Patents by Inventor Paul T. Baffes
Paul T. Baffes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8229903Abstract: A system and method for utilizing data mining to generate a policy document or to revise theory within a policy document. A data base of unknown events is mined for application to the development of a system management policy document. The results of the data mining of the database of unknown events are automatically incorporated into a policy document, subject to user approval, to produce a new policy document or an updated version of an existing policy document.Type: GrantFiled: December 19, 2002Date of Patent: July 24, 2012Assignee: International Business Machines CorporationInventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
-
Patent number: 7941854Abstract: A method and system for managing an intrusion on a computer by graphically representing an intrusion pattern of a known past intrusion, and then comparing the intrusion pattern of the known intrusion with a current intrusion. The intrusion pattern may either be based on intrusion events, which are the effects of the intrusion or activities that provide a signature of the type of intrusion, or the intrusion pattern may be based on hardware topology that is affected by the intrusion. The intrusion pattern is graphically displayed with scripted responses, which in a preferred embodiment are presented in pop-up windows associated with each node in the intrusion pattern. Alternatively, the response to the intrusion may be automatic, based on a pre-determined percentage of common features in the intrusion pattern of the known past intrusion and the current intrusion.Type: GrantFiled: December 5, 2002Date of Patent: May 10, 2011Assignee: International Business Machines CorporationInventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
-
Patent number: 7702914Abstract: A method for providing access control to a single sign-on computer network is disclosed. A user is assigned to multiple groups within a computer network. In response to an access request by the user, the computer network determines a group pass count based on a user profile of the user. The group pass count is a number of groups in which the access request meets all their access requirements. The computer network grants the access request if the group pass count is greater than a predetermined high group pass threshold value.Type: GrantFiled: April 16, 2008Date of Patent: April 20, 2010Assignee: International Business Machines CorporationInventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
-
Patent number: 7552472Abstract: A system and method for developing network policy document and assuring up-to-date monitoring and automated refinement and classification of the network policy. The system administrator defines an initial policy document that is provided as the initial symbolic classifier. The classification rules remain in human readable form throughout the process. Network system data is fed through the classifier, which labels the data according to whether a policy constraint is violated. The labels are tagged to the data. The user then reviews the labels to determine whether the classification is satisfactory. If the classification of the data is satisfactory, the label is unaltered; However, if the classification is not satisfactory, the data is re-labeled. The re-labeled data is then introduced into a refinement algorithm, which determines what policy must be modified to correct classification of network events in accordance with the re-labeling.Type: GrantFiled: December 19, 2002Date of Patent: June 23, 2009Assignee: International Business Machines CorporationInventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
-
Patent number: 7549166Abstract: A method and system for handling a malicious intrusion to a machine in a networked group of computers. The malicious intrusion is an unauthorized access to the machine, such as a server in a server farm. When the intrusion is detected, the machine is isolated from the rest of the server farm, and the machine is reprovisioned as a decoy system having access to only data that is ersatz or at least non-sensitive. If the intrusion is determined to be non-malicious, then the machine is functionally reconnected to the server farm, and the machine is reprovisioned to a state held before the reprovisioning of the machine as a decoy machine.Type: GrantFiled: December 5, 2002Date of Patent: June 16, 2009Assignee: International Business Machines CorporationInventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading, Ronald S. Woan, John D. Wolpert, Shawn L. Young
-
Publication number: 20080216164Abstract: A method for providing access control to a single sign-on computer network is disclosed. A user is assigned to multiple groups within a computer network. In response to an access request by the user, the computer network determines a group pass count based on a user profile of the user. The group pass count is a number of groups in which the access request meets all their access requirements. The computer network grants the access request if the group pass count is greater than a predetermined high group pass threshold value.Type: ApplicationFiled: April 16, 2008Publication date: September 4, 2008Inventors: PAUL T. BAFFES, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
-
Patent number: 7389430Abstract: A method for providing access control to a single sign-on computer network is disclosed. A user is assigned to multiple groups within a computer network. In response to an access request by the user, the computer network determines a group pass count based on a user profile of the user. The group pass count is a number of groups in which the access request meets all their access requirements. The computer network grants the access request if the group pass count is greater than a predetermined high group pass threshold value.Type: GrantFiled: December 5, 2002Date of Patent: June 17, 2008Assignee: International Business Machines CorporationInventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
-
Publication number: 20080109267Abstract: computer-readable project information is stored in a computing system, such information being obtained from a user at a user computer in response to prompting the user to submit information addressing: (i) a need for a project; (ii) a goal of the project; (iii) a manner in which success of the project will be measured; and (iv) a need for collaboration on the project among participants drawn from outside customary organizational boundaries. To proceed with a project, computer-readable funding information is stored in the computing system which signifies approval of funding for the project. Then, a project definition is generated from at least the computer-readable project information inputted by the user and stored in a first database. Thereafter, information obtained from the stored project definition is displayed to users at user computers for recruiting participants to work on the project.Type: ApplicationFiled: November 2, 2006Publication date: May 8, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Deborah A. DeLosa, Paul T. Baffes, James D. Jamison, Mary M. Keough, Kathleen Purdy, Kathleen M. Walsh
-
Publication number: 20040123145Abstract: A system and method for developing network policy document and assuring up-to-date monitoring and automated refinement and classification of the network policy. The system administrator defines an initial policy document that is provided as the initial symbolic classifier. The classification rules remain in human readable form throughout the process. Network system data is fed through the classifier, which labels the data according to whether a policy constraint is violated. The labels are tagged to the data. The user then reviews the labels to determine whether the classification is satisfactory. If the classification of the data is satisfactory, the label is unaltered; However, if the classification is not satisfactory, the data is re-labeled. The re-labeled data is then introduced into a refinement algorithm, which determines what policy must be modified to correct classification of network events in accordance with the re-labeling.Type: ApplicationFiled: December 19, 2002Publication date: June 24, 2004Applicant: International Business Machines CorporationInventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
-
Publication number: 20040122823Abstract: A system and method for utilizing data mining to generate a policy document or to revise theory within a policy document. A data base of unknown events is mined for application to the development of a system management policy document. The results of the data mining of the database of unknown events are automatically incorporated into a policy document, subject to user approval, to produce a new policy document or an updated version of an existing policy document.Type: ApplicationFiled: December 19, 2002Publication date: June 24, 2004Applicant: International Business Machines Corp.Inventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
-
Publication number: 20040111645Abstract: A method for providing access control to a single sign-on computer network is disclosed. A user is assigned to multiple groups within a computer network. In response to an access request by the user, the computer network determines a group pass count based on a user profile of the user. The group pass count is a number of groups in which the access request meets all their access requirements. The computer network grants the access request if the group pass count is greater than a predetermined high group pass threshold value.Type: ApplicationFiled: December 5, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
-
Publication number: 20040111637Abstract: A method and system for managing an intrusion on a computer by graphically representing an intrusion pattern of a known past intrusion, and then comparing the intrusion pattern of the known intrusion with a current intrusion. The intrusion pattern may either be based on intrusion events, which are the effects of the intrusion or activities that provide a signature of the type of intrusion, or the intrusion pattern may be based on hardware topology that is affected by the intrusion. The intrusion pattern is graphically displayed with scripted responses, which in a preferred embodiment are presented in pop-up windows associated with each node in the intrusion pattern. Alternatively, the response to the intrusion maybe automatic, based on a pre-determined percentage of common features in the intrusion pattern of the known past intrusion and the current intrusion.Type: ApplicationFiled: December 5, 2002Publication date: June 10, 2004Applicant: International Business Machines Corp.Inventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading
-
Publication number: 20040111636Abstract: A method and system for handling a malicious intrusion to a machine in a networked group of computers. The malicious intrusion is an unauthorized access to the machine, such as a server in a server farm. When the intrusion is detected, the machine is isolated from the rest of the server farm, and the machine is reprovisioned as a decoy system having access to only data that is ersatz or at least non-sensitive. If the intrusion is determined to be non-malicious, then the machine is functionally reconnected to the server farm, and the machine is reprovisioned to a state held before the reprovisioning of the machine as a decoy machine.Type: ApplicationFiled: December 5, 2002Publication date: June 10, 2004Applicant: International Business Machines Corp.Inventors: Paul T. Baffes, John Michael Garrison, Michael Gilfix, Allan Hsu, Tyron Jerrod Stading, Ronald S. Woan, John D. Wolpert, Shawn L. Young
-
Patent number: 6292792Abstract: A system and method that includes the use of a knowledge delivery computer program stored in computer-readable form on a tangible storage medium for delivering concepts from a configuration data base to a user. An author can create the configuration data base using the knowledge delivery computer program so that the configuration includes a plurality of concepts and, optionally, a plurality of problems associated with the concepts. As the author creates the concepts within the configuration, the knowledge delivery software allows the author to create a taxonomy that defines the relationships between the concepts. The knowledge delivery software can then automatically generate a pedagogy for the configuration based on the configuration taxonomy that defines how the concepts will be delivered to the user. The knowledge delivery software can facilitate the delivery of the content within the configuration to a user according to the pedagogy.Type: GrantFiled: March 26, 1999Date of Patent: September 18, 2001Assignee: Intelligent Learning Systems, Inc.Inventors: Paul T. Baffes, Siddarth Subramanian, Shane V. Nugent
-
Patent number: 5311422Abstract: A training system for use in a wide variety of training tasks and environments comprising a user interface simulating the same information available to a trainee in the task environment which allows the trainee to assert actions to the system; a domain expert which can use the same information available to the trainee and carry out the same task; a training session manager for evaluating such trainee assertions and providing guidance to the trainee appropriate to his acquired skill level; a trainee model which contains a history and summary of the trainee actions; an intelligent training scenario generator for designing increasingly complex training exercises based on the current skill level and any weaknesses or deficiencies that the trainee has exhibited in previous interactions; and a blackboard that provides a common fact base for communication between the other components of the system. The domain expert contains a list of "mal-rules" which typifies errors usually made by novice trainees.Type: GrantFiled: June 28, 1990Date of Patent: May 10, 1994Assignee: The United States of America as represented by the Administrator of the National Aeronautics and Space AdministrationInventors: R. Bowen Loftin, Lui Wang, Paul T. Baffes, Grace C. Hua
-
Patent number: 4920487Abstract: In a parallel processing computer system with multiple processing units and shared memory, a method is disclosed for uniformly balancing the aggregate computational load in, and utilizing a minimal memory by, a network having identical computations to be executed at each connection therein. Read-only and read-write memory are subdivided into a plurality of partitions, and the computational load is subdivided into a plurality of process sets, which function like artificial processing units. Said plurality of process sets is iteratively merged and reduced to the number of processing units without exceeding the balance load. Merger is based upon the value of a partition threshold, which is a measure of the memory utilization. The turnaround time and memory savings of the instant method are functions of the number of processing units available and the number of partitions into which memory is subdivided.Type: GrantFiled: December 12, 1988Date of Patent: April 24, 1990Assignee: The United States of America as represented by the Administrator of the National Aeronautics and Space AdministrationInventor: Paul T. Baffes