Patents by Inventor David Kaminsky
David Kaminsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190273610Abstract: An example operation may include one or more of generating an initial seed and allocating one or more authorized bits of the initial seed to a plurality of blocks in a distributed ledger, storing the initial seed and an identification of which authorized bits of the initial seed are allocated to each block of the distributed ledger, receiving a final seed value that is partially generated by each of a plurality of nodes configured to access the distributed ledger based on authorized bits of respective blocks updated by each respective node, and generating a random sequence value based on the final seed value and storing the random sequence value in a block of the distributed ledger.Type: ApplicationFiled: March 2, 2018Publication date: September 5, 2019Inventors: Si Bin Fan, David Kaminsky, Tao Liu, Jing Lu, Xiao Yan Tang, Jun Zhang
-
Patent number: 8849760Abstract: A request is received for predefined data from a client machine. It is determined if the client machine is at an acceptable location to receive the predefined data. The requested predefined data is replicated to the client machine if the client machine is at an acceptable location and replication of the predefined data is prevented if the client machine is at an unacceptable location.Type: GrantFiled: May 2, 2006Date of Patent: September 30, 2014Assignee: International Business Machines CorporationInventors: Al Chakra, David Kaminsky, David M. Ogle
-
Publication number: 20080072331Abstract: A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping.Type: ApplicationFiled: November 19, 2007Publication date: March 20, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bruce Dickson, David Kaminsky, Marcia Peters
-
Publication number: 20070288580Abstract: Techniques are disclosed for managing instant messages, including the display of windows for incoming messages, as well as for managing status information for instant messaging users. In one aspect, an instant messaging user defines policy information to programmatically determine a response to an arriving instant message. As an example, the policy may control whether a new window will pop up for a newly-arriving message, and may specify other attributes of the window if desired. In another aspect, an instant messaging user defines attributes pertaining to how his instant messaging status will be presented to others.Type: ApplicationFiled: June 28, 2007Publication date: December 13, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David Kaminsky, David Ogle
-
Publication number: 20070260649Abstract: A request is received for predefined data from a client machine. It is determined if the client machine is at an acceptable location to receive the predefined data. The requested predefined data is replicated to the client machine if the client machine is at an acceptable location and replication of the predefined data is prevented if the client machine is at an unacceptable location.Type: ApplicationFiled: May 2, 2006Publication date: November 8, 2007Applicant: International Business Machines CorporationInventors: Al Chakra, David Kaminsky, David Ogle
-
Publication number: 20070255769Abstract: A system for defining, disseminating, and evaluating policies in a policy-based decision system includes a unit for defining a hierarchy of policy groups, a unit for associating a group of orthogonal parameters with at least one policy group, a unit for defining at least one policy for one or more policy groups in said hierarchy, a unit for disseminating policies to one or more decision making component for at least one policy group in said hierarchy, and a unit for evaluating policies for at least one policy groups in the hierarchy.Type: ApplicationFiled: April 14, 2006Publication date: November 1, 2007Applicant: International Business Machines CorporationInventors: Dakshi Agrawal, Allen Gilbert, James Giles, David Kaminsky, Vaughn Rokosz, Dinesh Verma
-
Publication number: 20070239509Abstract: The invention provides a method, system, and program product for scheduling a plurality of events. In one embodiment, the invention includes scheduling a first event of a plurality of events; scheduling a second event of the plurality of events as dependent upon the first event of the plurality of events; and automatically rescheduling the second event to maintain the dependency of the second event on the first event, in the case that the scheduling of the first event is changed.Type: ApplicationFiled: March 30, 2006Publication date: October 11, 2007Applicant: International Business Machines CorporationInventors: David Kaminsky, David Ogle
-
Publication number: 20070239695Abstract: Content files are managed and tracked in a distributed collaborative computing environment to receive, store, and maintain content descriptor data associated with a distributed content files in a central directory registry. The central directory registry can be accessed by a plurality of remote distributed computing devices via one or more network connections. The remote distributed computing devices create content files using locally hosted software applications. Upon saving the content file to a portable or transient storage device connected to a computing device, content descriptor data comprised of administrative data pertaining to the content file and associated with the content file is created and forwarded to the central directory server.Type: ApplicationFiled: April 10, 2006Publication date: October 11, 2007Inventors: Al Chakra, David Kaminsky, David Ogle
-
Publication number: 20070174399Abstract: An instant message (IM) connection is established at an IM server in the usual manner, under the policies and security rules promulgated by the IM service provider. Using this connection to the IM server, an offline IM chat request is made at the IM server for establishing an offline connection directly between consenting IM clients. The request may be included in a message to the IM server from a client, or the request may be in the form of IM session parameter, for the client, that authorizes an offline chat as the preferred type of IM session under certain conditions. These conditions may result in the IM server being unavailable or may instead authorize the IM server to unload the client from an online session to an offline session based on IM server loading level or other factors that are under the control of the server. The conditions may also specify the presence of other IM clients as a criteria for establishing an offline chat; the clients may be present in an online chat session or merely available.Type: ApplicationFiled: January 26, 2006Publication date: July 26, 2007Inventors: David Ogle, David Kaminsky, Patrick O'Sullivan
-
Publication number: 20070168310Abstract: A context-sensitive pre-evaluation analysis of a set of rules is performed based on the circumstance or the current state of a rule clause directed to an infrequently changing condition. A group of multiple-clause rules are identified which each have a clause defining an infrequently changing condition for evaluating a state of a resource. The current state of the resource is monitored. If the identified group of multiple-clause rules, which cannot evaluate as TRUE under the context of the current state the resource, the identified group of multiple-clause rules are excluded from consideration by the rules engine. The rules engine will then encounter fewer rules to evaluate for a solution. The identified group of multiple-clause rules is further analyzed in the context of the infrequently changing condition for the current resource state. State metrics that are defined by clauses of the identified multiple-clause rules, those that cannot evaluate as TRUE, are identified.Type: ApplicationFiled: October 27, 2005Publication date: July 19, 2007Inventors: David Kaminsky, John Lake
-
Publication number: 20070070897Abstract: Embodiment of the present invention include a method, system and computer program product for a data processing system for QoS based planning in a Web services aggregation. The system can include Web service aggregation and coordination logic configured to identify accessible Web services in a registry and to arrange an aggregation of the Web services for invocation responsive to requests received from communicatively coupled clients over a computer communications network. The system further can include QoS planning logic coupled to the Web service aggregation and coordination logic. The QoS planning logic can be enabled to measure both the individual performance of the Web services in an aggregation of Web services and also the cumulative performance of the aggregation of Web services.Type: ApplicationFiled: September 29, 2005Publication date: March 29, 2007Applicant: International Business Machines CorporationInventors: Ronald Doyle, David Kaminsky
-
Publication number: 20070006044Abstract: Components in a plurality of administrative domains that are communicatively coupled by a network are automatically managed. Permission to implement a corrective action in a second administrative domain is obtained by a management program in a first administrative domain that does not have existing permission to act in the second administrative domain. Responsive to obtaining the permission, the corrective action is implemented in the second administrative domain under control of the management program in the first administrative domain.Type: ApplicationFiled: July 1, 2005Publication date: January 4, 2007Inventors: Asit Dan, David Kaminsky, David Ogle, John Rofrano
-
Publication number: 20060265453Abstract: A method, system and computer program product of applying a template to a message may include automatically applying a template of a set of templates to the message in response to a recipient having been assigned one or more templates from the set of templates.Type: ApplicationFiled: May 19, 2005Publication date: November 23, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David Kaminsky, David Ogle
-
Publication number: 20060218576Abstract: A mechanism is provided for indexing commercials. A viewer may query a search engine for a particular product or service. The index may include descriptors that are provided within a blanking interval within the media stream or within program guide information associated with the stream. The index information may also include Internet hyperlinks. Commercials may also have associated therewith a value that is relative to a value of media content. A viewer may accumulate value by viewing advertisements. Accumulated value may then be used to acquire more content.Type: ApplicationFiled: March 8, 2005Publication date: September 28, 2006Applicant: International Business Machines CorporationInventors: David Johnson, David Kaminsky
-
Publication number: 20060197502Abstract: A method for rejuvenation of an energy storage unit may include predicting at least one permissible time period to perform a rejuvenation process on the energy storage unit. The method may also include performing the rejuvenation process in response to one of detecting the at least one permissible time period, and both detecting the at least one permissible time period and the energy storage unit being in a predetermined state.Type: ApplicationFiled: March 2, 2005Publication date: September 7, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David Kaminsky, David Ogle
-
Publication number: 20060179040Abstract: A method, system and apparatus for data leak prevention. An information system, such as a database system, which has been configured for data leak protection in accordance with the present invention can include an IDS coupled to the information system and a data leak protection system configured to apply a data leak protection policy for result sets produced by the information system in response to a database query. The data leak protection policy can include a listing of data shapes and corresponding remedial measures. The data leak protection policy further can include consideration for metrics produced by the IDS.Type: ApplicationFiled: February 8, 2005Publication date: August 10, 2006Applicant: International Business Machines CorporationInventors: Paul Bird, David Kaminsky, Sam Lightstone, Walid Rjaibi
-
Publication number: 20060080610Abstract: Methods of providing a computer displayable presentation can include allowing insertion of outline section breaks into an outline view of a computer displayable presentation including a sequence of slides. A multi-level hierarchical outline view of the computer displayable presentation can be provided, wherein different levels of the multi-level hierarchical outline view are separated by the inserted outline section breaks. Related systems and computer program products are also disclosed.Type: ApplicationFiled: October 12, 2004Publication date: April 13, 2006Inventor: David Kaminsky
-
Publication number: 20050240422Abstract: An intermediary or intermediaries are provided to allow a service requestor to communicate with a service provider according to a service requirement or service policy set forth by the service provider which the service requester is unable to meet directly. To this end, the service requestor determines whether it can communicate with the service provider according to the service requirement. If the service requestor is unable to satisfy the service requirement, but does have some property which is translatable, then the service requestor finds an intermediary that can translate the service requestor's property in order to satisfy the service provider's service requirement. Once the intermediary is found, the service requestor requests translation of its property to satisfy the service provider's service requirement. Thus, the service requestor receives service from the service provider while adhering to the service provider's service policy.Type: ApplicationFiled: April 23, 2004Publication date: October 27, 2005Applicant: International Business Machines CorporationInventors: Ronald Doyle, David Kaminsky
-
Publication number: 20050198050Abstract: Under the present invention meta data specifying modification constraints for one or more of the attributes of an (operational) policy is generated/provided. Thereafter, the meta data is associated with the policy so that the constraints specified by the meta data can govern the modification of the policy. Under the present invention there are at least two ways of associating the meta data with a policy. In one embodiment, the meta data is embodied as a meta policy that can be associated with one or more (operational) policies. In another embodiment, the meta data is inserted into individual policies as additional attributes.Type: ApplicationFiled: March 5, 2004Publication date: September 8, 2005Applicant: International Business Machines CorporationInventors: John Bivens, David Kaminsky
-
Publication number: 20050197138Abstract: A method for controlling the behavior of a telephone using policies, the method comprising a Policy Creation Program (PCP) and a Behavior Control Program (BCP). The policies comprise telephone behavior instructions and three criteria conditions: location criteria, context criteria, and caller criteria. Each policy is also assigned a policy priority number based on the importance of the policy, which is used to resolve conflicts between the policies. The PCP allows the user to create the policies and stores the policies in a policy table based on the policy priority numbers. The BCP detects an incoming telephone call and determines the location, context, and caller conditions. The BCP compares the location, context, and caller conditions to a plurality of the policies and determines the policy that matches the conditions. The BCP then controls the telephone's behavior according to the telephone behavior instructions in the policy.Type: ApplicationFiled: March 2, 2004Publication date: September 8, 2005Applicant: International Business Machines CorporationInventors: David Kaminsky, David Ogle