Patents by Inventor Robert Howard High

Robert Howard High has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10162618
    Abstract: An install factory creates install packages used to install complex applications onto multiple data processing systems in a reliable and reproducible manner. The install factory takes a variety of inputs to build a custom installation package. The custom install package may be used repeatedly for installs, using the same install package, a full install on a first data processing system, an updated install on a second data processing system, a fix or service pack on a third data processing system, and also configure an application on a fourth data processing system. Thereafter, all data processing systems have the desired level of the application installed. In addition, the install factory may create install packages that are modified in accordance with user preferences.
    Type: Grant
    Filed: December 3, 2004
    Date of Patent: December 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Tim Alan Fors, Robert Howard High, Jr., Rohit V. Kapoor, James Lee Van Oosten
  • Patent number: 8364747
    Abstract: The present invention provides a method, apparatus and computer program product which enables a target service to provide operations which behave, on a per operation basis, in a way appropriate to the type of client that requested the operation to be performed. As a result the target service can provide operations which behave differently for different clients. Further the client can obtain details of the behavior characteristics of the operations, according to its type, at runtime and act appropriately in the event of the request being timed out or resulting in a communication failure. For example, the client middleware can take action to re-issue a timed out request if the behavior characteristic for that operation indicates that multiple invocations of the operation will yield the same result.
    Type: Grant
    Filed: December 17, 2002
    Date of Patent: January 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Michael Cheng, Stephen James Cocks, Robert Howard High, Jr., Ian Robinson
  • Patent number: 8037479
    Abstract: An improved method, apparatus, and computer instructions for creating and running batch jobs in an object oriented environment, such as a J2EE environment. A request to execute a batch job is received. A deployment descriptor file is processed to identify a batch bean to be invoked. This batch job session bean processes the request, parses deployment descriptor file that comprises definitions of relationships between other helper classes, entity and session beans. The identified batch bean is invoked to execute the batch job step in the order described in the deployment descriptor applying checkpoints at intervals specified in the descriptor.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: October 11, 2011
    Assignee: International Business Machines Corporation
    Inventors: Geoffrey Martin Hambrick, Robert Howard High, Jr., Rodney Alan Little, Sridhar Sudarsan
  • Patent number: 8024733
    Abstract: A batch component model is provided within a distributed object environment. The batch component is designed to capture the iterative logic of a batch program as it reads from one or more input streams, invokes operations on other business component functions, and generates output to one or more output streams. Deployment descriptors express declarative policies for the component that will influence how the component is managed including the streams it uses, business components it depends on, how processing costs are accounted, and the resource demands the job will put on the system. Input streams and output streams are encapsulated in objects that hide the actual source of input and output data so that the component can be redeployed in different execution environments to different physical data sources without requiring the program to be changed. A batch container enforces the deployment policies declared for the batch component.
    Type: Grant
    Filed: May 13, 2004
    Date of Patent: September 20, 2011
    Assignee: International Business Machines Corporation
    Inventors: Geoffrey Martin Hambrick, Robert Howard High, Jr., Rodney Alan Little
  • Patent number: 7958172
    Abstract: A method, apparatus, and computer instructions are provided for implementing container managed uses, ownerships, and references in an enterprise JavaBean™ environment. A user may specify a uses, ownership, reference relationships between entity beans and sessions in a deployment descriptor file. When the file is processed, the present embodiment generates methods on the entity beans and allows the container to recognize the relationships, such that the user may access the session beans based on the specified relationships.
    Type: Grant
    Filed: January 24, 2008
    Date of Patent: June 7, 2011
    Assignee: International Business Machines Corporation
    Inventors: Geoffrey Martin Hambrick, Robert Howard High, Jr., Rodney Alan Little, Sridhar Sudarsan
  • Patent number: 7603403
    Abstract: A method and system for providing client locale information to a server in a distributed computer enterprise. When a client generates a request to a remote server, the client's locale and time zone information, known as the international context, is associated with the request. The server then processes requests from the client according to the internationalization context. The client's international context is propagated to successive servers that further service the client's request.
    Type: Grant
    Filed: May 30, 2001
    Date of Patent: October 13, 2009
    Assignee: International Business Machines Corporation
    Inventors: Debasish Banerjee, Jeffrey Alan Frey, Robert Howard High, Jr., Ute Schuerfeld, David Alan Zavala
  • Publication number: 20080229330
    Abstract: An improved method, apparatus, and computer instructions for creating and running batch jobs in an object oriented environment, such as a J2EE environment. A request to execute a batch job is received. A deployment descriptor file is processed to identify a batch bean to be invoked. This batch job session bean processes the request, parses deployment descriptor file that comprises definitions of relationships between other helper classes, entity and session beans. The identified batch bean is invoked to execute the batch job step in the order described in the deployment descriptor applying checkpoints at intervals specified in the descriptor.
    Type: Application
    Filed: May 30, 2008
    Publication date: September 18, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Geoffrey Martin Hambrick, Robert Howard High, Rodney Alan Little, Sridhar Sudarsan
  • Publication number: 20080140704
    Abstract: A method, apparatus, and computer instructions are provided for implementing container managed uses, ownerships, and references in an enterprise JavaBean™ environment. A user may specify a uses, ownership, reference relationships between entity beans and sessions in a deployment descriptor file. When the file is processed, the present embodiment generates methods on the entity beans and allows the container to recognize the relationships, such that the user may access the session beans based on the specified relationships.
    Type: Application
    Filed: January 24, 2008
    Publication date: June 12, 2008
    Inventors: Geoffrey Martin Hambrick, Robert Howard High, Rodney Alan Little, Sridhar Sudarsan
  • Patent number: 7340478
    Abstract: A method, apparatus, and computer instructions are provided for implementing container managed uses, ownerships, and references in an enterprise JavaBean™ environment. A user may specify a uses, ownership, reference relationships between entity beans and sessions in a deployment descriptor file. When the file is processed, the present embodiment generates methods on the entity beans and allows the container to recognize the relationships, such that the user may access the session beans based on the specified relationships.
    Type: Grant
    Filed: January 7, 2005
    Date of Patent: March 4, 2008
    Assignee: International Business Machines Corporation
    Inventors: Geoffrey Martin Hambrick, Robert Howard High, Jr., Rodney Alan Little, Sridhar Sudarsan
  • Patent number: 7139918
    Abstract: A method and system to allow multiple users of a client computer to establish a secure connection for each of the multiple users between the client computer and a server computer. Each user is allowed to unlock a keyfile unique to that user. The unique keyfile is able to authenticate the user's identity to the server computer. Access to the users unique keyfile is accomplished by the user inputting into the client computer a unique user password for the user's unique keyfile. A Graphical User Interface (GUI) is provided to allow the user to input the unique user password for that user's unique keyfile. Upon input of the password, the selected keyfile is opened to enable a user authentication process to authenticate the user's identity to the server computer, thus creating an authenticated secure connection between the server computer and the client computer for the specific user.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: November 21, 2006
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, Robert Howard High, Jr.
  • Patent number: 7124192
    Abstract: Methods, systems, and computer program products are disclosed for protecting the security of resources in distributed computing environments. The disclosed techniques improve administration and enforcement of security policies. Allowed actions on resources, also called permissions, (such as invocations of particular methods, read or write access of a particular row or perhaps a particular column in a database table, and so forth) are grouped, and each group of permissions is associated with a role name. A particular action on a particular resource may be specified in more than one group, and therefore may be associated with more than one role. Each role is administered as a security object. Users and/or user groups may be associated with one or more roles. At run-time, access to a resource is protected by determining whether the invoking user has been associated with (granted) at least one of the roles required for this type of access on this resource.
    Type: Grant
    Filed: August 30, 2001
    Date of Patent: October 17, 2006
    Assignee: International Business Machines Corporation
    Inventors: Robert Howard High, Jr., Anthony Joseph Nadalin, Nataraj Nagaratnam
  • Patent number: 7076798
    Abstract: A method and system for providing security protection to Common Object Request Broker Architecture (CORBA) objects located on a server. An EJB shadow object is created for the CORBA object. The EJB shadow object invokes an EJB security mechanism on behalf of the CORBA object, thus protecting the CORBA object from unauthorized object requesters. In a preferred embodiment, requesters are categorized and identified by their roles in the enterprise. Only those requesters having a proper role are authorized to access the requested object.
    Type: Grant
    Filed: February 7, 2002
    Date of Patent: July 11, 2006
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, Robert Howard High, Jr., Nataraj Nagaratnam, Russell Ley Newcombe, Lori Jane Milhans VanGulick, Vishwanath Venkataramappa
  • Patent number: 6782538
    Abstract: A system for efficiently generating keys for subsequently objects during object creation and for finding and activating objects using the generated keys in an object oriented system includes one or more processors, a storage system, one or more I/O controllers, a system bus, operatively connecting the processors, the storage system and the I/O controllers, a system control program for controlling the operation of the system, and an extensible instance manager which generates keys and manages instances of objects under the control of the system control program.
    Type: Grant
    Filed: December 14, 1995
    Date of Patent: August 24, 2004
    Assignee: International Business Machines Corporation
    Inventors: George Prentice Copeland, Geoffrey Martin Hambrick, Robert Howard High, Jr.
  • Publication number: 20040117453
    Abstract: The present invention provides a method, apparatus and computer program product which enables a target service to provide operations which behave, on a per operation basis, in a way appropriate to the type of client that requested the operation to be performed. As a result the target service can provide operations which behave differently for different clients. Further the client can obtain details of the behavior characteristics of the operations, according to its type, at runtime and act appropriately in the event of the request being timed out or resulting in a communication failure. For example, the client middleware can take action to re-issue a timed out request if the behavior characteristic for that operation indicates that multiple invocations of the operation will yield the same result.
    Type: Application
    Filed: December 17, 2002
    Publication date: June 17, 2004
    Applicant: International Business Machines Corporation
    Inventors: Michael Cheng, Stephen James Cooks, Robert Howard High, Ian Robinson
  • Patent number: 6687831
    Abstract: A method and apparatus in a computer system for establishing a connection between a client proxy object and a server target object. A request is received from the client proxy object to access the server target object, wherein the request includes an identification of a type of communication and type of message to be sent to the server target object. A connection object is identified based on the type of communication and the type of message. The connection object implementing the type of communication is returned, wherein the connection between the client proxy object and the server target object is facilitated using the connection object.
    Type: Grant
    Filed: April 29, 1999
    Date of Patent: February 3, 2004
    Assignee: International Business Machines Corporation
    Inventors: Virgil Anthony Albaugh, Messaoud Benantar, John Alexander Buslawski, David Yu Chang, Robert Howard High, Jr.
  • Publication number: 20030149893
    Abstract: A method and system for providing security protection to Common Object Request Broker Architecture (CORBA) objects located on a server. An EJB shadow object is created for the CORBA object. The EJB shadow object invokes an EJB security mechanism on behalf of the CORBA object, thus protecting the CORBA object from unauthorized object requesters. In a preferred embodiment, requesters are categorized and identified by their roles in the enterprise. Only those requesters having a proper role are authorized to access the requested object.
    Type: Application
    Filed: February 7, 2002
    Publication date: August 7, 2003
    Applicant: International Business Machines Corp.
    Inventors: David Yu Chang, Robert Howard High, Nataraj Nagaratnam, Russell Ley Newcombe, Lori Jan Milhans VanGulick, Vishwanath Venkataramappa
  • Publication number: 20030145237
    Abstract: A method and system to allow multiple users of a client computer to establish a secure connection for each of the multiple users between the client computer and a server computer. Each user is allowed to unlock a keyfile unique to that user. The unique keyfile is able to authenticate the user's identity to the server computer. Access to the users unique keyfile is accomplished by the user inputting into the client computer a unique user password for the user's unique keyfile. A Graphical User Interface (GUI) is provided to allow the user to input the unique user password for that user's unique keyfile. Upon input of the password, the selected keyfile is opened to enable a user authentication process to authenticate the user's identity to the server computer, thus creating an authenticated secure connection between the server computer and the client computer for the specific user.
    Type: Application
    Filed: January 31, 2002
    Publication date: July 31, 2003
    Applicant: International Business Machines Corp.
    Inventors: David Yu Chang, Robert Howard High
  • Publication number: 20030093465
    Abstract: A method and system for managing client locale information to a server in a distributed computer enterprise. When a client generates a request to a remote server, the client's international context (e.g., locale and time zone information) is associated with the request. The server then retrieves an internationalization management policy and processes requests from the client according to the internationalization context that is configured by the internationalization context management policy. The internationalization context is propagated to successive servers that further service the client's request.
    Type: Application
    Filed: October 31, 2001
    Publication date: May 15, 2003
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Debasish Banerjee, Jeffrey Alan Frey, Robert Howard High, Ute Schuerfeld, David Alan Zavala
  • Publication number: 20030046576
    Abstract: Methods, systems, and computer program products are disclosed for protecting the security of resources in distributed computing environments. The disclosed techniques improve administration and enforcement of security policies. Allowed actions on resources, also called permissions, (such as invocations of particular methods, read or write access of a particular row or perhaps a particular column in a database table, and so forth) are grouped, and each group of permissions is associated with a role name. A particular action on a particular resource may be specified in more than one group, and therefore may be associated with more than one role. Each role is administered as a security object. Users and/or user groups may be associated with one or more roles. At run-time, access to a resource is protected by determining whether the invoking user has been associated with (granted) at least one of the roles required for this type of access on this resource.
    Type: Application
    Filed: August 30, 2001
    Publication date: March 6, 2003
    Applicant: International Business Machines Corporation
    Inventors: Robert Howard High, Anthony Joseph Nadalin, Nataraj Nagaratnam
  • Publication number: 20020188722
    Abstract: A method and system for providing client locale information to a server in a distributed computer enterprise. When a client generates a request to a remote server, the client's locale and time zone information, known as the international context, is associated with the request. The server then processes requests from the client according to the internationalization context. The client's international context is propagated to successive servers that further service the client's request.
    Type: Application
    Filed: May 30, 2001
    Publication date: December 12, 2002
    Applicant: International Business Machines Corporation
    Inventors: Debasish Banerjee, Jeffrey Alan Frey, Robert Howard High, Ute Schuerfeld, David Alan Zavala