Patents by Inventor Steve R. White
Steve R. White has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7861300Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.Type: GrantFiled: June 18, 2008Date of Patent: December 28, 2010Assignee: International Business Machines CorporationInventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
-
Publication number: 20100235844Abstract: Allocating resource discovery and identification processes among a plurality of management tools and resources in a distributed and heterogeneous information technology (IT) management system by providing at least one authoritative manageable resource having minimal or no responsibility for reporting its identity, minimal or no responsibility for advertising any lifecycle-related creation event for the resource, and minimal or no responsibility for advertising any lifecycle-related destruction event for the resource. A services oriented architecture (SOA) defines one or more services needed to manage the resource within the management system. A component model defines one or more interfaces and one or more interactions to be implemented by the manageable resource within the management system.Type: ApplicationFiled: March 16, 2009Publication date: September 16, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John E. Arwe, Jeffrey A. Frey, Jeffery J. Van Heuklon, Steve R. White, Michael D. Williams
-
Publication number: 20090237304Abstract: A system and method automatically maps computer center rooms and locates data center components within computer centers. Radio triangulation is used to determine the locations and, optionally, orientation, of machines within a computer center.Type: ApplicationFiled: March 20, 2008Publication date: September 24, 2009Inventors: Ian Nicholas WHALLEY, Steve R. White
-
Patent number: 7515105Abstract: A system and method automatically maps computer center rooms and locates data center components within computer centers. Radio triangulation is used to determine the locations and, optionally, orientation, of machines within a computer center.Type: GrantFiled: November 23, 2004Date of Patent: April 7, 2009Assignee: International Business Machines CorporationInventors: Ian Nicholas Whalley, Steve R. White
-
Patent number: 7487543Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.Type: GrantFiled: July 23, 2002Date of Patent: February 3, 2009Assignee: International Business Machines CorporationInventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
-
Publication number: 20080271016Abstract: A method, information processing system, and computer readable medium for managing virtual machine imaging. The method includes receiving a request for an imaging operation associated with at least one virtual machine. A notification is sent to at least one operating system associated with the at least one virtual machine of the request for the imaging operation. The operating system is determined to be in a state for the virtual machine to be imaged. The request for the imaging operation is granting in response to determining.Type: ApplicationFiled: April 30, 2007Publication date: October 30, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David M. Chess, Sean L. Dague, Ronald T. Goering, Hidayatullah H. Shaikh, Ian N. Whalley, Steve R. White, Jian Yin
-
Publication number: 20080256633Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.Type: ApplicationFiled: June 18, 2008Publication date: October 16, 2008Inventors: William C. ARNOLD, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
-
Publication number: 20080235168Abstract: A statistical approach implementing Singular Value Decomposition (SVD) to a policy-based management system for autonomic and on-demand computing applications. The statistical approach empowers a class of applications that require policies to handle ambiguous conditions and allow the system to “evolve” in response to changing operation and environment conditions. In the system and method providing the statistical approach, observed event-policy associated data, which is represented by an event-policy matrix, is treated as a statistical problem with the assumption that there are some underlying or implicit higher order correlations among events and policies. The SVD approach enables such correlations to be modeled, extracted and modified. From these correlations, recommended policies can be selected or created without exact match of policy conditions.Type: ApplicationFiled: June 2, 2008Publication date: September 25, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hoi Y. Chan, David M. Chess, Thomas Y. Kwok, Steve R. White
-
Publication number: 20080189787Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.Type: ApplicationFiled: April 3, 2008Publication date: August 7, 2008Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
-
Patent number: 7338034Abstract: An elastomeric spring including an elongated elastomeric body defining a longitudinal axis for the spring and having first and second longitudinal ends. An outer surface of the elastomeric body extends between the first and second ends and has four generally planar sides, with each planar side of the outer surface being disposed to one side of and generally parallel to the longitudinal axis of the spring so as to reduce radial bulging of the spring in all directions when an axial load is applied to the spring. The outer surface of the elastomeric body further includes four angled corner sections extending between the first and second ends of the elastomeric body and disposed a substantially common distance from the longitudinal axis of the spring. One corner section is disposed between any two adjoining sides on the outer surface of the elastomeric body.Type: GrantFiled: September 27, 2005Date of Patent: March 4, 2008Assignee: Miner Enterprises, Inc.Inventors: Paul B. Aspengren, Steve R. White, Erik D. Jensen, Adam J. Merges, Michael L. McGuigan
-
Publication number: 20080021873Abstract: A system and method for automated design deployment for distributed applications includes providing a node with at least one requirement attribute in an application description. A repository for infrastructure elements is searched for candidate infrastructure elements for that satisfy the at least one requirement attribute. A candidate infrastructure element that best satisfies the at least one requirement attribute in the application description is substituted in place of the node with the at least one requirement attribute.Type: ApplicationFiled: July 19, 2006Publication date: January 24, 2008Inventors: Aditya Agrawal, Asit Dan, Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou, Heiko Hary Ludwig, John A. Pershing, Hendrik Wagner, Steve R. White
-
Publication number: 20070282778Abstract: A statistical approach implementing Singular Value Decomposition (SVD) to a policy-based management system for autonomic and on-demand computing applications. The statistical approach empowers a class of applications that require policies to handle ambiguous conditions and allow the system to “evolve” in response to changing operation and environment conditions. In the system and method providing the statistical approach, observed event-policy associated data, which is represented by an event-policy matrix, is treated as a statistical problem with the assumption that there are some underlying or implicit higher order correlations among events and policies. The SVD approach enables such correlations to be modeled, extracted and modified. From these correlations, recommended policies can be selected or created without exact match of policy conditions.Type: ApplicationFiled: June 5, 2006Publication date: December 6, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hoi Y. Chan, David M. Chess, Thomas Y. Kwok, Steve R. White
-
Patent number: 7203662Abstract: An apparatus, system and method for automatically making operation selling decisions are provided. The apparatus, system and method make use of selling policy rules established by human operators associated with a firm to guide the making of decisions to sell products and/or services. The actual decisions to sell are made automatically by the system without requiring human intervention. The decisions to sell are made by negotiating terms of sale with a customer using history information, exogenous preference information, information obtained from third parties, and the like. An initial offer of sale is provided to a customer who may then elect to modify the terms of sale of the product or service. If the customer elects to modify the terms of sale of the product or service, a negotiation engine of the present invention may automatically provide counteroffers to offers made by the customer until acceptable terms of sale are agreed upon.Type: GrantFiled: July 25, 2001Date of Patent: April 10, 2007Assignee: International Business Machines CorporationInventors: Rajarshi Das, James E. Hanson, Jeffrey O. Kephart, Steve R. White
-
Patent number: 7117182Abstract: A method for carrying out multi-party transactions in which at least one party or user has information which he considers private, the method comprising: a first determining step, in which it is determined which parties will take part in the transaction; a second determining step, in which it is determined, for each party taking part in the transaction, what information about the user that party requires in order to complete the corresponding part of the transaction; a selecting step, which may occur before or after the determining steps, in which one or more nonces, GUIDs, or other tokens are selected, to represent the user in the course of the transaction; a providing step, in which each party determined in the first determining step is provided with information comprising the corresponding information about the user determined in the second determining step, and one or more of the nonces, GUIDs, or other tokens selected in the selecting step; an execution step, in which the parties to the transaction complType: GrantFiled: January 8, 2002Date of Patent: October 3, 2006Assignee: International Business Machines CorporationInventors: David M. Chess, Ian N. Whalley, Steve R. White
-
Patent number: 7103913Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.Type: GrantFiled: May 8, 2002Date of Patent: September 5, 2006Assignee: International Business Machines CorporationInventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
-
Patent number: 7069585Abstract: An apparatus and a method for enabling the secure installation and use of an information system having a plurality of nodes, where the plurality of nodes include at least one information appliance (100) and at least one security console (200). The apparatus includes at least one data-carrying object, referred to as a “key” (301), that contains security-related data, and further includes at least one key receptacle (103, 203) that forms a portion of at least one of the nodes. The key is inserted into the receptacle for reading-out the security-related data for indicating to the information system a desired security configuration. The key is not intended to primarily establish the identity of a particular user or principal, but is instead intended to provide and be instrumental in defining, using a tangible medium, a security configuration that bestows a certain level of authorization or access to a particular user or principal.Type: GrantFiled: August 17, 2000Date of Patent: June 27, 2006Assignee: International Business Machines CorporationInventors: David M. Chess, Ian N. Whalley, Steve R. White, John F. Morar
-
Patent number: 6990590Abstract: A method, computer program product, and data processing system for circumventing profiling and targeting of World Wide Web users is disclosed. A number of fictitious web “personae” are established. A user wishing to perform a particular web transaction assumes a persona that best fits the user's current needs. The user's actions are then attributed to the persona, rather than the user. When the user wishes to perform another transaction, a different persona may be assumed, depending upon the circumstances, so that any disadvantage attributable to performing the same web transaction multiple times may be eliminated. This has the dual advantage of both protecting the user's privacy and taking advantage of special offers and incentives that may be targeted to first-time customers.Type: GrantFiled: January 10, 2002Date of Patent: January 24, 2006Assignee: International Business Machines CorporationInventors: James E. Hanson, Sophia Krasikov, John F. Morar, Steve R. White
-
Patent number: 6981279Abstract: A system and a method are disclosed for dynamically analyzing software, some of whose potentially-important behaviors (such as worm-like behavior) may only be displayed when the software is executed in an environment where it has, or appears to have, access to a production network and/or to the global Internet. The software can be executed in a real or an emulated network environment that includes a monitoring component and an emulation component. The monitoring component serves to capture and/or record the behaviors displayed by the software and/or other components of the system, and the emulation component gives the software being analyzed the impression that it is executing with access to a production network and/or to the global Internet. The software being analyzed is effectively confined to the analysis network environment, and cannot in fact read information from, or alter any information on, any production network or the global Internet.Type: GrantFiled: August 17, 2000Date of Patent: December 27, 2005Assignee: International Business Machines CorporationInventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton G. Swimmer, Ian N. Whalley, Steve R. White
-
Publication number: 20040019832Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.Type: ApplicationFiled: July 23, 2002Publication date: January 29, 2004Applicant: International Business Machines CorporationInventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
-
Publication number: 20030212906Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.Type: ApplicationFiled: May 8, 2002Publication date: November 13, 2003Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White