Patents by Inventor W. A. Buchanan
W. A. Buchanan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140072947Abstract: A method of generating secondary questions in a question-answer system. Missing information is identified from a corpus of data using a computerized device. The missing information comprises any information that improves confidence scores for candidate answers to a question. The computerized device automatically generates a plurality of hypotheses concerning the missing information. The computerized device automatically generates at least one secondary question based on each of the plurality of hypotheses. The hypotheses are ranked based on relative utility to determine an order in which the computerized device outputs the at least one secondary question to external sources to obtain responses.Type: ApplicationFiled: September 11, 2012Publication date: March 13, 2014Applicant: International Business Machines CorporationInventors: Branimir K. Boguraev, David W. Buchanan, Jennifer Chu-Carroll, David A. Ferrucci, Aditya A. Kalyanpur, James W. Murdock, IV, Siddharth A. Patwardhan
-
Publication number: 20140072948Abstract: A method of generating secondary questions in a question-answer system. Missing information is identified from a corpus of data using a computerized device. The missing information comprises any information that improves confidence scores for candidate answers to a question. The computerized device automatically generates a plurality of hypotheses concerning the missing information. The computerized device automatically generates at least one secondary question based on each of the plurality of hypotheses. The hypotheses are ranked based on relative utility to determine an order in which the computerized device outputs the at least one secondary question to external sources to obtain responses.Type: ApplicationFiled: September 11, 2012Publication date: March 13, 2014Applicant: International Business Machines CorporationInventors: Branimir K. Boguraev, David W. Buchanan, Jennifer Chu-Carroll, David A. Ferrucci, Aditya A. Kalyanpur, James W. Murdock, IV, Siddharth A. Patwardhan
-
Publication number: 20130212542Abstract: A method for automatic detection of user preferences for alternate user interface model includes operating a digital device with an active user interface model and receiving one or more input signals from a user of the digital device. The method includes comparing the one or more input signals with one or more latent user interface models and determining if one of the latent user interface models has a higher likelihood given the one or more input signals than the active user interface models. The method also includes responsively substituting the latent user interface with the highest likelihood given the one or more input signals for the active user interface model.Type: ApplicationFiled: February 15, 2012Publication date: August 15, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Aaron K. Baughman, David W. Buchanan, Robert G. Farrell, Aditya A. Kalyanpur
-
Patent number: 8176544Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: GrantFiled: February 3, 2011Date of Patent: May 8, 2012Assignee: nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Patent number: 8072337Abstract: Stolen or lost explosives are detected by fixing micro RF transmitters in the form of RFID tags to the explosive packaging or embedding them in the explosive material itself. Moreover, the subject microradio transponders may be contained in an adhesive binder or slurry. The identity of the explosive, its place of manufacture and ownership is detectable by RFID tag interrogators strategically located along commonly used roads or railways in which the RFID tags scavenge energy from interrogation beams, with the RFID tags indicating the identity of the explosive and its origin.Type: GrantFiled: February 23, 2009Date of Patent: December 6, 2011Assignee: BAE Systems Information and Electronic Systems Integration Inc.Inventors: Paul A. Zank, David W. Buchanan, Jason C. Julien, Karl D. Brommer, Walter J Fredette, Jr.
-
Patent number: 8020211Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: GrantFiled: September 1, 2009Date of Patent: September 13, 2011Assignee: nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Publication number: 20110131644Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: ApplicationFiled: February 3, 2011Publication date: June 2, 2011Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Publication number: 20100231389Abstract: Stolen or lost explosives are detected by fixing micro RF transmitters in the form of RFID tags to the explosive packaging or embedding them in the explosive material itself. Moreover, the subject microradio transponders may be contained in an adhesive binder or slurry. The identity of the explosive, its place of manufacture and ownership is detectable by RFID tag interrogators strategically located along commonly used roads or railways in which the RFID tags scavenge energy from interrogation beams, with the RFID tags indicating the identity of the explosive and its origin.Type: ApplicationFiled: February 23, 2009Publication date: September 16, 2010Applicant: BAE Systems Information and Electronic Systems Integration Inc.Inventors: Paul A. Zank, David W. Buchanan, Jason C. Julien, Karl D. Brommer, Walter J. Fredette, JR.
-
Publication number: 20090320138Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: ApplicationFiled: September 1, 2009Publication date: December 24, 2009Applicant: c/o nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Patent number: 7594273Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: GrantFiled: February 16, 2007Date of Patent: September 22, 2009Assignee: nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Publication number: 20090146864Abstract: A system is provided for underground mapping, location determination and communications utilizing existing LORAN transmitters and a subterranean H-field antenna coupled to a conventional LORAN receiver. The result is an underground LORAN grid from which mapping and location can be ascertained as well as terrestrial-to-subterranean communications using the LORAN bit streams. Subterranean-to-terrestrial communication is established by a low-frequency handheld transmitter using repeat processing to transmit digital data from the subterranean location to the surface of the earth using modulated H-field waves.Type: ApplicationFiled: April 3, 2006Publication date: June 11, 2009Inventors: Paul A. Zank, David W. Buchanan
-
Patent number: 7415519Abstract: This invention is useful in a networked system with densely packaged servers or server blades. The servers are connected to a system management network, a communication network and an image server. A management module attached to the system management network and a network switch monitors and controls network booting from an image server on the communication network to prevent over commitment of network and image server resources in order to avoid a boot storm. The management module collects system information and calculates the number of servers or clients the networked system can boot at any one instant of time without burdening the system. The management module logic controls booting via the system management network and service processor elements, which can block server booting and release servers to boot when other servers have completed their boot process.Type: GrantFiled: June 28, 2002Date of Patent: August 19, 2008Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Antonio Abbondanzio, William W. Buchanan, Jr., Simon Chu, Gregory William Dake, Stephen Woodrow Murphrey, William Joseph Piazza, Gregory Brian Pruett, David Benson Rhoades
-
Patent number: 7263734Abstract: The present invention involves a patient support system. The support system has a fluid bladder and a container. The container has an air pump, a manifold and a CPR dump system. The CPR dump system has a manifold aperture, a plug positioned in the manifold's aperture, a rod interconnected to the plug and protruding from the container's opening, a magnetized alignment apparatus, and a magnetized stop mechanism. The magnetized stop mechanism fastens to the rod and magnetically attaches to the magnetized alignment apparatus which insures the plug is lodged in the manifold's aperture. When a user wants to expeditiously deflate the inflatable fluid bladder, the user pulls on the distal end with sufficient force to detach the magnetized stop mechanism from the magnetized alignment apparatus thereby the plug dislodges from the manifold aperture and allows the inflatable fluid bladder to deflate within a predetermined time frame.Type: GrantFiled: November 15, 2006Date of Patent: September 4, 2007Assignee: Gaymar Industries, Inc.Inventors: Richard W. Buchanan, Mark Landgraf
-
Patent number: 7213102Abstract: Secondary or augmented control of a storage array in a cost effective manner is accomplished by connecting a host to the storage array via a storage adapter independent of a RAID controller. The RAID controller provides primary control for services standard to the RAID controller. Augmented or enhanced services as well as backup control are provided by a control module executing on the host, communicating to one or more selected storage devices within the storage array via the storage adapter. In one embodiment, the control module detects faults or failures in the RAID controller, selectably directs storage commands to the RAID controller, emulates a storage controller including a RAID controller, and provides enhanced or augmented services such as conducting diagnostic, firmware update, or disaster recovery operations.Type: GrantFiled: June 26, 2003Date of Patent: May 1, 2007Assignee: International Business Machines CorporationInventors: William W. Buchanan, Jr., Simon Chu, Linda A. Rledle, Paul B. Tippett
-
Patent number: 7194659Abstract: Aspects for detection and correction of entrance into an improper master boot record (MBR) state in a computer system are described. The aspects include providing a proxy MBR at a predetermined location on a storage device of a computer system to provide a proxy MBR. The proxy MBR is then utilized during a restart operation. An original MBR maintained at an original location on the storage device is then utilized during a reboot operation when the utilization of the proxy MBR is unsuccessful.Type: GrantFiled: December 10, 2002Date of Patent: March 20, 2007Assignee: International Business Machines CorporationInventors: William W. Buchanan, Jr., Simon C. Chu, Peter Thomas Donovan, Benjamin Russell Grimes, Gregory Brian Pruett, David B. Rhoades, Paul Brian Tippet
-
Patent number: 7181769Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attach signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: GrantFiled: June 6, 2003Date of Patent: February 20, 2007Assignee: nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Patent number: 7171479Abstract: A network and method for servicing simultaneously pending boot image download requests in a multi-client, networked environment. A boot image server on the network is configured to satisfy boot image sessions initiated by one or more client systems on the network. The image server is configured to prioritize requests from different clients to minimize or reduce the network's average download time, which represents the amount of time required to boot a theoretical average client. In one embodiment, the image server is configured to minimize the average download time by prioritizing client requests according to the amount of time required to complete a each client's download such that requests from clients with short remaining download times are given higher priority and, conversely, request from clients with long remaining download times are given lower priority.Type: GrantFiled: April 26, 2002Date of Patent: January 30, 2007Assignee: International Business Machines CorporationInventors: William W. Buchanan, Simon C. Chu, William J. Piazza, David B. Rhoades, Linda A. Riedle
-
Patent number: 7154275Abstract: A robust, easily deployable, covert, passive intrusion detection system uses one or more E-field sensors to detect the presence of a moving individual and to provide an indication of the presence of the individual adjacent the sensor based on E-field distortion produced by the individual. Single-ended and differential E-field sensors with noise canceling and a guarding circuit provide sufficient sensitivity, with filtering from 0.5 Hz to 8.0 Hz selecting only human intruders. Either visible or invisible flashing light sources at the sensor indicate the presence of a moving individual at the sensor, thus to provide intruder location without the necessity of providing a geolocation system.Type: GrantFiled: June 9, 2005Date of Patent: December 26, 2006Assignee: Bae Systems Information and Electronic Systems Integration Inc.Inventors: Paul A. Zank, Eldon M. Sutphin, David W. Buchanan, George P. Succi
-
Patent number: 6993583Abstract: A method, system and computer program product for dynamically sharing a limited supply of Internet Protocol (IP) addresses among a larger number of servers. A manager coupled between the Internet and a plurality of servers may receive a request for an IP address associated with a domain name from a client coupled to the Internet. The manager may be configured to map the domain name into an IP address assigned to the server hosting the web site of the domain name. Each assigned IP address may be valid only for a limited time. Once the time the assigned IP address is valid has expired, the assigned IP address may be returned to the pool of available IP addresses thereby allowing a smaller number of IP addresses to be dynamically shared among a larger number of servers.Type: GrantFiled: February 28, 2002Date of Patent: January 31, 2006Assignee: International Business Machines CorporationInventors: Jeffrey Wayne Anderson, Travis Daren Appleman, William W. Buchanan, Simon Chu, David Michael Green, William Joseph Piazza, Karl Ross Shultz, Paul Brian Tippett
-
Patent number: 6922059Abstract: The invention is a detection system and in one embodiment uses inexpensive, miniaturized sensors for detecting electric field (E-field) disturbances. Such sensors are easily and covertly deployable and have low power consumption. The devices may incorporate visual or audio alerts and can include communications hardware for transmitting data for further processing of the electrostatic events.Type: GrantFiled: December 10, 2002Date of Patent: July 26, 2005Assignee: BAE Systems Information and Electronic Systems Integration INCInventors: Paul A. Zank, Eldon M. Sutphin, David W. Buchanan, Thomas G. Cehelnik