Patents by Inventor Sebnem Jaji

Sebnem Jaji has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8863278
    Abstract: A method, apparatus, and article of manufacture are provided to support security in a distributed grid computer cluster. Each non-node root node in the cluster is configured with a local security agent, and the root node is configured with a security controller to manage each of the security agents of each non-root node. The security agent of each non-root node is in communication with an associated configuration file that contains data private to the respective non-root node, to allow the security agent to manage security local to the node. The security controller of the root node is in communication with a controller configuration file that contains data that applies to all security agents in the grid cluster, to allow the controller to manage the security agents.
    Type: Grant
    Filed: May 28, 2008
    Date of Patent: October 14, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ramesh V. Chitor, Sebnem Jaji, Nam S. Keung, Michel P. Riviere, Christopher J. Strauss
  • Patent number: 7954160
    Abstract: An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events.
    Type: Grant
    Filed: September 16, 2009
    Date of Patent: May 31, 2011
    Assignee: International Business Machines Corporation
    Inventors: Christopher P. Strauss, Sebnem Jaji, Ramesh V. Chitor, Nam Keung
  • Patent number: 7667618
    Abstract: A system includes one or more transponders, a number of sensors, a tracking sub-system, and a billing sub-system. Each transponder is located in a vehicle capable of being driven on a road having at least a first lane and a second lane in which vehicles move in a same direction. Each sensor is movably located at a point along the road to detect the transponder of each vehicle that has changed between the first and the second lanes at the point. The tracking system is communicatively coupled to the sensors to track when and at which of the points the vehicles have changed between the first and the second lanes. The billing system is to periodically bill users of the vehicles based on when and where the vehicles are driven in the second lane of the road.
    Type: Grant
    Filed: April 22, 2007
    Date of Patent: February 23, 2010
    Assignee: International Business Machines Corporation
    Inventors: Ramesh Chitor, Christopher J. Strauss, Nam Keung, Sebnem Jaji
  • Patent number: 7657939
    Abstract: An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events.
    Type: Grant
    Filed: March 14, 2005
    Date of Patent: February 2, 2010
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Strauss, Sebnem Jaji, Ramesh V. Chitor, Nam Keung
  • Publication number: 20100011440
    Abstract: An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events.
    Type: Application
    Filed: September 16, 2009
    Publication date: January 14, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Strauss, Sebnem Jaji, Ramesh V. Chitor, Nam Keung
  • Publication number: 20090300760
    Abstract: A method, apparatus, and article of manufacture are provided to support security in a distributed gird computer cluster. Each non-node root node in the cluster is configured with a local security agent, and the root node is configured with a security controller to manage each of the security agents of each non-root node. The security agent of each non-root node is in communication with an associated configuration file that contains data private to the respective non-root node, to allow the security agent to manage security local to the node. The security controller of the root node is in communication with a controller configuration file that contains data that applies to all security agents in the grid cluster, to allow the controller to manager the security agents.
    Type: Application
    Filed: May 28, 2008
    Publication date: December 3, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ramesh V. Chitor, Sebnem Jaji, Nam S. Keung, Michel P. Riviere, Christopher J. Strauss
  • Publication number: 20090112352
    Abstract: A storage medium including a method of modeling yield for semiconductor products includes determining expected faults for each of a plurality of library elements by running a critical area analysis on each of the library elements, and assessing, from the critical area analysis, an expected number of faults per unit area, and comparing the same to actual observed faults on previously manufactured semiconductor products. Thereafter, the expected number of faults for each library element is updated in response to observed yield. A database is established, which includes the die size and expected faults for each of the library elements. Integrated circuit product die size is estimated, and library elements to be used to create the integrated circuit die are selected. Fault and size data for each of the selected library elements are obtained, the adjusted estimated faults for each of the library elements are summed, and estimated yield is calculated.
    Type: Application
    Filed: January 5, 2009
    Publication date: April 30, 2009
    Applicant: International Business Machines Corporation
    Inventors: Thomas S. Barnett, Jeanne P. Bickford, William Y. Chang, Rashmi D. Chatty, Sebnem Jaji, Kerry A. Kravec, Wing L. Lai, Gie Lee, Brian M. Trapp, Alan J. Weger
  • Patent number: 7477961
    Abstract: A method of modeling yield for semiconductor products includes determining expected faults for each of a plurality of library elements by running a critical area analysis on each of the library elements, and assessing, from the critical area analysis, an expected number of faults per unit area, and comparing the same to actual observed faults on previously manufactured semiconductor products. Thereafter, the expected number of faults for each library element is updated in response to observed yield. A database is established, which includes the die size and expected faults for each of the library elements. Integrated circuit product die size is estimated, and library elements to be used to create the integrated circuit die are selected. Fault and size data for each of the selected library elements are obtained, the adjusted estimated faults for each of the library elements are summed, and estimated yield is calculated.
    Type: Grant
    Filed: May 12, 2006
    Date of Patent: January 13, 2009
    Assignee: International Business Machines Corporation
    Inventors: Thomas S. Barnett, Jeanne P. Bickford, William Y. Chang, Rashmi D. Chatty, Sebnem Jaji, Kerry A. Kravec, Wing L. Lai, Gie Lee, Brian M. Trapp, Alan J. Weger
  • Publication number: 20080258936
    Abstract: A system includes one or more transponders, a number of sensors, a tracking sub-system, and a billing sub-system. Each transponder is located in a vehicle capable of being driven on a road having at least a first lane and a second lane in which vehicles move in a same direction. Each sensor is movably located at a point along the road to detect the transponder of each vehicle that has changed between the first and the second lanes at the point. The tracking system is communicatively coupled to the sensors to track when and at which of the points the vehicles have changed between the first and the second lanes. The billing system is to periodically bill users of the vehicles based on when and where the vehicles are driven in the second lane of the road.
    Type: Application
    Filed: April 22, 2007
    Publication date: October 23, 2008
    Inventors: Ramesh V. Chitor, Christopher J. Strauss, Nam Keung, Sebnem Jaji
  • Publication number: 20070265722
    Abstract: A method of modeling yield for semiconductor products includes determining expected faults for each of a plurality of library elements by running a critical area analysis on each of the library elements, and assessing, from the critical area analysis, an expected number of faults per unit area, and comparing the same to actual observed faults on previously manufactured semiconductor products. Thereafter, the expected number of faults for each library element is updated in response to observed yield. A database is established, which includes the die size and expected faults for each of the library elements. Integrated circuit product die size is estimated, and library elements to be used to create the integrated circuit die are selected. Fault and size data for each of the selected library elements are obtained, the adjusted estimated faults for each of the library elements are summed, and estimated yield is calculated.
    Type: Application
    Filed: May 12, 2006
    Publication date: November 15, 2007
    Applicant: International Business Machines Corporation
    Inventors: Thomas Barnett, Jeanne Bickford, William Chang, Rashmi Chatty, Sebnem Jaji, Kerry Kravec, Wing Lai, Gie Lee, Brian Trapp, Alan Weger
  • Publication number: 20060206940
    Abstract: An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events.
    Type: Application
    Filed: March 14, 2005
    Publication date: September 14, 2006
    Inventors: Christopher Strauss, Sebnem Jaji, Ramesh Chitor, Nam Keung
  • Patent number: 6119151
    Abstract: A cache manager efficiently supporting both connected and disconnected client operation. A single integrated cache is maintained for file system data, status and pathname information. File system requests are satisfied by the cache if possible and passed to a remote file system for servicing if necessary. The cache manager is independent of operating system file syntax and distributed file system protocol. Disconnected operation is supported through an aggressive caching policy and by logging of file system modifications. Modification logs are created when the client is disconnected by logging objects that optimize the log as it is created. Cache file system objects can have multiple parents each with different naming syntax because the object name is not cached.
    Type: Grant
    Filed: March 7, 1994
    Date of Patent: September 12, 2000
    Assignee: International Business Machines Corp.
    Inventors: Thomas George Cantrell, Sebnem Jaji, Amal Ahmed Shaheen, Richard Byron Ward
  • Patent number: 5832218
    Abstract: An electronic mail (E-Mail) server system is disclosed that is used within a client/server network system. Typically, the network system includes at least one client connected to a server. The E-Mail server system comprises a mail server, a client mail server, located within the client, and a log manager. The mail server, which is located within the server of the client/server network system, provides a plurality of E-Mail functions accessible across the client/server network system. The client mail server access the mail server and invokes the mail server to copy selected ones of a plurality of the E-Mail functions in the client mail server to enable the client to perform E-Mail composing while in a disconnected state from the mail server. The log manager logs all E-Mail activity performed by the user on the client while in the disconnected state and then performs reconnection and resynchronization between the client and server for replaying the logged activity for execution by the mail server.
    Type: Grant
    Filed: December 14, 1995
    Date of Patent: November 3, 1998
    Assignee: International Business Machines Corporation
    Inventors: Robert Gibbs, Sebnem Jaji