Patents by Inventor William Alton
William Alton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7891914Abstract: A geotextile tube is provided. The geotextile tube includes a first sheet and second sheet that both have first portions with a first weave pattern and second portions with a second weave pattern. The first portion of the first sheet covers a larger surface area than the second portion of the first sheet. Likewise, the first portion of the second sheet covers a larger surface area than the second portion of the second sheet. A seam contacts and attaches the second portion of the first sheet to the second portion of the second sheet.Type: GrantFiled: September 30, 2008Date of Patent: February 22, 2011Assignee: Flint Industries, Inc.Inventors: Joe Lamon Smallwood, William Alton Smallwood
-
Patent number: 7558840Abstract: A backup storage system includes a server having a restore operation that is independent from browse, mark and submit operations. A restore engine process is created as part of a restore session initiated by a client for retrieving a list of restorable objects to be displayed to a user via a graphical user interface. The user can browse the list of restorable objects, mark or select objects for restoration and submit the list of mark objects. Multiple restore submissions can be made prior to the user commanding the restore engine process, via a remote procedure call, to execute the submitted restore requests. To support new backup techniques and storage devices, a corresponding library can be added for processing with minimal impact to the overall restore system.Type: GrantFiled: January 25, 2001Date of Patent: July 7, 2009Assignee: EMC CorporationInventors: Stephen M. Howard, William Alton Gill, Robert Alan Boudrie, Glenn R. Sachar
-
Publication number: 20070065551Abstract: A technique for treating packaged solid meat products by applying microwave energy at an elevated operating frequency such as 2450 MHz. The microwave energy is provided at a relatively low power level, such as 1 kilowatt (kW) per pound per minute. This frequency is sufficiently high such that energy penetration depth is limited, and thus it only causes rapid heating of the outer surface of the product. The result is thus much like searing in which the meat product is only heated to a minimum depth. Any juices trapped in the package are also heated rapidly, and spread to fill irregularities in the surface of the product. Because the exterior surface of the meat is heated only to a minimum depth, the interior of the meat product retains its desired doneness, color and texture. Only minimal cooling efforts need to be taken afterwards.Type: ApplicationFiled: September 13, 2006Publication date: March 22, 2007Inventor: William Alton
-
Patent number: 6973580Abstract: The present invention is embodied in a system and method for monitoring and alerting remote client users of digital intrusions of their computers by host servers. In general, the present invention monitors actions taken by host servers relating to information about the remote client and displays graphical alerts when a digital intrusion or a breach of security occurs during a network connection, such as a connection to the Internet, with the host server. Specifically, the present invention monitors certain aspects of the remote client user s interaction with host servers. Based on certain interaction, such as an attempt by the host server to retrieve non-related information about the remote client, the remote client user can be provided with a graphical alert. This allows the remote client user to make an informed decision whether or not to allow certain host server sites to retrieve the client user s personal information.Type: GrantFiled: July 13, 2000Date of Patent: December 6, 2005Assignee: International Business Machines CorporationInventors: Scott Allen Carroll, William Alton Fiveash, Gerald Francis McBrearty, Shawn Patrick Mullen, Johnny Meng-Han Shieh
-
Patent number: 6938155Abstract: A system and method for providing multiple virtual private networks from a computer system. The computer system communicates with a remote computer system in order to allow encrypted data traffic to flow between the respective systems. Two phases are used to authenticate the computer systems to one another. During the first phase, digital certificates or pre-shared keys are used to authenticate the computer systems. A phase 1 ID rules list contains authentication rules for local-remote computer pairs. During the second phase, a hash value is used to authenticate the computer systems and a security association payload is created. The remote system's IP address is used for connecting. The phase 1 ID rules list corresponds to one or more phase 2 ID rules lists. If the remote ID is not found in the phase 2 ID rules list, a default rule is used based upon the phase 1 ID rules list.Type: GrantFiled: May 24, 2001Date of Patent: August 30, 2005Assignee: International Business Machines CorporationInventors: Ajit Clarence D'Sa, William Alton Fiveash, Denise Marie Genty, Guha Prasad Venkataraman, Jacqueline Hegedus Wilson
-
Patent number: 6789200Abstract: A method of protecting a data processing system is provided. In a preferred embodiment the data processing system temporarily switches from a main system library mode to a safe system library mode. A user then may open and read a document, such as, for example, an e-mail message, and any virus or worm contained in the document will be prevented from executing and damaging the data processing system.Type: GrantFiled: May 18, 2000Date of Patent: September 7, 2004Assignee: International Business Machines CorporationInventors: William Alton Fiveash, Gerald Francis McBrearty, Shawn Patrick Mullen, Johnny Meng-Han Shieh
-
Patent number: 6738909Abstract: A method and apparatus for use in data processing system for selecting rules to filter data for a tunnel. A request is received to create a tunnel to another data processing system. A granularity of information about the data processing system is identified to form an identified granularity. The identified granularity of the information about the data processing system is used to select a rule, which matches the identified granularity. This rule is placed in a filter, wherein the filter associates data packets with the tunnel.Type: GrantFiled: September 2, 1999Date of Patent: May 18, 2004Assignee: International Business Machines CorporationInventors: Pau-Chen Cheng, William Alton Fiveash, Vachaspathi Peter Kompella, Christiaan Blake Wenzel, Jacqueline Hegedus Wilson
-
Patent number: 6721766Abstract: A backup and restore system includes a work item server for restoring multiple work times simultaneously. The work item server assigns each work item to a respective trail queue based upon the commonality of the volumes on which the work items are stored. The work item server allocates drives to the trail queues for restoring multiple work items simultaneously. The trail queue have drives assigned for work items in that trail queues to use during a restore. The trail queue has a concurrency defined to predetermine the number of simultaneous work items can run that are associated with the trail queues. Drives can be allocated to the trail queues for executing work item restores associated with the respective trail queues until a predetermined trail queue concurrency is reached.Type: GrantFiled: January 25, 2001Date of Patent: April 13, 2004Assignee: EMC CorporationInventors: William Alton Gill, Stephen M. Howard, Robert Alan Boudrie, Glenn R. Sachar
-
Patent number: 6717591Abstract: For a presentation comprising a plurality of presentation segments, timing is established through the combination of assigning a portion of a total presentation time to each of the plurality of presentation segments, displaying the time assigned to each of said presentation segments, enabling a user to change the time assigned to the segment being presented, and in response to a change in said time, dynamically reapportioning the remaining total time among the subsequent sequential presentation segments. The reapportioned times for said subsequent sequential presentation segments can further be displayed. There may also be means, responsive to the change in the time, for dynamically eliminating one of said sequential segments. In slide presentations, there may be means for displaying the reapportioned times for said subsequent sequential individual slides together with miniaturizations of each of said subsequent sequential individual slides.Type: GrantFiled: August 31, 2000Date of Patent: April 6, 2004Assignee: International Business Machines CorporationInventors: William Alton Fiveash, Denise Marie Genty, Gerald Francis McBrearty, Shawn Patrick Mullen, Johnny Meng-Han Shieh
-
Patent number: 6714970Abstract: Protecting open Web sites from known malicious users in a World Wide Web (Web) communication network with access to a plurality of open Web sites responsive to requests from users at IP addresses throughout the Web. There is provided in association with a protected open Web site, a stored list of the IP addresses of known malicious users combined with means for comparing the IP addresses of each user requesting access to the protected open Web site to said list of IP addresses of the known malicious users. There are also implementations responsive to the comparing means for diverting to an alias address for the protected Web site any request from the IP address of a malicious user. The alias address is provided by a function associated with the protected open Web site. The present invention is applicable in circumstances where the malicious users or “crackers” are already known.Type: GrantFiled: October 26, 2000Date of Patent: March 30, 2004Assignee: International Business Machines CorporationInventors: William Alton Fiveash, Gerald Francis McBrearty, Shawn Patrick Mullen, Johnny Meng-Han Shieh
-
Patent number: 6704886Abstract: A backup and restore system forms a persistent submit object from objects marked for restoration by a user. The submit object encapsulates the information needed to restore the work items contained in the submit object. The submit object enables restore execution to be independent from the browse, mark and submit operations. The submit object also allows multiple restore requests to be submitted.Type: GrantFiled: January 25, 2001Date of Patent: March 9, 2004Assignee: EMC CorporationInventors: William Alton Gill, Stephen M. Howard, Robert Alan Boudrie, Glenn R. Sachar, Edgar J. StPierre
-
Publication number: 20020178240Abstract: A system and method for providing multiple virtual private networks (VPNs) from a computer system. Configuration information is maintained for connections, or tunnels, established between a local computer system and a number of remote computer systems. The configuration information includes information about the endpoints, or local-remote computer pairs, policies used to determine preferred access methods for connecting a given pair of computers, pre-shared keys, and digital certificates for providing keys to encrypt and decipher data. A local-remote pair is selected from an endpoints table. A policy corresponding to the selected local-remote pair is selected determining the access method(s) to be attempted in securely connecting the two computer systems. If an access method uses a digital certificate, the corresponding information is retrieved from a digital certificate table. The decision whether to check the digital certification has been revoked is stored in the endpoints table.Type: ApplicationFiled: May 24, 2001Publication date: November 28, 2002Applicant: International Business Machines CorporationInventors: William Alton Fiveash, Denise Marie Genty, Guha Prasad Venkataraman, Jacqueline Hegedus Wilson
-
Publication number: 20020178355Abstract: A system and method for providing multiple virtual private networks from a computer system. The computer system communicates with a remote computer system in order to allow encrypted data traffic to flow between the respective systems. Two phases are used to authenticate the computer systems to one another. During the first phase, digital certificates or pre-shared keys are used to authenticate the computer systems. A phase 1 ID rules list contains authentication rules for local-remote computer pairs. During the second phase, a hash value is used to authenticate the computer systems and a security association payload is created. The remote system's IP address is used for connecting. The phase 1 ID rules list corresponds to one or more phase 2 ID rules lists. If the remote ID is not found in the phase 2 ID rules list, a default rule is used based upon the phase 1 ID rules list.Type: ApplicationFiled: May 24, 2001Publication date: November 28, 2002Applicant: International Business Machines CorporationInventors: Ajit Clarence D'Sa, William Alton Fiveash, Denise Marie Genty, Guha Prasad Venkataraman, Jacqueline Hegedus Wilson
-
Patent number: 6076168Abstract: A method of securing data traffic between a local and remote host systems is provided. The method includes autogenerating a filter having rules associated with a defined tunnel. The filter rules are used to permit or deny acceptance of transmitted data by the host system and to direct traffic to the tunnel. The tunnel, on the other hand, is used to keep data confidential. The method further includes autogeneration of a counterpart tunnel and associated filter to be used by the remote host when in communication with the local host. The method further autogenerates a new filter to reflect changes to any one of the tunnels and autodeactivates the filter associated with a deleted tunnel.Type: GrantFiled: October 3, 1997Date of Patent: June 13, 2000Assignee: International Business Machines CorporationInventors: William Alton Fiveash, Xinya Wang, Christiaan Blake Wenzel, Jacqueline Hegedus Wilson, Opral Vanan Wisham