Patents by Inventor Vitaliy Bondar

Vitaliy Bondar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8086354
    Abstract: Methods, systems and apparatus for optimizing consumption of one or more resources are presented. For example, a method may be implemented on a processor device and includes obtaining user preferences for the consumption of resources that include water and electricity, predicting the consumption of, and a first metric for the consumption of, the resources for each of a plurality of first time periods, determining a projected second metric for the consumption of the resources during a second time period according to the predicted consumption and the predicted first metric, and optimizing the consumption of the resources according to the projected second metric and the user preferences. The second time period includes the plurality of first time periods. The first metric is associated with the user preferences and at least one of the plurality of first time periods. The second metric indicates full or partial projected attainment of the preferences during the second time period.
    Type: Grant
    Filed: August 31, 2009
    Date of Patent: December 27, 2011
    Assignee: International Business Machines Corporation
    Inventors: Vitaliy Bondar, Ching-Hua Chen-Ritzo, Rick Allen Hamilton, II, Clifford Alan Pickover, Ralph Peter Williams
  • Publication number: 20110054642
    Abstract: Methods, systems and apparatus for optimizing consumption of one or more resources are presented. For example, a method that may be implemented on a processor device and includes obtaining user preferences for the consumption of resources that include water and electricity, predicting the consumption of, and a first metric for the consumption of, the resources for each of a plurality of first time periods, determining a projected second metric for the consumption of the resources during a second time period according to the predicted consumption and the predicted first metric, and optimizing the consumption of the resources according to the projected second metric and the user preferences. The second time period includes the plurality of first time periods. The first metric is associated with the user preferences and at least one of the plurality of first time periods. The second metric indicates full or partial projected attainment of the preferences during the second time period.
    Type: Application
    Filed: August 31, 2009
    Publication date: March 3, 2011
    Applicant: International Business Machines Corporation
    Inventors: Vitaliy Bondar, Ching-Hua Chen-Ritzo, Rick Allen Hamilton, II, Clifford Alan Pickover, Ralph Peter Williams
  • Patent number: 7171413
    Abstract: A method, system and article of manufacture for two phase intermediate query security using access control. A networked client-server computer system having a plurality of users of the client-server system and including software performing database queries via a DBMS for users of the system implements the method. The method includes receiving a query string from one of the users by the client system, the query string including references to database objects. The received query string is transformed by the client system to an intermediate query string, and a first phase query security is performed by the client system including identifying the referenced database objects and inserting a security marker into the intermediate query string for each respective identified database object, and sending the intermediate query string to the server system.
    Type: Grant
    Filed: August 29, 2003
    Date of Patent: January 30, 2007
    Assignee: International Business Machines Corporation
    Inventors: Nicholas K. Puz, Randal J. Richardt, Rupa Bhaghavan, Vitaliy Bondar
  • Publication number: 20050050046
    Abstract: A method, system and article of manufacture for two phase intermediate query security using access control. A networked client-server computer system having a plurality of users of the client-server system and including software performing database queries via a DBMS for users of the system implements the method. The method includes receiving a query string from one of the users by the client system, the query string including references to database objects. The received query string is transformed by the client system to an intermediate query string, and a first phase query security is performed by the client system including identifying the referenced database objects and inserting a security marker into the intermediate query string for each respective identified database object, and sending the intermediate query string to the server system.
    Type: Application
    Filed: August 29, 2003
    Publication date: March 3, 2005
    Inventors: Nicholas Puz, Randal Richardt, Rupa Bhaghavan, Vitaliy Bondar