Patents by Inventor Daniel Brand

Daniel Brand has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090031249
    Abstract: Methods are provided for creating dynamic lists from selected areas of a power system of a utility company. The utility company has an energy management system with a control panel. The energy management system is used to access one or more source displays of a site. Rubber-banding or lassoing is used to create selected areas from at least a portion of the source displays, Lists are dynamically created. Operator defined information is displayed for each element type in a list of network elements from the selected areas that have been rubber-banded or lassoed.
    Type: Application
    Filed: June 13, 2008
    Publication date: January 29, 2009
    Inventors: Gennaro Castelli, Michael Hackett, Michael Quinn Howard, Lawrence Edmund Jones, HuiChu Su Shung, Heath Daniel Brand
  • Publication number: 20090030556
    Abstract: Methods are provided for assessing reliability of a power system of a utility company. At least one main overview display is obtained. Violation markers are displayed on the one main overview display. A monitored elements tab is updated with a list of monitored elements.
    Type: Application
    Filed: June 13, 2008
    Publication date: January 29, 2009
    Inventors: Gennaro Castelli, Michael Hackett, Michael Quinn Howard, Lawrence Edmund Jones, HuiChu Su Shung, Heath Daniel Brand
  • Publication number: 20080320451
    Abstract: Pointer analysis is used for different applications, e.g., compilers, debugging tools and programs understanding tools, each having different requirements. A framework for pointer analysis is provided that defines a multidimensional space, for example a three-dimensional space, containing an order sensitivity dimension, a predicate sensitivity dimension and a value persistence dimension. A point in the three-dimensional space is identified. This point yields values for order sensitivity, predicate sensitivity and value persistence. Pointer analysis is then conducted on a computer program in accordance with the identified values for order sensitivity, predicate sensitivity and value persistence.
    Type: Application
    Filed: June 19, 2007
    Publication date: December 25, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Daniel Brand, Marcio Buss, Vugranam C. Sreedhar
  • Publication number: 20080189530
    Abstract: A method for malware detection, wherein the method includes: utilizing a hardware based program flow monitor (PFM) for embedded software that employs a static analysis of program code; marrying the program code to addresses, while considering which central processing unit (CPU) is executing the program code; capturing an expected control flow of the program code, and storing the control flow as physical address pairs of leaders and followers (LEAD-FOLL pair) in a Metadata Store (MDS) within the PFM; monitoring control flow at runtime by the PFM; and comparing runtime control flow with the expected control flow
    Type: Application
    Filed: February 7, 2007
    Publication date: August 7, 2008
    Applicant: International Business Machines Corporation
    Inventors: Suzanne McIntosh, Daniel Brand, Matthew Kaplan, Paul A. Karger, Michael G. McIntosh, Elaine R. Palmer, Amitkumar M. Paradkar, David Toll, Samuel M. Weber
  • Patent number: 7168009
    Abstract: Disclosed are a method and system for analyzing a computer program. The method comprises the steps of analyzing the program to generate an initial error report and a list of suspected error conditions, and generating a set of assertions and inserting the assertions into the program to determine if the suspected error conditions are valid. Preferably, a strong static analysis method is used to identify an initial set of error reports. When this analysis fails to determine if the condition is true or false, the condition along with the potential program error is captured to form a suspected error. Suspected errors are directed to an assertion generator to produce a monitor—that is, source code modification that is integrated with the original program. This and other inserted monitors check the conditions for the suspected error during the program execution.
    Type: Grant
    Filed: September 24, 2003
    Date of Patent: January 23, 2007
    Assignee: International Business Machines Corporation
    Inventors: John A. Darringer, Daniel Brand, Florian Krohm
  • Patent number: 7089542
    Abstract: A method and apparatus are provided for analyzing software programs. The invention combines data flow analysis and symbolic execution with a new constraint solver to create a more efficient and accurate static software analysis tool. The disclosed constraint solver combines rewrite rules with arithmetic constraint solving to provide a constraint solver that is efficient, flexible and capable of satisfactorily expressing semantics and handling arithmetic constraints. The disclosed constraint solver comprises a number of data structures to remember existing range, equivalence and inequality constraints and incrementally add new constraints. The constraint solver returns an inconsistent indication only if the range constraints, equivalence constraints, and inequality constraints are mutually inconsistent.
    Type: Grant
    Filed: December 13, 2002
    Date of Patent: August 8, 2006
    Assignee: International Business Machines Corporation
    Inventors: Daniel Brand, John A. Darringer, Florian Krohm
  • Publication number: 20050066234
    Abstract: Disclosed are a method and system for analyzing a computer program. The method comprises the steps of analyzing the program to generate an initial error report and a list of suspected error conditions, and generating a set of assertions and inserting the assertions into the program to determine if the suspected error conditions are valid. Preferably, a strong static analysis method is used to identify an initial set of error reports. When this analysis fails to determine if the condition is true or false, the condition along with the potential program error is captured to form a suspected error. Suspected errors are directed to an assertion generator to produce a monitor—that is, source code modification that is integrated with the original program. This and other inserted monitors check the conditions for the suspected error during the program execution.
    Type: Application
    Filed: September 24, 2003
    Publication date: March 24, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John Darringer, Daniel Brand, Florian Krohm
  • Publication number: 20040117772
    Abstract: A method and apparatus are provided for analyzing software programs. The invention combines data flow analysis and symbolic execution with a new constraint solver to create a more efficient and accurate static software analysis tool. The disclosed constraint solver combines rewrite rules with arithmetic constraint solving to provide a constraint solver that is efficient, flexible and capable of satisfactorily expressing semantics and handling arithmetic constraints. The disclosed constraint solver comprises a number of data structures to remember existing range, equivalence and inequality constraints and incrementally add new constraints. The constraint solver returns an inconsistent indication only if the range constraints, equivalence constraints, and inequality constraints are mutually inconsistent.
    Type: Application
    Filed: December 13, 2002
    Publication date: June 17, 2004
    Applicant: International Business Machines Corporation
    Inventors: Daniel Brand, John A. Darringer, Florian Krohm
  • Patent number: 4816999
    Abstract: A method of reducing the number of connections in, and increasing the testability of, a logic network. This is accomplished by propagating global controlling information through a graphical representation of the logic network. Logically redundant connections are detected and removed by means of this information.
    Type: Grant
    Filed: May 20, 1987
    Date of Patent: March 28, 1989
    Assignee: International Business Machines Corporation
    Inventors: Charles L. Berman, Daniel Brand, Louse H. Trevillyan