Patents by Inventor Christopher Tofts
Christopher Tofts has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20040122916Abstract: Connection of a client browser to a server hosting a sub-page in a website via a link from a principal page at a higher level in the hierarchy of pages is established by actuation of a link sent to the client with the principal page. The link includes a signifier unique to a given server on which the sub-page is hosted, so that resolution of the URL in the link need not be performed dynamically at the server side.Type: ApplicationFiled: July 30, 2003Publication date: June 24, 2004Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Athena Christodoulou, Richard Taylor, Christopher Tofts
-
Publication number: 20040093585Abstract: A method of modelling business processes and/or logical networks comprises:Type: ApplicationFiled: November 7, 2002Publication date: May 13, 2004Inventors: Athena Christodoulou, Richard Taylor, Christopher Tofts
-
Publication number: 20040086125Abstract: Security keys for the provision of a secure service such as content provision are generated in an ancestral hierarchy, so that invalidation of a key in the hierarchy results in a need to reconfigure all other keys in the hierarchy to the extent they share common ancestry. When a user subscription to the service lapses, a decision on invalidation of their key is based in a determination of whether it's more costly to the subscriber to invalidate the key, or continue providing an unpaid-for service. Keys can be allocated to users from domains of the hierarchy on the basis of their economic value to the provider, with higher value users being allocated keys from domains which share fewer common ancestors with other users of other domains than those users share with each other, to minimise inconvenience to high value users of key reconfiguration.Type: ApplicationFiled: July 30, 2003Publication date: May 6, 2004Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Antonio Lain, Richard Taylor, Christopher Tofts
-
Publication number: 20040086126Abstract: Security keys for the provision of a secure service such as content provision are generated in an ancestral hierarchy, so that invalidation of a key in the hierarchy results in a need to reconfigure all other keys in the hierarchy to the extent they share common ancestry. When a user subscription to the service lapses, a decision on invalidation of their key is based in a determination of whether it's more costly to the subscriber to invalidate the key, or continue providing an unpaid-for service. Keys can be allocated to users from domains of the hierarchy on the basis of their economic value to the provider, with higher value users being allocated keys from domains which share fewer common ancestors with other users of other domains than those users share with each other, to minimise inconvenience to high value users of key reconfiguration.Type: ApplicationFiled: October 29, 2003Publication date: May 6, 2004Applicant: Hewlett-Packard Development Company, L.P.Inventors: Antonio Lain, Richard Taylor, Christopher Tofts
-
Publication number: 20040088356Abstract: A device for positioning in the workplace of a worker, the device being operable, in the worker's absence from said workplace, to provide a visitor to the workplace with information specifying the remote location of the worker and to enable the visitor to communicate with the absent worker; the device comprising processing means, memory, a digital display and a user interface; the processing means being coupled to a database, the database comprising data representative of a remote location and corresponding data representative of at least one possible mode of communication between the device and the remote worker at the said remote location; the processing means being electrically coupled to the digital display and the user interface; the memory being operable to store data specifying the remote location of the worker; the digital display being operable to display information specifying the remote location of the worker; the processing means being operable to interrogate the database to obtain the possible moType: ApplicationFiled: June 24, 2003Publication date: May 6, 2004Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Abigail Jane Sellen, Christopher Tofts
-
Publication number: 20040015746Abstract: A fault manifested in a network between two network nodes is investigated by selecting highest probability failure modes of resources which form network pathways between the two nodes, and probing the network to establish whether any of the highest probability failure modes are the cause of the fault. If not then a group of lower probability failure modes are selected and the network is probed once again to establish whether any of the lower probability failure modes are the cause of the fault. This process may be repeated until the fault is diagnosed. Resources are defined at the discretion of an administrator, and so may be clustered groups of computing entities and network links, or defined at a level of particularity such that functional elements within a computing entity such as a network card and a driver are defined as resources.Type: ApplicationFiled: April 8, 2003Publication date: January 22, 2004Inventors: Athena Christodoulou, Christopher Tofts
-
Publication number: 20030158970Abstract: A method and apparatus are provided for automatic analysis of communications paths to remove or modify redundant or inappropriate steps or data processing operators.Type: ApplicationFiled: January 24, 2003Publication date: August 21, 2003Inventors: Christopher Tofts, Athena Christodoulou, Richard Taylor
-
Publication number: 20030142347Abstract: An information technology network includes a plurality of printers, at least two of which run a distributed print management programme. The programme operates to monitor all network traffic by snooping, and on the basis of monitored network traffic maintains a log of network printers, their capabilities and status. In addition the programme repeatedly checks for print job notices placed on a spooler, determines on the basis of the updated log which printer under its management is most appropriate to perform the outstanding job, and that printer to retrieve the outstanding job notice and perform the job. Conflicts between different printers retrieving the same job are either resolved by leader election, or preventing conflict by invoking the use within the spooler of a processor instruction known as TEST/SET.Type: ApplicationFiled: November 21, 2002Publication date: July 31, 2003Applicant: HEWLETT-PACKARD COMPANYInventors: Athena Christodoulou, Richard Taylor, Christopher Tofts
-
Publication number: 20030097245Abstract: Apparatus for producing an electronic model of a communications network or system having at least one host and a plurality of notes connected thereto, directly or otherwise, the apparatus comprising means for obtaining data relating to at least some of the notes and/or the host and means for creating an electronic model of the system or network using the data. The apparatus comprises a trusted computer host (16) for use in analysing the network (10). The trusted computer host (16) comprises means (18) for detecting nodes (14) on the network. As nodes (14) are detected, sampling probes (20) are inserted at each such node (14) wherever possible. The probes (20) take measurements at the respective nodes and return the resultant data to the trusted computer host (16).Type: ApplicationFiled: November 19, 2002Publication date: May 22, 2003Inventors: Athena Christodoulou, Richard Taylor, Christopher Tofts
-
Publication number: 20030095275Abstract: A multi-stage or process operation, such as the printing of a document from a data file in the form of a word processing document may be performed either by passing the document directly along a relatively fast network link to a printer 300, or by passing the document along a relatively slow link to a printer 200, where the document is ripped, and then passing the ripped data along a further relatively fast link to printer 300. To determine the optimum course of action in view of a policy demanding speed of printing the probable speed of each course of action is determined, and the course of action most likely to yield a result in conformity with the policy is selected.Type: ApplicationFiled: October 11, 2002Publication date: May 22, 2003Inventors: Athena Christodoulou, Richard Taylor, Christopher Tofts
-
Publication number: 20030084058Abstract: Apparatus for compressing data having an arbitrary probability distribution, the apparatus comprising means for obtaining a set of samples from the data, and means for creating a phase distribution model of the sample data set. The means for creating the phase distribution model including search means for performing a search function adapted to select the elements forming the phase distribution model by evaluating one or more values of the elements within the model and determining those that best fit the distribution of the sample data set. Thus the apparatus of the invention is able to compress the data which has an arbitrary probability to distribution by automatically producing the optimum phase distribution model (perhaps to within a predetermined accuracy threshold), the resultant model comprising the data suitably compressed for storage and manipulation within realistic system capacity.Type: ApplicationFiled: October 30, 2002Publication date: May 1, 2003Inventors: Athena Christodoulou, Richard Taylor, Christopher Tofts
-
Publication number: 20030072265Abstract: In order to manipulate traffic flow on a computer network 10 traffic is added in a predetermined pattern.Type: ApplicationFiled: October 9, 2002Publication date: April 17, 2003Inventors: Andrew Franklin Seaborne, Christopher Tofts
-
Publication number: 20030072324Abstract: In order to improve throughput on a computer network 10, a traffic manipulation device 12 is used to exploit the collision properties on the computer network 10. Deliberate collisions of data packets are caused to manipulate traffic flow on the computer network 10.Type: ApplicationFiled: October 9, 2002Publication date: April 17, 2003Inventors: Andrew Franklin Seaborne, Christopher Tofts
-
Publication number: 20030069898Abstract: A data processing system is provided in which a data acquisition unit includes a data tag generator for generating data tags associated with acquired data items. The generated data tags are transmitted to a data store.Type: ApplicationFiled: July 30, 2002Publication date: April 10, 2003Inventors: Athena Christodoulou, Richard Taylor, Christopher Tofts
-
Publication number: 20030025937Abstract: A method and associated control apparatus are used to control the operation of a plurality of independent printing devices each having at least one holder. The control apparatus is arranged to store information relating to one or more print jobs scheduled to be performed by each of said plurality of printing devices. This information includes the quantity of media required to complete each of the print jobs. The control apparatus learns an initial or current quantity of media held in one or more of said printing devices and estimates or otherwise determines the quantity of media remaining in a media holder of a printing device during the performance of a print job. The control apparatus generates an alert when said quantity of media reaches a predetermined minimum value indicating that more media will be required to accommodate a particular print job.Type: ApplicationFiled: July 30, 2002Publication date: February 6, 2003Applicant: HEWLETT PACKARD COMPANYInventors: Athena Christodoulou, Richard Taylor, Christopher Tofts
-
Publication number: 20030028667Abstract: Information is distributed within a group or organisation by taking a message in electronic form distributing it to the intended recipient or generating a list of suitable recipients (based on the contents of the database containing details of all individuals and their areas of expertise and/or information related to particularly highly connected individuals) of the message and sends the message to those recipients accordingly. A random distribution model is provided which comprises copying the message a number of times, and generating a list of potential further recipients, and for subsequently selecting a random set of those potential recipients.Type: ApplicationFiled: July 17, 2002Publication date: February 6, 2003Inventors: Richard Taylor, Christopher Tofts
-
Publication number: 20030016374Abstract: A computer network comprises plural computer systems connected to plural printers. Each computer system comprises at least one application program for generating print data for one or more of the printers. One of the computer systems is partially employed as a stock control computer. An application program stored on the stock control computer runs a model of the overall system, including maintaining an up-to-date schedule of all print jobs on the system, and maintains a log of all media resources (i.e., paper) available to each printer. The application program ensures that the printers have suitable media resources and/or that print jobs are allocated to printers where appropriate media resources are available, if possible.Type: ApplicationFiled: June 4, 2002Publication date: January 23, 2003Inventors: Athena Christodoulou, Richard Taylor, Christopher Tofts
-
Publication number: 20030016388Abstract: Print jobs requested are scheduled to be performed during available time slots, and on suitable printers having lowest associated overhead cost. In the event that no technically suitable printer is available a print services management programme determines whether it is economically viable to cancel one or more pre-scheduled print jobs in favour of the requested job, taking into account, for example, the price of the requested job and scheduled jobs. In a development a bidding routine establishes at what price it is viable to cancel a scheduled job in favour of a requested job, and that price is then offered to a customer. Future work inflow is predicted and represented in the form of virtual jobs which are scheduled in the same manner as actual jobs, but whose value is representative of the likelihood of the job maturing into an actual job.Type: ApplicationFiled: July 18, 2002Publication date: January 23, 2003Applicant: HEWLETT-PACKARD COMPANYInventors: Athena Christodoulou, Richard Taylor, Christopher Tofts
-
Publication number: 20020181019Abstract: A computer network 1 comprises first, second, and third computer systems 3, 5, 7 connected to first, second, and third print devices 9, 11, 13 by means of a network 15. Each computer system 3, 5, 7 comprises at least one application program capable of generating print data for output to one or more of the print devices 9, 11, 13. The print data is output from each application program and stored on a on a print spooler (not shown) forming part of each computer system 3, 5, 7. Each print device 9, 11, 13 comprises a daemon 23 and a local memory 19, the data control module being configured to monitor, via the network 15, print data relating to a print job stored on a computer system, the print data including job timing information relating to the preferred time at which the print job is to be processed.Type: ApplicationFiled: June 4, 2002Publication date: December 5, 2002Applicant: HEWLETT PACKARD COMPANYInventors: Athena Christodoulou, Richard Taylor, Christopher Tofts
-
Publication number: 20020184000Abstract: A computer network comprises first, second, and third computer systems connected to first, second, third and fourth print devices by means of a network connection. Each computer system comprises at least one application program capable of generating print data for output to one or more of the print devices. A server is also connected to the network connection, the server comprising a workflow management program which monitors and controls the flow of print jobs which are sent by the first, second, third and computer systems. The workflow management program maintains a computer model representing the up-to-date state of the system. In response to a new event occurring in the system, such as a hardware failure or a new print job, the program makes a plurality of copies of the computer model and assigns to each copy an alternative event management operation.Type: ApplicationFiled: June 4, 2002Publication date: December 5, 2002Applicant: HEWLETT PACKARD COMPANYInventors: Athena Christodoulou, Richard Taylor, Christopher Tofts