Patents by Inventor Sebnem Jaji
Sebnem Jaji has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8863278Abstract: A method, apparatus, and article of manufacture are provided to support security in a distributed grid computer cluster. Each non-node root node in the cluster is configured with a local security agent, and the root node is configured with a security controller to manage each of the security agents of each non-root node. The security agent of each non-root node is in communication with an associated configuration file that contains data private to the respective non-root node, to allow the security agent to manage security local to the node. The security controller of the root node is in communication with a controller configuration file that contains data that applies to all security agents in the grid cluster, to allow the controller to manage the security agents.Type: GrantFiled: May 28, 2008Date of Patent: October 14, 2014Assignee: International Business Machines CorporationInventors: Ramesh V. Chitor, Sebnem Jaji, Nam S. Keung, Michel P. Riviere, Christopher J. Strauss
-
Patent number: 7954160Abstract: An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events.Type: GrantFiled: September 16, 2009Date of Patent: May 31, 2011Assignee: International Business Machines CorporationInventors: Christopher P. Strauss, Sebnem Jaji, Ramesh V. Chitor, Nam Keung
-
Patent number: 7667618Abstract: A system includes one or more transponders, a number of sensors, a tracking sub-system, and a billing sub-system. Each transponder is located in a vehicle capable of being driven on a road having at least a first lane and a second lane in which vehicles move in a same direction. Each sensor is movably located at a point along the road to detect the transponder of each vehicle that has changed between the first and the second lanes at the point. The tracking system is communicatively coupled to the sensors to track when and at which of the points the vehicles have changed between the first and the second lanes. The billing system is to periodically bill users of the vehicles based on when and where the vehicles are driven in the second lane of the road.Type: GrantFiled: April 22, 2007Date of Patent: February 23, 2010Assignee: International Business Machines CorporationInventors: Ramesh Chitor, Christopher J. Strauss, Nam Keung, Sebnem Jaji
-
Patent number: 7657939Abstract: An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events.Type: GrantFiled: March 14, 2005Date of Patent: February 2, 2010Assignee: International Business Machines CorporationInventors: Christopher J. Strauss, Sebnem Jaji, Ramesh V. Chitor, Nam Keung
-
Publication number: 20100011440Abstract: An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events.Type: ApplicationFiled: September 16, 2009Publication date: January 14, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher J. Strauss, Sebnem Jaji, Ramesh V. Chitor, Nam Keung
-
Publication number: 20090300760Abstract: A method, apparatus, and article of manufacture are provided to support security in a distributed gird computer cluster. Each non-node root node in the cluster is configured with a local security agent, and the root node is configured with a security controller to manage each of the security agents of each non-root node. The security agent of each non-root node is in communication with an associated configuration file that contains data private to the respective non-root node, to allow the security agent to manage security local to the node. The security controller of the root node is in communication with a controller configuration file that contains data that applies to all security agents in the grid cluster, to allow the controller to manager the security agents.Type: ApplicationFiled: May 28, 2008Publication date: December 3, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ramesh V. Chitor, Sebnem Jaji, Nam S. Keung, Michel P. Riviere, Christopher J. Strauss
-
Publication number: 20090112352Abstract: A storage medium including a method of modeling yield for semiconductor products includes determining expected faults for each of a plurality of library elements by running a critical area analysis on each of the library elements, and assessing, from the critical area analysis, an expected number of faults per unit area, and comparing the same to actual observed faults on previously manufactured semiconductor products. Thereafter, the expected number of faults for each library element is updated in response to observed yield. A database is established, which includes the die size and expected faults for each of the library elements. Integrated circuit product die size is estimated, and library elements to be used to create the integrated circuit die are selected. Fault and size data for each of the selected library elements are obtained, the adjusted estimated faults for each of the library elements are summed, and estimated yield is calculated.Type: ApplicationFiled: January 5, 2009Publication date: April 30, 2009Applicant: International Business Machines CorporationInventors: Thomas S. Barnett, Jeanne P. Bickford, William Y. Chang, Rashmi D. Chatty, Sebnem Jaji, Kerry A. Kravec, Wing L. Lai, Gie Lee, Brian M. Trapp, Alan J. Weger
-
Patent number: 7477961Abstract: A method of modeling yield for semiconductor products includes determining expected faults for each of a plurality of library elements by running a critical area analysis on each of the library elements, and assessing, from the critical area analysis, an expected number of faults per unit area, and comparing the same to actual observed faults on previously manufactured semiconductor products. Thereafter, the expected number of faults for each library element is updated in response to observed yield. A database is established, which includes the die size and expected faults for each of the library elements. Integrated circuit product die size is estimated, and library elements to be used to create the integrated circuit die are selected. Fault and size data for each of the selected library elements are obtained, the adjusted estimated faults for each of the library elements are summed, and estimated yield is calculated.Type: GrantFiled: May 12, 2006Date of Patent: January 13, 2009Assignee: International Business Machines CorporationInventors: Thomas S. Barnett, Jeanne P. Bickford, William Y. Chang, Rashmi D. Chatty, Sebnem Jaji, Kerry A. Kravec, Wing L. Lai, Gie Lee, Brian M. Trapp, Alan J. Weger
-
Publication number: 20080258936Abstract: A system includes one or more transponders, a number of sensors, a tracking sub-system, and a billing sub-system. Each transponder is located in a vehicle capable of being driven on a road having at least a first lane and a second lane in which vehicles move in a same direction. Each sensor is movably located at a point along the road to detect the transponder of each vehicle that has changed between the first and the second lanes at the point. The tracking system is communicatively coupled to the sensors to track when and at which of the points the vehicles have changed between the first and the second lanes. The billing system is to periodically bill users of the vehicles based on when and where the vehicles are driven in the second lane of the road.Type: ApplicationFiled: April 22, 2007Publication date: October 23, 2008Inventors: Ramesh V. Chitor, Christopher J. Strauss, Nam Keung, Sebnem Jaji
-
Publication number: 20070265722Abstract: A method of modeling yield for semiconductor products includes determining expected faults for each of a plurality of library elements by running a critical area analysis on each of the library elements, and assessing, from the critical area analysis, an expected number of faults per unit area, and comparing the same to actual observed faults on previously manufactured semiconductor products. Thereafter, the expected number of faults for each library element is updated in response to observed yield. A database is established, which includes the die size and expected faults for each of the library elements. Integrated circuit product die size is estimated, and library elements to be used to create the integrated circuit die are selected. Fault and size data for each of the selected library elements are obtained, the adjusted estimated faults for each of the library elements are summed, and estimated yield is calculated.Type: ApplicationFiled: May 12, 2006Publication date: November 15, 2007Applicant: International Business Machines CorporationInventors: Thomas Barnett, Jeanne Bickford, William Chang, Rashmi Chatty, Sebnem Jaji, Kerry Kravec, Wing Lai, Gie Lee, Brian Trapp, Alan Weger
-
Publication number: 20060206940Abstract: An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events.Type: ApplicationFiled: March 14, 2005Publication date: September 14, 2006Inventors: Christopher Strauss, Sebnem Jaji, Ramesh Chitor, Nam Keung
-
Patent number: 6119151Abstract: A cache manager efficiently supporting both connected and disconnected client operation. A single integrated cache is maintained for file system data, status and pathname information. File system requests are satisfied by the cache if possible and passed to a remote file system for servicing if necessary. The cache manager is independent of operating system file syntax and distributed file system protocol. Disconnected operation is supported through an aggressive caching policy and by logging of file system modifications. Modification logs are created when the client is disconnected by logging objects that optimize the log as it is created. Cache file system objects can have multiple parents each with different naming syntax because the object name is not cached.Type: GrantFiled: March 7, 1994Date of Patent: September 12, 2000Assignee: International Business Machines Corp.Inventors: Thomas George Cantrell, Sebnem Jaji, Amal Ahmed Shaheen, Richard Byron Ward
-
Patent number: 5832218Abstract: An electronic mail (E-Mail) server system is disclosed that is used within a client/server network system. Typically, the network system includes at least one client connected to a server. The E-Mail server system comprises a mail server, a client mail server, located within the client, and a log manager. The mail server, which is located within the server of the client/server network system, provides a plurality of E-Mail functions accessible across the client/server network system. The client mail server access the mail server and invokes the mail server to copy selected ones of a plurality of the E-Mail functions in the client mail server to enable the client to perform E-Mail composing while in a disconnected state from the mail server. The log manager logs all E-Mail activity performed by the user on the client while in the disconnected state and then performs reconnection and resynchronization between the client and server for replaying the logged activity for execution by the mail server.Type: GrantFiled: December 14, 1995Date of Patent: November 3, 1998Assignee: International Business Machines CorporationInventors: Robert Gibbs, Sebnem Jaji