Patents by Inventor Hyman D. Chantz

Hyman D. Chantz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11556876
    Abstract: A method, system and computer program product for detecting business anomalies. Enterprise data as well as compliance rules (e.g., business operational rules) are analyzed to identify entities and concepts to be placed in an ontology. The identified entities and concepts are represented as multi-dimensional vectors. The updates, movements and access to the enterprise data and compliance rules are tracked to determine parameters, such as information velocity, associated with at least some of the elements of the multi-dimensional vectors. The meaning from the enterprise data as well as from the data parameters is discerned. The discerned enterprise data and discerned data parameters are compared with the historical and/or projected utilization of the discerned enterprise data and discerned data parameters to identify any differences. Statistical analysis is then applied based on the enterprise data and the identified differences to generate a value corresponding to a prediction of a business anomaly.
    Type: Grant
    Filed: January 5, 2015
    Date of Patent: January 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Steven B. Adler, Hyman D. Chantz
  • Patent number: 11276021
    Abstract: A method, system and computer program product for detecting business anomalies. Enterprise data as well as compliance rules (e.g., business operational rules) are analyzed to identify entities and concepts to be placed in an ontology. The identified entities and concepts are represented as multi-dimensional vectors. The updates, movements and access to the enterprise data and compliance rules are tracked to determine parameters, such as information velocity, associated with at least some of the elements of the multi-dimensional vectors. The meaning from the enterprise data as well as from the data parameters is discerned. The discerned enterprise data and discerned data parameters are compared with the historical and/or projected utilization of the discerned enterprise data and discerned data parameters to identify any differences. Statistical analysis is then applied based on the enterprise data and the identified differences to generate a value corresponding to a prediction of a business anomaly.
    Type: Grant
    Filed: December 2, 2015
    Date of Patent: March 15, 2022
    Assignee: International Business Machines Corporation
    Inventors: Steven B. Adler, Hyman D. Chantz
  • Patent number: 10951646
    Abstract: A local segment analysis and security (LSAS) engine method, computer program product, and apparatus are provided. The LSAS engine collects status metrics indicating a current operational status of the computing resources within a first segment of a computing environment, analyzes the status metrics to determine whether the first segment is the target of a first attack, and receives, from another LSAS engine of a second segment of the computing environment, a message indicating a status of the second segment with regard to the second segment being a target of a second attack. The LSAS engine determines a security response action to implement based on the received message and results of the analysis and transmits a control message to a computing resource of the first segment to implement the determined security response action. The security response action is at least one of a segmentation, dilution, or scaffolding security response action.
    Type: Grant
    Filed: October 16, 2018
    Date of Patent: March 16, 2021
    Assignee: International Business Machines Corporation
    Inventor: Hyman D. Chantz
  • Patent number: 10620283
    Abstract: Nuclear Magnetic Resonant Imaging (also called Magnetic Resonant Imaging or “MRI”) devices which are implantable, internal or insertable are provided. The disclosure describes ways to miniaturize, simplify, calibrate, cool, and increase the utility of MRI systems for structural investigative purposes, and for biological investigation and potential treatment. It teaches use of target objects of fixed size, shape and position for calibration and comparison to obtain accurate images. It further teaches cooling of objects under test by electrically conductive leads or electrically isolated leads; varying the magnetic field of the probe to move chemicals or ferrous metallic objects within the subject. The invention also teaches comparison of objects using review of the frequency components of a received signal rather than by a pictorial representation.
    Type: Grant
    Filed: May 11, 2012
    Date of Patent: April 14, 2020
    Assignee: International Business Machines Corporation
    Inventor: Hyman D. Chantz
  • Patent number: 10567420
    Abstract: Mechanisms are provided in which an electronic corpus of content specific to a domain of computer system attacks is ingested and cognitively analyzed to identify at least one instance of a reference to a computer attack and at least one corresponding characteristic of the computer attack. The mechanisms generate an attack profile data structure for the computer attack based on the at least one corresponding characteristic of the computer attack identified by the cognitive analysis of the content of the electronic corpus. A local segment analysis and security (LSAS) engine, associated with a segment of a distributed computing system, is configured based on the attack profile data structure. The LSAS engine determines a security response action to implement based on the attack profile data structure and transmits a control message to at least one computing resource to implement the determined security response action in response to detecting the computer attack.
    Type: Grant
    Filed: November 8, 2016
    Date of Patent: February 18, 2020
    Assignee: International Business Machines Corporation
    Inventor: Hyman D. Chantz
  • Publication number: 20200011946
    Abstract: Nuclear Magnetic Resonant Imaging (also called Magnetic Resonant Imaging or “MRI”) devices which are implantable, internal or insertable are provided. The disclosure describes ways to miniaturize, simplify, calibrate, cool, and increase the utility of MRI systems for structural investigative purposes, and for biological investigation and potential treatment. It teaches use of target objects of fixed size, shape and position for calibration and comparison to obtain accurate images. It further teaches cooling of objects under test by electrically conductive leads or electrically isolated leads; varying the magnetic field of the probe to move chemicals or ferrous metallic objects within the subject. The invention also teaches comparison of objects using review of the frequency components of a received signal rather than by a pictorial representation.
    Type: Application
    Filed: September 19, 2019
    Publication date: January 9, 2020
    Inventor: Hyman D. Chantz
  • Patent number: 10215736
    Abstract: An acoustic monitor detects and logs events based on the acoustic characteristics of the event. The acoustic monitor is placed on a power transmission tower, and a baseline acoustic signature is established. Events can be defined by variance from the baseline, or by matching one of a set of predefined acoustic signatures. When an event is detected, the acoustic monitor logs the event. A repair person queries the acoustic monitors to narrow down where the event occurred to be between two towers, and can then query the acoustic monitors on those two towers. Using the timestamps of the event in each of the towers, and using the known speed of sound in air, the repair person can quickly calculate the location of the event from both towers. By knowing the location of the event, the repair person knows exactly how to quickly access the location to make the needed repairs.
    Type: Grant
    Filed: October 23, 2015
    Date of Patent: February 26, 2019
    Assignee: International Business Machines Corporation
    Inventor: Hyman D. Chantz
  • Publication number: 20190052669
    Abstract: A local segment analysis and security (LSAS) engine method, computer program product, and apparatus are provided. The LSAS engine collects status metrics indicating a current operational status of the computing resources within a first segment of a computing environment, analyzes the status metrics to determine whether the first segment is the target of a first attack, and receives, from another LSAS engine of a second segment of the computing environment, a message indicating a status of the second segment with regard to the second segment being a target of a second attack. The LSAS engine determines a security response action to implement based on the received message and results of the analysis and transmits a control message to a computing resource of the first segment to implement the determined security response action. The security response action is at least one of a segmentation, dilution, or scaffolding security response action.
    Type: Application
    Filed: October 16, 2018
    Publication date: February 14, 2019
    Inventor: Hyman D. Chantz
  • Patent number: 10110626
    Abstract: A local segment analysis and security (LSAS) engine method, computer program product, and apparatus are provided. The LSAS engine collects status metrics indicating a current operational status of the computing resources within a first segment of a computing environment, analyzes the status metrics to determine whether the first segment is the target of a first attack, and receives, from another LSAS engine of a second segment of the computing environment, a message indicating a status of the second segment with regard to the second segment being a target of a second attack. The LSAS engine determines a security response action to implement based on the received message and results of the analysis and transmits a control message to a computing resource of the first segment to implement the determined security response action. The security response action is at least one of a segmentation, dilution, or scaffolding security response action.
    Type: Grant
    Filed: April 26, 2016
    Date of Patent: October 23, 2018
    Assignee: International Business Machines Corporation
    Inventor: Hyman D. Chantz
  • Patent number: 10014591
    Abstract: An antenna is provided and includes a base antenna component, a loop antenna component, a first coupling by which the loop antenna component is pivotally attached to and selectively electrically communicative with the base antenna component, a whip antenna component, a second coupling by which the whip antenna component is pivotally attached to and selectively electrically communicative with the loop antenna component; and a transmission/reception (T/R) module. The T/R module is disposable in signal communication with at least one or more of the base, loop and whip antenna components.
    Type: Grant
    Filed: December 5, 2017
    Date of Patent: July 3, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Hyman D. Chantz
  • Publication number: 20180131716
    Abstract: Mechanisms are provided in which an electronic corpus of content specific to a domain of computer system attacks is ingested and cognitively analyzed to identify at least one instance of a reference to a computer attack and at least one corresponding characteristic of the computer attack. The mechanisms generate an attack profile data structure for the computer attack based on the at least one corresponding characteristic of the computer attack identified by the cognitive analysis of the content of the electronic corpus. A local segment analysis and security (LSAS) engine, associated with a segment of a distributed computing system, is configured based on the attack profile data structure. The LSAS engine determines a security response action to implement based on the attack profile data structure and transmits a control message to at least one computing resource to implement the determined security response action in response to detecting the computer attack.
    Type: Application
    Filed: November 8, 2016
    Publication date: May 10, 2018
    Inventor: Hyman D. Chantz
  • Publication number: 20180083370
    Abstract: An antenna is provided and includes a base antenna component, a loop antenna component, a first coupling by which the loop antenna component is pivotally attached to and selectively electrically communicative with the base antenna component, a whip antenna component, a second coupling by which the whip antenna component is pivotally attached to and selectively electrically communicative with the loop antenna component; and a transmission/reception (T/R) module. The T/R module is disposable in signal communication with at least one or more of the base, loop and whip antenna components.
    Type: Application
    Filed: December 5, 2017
    Publication date: March 22, 2018
    Inventor: Hyman D. Chantz
  • Patent number: 9871303
    Abstract: An antenna is provided and includes a base antenna component, a loop antenna component, a first coupling by which the loop antenna component is pivotally attached to and selectively electrically communicative with the base antenna component, a whip antenna component, a second coupling by which the whip antenna component is pivotally attached to and selectively electrically communicative with the loop antenna component; and a transmission/reception (T/R) module. The T/R module is disposable in signal communication with at least one or more of the base, loop and whip antenna components.
    Type: Grant
    Filed: May 25, 2016
    Date of Patent: January 16, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Hyman D. Chantz
  • Publication number: 20170346196
    Abstract: An antenna is provided and includes a base antenna component, a loop antenna component, a first coupling by which the loop antenna component is pivotally attached to and selectively electrically communicative with the base antenna component, a whip antenna component, a second coupling by which the whip antenna component is pivotally attached to and selectively electrically communicative with the loop antenna component; and a transmission/reception (T/R) module. The T/R module is disposable in signal communication with at least one or more of the base, loop and whip antenna components.
    Type: Application
    Filed: May 25, 2016
    Publication date: November 30, 2017
    Inventor: Hyman D. Chantz
  • Publication number: 20170310702
    Abstract: A local segment analysis and security (LSAS) engine method, computer program product, and apparatus are provided. The LSAS engine collects status metrics indicating a current operational status of the computing resources within a first segment of a computing environment, analyzes the status metrics to determine whether the first segment is the target of a first attack, and receives, from another LSAS engine of a second segment of the computing environment, a message indicating a status of the second segment with regard to the second segment being a target of a second attack. The LSAS engine determines a security response action to implement based on the received message and results of the analysis and transmits a control message to a computing resource of the first segment to implement the determined security response action. The security response action is at least one of a segmentation, dilution, or scaffolding security response action.
    Type: Application
    Filed: April 26, 2016
    Publication date: October 26, 2017
    Inventor: Hyman D. Chantz
  • Publication number: 20170115256
    Abstract: An acoustic monitor detects and logs events based on the acoustic characteristics of the event. The acoustic monitor is placed on a power transmission tower, and a baseline acoustic signature is established. Events can be defined by variance from the baseline, or by matching one of a set of predefined acoustic signatures. When an event is detected, the acoustic monitor logs the event. A repair person queries the acoustic monitors to narrow down where the event occurred to be between two towers, and can then query the acoustic monitors on those two towers. Using the timestamps of the event in each of the towers, and using the known speed of sound in air, the repair person can quickly calculate the location of the event from both towers. By knowing the location of the event, the repair person knows exactly how to quickly access the location to make the needed repairs.
    Type: Application
    Filed: October 23, 2015
    Publication date: April 27, 2017
    Inventor: Hyman D. Chantz
  • Patent number: 9532733
    Abstract: A method and system for determining a pose of a subject. A first signal is transmitted from a first transceiver to the first transponder, resulting in the first transponder sending a second signal. The subject is placed onto a surface of a platform having the first radio-frequency transceiver and a second radio-frequency transceiver. The first radio-frequency transponder is placed on an upper extremity of the subject. A second radio-frequency transponder is placed on a lower extremity of the subject. A third signal is transmitted from the second transceiver to the second transponder, resulting in the second transponder sending a fourth signal. The second signal is received by the first transceiver. The fourth signal is received by the second transceiver. A pose of the subject is determined based on receiving the second signal and the fourth signal.
    Type: Grant
    Filed: March 23, 2016
    Date of Patent: January 3, 2017
    Assignee: International Business Machines Corporation
    Inventor: Hyman D. Chantz
  • Publication number: 20160198983
    Abstract: A method and system for determining a pose of a subject. A first signal is transmitted from a first transceiver to the first transponder, resulting in the first transponder sending a second signal. The subject is placed onto a surface of a platform having the first radio-frequency transceiver and a second radio-frequency transceiver. The first radio-frequency transponder is placed on an upper extremity of the subject. A second radio-frequency transponder is placed on a lower extremity of the subject. A third signal is transmitted from the second transceiver to the second transponder, resulting in the second transponder sending a fourth signal. The second signal is received by the first transceiver. The fourth signal is received by the second transceiver. A pose of the subject is determined based on receiving the second signal and the fourth signal.
    Type: Application
    Filed: March 23, 2016
    Publication date: July 14, 2016
    Inventor: Hyman D. Chantz
  • Publication number: 20160196514
    Abstract: A method, system and computer program product for detecting business anomalies. Enterprise data as well as compliance rules (e.g., business operational rules) are analyzed to identify entities and concepts to be placed in an ontology. The identified entities and concepts are represented as multi-dimensional vectors. The updates, movements and access to the enterprise data and compliance rules are tracked to determine parameters, such as information velocity, associated with at least some of the elements of the multi-dimensional vectors. The meaning from the enterprise data as well as from the data parameters is discerned. The discerned enterprise data and discerned data parameters are compared with the historical and/or projected utilization of the discerned enterprise data and discerned data parameters to identify any differences. Statistical analysis is then applied based on the enterprise data and the identified differences to generate a value corresponding to a prediction of a business anomaly.
    Type: Application
    Filed: January 5, 2015
    Publication date: July 7, 2016
    Inventors: Steven B. Adler, Hyman D. Chantz
  • Publication number: 20160196515
    Abstract: A method, system and computer program product for detecting business anomalies. Enterprise data as well as compliance rules (e.g., business operational rules) are analyzed to identify entities and concepts to be placed in an ontology. The identified entities and concepts are represented as multi-dimensional vectors. The updates, movements and access to the enterprise data and compliance rules are tracked to determine parameters, such as information velocity, associated with at least some of the elements of the multi-dimensional vectors. The meaning from the enterprise data as well as from the data parameters is discerned. The discerned enterprise data and discerned data parameters are compared with the historical and/or projected utilization of the discerned enterprise data and discerned data parameters to identify any differences. Statistical analysis is then applied based on the enterprise data and the identified differences to generate a value corresponding to a prediction of a business anomaly.
    Type: Application
    Filed: December 2, 2015
    Publication date: July 7, 2016
    Inventors: Steven B. Adler, Hyman D. Chantz