Patents by Inventor David A. George
David A. George has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8599856Abstract: One embodiment of the present method and apparatus for assisting a peer-to-peer connection between a first node and a second node includes receiving, at a third node, a request for connection assistance from one of the first and second nodes. The third node then connects to both the first node and the second node, receives the data from the first node and delivers the data to the second node. In this manner, data may be transferred between the first and second nodes even if the first and second nodes are unable to directly connect to each other (e.g., due to permanent or temporary limitations).Type: GrantFiled: June 27, 2008Date of Patent: December 3, 2013Assignee: International Business Machines CorporationInventors: David A. George, Raymond B. Jennings, III, Jason D. LaVoie
-
Patent number: 8543699Abstract: In one embodiment, the invention is a method and apparatus for distributed policy evaluation. One embodiment of a method for evaluating a systems management policy, where the policy includes a condition and an action to be taken when the condition evaluates to TRUE, includes forwarding the policy, by a first autonomic manager, to a second autonomic manager and receiving at the first autonomic manager at least partial evaluation results for the condition from a third autonomic manager. The first autonomic manager, the second autonomic manager, and the third autonomic manager are arranged in a ring configuration such that the evaluating occurs in a cascading manner, and only the first autonomic manager has access to a policy storage from which the policy is retrieved.Type: GrantFiled: February 28, 2007Date of Patent: September 24, 2013Assignee: International Business Machines CorporationInventors: Mandis S. Beigi, Seraphin Calo, David A. George, Dinesh Verma
-
Patent number: 8429206Abstract: A logical expression of a policy is generated from another logical expression of a policy, for example, via a set of transformations, each of which comprises an input sub-expression and an output sub-expression. Any sub-expression of the input expression which matches an input sub-expression of a transformation rule is replaced with the output sub-expression of that transformation rule to form a sub-expression of the output expression.Type: GrantFiled: January 16, 2007Date of Patent: April 23, 2013Assignee: International Business Machines CorporationInventors: Mandis S. Beigi, Seraphin B. Calo, David A. George
-
Patent number: 8418060Abstract: Methods, systems and program storage devices receive actions taken by a user during an interaction with a web resource, wherein the actions cause the web resource to assume a particular state; and save information describing the actions. Other methods, systems and program storage devices retrieve the information; and perform at least one action using the information, causing a graphical user interface to display the web resource in a state in accordance with the action. The particular state can include without limitation a plurality of states assumed sequentially when the web resource is displayed, and the information can describe a sequential series of actions that cause the web resource to assume the sequential series of states. In such variants further operations include receiving a series of commands to step through the sequential states of the web resource; and using the information to display the sequential states. The series of commands can be issued automatically or under user control.Type: GrantFiled: March 3, 2008Date of Patent: April 9, 2013Assignee: International Business Machines CorporationInventors: David A. George, Raymond B. Jennings, III, Malgorzata E. Stys
-
Publication number: 20120102543Abstract: A computer implemented method and system for managing an audit of one or more network layer devices is provided. An audit management system accessible by a user via a graphical user interface acquires network layer device information of the network layer devices and a configuration file comprising configuration file commands. The audit management system allows creation and/or selection of one or more audit policies for the network layer devices. The audit policies comprise one or more audit rules that define functioning of the network layer devices for one or more compliance policies. The audit management system executes the audit policies for performing the audit of the network layer devices by comparing the configuration file commands of the configuration file with the audit rules of the audit policies, and generates a report comprising information about security and compliance of the network layer devices with the compliance policies based on the audit.Type: ApplicationFiled: October 24, 2011Publication date: April 26, 2012Inventors: Ashwin Kohli, David A. George, Kevin Tinagero
-
Patent number: 8140984Abstract: A method, system and program storage device for browsing hyperlinked documents are provided. A method in one aspect may include enabling navigating from a document having a plurality of hyperlinks to a document associated with one of said plurality of hyperlinks; and enabling navigating directly from said document associated with one of said plurality of hyperlinks to another document associated with another one of said plurality of hyperlinks using one or more of a plurality of defined elements. System and program storage device for performing the above methods are also provided.Type: GrantFiled: March 30, 2007Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventors: Parijat Dube, David A. George, Raymond B. Jennings, III, Malgorzata Elzbieta Stys
-
Patent number: 8135821Abstract: A method for validating that a networked system of modules conforms to at least one interoperability rule pertinent to interoperability of at least two of the modules includes the steps of obtaining the at least one interoperability rule, the at least one rule being encoded in computer-operable format; obtaining configuration information pertinent to at least one of the modules, the configuration information being encoded in computer-operable format; and comparing the at least one interoperability rule to the configuration information to validate whether the system conforms to the at least one interoperability ruleType: GrantFiled: January 16, 2007Date of Patent: March 13, 2012Assignee: International Business Machines CorporationInventors: Dakshi Agrawal, Seraphin B. Calo, Murthy Devarakonda, David A. George, Sandeep K. Gopisetty, Kang-Won Lee, Konstantinos Magoutis, Ramani R. Routray, Joseph D. Ryan, Gauri Shah, Chung-hao Tan, Norbert G. Vogl, Kaladhar Voruganti
-
Patent number: 8028072Abstract: Methods, apparatus and computer program products implement session-specific URIs for allocating network resources by receiving a request from a user for at least one network resource; assigning a session-specific URI to the at least one network resource for use in identifying the at least one network resource and controlling access to the at least one network resource; updating a network directory service with the session-specific URI; and communicating the session-specific URI to the user. The user communicates the session-specific URI to other participants in the session during which the at least one network resource will be used. After a pre-determined time, the session ends and the at least one network resource is de-allocated by, for example, changing the URI of the at least one network resource. Frequent changes of URIs hinder efforts by unauthorized individuals to gain access to network resources.Type: GrantFiled: March 3, 2008Date of Patent: September 27, 2011Assignee: International Business Machines CorporationInventors: David A. George, Raymond B. Jennings, III, Suresh N. Chari, Anees Shaikh
-
Patent number: 7979414Abstract: One embodiment of the present method and apparatus for processing a search request message received over a network includes computing a threshold value in accordance with the search request message and returning at least one search result to a user in response to the search request message, if a rank of the at least one search result at least meets the threshold value.Type: GrantFiled: June 27, 2008Date of Patent: July 12, 2011Assignee: International Business Machines CorporationInventors: David A. George, Raymond B. Jennings, III, Martin G. Kienzle
-
Patent number: 7962643Abstract: One embodiment of the present method and apparatus for reducing spam in peer-to-peer networks includes forming a search message including at least one decoy word and sending the search request message, including the decoy word(s), to one or more nodes in the network. Embodiments of the present invention make it possible to weed out nodes in the network that send spam in response to every search message (e.g., regardless of the search message's content).Type: GrantFiled: June 27, 2008Date of Patent: June 14, 2011Assignee: International Business Machines CorporationInventors: David A. George, Raymond B. Jennings, III, Jason D. LaVoie
-
Patent number: 7885184Abstract: One embodiment of the present method and apparatus for re-establishing anonymous data transfers between a first endpoint and a second endpoint in a network includes receiving, from a first node, the identity of a second node connected to the first node, where at least the first node is a neighbor node. A third node (a neighbor node) is then selected, and instructed to connect to the second node in order to establish a link for the path. In this manner, the first endpoint and the second endpoint remain unknown at least to each other (e.g., where “unknown” means that neither endpoint knows any identifying information, such as network address, about the other endpoint), and likely to all other nodes in the path as well. In another embodiment, a failure is detected at a neighbor node, where the neighbor node is part of an original path between the first endpoint and the second endpoint.Type: GrantFiled: June 30, 2008Date of Patent: February 8, 2011Assignee: International Business Machines CorporationInventors: David A. George, Raymond B. Jennings, III, Jason D. LaVoie, Sambit Sahu
-
Publication number: 20100005402Abstract: A method, system and program storage device are provided for allowing chat room participants to communicate with other participants privately without requiring general chat “friends” or “buddies” pre-authorization. All chatting dialog including private and public chats are consolidated into a unified group chat dialog window that requires no special handling by a user to see public and private chats. The private and public chat messages are displayed chronologically in a single chat message log within the chat group window.Type: ApplicationFiled: July 1, 2008Publication date: January 7, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David A. George, Raymond B. Jennings, III, Malgorzata E. Stys
-
Publication number: 20090249188Abstract: A web page is adaptively transcribed and rendered at a client endpoint. A request for a web page is received, and full page content of the web page is obtained from a remote web server, including assembly of previously cached parts of the web page. The web page is transcribed according to prescribed rules. The prescribed rules are selected according to user preferences, the environmental factors and information learned from prior handling of the web page. The transcribed web page is rendered.Type: ApplicationFiled: March 27, 2008Publication date: October 1, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Parijat Dube, David A. George, Raymond B. Jennings, III, Malgorzata E. Stys
-
Publication number: 20090222727Abstract: Methods, systems and program storage devices receive actions taken by a user during an interaction with a web resource, wherein the actions cause the web resource to assume a particular state; and save information describing the actions. Other methods, systems and program storage devices retrieve the information; and perform at least one action using the information, causing a graphical user interface to display the web resource in a state in accordance with the action. The particular state can include without limitation a plurality of states assumed sequentially when the web resource is displayed, and the information can describe a sequential series of actions that cause the web resource to assume the sequential series of states. In such variants further operations include receiving a series of commands to step through the sequential states of the web resource; and using the information to display the sequential states. The series of commands can be issued automatically or under user control.Type: ApplicationFiled: March 3, 2008Publication date: September 3, 2009Inventors: David A. George, Raymond B. Jennings, III, Malgorzata E. Stys
-
Publication number: 20090222561Abstract: Methods, apparatus and computer program products implement session-specific URIs for allocating network resources by receiving a request from a user for at least one network resource; assigning a session-specific URI to the at least one network resource for use in identifying the at least one network resource and controlling access to the at least one network resource; updating a network directory service with the session-specific URI; and communicating the session-specific URI to the user. The user communicates the session-specific URI to other participants in the session during which the at least one network resource will be used. After a pre-determined time, the session ends and the at least one network resource is de-allocated by, for example, changing the URI of the at least one network resource. Frequent changes of URIs hinder efforts by unauthorized individuals to gain access to network resources.Type: ApplicationFiled: March 3, 2008Publication date: September 3, 2009Inventors: David A. George, Raymond B. Jennings, III, Suresh N. Chari, Anees Shaikh
-
Publication number: 20090177597Abstract: Systems, methods and computer products for profile-based identity verification over the Internet. Exemplary embodiments include a system including an activity classifier configured to receive Internet activity input including email, chat, browser and voice over Internet Protocol (VoIP) logs/streams, an email profiler, a chat, a browser profiler, a voice over Internet Protocol (VoIP) logs/streams profiler, wherein the profilers are configured to extract values from the Internet Activity input attributes from the data set, a score calculator configured to receive the attributes and calculate the score of the data set, a categorization engine configured to receive the score from the score calculator and map the data set to an individual or class of individuals based on the value of the score and on a database of activity-specific attributes and an application configured to place weights on the activity specific and generic attributes to define a score function from the score.Type: ApplicationFiled: May 29, 2008Publication date: July 9, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Parijat Dube, David A. George, Raymond B. Jennings, III
-
Patent number: 7552230Abstract: One embodiment of the present method and apparatus for reducing spam in peer-to-peer networks includes forming a search message including at least one decoy word and sending the search request message, including the decoy word(s), to one or more nodes in the network. Embodiments of the present invention make it possible to weed out nodes in the network that send spam in response to every search message (e.g., regardless of the search message's content).Type: GrantFiled: June 15, 2005Date of Patent: June 23, 2009Assignee: International Business Machines CorporationInventors: David A. George, Raymond B. Jennings, III, Jason D. LaVoie
-
Publication number: 20090150807Abstract: A method for dynamically re-calculating and presenting a graphical user interface (GUI) that includes interface icons based on user context, includes, for a current user, determining a change in user context associated with the GUI. The method then modifies one of a state, appearance and spatial placement of the user interface icons within the GUI automatically, in accordance with a determined change in user context. The step of determining a change in user context may further include analyzing a set of contextual attributes associated with the user.Type: ApplicationFiled: December 6, 2007Publication date: June 11, 2009Applicant: International Business Machines CorporationInventors: David A. George, Raymond R. Hitney, Raymond B. Jennings, III, Malgorzata E. Stys
-
Publication number: 20090132939Abstract: This invention provides a method for dynamically calculating and presenting a graphical user interface (GUI) within the display device in a computing system including a display device and an input device. The method includes creating a shared icon space within the GUI, automatically populating the shared icon space with GUI icons including stacking and clustering the GUI icons in the shared icon space based on current context, and potential user needs in view of the current user context and modifying the shared icon space in response to a detected change in current context.Type: ApplicationFiled: November 19, 2007Publication date: May 21, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David A. George, Raymond R. Hitney, Raymond B. Jennings, III, Malgorzata E. Stys
-
Patent number: 7509312Abstract: One embodiment of the present method and apparatus for processing a search request message received over a network includes computing a threshold value in accordance with the search request message and returning at least one search result to a user in response to the search request message, if a rank of the at least one search result at least meets the threshold value.Type: GrantFiled: July 28, 2006Date of Patent: March 24, 2009Assignee: International Business Machines CorporationInventors: David A. George, Raymond B. Jennings, III, Martin G. Kienzle