Patents Represented by Attorney, Agent or Law Firm Marcia L. Doubet
-
Patent number: 7808388Abstract: A security system for inventory automatically detects removal of inventory items from an area or areas protected with security sensors. A person removing the item then scans an identifying code of the item, such as its bar code or radio-frequency identification (“RFID”) tag, with a device such as a portable shopping assistant device; if the item is not scanned in an appropriate manner, such as within a particular a time period, then theft of the item may be suspected. Information for completing a purchase transaction can be sent from the portable shopping assistant device. In this manner, items can be purchased directly from the protected areas.Type: GrantFiled: November 21, 2008Date of Patent: October 5, 2010Assignee: International Business Machines CorporationInventor: P. Daniel Kangas
-
Patent number: 7779255Abstract: Techniques are disclosed for multi-level security (“MLS”) in computing systems. Communication between MLS systems in the prior art requires explicitly tagging each packet with its security classification. The packet tags comprise variable-length bit patterns inserted into packet headers. This results in a number of drawbacks, including increased path length and code complexity, as well as reduced interoperability. An MLS system according to the present invention simulates a cluster or collection of single-level security systems, and thereby avoids packet tagging. For each security classification used by an MLS system, a distinct source address is defined. This source address is used for outbound packets having that security classification, such that the packet's source address implicitly identifies the packet's security classification.Type: GrantFiled: June 27, 2007Date of Patent: August 17, 2010Assignee: International Business Machines CorporationInventor: Patrick Michael LiVecchi
-
Patent number: 7779302Abstract: Techniques for programmatically coordinating, and synchronizing execution of, automated testing in event-driven systems. One or more user-provided test system event listeners listen for generated events and update test system status accordingly. A user-provided test suite definition invokes a test framework interface, thereby defining the structure of a test suite. This test suite is executed, referring to the test system status to determine when to move to a next stage (e.g., to a next test case or next test module). Test system status may also be updated directly from a test case or test module (e.g., when the test designer determines that the tested code will not generate events that can be leveraged for test status information).Type: GrantFiled: August 10, 2004Date of Patent: August 17, 2010Assignee: International Business Machines CorporationInventors: Jane C. Fung, William G. O'Farrell
-
Patent number: 7774386Abstract: Techniques for enabling a validating parser to interpret a schema, where that schema may have been extended to multiple levels, and to perform the validation of a structured document according to the extended schema while still allowing a consumer application to request objects or events that are cast at some different level of the schema (including the base schema). Validating the source document according to an extended (i.e., more specific) schema enables improved detection of syntax errors. At the same time, casting objects and events from the parsed document to a level requested by the consumer application allows the consumer to receive only those objects or events for which it is adapted, without requiring the consumer application to include extra code to deal with objects or events it does not recognize in the parser's output. Preferably, the parser simply discards those objects or events which this consumer is not interested in receiving.Type: GrantFiled: July 24, 2003Date of Patent: August 10, 2010Assignee: International Business Machines CorporationInventors: Heng Chu, Erich S. Magee, Robert C. Sizemore
-
Patent number: 7774695Abstract: An improved solution for presenting data to a user is provided. In particular, the data can include multiple instances of a dataset, which are displayed in a three-dimensional table. The three-dimensional table allows the user to perform various manipulations on it. For example, the user can rotate the table, scroll through the table, simultaneously view at least two instances of the dataset, and the like. Additionally, the three-dimensional table can enable the user to perform various operations on the data to further customize the presented data.Type: GrantFiled: May 11, 2006Date of Patent: August 10, 2010Assignee: International Business Machines CorporationInventor: Krzysztof R. Kobylinski
-
Patent number: 7774364Abstract: Improved techniques are disclosed for accessing content in file systems, allowing file system clients to realize advantages of file system referrals even though a file access protocol used by the client is not specifically adapted for referral objects. (For example, the client may have a legacy file system protocol or a proprietary file system protocol which does not support referrals.) These advantages include a uniform name space view of content in a network file system, and an ability to locate content in a (nearly) seamless and transparent manner, even though the content may be dynamically moved from one location to another or replicated in different locations. A file system server returns a symbolic link in place of a referral, and an automated file mounting process on the client is leveraged to access the content using the link. Built-in crash recovery techniques of the file system client are leveraged to access moved content.Type: GrantFiled: March 9, 2005Date of Patent: August 10, 2010Assignee: International Business Machines CorporationInventors: Owen T. Anderson, Craig F. Everhart, Boaz Shmueli
-
Patent number: 7774332Abstract: Enabling network-accessible applications to be integrated into content aggregation frameworks (such as portals) and to become dynamically interactive through proxying components (such as proxying portlets), thereby providing run-time cooperation and data sharing.Type: GrantFiled: April 12, 2005Date of Patent: August 10, 2010Assignee: International Business Machines CorporationInventors: Amber Roy-Chowdhury, Srikanth Thirumalai
-
Patent number: 7769871Abstract: The present invention provides a method, system, and computer program product for facilitating end-user access to remote applications based on TCP (Transmission Control Protocol). TCP traffic is packaged into the body of HTTP (HyperText Transfer Protocol) messages, enabling the TCP traffic to be transmitted through HTTP systems in an application-independent manner as if it were native HTTP traffic. TCP traffic therefore flows through firewall systems without requiring access to an external TCP port, and flows through HTTP proxy servers as well. The disclosed technique enables mapping bi-directional TCP messages to HTTP, which is designed for client-initiated message traffic only.Type: GrantFiled: July 30, 2008Date of Patent: August 3, 2010Assignee: International Business Machines CorporationInventor: Donald J. Boulia
-
Patent number: 7761534Abstract: Techniques are disclosed for providing autonomic content load balancing. A programmatic selection is made from among alternative content versions based upon current conditions. Preferably, the alternative selectable versions specify content to be used in a Web page, and a version is selected responsive to receiving a request for the Web page. The selectable version may comprise the Web page, or a component of a Web page may have selectable versions. Optionally, the Web page may include more than one component with dynamically-selectable content. In this case, the versions may be selectable independently of one another.Type: GrantFiled: November 21, 2008Date of Patent: July 20, 2010Assignee: International Business Machines CorporationInventors: Nathanael F. Ehrich, Niraj P. Joshi, Kimberly D. Kenna, Robert C. Leah
-
Patent number: 7757119Abstract: A method and system of inherited transactions in an asynchronous messaging are provided. A producer requests a message put operation in a transaction. A consumer carries out a get operation with the option to inherit the transaction of the put operation. In an inherited transaction, the consumer's transaction will not commit until the transaction it has inherited from commits. Work performed in the producer's transaction is visible to the consumer, but work performed in the consumer's transaction is not visible to the producer preserving asynchronous messaging semantics. A transaction hierarchy results and only the net effect of transaction hierarchy is hardened to non-volatile storage.Type: GrantFiled: August 7, 2006Date of Patent: July 13, 2010Assignee: International Business Machines CorporationInventor: Andrew Ian Hickson
-
Patent number: 7752066Abstract: Techniques are disclosed for scheduling meetings by exploiting information of the type used with electronic calendars. By leveraging advanced calendaring system information and using location, other context information such as corporate policy, legal constraints, and technology constraints, and/or user-specific preferences to provide a complete picture of a person's availability, the functionality (and therefore the value) of scheduling systems in increased, resulting in an ability to schedule meetings with more accuracy and less rework. Various allowable participation types for meeting invitees may be specified, and each invitee's availability is determined accordingly. Location-sensitive travel times (including optional user-specific travel time adjustments) are used in preferred embodiments when in-person participation is required.Type: GrantFiled: July 31, 2007Date of Patent: July 6, 2010Assignee: International Business Machines CorporationInventors: J. Smith Doss, Renee M. Kovales, Diane P. Pozefsky, Robert J. Sundstrom
-
Patent number: 7752464Abstract: Techniques are disclosed for deterring theft of media recording devices. Input received from a sensor, or some portion of the input, is encrypted prior to storing a media file. A decryption key must be provided when the media file is to be played back. If the key is not provided, then the file is preferably still played back, but is played back in a degraded manner. For example, a background color or other filler may be rendered in place of the encrypted portion. Additional parts of the file may also be degraded during playback. By making the playback unpleasant for the listener/viewer, theft of the recording device will be much less desirable—yet recording can continue uninterrupted, thereby minimizing disruption to legitimate users. The disclosed techniques may also be used to deter theft of the recorded media.Type: GrantFiled: July 7, 2008Date of Patent: July 6, 2010Assignee: International Business Machines CorporationInventor: Mark E. Peters
-
Patent number: 7752254Abstract: Contexts are propagated between a first and second system. The contexts provide information about the environment within which work in the first and second systems is to be performed. The contexts have a hierarchical structure in which the bottom most context in the hierarchy is identified as a leaf context. A request is received at the first system to perform work. Context information is created in the first system pertaining to the environment within which the work is to be performed. The context information forms a context hierarchy having a root context and one or more descendant contexts. Information is propagated from the first system to the second system enabling re-creation at the second system of context information pertaining to the leaf context only.Type: GrantFiled: April 20, 2007Date of Patent: July 6, 2010Assignee: International Business Machines CorporationInventors: Ian Robinson, Andrew Wilkinson
-
Patent number: 7747459Abstract: Techniques are disclosed for performing free-time searches that exploit information of the type used with electronic calendars. By leveraging advanced calendaring system information and using location, other context information such as corporate policy, legal constraints, and technology constraints, and user-specific preferences to provide a complete picture of a person's availability, the functionality (and therefore the value) of scheduling systems in increased, resulting in an ability to schedule meetings with more accuracy and less rework. Various allowable participation types for meeting invitees may be specified, and each invitee's availability is determined accordingly. Location-sensitive travel times (including optional user-specific travel time adjustments) are used in preferred embodiments when in-person participation is required.Type: GrantFiled: May 25, 2008Date of Patent: June 29, 2010Assignee: International Business Machines CorporationInventors: J. Smith Doss, Renee M. Kovales, Diane P. Pozefsky, Robert J. Sundstrom
-
Patent number: 7739382Abstract: Services deployed in a network computing environment (such as a Web services implementation model) are transparently extended. Preferably, handler components in an engine that processes requests and responses provide the extensions. A handler for outgoing messages adds the extensions to a response message that is created responsive to receiving a request message that asks for a service's available operations. A client receiving this response message can then invoke one of the extensions, without knowing that it is an extension. A handler for incoming messages checks received requests: if a request for an extension is received, the handler routes that message to a location other than the service itself; otherwise, incoming requests for operations that are actually available from the service are routed thereto.Type: GrantFiled: July 8, 2008Date of Patent: June 15, 2010Assignee: International Business Machines CorporationInventors: Douglas B. Davis, John K. Gerken, III
-
Patent number: 7735117Abstract: Techniques are disclosed for achieving context-sensitive confidentiality within a federated environment for which content is aggregated in a distributed Web portal (or similar aggregation framework), ensuring that message portions that should be confidential are confidential to all entities in the federated environment except those entities to which the message portions may properly be divulged. The federation may comprise an arbitrary number of autonomous security domains, and these security domains may have independent trust models and authentication services. Using the disclosed techniques, messages can be routed securely within a cross-domain federation (irrespective of routing paths), thereby ensuring that confidential information is not exposed to unintended third parties and that critical information is not tampered with while in transit between security domains. Preferred embodiments leverage Web services techniques and a number of industry standards.Type: GrantFiled: July 12, 2008Date of Patent: June 8, 2010Assignee: International Business Machines CorporationInventors: Anthony J. Nadalin, Ajamu A. Wesley
-
Patent number: 7734916Abstract: Techniques are disclosed for multi-level security (“MLS”) in computing systems. Communication between MLS systems in the prior art requires explicitly tagging each packet with its security classification. The packet tags comprise variable-length bit patterns inserted into packet headers. This results in a number of drawbacks, including increased path length and code complexity, as well as reduced interoperability. An MLS system according to the present invention simulates a cluster or collection of single-level security systems, and thereby avoids packet tagging. For each security classification used by an MLS system, a distinct source address is defined. This source address is used for outbound packets having that security classification, such that the packet's source address implicitly identifies the packet's security classification.Type: GrantFiled: March 21, 2008Date of Patent: June 8, 2010Assignee: International Business Machines CorporationInventor: Patrick Michael LiVecchi
-
Patent number: 7730212Abstract: A message transformation selection tool and method for use in a distributed message processing system running applications on subsystems using incompatible message formats, selects the most appropriate output message format for a given input message format. Firstly, the tool determines compatibility of each field of the input message format with fields of all possible output message formats. Next, it statistically analyses the values of message fields in messages stored in message logs for each of the subsystems. On the basis of this analysis, the tool selects the best fit output message into which to transform a given input message.Type: GrantFiled: January 14, 2009Date of Patent: June 1, 2010Assignee: International Business Machines CorporationInventors: Robert William Phippen, John Michael Knapman
-
Patent number: 7729933Abstract: Techniques are provided for product life cycle management over an information network. More particularly, techniques are provided for decision support activation and management in accordance with a product life cycle management process such as a collaborative design process. In one aspect of the invention, a technique for managing at least one collaborative process performed in accordance with a first entity and at least a second entity, comprises the following steps/operations. Information associated with the at least one collaborative process is obtained. Based on at least a portion of the obtained information, an information structure (e.g., a context pyramid) representative of the collaborative process is dynamically maintained so as to assist at least one of the first entity and the second entity in managing at least a portion of the collaborative process.Type: GrantFiled: October 31, 2003Date of Patent: June 1, 2010Assignee: International Business Machines CorporationInventors: Yiming Ye, Haiyan Wang, legal representative, Liang-Jie Zhang, John Youssef Sayah, Jen-Yao Chung, Santhosh B. Kumaran
-
Patent number: 7720794Abstract: Methods, systems, computer program products, and methods of doing business whereby managed resources and/or data are identified using a model based on object-oriented techniques. A resource hierarchy is defined for a set of resources/data to be managed, and naming rules are associated with classes in this hierarchy. The naming rules for a particular class describe how to uniquely identify resources of that class among more than one management system and in a way that is independent of the management system. The identities are structured strings created using the naming rules of the class to which the resource/data belongs. Structural restrictions placed on the structured strings allow any two identities to be compared for equality (using, for example, a simple string comparison).Type: GrantFiled: August 5, 2003Date of Patent: May 18, 2010Assignee: International Business Machines CorporationInventor: Douglas A. Wood