Patents by Inventor Alan Bateman
Alan Bateman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11640813Abstract: A string bender mechanism for a string musical instrument having a bender assembly comprising a control member and at least two bender levers. The control member moving between a first position and at least a second position, being a rest and active position, respectively. The at least two bender levers have a first end and a second end. The first end of said bender lever is dimensioned or adjacent to the control member and the second end of the bender lever receives a string. When the control member is in the first position, the bender levers are at rest and a tone emanates from a plucked string. When the control member is in the second position, the bender levers move simultaneously, and a varied tone emanates from a plucked string. In an alternative embodiment, one or more bender levers may be replaced with a switcher assembly.Type: GrantFiled: February 24, 2021Date of Patent: May 2, 2023Inventors: James Wade Black, Barry Alan Bateman
-
Patent number: 11366643Abstract: A runtime environment generates a proxy class in response to detecting a request for a proxy object. The proxy class implements a set of interfaces specified by the request for the proxy object. The runtime environment selects or generates a proxy module, in a module system, to include the proxy class. The runtime environment exposes interfaces from other modules to the proxy module using a qualified export that does not expose the interfaces to modules other than the proxy module. The runtime environment does not expose the proxy class, of the proxy module, to other modules in the module system.Type: GrantFiled: May 6, 2020Date of Patent: June 21, 2022Assignee: Oracle International CorporationInventors: Alexander R. Buckley, Mandy Chung, Alan Bateman
-
Patent number: 11347487Abstract: A module (m1) is allowed to gain private reflective access to any class in any module (C2 in m2), if and only if m2 grants to m1 deep reflective access for C2. A caller class may invoke a method to generate a second lookup object associated with a second principal class based on a first lookup object associated with a first principal class. The method is successfully executed only if (a) an access mode of the first lookup object allows for teleporting with private reflective access and (b) a module including the second principal class grants to a module including the first principal class deep reflective access for the second principal class. The second lookup object drops the access mode allowing for teleporting with private reflective access. Hence reflective access is confined within the limits imposed by module boundaries, as relaxed by access agreements between pairs of modules. The bilateral agreements are not transferable to other modules.Type: GrantFiled: November 21, 2019Date of Patent: May 31, 2022Assignee: Oracle International CorporationInventors: Lai Hung Mandy Chung, John Robert Rose, Alan Bateman
-
Publication number: 20210264885Abstract: A string bender mechanism for a string musical instrument having a bender assembly comprising a control member and at least two bender levers. The control member moving between a first position and at least a second position, being a rest and active position, respectively. The at least two bender levers have a first end and a second end, The first end of said bender lever is dimensioned or adjacent to the control member and the second end of the bender lever receives a string. When the control member is in the first position, the bender levers are at rest and a tone emanates from a plucked string. When the control member is in the second position, the bender levers move simultaneously, and a varied tone emanates from a plucked string. In an alternative embodiment, one or more bender levers may be replaced with a switcher assembly.Type: ApplicationFiled: February 24, 2021Publication date: August 26, 2021Inventors: JAMES WADE BLACK, Barry Alan Bateman
-
Publication number: 20200409674Abstract: A module (m1) is allowed to gain private reflective access to any class in any module (C2 in m2), if and only if m2 grants to m1 deep reflective access for C2. A caller class may invoke a method to generate a second lookup object associated with a second principal class based on a first lookup object associated with a first principal class. The method is successfully executed only if (a) an access mode of the first lookup object allows for teleporting with private reflective access and (b) a module including the second principal class grants to a module including the first principal class deep reflective access for the second principal class. The second lookup object drops the access mode allowing for teleporting with private reflective access. Hence reflective access is confined within the limits imposed by module boundaries, as relaxed by access agreements between pairs of modules. The bilateral agreements are not transferable to other modules.Type: ApplicationFiled: November 21, 2019Publication date: December 31, 2020Applicant: Oracle International CorporationInventors: Lai Hung Mandy Chung, John Robert Rose, Alan Bateman
-
Patent number: 10853110Abstract: Techniques for performing constructor accessibility checks during deserialization are disclosed. A system receives a command that requires deserializing a serialized object of a target type. The system determines an ancestor type of the target type. Without calling any constructors and regardless of whether the ancestor type is serializable, the system determines whether a constructor of the ancestor type is accessible to the target type. The system deserializes the serialized object only after determining that the constructor of the ancestor type is accessible to the target type.Type: GrantFiled: December 20, 2018Date of Patent: December 1, 2020Assignee: Oracle International CorporationInventors: Stuart Warren Marks, Alan Bateman
-
Patent number: 10846417Abstract: Techniques for identifying permitted illegal access operations in a module system are disclosed. An operation, expressed in a first module, that attempts to access a module element of a second module is identified. Based on a module declaration associated with the second module, the module element is determined inaccessible to the first module. Additionally or alternatively, based on an access modifier associated with the module element, the module element is determined inaccessible to the operation. The operation is determined as an illegal access operation. The illegal access operation is permitted to access the module element. A warning corresponding to the illegal access operation is generated.Type: GrantFiled: October 17, 2017Date of Patent: November 24, 2020Assignee: Oracle International CorporationInventors: Alan Bateman, Chris Hegarty, Alexander R. Buckley, Brian Goetz, Mark B. Reinhold
-
Publication number: 20200264846Abstract: A runtime environment generates a proxy class in response to detecting a request for a proxy object. The proxy class implements a set of interfaces specified by the request for the proxy object. The runtime environment selects or generates a proxy module, in a module system, to include the proxy class. The runtime environment exposes interfaces from other modules to the proxy module using a qualified export that does not expose the interfaces to modules other than the proxy module. The runtime environment does not expose the proxy class, of the proxy module, to other modules in the module system.Type: ApplicationFiled: May 6, 2020Publication date: August 20, 2020Applicant: Oracle International CorporationInventors: Alexander R. Buckley, Mandy Chung, Alan Bateman
-
Patent number: 10684827Abstract: A runtime environment generates a proxy class in response to detecting a request for a proxy object. The proxy class implements a set of interfaces specified by the request for the proxy object. The runtime environment selects or generates a proxy module, in a module system, to include the proxy class. The runtime environment exposes interfaces from other modules to the proxy module using a qualified export that does not expose the interfaces to modules other than the proxy module. The runtime environment does not expose the proxy class, of the proxy module, to other modules in the module system.Type: GrantFiled: August 23, 2018Date of Patent: June 16, 2020Assignee: Oracle International CorporationInventors: Alexander R. Buckley, Mandy Chung, Alan Bateman
-
Publication number: 20200019423Abstract: Techniques for performing constructor accessibility checks during deserialization are disclosed. A system receives a command that requires deserializing a serialized object of a target type. The system determines an ancestor type of the target type. Without calling any constructors and regardless of whether the ancestor type is serializable, the system determines whether a constructor of the ancestor type is accessible to the target type. The system deserializes the serialized object only after determining that the constructor of the ancestor type is accessible to the target type.Type: ApplicationFiled: December 20, 2018Publication date: January 16, 2020Applicant: Oracle International CorporationInventors: STUART WARREN MARKS, ALAN BATEMAN
-
Patent number: 10394610Abstract: Techniques for managing split packages in a module system are disclosed. A code conflict exists between two packages, in different modules, based at least in part on the packages being named identically and including executable code. No code conflict exists between two other identically-named packages, in different modules, based at least in part on the packages not including any executable code. Managing split packages may be based, at least in part, on module membership records associated with the modules.Type: GrantFiled: September 30, 2017Date of Patent: August 27, 2019Assignee: Oracle International CorporationInventors: Alexander R. Buckley, Lai Hung Mandy Chung, Mark B. Reinhold, Alan Bateman
-
Patent number: 10367822Abstract: Access to a module element within a first module by a second module is prohibited if the module element within the first module has not been exposed to the second module. If a particular module element within a first module has been exposed to a second module, then access to the particular module element by the second module may or may not be allowed depending on: (a) whether the particular module element has been declared with a public or non-public access modifier, (b) whether a second exposed module element, which includes the particular module element, has been declared with a public or non-public access modifier, (c) a level of access associated with the operation that attempts to access the particular module element of the first module, and/or (d) whether an accessibility override configuration is set for accessing the particular module element.Type: GrantFiled: August 23, 2018Date of Patent: July 30, 2019Assignee: Oracle International CorporationInventors: Alexander R. Buckley, Mark B. Reinhold, Alan Bateman, Paul Sandoz, Chris Hegarty
-
Patent number: 10346225Abstract: Techniques for renaming a module in a module system are disclosed. It is determined that a first module is declared with a corresponding first module name. It is determined that the first module is associated with a second module name. Responsive to determining that the first module is associated with the second module name: a second module declared with the second module name is synthesized, and a dependency of the second module, with the second module name, is declared on the first module with the first module name.Type: GrantFiled: September 14, 2017Date of Patent: July 9, 2019Assignee: Oracle International CorporationInventors: Alexander R. Buckley, Alan Bateman
-
Publication number: 20190102230Abstract: Techniques for managing split packages in a module system are disclosed. A code conflict exists between two packages, in different modules, based at least in part on the packages being named identically and including executable code. No code conflict exists between two other identically-named packages, in different modules, based at least in part on the packages not including any executable code. Managing split packages may be based, at least in part, on module membership records associated with the modules.Type: ApplicationFiled: September 30, 2017Publication date: April 4, 2019Applicant: Oracle International CorporationInventors: Alexander R. Buckley, Lai Hung Mandy Chung, Mark B. Reinhold, Alan Bateman
-
Publication number: 20190079811Abstract: Techniques for renaming a module in a module system are disclosed. It is determined that a first module is declared with a corresponding first module name. It is determined that the first module is associated with a second module name. Responsive to determining that the first module is associated with the second module name: a second module declared with the second module name is synthesized, and a dependency of the second module, with the second module name, is declared on the first module with the first module name.Type: ApplicationFiled: September 14, 2017Publication date: March 14, 2019Applicant: Oracle International CorporationInventors: Alexander R. Buckley, Alan Bateman
-
Publication number: 20190028483Abstract: Access to a module element within a first module by a second module is prohibited if the module element within the first module has not been exposed to the second module. If a particular module element within a first module has been exposed to a second module, then access to the particular module element by the second module may or may not be allowed depending on: (a) whether the particular module element has been declared with a public or non-public access modifier, (b) whether a second exposed module element, which includes the particular module element, has been declared with a public or non-public access modifier, (c) a level of access associated with the operation that attempts to access the particular module element of the first module, and/or (d) whether an accessibility override configuration is set for accessing the particular module element.Type: ApplicationFiled: August 23, 2018Publication date: January 24, 2019Applicant: Oracle International CorporationInventors: Alexander R. Buckley, Mark B. Reinhold, Alan Bateman, Paul Sandoz, Chris Hegarty
-
Publication number: 20180364989Abstract: A runtime environment generates a proxy class in response to detecting a request for a proxy object. The proxy class implements a set of interfaces specified by the request for the proxy object. The runtime environment selects or generates a proxy module, in a module system, to include the proxy class. The runtime environment exposes interfaces from other modules to the proxy module using a qualified export that does not expose the interfaces to modules other than the proxy module. The runtime environment does not expose the proxy class, of the proxy module, to other modules in the module system.Type: ApplicationFiled: August 23, 2018Publication date: December 20, 2018Applicant: Oracle International CorporationInventors: Alexander R. Buckley, Mandy Chung, Alan Bateman
-
Patent number: 10158647Abstract: Access to a module element within a first module by a second module is prohibited if the module element within the first module has not been exposed to the second module. If a particular module element within a first module has been exposed to a second module, then access to the particular module element by the second module may or may not be allowed depending on: (a) whether the particular module element has been declared with a public or non-public access modifier, (b) whether a second exposed module element, which includes the particular module element, has been declared with a public or non-public access modifier, (c) a level of access associated with the operation that attempts to access the particular module element of the first module, and/or (d) whether an accessibility override configuration is set for accessing the particular module element.Type: GrantFiled: September 8, 2015Date of Patent: December 18, 2018Assignee: Oracle International CorporationInventors: Alexander R. Buckley, Mark B. Reinhold, Alan Bateman, Paul Sandoz, Chris Hegarty
-
Patent number: 10140119Abstract: A serial form of a serializable exposed first module element of a module in a module system is analyzed. An unexposed and/or inaccessible second module element expressed in the serial form is identified as a potential error condition. A corrective execution is executed and/or a warning is presented.Type: GrantFiled: March 17, 2016Date of Patent: November 27, 2018Assignee: Oracle International CorporationInventors: Chris Hegarty, Alexander R. Buckley, Mark B. Reinhold, Alan Bateman
-
Patent number: 10120777Abstract: Techniques for remediating serialization incompatibilities are disclosed. A runtime environment of a module system identifies a first serializable runtime object comprising a reference to a second serializable runtime object. The first serializable runtime object is an instantiation of a first element in a first package of the module system. The first package is open to one or more reflective operations. Based on determining that (a) the second serializable runtime object is an instantiation of a second element in a second package of the module system and (b) the second element is not open to the one or more reflective operations, a remedial operation, associated with the first serializable runtime object, is executed.Type: GrantFiled: September 29, 2017Date of Patent: November 6, 2018Assignee: Oracle International CorporationInventors: Chris Hegarty, Alan Bateman