Patents by Inventor Hyman D. Chantz
Hyman D. Chantz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11556876Abstract: A method, system and computer program product for detecting business anomalies. Enterprise data as well as compliance rules (e.g., business operational rules) are analyzed to identify entities and concepts to be placed in an ontology. The identified entities and concepts are represented as multi-dimensional vectors. The updates, movements and access to the enterprise data and compliance rules are tracked to determine parameters, such as information velocity, associated with at least some of the elements of the multi-dimensional vectors. The meaning from the enterprise data as well as from the data parameters is discerned. The discerned enterprise data and discerned data parameters are compared with the historical and/or projected utilization of the discerned enterprise data and discerned data parameters to identify any differences. Statistical analysis is then applied based on the enterprise data and the identified differences to generate a value corresponding to a prediction of a business anomaly.Type: GrantFiled: January 5, 2015Date of Patent: January 17, 2023Assignee: International Business Machines CorporationInventors: Steven B. Adler, Hyman D. Chantz
-
Patent number: 11276021Abstract: A method, system and computer program product for detecting business anomalies. Enterprise data as well as compliance rules (e.g., business operational rules) are analyzed to identify entities and concepts to be placed in an ontology. The identified entities and concepts are represented as multi-dimensional vectors. The updates, movements and access to the enterprise data and compliance rules are tracked to determine parameters, such as information velocity, associated with at least some of the elements of the multi-dimensional vectors. The meaning from the enterprise data as well as from the data parameters is discerned. The discerned enterprise data and discerned data parameters are compared with the historical and/or projected utilization of the discerned enterprise data and discerned data parameters to identify any differences. Statistical analysis is then applied based on the enterprise data and the identified differences to generate a value corresponding to a prediction of a business anomaly.Type: GrantFiled: December 2, 2015Date of Patent: March 15, 2022Assignee: International Business Machines CorporationInventors: Steven B. Adler, Hyman D. Chantz
-
Patent number: 10951646Abstract: A local segment analysis and security (LSAS) engine method, computer program product, and apparatus are provided. The LSAS engine collects status metrics indicating a current operational status of the computing resources within a first segment of a computing environment, analyzes the status metrics to determine whether the first segment is the target of a first attack, and receives, from another LSAS engine of a second segment of the computing environment, a message indicating a status of the second segment with regard to the second segment being a target of a second attack. The LSAS engine determines a security response action to implement based on the received message and results of the analysis and transmits a control message to a computing resource of the first segment to implement the determined security response action. The security response action is at least one of a segmentation, dilution, or scaffolding security response action.Type: GrantFiled: October 16, 2018Date of Patent: March 16, 2021Assignee: International Business Machines CorporationInventor: Hyman D. Chantz
-
Patent number: 10620283Abstract: Nuclear Magnetic Resonant Imaging (also called Magnetic Resonant Imaging or “MRI”) devices which are implantable, internal or insertable are provided. The disclosure describes ways to miniaturize, simplify, calibrate, cool, and increase the utility of MRI systems for structural investigative purposes, and for biological investigation and potential treatment. It teaches use of target objects of fixed size, shape and position for calibration and comparison to obtain accurate images. It further teaches cooling of objects under test by electrically conductive leads or electrically isolated leads; varying the magnetic field of the probe to move chemicals or ferrous metallic objects within the subject. The invention also teaches comparison of objects using review of the frequency components of a received signal rather than by a pictorial representation.Type: GrantFiled: May 11, 2012Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventor: Hyman D. Chantz
-
Patent number: 10567420Abstract: Mechanisms are provided in which an electronic corpus of content specific to a domain of computer system attacks is ingested and cognitively analyzed to identify at least one instance of a reference to a computer attack and at least one corresponding characteristic of the computer attack. The mechanisms generate an attack profile data structure for the computer attack based on the at least one corresponding characteristic of the computer attack identified by the cognitive analysis of the content of the electronic corpus. A local segment analysis and security (LSAS) engine, associated with a segment of a distributed computing system, is configured based on the attack profile data structure. The LSAS engine determines a security response action to implement based on the attack profile data structure and transmits a control message to at least one computing resource to implement the determined security response action in response to detecting the computer attack.Type: GrantFiled: November 8, 2016Date of Patent: February 18, 2020Assignee: International Business Machines CorporationInventor: Hyman D. Chantz
-
Publication number: 20200011946Abstract: Nuclear Magnetic Resonant Imaging (also called Magnetic Resonant Imaging or “MRI”) devices which are implantable, internal or insertable are provided. The disclosure describes ways to miniaturize, simplify, calibrate, cool, and increase the utility of MRI systems for structural investigative purposes, and for biological investigation and potential treatment. It teaches use of target objects of fixed size, shape and position for calibration and comparison to obtain accurate images. It further teaches cooling of objects under test by electrically conductive leads or electrically isolated leads; varying the magnetic field of the probe to move chemicals or ferrous metallic objects within the subject. The invention also teaches comparison of objects using review of the frequency components of a received signal rather than by a pictorial representation.Type: ApplicationFiled: September 19, 2019Publication date: January 9, 2020Inventor: Hyman D. Chantz
-
Patent number: 10215736Abstract: An acoustic monitor detects and logs events based on the acoustic characteristics of the event. The acoustic monitor is placed on a power transmission tower, and a baseline acoustic signature is established. Events can be defined by variance from the baseline, or by matching one of a set of predefined acoustic signatures. When an event is detected, the acoustic monitor logs the event. A repair person queries the acoustic monitors to narrow down where the event occurred to be between two towers, and can then query the acoustic monitors on those two towers. Using the timestamps of the event in each of the towers, and using the known speed of sound in air, the repair person can quickly calculate the location of the event from both towers. By knowing the location of the event, the repair person knows exactly how to quickly access the location to make the needed repairs.Type: GrantFiled: October 23, 2015Date of Patent: February 26, 2019Assignee: International Business Machines CorporationInventor: Hyman D. Chantz
-
Publication number: 20190052669Abstract: A local segment analysis and security (LSAS) engine method, computer program product, and apparatus are provided. The LSAS engine collects status metrics indicating a current operational status of the computing resources within a first segment of a computing environment, analyzes the status metrics to determine whether the first segment is the target of a first attack, and receives, from another LSAS engine of a second segment of the computing environment, a message indicating a status of the second segment with regard to the second segment being a target of a second attack. The LSAS engine determines a security response action to implement based on the received message and results of the analysis and transmits a control message to a computing resource of the first segment to implement the determined security response action. The security response action is at least one of a segmentation, dilution, or scaffolding security response action.Type: ApplicationFiled: October 16, 2018Publication date: February 14, 2019Inventor: Hyman D. Chantz
-
Patent number: 10110626Abstract: A local segment analysis and security (LSAS) engine method, computer program product, and apparatus are provided. The LSAS engine collects status metrics indicating a current operational status of the computing resources within a first segment of a computing environment, analyzes the status metrics to determine whether the first segment is the target of a first attack, and receives, from another LSAS engine of a second segment of the computing environment, a message indicating a status of the second segment with regard to the second segment being a target of a second attack. The LSAS engine determines a security response action to implement based on the received message and results of the analysis and transmits a control message to a computing resource of the first segment to implement the determined security response action. The security response action is at least one of a segmentation, dilution, or scaffolding security response action.Type: GrantFiled: April 26, 2016Date of Patent: October 23, 2018Assignee: International Business Machines CorporationInventor: Hyman D. Chantz
-
Patent number: 10014591Abstract: An antenna is provided and includes a base antenna component, a loop antenna component, a first coupling by which the loop antenna component is pivotally attached to and selectively electrically communicative with the base antenna component, a whip antenna component, a second coupling by which the whip antenna component is pivotally attached to and selectively electrically communicative with the loop antenna component; and a transmission/reception (T/R) module. The T/R module is disposable in signal communication with at least one or more of the base, loop and whip antenna components.Type: GrantFiled: December 5, 2017Date of Patent: July 3, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Hyman D. Chantz
-
Publication number: 20180131716Abstract: Mechanisms are provided in which an electronic corpus of content specific to a domain of computer system attacks is ingested and cognitively analyzed to identify at least one instance of a reference to a computer attack and at least one corresponding characteristic of the computer attack. The mechanisms generate an attack profile data structure for the computer attack based on the at least one corresponding characteristic of the computer attack identified by the cognitive analysis of the content of the electronic corpus. A local segment analysis and security (LSAS) engine, associated with a segment of a distributed computing system, is configured based on the attack profile data structure. The LSAS engine determines a security response action to implement based on the attack profile data structure and transmits a control message to at least one computing resource to implement the determined security response action in response to detecting the computer attack.Type: ApplicationFiled: November 8, 2016Publication date: May 10, 2018Inventor: Hyman D. Chantz
-
Publication number: 20180083370Abstract: An antenna is provided and includes a base antenna component, a loop antenna component, a first coupling by which the loop antenna component is pivotally attached to and selectively electrically communicative with the base antenna component, a whip antenna component, a second coupling by which the whip antenna component is pivotally attached to and selectively electrically communicative with the loop antenna component; and a transmission/reception (T/R) module. The T/R module is disposable in signal communication with at least one or more of the base, loop and whip antenna components.Type: ApplicationFiled: December 5, 2017Publication date: March 22, 2018Inventor: Hyman D. Chantz
-
Patent number: 9871303Abstract: An antenna is provided and includes a base antenna component, a loop antenna component, a first coupling by which the loop antenna component is pivotally attached to and selectively electrically communicative with the base antenna component, a whip antenna component, a second coupling by which the whip antenna component is pivotally attached to and selectively electrically communicative with the loop antenna component; and a transmission/reception (T/R) module. The T/R module is disposable in signal communication with at least one or more of the base, loop and whip antenna components.Type: GrantFiled: May 25, 2016Date of Patent: January 16, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Hyman D. Chantz
-
Publication number: 20170346196Abstract: An antenna is provided and includes a base antenna component, a loop antenna component, a first coupling by which the loop antenna component is pivotally attached to and selectively electrically communicative with the base antenna component, a whip antenna component, a second coupling by which the whip antenna component is pivotally attached to and selectively electrically communicative with the loop antenna component; and a transmission/reception (T/R) module. The T/R module is disposable in signal communication with at least one or more of the base, loop and whip antenna components.Type: ApplicationFiled: May 25, 2016Publication date: November 30, 2017Inventor: Hyman D. Chantz
-
Publication number: 20170310702Abstract: A local segment analysis and security (LSAS) engine method, computer program product, and apparatus are provided. The LSAS engine collects status metrics indicating a current operational status of the computing resources within a first segment of a computing environment, analyzes the status metrics to determine whether the first segment is the target of a first attack, and receives, from another LSAS engine of a second segment of the computing environment, a message indicating a status of the second segment with regard to the second segment being a target of a second attack. The LSAS engine determines a security response action to implement based on the received message and results of the analysis and transmits a control message to a computing resource of the first segment to implement the determined security response action. The security response action is at least one of a segmentation, dilution, or scaffolding security response action.Type: ApplicationFiled: April 26, 2016Publication date: October 26, 2017Inventor: Hyman D. Chantz
-
Publication number: 20170115256Abstract: An acoustic monitor detects and logs events based on the acoustic characteristics of the event. The acoustic monitor is placed on a power transmission tower, and a baseline acoustic signature is established. Events can be defined by variance from the baseline, or by matching one of a set of predefined acoustic signatures. When an event is detected, the acoustic monitor logs the event. A repair person queries the acoustic monitors to narrow down where the event occurred to be between two towers, and can then query the acoustic monitors on those two towers. Using the timestamps of the event in each of the towers, and using the known speed of sound in air, the repair person can quickly calculate the location of the event from both towers. By knowing the location of the event, the repair person knows exactly how to quickly access the location to make the needed repairs.Type: ApplicationFiled: October 23, 2015Publication date: April 27, 2017Inventor: Hyman D. Chantz
-
Patent number: 9532733Abstract: A method and system for determining a pose of a subject. A first signal is transmitted from a first transceiver to the first transponder, resulting in the first transponder sending a second signal. The subject is placed onto a surface of a platform having the first radio-frequency transceiver and a second radio-frequency transceiver. The first radio-frequency transponder is placed on an upper extremity of the subject. A second radio-frequency transponder is placed on a lower extremity of the subject. A third signal is transmitted from the second transceiver to the second transponder, resulting in the second transponder sending a fourth signal. The second signal is received by the first transceiver. The fourth signal is received by the second transceiver. A pose of the subject is determined based on receiving the second signal and the fourth signal.Type: GrantFiled: March 23, 2016Date of Patent: January 3, 2017Assignee: International Business Machines CorporationInventor: Hyman D. Chantz
-
Publication number: 20160198983Abstract: A method and system for determining a pose of a subject. A first signal is transmitted from a first transceiver to the first transponder, resulting in the first transponder sending a second signal. The subject is placed onto a surface of a platform having the first radio-frequency transceiver and a second radio-frequency transceiver. The first radio-frequency transponder is placed on an upper extremity of the subject. A second radio-frequency transponder is placed on a lower extremity of the subject. A third signal is transmitted from the second transceiver to the second transponder, resulting in the second transponder sending a fourth signal. The second signal is received by the first transceiver. The fourth signal is received by the second transceiver. A pose of the subject is determined based on receiving the second signal and the fourth signal.Type: ApplicationFiled: March 23, 2016Publication date: July 14, 2016Inventor: Hyman D. Chantz
-
Publication number: 20160196514Abstract: A method, system and computer program product for detecting business anomalies. Enterprise data as well as compliance rules (e.g., business operational rules) are analyzed to identify entities and concepts to be placed in an ontology. The identified entities and concepts are represented as multi-dimensional vectors. The updates, movements and access to the enterprise data and compliance rules are tracked to determine parameters, such as information velocity, associated with at least some of the elements of the multi-dimensional vectors. The meaning from the enterprise data as well as from the data parameters is discerned. The discerned enterprise data and discerned data parameters are compared with the historical and/or projected utilization of the discerned enterprise data and discerned data parameters to identify any differences. Statistical analysis is then applied based on the enterprise data and the identified differences to generate a value corresponding to a prediction of a business anomaly.Type: ApplicationFiled: January 5, 2015Publication date: July 7, 2016Inventors: Steven B. Adler, Hyman D. Chantz
-
Publication number: 20160196515Abstract: A method, system and computer program product for detecting business anomalies. Enterprise data as well as compliance rules (e.g., business operational rules) are analyzed to identify entities and concepts to be placed in an ontology. The identified entities and concepts are represented as multi-dimensional vectors. The updates, movements and access to the enterprise data and compliance rules are tracked to determine parameters, such as information velocity, associated with at least some of the elements of the multi-dimensional vectors. The meaning from the enterprise data as well as from the data parameters is discerned. The discerned enterprise data and discerned data parameters are compared with the historical and/or projected utilization of the discerned enterprise data and discerned data parameters to identify any differences. Statistical analysis is then applied based on the enterprise data and the identified differences to generate a value corresponding to a prediction of a business anomaly.Type: ApplicationFiled: December 2, 2015Publication date: July 7, 2016Inventors: Steven B. Adler, Hyman D. Chantz