Patents by Inventor David L. Kaminsky
David L. Kaminsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11275767Abstract: Application behavior is analyzed to determine relationships between data. Database objects accessed by an application are identified. Then, one or more relationships between the identified database objects are determined based on one or more from a group comprising statements of the application referring to the identified database objects and sets of the identified database objects accessed by different modules of the application.Type: GrantFiled: April 8, 2020Date of Patent: March 15, 2022Assignee: International Business Machines CorporationInventors: David L. Kaminsky, Girish Sundaram
-
Patent number: 11120431Abstract: A method, system and computer program product for identifying anomalous behavior (e.g., suspicious transactions). Information from at least one social media source (e.g., a posting) and from at least one non-social media source (e.g., a booking) are monitored. A transaction (e.g., credit card transaction) involving a user is identified. The monitored information is then analyzed to identify one or more characteristics (e.g., location of the user) of the user. A rating of invalidity of the transaction is generated based on the one or more characteristics, where the rating of invalidity refers to the likelihood that the transaction is likely to be anomaly, such as a suspicious transaction. If the rating exceeds a threshold, then an anomaly may be said to have occurred. By identifying anomalous behavior using both social media and non-social media sources, anomalous activities that truly occurred will be more accurately detected.Type: GrantFiled: September 18, 2018Date of Patent: September 14, 2021Assignee: Airbnb, Inc.Inventors: David L. Kaminsky, Girish Sundaram
-
Patent number: 11120099Abstract: Rendering a web element in a web page in an integrated development environment is provided. A reference address is extracted from code of a web page. The reference address references a web element. The web element is obtained based on the reference address and in response to the reference address indicating that the web element is an embedded web element. The web element is added to a resource pool. The web element of the resource pool is rendered in the web page.Type: GrantFiled: March 23, 2015Date of Patent: September 14, 2021Assignee: International Business machines CorporationInventors: Na Dong, David L. Kaminsky, Yun Li Li, Xi Ning Wang, Rui Yin
-
Patent number: 11005918Abstract: A request for a content document is sent by a client device to a content server through a first network connection. A current network characteristic of the first network connection differs from a configured download constraint to download a content portion of the content document. A root document that omits the content portion of the content document and that includes a content stub is downloaded from the content server. The content stub identifies the content portion using a content identifier and specifies the configured download constraint. A network connection change to the content server from the first network connection to a second network connection that satisfies the configured download constraint to download the content portion of the content document is detected, and the content portion is downloaded using the second network connection and the content identifier within the content stub.Type: GrantFiled: July 24, 2019Date of Patent: May 11, 2021Assignee: International Business Machines CorporationInventors: Ronald P. Doyle, David L. Kaminsky
-
Patent number: 10839040Abstract: A method normalizes a page flow into a portlet. One or more processors generates a portlet based on webpages in the page flow. The webpages are linked together through a navigation control in the portlet to execute a specific business logic. The webpages in the page flow include a first webpage and a second webpage, which are linked via a Uniform Resource Locator (URL). The processor(s) build an intra-portlet action based on a linking relationship between the first and second webpages by the portlet. The intra-portlet action is based on the URL that links the first webpage to the second webpage. The URL is located in a JavaScript file for the portlet and indicates a relative path for the portlet. The processor(s) convert the URL indicating the relative path for the portlet into a URL indicating an absolute path, which includes an attached root path for the portlet.Type: GrantFiled: February 28, 2019Date of Patent: November 17, 2020Assignee: International Business Machines CorporationInventors: David L. Kaminsky, Ying Liu, Shuangtao Lv, Xi Ning Wang, Rui Yin
-
Patent number: 10832193Abstract: A method, system, and computer program product for work plan based access control are provided in the illustrative embodiments. For a portion of the work plan, a physical space is determined. Access to the physical space is used in a task in the portion. At least one workflow is initiated to determine whether to grant the access to the physical space. Responsive to the workflow granting the access to the physical space, the access to the physical space is configured for a first duration for a first user performing the task. Responsive to an indication of closing of the portion, the access to the physical space for the first duration for the first user performing the task is revoked.Type: GrantFiled: August 29, 2018Date of Patent: November 10, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David L. Kaminsky, Lori M. Pilgrim, Govindaraj Sampathkumar
-
Publication number: 20200233884Abstract: Application behavior is analyzed to determine relationships between data. Database objects accessed by an application are identified. Then, one or more relationships between the identified database objects are determined based on one or more from a group comprising statements of the application referring to the identified database objects and sets of the identified database objects accessed by different modules of the application.Type: ApplicationFiled: April 8, 2020Publication date: July 23, 2020Inventors: David L. Kaminsky, Girish Sundaram
-
Patent number: 10706075Abstract: Application behavior is analyzed to determine relationships between data. Database objects accessed by an application are identified. Then, one or more relationships between the identified database objects are determined based on one or more from a group comprising statements of the application referring to the identified database objects and sets of the identified database objects accessed by different modules of the application.Type: GrantFiled: July 15, 2015Date of Patent: July 7, 2020Assignee: International Business Machines CorporationInventors: David L. Kaminsky, Girish Sundaram
-
Publication number: 20190349418Abstract: A request for a content document is sent by a client device to a content server through a first network connection. A current network characteristic of the first network connection differs from a configured download constraint to download a content portion of the content document. A root document that omits the content portion of the content document and that includes a content stub is downloaded from the content server. The content stub identifies the content portion using a content identifier and specifies the configured download constraint. A network connection change to the content server from the first network connection to a second network connection that satisfies the configured download constraint to download the content portion of the content document is detected, and the content portion is downloaded using the second network connection and the content identifier within the content stub.Type: ApplicationFiled: July 24, 2019Publication date: November 14, 2019Inventors: Ronald P. Doyle, David L. Kaminsky
-
Patent number: 10454767Abstract: A system, method and apparatus for autonomically assisting in the creation of an administrative policy. The method can include detecting a stimuli in a system under study and monitoring a response by a systems administrator to the stimuli. The stimuli and the response can be forwarded to a policy maker suited to analyze the stimuli and the response. Also, the policy maker can be queried for a preferred response to the stimuli. Based upon the preferred response to the stimuli, a policy for responding to the stimuli can be formulated. As such, the policy can be enforced in managing the system under study. Moreover, the policy can be forwarded for future consideration to the systems administrator.Type: GrantFiled: January 2, 2013Date of Patent: October 22, 2019Assignee: Sailpoint Technologies Holdings, Inc.Inventors: David L. Kaminsky, David M. Ogle
-
Patent number: 10397307Abstract: A request for content is received at a content server via a first network connection from a client device. The content includes a set of individual portions represented within a root document that are each configurable within the root document with syntactically assigned download constraints that specify network characteristics under which the portions of the content are downloadable. A determination to defer at least one portion of the content for download is made based upon a network characteristic of the first network connection not satisfying a configured download constraint syntactically assigned within the root document to the at least one portion of the content. The root document is sent with each deferred portion replaced with a content stub that each syntactically identifies the respective deferred portion of the content as a deferred content portion and includes a deferred content portion identifier of the respective deferred portion of the content.Type: GrantFiled: May 16, 2016Date of Patent: August 27, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald P. Doyle, David L. Kaminsky
-
Patent number: 10313215Abstract: In a typical computer network, at least some of the managed resources are monitored to determine whether those resources are meeting predetermined performance goals or service level objectives. To simplify the process of configuring a network monitor, information about the service level objectives is loaded into the resource itself. When the resource is detected, the service level objective information is extracted from the resource information and made available to a translating engine. The translating engine converts the extracted information to monitoring directions that are used to configure the network monitor. Embodiments in which new resources are detected either buying a registration process or a polling process are described.Type: GrantFiled: February 24, 2016Date of Patent: June 4, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David L. Kaminsky, John M. Lake
-
Patent number: 10255373Abstract: A method and/or an apparatus normalizes a page flow into a portlet. The method comprises: generating at least one portlet based on one or more pages in the page flow; building at least one of an intra-portlet action and an inter-portlet action for the least one portlet; and modifying a Uniform Resource Locator URL in the at least one portlet. With the method and the apparatus, the page flow developed by a developer can be automatically normalized into the portlet which is easier to be shared between difference applications and integrated with an existing portal application, so that the developer can focus on development of page flow while achieving user experience and advantages specific to the portlet.Type: GrantFiled: May 23, 2014Date of Patent: April 9, 2019Assignee: International Business Machines CorporationInventors: David L. Kaminsky, Ying Liu, Shuangtao Lv, Xi Ning Wang, Rui Yin
-
Publication number: 20190019181Abstract: A method, system and computer program product for identifying anomalous behavior (e.g., suspicious transactions). Information from at least one social media source (e.g., a posting) and from at least one non-social media source (e.g., a booking) are monitored. A transaction (e.g., credit card transaction) involving a user is identified. The monitored information is then analyzed to identify one or more characteristics (e.g., location of the user) of the user. A rating of invalidity of the transaction is generated based on the one or more characteristics, where the rating of invalidity refers to the likelihood that the transaction is likely to be anomaly, such as a suspicious transaction. If the rating exceeds a threshold, then an anomaly may be said to have occurred. By identifying anomalous behavior using both social media and non-social media sources, anomalous activities that truly occurred will be more accurately detected.Type: ApplicationFiled: September 18, 2018Publication date: January 17, 2019Inventors: David L. Kaminsky, Girish Sundaram
-
Publication number: 20190012626Abstract: A method, system, and computer program product for work plan based access control are provided in the illustrative embodiments. For a portion of the work plan, a physical space is determined. Access to the physical space is used in a task in the portion. At least one workflow is initiated to determine whether to grant the access to the physical space. Responsive to the workflow granting the access to the physical space, the access to the physical space is configured for a first duration for a first user performing the task. Responsive to an indication of closing of the portion, the access to the physical space for the first duration for the first user performing the task is revoked.Type: ApplicationFiled: August 29, 2018Publication date: January 10, 2019Applicant: International Business Machines CorporationInventors: David L. Kaminsky, Lori M. Pilgrim, Govindaraj Sampathkumar
-
Patent number: 10171313Abstract: Managing workload in a computing environment, in one aspect, may include monitoring an execution behavior of a portion of a job executing on the external computing resources. The execution behavior of the portion of the job executing on the external computing resources may be compared to the behavior required to attain at least one performance objective. If the comparison indicates that a performance objective is not being met, whether allocating additional internal resources would improve the overall performance as compared to the objective may be determined. If the determination indicates that allocating additional internal resources would improve the overall performance, at least one additional resource may be allocated.Type: GrantFiled: January 23, 2015Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Angel L. Diaz, David L. Kaminsky, Thai Q. Tran
-
Patent number: 10163098Abstract: A method, system and computer program product for identifying anomalous behavior (e.g., suspicious transactions). Information from at least one social media source (e.g., a posting) and from at least one non-social media source (e.g., a booking) are monitored. A transaction (e.g., credit card transaction) involving a user is identified. The monitored information is then analyzed to identify one or more characteristics (e.g., location of the user) of the user. A rating of invalidity of the transaction is generated based on the one or more characteristics, where the rating of invalidity refers to the likelihood that the transaction is likely to be anomaly, such as a suspicious transaction. If the rating exceeds a threshold, then an anomaly may be said to have occurred. By identifying anomalous behavior using both social media and non-social media sources, anomalous activities that truly occurred will be more accurately detected.Type: GrantFiled: February 13, 2013Date of Patent: December 25, 2018Assignee: International Business Machines CorporationInventors: David L. Kaminsky, Girish Sundaram
-
Patent number: 10135909Abstract: A request for a content document is sent by a client device to a content server through a first network connection. A current network characteristic of the first network connection differs from a configured download constraint to download a content portion of the content document. A root document that omits the content portion of the content document and that includes a content stub is downloaded from the content server. The content stub identifies the content portion using a content identifier and specifies the configured download constraint. A network connection change to the content server from the first network connection to a second network connection that satisfies the configured download constraint to download the content portion of the content document is detected, and the content portion is downloaded using the second network connection and the content identifier within the content stub.Type: GrantFiled: November 12, 2017Date of Patent: November 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald P. Doyle, David L. Kaminsky
-
Patent number: 10102489Abstract: A method, system, and computer program product for work plan based access control are provided in the illustrative embodiments. For a portion of the work plan, a physical space is determined. Access to the physical space is used in a task in the portion. At least one workflow is initiated to determine whether to grant the access to the physical space. Responsive to the workflow granting the access to the physical space, the access to the physical space is configured for a first duration for a first user performing the task. Responsive to an indication of closing of the portion, the access to the physical space for the first duration for the first user performing the task is revoked.Type: GrantFiled: August 12, 2014Date of Patent: October 16, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David L. Kaminsky, Lori M. Pilgrim, Govindaraj Sampathkumar
-
Publication number: 20180247022Abstract: Systems, methods and tools for leveraging computer networking resources, predictive analytics, machine learning technologies and artificial intelligence systems to predicts diagnoses, estimate costs associated with treating the diagnoses and allow patients to remotely schedule treatment with healthcare providers, based on the estimated costs provided. The patient may input relevant user information into the cost scheduling system via the scheduling portal and known symptom information to receive a potential diagnosis. The patient's client device may receive a report generated by the system describing each healthcare provider's expected costs for administering treatment based on the anticipated diagnosis. A patient, receiving the health care cost estimates from each provider may use the patient's client device to select the desired health care provider and schedule an appropriate time for commencing treatment of the patient.Type: ApplicationFiled: February 24, 2017Publication date: August 30, 2018Inventor: David L. Kaminsky