Patents by Inventor John F. Morar

John F. Morar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8346911
    Abstract: A system, computer program and method for inspection of a system under inspection. The system may include an inspection program configured to access information available at the system under inspection and generate inspection data for the system under inspection. A runtime platform independent from the inspection program at the system under inspection is configured to limit the limit the contents of the inspection data to a maximum information content. A trusted third-party computer system may assist in selecting the inspection program and transferring the resulting inspection data.
    Type: Grant
    Filed: March 17, 2006
    Date of Patent: January 1, 2013
    Assignee: International Business Machines Corporation
    Inventors: David M. Chess, Sophia Krasikov, David W. Levine, John F. Morar, Edward J. Pring, Alla Segal, Ian N. Whalley
  • Patent number: 7996905
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Grant
    Filed: April 3, 2008
    Date of Patent: August 9, 2011
    Assignee: Trend Micro Incorporated
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Patent number: 7882500
    Abstract: Disclosed is a computer program product for managing granularity of a computing infrastructure, wherein the program, when executed on a computer, causes the computer to: identify at least one set of service functions suited to characterization by one or more sets of metrics; create a representation of at least one supplied functionality for the set of service functions for input to a formal process; characterize at least one rule and at least one constraint for input to the formal process; determine at least one set of metrics for evaluating the service functions; quantify benefits associated with at least one of the sets of service functions using the set of metrics; and provide one or more of the sets of service functions as output, wherein the output is based on the metrics determining the output by use of the formal process. Systems and infrastructure are also disclosed.
    Type: Grant
    Filed: January 2, 2007
    Date of Patent: February 1, 2011
    Assignee: International Business Machines Corporation
    Inventors: Sophia Krasikov, John F. Morar, Senthilnathan Velayudham, Emmanuel Yashchin
  • Patent number: 7861300
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Grant
    Filed: June 18, 2008
    Date of Patent: December 28, 2010
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Patent number: 7848988
    Abstract: Electronic contracts or “eContracts” for representing service level agreements are provided. In one illustrative embodiment, the eContract may comprise information pertaining to: (a) descriptions of business transactions in IT terms; (b) financial implications of business transaction service levels; and (c) reporting to be done in business terms. Of course, the eContract may comprise other terms and conditions. In an illustrative aspect of the invention, a system for managing IT resources in terms of business financials comprises an electronic contract authoring system or “ecAuthoring system,” an electronic contract manager module or “ecManager,” and one or more electronic contract agent modules or “ecAgents” that may run on IT elements (e.g., components of the network) that are being managed. Analysts interact with the ecAuthoring system to construct eContracts. An eContract is input to an ecManager that interprets the contract to report on and optimize IT resources based on business financials.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: December 7, 2010
    Assignee: International Business Machines Corporation
    Inventors: Joseph L. Hellerstein, Gautam Kar, Alexander Keller, W. Nathaniel Mills, III, John F. Morar
  • Patent number: 7818179
    Abstract: Devices and methods are provided for automatically analyzing a user's conversation or verbal presentation and providing feedback to the user, in real-time and/or off-line, to make the user aware of improper speech habits and thus enable the user to acquire better language habits while speaking. For example, a device for providing user awareness of speech habits may be a portable device, which can be worn or carried by the user, has various functions for monitoring and analyzing a speech session (e.g. conversation, verbal presentation) of a user and providing notification to the user of improper speech or language habits that are identified during the speech session.
    Type: Grant
    Filed: November 12, 2004
    Date of Patent: October 19, 2010
    Assignee: International Business Machines Corporation
    Inventors: Sophia Krasikov, John F. Morar, Senthilnathan Velayudham
  • Patent number: 7610228
    Abstract: Electronic contracts or “eContracts” for representing service level agreements are provided. In one illustrative embodiment, the eContract may comprise information pertaining to: (a) descriptions of business transactions in IT terms; (b) financial implications of business transaction service levels; and (c) reporting to be done in business terms. Of course, the eContract may comprise other terms and conditions. In an illustrative aspect of the invention, a system for managing IT resources in terms of business financials comprises an electronic contract authoring system or “ecAuthoring system,” an electronic contract manager module or “ecManager,” and one or more electronic contract agent modules or “ecAgents” that may run on IT elements (e.g., components of the network) that are being managed. Analysts interact with the ecAuthoring system to construct eContracts. An eContract is input to an ecManager that interprets the contract to report on and optimize IT resources based on business financials.
    Type: Grant
    Filed: June 29, 2001
    Date of Patent: October 27, 2009
    Assignee: International Business Machines Corporation
    Inventors: Joseph L. Hellerstein, Gautam Kar, Alexander Keller, W. Nathaniel Mills, III, John F. Morar
  • Patent number: 7487543
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Grant
    Filed: July 23, 2002
    Date of Patent: February 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Publication number: 20080256633
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Application
    Filed: June 18, 2008
    Publication date: October 16, 2008
    Inventors: William C. ARNOLD, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Publication number: 20080189787
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Application
    Filed: April 3, 2008
    Publication date: August 7, 2008
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Publication number: 20080163213
    Abstract: Disclosed is a computer program product for managing granularity of a computing infrastructure, wherein the program, when executed on a computer, causes the computer to: identify at least one set of service functions suited to characterization by one or more sets of metrics; create a representation of at least one supplied functionality for the set of service functions for input to a formal process; characterize at least one rule and at least one constraint for input to the formal process; determine at least one set of metrics for evaluating the service functions; quantify benefits associated with at least one of the sets of service functions using the set of metrics; and provide one or more of the sets of service functions as output, wherein the output is based on the metrics determining the output by use of the formal process. Systems and infrastructure are also disclosed.
    Type: Application
    Filed: January 2, 2007
    Publication date: July 3, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sophia Krasikov, John F. Morar, Senthilnathan Velayudham, Emmanuel Yashchin
  • Patent number: 7394380
    Abstract: A method for tracking objects, including identifying and locating an object using a first method, identifying and locating a person using a second method, and associating the object and the person.
    Type: Grant
    Filed: February 16, 2006
    Date of Patent: July 1, 2008
    Assignee: International Business Machines Corporation
    Inventors: Andrew M. Ballin, John F. Morar, Paul A. Moskowitz
  • Patent number: 7103913
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Grant
    Filed: May 8, 2002
    Date of Patent: September 5, 2006
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Patent number: 7069585
    Abstract: An apparatus and a method for enabling the secure installation and use of an information system having a plurality of nodes, where the plurality of nodes include at least one information appliance (100) and at least one security console (200). The apparatus includes at least one data-carrying object, referred to as a “key” (301), that contains security-related data, and further includes at least one key receptacle (103, 203) that forms a portion of at least one of the nodes. The key is inserted into the receptacle for reading-out the security-related data for indicating to the information system a desired security configuration. The key is not intended to primarily establish the identity of a particular user or principal, but is instead intended to provide and be instrumental in defining, using a tangible medium, a security configuration that bestows a certain level of authorization or access to a particular user or principal.
    Type: Grant
    Filed: August 17, 2000
    Date of Patent: June 27, 2006
    Assignee: International Business Machines Corporation
    Inventors: David M. Chess, Ian N. Whalley, Steve R. White, John F. Morar
  • Patent number: 6990590
    Abstract: A method, computer program product, and data processing system for circumventing profiling and targeting of World Wide Web users is disclosed. A number of fictitious web “personae” are established. A user wishing to perform a particular web transaction assumes a persona that best fits the user's current needs. The user's actions are then attributed to the persona, rather than the user. When the user wishes to perform another transaction, a different persona may be assumed, depending upon the circumstances, so that any disadvantage attributable to performing the same web transaction multiple times may be eliminated. This has the dual advantage of both protecting the user's privacy and taking advantage of special offers and incentives that may be targeted to first-time customers.
    Type: Grant
    Filed: January 10, 2002
    Date of Patent: January 24, 2006
    Assignee: International Business Machines Corporation
    Inventors: James E. Hanson, Sophia Krasikov, John F. Morar, Steve R. White
  • Patent number: 6981279
    Abstract: A system and a method are disclosed for dynamically analyzing software, some of whose potentially-important behaviors (such as worm-like behavior) may only be displayed when the software is executed in an environment where it has, or appears to have, access to a production network and/or to the global Internet. The software can be executed in a real or an emulated network environment that includes a monitoring component and an emulation component. The monitoring component serves to capture and/or record the behaviors displayed by the software and/or other components of the system, and the emulation component gives the software being analyzed the impression that it is executing with access to a production network and/or to the global Internet. The software being analyzed is effectively confined to the analysis network environment, and cannot in fact read information from, or alter any information on, any production network or the global Internet.
    Type: Grant
    Filed: August 17, 2000
    Date of Patent: December 27, 2005
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton G. Swimmer, Ian N. Whalley, Steve R. White
  • Publication number: 20040122846
    Abstract: A system for providing fact verification for a body of text. The system includes either or both of: a fact-identification arrangement which automatically identifies at least one subset of the body of text potentially containing a fact-based statement; and a fact-verification arrangement which is adapted to automatically consult at least one information source towards determining whether at least one fact contained in a fact-based statement is true or false.
    Type: Application
    Filed: December 19, 2002
    Publication date: June 24, 2004
    Applicant: IBM Corporation
    Inventors: David M. Chess, Sophia Krasikov, John F. Morar, Alla Segal
  • Publication number: 20040117241
    Abstract: A performance-prediction system (10) includes a performance-prediction service (101). The service includes a performance report processor (106) for gathering information that is relevant to predicting future performance of business entities at least partly by receiving reports of experiences that one business entity has had as at least one of a customer of, or a supplier to, another business entity. The service further includes a supply-chain network architect (107) that is responsive at least in part to the gathered information for inferring at least some probable customer/supplier relationships between at least some of the business entities to derive a representation of a supply-chain network.
    Type: Application
    Filed: December 12, 2002
    Publication date: June 17, 2004
    Applicant: International Business Machines Corporation
    Inventors: Sophia Krasikov, David M. Chess, John F. Morar, Senthilnathan Velayudham
  • Publication number: 20040117264
    Abstract: A method and a system provide a service to a customer (101) over a network (102), such as the global Internet, where the service provides the customer access to a database (104). The method includes: (a) receiving a query (101A) from the customer, the query including a query program or an identification of a query program; (b) executing the query program in an environment (103, 105, 106, 107) that permits the query program to access at least a portion of the database while selectively inhibiting transmission of information from the database; and (c) sending a response to the query, where the response includes a predetermined, limited amount of information that is returned as output by the query program. Preferably the amount of information returned in the response to the query is limited to a predetermined number of data units. Sending the response involves examining the information that is returned as output by the query program, and the response is sent only if at least one criterion is satisfied.
    Type: Application
    Filed: December 12, 2002
    Publication date: June 17, 2004
    Applicant: International Business Machines Corporation
    Inventors: David M. Chess, John F. Morar
  • Publication number: 20040019832
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Application
    Filed: July 23, 2002
    Publication date: January 29, 2004
    Applicant: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White