Patents by Inventor John Reumann

John Reumann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080226047
    Abstract: A caller verification system and method include generating a challenge to be sent to a caller which requires a response from the caller prior to accepting a call. A response or lack thereof is determined from the caller, and the response is analyzed relative to an acceptable response to determine whether the caller is acceptable to communicate with. If the caller is acceptable, the call may be accepted.
    Type: Application
    Filed: June 2, 2008
    Publication date: September 18, 2008
    Inventors: John Reumann, Debanjan Saha, Zon-Yin Shae, Kunwadee Sripanidkulchai
  • Publication number: 20080222704
    Abstract: Techniques are provided for computer network security. The techniques include obtaining operational data for at least a first networked application; obtaining enterprise data for at least a second networked application; correlating the operational data with the enterprise data to obtain correlated data; and using the correlated data to improve security of the computer network.
    Type: Application
    Filed: May 19, 2008
    Publication date: September 11, 2008
    Applicant: International Business Machines Corporation
    Inventors: John Reumann, Dinesh C. Verma
  • Publication number: 20080172741
    Abstract: Techniques are provided for detecting computer fraud. The techniques include obtaining a text version of a candidate destination and a graphical rendering of the candidate destination, comparing the text version of the candidate destination and the graphical rendering of the candidate destination with a corresponding text version of a stored destination and a corresponding graphical rendering of the stored destination, and generating a fraud warning if the graphical rendering of the candidate destination is substantially similar to the graphical rendering of the stored destination while the text version of the candidate destination differs substantially from the corresponding text version of the stored destination.
    Type: Application
    Filed: January 16, 2007
    Publication date: July 17, 2008
    Applicant: International Business Machines Corporation
    Inventors: John Reumann, Dinesh C. Verma
  • Publication number: 20080163207
    Abstract: A method (and system) which provides virtual machine migration with filtered network connectivity and control of network security of a virtual machine by enforcing network security and routing at a hypervisor layer at which the virtual machine partition is executed, and which is independent of guest operating systems.
    Type: Application
    Filed: January 3, 2007
    Publication date: July 3, 2008
    Applicant: International Business Machines Corporation
    Inventors: John Reumann, Debanjan Saha, Sambit Sahu, Dinesh Chandra Verma
  • Publication number: 20080162688
    Abstract: A proactive problem resolution system, method of proactive problem resolution and program product therefor. User sensors extract data from user interaction with a computer terminal and pass extracted data to a sniffer agent. The sniffer agent checks for an indication of a user problem by comparing user behavior data against behavior data from previously encountered problems. When the sniffer finds a match, the computer terminal user may be asked if assistance is needed or the user may be automatically referred to the help desk. If a solution already exists for a problem that corresponds to the user behavior, that solution(s) is(are) presented at the computer terminal. Computer terminal users automatically receive problem support, even before it would otherwise be requested.
    Type: Application
    Filed: January 3, 2007
    Publication date: July 3, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John Reumann, Debanjan Saha
  • Publication number: 20080114863
    Abstract: A method of, and system for, configuring a network infrastructure, which includes representing the network infrastructure as a composition of a predetermined number of functional building blocks, configuring a network blue print based on the predetermined number of functional building blocks, and mapping the predetermined number of functional building blocks onto available physical resources of the network infrastructure, such that network configuration can be automated for a wide set of services representing network configuration as a functional composition of elemental blocks.
    Type: Application
    Filed: November 15, 2006
    Publication date: May 15, 2008
    Applicant: International Business Machines Corporation
    Inventors: Michael E. Baskey, Lap Thiet Huynh, John Reumann, Debanjan Saha, Sambit Sahu, Dinesh Chandra Verma
  • Publication number: 20080047019
    Abstract: Techniques are provided for computer network security. The techniques include obtaining operational data for at least a first networked application; obtaining enterprise data for at least a second networked application; correlating the operational data with the enterprise data to obtain correlated data; and using the correlated data to improve security of the computer network.
    Type: Application
    Filed: August 16, 2006
    Publication date: February 21, 2008
    Applicant: International Business Machines Corporation
    Inventors: John Reumann, Dinesh C. Verma
  • Publication number: 20070165811
    Abstract: A caller verification system and method include generating a challenge to be sent to a caller which requires a response from the caller prior to accepting a call. A response or lack thereof is determined from the caller, and the response is analyzed relative to an acceptable response to determine whether the caller is acceptable to communicate with. If the caller is acceptable, the call may be accepted.
    Type: Application
    Filed: January 19, 2006
    Publication date: July 19, 2007
    Inventors: John Reumann, Debanjan Saha, Zon-Yin Shae, Kunwadee Sripanidkulchai
  • Publication number: 20020138643
    Abstract: A method and system for controlling network traffic to a network computer such as a server is provided wherein such control is provided based on a measured capacity of the server to service the network traffic and rule data which represents different policies for servicing the network traffic. A load-controller of the system installs more or less restrictive packet or request filtering policies based on the capacity of the server to throttle the traffic to the server. The method and system are sensitive to the actual capacity of the server by adopting this adaptive traffic-shaping feature instead of using rigid policies to control resource usage on the server.
    Type: Application
    Filed: October 18, 2001
    Publication date: September 26, 2002
    Inventors: Kang G. Shin, Hani Jamjoom, John Reumann