Patents by Inventor Steve R. White

Steve R. White has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7861300
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Grant
    Filed: June 18, 2008
    Date of Patent: December 28, 2010
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Publication number: 20100235844
    Abstract: Allocating resource discovery and identification processes among a plurality of management tools and resources in a distributed and heterogeneous information technology (IT) management system by providing at least one authoritative manageable resource having minimal or no responsibility for reporting its identity, minimal or no responsibility for advertising any lifecycle-related creation event for the resource, and minimal or no responsibility for advertising any lifecycle-related destruction event for the resource. A services oriented architecture (SOA) defines one or more services needed to manage the resource within the management system. A component model defines one or more interfaces and one or more interactions to be implemented by the manageable resource within the management system.
    Type: Application
    Filed: March 16, 2009
    Publication date: September 16, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John E. Arwe, Jeffrey A. Frey, Jeffery J. Van Heuklon, Steve R. White, Michael D. Williams
  • Publication number: 20090237304
    Abstract: A system and method automatically maps computer center rooms and locates data center components within computer centers. Radio triangulation is used to determine the locations and, optionally, orientation, of machines within a computer center.
    Type: Application
    Filed: March 20, 2008
    Publication date: September 24, 2009
    Inventors: Ian Nicholas WHALLEY, Steve R. White
  • Patent number: 7515105
    Abstract: A system and method automatically maps computer center rooms and locates data center components within computer centers. Radio triangulation is used to determine the locations and, optionally, orientation, of machines within a computer center.
    Type: Grant
    Filed: November 23, 2004
    Date of Patent: April 7, 2009
    Assignee: International Business Machines Corporation
    Inventors: Ian Nicholas Whalley, Steve R. White
  • Patent number: 7487543
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Grant
    Filed: July 23, 2002
    Date of Patent: February 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Publication number: 20080271016
    Abstract: A method, information processing system, and computer readable medium for managing virtual machine imaging. The method includes receiving a request for an imaging operation associated with at least one virtual machine. A notification is sent to at least one operating system associated with the at least one virtual machine of the request for the imaging operation. The operating system is determined to be in a state for the virtual machine to be imaged. The request for the imaging operation is granting in response to determining.
    Type: Application
    Filed: April 30, 2007
    Publication date: October 30, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David M. Chess, Sean L. Dague, Ronald T. Goering, Hidayatullah H. Shaikh, Ian N. Whalley, Steve R. White, Jian Yin
  • Publication number: 20080256633
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Application
    Filed: June 18, 2008
    Publication date: October 16, 2008
    Inventors: William C. ARNOLD, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Publication number: 20080235168
    Abstract: A statistical approach implementing Singular Value Decomposition (SVD) to a policy-based management system for autonomic and on-demand computing applications. The statistical approach empowers a class of applications that require policies to handle ambiguous conditions and allow the system to “evolve” in response to changing operation and environment conditions. In the system and method providing the statistical approach, observed event-policy associated data, which is represented by an event-policy matrix, is treated as a statistical problem with the assumption that there are some underlying or implicit higher order correlations among events and policies. The SVD approach enables such correlations to be modeled, extracted and modified. From these correlations, recommended policies can be selected or created without exact match of policy conditions.
    Type: Application
    Filed: June 2, 2008
    Publication date: September 25, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hoi Y. Chan, David M. Chess, Thomas Y. Kwok, Steve R. White
  • Publication number: 20080189787
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Application
    Filed: April 3, 2008
    Publication date: August 7, 2008
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Patent number: 7338034
    Abstract: An elastomeric spring including an elongated elastomeric body defining a longitudinal axis for the spring and having first and second longitudinal ends. An outer surface of the elastomeric body extends between the first and second ends and has four generally planar sides, with each planar side of the outer surface being disposed to one side of and generally parallel to the longitudinal axis of the spring so as to reduce radial bulging of the spring in all directions when an axial load is applied to the spring. The outer surface of the elastomeric body further includes four angled corner sections extending between the first and second ends of the elastomeric body and disposed a substantially common distance from the longitudinal axis of the spring. One corner section is disposed between any two adjoining sides on the outer surface of the elastomeric body.
    Type: Grant
    Filed: September 27, 2005
    Date of Patent: March 4, 2008
    Assignee: Miner Enterprises, Inc.
    Inventors: Paul B. Aspengren, Steve R. White, Erik D. Jensen, Adam J. Merges, Michael L. McGuigan
  • Publication number: 20080021873
    Abstract: A system and method for automated design deployment for distributed applications includes providing a node with at least one requirement attribute in an application description. A repository for infrastructure elements is searched for candidate infrastructure elements for that satisfy the at least one requirement attribute. A candidate infrastructure element that best satisfies the at least one requirement attribute in the application description is substituted in place of the node with the at least one requirement attribute.
    Type: Application
    Filed: July 19, 2006
    Publication date: January 24, 2008
    Inventors: Aditya Agrawal, Asit Dan, Tamar Eilam, Michael H. Kalantar, Alexander V. Konstantinou, Heiko Hary Ludwig, John A. Pershing, Hendrik Wagner, Steve R. White
  • Publication number: 20070282778
    Abstract: A statistical approach implementing Singular Value Decomposition (SVD) to a policy-based management system for autonomic and on-demand computing applications. The statistical approach empowers a class of applications that require policies to handle ambiguous conditions and allow the system to “evolve” in response to changing operation and environment conditions. In the system and method providing the statistical approach, observed event-policy associated data, which is represented by an event-policy matrix, is treated as a statistical problem with the assumption that there are some underlying or implicit higher order correlations among events and policies. The SVD approach enables such correlations to be modeled, extracted and modified. From these correlations, recommended policies can be selected or created without exact match of policy conditions.
    Type: Application
    Filed: June 5, 2006
    Publication date: December 6, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hoi Y. Chan, David M. Chess, Thomas Y. Kwok, Steve R. White
  • Patent number: 7203662
    Abstract: An apparatus, system and method for automatically making operation selling decisions are provided. The apparatus, system and method make use of selling policy rules established by human operators associated with a firm to guide the making of decisions to sell products and/or services. The actual decisions to sell are made automatically by the system without requiring human intervention. The decisions to sell are made by negotiating terms of sale with a customer using history information, exogenous preference information, information obtained from third parties, and the like. An initial offer of sale is provided to a customer who may then elect to modify the terms of sale of the product or service. If the customer elects to modify the terms of sale of the product or service, a negotiation engine of the present invention may automatically provide counteroffers to offers made by the customer until acceptable terms of sale are agreed upon.
    Type: Grant
    Filed: July 25, 2001
    Date of Patent: April 10, 2007
    Assignee: International Business Machines Corporation
    Inventors: Rajarshi Das, James E. Hanson, Jeffrey O. Kephart, Steve R. White
  • Patent number: 7117182
    Abstract: A method for carrying out multi-party transactions in which at least one party or user has information which he considers private, the method comprising: a first determining step, in which it is determined which parties will take part in the transaction; a second determining step, in which it is determined, for each party taking part in the transaction, what information about the user that party requires in order to complete the corresponding part of the transaction; a selecting step, which may occur before or after the determining steps, in which one or more nonces, GUIDs, or other tokens are selected, to represent the user in the course of the transaction; a providing step, in which each party determined in the first determining step is provided with information comprising the corresponding information about the user determined in the second determining step, and one or more of the nonces, GUIDs, or other tokens selected in the selecting step; an execution step, in which the parties to the transaction compl
    Type: Grant
    Filed: January 8, 2002
    Date of Patent: October 3, 2006
    Assignee: International Business Machines Corporation
    Inventors: David M. Chess, Ian N. Whalley, Steve R. White
  • Patent number: 7103913
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Grant
    Filed: May 8, 2002
    Date of Patent: September 5, 2006
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Patent number: 7069585
    Abstract: An apparatus and a method for enabling the secure installation and use of an information system having a plurality of nodes, where the plurality of nodes include at least one information appliance (100) and at least one security console (200). The apparatus includes at least one data-carrying object, referred to as a “key” (301), that contains security-related data, and further includes at least one key receptacle (103, 203) that forms a portion of at least one of the nodes. The key is inserted into the receptacle for reading-out the security-related data for indicating to the information system a desired security configuration. The key is not intended to primarily establish the identity of a particular user or principal, but is instead intended to provide and be instrumental in defining, using a tangible medium, a security configuration that bestows a certain level of authorization or access to a particular user or principal.
    Type: Grant
    Filed: August 17, 2000
    Date of Patent: June 27, 2006
    Assignee: International Business Machines Corporation
    Inventors: David M. Chess, Ian N. Whalley, Steve R. White, John F. Morar
  • Patent number: 6990590
    Abstract: A method, computer program product, and data processing system for circumventing profiling and targeting of World Wide Web users is disclosed. A number of fictitious web “personae” are established. A user wishing to perform a particular web transaction assumes a persona that best fits the user's current needs. The user's actions are then attributed to the persona, rather than the user. When the user wishes to perform another transaction, a different persona may be assumed, depending upon the circumstances, so that any disadvantage attributable to performing the same web transaction multiple times may be eliminated. This has the dual advantage of both protecting the user's privacy and taking advantage of special offers and incentives that may be targeted to first-time customers.
    Type: Grant
    Filed: January 10, 2002
    Date of Patent: January 24, 2006
    Assignee: International Business Machines Corporation
    Inventors: James E. Hanson, Sophia Krasikov, John F. Morar, Steve R. White
  • Patent number: 6981279
    Abstract: A system and a method are disclosed for dynamically analyzing software, some of whose potentially-important behaviors (such as worm-like behavior) may only be displayed when the software is executed in an environment where it has, or appears to have, access to a production network and/or to the global Internet. The software can be executed in a real or an emulated network environment that includes a monitoring component and an emulation component. The monitoring component serves to capture and/or record the behaviors displayed by the software and/or other components of the system, and the emulation component gives the software being analyzed the impression that it is executing with access to a production network and/or to the global Internet. The software being analyzed is effectively confined to the analysis network environment, and cannot in fact read information from, or alter any information on, any production network or the global Internet.
    Type: Grant
    Filed: August 17, 2000
    Date of Patent: December 27, 2005
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton G. Swimmer, Ian N. Whalley, Steve R. White
  • Publication number: 20040019832
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Application
    Filed: July 23, 2002
    Publication date: January 29, 2004
    Applicant: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Publication number: 20030212906
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Application
    Filed: May 8, 2002
    Publication date: November 13, 2003
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White