Patents by Inventor Michael D. Hocker
Michael D. Hocker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11875200Abstract: A message limit value to be used in enqueuing one or more messages on a queue of a device of the computing environment is obtained. The message limit value indicates whether an extended maximum message length is supported by the device. The extended maximum message length is different from a default maximum message length supported by the device. Based on determining that the extended maximum message length is supported and that the obtained message limit value has a defined relationship with a select value, at least one message of an extended length is enqueued on the queue of the device.Type: GrantFiled: September 23, 2021Date of Patent: January 16, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Louis P. Gomes, Damian Osisek, Harald Freudenberger, Richard John Moore, Volker Urban, Michael D. Hocker, Eric David Rossman, Richard Victor Kisley
-
Publication number: 20230089541Abstract: A message limit value to be used in enqueuing one or more messages on a queue of a device of the computing environment is obtained. The message limit value indicates whether an extended maximum message length is supported by the device. The extended maximum message length is different from a default maximum message length supported by the device. Based on determining that the extended maximum message length is supported and that the obtained message limit value has a defined relationship with a select value, at least one message of an extended length is enqueued on the queue of the device.Type: ApplicationFiled: September 23, 2021Publication date: March 23, 2023Inventors: Louis P. Gomes, Damian Osisek, Harald Freudenberger, Richard John Moore, Volker Urban, Michael D. Hocker, Eric David Rossman, Richard Victor Kisley
-
Publication number: 20220282980Abstract: Aspects include detecting, at a first point in time, that a first person at a first location is within a vicinity of one or more other people and predicting, for each of the one or more people, a future location of the other person at a future point. The future point in time is subsequent to the first point in time and a confidence level is assigned to the prediction. A travel route from the first location to a destination location is generated based at least in part on the one or more predicted future locations and their assigned confidence levels. The generated travel route includes travel route locations that are more than a specified distance from at least one of the predicted future locations having an assigned confidence level greater than a confidence level threshold. Travel route guidance along the generated travel route is provided to the first person.Type: ApplicationFiled: March 3, 2021Publication date: September 8, 2022Inventors: Daniel James Winarski, Itzhack Goldberg, Michael D. Hocker, Christopher V. DeRobertis, David Wayne Glass, Clifford A. Pickover
-
Patent number: 11232209Abstract: A cryptographic hardware security module (HSM) includes a memory storage device and an immutable hardware unit in signal communication with the memory storage device. The memory storage device is configured to store firmware. The immutable hardware unit is configured to perform a hash operation on targeted firmware stored in the memory storage device to determine an authenticity of the targeted firmware based at least in part on results of the hash operation.Type: GrantFiled: January 18, 2019Date of Patent: January 25, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Michael D. Hocker
-
Publication number: 20200233964Abstract: A cryptographic hardware security module (HSM) includes a memory storage device and an immutable hardware unit in signal communication with the memory storage device. The memory storage device is configured to store firmware. The immutable hardware unit is configured to perform a hash operation on targeted firmware stored in the memory storage device to determine an authenticity of the targeted firmware based at least in part on results of the hash operation.Type: ApplicationFiled: January 18, 2019Publication date: July 23, 2020Inventor: Michael D. Hocker
-
Patent number: 10205748Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked, and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.Type: GrantFiled: May 11, 2018Date of Patent: February 12, 2019Assignee: International Business Machines CorporationInventors: Michael D. Hocker, Brandon S. Johnson
-
Patent number: 10205747Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked, and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.Type: GrantFiled: May 11, 2018Date of Patent: February 12, 2019Assignee: International Business Machines CorporationInventors: Michael D. Hocker, Brandon S. Johnson
-
Patent number: 10069860Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.Type: GrantFiled: February 14, 2017Date of Patent: September 4, 2018Assignee: International Business Machines CorporationInventors: Michael D. Hocker, Brandon S. Johnson
-
Publication number: 20180248912Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked, and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.Type: ApplicationFiled: May 11, 2018Publication date: August 30, 2018Inventors: Michael D. Hocker, Brandon S. Johnson
-
Publication number: 20180248911Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked, and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.Type: ApplicationFiled: May 11, 2018Publication date: August 30, 2018Inventors: Michael D. Hocker, Brandon S. Johnson
-
Publication number: 20180234455Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.Type: ApplicationFiled: February 14, 2017Publication date: August 16, 2018Inventors: Michael D. Hocker, Brandon S. Johnson
-
Patent number: 10003612Abstract: A computing system may be protected from revoked system updates. A computing system receives an object and scans it for revocation updates to a security structure of the computing system. The security structure is a monotonically nondecreasing collection of segments containing data on whether a system update is revoked and a system update's status as revoked signifies the revoked system update can no longer be used by the computing system. Based upon scanning the object, the computing system identifies and validates a revocation update. The computing system resolves the revocation update by applying the revocation update to the security structure, by adding or changing one or more segments of the security structure identified by the revocation update, in response to determining that the revocation update is valid, or by denying application of the revocation update to the security structure in response to determining that the revocation update is invalid.Type: GrantFiled: September 28, 2017Date of Patent: June 19, 2018Assignee: International Business Machines CorporationInventors: Michael D. Hocker, Brandon S. Johnson
-
Patent number: 9938261Abstract: Provided herein are heterocyclic compounds for treatment of CSF1R, FLT3, KIT, and/or PDGFR? kinase mediated diseases. Also provided are pharmaceutical compositions comprising the compounds and methods of using the compounds and compositions.Type: GrantFiled: June 20, 2016Date of Patent: April 10, 2018Assignee: Ambit Biosciences CorporationInventors: Michael J. Hadd, Michael D. Hocker, Mark W. Holladay, Gang Liu, Martin W. Rowbottom, Shimin Xu
-
Patent number: 9571126Abstract: A method, system, and computer program product for performing robust, parallel data transfer by a processor device. Data is segmented into k-bit segments, where k?1. The k-bit segments are convolution encoded, using m?1 stages of delay. The n output streams are transmitted in parallel for increased effective data rate, where n>k. The n output streams are received. An XOR (Exclusive OR) logic is applied to the n output streams with pathing allowed by the convolution encoding, in a trellis-decoding diagram.Type: GrantFiled: April 11, 2016Date of Patent: February 14, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara Astigarraga, Louie A. Dickens, Michael D. Hocker, Michael E. Starling, Daniel J. Winarski
-
Publication number: 20160362405Abstract: Provided herein are heterocyclic compounds for treatment of CSF1R, FLT3, KIT, and/or PDGFR? kinase mediated diseases. Also provided are pharmaceutical compositions comprising the compounds and methods of using the compounds and compositions.Type: ApplicationFiled: June 20, 2016Publication date: December 15, 2016Inventors: Michael J. Hadd, Michael D. Hocker, Mark W. Holladay, Gang Liu, Martin W. Rowbottom, Shimin Xu
-
Patent number: 9452167Abstract: Provided herein are heterocyclic compounds for treatment of CSF1R, FLT3, KIT, and/or PDGFR? kinase mediated diseases. Also provided are pharmaceutical compositions comprising the compounds and methods of using the compounds and compositions.Type: GrantFiled: December 22, 2014Date of Patent: September 27, 2016Assignee: AMBIT BIOSCIENCES CORPORATIONInventors: Michael J. Hadd, Michael D. Hocker, Mark W. Holladay, Gang Liu, Martin W. Rowbottom, Shimin Xu
-
Patent number: 9411576Abstract: A software version management system comprising a host driver and at least one software module. The host driver comprises migration means to start, stop and replace the software modules on a computer system in response to replacement actions.Type: GrantFiled: December 2, 2013Date of Patent: August 9, 2016Assignee: International Business Machines CorporationInventors: Michael D. Hocker, Michael J. Jordan, Tamas Visegrady, Klaus Werner
-
Publication number: 20160226524Abstract: A method, system, and computer program product for performing robust, parallel data transfer by a processor device. Data is segmented into k-bit segments, where k?1. The k-bit segments are convolution encoded, using m?1 stages of delay. The n output streams are transmitted in parallel for increased effective data rate, where n>k. The n output streams are received. An XOR (Exclusive OR) logic is applied to the n output streams with pathing allowed by the convolution encoding, in a trellis-decoding diagram.Type: ApplicationFiled: April 11, 2016Publication date: August 4, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara ASTIGARRAGA, Louie A. DICKENS, Michael D. HOCKER, Michael E. STARLING, Daniel J. WINARSKI
-
Patent number: 9374108Abstract: A method, system, and computer program product for performing robust, parallel data transfer by a processor device. Data is segmented into k-bit segments, where k?1. The k-bit segments are convolution encoded, using m?1 stages of delay. The n output streams are transmitted in parallel for increased effective data rate, where n>k. The n output streams are received. The n output streams are exclusive-or'ed with pathing allowed by the convolution encoding, in a trellis-decoding diagram. Error-corrected data is identified as an overall path in the trellis-decoding diagram with zero Hamming radius.Type: GrantFiled: May 19, 2014Date of Patent: June 21, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara Astigarraga, Louie A. Dickens, Michael D. Hocker, Michael E. Starling, Daniel J. Winarski
-
Publication number: 20150333768Abstract: A method, system, and computer program product for performing robust, parallel data transfer by a processor device. Data is segmented into k-bit segments, where k?1. The k-bit segments are convolution encoded, using m?1 stages of delay. The n output streams are transmitted in parallel for increased effective data rate, where n>k. The n output streams are received. The n output streams are exclusive-or'ed with pathing allowed by the convolution encoding, in a trellis-decoding diagram. Error-corrected data is identified as an overall path in the trellis-decoding diagram with zero Hamming radius.Type: ApplicationFiled: May 19, 2014Publication date: November 19, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara ASTIGARRAGA, Louie A. DICKENS, Michael D. HOCKER, Michael E. STARLING, Daniel J. WINARSKI