Patents by Inventor Aaron Kenneth Blackwell
Aaron Kenneth Blackwell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11277487Abstract: A method for utilizing a proxy server interface includes measuring at least one of physiological or neurological functions of a subject by a hardware sensor in a measurement system, the hardware sensor configured to generate a signal containing information of the at least one of physiological or neurological functions, manipulating the signal by a processor, the measurement system including a first memory configured to store the manipulated signal, outputting the signal to the proxy server interface, the proxy server interface configured to buffer the signal in a second memory, and polling the proxy server interface for the buffered signal by an Internet browser. Outputting the signal to the proxy server interface and polling the proxy server interface for the buffered signal occurs asynchronously.Type: GrantFiled: December 16, 2020Date of Patent: March 15, 2022Inventors: Timothy G. Royer, Aaron Kenneth Blackwell
-
Patent number: 10050978Abstract: Various embodiments of the invention increase security of a network of interoperable devices. In certain embodiments, this is accomplished by a security module that uses a user-definable security policy that sets forth one or more tests for validating input data or commands received from an IoT device. A validator receives the command via a command controller and performs a security analysis of the command according to the security policy. Responsive to the security analysis, the validator generates a validation signal in order to authorize or reject further processing of the command.Type: GrantFiled: October 16, 2015Date of Patent: August 14, 2018Assignee: DELL PRODUCTS LPInventors: Michael John Morton, Aaron Kenneth Blackwell, Richard A. Backhouse
-
Patent number: 9632904Abstract: A method, system, and computer program product for raising an alert when some subject process is impacted by performance degradation of a software application are disclosed. The real word process may be modeled and executed on a computing device. Service dependencies in the modeled process are correlated to services provided by a managed application. An APM system monitors the managed application to determine when the services it provides may have some degradation. When a degradation of performance of the managed application is determined, a modeled process that has a service dependency that correlates to the degraded performance is determined. Then, an alert is generated to indicate that the process being modeled may be comprised. Therefore, instead of simply reporting that the managed application has some degradation, the alert provides a warning that some broader process outside of the managed application may be compromised.Type: GrantFiled: February 15, 2013Date of Patent: April 25, 2017Assignee: CA, Inc.Inventors: Erik M. Erikson, Aaron Kenneth Blackwell, Trey Kubena
-
Publication number: 20170111373Abstract: Various embodiments of the invention increase security of a network of interoperable devices. In certain embodiments, this is accomplished by a security module that is uses a user-definable security policy that sets forth one or more tests for validating input data or commands received from an IoT device. A validator receives the command via a command controller and performs a security analysis of the command according to the security policy. Responsive to the security analysis, the validator generated a validation signal in order to authorize or reject further processing of the command.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Applicant: DELL PRODUCTS L.P.Inventors: Michael John Morton, Aaron Kenneth Blackwell, Richard A. Backhouse
-
Patent number: 9202185Abstract: A model is used to provide a user interface to track flows through at least one application of a computer system. The model relates the structural aspects of the at least one application to a behavioral model such as a business transaction hierarchy. The structural part of the model includes linked Vertex and Edge records. Vertex records for different instances of a component can be aggregated to provide a single vertex or node for display in a user interface. A Vertex record is linked to an Agent record and a Metric Path record. The Edge records identify tail and head components of a call. A set of Edge records can be associated with a Transaction record in the behavioral part of the model. A Transaction record can be associated with a Business Transaction Record, and a Business Transaction record can be associated with a Business Service Record.Type: GrantFiled: April 8, 2011Date of Patent: December 1, 2015Assignee: CA, Inc.Inventors: Vladimir Umansky, Indranil Basak, Abhijit Sawant, Aaron Kenneth Blackwell, Jeffrey R Cobb
-
Patent number: 9037705Abstract: A method, system and computer program product are disclosed for routing performance data to compute nodes. According to one aspect of the present disclosure each of a plurality of compute nodes are assigned a topic. Each topic may be associated with a set of calculations. Labeled performance metrics for an application are received. Each performance metric is labeled with a context under which the performance metric was collected. A topic is associated with each of the performance metrics based on the labeled context. Each respective node listens for a topic assigned to it in order to access the performance metrics associated with the assigned topic. Each respective node analyzes the performance metrics associated with the topic assigned to it.Type: GrantFiled: November 28, 2012Date of Patent: May 19, 2015Assignee: CA, Inc.Inventors: Aaron Kenneth Blackwell, Marco Gagliardi, Benny Tseng, David Tootill, Mark S. LoSacco, Ramana V. Lokavarapu, Gabriel D. Underwood
-
Patent number: 8789181Abstract: There are techniques for detecting and preventing possible security violations in a computer network. The security violation detection may be based on data attached to transactions as they flow through one or more software applications. A transaction that is processed by a sequence of software components that execute on one or more electronic devices may be traced. Data that is associated with the transaction as the transaction flows through the sequence of software components may be accessed. The accessed data may be analyzed to detect a possible security violation. The accessed data may be compared to one or more pre-defined patterns. The transaction may be intercepted upon detection of a possible security violation.Type: GrantFiled: April 11, 2012Date of Patent: July 22, 2014Assignee: CA, Inc.Inventor: Aaron Kenneth Blackwell
-
Publication number: 20140149575Abstract: A method, system and computer program product are disclosed for routing performance data to compute nodes. According to one aspect of the present disclosure each of a plurality of compute nodes are assigned a topic. Each topic may be associated with a set of calculations. Labeled performance metrics for an application are received. Each performance metric is labeled with a context under which the performance metric was collected. A topic is associated with each of the performance metrics based on the labeled context. Each respective node listens for a topic assigned to it in order to access the performance metrics associated with the assigned topic. Each respective node analyzes the performance metrics associated with the topic assigned to it.Type: ApplicationFiled: November 28, 2012Publication date: May 29, 2014Applicant: CA, INC.Inventors: Aaron Kenneth Blackwell, Marco Gagliardi, Benny Tseng, David Tootill, Mark S. LoSacco, Ramana V. Lokavarapu, Gabriel D. Underwood
-
Patent number: 8726383Abstract: Disclosed herein are techniques for detecting possible security intrusions in a computer network. The security intrusion detection may be based on analyzing patterns of how transactions flow through one or more software applications. For example, patterns of transaction flows are determined for an initial time period to establish a baseline of normal flow patterns. These normal flow patterns may be compared with patterns for transaction flows for a later time period. Deviations in the patterns of transaction flow may indicate a possible security intrusion.Type: GrantFiled: February 14, 2011Date of Patent: May 13, 2014Assignee: CA, Inc.Inventor: Aaron Kenneth Blackwell
-
Publication number: 20130276108Abstract: There are techniques for detecting and preventing possible security violations in a computer network. The security violation detection may be based on data attached to transactions as they flow through one or more software applications. A transaction that is processed by a sequence of software components that execute on one or more electronic devices may be traced. Data that is associated with the transaction as the transaction flows through the sequence of software components may be accessed. The accessed data may be analyzed to detect a possible security violation. The accessed data may be compared to one or more pre-defined patterns. The transaction may be intercepted upon detection of a possible security violation.Type: ApplicationFiled: April 11, 2012Publication date: October 17, 2013Applicant: CA, INC.Inventor: Aaron Kenneth Blackwell
-
Publication number: 20120259793Abstract: A model is used to provide a user interface to track flows through at least one application of a computer system. The model relates the structural aspects of the at least one application to a behavioral model such as a business transaction hierarchy. The structural part of the model includes linked Vertex and Edge records. Vertex records for different instances of a component can be aggregated to provide a single vertex or node for display in a user interface. A Vertex record is linked to an Agent record and a Metric Path record. The Edge records identify tail and head components of a call. A set of Edge records can be associated with a Transaction record in the behavioral part of the model. A Transaction record can be associated with a Business Transaction Record, and a Business Transaction record can be associated with a Business Service Record.Type: ApplicationFiled: April 8, 2011Publication date: October 11, 2012Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Vladimir Umansky, Indranil Basak, Abhijit Sawant, Aaron Kenneth Blackwell, Jeffrey R. Cobb
-
Publication number: 20120210428Abstract: Disclosed herein are techniques for detecting possible security intrusions in a computer network. The security intrusion detection may be based on analyzing patterns of how transactions flow through one or more software applications. For example, patterns of transaction flows are determined for an initial time period to establish a baseline of normal flow patterns. These normal flow patterns may be compared with patterns for transaction flows for a later time period. Deviations in the patterns of transaction flow may indicate a possible security intrusion.Type: ApplicationFiled: February 14, 2011Publication date: August 16, 2012Applicant: COMPUTER ASSOCIATES THINK, INC.Inventor: Aaron Kenneth Blackwell
-
Patent number: 7003781Abstract: A method and system is disclosed for monitoring an operation of a distributed data processing system. The system can include a plurality of applications running on a plurality of host processors and communicating with one another, such as through a message passing technique. The method includes steps executed in individual ones of the plurality of applications, of (a) examining individual ones of generated API calls to determine if a particular API call meets predetermined API call criteria; (b) if a particular API call meets the predetermined API call criteria, storing all or a portion of the content of the API call as a stored event; (c) processing a plurality of the stored events to identify logically correlated events, such as those associated with a business transaction; and (d) displaying all or a portion of the stored API call content data for the logically correlated events.Type: GrantFiled: May 5, 2000Date of Patent: February 21, 2006Assignee: Bristol Technology Inc.Inventors: Aaron Kenneth Blackwell, Aage Bendiksen, Benny Tseng, Zhongliang Lu, Amal Shah