Patents by Inventor David E. Nachman
David E. Nachman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11151215Abstract: A computer-implemented method includes: generating a first list of uniform resource locators (URLs) available on a page when accessed using privileged credentials; storing one or more first URL outputs associated with the first list of URLs including the content of webpages accessed using the privileged credentials; generating a second list of URLs when accessed using non-privileged credentials; generating a third list of URLs, wherein the third list of URLs includes URLs included in the first list of URLs and not included in the second list of URLs; storing a second URL output including content of a webpage mapped to a particular URL in the third list of URLs when the particular URL is accessed using the non-privileged credentials; determining that the second URL output matches a particular first URL output associated with the particular URL; and outputting an alert identifying that the webpage is accessible by an unauthorized user.Type: GrantFiled: September 24, 2019Date of Patent: October 19, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Bender, David E. Nachman, Michael P. Shute, Keith R. Walker
-
Patent number: 10938823Abstract: In an approach for authenticating a request for an electronic transaction, a computer receives a request for an electronic transaction on a user account. The computer determines whether the request from the user for the electronic transaction is suspicious. The computer then determines, based on at least a response from at least one contact of the user, whether the request for the electronic transaction is suspicious to the at least one contact.Type: GrantFiled: April 16, 2018Date of Patent: March 2, 2021Assignee: International Business Machines CorporationInventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Patent number: 10771538Abstract: Aspects automatically provisioning of cloud resources for ETL job execution as a function of optimizer output data. Access paths identify overall cost and individual step operator costs and statistics relative to cloud resources for executing an SQL commands against a relational database. In one aspect operator steps having high step costs are identified and amounts, types or speeds of a cloud resources associated with the step are adjusted to thereby reduce the step cost and the access path overall cost. In another aspect SQL text descriptors and step costs and function statistics are compared to knowledge base criteria for matches to criteria associated inefficient configurations cloud resources for revision to improve corresponding operation efficiency. In another aspect usages of cloud resources by operator steps are monitored and logged and compared to historic data of similar steps to determine under or over-utilization of resources.Type: GrantFiled: October 8, 2015Date of Patent: September 8, 2020Assignee: International Business Machines CorporationInventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Patent number: 10757178Abstract: Aspects automatically provisioning of cloud resources for ETL job execution as a function of optimizer output data. Access paths identify overall cost and individual step operator costs and statistics relative to cloud resources for executing an SQL commands against a relational database. In one aspect operator steps having high step costs are identified and amounts, types or speeds of a cloud resources associated with the step are adjusted to thereby reduce the step cost and the access path overall cost. In another aspect SQL text descriptors and step costs and function statistics are compared to knowledge base criteria for matches to criteria associated inefficient configurations cloud resources for revision to improve corresponding operation efficiency. In another aspect usages of cloud resources by operator steps are monitored and logged and compared to historic data of similar steps to determine under or over-utilization of resources.Type: GrantFiled: February 21, 2018Date of Patent: August 25, 2020Assignee: International Business Machines CorporationInventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Patent number: 10701140Abstract: Aspects automatically provision cloud resources for Extract, Transform and Load job execution as a function of optimizer output data. Aspect access paths identify overall cost and individual step operator costs and statistics relative to cloud resources for executing structured English query language command against a relational database. In one aspect operator steps having high step costs are identified and amounts, types or speeds of a cloud resources associated with the step are adjusted to reduce step cost and access path overall cost. In another aspect structured English query language text descriptors and step costs and function statistics are compared to knowledge base criteria for matches to criteria associated inefficient configurations cloud resources for revision to improve corresponding operation efficiency. In another aspect usages of cloud resources by operator steps are monitored and logged and compared to historic data of similar steps to determine under or over-utilization of resources.Type: GrantFiled: February 21, 2018Date of Patent: June 30, 2020Assignee: International Business Machines CorporationInventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Publication number: 20200019582Abstract: A computer-implemented method includes: generating a first list of uniform resource locators (URLs) available on a page when accessed using privileged credentials; storing one or more first URL outputs associated with the first list of URLs including the content of webpages accessed using the privileged credentials; generating a second list of URLs when accessed using non-privileged credentials; generating a third list of URLs, wherein the third list of URLs includes URLs included in the first list of URLs and not included in the second list of URLs; storing a second URL output including content of a webpage mapped to a particular URL in the third list of URLs when the particular URL is accessed using the non-privileged credentials; determining that the second URL output matches a particular first URL output associated with the particular URL; and outputting an alert identifying that the webpage is accessible by an unauthorized user.Type: ApplicationFiled: September 24, 2019Publication date: January 16, 2020Inventors: Michael BENDER, David E. NACHMAN, Michael P. SHUTE, Keith R. WALKER
-
Patent number: 10460002Abstract: A computer-implemented method includes: generating a first list of uniform resource locators (URLs) available on a page when accessed using privileged credentials; storing one or more first URL outputs associated with the first list of URLs including the content of webpages accessed using the privileged credentials; generating a second list of URLs when accessed using non-privileged credentials; generating a third list of URLs, wherein the third list of URLs includes URLs included in the first list of URLs and not included in the second list of URLs; storing a second URL output including content of a webpage mapped to a particular URL in the third list of URLs when the particular URL is accessed using the non-privileged credentials; determining that the second URL output matches a particular first URL output associated with the particular URL; and outputting an alert identifying that the webpage is accessible by an unauthorized user.Type: GrantFiled: June 1, 2018Date of Patent: October 29, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Bender, David E. Nachman, Michael P. Shute, Keith R. Walker
-
Patent number: 10397166Abstract: In general, embodiments of the invention provide an approach for saving communication content to a social network for later recall. Specifically, communication data is received from multiple input data streams. The communication data is scanned and tags are generated from the most frequent, non-excluded words. The communication data, along with the tags, are saved to the social network in a single output stream.Type: GrantFiled: January 6, 2015Date of Patent: August 27, 2019Assignee: International Business Machines CorporationInventors: Michael Bender, Gordan G. Greenlee, David E. Nachman, Michael P. Shute
-
Publication number: 20180276307Abstract: A computer-implemented method includes: generating a first list of uniform resource locators (URLs) available on a page when accessed using privileged credentials; storing one or more first URL outputs associated with the first list of URLs including the content of webpages accessed using the privileged credentials; generating a second list of URLs when accessed using non-privileged credentials; generating a third list of URLs, wherein the third list of URLs includes URLs included in the first list of URLs and not included in the second list of URLs; storing a second URL output including content of a webpage mapped to a particular URL in the third list of URLs when the particular URL is accessed using the non-privileged credentials; determining that the second URL output matches a particular first URL output associated with the particular URL; and outputting an alert identifying that the webpage is accessible by an unauthorized user.Type: ApplicationFiled: June 1, 2018Publication date: September 27, 2018Inventors: Michael BENDER, David E. NACHMAN, Michael P. SHUTE, Keith R. WALKER
-
Patent number: 10070314Abstract: An approach is provided for authenticating a user. Geolocations are collected during a first time period and social media interactions are collected during a second time period. Historical data is polled which indicates (1) geolocations whose timestamps indicate locations of a person authorized to access the device within the first time period and (2) social media interactions whose timestamps indicate interactions of the person within the second time period. A question is generated to be relevant to a social media interaction and/or a geolocation included in the historical data. The voice of the user who provided an answer to the question is verified as matching a voice of the person authorized to access the device. The answer is determined to be correct. Based on the matching voices and the answer being correct, the user is authenticated and access to the device by the user is granted.Type: GrantFiled: November 28, 2017Date of Patent: September 4, 2018Assignee: International Business Machines CorporationInventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Publication number: 20180234429Abstract: In an approach for authenticating a request for an electronic transaction, a computer receives a request for an electronic transaction on a user account. The computer determines whether the request from the user for the electronic transaction is suspicious. The computer then determines, based on at least a response from at least one contact of the user, whether the request for the electronic transaction is suspicious to the at least one contact.Type: ApplicationFiled: April 16, 2018Publication date: August 16, 2018Inventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Patent number: 10044727Abstract: In an approach for authenticating a request for an electronic transaction, a computer determines whether a request from a user for an electronic transaction is suspicious. The computer determines one or more contacts of the user. The computer then determines, based on at least a response from the one or more contacts, whether the request for the electronic transaction is suspicious, wherein determining the request is not suspicious validates authentication of the electronic transaction.Type: GrantFiled: July 21, 2016Date of Patent: August 7, 2018Assignee: International Business Machines CorporationInventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Patent number: 10019529Abstract: A computer-implemented method includes: generating a first list of uniform resource locators (URLs) available on a page when accessed using privileged credentials; storing one or more first URL outputs associated with the first list of URLs including the content of webpages accessed using the privileged credentials; generating a second list of URLs when accessed using non-privileged credentials; generating a third list of URLs, wherein the third list of URLs includes URLs included in the first list of URLs and not included in the second list of URLs; storing a second URL output including content of a webpage mapped to a particular URL in the third list of URLs when the particular URL is accessed using the non-privileged credentials; determining that the second URL output matches a particular first URL output associated with the particular URL; and outputting an alert identifying that the webpage is accessible by an unauthorized user.Type: GrantFiled: November 19, 2015Date of Patent: July 10, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Bender, David E. Nachman, Michael P. Shute, Keith R. Walker
-
Publication number: 20180183863Abstract: Aspects automatically provision cloud resources for Extract, Transform and Load job execution as a function of optimizer output data. Aspect access paths identify overall cost and individual step operator costs and statistics relative to cloud resources for executing structured English query language command against a relational database. In one aspect operator steps having high step costs are identified and amounts, types or speeds of a cloud resources associated with the step are adjusted to reduce step cost and access path overall cost. In another aspect structured English query language text descriptors and step costs and function statistics are compared to knowledge base criteria for matches to criteria associated inefficient configurations cloud resources for revision to improve corresponding operation efficiency. In another aspect usages of cloud resources by operator steps are monitored and logged and compared to historic data of similar steps to determine under or over-utilization of resources.Type: ApplicationFiled: February 21, 2018Publication date: June 28, 2018Inventors: MICHAEL BENDER, DAVID E. NACHMAN, MICHAEL P. SHUTE
-
Publication number: 20180183864Abstract: Aspects automatically provisioning of cloud resources for ETL job execution as a function of optimizer output data. Access paths identify overall cost and individual step operator costs and statistics relative to cloud resources for executing an SQL commands against a relational database. In one aspect operator steps having high step costs are identified and amounts, types or speeds of a cloud resources associated with the step are adjusted to thereby reduce the step cost and the access path overall cost. In another aspect SQL text descriptors and step costs and function statistics are compared to knowledge base criteria for matches to criteria associated inefficient configurations cloud resources for revision to improve corresponding operation efficiency. In another aspect usages of cloud resources by operator steps are monitored and logged and compared to historic data of similar steps to determine under or over-utilization of resources.Type: ApplicationFiled: February 21, 2018Publication date: June 28, 2018Inventors: MICHAEL BENDER, DAVID E. NACHMAN, MICHAEL P. SHUTE
-
Publication number: 20180084423Abstract: An approach is provided for authenticating a user. Geolocations are collected during a first time period and social media interactions are collected during a second time period. Historical data is polled which indicates (1) geolocations whose timestamps indicate locations of a person authorized to access the device within the first time period and (2) social media interactions whose timestamps indicate interactions of the person within the second time period. A question is generated to be relevant to a social media interaction and/or a geolocation included in the historical data. The voice of the user who provided an answer to the question is verified as matching a voice of the person authorized to access the device. The answer is determined to be correct. Based on the matching voices and the answer being correct, the user is authenticated and access to the device by the user is granted.Type: ApplicationFiled: November 28, 2017Publication date: March 22, 2018Inventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Patent number: 9906481Abstract: A computer system identifies an electronic conversation between a plurality of participants. The computer system identifies the plurality of participants. The computer system determines whether the plurality of participants match a specific list of participants that have been predetermined to be of interest to a user. In response to determining that the plurality of participants engaged in the electronic conversation matches the predetermined list of participants of interest to the user, the computer system notifies the user of the electronic conversation.Type: GrantFiled: April 11, 2014Date of Patent: February 27, 2018Assignee: International Business Machines CorporationInventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Patent number: 9888383Abstract: An approach is provided for authenticating a user. A request to authenticate the user is received. Historical data that includes social media interactions that specify a person authorized to access the device and geolocations of the person is polled. A question is generated to be relevant to a social media interaction and/or a geolocation included in the historical data. A digital representation of a voice of the user who provided an answer to the question is received. The voice of the user is verified as matching a voice of the person authorized to access the device. The answer is determined to be correct. Based on the matching voices and the answer being correct, the user is authenticated and access to the device by the user is granted.Type: GrantFiled: May 2, 2016Date of Patent: February 6, 2018Assignee: International Business Machines CorporationInventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Patent number: 9866562Abstract: An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information.Type: GrantFiled: February 15, 2017Date of Patent: January 9, 2018Assignee: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Patent number: 9852482Abstract: An embodiment of the invention provides a method for a utility consumption advisor, wherein a target electricity consumption for a predefined time period is received with a user interface. User parameters are also received with the user interface, the user parameters including a list of electricity consumption items that may not be modified, a list of electricity consumption items that may be modified, and a range of modification for each of the listed electricity consumption items that may be modified. The user's electricity consumption history is determined; and, an electricity utilization plan is generated for the predefined time period with a processor. The electricity utilization plan is generated based on the target electricity consumption, the user parameters, and the user's electricity consumption history. The electricity utilization plan is implemented by wirelessly controlling the electricity consumption items that may be modified.Type: GrantFiled: March 5, 2014Date of Patent: December 26, 2017Assignee: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer Nassar