Patents by Inventor William Meyer Smith

William Meyer Smith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20030126244
    Abstract: A mechanism for scheduling network requests is implemented. A network server responding to a request from a network client for delivery of a software asset determines if network resource capacity is available to service the request. If the capacity is not available to service the request in real time, the server allocates capacity for future delivery of the asset. The server notifies the client of the time slot containing the allocated bandwidth. The client reinitiates its request at the scheduled time, whereby, because capacity has been preallocated, the scheduled request may be more likely to be serviced in real time.
    Type: Application
    Filed: April 15, 1999
    Publication date: July 3, 2003
  • Patent number: 6530022
    Abstract: A scanning tool executing on a host computer may be used to scan a server only if the server (or a proxy) first exposes to the host a certificate that, upon processing by the host, indicates that the server may be scanned. The certificate preferably encrypts a scan permission and is made available from a given port on the server (or the proxy). Whenever the host desires to perform a scan of the server, the host searches the port for the certificate. The certificate is then decrypted to determine whether the scan permission exists. If so, the scan then proceeds, in accordance with any conditions set forth in the decrypted scan permission.
    Type: Grant
    Filed: December 17, 1998
    Date of Patent: March 4, 2003
    Assignee: International Business Machines Corporation
    Inventors: Steven Cameron Blair, Sebastian Hassinger, William Meyer Smith, John Joseph Edward Turek
  • Patent number: 6182227
    Abstract: A method of validating a request to access a target server in a computer network having an open, trusted database. The method begins when a request to access the target server is received at a host from which the scheme is supported. In response, a query is initiated to the trusted database to identify a technical, administrative or other contact person that may authorize the access request. In the Internet, the trusted database may be the WHOIS database that includes second level domain name information. A second query (e.g., an e-mail) is then launched to the identified contact. The e-mail preferably includes a URL and a key. The URL identifies a response Web page interface that is accessible upon entry of the key. If the identified contact accesses the Web page interface, he or she may then authorize the access request, deny the access request, or indicate under what conditions the request may occur.
    Type: Grant
    Filed: June 22, 1998
    Date of Patent: January 30, 2001
    Assignee: International Business Machines Corporation
    Inventors: Steven Cameron Blair, Sebastian Hassinger, William W. Hurley, II, William Meyer Smith, John J. E. Turek