Patents by Inventor Daniel Paul Kolz
Daniel Paul Kolz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10599692Abstract: An apparatus and method modify a saved query based on a change in a query value meaning that changes over time. In preferred embodiments a graphical query interface displays an option to adjust query values of a saved database query. A query adjustment mechanism then adjusts the value of the query to compensate for the change in the meaning of the query value since the query was created such that the adjusted query will have the same basic meaning as when the query was originally created. Preferred Embodiments allow the user to specify to adjust the query to the current date or to a specified date in the past.Type: GrantFiled: August 14, 2008Date of Patent: March 24, 2020Assignee: International Business Machines CorporationInventors: Richard Dean Dettinger, Daniel Paul Kolz, Kyong Jin Shim, Alan Benjamin Swanson, Marie Renee Wilkening
-
Patent number: 10033749Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: GrantFiled: April 21, 2017Date of Patent: July 24, 2018Assignee: International Business Machines CorporationInventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Publication number: 20170222975Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: ApplicationFiled: April 21, 2017Publication date: August 3, 2017Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Patent number: 9686298Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: GrantFiled: March 7, 2016Date of Patent: June 20, 2017Assignee: International Business Machines CorporationInventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Publication number: 20160191556Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: ApplicationFiled: March 7, 2016Publication date: June 30, 2016Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Patent number: 9300680Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: GrantFiled: August 31, 2012Date of Patent: March 29, 2016Assignee: International Business Machines CorporationInventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Patent number: 8543588Abstract: Embodiments are provided for associating a virtual column with a target physical table. The data for the virtual column originates from a source physical table where the data physically resides. In this way, users can access the data in a manner consistent with the users' logical perspective of the data.Type: GrantFiled: September 28, 2007Date of Patent: September 24, 2013Assignee: International Business Machines CorporationInventors: Richard Dean Dettinger, Daniel Paul Kolz
-
Patent number: 8473427Abstract: A method and apparatus improves the block allocation time in a parallel computer system. A pre-load controller pre-loads blocks of hardware in a supercomputer cluster in anticipation of demand from a user application. In the preferred embodiments the pre-load controller determines when to pre-load the compute nodes and the block size to allocate the nodes based on pre-set parameters and previous use of the computer system. Further, in preferred embodiments each block of compute nodes in the parallel computer system has a stored hardware status to indicate whether the block is being pre-loaded, or already has been pre-loaded. In preferred embodiments, the hardware status is stored in a database connected to the computer's control system. In other embodiments, the compute nodes are remote computers in a distributed computer system.Type: GrantFiled: August 14, 2008Date of Patent: June 25, 2013Assignee: International Business Machines CorporationInventors: Jay Symmes Bryant, Daniel Paul Kolz, Dharmesh J. Patel
-
Publication number: 20120324576Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: ApplicationFiled: August 31, 2012Publication date: December 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Patent number: 8316013Abstract: A method, system and article of manufacture for processing a database query result that includes multiple data elements in a single result field. One embodiment provides a method of processing a query result. The method includes receiving a query result that includes at least one result field having multiple data elements that are in a many-to-one relationship with a second result field. The received query result is parsed to identify the multiple data elements from the first result field. Then, a result set is generated on the basis of the identified multiple data elements. The generated result set only includes one-to-one relationships between different result fields. Advantageously, the generated result set is suitable for programmatic access in order to allow an automated processing of the generated result set.Type: GrantFiled: August 9, 2006Date of Patent: November 20, 2012Assignee: International Business Machines CorporationInventors: Daniel Paul Kolz, Shannon Everett Wenzel
-
Patent number: 8302021Abstract: A graphical user interface allows performing operations simply by dragging a first object over a second object. One or more attributes of the second object are effectively “picked up” by virtue of dragging over the second object. In this manner, the user interface is more friendly, more intuitive, and reduces the number of pointer clicks to implement a particular function, thereby enhancing the efficiency of the user.Type: GrantFiled: July 15, 2008Date of Patent: October 30, 2012Assignee: International Business Machines CorporationInventors: Richard Dean Dettinger, Daniel Paul Kolz, Shannon Everett Wenzel
-
Patent number: 8296820Abstract: Techniques are disclosed for attaching security policies to secured computing systems. A security policy is attached to a parent domain. The parent domain includes a first secured computing system. The security policy is a natural language description for controlling access to the secured computing system. Upon determining that the parent domain propagates the security policy, a first generation child domain is identified. The first generation child domain includes a second secured computing system. The first generation child domain is associated with the parent domain in a hierarchical relationship. It is determined that the first generation child domain inherits the security policy based on an inheritance rule. The security policy is attached to the first generation child domain.Type: GrantFiled: January 18, 2008Date of Patent: October 23, 2012Assignee: International Business Machines CorporationInventors: I-Lung Kao, Daniel Paul Kolz
-
Patent number: 8286243Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: GrantFiled: October 23, 2007Date of Patent: October 9, 2012Assignee: International Business Machines CorporationInventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Patent number: 8204906Abstract: Embodiments of the invention store log event records in a secure database log by encrypting information in a query, or in query results, that would otherwise be subject to unwanted disclosure (either from within or without a given organization). For example, an organization (e.g., a research institution) may allow a database administrator to review log event records to diagnose and correct system performance issues, without being forced to trust the administrator with sensitive medical data (e.g., medical records related to participants in a research study). Thus, the security of sensitive information may be maintained, while at the same time, the database administrator may still access the information needed to maintain a working system.Type: GrantFiled: July 13, 2007Date of Patent: June 19, 2012Assignee: International Business Machines CorporationInventors: Richard Dean Dettinger, Daniel Paul Kolz, Frederick Allyn Kulack, Erik Edward Voldal
-
Patent number: 8140479Abstract: A method, apparatus and program product for classifying objects on a computer system. An audit journal of interactions with objects is evaluated to identify a plurality of logical groups of objects. A graphical construct, such as a hierarchical tree, is created from the plurality of logical groups. And, in response to user input directed to the graphical construct, at least one object is classified based upon a logical group within which the object is arranged.Type: GrantFiled: December 21, 2006Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventors: Thomas Barlen, Daniel Paul Kolz
-
Publication number: 20110246441Abstract: A method, apparatus, and program product is provided for constructing a domain-specific ontology for interpreting a policy. A phrase assumed to be associated with a policy is received. An indefinite term in the phrase is identified. Internet searches are performed on a plurality of terms from the phrase. A plurality of potential replacement terms is extracted from the Internet search results for the indefinite term. A context-specific ontology is built for the indefinite term based upon tracked occurrences of the plurality of potential replacement terms. The policy is interpreted by accessing the domain-specific ontology to interpret the indefinite term, where the indefinite term is interpreted by mapping the indefinite term to a plurality of potential replacement terms in the ontology for a plurality of contexts, and creating a policy based upon the interpretation of the indefinite term from the ontology.Type: ApplicationFiled: June 13, 2011Publication date: October 6, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Daniel Paul Kolz, Kyong Jin Shim
-
Patent number: 7991760Abstract: A method, apparatus, and program product is provided for constructing a domain-specific ontology for interpreting a policy. A phrase assumed to be associated with a policy is received. An indefinite term in the phrase is identified. Internet searches are performed on a plurality of terms from the phrase. A plurality of potential replacement terms is extracted from the Internet search results for the indefinite term. A context-specific ontology is built for the indefinite term based upon tracked occurrences of the plurality of potential replacement terms. The policy is interpreted by accessing the domain-specific ontology to interpret the indefinite term, where the indefinite term is interpreted by mapping the indefinite term to a plurality of potential replacement terms in the ontology for a plurality of contexts, and creating a policy based upon the interpretation of the indefinite term from the ontology.Type: GrantFiled: February 8, 2008Date of Patent: August 2, 2011Assignee: International Business Machines CorporationInventors: Daniel Paul Kolz, Kyong Jin Shim
-
Patent number: 7900014Abstract: A memory management mechanism a nodal having multiple processors in a massively parallel computer system dynamically configures nodal memory on demand. A respective variable-sized subdivision of nodal memory is associated with each processor in the node. A processor may request additional memory, and the other processor(s) may grant or veto the request. If granted, the requested memory is added to the subdivision of the requesting processor. A processor can only access memory within its own subdivision. Preferably, each subdivision contains a daemon which monitors memory usage and generates requests for additional memory.Type: GrantFiled: July 11, 2008Date of Patent: March 1, 2011Assignee: International Business Machines CorporationInventors: Jay Symmes Bryant, Nicholas Bruce Goracke, Daniel Paul Kolz, Dharmesh J. Patel
-
Patent number: 7865845Abstract: An apparatus and method for a graphical user interface allow performing operations simply by dragging a first object to touch a second object. The selection of the first object places a corresponding first object in a chain of objects. When the selected first object touches a second object, a corresponding second object is added to the chain of objects. This process may continue for the selection of many objects by merely touching each object with the selected first object, which causes a corresponding object to be added to the chain of objects. The chain of objects may then be processed as an atomic group of operations that may be rolled back if any of the operations in the group fail.Type: GrantFiled: June 3, 2008Date of Patent: January 4, 2011Assignee: International Business Machines CorporationInventors: Richard Dean Dettinger, Daniel Paul Kolz, Shannon Everett Wenzel
-
Patent number: 7853543Abstract: A method and apparatus improves the block allocation time in a parallel computer system. A pre-load controller pre-loads blocks of hardware in a supercomputer cluster in anticipation of demand from a user application. In the preferred embodiments the pre-load controller determines when to pre-load the compute nodes and the block size to allocate the nodes based on pre-set parameters and previous use of the computer system. Further, in preferred embodiments each block of compute nodes in the parallel computer system has a stored hardware status to indicate whether the block is being pre-loaded, or already has been pre-loaded. In preferred embodiments, the hardware status is stored in a database connected to the computer's control system. In other embodiments, the compute nodes are remote computers in a distributed computer system.Type: GrantFiled: August 14, 2008Date of Patent: December 14, 2010Assignee: International Business Machines CorporationInventors: Jay Symmes Bryant, Daniel Paul Kolz, Dharmesh J. Patel