Patents Assigned to IBM
  • Publication number: 20020087718
    Abstract: A method, program and system for authenticating LDAP referral searches are provided. The invention comprises receiving a bind request from a LDAP referred search request and then searching the local directory for an entry corresponding to the distinguished name (DN) of the bind request. If an entry for the bind DN is located within the local directory, the bind request is authenticated. If an entry for the bind DN is not found in the local directory, a defined reference server is checked for the prefix of the bind DN. If the prefix for the bind DN is located in the reference server, the reference server is contacted for authentication, which is performed using a root DN. If an entry for the bind DN is not found in either the local directory or reference server, the bind request cannot be authenticated and is denied.
    Type: Application
    Filed: December 29, 2000
    Publication date: July 4, 2002
    Applicant: IBM Corporation
    Inventors: Reginal Raynard Hill, Shaw-Ben Shepherd Shi
  • Publication number: 20020083304
    Abstract: An improved method and system for operating an out of order processor at a high frequency enabled by an increased pipeline length. It is proposed to shorten the pipeline by a considerable number of stages by accepting that a write after read conflict may occur, when directly after renaming, during the “read ROB” pipeline stage, all the information (tag, validity and data) is read from an Reorder Buffer ROB entry, and is next written, in a following pipeline stage “write RS”, into a reservation station (RS) entry. In order to assure the correctness of processing in particular in cases of dependencies, e.g., write after read conflicts a separate inventional add in logic covers these cases. The logic detects the write after read conflict case of an Instructional Execution Unit (IEU) writing into the particular entry that is selected by the renaming logic during “read ROB”.
    Type: Application
    Filed: December 20, 2001
    Publication date: June 27, 2002
    Applicant: IBM
    Inventors: Jens Leenstra, Dieter Wendel
  • Publication number: 20020075260
    Abstract: A method, system, and program product for creating a child node of a binary space partitioning (BSP) tree node that better approximates the size of an object to be rendered is provided. In one embodiment, a a binary space partitioning tree is created. A rendering process then determines whether either a top node or a child node in a first level of child nodes is a good approximation of the object to be rendered. If not, then the rendering process modifies the binary space partitioning tree to include a new child node having boundaries that are closer to the maximum coordinates of primitives defining the object than are the boundaries of the top node or of the child nodes in the first level of child nodes. This new child node may have a bounding volume that overlaps the bounding volumes of other child nodes in the BSP tree.
    Type: Application
    Filed: December 18, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Daniel Alan Brokenshire, Barry L. Minor, Mark Richard Nutter
  • Publication number: 20020078000
    Abstract: A standard format is provided for a text string called an enterprise identifier, which acts as a handle to access resources from disparate sources and technologies. Enterprise identifiers use extensible markup language format to allow a resource identifier to be created manually without accessing the resource. The identifier may be passed between enterprises via business-to-business connection, e-mail, telephone, or facsimile.
    Type: Application
    Filed: December 14, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Nathan Eugene Davis, Peter W. Herman
  • Publication number: 20020075261
    Abstract: A method, system, and computer program product for reducing a boundary of a subspace in a binary space partitioning tree is provided. In one embodiment a space containing an object for which an image is to be rendered and displayed to a user is divided into subspaces. The boundaries of each subspace are recalculated to remove at least a portion of the dead space from within the subspace. The recalculation is performed by analyzing the spatial extent of the object or objects within the each subspace and recalculating the boundaries of each subspace to be coextensive with the boundaries of the object or objects within the subspace.
    Type: Application
    Filed: December 18, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Daniel Alan Brokenshire, Barry L. Minor, Mark Richard Nutter
  • Publication number: 20020077887
    Abstract: The present invention discloses an architecture that enables anonymous electronic voting over the Internet using public key technologies. This invention provides a simple yet robust architecture for electronic voting over the unsecured network that is the Internet, using the public and private key pair belonging to the voting entity, not a separate userid and password for each election. In the voting method of the present invention, a voting entity requests a ballot using a public key and a private key belonging to the voting entity. The request is made to a voting mediator. Using a separate public key/private key pair, the voting mediator validates the voting ballot request. After validation of the request, the voting mediator generates an election ballot. The voting mediator sends this ballot to the voting entity. The voting entity casts a vote and sends the ballot to the voting tabulator. The voting tabulator authenticates the ballot and counts the vote.
    Type: Application
    Filed: December 15, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Theodore Jack London Shrader, Lok Yan Leung, Anthony Joseph Nadalin, Bruce Rich
  • Publication number: 20020078188
    Abstract: A method, system, and program is provided to redirect a client computer to an appropriate boot server after it has been directed to any initial boot server by preboot execution environment (PXE) or similar services. An apparatus includes a data file containing a set of addresses of managed boot servers in any syntax and a program file containing a network bootstrap program (NBP) that interprets the syntax of the data file. These files are placed on every initial boot server. The NBP requests a file from the initial boot server whose name is identified with the client computer. The initial boot server will not return that file if it is not an appropriate server for booting the client. In that case, the NBP requests the data file containing the boot server addresses. The NBP then polls each of those boot servers by requesting the client's unique file. A boot server that returns the file is an appropriate boot server for the client computer.
    Type: Application
    Filed: December 18, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Vaijayanthimala K. Anand, Steven Michael French, Chakkalamattam Jos Paul, James Richard Schoech, Bradford Allen Stern
  • Publication number: 20020078231
    Abstract: A method, system, apparatus, and computer program product are presented for a dynamically locatable packet analyzer spread across a distributed network of endpoints for determining packet generating applications is provided. In particular, the analyzer determines which ports are being used by which applications in order to verify that only intended packets are being sent and received by endpoints. The analyzer also provides novice packet snooping by not requiring administrators to configure operating system specific, packet specific or port specific information. The analyzer also provides snooping per application type (i.e. security, discovery, etc.) on endpoints, rather than packet type or port only.
    Type: Application
    Filed: December 15, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Ching-Jye Chang, Lorin Evan Ullmann
  • Publication number: 20020077816
    Abstract: A method of and system for automatically extracting new words are provided. The method and system are highly efficient for automatically extracting new words from a mass amount of cleaned corpus.
    Type: Application
    Filed: August 30, 2001
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Liqin Shen, Qin Shi, Haixin Chai
  • Publication number: 20020074171
    Abstract: A pen input apparatus includes a plurality of penpoints for drawing tracks on a recording medium such as paper, and a selector for selecting a specific penpoint from the plurality of penpoints. The input apparatus including a type recognition unit for recognizing the type of the selected penpoint (such as the color of a line which can be drawn, the thickness of the line, pen type such as ballpoint pen, sign pen or fluorescent pen), and a transmitter for transmitting the track of the penpoint as position information, and transmitting the information on the type recognized by the type recognition unit to a computer system.
    Type: Application
    Filed: December 7, 2001
    Publication date: June 20, 2002
    Applicant: IBM
    Inventors: Masayoshi Nakano, Hirohide Komiyama, Takayuki Akai
  • Publication number: 20020078031
    Abstract: A method and system are described in a data processing system including a database for efficiently retrieving copies of data rows from the database. Query criteria is received by a server from a client which specifies search criteria describing data rows and which requests a particular number of the data rows to return. Each of the data rows is associated with a unique primary key which uniquely identifies a particular data object. The primary key for each of the data rows meeting the specified criteria is first retrieved from the database by the server. Thereafter, copies of only the particular number of the data rows are retrieved from the database using the primary keys. Copies of only the particular number of data rows are then returned to the requesting client.
    Type: Application
    Filed: December 15, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Kirk Fritsche, Mark David Nielsen, Patrick Edward Nogay, Michael Albert Perks
  • Publication number: 20020076217
    Abstract: An information system for communication between a digital camera and bidirectional device that is located in proximity to a photographic site is disclosed. In the absence of the digital camera, the bidirectional device may provide communication with a personal digital communication device (PDCD) carried by the photographer. The digital camera may transmit preferences and camera data to the bidirectional device so that customized information, prepared by an information provider, may be automatically transmitted to the digital camera or PDCD or, via the Internet, to the photographer's e-mail address. A standardized photographic identification data packet (PIDDP) may be defined for use by the digital camera or the PDCD, for communication with the bidirectional device. The PIDDP may be transmitted by means of radio frequency, infrared, Bluetooth enabled transmission, or any other transmission method.
    Type: Application
    Filed: December 15, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
  • Publication number: 20020078338
    Abstract: The invention relates to a computer in which an image of the operating system is maintained in a secondary memory. This memory is either powered from a source independent of the main memory, or is non-volatile in nature. When the computer is reinitialized, the loader software that normally builds the operating system from components instead checks the secondary memory for the presence of an operating system image. If such an image is detected, the loader transfers the image from the secondary memory to the primary memory and transfers control of the computing system to the image of the operating system now in the primary memory. If no image is detected, the loader operates in a standard fashion. Additionally, a complete system image may be stored in the secondary memory. This would include the contents of the primary memory, the contents of the virtual memory, and the system state. As such, a preexisting version of an operational computing system may be directly loaded at boot time.
    Type: Application
    Filed: December 15, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Tatchi Placido Lay, Brien Henry Muschett, Allen Justin Ramlow, Cuong Huu Tran, Dung Huu Tran
  • Publication number: 20020078135
    Abstract: An apparatus and method for improving the operation of an application layer proxy by minimizing sources of delay in moving data from one TCP/IP connection to the other are provided. The apparatus and method improve the operation of the application layer proxy by performing the movement of data packets from one TCP/IP connection to the other in the kernel of the application layer proxy. The movement of data packets is performed by moving address pointers to the data packets from a first TCP/IP connection receive buffer to a send buffer of a second TCP/IP connection. In this way, the context switching required by the prior art is eliminated and traversal of the TCP/IP stack is not necessary. Furthermore, two separate TCP connections are maintained and thus, the features used for the connections are not limited by the features supported by the end points. Features supported by the application layer proxy may be used in the TCP connections.
    Type: Application
    Filed: March 15, 2001
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventor: Venkat Venkatsubra
  • Publication number: 20020075043
    Abstract: A circuit for use in generating a reference voltage. The circuit includes a first transistor having a first source, a first drain, a first gate, and a first body contact. The first body contact is connected to the first gate, and the first drain is connected to an upper voltage source. A second transistor having a second source, a second drain, a second gate, and a second body contact. The second body contact is connected to the second gate, and the second drain is connected to a lower voltage. The circuit also includes a first input connected to the first gate, and a second input connected to the second gate. An output connected to the first source and the second source.
    Type: Application
    Filed: December 14, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Eric William MacDonald, Lynn Albert Warriner
  • Publication number: 20020078129
    Abstract: A method, system, and computer program product for managing result information in a multi-node networked data processing system is provided. In one embodiment, first results of execution from a task executed on a second node in the networked data processing system are received at a first node. The results comprise an array of result messages, wherein each result message contains a unique message identifier and associated message text content. The result messages is modified, if necessary, to create second results, wherein the second results comprise an array of result message. The second results are sent to a requesting client node.
    Type: Application
    Filed: December 15, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Steven Michael French, Joseph Herbert McIntyre
  • Publication number: 20020078425
    Abstract: A method for timing and noise analysis in designing data processing chips is provided. The process begins by wiring all unconnected nets in the design and then using a 2-½ D capacitance extraction technique built into a detailed router to extract all of the wired nets. The data from the extracted nets is then processed using a timing and analysis tool. Optimization programs are then used to generate fixes for any nets in the design which contribute to timing and noise failures. The present invention gives designers the capability of fast and accurate interconnect extraction within the routing tool. In addition, this technique is incremental. Any wiring changes can be quickly re-extracted, since only local information is required for extraction. This incremental capability allows designers to perform quick iterations of wiring, extraction and timing analysis.
    Type: Application
    Filed: December 15, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Sharad Mehrotra, Parsotam Trikam Patel
  • Publication number: 20020078169
    Abstract: A method, system, and computer program product for managing results in a locale independent manner in a multi-node networked data processing system is provided. In one embodiment, a first node sends a command request to a second node. The command request contains a command and a locale in which the text of the result is desired. The first node receives the results of execution from the command request sent to and executed on the second node. The result generated by the second node in response to the command request includes one or more messages, wherein each message contains a unique message identifier, locale in which its associated text is stored, and text associated with the message. Responsive to a determination that the locale of the message text is in a locale different from a desired locale, the first node replaces the message text contained within the result with message text corresponding to the desired locale to produce a modified result and sends the modified result to the requesting client node.
    Type: Application
    Filed: December 15, 2000
    Publication date: June 20, 2002
    Applicant: IBM Corporation
    Inventors: Steven Michael French, Aidon Paul Jennery, Joseph Herbert McIntyre, James Richard Schoech
  • Publication number: 20020072206
    Abstract: A patterned buried insulator is formed beneath the source and drain by forming a mask over the body area and implanting a dose of n or p type ions in the areas where the source and drains will be formed, then etching the STI and etching out the implanted area. A light oxidation is followed by a conformal oxide deposition in the STI and also in the etched area, thereby forming the buried oxide only where desired.
    Type: Application
    Filed: December 8, 2000
    Publication date: June 13, 2002
    Applicant: IBM
    Inventors: Bomy A. Chen, Alexander Hirsch, Sundar K. Iyer, Nivo Rovedo, Hsing-Jen Wann, Ying Zhang
  • Publication number: 20020072889
    Abstract: A method and system are described in a logic simulator machine for efficiently creating a trace of an array which includes a plurality of storage locations. The logic simulator machine executes a test routine. Prior to executing the test routine, an initial copy of all data included within each of the storage locations of the array is stored as a first trace of the array. During execution of a first cycle the test routine, all of the write control inputs into the array are read to identify ones of the storage locations which were modified during the execution of the first cycle. A new trace of the array is generated which includes a copy of all of the data of the first trace. In addition, only those ones of the storage locations in the first trace which were modified during the first cycle are updated. A trace is thus generated by updating only those ones of the storage locations which were modified during execution of a cycle of the test routine.
    Type: Application
    Filed: December 7, 2000
    Publication date: June 13, 2002
    Applicant: IBM Corporation
    Inventors: Harrell Hoffman, John Henry Westermann