Patents by Inventor Robert R. Friedlander

Robert R. Friedlander has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160371621
    Abstract: An invention for comparing utility and warranty of services in an information (IT) stack is provided. Embodiments of this invention are directed to comparing utility and warranty of services in an information technology (IT) stack comprising a plurality of layers, at least one of the plurality of layers having a set of services. In these embodiments, a utility and warranty tool provides this capability. Specifically, the utility and warranty tool comprises a determination component configured to determine, at each layer of the IT stack, a required utility and warranty (RUW) value for each of the set of services, wherein the RUW value represents a desired solution for implementing a business process; and determine, at each layer of the IT stack, an available utility and warranty (AUW) value for each of the set of services, wherein the AUW value is a measure of an ability of each of the set of services to satisfy the RUW at each layer of the IT stack.
    Type: Application
    Filed: September 6, 2016
    Publication date: December 22, 2016
    Inventors: Robert L. Angell, Timothy Durniak, Robert R. Friedlander, James R. Kraemer
  • Patent number: 9516021
    Abstract: A smart card includes a processing circuit, a memory that contains a protected object, an activity detector that receives a signal that describes a planned activity of a person who is in physical possession of the smart card, and an activity analyzer that evaluates features of the planned activity. In response to the activity analyzer determining that a predefined risk associated with the planned activity exceeds a predetermined value, the activity analyzer issues an instruction to a user to provide a biomarker to a biosensor. A blending logic blends real-time biometric data with a security object to generate a hybrid security object. A conversion logic uses the hybrid security object to convert a protected object into a usable object that can be utilized by the processing circuit within the smart card. A matrix barcode generator generates a matrix barcode that contains information about the user of the smart card.
    Type: Grant
    Filed: November 19, 2015
    Date of Patent: December 6, 2016
    Assignee: International Business Machines Corporation
    Inventors: Richard H. Boivie, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Publication number: 20160352762
    Abstract: A method, system, and/or computer program product probabilistically detects a low intensity threat event against an attack surface. A notification of disparate anomalies experienced by each of multiple attack surfaces is received. The disparate anomalies occur over an extended period of time that exceeds a maximum threshold time period required to identify a high intensity attack against one or more of the multiple attack surfaces. A synthetic event that includes all of the disparate anomalies experienced by the multiple attack surfaces is generated. In response to receiving a notification that the at least one particular attack surface is experiencing a predefined quantity of the disparate anomalies found in the synthetic event, an alert that a malicious attack is being attempted against one or more attack surfaces is generated.
    Type: Application
    Filed: May 26, 2015
    Publication date: December 1, 2016
    Inventors: Robert R. Friedlander, James R. Kraemer, Jeb R. Linton, Christopher M. Poulin
  • Publication number: 20160335449
    Abstract: A computer system securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data, including a time window for receipt and security level of the requester, is received by the computer system for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object, the first synthetic context-based object, and the security level of the requester, then the data is returned to the requester by the computer system.
    Type: Application
    Filed: July 29, 2016
    Publication date: November 17, 2016
    Inventors: Samuel S. ADAMS, Robert R. FRIEDLANDER, James R. KRAEMER, Jeb R. LINTON
  • Publication number: 20160335573
    Abstract: A processor marks non-linear attributes of each member of a known cohort by marking fields associated with the non-linear attributes in a database used to store information about members of the known cohort, where the known cohort is a task directed community that has a known agenda, where each of the non-linear attributes is individually unrelated to the known agenda, and where there is no logical nexus between any of the non-linear attributes and a particular person's membership in the known cohort. The processor utilizes marked fields in the database to identify common non-linear attributes that are shared by multiple members of the known cohort, and defines a paradigmatic member of the known cohort. The processor maps and tags the paradigmatic member in the database for future retrieval.
    Type: Application
    Filed: July 25, 2016
    Publication date: November 17, 2016
    Inventors: ROBERT R. FRIEDLANDER, JAMES R. KRAEMER
  • Patent number: 9483746
    Abstract: An invention for comparing utility and warranty of services in an information (IT) stack is provided. The invention determines, at each layer of the IT stack, a required utility and warranty (RUW) value for each of a set of services, wherein the RUW value represents a desired solution for implementing a business process; determines, at each layer of the IT stack, an available utility and warranty (AUW) value for each of the set of services, wherein the AUW value is a measure of an ability of each of the set of services to satisfy the RUW at each layer of the IT stack; and compares the RUW value against the AUW value at each layer of the IT stack to determine whether each of the set of services satisfies the desired solution for implementing the business process.
    Type: Grant
    Filed: November 2, 2009
    Date of Patent: November 1, 2016
    Assignee: International Business Machines Corporation
    Inventors: Robert L. Angell, Timothy Durniak, Robert R. Friedlander, James R. Kraemer
  • Patent number: 9483613
    Abstract: A computer implemented method, apparatus, and computer program product of determining mechanisms of action for therapies. A first set of brain scans for each subject in a plurality of subjects generated at a first time period and a second set of brain scans for each subject generated at a second time period are received. Each subject is diagnosed with a given condition and received a given therapy. A set of changes in the set of brain scans is identified for the each subject based on a comparison of a first set of regions of interest in the first set of scans for each subject with a second set of regions of interest in the second set of scans for each subject. A set of typical changes attributable to the given therapy is identified. A mechanism of action for the given therapy is generated based on the set of typical changes.
    Type: Grant
    Filed: September 16, 2015
    Date of Patent: November 1, 2016
    Assignee: International Business Machines Corporation
    Inventors: Joanna L. Fueyo, Robert L. Angell, Robert R. Friedlander, James R. Kraemer
  • Patent number: 9477844
    Abstract: A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data, including a time window for receipt and security level of the requester, is received by a security module for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object, the first synthetic context-based object, and the security level of the requester, then the data is returned to the requester.
    Type: Grant
    Filed: October 28, 2014
    Date of Patent: October 25, 2016
    Assignee: International Business Machines Corporation
    Inventors: Samuel S. Adams, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Patent number: 9477845
    Abstract: A method, system, and/or computer program product enables secure debugging of a software application. A first computer receives a secure software application from a second computer. Access to data used by the secure software application is protected by a security object, which allows a processor to access the data used by the secure software application without permitting data to exit unprotected from the processor. The first computer receives from the second computer an encrypted secure sidecar debugging application that is designed to debug the secure software application. In response to detecting an error in execution of the secure software application within the first computer, the first computer transmits the secure software application and the secure sidecar debugging application to the second computer, such that the second computer is enabled to decrypt the secure sidecar debugging application and to debug the secure software application.
    Type: Grant
    Filed: December 2, 2015
    Date of Patent: October 25, 2016
    Assignee: International Business Machines Corporation
    Inventors: Richard H. Boivie, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Publication number: 20160299962
    Abstract: A processor-implemented method, system, and/or computer program product measures and displays facets in context-based conformed dimensional data gravity wells. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane. Data from the multiple context-based conformed dimensional data gravity wells then populates nodes in a data model. A displayed appearance of the particular context-based conformed dimensional data gravity well is dynamically adjusted according to how many parsed synthetic context-based objects are pulled into the particular context-based conformed dimensional data gravity well.
    Type: Application
    Filed: June 23, 2016
    Publication date: October 13, 2016
    Inventors: SAMUEL S. ADAMS, ROBERT R. FRIEDLANDER, JAMES R. KRAEMER, JEB R. LINTON
  • Patent number: 9459912
    Abstract: A computer-implemented method, system, and/or computer program product controls access to computer resources used by a computer application. One or more processors fractionate a computer application into disparate components. Two or more of the disparate components are assigned to different communication pathways, where the different communication pathways lead to requisite resources needed to execute the disparate components. One or more processors create and install a virtual machine within at least one of the different communication pathways, such that the virtual machine controls access to a particular requisite resource by a particular disparate component. One or more processors then issue a resource retrieval instruction to retrieve the particular requisite resource via the virtual machine and at least one of the different communication pathways.
    Type: Grant
    Filed: June 24, 2015
    Date of Patent: October 4, 2016
    Assignee: International Business Machines Corporation
    Inventors: Timothy Durniak, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Patent number: 9460200
    Abstract: A computer hardware-implemented method, system, and/or computer program product generate an activity recommendation based on an identified non-synthetic event element in an electronic file. A context-based search of a database of electronic files is performed to identify a common synthetic event in all of the electronic files, where the synthetic event is a non-executable descriptor of a set of context-related factors. Each electronic file that contains the common synthetic event is a relevant electronic file. Each of the relevant electronic files are searched for at least one non-synthetic event element, wherein the non-synthetic event element is an event element that is absent from the synthetic event. A recommendation, based on the identified non-synthetic event element, is generated. A set of binary data, which includes the synthetic event, the relevant electronic file, the non-synthetic event element, and the recommendation, is then transmitted to a client.
    Type: Grant
    Filed: July 2, 2012
    Date of Patent: October 4, 2016
    Assignee: International Business Machines Corporation
    Inventors: Robert R. Friedlander, James R. Kraemer, Josko Silobrcic
  • Patent number: 9460393
    Abstract: A method, a system and a computer program product for determining whether a change in value of a data item relating to an entity being tracked within a cohort is statistically and contextually significant. A computer captures a plurality data items relating to the entity being tracked at a time N+1. The value of the data item at time N+1 is compared to a value of a historical data item at time N. If the value of the data item at time N+1 is different from the value of the historical data item at time N, determining that a change has occurred. If a change in a data item has occurred, determining whether the change in the data item is related to the entity being tracked is statistically and contextually significant in n space on multiple dimensions.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: October 4, 2016
    Assignee: International Business Machines Corporation
    Inventors: Robert R. Friedlander, James R. Kraemer
  • Patent number: 9449073
    Abstract: A processor-implemented method, system, and/or computer program product measures and displays facets in context-based conformed dimensional data gravity wells. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane. Data from the multiple context-based conformed dimensional data gravity wells then populates nodes in a data model. A displayed appearance of the particular context-based conformed dimensional data gravity well is dynamically adjusted according to how many parsed synthetic context-based objects are pulled into the particular context-based conformed dimensional data gravity well.
    Type: Grant
    Filed: April 24, 2015
    Date of Patent: September 20, 2016
    Assignee: International Business Machines Corporation
    Inventors: Samuel S. Adams, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Publication number: 20160266958
    Abstract: A computer hardware-implemented method, system, and/or computer program product prevents a cascading failure in a complex stream computer system causing an untrustworthy output from the complex stream computer system. Multiple upstream subcomponents in a complex stream computer system generate multiple outputs, which are used as inputs to a downstream subcomponent, wherein the multiple upstream subcomponents execute upstream computational processes. An accuracy value is assigned to each of the multiple outputs from the upstream subcomponents, and weighting values are assigned to each of the inputs to the downstream subcomponent. If using the accuracy values and weighting values fails to adjust the downstream subcomponent to meet a predefined trustworthiness level for making a first type of prediction, then a new downstream computational process that produces a different second type of prediction is executed.
    Type: Application
    Filed: May 25, 2016
    Publication date: September 15, 2016
    Inventors: ROBERT R. FRIEDLANDER, JAMES R. KRAEMER, JUSTYNA M. NOWAK, ELIZABETH V. WOODWARD
  • Patent number: 9443211
    Abstract: A computer implemented method, system, and/or computer program product define a paradigmatic member of a known task directed community. Non-linear attributes of each member of the known task directed community having a known agenda are identified. Each of the non-linear attributes is individually unrelated to the known agenda. Common non-linear attributes shared by multiple members of the known task directed community are identified for use in defining the paradigmatic member of the known task directed community.
    Type: Grant
    Filed: October 13, 2010
    Date of Patent: September 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: Robert R. Friedlander, James R. Kraemer
  • Publication number: 20160246884
    Abstract: A processor-implemented method, system, and/or computer program product mitigate subjectively disturbing content. A context-based data gravity wells membrane supports one or more gravity wells, which hold subjectively disturbing synthetic context-based objects made up of a non-contextual data object, a first context object, and a second context object. The first context object defines the non-contextual data object, and the second context object describes how subjectively disturbing content generated by combining the non-contextual data object and the first context object is according to predefined parameters described by the second context object. New content is passed across the context-based data gravity wells membrane.
    Type: Application
    Filed: February 20, 2015
    Publication date: August 25, 2016
    Inventors: Samuel S. Adams, Robert R. Friedlander, James R. Kraemer, Jeb R. Linton
  • Publication number: 20160239742
    Abstract: A computer implemented method, system, and/or computer program product generates deportment and comportment cohorts. Digital sensor data, which is derived by analyzing multimodal sensor data, comprises event metadata which describes a set of events associated with an individual. Descriptive data about the individual is retrieved by data mining a combination of online sources and off-line sources. A set of conduct analysis models is selected based on event metadata and available description data. The event metadata and the description data are analyzed in the set of conduct analysis models to form a deportment and comportment cohort, where the deportment and comportment cohort comprises attributes identifying a demeanor and manner of the individual.
    Type: Application
    Filed: April 27, 2015
    Publication date: August 18, 2016
    Inventors: ROBERT L. ANGELL, ROBERT R. FRIEDLANDER, JAMES R. KRAEMER
  • Patent number: 9417950
    Abstract: A computer hardware-implemented method, system, and/or computer program product prevents a cascading failure in a complex stream computer system causing an untrustworthy output from the complex stream computer system. Multiple upstream subcomponents in a complex stream computer system generate multiple outputs, which are used as inputs to a downstream subcomponent, wherein the multiple upstream subcomponents execute upstream computational processes. Each upstream computational process is examined to determine an accuracy of each identified output. An accuracy value is assigned to each of the multiple outputs from the upstream subcomponents, and weighting values are assigned to each of the inputs to the downstream subcomponent. If using the accuracy values and weighting values fails to adjust the downstream subcomponent to meet a predefined trustworthiness level for making a first type of prediction, then a new downstream computational process that produces a different second type of prediction is executed.
    Type: Grant
    Filed: July 15, 2015
    Date of Patent: August 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Robert R. Friedlander, James R. Kraemer, Justyna M. Nowak, Elizabeth V. Woodward
  • Publication number: 20160217185
    Abstract: A computer system includes processors that execute instructions stored on storage media to sort data using a data gravity well membrane. When executed, the program instructions: convert raw data into a first logical address that describes metadata about a first payload data; compare the first logical address to a second logical address for a second payload data to derive a Hamming distance between the first and second logical addresses; create a data vector for the second payload data that includes the Hamming distance between the first and second logical addresses; sort data vectors into specific data gravity wells on a data gravity wells membrane according to the Hamming distance stored in the data vector; incorporate a context object and a non-contextual data object into the data vector for the second payload data; and sort the second payload data into specific data gravity wells on the data gravity wells membrane.
    Type: Application
    Filed: April 1, 2016
    Publication date: July 28, 2016
    Inventors: ROBERT R. FRIEDLANDER, JAMES R. KRAEMER, DAVID M. UNGAR