated only on those data processing systems which are members of the resource group. A configuration object/database record for the resource group has an associated owner list identifying the data processing systems which are members of the resource group and which may therefore manage the application.
    Type: Grant
    Filed: June 13, 2008
    Date of Patent: January 11, 2011
    Assignee: International Business Machines Corporation
    Inventors: James W. Arendt, Ching-Yun Chao, Rodolfo Ausgusto Mancisidor
  • Patent number: 7870192
    Abstract: A method and system for coordinating a Voice Over Internet Protocol (VoIP) teleconference. A teleconference operator drags the name of invited attendees into a hot window, which connects the invited attendees to a channel for the teleconference. Each invited attendee's name has a status icon associated with it, indicating if the invited attendee is active in the teleconference. Each invited attendee has access to a Graphical User Interface (GUI) that permits the attendee to toggle back and forth between different teleconferences.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: January 11, 2011
    Assignee: International Business Machines Corporation
    Inventors: Gordan G. Greenlee, James A. Martin, Jr., Renee Christine Mullins
  • Patent number: 7870110
    Abstract: A method for generating a transaction-bound sequence of records in a database table is disclosed. In response to a transaction attempting to insert a record to a database table within a relational database, an identification (ID) of the transaction and the name of the associated database table are initially obtained. A determination is then made whether or not the obtained transaction ID and the associated database table name are found in the transaction-bound tracking table. If they are not found in the transaction-bound tracking table, a new entry is generated in the transaction-bound tracking table for the obtained transaction ID and database table name, and a value in a last_order_number column associated with the entry is set to 1; otherwise, a value in the last_order_number column associated with the entry is incremented by 1.
    Type: Grant
    Filed: February 27, 2008
    Date of Patent: January 11, 2011
    Assignee: International Business Machines Corporation
    Inventors: Ricardo N. Olivieri, Mark B. Whelan
  • Patent number: 7865625
    Abstract: An apparatus for a node of a peer-to-peer network having a plurality of nodes comprises one or more I/O adapters; a cache component; one or more inter-node routing components; a memory mapping component for presenting to the I/O adapters a single address space mapped across a plurality of memory elements each associated with the cache component; and a direct memory access component for performing a memory operation on the memory elements via the memory mapping component on behalf of the I/O adapters.
    Type: Grant
    Filed: April 3, 2008
    Date of Patent: January 4, 2011
    Assignee: International Business Machines Corporation
    Inventor: Ian D. Judd
  • Patent number: 7865486
    Abstract: An apparatus for providing storage control in a network of storage controllers is disclosed. The apparatus includes an owner storage controller; an I/O performing component, an ownership assignment component, a lock manager and a messaging component. The ownership assignment component assigns ownership of metadata for data to an owner storage controller. The lock manager controls the locking of metadata during I/O. The messaging component passes messages among storage controllers to request metadata state, to grant locks, to request release of locks, and to signal lock release. The I/O is performed on data whose metadata is owned by an owner storage controller, subject to compliance with metadata lock protocols controlled by the owner storage controller, and any copy of the data held from time to time is maintained in a coherency relation with the data.
    Type: Grant
    Filed: April 16, 2008
    Date of Patent: January 4, 2011
    Assignee: International Business Machines Corporation
    Inventors: Carlos Francisco Fuente, William James Scales
  • Patent number: 7865746
    Abstract: A method for controlling the different power states of a ClientBlade™ from a remote desktop environment is described. The remote user's (device) connects his computer device (laptop or desktop) to the ClientBlade™ (at the Blade Center) via a Remote Desktop Protocol (RDP), which performs minimal video compression and provides an Ethernet connection back to the Blade Center. The user inputs a pre-defined key sequence, which initiates a power state interface (or input screen). The power state interface allows the user to select one of several power states. Once the power state is selected, a TCP/IP packet is generated and transmitted from the computer device to the ClientBlade™. The packet invokes the selected power state at the ClientBlade™. Once the power state is activated, a completion message verifying the power state change is sent back to the end user's computer device.
    Type: Grant
    Filed: April 5, 2007
    Date of Patent: January 4, 2011
    Assignee: International Business Machines Corporation
    Inventors: James J. Bozek, Makoto Ono, Edward S. Suffern
  • Patent number: 7865736
    Abstract: A method, system, and computer-usable medium for enhancing environment variable and process option invocation in a data processing system. In a preferred embodiment of the present invention, in response to receiving a request for a system startup, an operating system loads a centralized environment file. In response to receiving a request for a user login, the operating system searches for a user environment file. In response to determining that the user environment file conflicts with the centralized environment file, the operating system overrides the user environment file with settings from the centralized environment file.
    Type: Grant
    Filed: October 30, 2006
    Date of Patent: January 4, 2011
    Assignee: International Business Machines Corporation
    Inventors: David Z. Dai, Vasu Vallabhaneni, Richard P. Youngman, Ine Youngman, legal representative
  • Patent number: 7865705
    Abstract: In at least one embodiment, a processor includes an execution unit and instruction sequencing logic that fetches instructions from a memory system for execution by the execution unit. The instruction sequencing logic includes branch logic that outputs predicted branch target addresses for use as instruction fetch addresses. The branch logic includes a branch target address prediction circuitry concurrently holding a first entry providing storage for a first branch target address prediction associating a first instruction fetch address with a first branch target address to be used as an instruction fetch address and a second entry providing storage for a second branch target address prediction associating the first instruction fetch address with a different second branch target address. The first entry indicates a first instruction address type for the first instruction fetch address, and the second entry indicates a second instruction address type for the first instruction fetch address.
    Type: Grant
    Filed: February 1, 2008
    Date of Patent: January 4, 2011
    Assignee: International Business Machines Corporation
    Inventors: David S. Levitan, Lixin Zhang
  • Patent number: 7861079
    Abstract: A method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured TPMs. The endorsement keys are generated for the TPM. The TPM vendor selects an N-byte secret and stores the N-byte secret in the TPM along with the endorsement keys. The secret number cannot be read outside of the TPM. The secret number is also provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key with a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the TPM only when a match is confirmed.
    Type: Grant
    Filed: September 21, 2007
    Date of Patent: December 28, 2010
    Assignee: International Business Machines Corporation
    Inventors: Ryan Charles Catherman, David Carroll Challener, James Patrick Hoff
  • Patent number: 7861051
    Abstract: A system and method for implementing a fast file synchronization in a data processing system. A memory management unit divides a file stored in system memory into a collection of data block groups. In response to a master (e.g., processing unit, peripheral, etc.) modifying a first data block group among the collection of data block groups, the memory management unit writes a first block group number associated with the first data block group to system memory. In response to a master modifying a second data block group, the memory management unit writes the first data block group to a hard disk drive and writes a second data block group number associated with the second data block group to system memory. In response to a request to update modified data block groups of the file stored in the system memory to the hard disk drive, the memory management unit writes the second data block to the hard disk drive.
    Type: Grant
    Filed: June 20, 2008
    Date of Patent: December 28, 2010
    Assignee: International Business Machines Corporation
    Inventors: Jos M. Accapadi, Mathew Accapadi, Andrew Dunshea, Dirk Michel
  • Patent number: 7861287
    Abstract: A system, method, and computer usable medium for utilizing audit information for challenge/response during a password reset process. In a preferred embodiment of the present invention, a client tracker compiles a log of user actions while a user accesses an account on a data processing system. In response to a user password reset request, the client tracker selects at least one user action from the log of user actions, forms a challenge question based on the selected user action, and in response to an acceptable response to the challenge question, resetting a password associated with the account.
    Type: Grant
    Filed: May 17, 2006
    Date of Patent: December 28, 2010
    Assignee: International Business Machines Corporation
    Inventor: Ori Pomerantz
  • Patent number: 7860956
    Abstract: A method, system, and computer program product for transferring selected open browser tabs from a host computer to a client computer. The method includes copying a selected number of hyperlink addresses from a plurality of hyperlink addresses associated with a plurality of selected open browser tabs in a first browser of the host computer. A hyperlink import module of the client computer is activated for transferring the copied hyperlink addresses from the host computer. Before the transfer can occur, the client computer is authenticated. After authentication, the user of the client computer selects a subset of the copied hyperlink addresses from the host computer. Only the subset of the copied hyperlink addresses is transferred from the host computer to the client computer. The client user opens the subset of the copied hyperlink addresses in a second browser of the client computer for displaying.
    Type: Grant
    Filed: February 5, 2009
    Date of Patent: December 28, 2010
    Assignee: International Business Machines Corporation
    Inventor: Meena Sundararajan
  • Patent number: 7856659
    Abstract: A system and method for providing network access are disclosed. After connecting to a network at an access point, a user of a computing device registers for network access with a network provider. In response to the registration, the network provider sends a completion page to the computing device. The completion page includes a link to an embedded file such as a small, transparent GIF image. When the computing device retrieves the embedded file, the embedded file is associated with a header than includes an instruction to generate a network system identifier (e.g., a cookie). The network system identifier may be stored by the computing device and later used to identify the computing device as a registrant for network access with the network provider. The embedded file may also be sent at other times, such as after authentication of the user for network access.
    Type: Grant
    Filed: March 11, 2003
    Date of Patent: December 21, 2010
    Assignee: Wayport, Inc.
    Inventors: James D. Keeler, Ian M. Fink, Matthew M. Krenzer
  • Patent number: 7856416
    Abstract: A method, computer program product, and data processing system for computer-aided design of multidimensional data warehouse schemas are disclosed. A preferred embodiment of the present invention provides a software tool for identifying a latent star schema structure within an existing database. This software tool performs a heuristic analysis of the existing database schema to locate potential keys and measurement fields. Database tables within the existing schema are scored heuristically as to their suitability as fact tables based on the key candidates and measurement fields. For each fact table, other tables from the existing schema are identified as possible dimension tables. Data from the database is then used to test the suitability of the fact tables and dimension tables. The identified fact tables and their associated dimension tables are then reported to the user to reveal a basic star schema structure, which can be used as a basis for further design.
    Type: Grant
    Filed: April 22, 2008
    Date of Patent: December 21, 2010
    Assignee: International Business Machines Corporation
    Inventors: Virginia Hoffman, James M. McArdle
  • Patent number: 7856474
    Abstract: A method and apparatus for sending information to a data processing apparatus for identifying a document to share with a recipient. A handheld device is capable of communicating with the data processing apparatus. Human-readable information is captured from the document and stored in the handheld device as document data. A communications path is established between the handheld device and the data processing apparatus. The document data is sent to the data processing apparatus through the communications path. Reference documents are provided. Each reference document has reference data stored in a memory. At least a portion of the received document data is extracted as scanning data. The reference data is retrieved from the memory. The scanning data is compared with the reference data. When the scanning data matches at least a portion of the reference data of one of the reference documents, the one reference document is selected as the identified document for forwarding to the recipient.
    Type: Grant
    Filed: July 20, 2007
    Date of Patent: December 21, 2010
    Assignee: Wireless Recognition Technologies LLC
    Inventor: Raymond F. Ratcliff
  • Patent number: 7856582
    Abstract: A method, system and computer program product for performing real-time LBIST diagnostics of IC devices. During LBIST, stump data and identifiers of test cycles are saved in the IC device-under-test (DUT). If compressed stump data does not match a pre-defined coded value (i.e., “signature” of the test cycle), the saved stump data and an identifier of the failed test cycle are preserved, otherwise the determination is made the DUT passed the test cycle. Identifiers and stump of the failed test cycles are used to analyze errors, including virtually non-reproducible errors.
    Type: Grant
    Filed: April 3, 2008
    Date of Patent: December 21, 2010
    Assignee: International Business Machines Corporation
    Inventors: Daniel W. Cervantes, Robert B. Gass, Joshua P. Hernandez, Timothy M. Skergan
  • Patent number: 7856533
    Abstract: A method for preforming memory prefetching is disclosed. A stream length histogram (SLH) is initially generated based on a stream of Read and Write requests intended for a system memory. A determination is then made whether or not to issue a prefetch command after a Read request based on information within the generated SLH. In a determination that a prefetch command should be issued, prefetch command to be sent to the system memory is issued along with other commands.
    Type: Grant
    Filed: November 1, 2007
    Date of Patent: December 21, 2010
    Assignee: International Business Machines Corporation
    Inventors: Ibrahim Hur, Calvin Lin
  • Patent number: 7856411
    Abstract: Enabling dynamic, computer-driven, context-based detection of social network patterns within an input graph representing a social network. A Social Network Aware Pattern Detection (SNAP) system and method utilizes a highly-scalable, computationally efficient integration of social network analysis (SNA) and graph pattern matching. Social network interaction data is provided as an input graph having nodes and edges. The graph illustrates the connections and/or interactions between people, objects, events, and activities, and matches the interactions to a context. A sample graph pattern of interest is identified and/or defined by the user of the application. With this sample graph pattern and the input graph, a computational analysis is completed to (1) determine when a match of the sample graph pattern is found, and more importantly, (2) assign a weight (or score) to the particular match, according to a pre-defined criteria or context.
    Type: Grant
    Filed: February 12, 2007
    Date of Patent: December 21, 2010
    Assignee: 21st Century Technologies, Inc.
    Inventor: Timothy Paul Darr
  • Patent number: 7856609
    Abstract: A method for generating a constraint for generating a constraint for use in the verification of an integrated circuit design includes identifying a target in a netlist (N) of the design and creating an overapproximate abstraction (N?) of the netlist. A space state (S?) is created by enumerating the states of N? from which the identified target may be asserted. A constraint space C? is then derived from the state space S?, where C? is the logical complement of S?. The process is repeated for multiple selected targets and the constraint spaces from each iteration are logically ANDed. Creating an overapproximate abstraction may include replacing a sequential gate with a random gate. Identifying a sequential gate may include selecting a target in the netlist, performing underapproximate verification of the target, and, if a spurious failure occurs, selecting a gate further down the fanin chain of the currently selected gate.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: December 21, 2010
    Assignee: International Business Machines Corporation
    Inventors: Jason R. Baumgartner, Hari Mony, Viresh Paruthi, Jiazhao Xu