Patents by Inventor Anthony Bussani

Anthony Bussani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140358621
    Abstract: According to an exemplary embodiment, a computer-implemented method for attempting to optimize a supply chain network (SCN) includes forecasting demand in the SCN based on a set of demand data. One or more time-dependent reorder points (ROPs) deemed to optimize the SCN are generated by a computer processor, based on the demand forecast, where each time-dependent ROP represents an ROP that changes over time. A simulation of operations of the SCN is performed, using the time-dependent ROPs.
    Type: Application
    Filed: September 9, 2013
    Publication date: December 4, 2014
    Applicant: International Business Machines Coproration
    Inventors: Anthony Bussani, Soojung Hong, Ban Kawas, Tim Nonner, Manuel Parente, Jean-Philippe Pellet, Ulrich Schimpel, Satyadeep Vajjala, Stefan Woerner
  • Publication number: 20140358619
    Abstract: According to an exemplary embodiment, a computer-implemented method for attempting to optimize a supply chain network (SCN) includes forecasting demand in the SCN based on a set of demand data. One or more time-dependent reorder points (ROPs) deemed to optimize the SCN are generated by a computer processor, based on the demand forecast, where each time-dependent ROP represents an ROP that changes over time. A simulation of operations of the SCN is performed, using the time-dependent ROPs.
    Type: Application
    Filed: May 28, 2013
    Publication date: December 4, 2014
    Applicant: International Business Machines Corporation
    Inventors: Anthony Bussani, Soojung Hong, Ban Kawas, Tim Nonner, Manuel Parente, Jean-Philippe Pellet, Ulrich Schimpel, Satyadeep Vajjala, Stefan Woerner
  • Patent number: 8473551
    Abstract: Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.
    Type: Grant
    Filed: May 25, 2012
    Date of Patent: June 25, 2013
    Assignee: International Business Machines Corporation
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Dieter M. Sommer
  • Patent number: 8285786
    Abstract: Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.
    Type: Grant
    Filed: August 29, 2008
    Date of Patent: October 9, 2012
    Assignee: International Business Machines Corporation
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Dieter M. Sommer
  • Publication number: 20120240199
    Abstract: Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.
    Type: Application
    Filed: May 25, 2012
    Publication date: September 20, 2012
    Applicant: International Business Machines Corporation
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Dieter M. Sommer
  • Patent number: 8219921
    Abstract: A method for receiving input from a user of a virtual world, the method including: interacting with an object displayed in the virtual world; displaying another object in the virtual world in response to the interacting, the another object adapted to interact with the user; displaying at least one of a user specific label and a service specific label in place of a generic label associated with the another object; selecting the another object; and receiving the generic label and the at least one of the user specific label and the service specific label as the input in response to the selecting.
    Type: Grant
    Filed: July 23, 2008
    Date of Patent: July 10, 2012
    Assignee: International Business Machines Corporation
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Ansgar Schmidt, Dieter Sommer
  • Patent number: 8132235
    Abstract: A method for providing e-token based access control to virtual world (VW) spaces includes intercepting a request from a first VW member to invite a second VW member to a VW space within a VW network, the request intercepted outside of the VW network. The access controls also include using a secret code associated with the first member to generate an e-token that includes an identifier of the second member and the space. The access controls further include sending the e-token inside the network. In response to a request for access to the space, the access controls include sending the e-token outside of the network for verification. Upon successful verification of the e-token, the access controls include accessing the network and controlling a guard bot inside the network to grant access for the second member to the space. The guard bot adds the second member to an access control list.
    Type: Grant
    Filed: April 3, 2008
    Date of Patent: March 6, 2012
    Assignee: International Business Machines Corporation
    Inventors: Anthony Bussani, Dirk Husemann, Ansgar Schmidt, Dieter Sommer
  • Publication number: 20100100926
    Abstract: A system and method for verifying an attribute includes providing a compound policy by a relying party. The compound policy has one or more claims and/or sub-claims expressing conditions on attributes and constants. Identity providers are associated with aspects of the compound policy by mapping attributes of the compound policy with attributes of the identity providers. A selection of at least one identity provider that satisfies the compound policy is enabled. At least one attribute of the user is verified by at least one identity provider in accordance with the selection.
    Type: Application
    Filed: October 16, 2008
    Publication date: April 22, 2010
    Inventors: Carl Binding, Anthony Bussani, Jan Camenisch, Dieter M. Sommer
  • Publication number: 20100058443
    Abstract: Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.
    Type: Application
    Filed: August 29, 2008
    Publication date: March 4, 2010
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Dieter M. Sommer
  • Publication number: 20100023889
    Abstract: A method for receiving input from a user of a virtual world, the method including: interacting with an object displayed in the virtual world; displaying another object in the virtual world in response to the interacting, the another object adapted to interact with the user; displaying at least one of a user specific label and a service specific label in place of a generic label associated with the another object; selecting the another object; and receiving the generic label and the at least one of the user specific label and the service specific label as the input in response to the selecting.
    Type: Application
    Filed: July 23, 2008
    Publication date: January 28, 2010
    Applicant: International Business Machines Corporation
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Ansgar Marco Schmidt, Dieter Sommer
  • Patent number: 7613808
    Abstract: A system and method for enhancing event correlation with exploitation of external data is presented. A correlation engine receives events and selects a correlation rule that corresponds to the events. The correlation rule includes an event selection, a trigger condition, and a correlation conclusion. The correlation engine uses the event selection to access external data and select events based upon the external data. In turn, the correlation engine monitors the selected events and checks whether they meet the correlation rule's trigger condition. When the events meet the correlation rule's trigger condition, the correlation engine performs an action based upon the correlation rule's correlation condition.
    Type: Grant
    Filed: June 22, 2005
    Date of Patent: November 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Carlos Cesar Ferreira Araujo, Ana Claudia Biazetti, Anthony Bussani, John E. Dinger, Metin Feridun, Juergen Schneider
  • Publication number: 20090254747
    Abstract: A method for providing e-token based access control to virtual world (VW) spaces includes intercepting a request from a first VW member to invite a second VW member to a VW space within a VW network, the request intercepted outside of the VW network. The access controls also include using a secret code associated with the first member to generate an e-token that includes an identifier of the second member and the space. The access controls further include sending the e-token inside the network. In response to a request for access to the space, the access controls include sending the e-token outside of the network for verification. Upon successful verification of the e-token, the access controls include accessing the network and controlling a guard bot inside the network to grant access for the second member to the space. The guard bot adds the second member to an access control list.
    Type: Application
    Filed: April 3, 2008
    Publication date: October 8, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anthony Bussani, Dirk Husemann, Ansgar Schmidt, Dieter Sommer
  • Publication number: 20090254968
    Abstract: A method for virtual world (VW) access control management includes intercepting a policy object from a VW network in response to a request from a VW client system to access a VW space, the policy object intercepted by a proxy server located outside of the network. The method also includes selecting an identity based upon the policy object, which provides credentials required in the policy object as a condition of granting access to the network, generating proof from the selected identity, and transmitting the proof to a verifier avatar located inside the network, the verifier avatar logically mapped to, and controlled by, a verification system located outside of the network. The method further includes receiving, at the verification system, the proof from the verifier avatar. In response to successful validation of the proof, the verification avatar places an avatar of the client system on a list of avatars having access to the space.
    Type: Application
    Filed: April 3, 2008
    Publication date: October 8, 2009
    Applicant: International Business Machines Corporation
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Ansgar Schmidt, Dieter Sommer
  • Publication number: 20080082674
    Abstract: The invention is directed to a method of transmitting data information and control information each having a source address and a destination address, from a server, having a server address, to a client, having a client address. The method comprises the steps of transmitting the control information from the server to the client via a network proxy that has a network proxy address, and transmitting the data information from the server to the client not via the network proxy. This system has the advantage that, on one hand, the data information is transmitted directly and therefore without any additional delay due to the network proxy, so that the throughput of the data information is maintained. In particular, a video stream can be sent over the network under real-time conditions. Additionally and on the other hand, the invention provides the advantages achievable by using a network proxy.
    Type: Application
    Filed: October 30, 2007
    Publication date: April 3, 2008
    Applicant: International Business Machines Corporation
    Inventors: Anthony Bussani, Sean Rooney
  • Patent number: 7349948
    Abstract: The invention is directed to a method of transmitting data information and control information each having a source address and a destination address, from a server, having a server address, to a client, having a client address. The method comprises the steps of transmitting the control information from the server to the client via a network proxy that has a network proxy address, and transmitting the data information from the server to the client not via the network proxy. This system has the advantage that, on one hand, the data information is transmitted directly and therefore without any additional delay due to the network proxy, so that the throughput of the data information is maintained. In particular, a video stream can be sent over the network under real-time conditions. Additionally and on the other hand, the invention provides the advantages achievable by using a network proxy.
    Type: Grant
    Filed: December 19, 2002
    Date of Patent: March 25, 2008
    Assignee: International Business Machines Corporation
    Inventors: Anthony Bussani, Sean Rooney
  • Publication number: 20060294222
    Abstract: A system and method for enhancing event correlation with exploitation of external data is presented. A correlation engine receives events and selects a correlation rule that corresponds to the events. The correlation rule includes an event selection, a trigger condition, and a correlation conclusion. The correlation engine uses the event selection to access external data and select events based upon the external data. In turn, the correlation engine monitors the selected events and checks whether they meet the correlation rule's trigger condition. When the events meet the correlation rule's trigger condition, the correlation engine performs an action based upon the correlation rule's correlation condition.
    Type: Application
    Filed: June 22, 2005
    Publication date: December 28, 2006
    Inventors: Carlos Araujo, Ana Biazetti, Anthony Bussani, John Dinger, Metin Feridun, Juergen Schneider
  • Publication number: 20030163520
    Abstract: The invention is directed to a method of transmitting data information and control information each having a source address and a destination address, from a server, having a server address, to a client, having a client address. The method comprises the steps of transmitting the control information from the server to the client via a network proxy that has a network proxy address, and transmitting the data information from the server to the client not via the network proxy. This system has the advantage that, on one hand, the data information is transmitted directly and therefore without any additional delay due to the network proxy, so that the throughput of the data information is maintained. In particular, a video stream can be sent over the network under real-time conditions. Additionally and on the other hand, the invention provides the advantages achievable by using a network proxy.
    Type: Application
    Filed: December 19, 2002
    Publication date: August 28, 2003
    Applicant: International Business Machines Corporation
    Inventors: Anthony Bussani, Sean Rooney