Patents by Inventor Boas Betzler

Boas Betzler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100281433
    Abstract: Computer method and apparatus controls avatar relative to a subject virtual environment, in particular entrance to and/or exit from the subject environment. An entrance/exit specification engine provides a plurality of characteristics of the subject environment and/or of an avatar representing a corresponding user in the subject environment. A script generator responsive to the entrance/exit specification engine generates scripts as a function of the plurality of characteristics. The generated scripts form a script collection executable with the avatar. Execution of the generated scripts on a processor of the corresponding user controls avatar entrance to and/or exit from the subject environment.
    Type: Application
    Filed: April 29, 2009
    Publication date: November 4, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul B. Moody, Boas Betzler, Rick A. Hamilton, II, Neil A. Katz, Brian M. O'Connell
  • Patent number: 7788639
    Abstract: The present invention relates to the field of provisioning of electronic computing resources via a network to a client, and in particular to a method for automatically selecting resources in for application environments consisting of a multitude of resources, wherein a resource managing component is provided for associating specific, selected resource combinations to the application environment, wherein a list of qualifying working combinations of the resource combinations is maintained.
    Type: Grant
    Filed: September 28, 2004
    Date of Patent: August 31, 2010
    Assignee: International Business Machines Corporation
    Inventors: Boas Betzler, Mark Dettinger, Werner Ederer
  • Publication number: 20100122328
    Abstract: Security is optimized in the context of a credential transformation service (CTS) by utilizing a web services client runtime to gather information for determining whether or not a target web service is hosted in a security domain used by a client application and for determining whether or not the target web service uses an authentication mechanism substantially identical to that used by the client application. The gathered information is carried in an endpoint reference (EPR) of the target web service. In response to the client receiving the EPR, the client applies an optimization process to eliminate a possible unnecessary invocation of the CTS, wherein the target web service is an authoritative manageable resource having minimal or no responsibility for providing its identity, and having minimal or no responsibility for advertising any creation and destruction lifecycle related events.
    Type: Application
    Filed: November 12, 2008
    Publication date: May 13, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Boas Betzler, Ramamohan Chennamsetty, Jeffrey A. Frey, Michael D. Williams
  • Publication number: 20100121729
    Abstract: A virtual business transaction is implemented between a first virtual world and a second virtual world by providing a searchable catalog that includes one or more items each comprising a virtual good, a virtual service, a real good, or a real service. An object representation is stored for each of the items. Each of the stored object representations is associated with metadata comprising any of digital rights metadata, ownership metadata, identity metadata, payment method metadata, or currency detail metadata. A set of transformation algorithms are established that are customized through a rule set. A request is received specifying a copying, modifying, or reselling of an item selected from the items in the searchable catalog. The copying, modifying, or reselling of the item from a first virtual world to a second virtual world is implemented using the set of transformation algorithms.
    Type: Application
    Filed: November 11, 2008
    Publication date: May 13, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Boas Betzler, Sandra L. Kearney, Tanaz Sowdagar, Hagen R. Wenzek
  • Publication number: 20100079446
    Abstract: A computer implemented method, a computer program product, and a data processing system manage regions within a virtual universe. A current location of an avatar is identified within a virtual universe, the current location being within a currently populated region. A vectored movement of the avatar is identified. Any adjacent region that may probabilistically encounter a horizon of the avatar within a region activation time of the virtual universe is identified. If the adjacent region is deactivated, then the adjacent region is activated. An unpopulated region that is currently active is identified, wherein the unpopulated region is within an extended distance from the avatar's current location. The unpopulated region is then deactivated.
    Type: Application
    Filed: September 30, 2008
    Publication date: April 1, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Boas Betzler, Sean L. Dague, Peter George Finn
  • Publication number: 20090307110
    Abstract: The present invention relates to relates to the management of virtual universe item returns. A method for in accordance with an embodiment of the present invention includes: initiating a return of a item by a user in a virtual universe; granting control of the return of the item to a return agency, the return agency submitting a return request on behalf of the user to a vendor associated with the item; upon approval of the return request by the vendor, sending instructions to the user to destroy the item; and upon confirmation of the destruction of the item by the user, crediting the user for the return.
    Type: Application
    Filed: June 9, 2008
    Publication date: December 10, 2009
    Inventors: Boas Betzler, Kulvir S. Bhogal, Rick A. Hamilton, II, Jenny S. Li, Clifford A. Pickover
  • Patent number: 7516360
    Abstract: The present invention provides a system and method for the execution of jobs in a distributed computing architecture that uses worker clients which are characterized by a checkpointing mechanism component for generating checkpointing information being assigned to at least one worker client, at least one failover system being assigned to the worker client, a component (failover system selection component) for automatically assigning at least one existing or newly created failover system to the failure system being assigned to a worker client in the case said worker clients fails, wherein the assigned failover system provides all function components in order to take over the execution of the job when said assigned worker client fails, wherein the assigned failover system further includes at least a failover monitor component for detecting failover situations of said assigned worker client.
    Type: Grant
    Filed: September 9, 2004
    Date of Patent: April 7, 2009
    Assignee: International Business Machines Corporation
    Inventors: Utz Bacher, Oliver Benke, Boas Betzler, Thomas Lumpp, Eberhard Pasch
  • Publication number: 20080201720
    Abstract: The idea of the present invention is to provide a challenge-response mechanism to acquire work scope split range information from the application's Work Scope Split component of the over-utilized resource. By using the work scope split range information, the provisioning system is able to add a new resource, install a new application for that new resource, configure the new and the over-utilized resource's application, and reconfigure the load-balancer in accordance with the work scope split range information. The present invention adds scalability to complex and stateful application programs and allows dynamic provisioning of resources for these application programs.
    Type: Application
    Filed: February 8, 2008
    Publication date: August 21, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Boas Betzler, Steffen Rost
  • Publication number: 20080189402
    Abstract: The present invention relates to performing systems management on IT-resources using web services, wherein the resources are managed in a computational network within a plurality of runtime environments having different respective instrumentations, wherein the web services are implemented according to a public web service standard, and wherein a resource configuration database is provided for storing a collection of resource-specific data on said IT-resources.
    Type: Application
    Filed: August 10, 2007
    Publication date: August 7, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Boas Betzler, Dietmar Kuebler, Georg Ochs
  • Publication number: 20080189713
    Abstract: The present invention relates to the field of systems management on IT-resources using web services. An improved method proposes a single web service implementation which dynamically and automatically generates multiple WSDLs for respective multiple resource type classes. This implementation is model-agnostic, as it doesn't require any knowledge about the underlying model, be that a resource model, or any other model in question, and uses introspection of the applied model at the time of invocation for the dynamic WSDL generation. The state of the resource is maintained within the instrumentation of the resource. No additional persistence on top needs to be implemented. A single implementation of a low number of generic web services, basically only two, reduces implementation and maintenance efforts significantly.
    Type: Application
    Filed: August 10, 2007
    Publication date: August 7, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Boas Betzler, Dietmar Kuebler, Georg Ochs
  • Patent number: 7392376
    Abstract: A method and apparatus for restricting access of an application to computer hardware. The apparatus includes both an authentication module and a validation module. The authentication module is within the trusted firmware layer. The purpose of the authentication module is to verify a cryptographic key presented by an application. The validation module is responsive to the authentication module and limits access of the application to the computer hardware. The authentication modules may be implemented in software through a firmware call, or through a hardware register of the computer.
    Type: Grant
    Filed: December 30, 2002
    Date of Patent: June 24, 2008
    Assignee: International Business Machines Corporation
    Inventors: Paul E. McKenney, Orran Y. Krieger, Boas Betzler
  • Patent number: 7392314
    Abstract: The idea of the present invention is to provide a challenge-response mechanism to acquire work scope split range information from the application's Work Scope Split component of the over-utilized resource. By using the work scope split range information, the provisioning system is able to add a new resource, install a new application for that new resource, configure the new and the over-utilized resource's application, and reconfigure the load-balancer in accordance with the work scope split range information. The present invention adds scalability to complex and stateful application programs and allows dynamic provisioning of resources for these application programs.
    Type: Grant
    Filed: August 12, 2004
    Date of Patent: June 24, 2008
    Assignee: International Business Machines Corporation
    Inventors: Boas Betzler, Steffen Rost
  • Publication number: 20080022127
    Abstract: A method and apparatus for restricting access of an application to computer hardware. The apparatus includes both an authentication module and a validation module. The authentication module is within the trusted firmware layer. The purpose of the authentication module is to verify a cryptographic key presented by an application. The validation module is responsive to the authentication module and limits access of the application to the computer hardware. The authentication modules may be implemented in software through a firmware call, or through a hardware register of the computer.
    Type: Application
    Filed: May 31, 2007
    Publication date: January 24, 2008
    Inventors: Paul McKenney, Orran Krieger, Boas Betzler
  • Publication number: 20070226792
    Abstract: A method and apparatus for restricting access of an application to computer hardware. The apparatus includes both an authentication module and a validation module. The authentication module is within the trusted firmware layer. The purpose of the authentication module is to verify a cryptographic key presented by an application. The validation module is responsive to the authentication module and limits access of the application to the computer hardware. The authentication modules may be implemented in software through a firmware call, or through a hardware register of the computer.
    Type: Application
    Filed: May 31, 2007
    Publication date: September 27, 2007
    Inventors: Paul McKenney, Orran Krieger, Boas Betzler
  • Patent number: 6985240
    Abstract: A method and apparatus for retrieving information about an object of interest to an observer. A position sensor wearable by the observer generates position information indicating the position of the observer relative to a fixed position. A direction sensor wearable by the observer generates direction information indicating the orientation of the observer relative to a fixed orientation. An object database stores position information and descriptive information for each of one or more objects. An identification and retrieval unit uses the position and direction information to identify from the object database an object being viewed by the observer by determining whether the object is along a line of sight of the observer and retrieves information about the object from the database. The identification and retrieval unit retrieves the descriptive information stored for the object in the database for presentation to the observer via an audio or video output device.
    Type: Grant
    Filed: December 23, 2002
    Date of Patent: January 10, 2006
    Assignee: International Business Machines Corporation
    Inventors: Oliver Benke, Boas Betzler, Thomas Lumpp, Eberhard Pasch
  • Publication number: 20050251806
    Abstract: A system, method and computer program product for enhancing a real-time operating system (RTOS) with functionality normally associated with a general purpose operating system (GPOS). A hypervisor that is adapted to perform a real-time scheduling function supports concurrent execution of an RTOS and a GPOS on a system of shared hardware resources. The RTOS or its applications can utilize services provided by the GPOS. Such services may include one or more of file system organization, network communication, network management, database management, security, user-interface support and others. To enhance operational robustness and security, the hypervisor can be placed in read-only storage while maintaining the ability to update scheduling mechanisms. A programmable policy manager that is maintained in read-write storage can be used to dictate scheduling policy changes to the hypervisor as required to accommodate current needs.
    Type: Application
    Filed: May 10, 2004
    Publication date: November 10, 2005
    Inventors: Marc Auslander, Boas Betzler, Dilma Da Silva, Michael Day, Orran Krieger, Paul McKenney, Michal Ostrowski, Bryan Rosenburg, Robert Wisniewski, James Xenidis
  • Publication number: 20050081097
    Abstract: The present invention provides a system and method for the execution of jobs in a distributed computing architecture that uses worker clients which are characterized by a checkpointing mechanism component for generating checkpointing information being assigned to at least one worker client, at least one failover system being assigned to the worker client, a component (failover system selection component) for automatically assigning at least one existing or newly created failover system to the failure system being assigned to a worker client in the case said worker clients fails, wherein the assigned failover system provides all function components in order to take over the execution of the job when said assigned worker client fails, wherein the assigned failover system further includes at least a failover monitor component for detecting failover situations of said assigned worker client.
    Type: Application
    Filed: September 9, 2004
    Publication date: April 14, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Utz Bacher, Oliver Benke, Boas Betzler, Thomas Lumpp, Eberhard Pasch
  • Publication number: 20050071107
    Abstract: The present invention relates to the field of provisioning of electronic computing resources via a network to a client, and in particular to a method for automatically selecting resources in for application environments consisting of a multitude of resources, wherein a resource managing component is provided for associating specific, selected resource combinations to the application environment, wherein a list of qualifying working combinations of the resource combinations is maintained.
    Type: Application
    Filed: September 28, 2004
    Publication date: March 31, 2005
    Applicant: International Business Machines Corporation
    Inventors: Boas Betzler, Mark Dettinger, Werner Ederer
  • Publication number: 20050055696
    Abstract: The idea of the present invention is to provide a challenge-response mechanism to acquire work scope split range information from the application's Work Scope Split component of the over-utilized resource. By using the work scope split range information, the provisioning system is able to add a new resource, install a new application for that new resource, configure the new and the over-utilized resource's application, and reconfigure the load-balancer in accordance with the work scope split range information. The present invention adds scalability to complex and stateful application programs and allows dynamic provisioning of resources for these application programs.
    Type: Application
    Filed: August 12, 2004
    Publication date: March 10, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Boas Betzler, Steffen Rost
  • Publication number: 20040128507
    Abstract: A method and apparatus for restricting access of an application to computer hardware. The apparatus includes both an authentication module and a validation module. The authentication module is within the trusted firmware layer. The purpose of the authentication module is to verify a cryptographic key presented by an application. The validation module is responsive to the authentication module and limits access of the application to the computer hardware. The authentication modules may be implemented in software through a firmware call, or through a hardware register of the computer.
    Type: Application
    Filed: December 30, 2002
    Publication date: July 1, 2004
    Inventors: Paul E. McKenney, Orran Y. Krieger, Boas Betzler