Patents by Inventor David Kaminsky

David Kaminsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190273610
    Abstract: An example operation may include one or more of generating an initial seed and allocating one or more authorized bits of the initial seed to a plurality of blocks in a distributed ledger, storing the initial seed and an identification of which authorized bits of the initial seed are allocated to each block of the distributed ledger, receiving a final seed value that is partially generated by each of a plurality of nodes configured to access the distributed ledger based on authorized bits of respective blocks updated by each respective node, and generating a random sequence value based on the final seed value and storing the random sequence value in a block of the distributed ledger.
    Type: Application
    Filed: March 2, 2018
    Publication date: September 5, 2019
    Inventors: Si Bin Fan, David Kaminsky, Tao Liu, Jing Lu, Xiao Yan Tang, Jun Zhang
  • Patent number: 8849760
    Abstract: A request is received for predefined data from a client machine. It is determined if the client machine is at an acceptable location to receive the predefined data. The requested predefined data is replicated to the client machine if the client machine is at an acceptable location and replication of the predefined data is prevented if the client machine is at an unacceptable location.
    Type: Grant
    Filed: May 2, 2006
    Date of Patent: September 30, 2014
    Assignee: International Business Machines Corporation
    Inventors: Al Chakra, David Kaminsky, David M. Ogle
  • Publication number: 20080072331
    Abstract: A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping.
    Type: Application
    Filed: November 19, 2007
    Publication date: March 20, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bruce Dickson, David Kaminsky, Marcia Peters
  • Publication number: 20070288580
    Abstract: Techniques are disclosed for managing instant messages, including the display of windows for incoming messages, as well as for managing status information for instant messaging users. In one aspect, an instant messaging user defines policy information to programmatically determine a response to an arriving instant message. As an example, the policy may control whether a new window will pop up for a newly-arriving message, and may specify other attributes of the window if desired. In another aspect, an instant messaging user defines attributes pertaining to how his instant messaging status will be presented to others.
    Type: Application
    Filed: June 28, 2007
    Publication date: December 13, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Kaminsky, David Ogle
  • Publication number: 20070260649
    Abstract: A request is received for predefined data from a client machine. It is determined if the client machine is at an acceptable location to receive the predefined data. The requested predefined data is replicated to the client machine if the client machine is at an acceptable location and replication of the predefined data is prevented if the client machine is at an unacceptable location.
    Type: Application
    Filed: May 2, 2006
    Publication date: November 8, 2007
    Applicant: International Business Machines Corporation
    Inventors: Al Chakra, David Kaminsky, David Ogle
  • Publication number: 20070255769
    Abstract: A system for defining, disseminating, and evaluating policies in a policy-based decision system includes a unit for defining a hierarchy of policy groups, a unit for associating a group of orthogonal parameters with at least one policy group, a unit for defining at least one policy for one or more policy groups in said hierarchy, a unit for disseminating policies to one or more decision making component for at least one policy group in said hierarchy, and a unit for evaluating policies for at least one policy groups in the hierarchy.
    Type: Application
    Filed: April 14, 2006
    Publication date: November 1, 2007
    Applicant: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Allen Gilbert, James Giles, David Kaminsky, Vaughn Rokosz, Dinesh Verma
  • Publication number: 20070239509
    Abstract: The invention provides a method, system, and program product for scheduling a plurality of events. In one embodiment, the invention includes scheduling a first event of a plurality of events; scheduling a second event of the plurality of events as dependent upon the first event of the plurality of events; and automatically rescheduling the second event to maintain the dependency of the second event on the first event, in the case that the scheduling of the first event is changed.
    Type: Application
    Filed: March 30, 2006
    Publication date: October 11, 2007
    Applicant: International Business Machines Corporation
    Inventors: David Kaminsky, David Ogle
  • Publication number: 20070239695
    Abstract: Content files are managed and tracked in a distributed collaborative computing environment to receive, store, and maintain content descriptor data associated with a distributed content files in a central directory registry. The central directory registry can be accessed by a plurality of remote distributed computing devices via one or more network connections. The remote distributed computing devices create content files using locally hosted software applications. Upon saving the content file to a portable or transient storage device connected to a computing device, content descriptor data comprised of administrative data pertaining to the content file and associated with the content file is created and forwarded to the central directory server.
    Type: Application
    Filed: April 10, 2006
    Publication date: October 11, 2007
    Inventors: Al Chakra, David Kaminsky, David Ogle
  • Publication number: 20070174399
    Abstract: An instant message (IM) connection is established at an IM server in the usual manner, under the policies and security rules promulgated by the IM service provider. Using this connection to the IM server, an offline IM chat request is made at the IM server for establishing an offline connection directly between consenting IM clients. The request may be included in a message to the IM server from a client, or the request may be in the form of IM session parameter, for the client, that authorizes an offline chat as the preferred type of IM session under certain conditions. These conditions may result in the IM server being unavailable or may instead authorize the IM server to unload the client from an online session to an offline session based on IM server loading level or other factors that are under the control of the server. The conditions may also specify the presence of other IM clients as a criteria for establishing an offline chat; the clients may be present in an online chat session or merely available.
    Type: Application
    Filed: January 26, 2006
    Publication date: July 26, 2007
    Inventors: David Ogle, David Kaminsky, Patrick O'Sullivan
  • Publication number: 20070168310
    Abstract: A context-sensitive pre-evaluation analysis of a set of rules is performed based on the circumstance or the current state of a rule clause directed to an infrequently changing condition. A group of multiple-clause rules are identified which each have a clause defining an infrequently changing condition for evaluating a state of a resource. The current state of the resource is monitored. If the identified group of multiple-clause rules, which cannot evaluate as TRUE under the context of the current state the resource, the identified group of multiple-clause rules are excluded from consideration by the rules engine. The rules engine will then encounter fewer rules to evaluate for a solution. The identified group of multiple-clause rules is further analyzed in the context of the infrequently changing condition for the current resource state. State metrics that are defined by clauses of the identified multiple-clause rules, those that cannot evaluate as TRUE, are identified.
    Type: Application
    Filed: October 27, 2005
    Publication date: July 19, 2007
    Inventors: David Kaminsky, John Lake
  • Publication number: 20070070897
    Abstract: Embodiment of the present invention include a method, system and computer program product for a data processing system for QoS based planning in a Web services aggregation. The system can include Web service aggregation and coordination logic configured to identify accessible Web services in a registry and to arrange an aggregation of the Web services for invocation responsive to requests received from communicatively coupled clients over a computer communications network. The system further can include QoS planning logic coupled to the Web service aggregation and coordination logic. The QoS planning logic can be enabled to measure both the individual performance of the Web services in an aggregation of Web services and also the cumulative performance of the aggregation of Web services.
    Type: Application
    Filed: September 29, 2005
    Publication date: March 29, 2007
    Applicant: International Business Machines Corporation
    Inventors: Ronald Doyle, David Kaminsky
  • Publication number: 20070006044
    Abstract: Components in a plurality of administrative domains that are communicatively coupled by a network are automatically managed. Permission to implement a corrective action in a second administrative domain is obtained by a management program in a first administrative domain that does not have existing permission to act in the second administrative domain. Responsive to obtaining the permission, the corrective action is implemented in the second administrative domain under control of the management program in the first administrative domain.
    Type: Application
    Filed: July 1, 2005
    Publication date: January 4, 2007
    Inventors: Asit Dan, David Kaminsky, David Ogle, John Rofrano
  • Publication number: 20060265453
    Abstract: A method, system and computer program product of applying a template to a message may include automatically applying a template of a set of templates to the message in response to a recipient having been assigned one or more templates from the set of templates.
    Type: Application
    Filed: May 19, 2005
    Publication date: November 23, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Kaminsky, David Ogle
  • Publication number: 20060218576
    Abstract: A mechanism is provided for indexing commercials. A viewer may query a search engine for a particular product or service. The index may include descriptors that are provided within a blanking interval within the media stream or within program guide information associated with the stream. The index information may also include Internet hyperlinks. Commercials may also have associated therewith a value that is relative to a value of media content. A viewer may accumulate value by viewing advertisements. Accumulated value may then be used to acquire more content.
    Type: Application
    Filed: March 8, 2005
    Publication date: September 28, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Johnson, David Kaminsky
  • Publication number: 20060197502
    Abstract: A method for rejuvenation of an energy storage unit may include predicting at least one permissible time period to perform a rejuvenation process on the energy storage unit. The method may also include performing the rejuvenation process in response to one of detecting the at least one permissible time period, and both detecting the at least one permissible time period and the energy storage unit being in a predetermined state.
    Type: Application
    Filed: March 2, 2005
    Publication date: September 7, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Kaminsky, David Ogle
  • Publication number: 20060179040
    Abstract: A method, system and apparatus for data leak prevention. An information system, such as a database system, which has been configured for data leak protection in accordance with the present invention can include an IDS coupled to the information system and a data leak protection system configured to apply a data leak protection policy for result sets produced by the information system in response to a database query. The data leak protection policy can include a listing of data shapes and corresponding remedial measures. The data leak protection policy further can include consideration for metrics produced by the IDS.
    Type: Application
    Filed: February 8, 2005
    Publication date: August 10, 2006
    Applicant: International Business Machines Corporation
    Inventors: Paul Bird, David Kaminsky, Sam Lightstone, Walid Rjaibi
  • Publication number: 20060080610
    Abstract: Methods of providing a computer displayable presentation can include allowing insertion of outline section breaks into an outline view of a computer displayable presentation including a sequence of slides. A multi-level hierarchical outline view of the computer displayable presentation can be provided, wherein different levels of the multi-level hierarchical outline view are separated by the inserted outline section breaks. Related systems and computer program products are also disclosed.
    Type: Application
    Filed: October 12, 2004
    Publication date: April 13, 2006
    Inventor: David Kaminsky
  • Publication number: 20050240422
    Abstract: An intermediary or intermediaries are provided to allow a service requestor to communicate with a service provider according to a service requirement or service policy set forth by the service provider which the service requester is unable to meet directly. To this end, the service requestor determines whether it can communicate with the service provider according to the service requirement. If the service requestor is unable to satisfy the service requirement, but does have some property which is translatable, then the service requestor finds an intermediary that can translate the service requestor's property in order to satisfy the service provider's service requirement. Once the intermediary is found, the service requestor requests translation of its property to satisfy the service provider's service requirement. Thus, the service requestor receives service from the service provider while adhering to the service provider's service policy.
    Type: Application
    Filed: April 23, 2004
    Publication date: October 27, 2005
    Applicant: International Business Machines Corporation
    Inventors: Ronald Doyle, David Kaminsky
  • Publication number: 20050198050
    Abstract: Under the present invention meta data specifying modification constraints for one or more of the attributes of an (operational) policy is generated/provided. Thereafter, the meta data is associated with the policy so that the constraints specified by the meta data can govern the modification of the policy. Under the present invention there are at least two ways of associating the meta data with a policy. In one embodiment, the meta data is embodied as a meta policy that can be associated with one or more (operational) policies. In another embodiment, the meta data is inserted into individual policies as additional attributes.
    Type: Application
    Filed: March 5, 2004
    Publication date: September 8, 2005
    Applicant: International Business Machines Corporation
    Inventors: John Bivens, David Kaminsky
  • Publication number: 20050197138
    Abstract: A method for controlling the behavior of a telephone using policies, the method comprising a Policy Creation Program (PCP) and a Behavior Control Program (BCP). The policies comprise telephone behavior instructions and three criteria conditions: location criteria, context criteria, and caller criteria. Each policy is also assigned a policy priority number based on the importance of the policy, which is used to resolve conflicts between the policies. The PCP allows the user to create the policies and stores the policies in a policy table based on the policy priority numbers. The BCP detects an incoming telephone call and determines the location, context, and caller conditions. The BCP compares the location, context, and caller conditions to a plurality of the policies and determines the policy that matches the conditions. The BCP then controls the telephone's behavior according to the telephone behavior instructions in the policy.
    Type: Application
    Filed: March 2, 2004
    Publication date: September 8, 2005
    Applicant: International Business Machines Corporation
    Inventors: David Kaminsky, David Ogle