Patents by Inventor David Bantz

David Bantz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8805743
    Abstract: A computer controlled implementation for distributing portions of a license to use software entities, granted by a licensor to a primary licensee, to subsequent secondary licensees comprising determining a dividable value for the primary license to use a software entity, enabling the primary licensee to grant a portion of the dividable value of the primary license to use the software entity to a secondary licensee, enabling the licensor, the licensee and the secondary licensee to add value to said values of the licenses and tracking said value of the license and of the portion granted to said secondary licensee.
    Type: Grant
    Filed: December 27, 2006
    Date of Patent: August 12, 2014
    Assignee: International Business Machines Corporation
    Inventors: David Bantz, Thomas E. Chefalas, Rick A. Hamilton, II, Srikant Jalan, Steven J. Mastrianni, Clifford A. Pickover, James W. Seaman
  • Publication number: 20080162360
    Abstract: A computer controlled implementation for distributing portions of a license to use software entities, granted by a licensor to a primary licensee, to subsequent secondary licensees comprising determining a dividable value for the primary license to use a software entity, enabling the primary licensee to grant a portion of the dividable value of the primary license to use the software entity to a secondary licensee, enabling the licensor, the licensee and the secondary licensee to add value to said values of the licenses and tracking said value of the license and of the portion granted to said secondary licensee.
    Type: Application
    Filed: December 27, 2006
    Publication date: July 3, 2008
    Inventors: DAVID BANTZ, Thomas E. Chefalas, Rick A. Hamilton, Srikant Jalan, Steven J. Mastrianni, Clifford A. Pickover, James W. Seaman
  • Publication number: 20080028465
    Abstract: The authenticity of a website is tested with software that runs on a personal computing device and a service that is provided via the Internet. The software on the personal computing device is in the form of a proxy, or transparent component in the Internet Protocol implementation. The proxy receives all outbound messages, analyzes them and forwards or modifies them without the user's intervention. The service tests the IP address and/or the behavior of the target website.
    Type: Application
    Filed: October 4, 2007
    Publication date: January 31, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni
  • Publication number: 20070180061
    Abstract: In a first aspect of the present invention, methods and apparatus implement graphical user interfaces for interactively specifying service level agreements used to regulate delivery of services to, for example, computer systems. An interactive graphical user interface allows a user to see the effects of varying values of service delivery variables on the level of service achievable in a particular service delivery context. In a second aspect, methods and apparatus of the present invention provision resources required for service delivery. In the second aspect, the methods and apparatus of the present invention select a service delivery model dependent on context. The selected service delivery model is used to provision resources that will be required during service delivery. In a third aspect, methods and apparatus of the present invention monitor compliance with a service level agreement during a service delivery event.
    Type: Application
    Filed: February 2, 2006
    Publication date: August 2, 2007
    Inventors: David Bantz, Thomas Chefalas, Peter Gayek, Walter Huber, Srikant Jalan, Patrik Lehrner, Steven Mastrianni, Marco Porak
  • Publication number: 20070169089
    Abstract: The present invention concerns methods and apparatus for controlling software patching activity in, for example, computer systems. Methods and apparatus of the present invention may implement a software shell and institute a patching policy to control patching activities. When implemented, the software shell acts as a barrier which permits patching of the underlying software only when the patching activity would be in accordance with the instituted patching policy. Various patching policies can be instituted in embodiments of the present invention. For example, patching may be done when convenient; or just before when the software requiring the patch is needed; or patching may be blocked to prevent unwanted software characteristics and/or behavior. In other circumstances, patching may be delayed until confidence has been established in a new patch so as to avoid disrupting a computer system that is already functioning in an acceptable manner.
    Type: Application
    Filed: January 17, 2006
    Publication date: July 19, 2007
    Applicant: International Business Machines Corporation
    Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
  • Publication number: 20070006321
    Abstract: The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.
    Type: Application
    Filed: July 1, 2005
    Publication date: January 4, 2007
    Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
  • Publication number: 20060294238
    Abstract: The invention relates to controlling the participation and performance management of a distributed set of resources in a grid environment. The control is achieved by forecasting the behavior of a group of shared resources, their availability and quality of their performance in the presence of external policies governing their usage, and deciding the suitability of their participation in a grid computation. The system also provides services to grid clients with certain minimum levels of service guarantees using resources with uncertainties in their service potentials.
    Type: Application
    Filed: December 16, 2002
    Publication date: December 28, 2006
    Inventors: Vijay Naik, David Bantz, Nagui Halim, Swaminathan Sivasubramanian
  • Publication number: 20060271923
    Abstract: The present invention concerns methods and apparatus that categorize states of computer systems selected to receive state-dependent maintenance activities as a prelude to the performance of those maintenance activities. In methods and apparatus of the present invention, it is determined, for example, that a certain version of an application program operating in computer systems having a specific operating system will be updated. A signature corresponding to the combination of the application program and operating system is incorporated in a software agent. The software agent is designed to poll computer systems in order to identify targets drawn from a population of computer systems that have states corresponding to the signature incorporated in the software agent. All computer systems having states that correspond to the signature then have the state-dependent computer maintenance activity performed on them.
    Type: Application
    Filed: May 25, 2005
    Publication date: November 30, 2006
    Inventors: David Bantz, Steven Mastrianni, Clifford Pickover
  • Publication number: 20060265711
    Abstract: The present invention concerns methods and apparatus for managing multiple virtual machines simultaneously operative in a computing environment. The methods and apparatus of the present invention provide an integrated work environment—for example, a desktop—which incorporates graphical and control elements from multiple virtual machines. In embodiments of the present invention, application programs and resources available in multiple virtual machines can be accessed from a single desktop. Methods and apparatus of the present invention provide visual cues for associating control elements and resources with particular virtual machines. In embodiments of the present invention, multiple virtual machines operative in a computing environment can comprise a plurality of collaborative virtual machines, or a private virtual machine and one or more collaborative virtual machines.
    Type: Application
    Filed: May 20, 2005
    Publication date: November 23, 2006
    Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
  • Publication number: 20060224930
    Abstract: A system accesses a log of events on more than one computing system and scans these logs in an effort to determine the likely cause of various items of interest, events, or problems. These items of interest often include improper or frustrating behavior of a computer system, but may also include delightful or beneficial behaviors for which a user, group of users, company, service, or help desk seeks a cause. Once the likely source of the item of interest is found, a test may be performed to confirm the source of the problem and warning or corrective action taken.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 5, 2006
    Applicant: IBM Corporation
    Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
  • Publication number: 20060155671
    Abstract: A method of transferring an image of a system or disk to a computer dedicated to performing a resource-intensive task, such as virus scanning, disk defragmentation or similar service. Once the dedicated computer has performed the task, the resulting image is compared to the current image of the client system or disk to produce an updated image. The client system or disk is then updated with the updated image.
    Type: Application
    Filed: January 13, 2005
    Publication date: July 13, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
  • Publication number: 20060155608
    Abstract: Methods, systems, and computer programs for servicing and/or providing spontaneous collaboration between a shopper and consultants concerning a shopping goal. Information about the shopper's physical or logical proximity to a particular product category, combined with the current contents of his or her shopping cart is used to determine one or more shopping goals. Information about each potential consultant, including physical proximity, willingness to consult, areas of expertise and recent experience is used to rank each consultant in terms of relevance to one or more shopping goal. Communication is established between the shopper and one or more consultants in order that consulting services be provided. Consultants' evaluations are maintained persistently for use in future ranking. In some cases collaboration is coordinated by a service bureau.
    Type: Application
    Filed: January 7, 2005
    Publication date: July 13, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Bantz, Clifford Pickover
  • Publication number: 20060156406
    Abstract: Methods and devices for securely providing personalities to reconfigurable hardware. Reconfigurable hardware is provided with one or more domains. At least one domain serves as a gatekeeper domain and another domain serves as a task domain. A service provider provides an authentication and security personality to the gatekeeper domain. The hardware is shipped to the user. A user then accesses the service provider via a network connection and downloads a task personality into the task domain, but only if the personality in the gatekeeper domain allows the download to take place. Once the task personality completes a task, the user may download another task personality into the task domain, if permitted by the personality loaded in the gatekeeper domain. The domains and personalities are managed and made available by the service provider.
    Type: Application
    Filed: January 13, 2005
    Publication date: July 13, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
  • Publication number: 20060112342
    Abstract: A computer system having at least one CPU has as its only interface with the Internet and other external sources a virtual machine that contains a browser and/or other communications programs, so that e-mail and other external communications are opened within the virtual machine and stored within a virtual storage. The virtual machine is erased at frequent intervals, taking with it any changes made by virus or other hostile programs.
    Type: Application
    Filed: November 20, 2004
    Publication date: May 25, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
  • Publication number: 20060112418
    Abstract: The present invention provides techniques for protecting information in a computing device. For instance, a location of the computing device is detected. It is determined whether the location is an unauthorized location. Access to the information is restricted in response to the location being an unauthorized location. As another example, information in a computing device may be protected by detecting location of the computing device. It is determined whether the location is an unauthorized location. One or more decoy files are created in the information in response to the location being an unauthorized location.
    Type: Application
    Filed: November 19, 2004
    Publication date: May 25, 2006
    Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
  • Publication number: 20060107269
    Abstract: A virtual device hub, into which local devices are plugged, enables those devices to be virtualized locally and with a remote virtual machine. Those devices then appear as available to the remote application, and can be used, for example, to print a report being processed on the remote host to a printer located at the user's physical location. The user's virtual device hub is a small computer device with network capability that is able to access the remote virtual machine. When the user runs an application, the application is actually being run in the remote virtual machine.
    Type: Application
    Filed: November 17, 2004
    Publication date: May 18, 2006
    Inventors: David Bantz, Thomas Chefalas, Steven Mastrianni, Clifford Pickover
  • Publication number: 20060072727
    Abstract: Disclosed is a method, system and computer program for handing over a communication from a first party to a second party. The method comprises the steps of analyzing an audio communication with said first party for quality; and transcribing to text said audio communication with either a speech recognition function or a shadow or a human transcription service, based on said analyzing. The method comprises the further steps of editing the transcribed text; aligning said text with visual information viewed during said audio communication; and sending said transcribed text along with said visual information to said second party. The preferred embodiment of the invention provides a tool that can be used to great effect in the “Call Handover” scenario.
    Type: Application
    Filed: September 30, 2004
    Publication date: April 6, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Bantz, Sara Basson, Dimitri Kanevsky, Dennis Shea, Frances West
  • Publication number: 20050246434
    Abstract: A subscriber to a service that monitors user behavior first registers with that service and selects a model of user behavior. The service then transmits that model to an agent, situated capable of monitoring user behavior and relating it to the model. After the monitoring interval the agent transmits data from the model to a server, where that data is summarized and reports created. These reports can then be sent to the subscriber in satisfaction of their needs for behavioral information.
    Type: Application
    Filed: April 5, 2004
    Publication date: November 3, 2005
    Applicant: International Business Machines Corporation
    Inventors: David Bantz, Peter Capek, Thomas Chefalas, David Chess, Christos Georgiou, William Grey, Steven Mastrianni, Paul Moskowitz, Clifford Pickover
  • Publication number: 20050246258
    Abstract: Methods, systems, and computer program for interacting with simulacrum members of a buyer simulacrum. Persistent storage is configured to store collective qualifications of the simulacrum based on the individual qualifications of the simulacrum members, while a simulacrum broker is configured to present the collective qualifications to third parties. Thus, the broker provides a dynamic representation of the collective financial information, credit, insurance, trustworthiness, knowledge, skills and experience of a simulacrum or virtual buyer. The broker further enables an entity, such as a simulacrum employer or seller, to interact with the simulacrum as if that simulacrum were a single entity, rather than a collection of individual members.
    Type: Application
    Filed: April 30, 2004
    Publication date: November 3, 2005
    Applicant: International Business Machines Corporation
    Inventors: David Bantz, Clifford Pickover
  • Publication number: 20050160423
    Abstract: The invention introduces new software components into a host-agent interactive workstation such as a personal computer. The new software components, in combination, monitor and model the interactive usage of the aforementioned interactive workstation. A first software component communicates with a second software component which is a policy-based decision-making component which runs on a guest operating system that resides in a virtual machine, and together they implement policies that concern the behavior of grid computations in the presence of the interactive usage of the workstation.
    Type: Application
    Filed: December 16, 2002
    Publication date: July 21, 2005
    Inventors: David Bantz, Vijay Naik, Swaminathan Sivasubramanian