Patents by Inventor W. A. Buchanan

W. A. Buchanan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140072947
    Abstract: A method of generating secondary questions in a question-answer system. Missing information is identified from a corpus of data using a computerized device. The missing information comprises any information that improves confidence scores for candidate answers to a question. The computerized device automatically generates a plurality of hypotheses concerning the missing information. The computerized device automatically generates at least one secondary question based on each of the plurality of hypotheses. The hypotheses are ranked based on relative utility to determine an order in which the computerized device outputs the at least one secondary question to external sources to obtain responses.
    Type: Application
    Filed: September 11, 2012
    Publication date: March 13, 2014
    Applicant: International Business Machines Corporation
    Inventors: Branimir K. Boguraev, David W. Buchanan, Jennifer Chu-Carroll, David A. Ferrucci, Aditya A. Kalyanpur, James W. Murdock, IV, Siddharth A. Patwardhan
  • Publication number: 20140072948
    Abstract: A method of generating secondary questions in a question-answer system. Missing information is identified from a corpus of data using a computerized device. The missing information comprises any information that improves confidence scores for candidate answers to a question. The computerized device automatically generates a plurality of hypotheses concerning the missing information. The computerized device automatically generates at least one secondary question based on each of the plurality of hypotheses. The hypotheses are ranked based on relative utility to determine an order in which the computerized device outputs the at least one secondary question to external sources to obtain responses.
    Type: Application
    Filed: September 11, 2012
    Publication date: March 13, 2014
    Applicant: International Business Machines Corporation
    Inventors: Branimir K. Boguraev, David W. Buchanan, Jennifer Chu-Carroll, David A. Ferrucci, Aditya A. Kalyanpur, James W. Murdock, IV, Siddharth A. Patwardhan
  • Publication number: 20130212542
    Abstract: A method for automatic detection of user preferences for alternate user interface model includes operating a digital device with an active user interface model and receiving one or more input signals from a user of the digital device. The method includes comparing the one or more input signals with one or more latent user interface models and determining if one of the latent user interface models has a higher likelihood given the one or more input signals than the active user interface models. The method also includes responsively substituting the latent user interface with the highest likelihood given the one or more input signals for the active user interface model.
    Type: Application
    Filed: February 15, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Aaron K. Baughman, David W. Buchanan, Robert G. Farrell, Aditya A. Kalyanpur
  • Patent number: 8176544
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Grant
    Filed: February 3, 2011
    Date of Patent: May 8, 2012
    Assignee: nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Patent number: 8072337
    Abstract: Stolen or lost explosives are detected by fixing micro RF transmitters in the form of RFID tags to the explosive packaging or embedding them in the explosive material itself. Moreover, the subject microradio transponders may be contained in an adhesive binder or slurry. The identity of the explosive, its place of manufacture and ownership is detectable by RFID tag interrogators strategically located along commonly used roads or railways in which the RFID tags scavenge energy from interrogation beams, with the RFID tags indicating the identity of the explosive and its origin.
    Type: Grant
    Filed: February 23, 2009
    Date of Patent: December 6, 2011
    Assignee: BAE Systems Information and Electronic Systems Integration Inc.
    Inventors: Paul A. Zank, David W. Buchanan, Jason C. Julien, Karl D. Brommer, Walter J Fredette, Jr.
  • Patent number: 8020211
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Grant
    Filed: September 1, 2009
    Date of Patent: September 13, 2011
    Assignee: nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Publication number: 20110131644
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Application
    Filed: February 3, 2011
    Publication date: June 2, 2011
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Publication number: 20100231389
    Abstract: Stolen or lost explosives are detected by fixing micro RF transmitters in the form of RFID tags to the explosive packaging or embedding them in the explosive material itself. Moreover, the subject microradio transponders may be contained in an adhesive binder or slurry. The identity of the explosive, its place of manufacture and ownership is detectable by RFID tag interrogators strategically located along commonly used roads or railways in which the RFID tags scavenge energy from interrogation beams, with the RFID tags indicating the identity of the explosive and its origin.
    Type: Application
    Filed: February 23, 2009
    Publication date: September 16, 2010
    Applicant: BAE Systems Information and Electronic Systems Integration Inc.
    Inventors: Paul A. Zank, David W. Buchanan, Jason C. Julien, Karl D. Brommer, Walter J. Fredette, JR.
  • Publication number: 20090320138
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Application
    Filed: September 1, 2009
    Publication date: December 24, 2009
    Applicant: c/o nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Patent number: 7594273
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Grant
    Filed: February 16, 2007
    Date of Patent: September 22, 2009
    Assignee: nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Publication number: 20090146864
    Abstract: A system is provided for underground mapping, location determination and communications utilizing existing LORAN transmitters and a subterranean H-field antenna coupled to a conventional LORAN receiver. The result is an underground LORAN grid from which mapping and location can be ascertained as well as terrestrial-to-subterranean communications using the LORAN bit streams. Subterranean-to-terrestrial communication is established by a low-frequency handheld transmitter using repeat processing to transmit digital data from the subterranean location to the surface of the earth using modulated H-field waves.
    Type: Application
    Filed: April 3, 2006
    Publication date: June 11, 2009
    Inventors: Paul A. Zank, David W. Buchanan
  • Patent number: 7415519
    Abstract: This invention is useful in a networked system with densely packaged servers or server blades. The servers are connected to a system management network, a communication network and an image server. A management module attached to the system management network and a network switch monitors and controls network booting from an image server on the communication network to prevent over commitment of network and image server resources in order to avoid a boot storm. The management module collects system information and calculates the number of servers or clients the networked system can boot at any one instant of time without burdening the system. The management module logic controls booting via the system management network and service processor elements, which can block server booting and release servers to boot when other servers have completed their boot process.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: August 19, 2008
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Antonio Abbondanzio, William W. Buchanan, Jr., Simon Chu, Gregory William Dake, Stephen Woodrow Murphrey, William Joseph Piazza, Gregory Brian Pruett, David Benson Rhoades
  • Patent number: 7263734
    Abstract: The present invention involves a patient support system. The support system has a fluid bladder and a container. The container has an air pump, a manifold and a CPR dump system. The CPR dump system has a manifold aperture, a plug positioned in the manifold's aperture, a rod interconnected to the plug and protruding from the container's opening, a magnetized alignment apparatus, and a magnetized stop mechanism. The magnetized stop mechanism fastens to the rod and magnetically attaches to the magnetized alignment apparatus which insures the plug is lodged in the manifold's aperture. When a user wants to expeditiously deflate the inflatable fluid bladder, the user pulls on the distal end with sufficient force to detach the magnetized stop mechanism from the magnetized alignment apparatus thereby the plug dislodges from the manifold aperture and allows the inflatable fluid bladder to deflate within a predetermined time frame.
    Type: Grant
    Filed: November 15, 2006
    Date of Patent: September 4, 2007
    Assignee: Gaymar Industries, Inc.
    Inventors: Richard W. Buchanan, Mark Landgraf
  • Patent number: 7213102
    Abstract: Secondary or augmented control of a storage array in a cost effective manner is accomplished by connecting a host to the storage array via a storage adapter independent of a RAID controller. The RAID controller provides primary control for services standard to the RAID controller. Augmented or enhanced services as well as backup control are provided by a control module executing on the host, communicating to one or more selected storage devices within the storage array via the storage adapter. In one embodiment, the control module detects faults or failures in the RAID controller, selectably directs storage commands to the RAID controller, emulates a storage controller including a RAID controller, and provides enhanced or augmented services such as conducting diagnostic, firmware update, or disaster recovery operations.
    Type: Grant
    Filed: June 26, 2003
    Date of Patent: May 1, 2007
    Assignee: International Business Machines Corporation
    Inventors: William W. Buchanan, Jr., Simon Chu, Linda A. Rledle, Paul B. Tippett
  • Patent number: 7194659
    Abstract: Aspects for detection and correction of entrance into an improper master boot record (MBR) state in a computer system are described. The aspects include providing a proxy MBR at a predetermined location on a storage device of a computer system to provide a proxy MBR. The proxy MBR is then utilized during a restart operation. An original MBR maintained at an original location on the storage device is then utilized during a reboot operation when the utilization of the proxy MBR is unsuccessful.
    Type: Grant
    Filed: December 10, 2002
    Date of Patent: March 20, 2007
    Assignee: International Business Machines Corporation
    Inventors: William W. Buchanan, Jr., Simon C. Chu, Peter Thomas Donovan, Benjamin Russell Grimes, Gregory Brian Pruett, David B. Rhoades, Paul Brian Tippet
  • Patent number: 7181769
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attach signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Grant
    Filed: June 6, 2003
    Date of Patent: February 20, 2007
    Assignee: nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Patent number: 7171479
    Abstract: A network and method for servicing simultaneously pending boot image download requests in a multi-client, networked environment. A boot image server on the network is configured to satisfy boot image sessions initiated by one or more client systems on the network. The image server is configured to prioritize requests from different clients to minimize or reduce the network's average download time, which represents the amount of time required to boot a theoretical average client. In one embodiment, the image server is configured to minimize the average download time by prioritizing client requests according to the amount of time required to complete a each client's download such that requests from clients with short remaining download times are given higher priority and, conversely, request from clients with long remaining download times are given lower priority.
    Type: Grant
    Filed: April 26, 2002
    Date of Patent: January 30, 2007
    Assignee: International Business Machines Corporation
    Inventors: William W. Buchanan, Simon C. Chu, William J. Piazza, David B. Rhoades, Linda A. Riedle
  • Patent number: 7154275
    Abstract: A robust, easily deployable, covert, passive intrusion detection system uses one or more E-field sensors to detect the presence of a moving individual and to provide an indication of the presence of the individual adjacent the sensor based on E-field distortion produced by the individual. Single-ended and differential E-field sensors with noise canceling and a guarding circuit provide sufficient sensitivity, with filtering from 0.5 Hz to 8.0 Hz selecting only human intruders. Either visible or invisible flashing light sources at the sensor indicate the presence of a moving individual at the sensor, thus to provide intruder location without the necessity of providing a geolocation system.
    Type: Grant
    Filed: June 9, 2005
    Date of Patent: December 26, 2006
    Assignee: Bae Systems Information and Electronic Systems Integration Inc.
    Inventors: Paul A. Zank, Eldon M. Sutphin, David W. Buchanan, George P. Succi
  • Patent number: 6993583
    Abstract: A method, system and computer program product for dynamically sharing a limited supply of Internet Protocol (IP) addresses among a larger number of servers. A manager coupled between the Internet and a plurality of servers may receive a request for an IP address associated with a domain name from a client coupled to the Internet. The manager may be configured to map the domain name into an IP address assigned to the server hosting the web site of the domain name. Each assigned IP address may be valid only for a limited time. Once the time the assigned IP address is valid has expired, the assigned IP address may be returned to the pool of available IP addresses thereby allowing a smaller number of IP addresses to be dynamically shared among a larger number of servers.
    Type: Grant
    Filed: February 28, 2002
    Date of Patent: January 31, 2006
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Wayne Anderson, Travis Daren Appleman, William W. Buchanan, Simon Chu, David Michael Green, William Joseph Piazza, Karl Ross Shultz, Paul Brian Tippett
  • Patent number: 6922059
    Abstract: The invention is a detection system and in one embodiment uses inexpensive, miniaturized sensors for detecting electric field (E-field) disturbances. Such sensors are easily and covertly deployable and have low power consumption. The devices may incorporate visual or audio alerts and can include communications hardware for transmitting data for further processing of the electrostatic events.
    Type: Grant
    Filed: December 10, 2002
    Date of Patent: July 26, 2005
    Assignee: BAE Systems Information and Electronic Systems Integration INC
    Inventors: Paul A. Zank, Eldon M. Sutphin, David W. Buchanan, Thomas G. Cehelnik