Patents by Inventor Neil A. Katz

Neil A. Katz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20050076103
    Abstract: A method, system and machine readable storage for creating user groups in a network environment. The method includes the step of monitoring a plurality of user sessions, each associated with a different user. At least one affinity among the user sessions can be identified. Responsive to the affinity identification, at least one action can be initiated, for example, presenting a user interface to at least one of the users and/or prompting users to engage in communication.
    Type: Application
    Filed: September 22, 2003
    Publication date: April 7, 2005
    Applicant: International Business Machines Corporation
    Inventors: Bill Hilf, Neil Katz
  • Publication number: 20050071448
    Abstract: A method for provisioning one or more mobile applications. The method including deploying the mobile application as a web service in a UDDI directory, downloading the mobile applications from the UDDI directory by invoking the web service. The method may also include locating the mobile application in the UDDI directory. The method further includes extending a WSDL template to define the mobile application, wherein the extending provides for wrapping the mobile application as the web service, and publishing the WSDL defined mobile application in the UDDI directory.
    Type: Application
    Filed: September 29, 2003
    Publication date: March 31, 2005
    Applicant: International Business Machines Corporation
    Inventors: Neil Katz, James McConnell, IIan Paleiov, Roni Ram, Pnina Vortman
  • Publication number: 20050066025
    Abstract: A method for evaluating system behavior of an application domain within a grid environment can include the step of identifying a host software object within the application domain. A software object can be associated with the host software object. Within the associated software object, host actions can be replicated. Replicated actions can be recorded. The host software object can move from one grid within the grid environment to a different grid. The associated software object can responsively move within the grid environment in accordance with movement of the host software object.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050065992
    Abstract: One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20050066310
    Abstract: A method for debugging software objects within a grid environment including the step identifying a host, wherein the host is a software object. A ghost agent can be associated with the host. The ghost agent can replicate actions executed by the host. The host can be debugged based upon the replicated actions. The ghost agent can move from one grid within the grid environment to another grid.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050065803
    Abstract: A method for supporting an application can include the step of receiving a problem indication relating to the application. The method can also identify a host within a grid environment, wherein a host can be a software object used by said application. A ghost agent can be associated with the host. The actions of the host can be replicated for use by the ghost agent. Data relating to the replicated actions can be recorded using the ghost agent. The indicated problem can be responded to, where the response can be based at least in part upon the recorded data.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20050065766
    Abstract: A testing method including the step of identifying multiple hosts located within multiple grids of a grid environment, wherein each host is a software object. A ghost agent can be associated with each identified host. Actions of the host can be replicated within each ghost agent. Data relating to the replicated actions can be recorded. Test input can be generated from the recorded data. Tests can be conducted within the grid environment using the test input.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050065994
    Abstract: A method for restricting resources consumed by a ghost agent can include the step of registering a ghost agent within a domain. The ghost agent can move across domains of a grid environment responsive to movements of an associated host. Once registered, a containment policy for the domain can be received by the ghost agent. The ghost agent can be configured according to the received containment policy. The containment policy can be utilized to restrict resources that are available to the ghost agent.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20050050138
    Abstract: A method for serving applications including receiving a component status publication and acquiring a client request. The component status publication can specify a usage level for an application component. A server response for the client request can be selected from among a multitude of possible server responses based at least in part upon the component status publication. Each possible server response can differentially utilize application components. The client request can be response to by conveying the selected server response.
    Type: Application
    Filed: September 3, 2003
    Publication date: March 3, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050050139
    Abstract: A method of handling requests can include the step of handling requests with a handler. An overload condition can be detected for said handler. Requests can be directed to an alternative handler. A return timer can be initialized. When the return timer exceeds a time threshold for the alternative handler, requests can be routed to the handler. The time threshold can be automatically adjusted based upon a time in which the handler handles requests.
    Type: Application
    Filed: September 3, 2003
    Publication date: March 3, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20040143550
    Abstract: A method of conducting commerce within a portable, wireless computing device can include storing an identifier specifying a cellular communications channel and receiving a user input specifying financial transaction information. The identifier and the financial transaction information can be provided to a receiving device over a short range, wireless communications link to initiate the financial transaction. An authorization code can be received via the cellular communications channel specified by the identifier. The authorization code can indicate whether the financial transaction was approved.
    Type: Application
    Filed: December 19, 2002
    Publication date: July 22, 2004
    Applicant: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Neil A. Katz, Victor S. Moore, Scott L. Winters
  • Publication number: 20040120486
    Abstract: A method for implementing a remote receiver connected to a telephony network can include a call authorizer that can access remote receiver specific information, wherein the remote receiver specific information can include an authorization requirement. The call authorizer can receive a digitally encoded signal specifying an authorization code. Prior to a telephony connection being established between the remote receiver and an originating device, the call authorizer can determine whether the authorization code satisfies the authorization requirement. Responsive to this determination, the call authorizer can send a ringing signal via the telephone line to the remote receiver. The remote receiver can power an actuator within the remote receiver with a voltage from the ringing signal. The actuator can activate a device controlled by the remote receiver.
    Type: Application
    Filed: December 20, 2002
    Publication date: June 24, 2004
    Applicant: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Peeyush Jaiswal, Neil A. Katz, Victor S. Moore
  • Publication number: 20040120015
    Abstract: A method for conveying digital information can include initiating a telephone connection to a receiving device. Prior to establishing a voice channel connection with the receiving device, supplemental data can be digitally encoded into a CNG transmission. The CNG transmission can be conveyed via a CNG channel, wherein the CNG channel is capable of transporting a facsimile calling tone signal.
    Type: Application
    Filed: December 20, 2002
    Publication date: June 24, 2004
    Applicant: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Peeyush Jaiswal, Neil A. Katz, Victor S. Moore
  • Publication number: 20040121759
    Abstract: A method for providing call authorization within a telephony network can include receiving a telephony connectivity request for establishing a telephony voice channel between the originating device and a receiving device. The specified receiving device can be determined and receiving device specific information that includes an authorization requirement can be accessed. A connection between the originating device and the receiving device can be established responsive to whether the authorization code satisfies the authorization requirement.
    Type: Application
    Filed: December 20, 2002
    Publication date: June 24, 2004
    Applicant: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Peeyush Jaiswal, Neil A. Katz, Victor S. Moore
  • Publication number: 20040122687
    Abstract: A method of providing wireless local area network providers with subscriber administration services can include receiving from a processing node in a wireless local area network a request through a gateway interface for approval for a subscriber to access the wireless local area network. The request can specify subscriber identifying information. A determination can be made as to whether the subscriber is approved to access the wireless local area network using the subscriber identifying information by querying a telecommunications subscriber data store. The processing node of the wireless local area network can be notified of the determination results through the gateway interface. If the subscriber is approved, a record of the wireless session can be stored in a session data store.
    Type: Application
    Filed: December 19, 2002
    Publication date: June 24, 2004
    Applicant: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Neil A. Katz, Victor S. Moore
  • Publication number: 20040122737
    Abstract: Within a wireless computing device, a method of conducting commerce can include receiving a user input in the wireless computing device specifying an account to which a proposed transaction is to be billed and identifying contact information for a billing entity according to the user specified account. The billing entity can manage the account. An authorization can be requested from the billing entity via a wireless communications link established using the contact information. The method also can include receiving the authorization from the billing entity via the wireless communications link, generating a visual image which identifies the billing entity and represents the authorization received from the billing entity, and presenting the visual image upon the display screen of the wireless computing device. Accordingly, a visual image reader can read the displayed visual image.
    Type: Application
    Filed: December 19, 2002
    Publication date: June 24, 2004
    Applicant: International Business Machines Corporation
    Inventors: Joseph Celi, Thomas E. Creamer, Neil A. Katz, Victor S. Moore
  • Publication number: 20040120493
    Abstract: A method for providing dynamic ringback services can include receiving a connection signal from an originating device and determining a receiving device specified by the connection signal. The method can access receiving device specific information and can dynamically generate a ringback transmission responsive to at least a portion of the receiving device specific information. The method can send this ringback transmission to the originating device before a connection is established between the originating device and the receiving device.
    Type: Application
    Filed: December 20, 2002
    Publication date: June 24, 2004
    Applicant: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Peeyush Jaiswal, Neil A. Katz, Victor S. Moore
  • Publication number: 20040123143
    Abstract: A server (115) having a communication link comprises an application execution environment, a random IP address generator application (135) executing within the application execution environment of the server to randomly select (205) an IP address, a communications interface configured to send outbound data or to receive inbound data thereby establishing the communications link in coordination with the random IP address generator application and a processor (150). Preferably, the processor is programmed to receive a request from a client (112 or 114) and process the request if an IP address randomly selected at the client synchronously matches the randomly selected IP address at the server. Additionally, the processor can be further programmed to ignore the request from the client if the IP address randomly selected at the client fails to synchronously match the randomly selected IP address at the server.
    Type: Application
    Filed: December 19, 2002
    Publication date: June 24, 2004
    Applicant: International Business Machines Corporation
    Inventors: Neil A. Katz, Victor S. Moore
  • Publication number: 20040120479
    Abstract: A method for receiving and presenting interactive voice response data can include sending a telephony connectivity request for establishing a voice channel connection between an originating device and a interactive voice response system. Prior to establishing the voice channel connection, an interactive voice response menu associated with said interactive voice response system can be received via a ringback channel. At least a portion the interactive voice response menu can be presented to a user of the originating device.
    Type: Application
    Filed: December 20, 2002
    Publication date: June 24, 2004
    Applicant: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Peeyush Jaiswal, Neil A. Katz, Victor S. Moore
  • Publication number: 20040122771
    Abstract: Using a portable device, a method of conducting commerce can include executing within the portable device an application configured to communicate with an automated teller machine by displaying graphic symbols. A user input specifying transaction information which can include at least a personal identification code for a transaction can be received. The method further can include generating a graphic symbol specifying the transaction information and displaying the graphic symbol upon a display screen of the portable device. Accordingly, a graphic symbol reader of an automated teller machine can read the graphic symbol and process the transaction.
    Type: Application
    Filed: December 19, 2002
    Publication date: June 24, 2004
    Applicant: International Business Machines Corporation
    Inventors: Joseph Celi, Thomas E. Creamer, Neil A. Katz, Victor S. Moore