Patents by Inventor Adam Nemati

Adam Nemati has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8775607
    Abstract: In a discovery stage, a set of suspect rules can be utilized to determine if each environment asset of the computing environment is to be considered a suspect asset or a standard environment asset, where suspect assets are a subset of environment assets of the computing environment. In a confirmation stage, a set of stray rules can be used to determine whether each suspect asset is to be considered a stray asset, wherein stray assets are a subset of the suspect assets. A stray asset can be an asset defined and configured by a configuration management system that is active in the computing environment and is consuming resources of the computing environment yet is not needed by active processes of the computing environment and is unneeded by other active environment assets. For each stray asset, at least one resolution action (e.g., alert action, containment action, delete action) can be performed.
    Type: Grant
    Filed: December 10, 2010
    Date of Patent: July 8, 2014
    Assignee: International Business Machines Corporation
    Inventors: Gary L. Detro, Joe Hackett, Leonard S. Hand, Adam A. Nemati
  • Publication number: 20120151036
    Abstract: In a discovery stage, a set of suspect rules can be utilized to determine if each environment asset of the computing environment is to be considered a suspect asset or a standard environment asset, where suspect assets are a subset of environment assets of the computing environment. In a confirmation stage, a set of stray rules can be used to determine whether each suspect asset is to be considered a stray asset, wherein stray assets are a subset of the suspect assets. A stray asset can be an asset defined and configured by a configuration management system that is active in the computing environment and is consuming resources of the computing environment yet is not needed by active processes of the computing environment and is unneeded by other active environment assets. For each stray asset, at least one resolution action (e.g., alert action, containment action, delete action) can be performed.
    Type: Application
    Filed: December 10, 2010
    Publication date: June 14, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: GARY L. DETRO, JOSEPH E. HACKETT, LEONARD S. HAND, ADAM A. NEMATI
  • Patent number: 7853693
    Abstract: A method for utilizing networked devices can include a step of receiving a network job associated with a network user. A location of the network user can be automatically determined. One of many possible networked devices can be dynamically selected based upon the determined user location. The network job can be assigned to the selected device.
    Type: Grant
    Filed: January 31, 2006
    Date of Patent: December 14, 2010
    Assignee: International Business Machines Corporation
    Inventors: Subil M. Abraham, Tam M. Cao, Adam A. Nemati, Mathews Thomas
  • Publication number: 20070185980
    Abstract: A method of automatically adjusting device settings can include a step of associating devices with device location beacons and associating users with user location beacons. The devices can be linked to a network that includes a location server. The location server can automatically determine location based relationships between the devices and the users based upon positions of the device location beacons and the user location beacons. For each device, applicable ones of a set of established policies can be determined. For each device, applicable policies can be determined based upon at least one of a physical location of the device, a relative position of the device to the users, and a relative position between the device and other devices. The selected policies can be conveyed to the devices through the network connection. Each device can automatically adjust at least one device setting in accordance with the policies.
    Type: Application
    Filed: February 3, 2006
    Publication date: August 9, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Subil Abraham, Tam Cao, Adam Nemati, Mathews Thomas
  • Publication number: 20070180082
    Abstract: A method for utilizing networked devices can include a step of receiving a network job associated with a network user. A location of the network user can be automatically determined. One of many possible networked devices can be dynamically selected based upon the determined user location. The network job can be assigned to the selected device.
    Type: Application
    Filed: January 31, 2006
    Publication date: August 2, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Subil Abraham, Tam Cao, Adam Nemati, Mathews Thomas
  • Publication number: 20060294388
    Abstract: A system (10) and method (100) for enhancing security and session persistence can include the steps of authenticating (102) a user within a proximity of a first client device (19), sending (104) authentication data from a wireless scanning device (14) to a security server (16), and initiating (108) a client session at the first client device. Note, authentication data will be sent (106) from the security server to the application server. The method can further automatically log off (110) the user upon leaving the proximity and save the client session at an application server and further automatically authenticate and log-on (114) the user to the client session when entering a proximity of at least one among the first or a second client device. The method can detect (112) the presence of the user using an RFID scanner that detects an RFID tag from a badge held by the user.
    Type: Application
    Filed: June 22, 2005
    Publication date: December 28, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Subil Abraham, Tam Cao, Jason Gonzalez, Adam Nemati, Mathews Thomas
  • Patent number: 7017049
    Abstract: A method, an apparatus and computer readable medium for transferring Secured Socket Layer (SSL) management information between servers within an informational processing system. The method allows for valid SSL session id information to be moved from any of a plurality of servers to a server containing the desired information to be served to a requesting client. The method for Secured Socket Layer (SSL) management consists of: receiving a request for a SSL session to transfer information with a client; determining that if the request from the client has a current valid session id; and determining if a location of the information in the request from the client is not on a server which is used for the current valid session id, and if the location of the information is not on the server which is used for the current valid session id, then transferring the current valid session id from the server that is used for the current valid session id to a server that contains the requested information.
    Type: Grant
    Filed: April 12, 2001
    Date of Patent: March 21, 2006
    Assignee: International Business Machines Corporation
    Inventors: Leonard S. Hand, Adam Nemati
  • Publication number: 20020152403
    Abstract: A method, an apparatus and computer readable medium for transferring Secured Socket Layer (SSL) management information between servers within an informational processing system. The method allows for valid SSL session id information to be moved from any of a plurality of servers to a server containing the desired information to be served to a requesting client. The method for Secured Socket Layer (SSL) management consists of: receiving a request for a SSL session to transfer information with a client; determining that if the request from the client has a current valid session id; and determining if a location of the information in the request from the client is not on a server which is used for the current valid session id, and if the location of the information is not on the server which is used for the current valid session id, then transferring the current valid session id from the server that is used for the current valid session id to a server that contains the requested information.
    Type: Application
    Filed: April 12, 2001
    Publication date: October 17, 2002
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Leonard S. Hand, Adam Nemati