Patents by Inventor Allan Kielstra

Allan Kielstra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250013697
    Abstract: A computer-implemented method is disclosed. The method includes: obtaining web content of a webpage; determining whether the web content complies with defined first requirements for user accessibility; in response to determining that the web content does not comply with the first requirements: identifying non-compliant web content elements of the webpage; and presenting, via a user interface of a source code editor: indications of first portions of source code for the webpage corresponding to the non-compliant web content elements; and a user interface element representing an action for altering one or more of the non-compliant web content elements.
    Type: Application
    Filed: July 8, 2024
    Publication date: January 9, 2025
    Applicant: The Toronto-Dominion Bank
    Inventors: Samantha Marie Oliveira ESTOESTA, Isaiah Jared ERB, Ronald Allan KIELSTRA, Mathew VOLLICK
  • Publication number: 20250013363
    Abstract: A computer-implemented method is disclosed. The method includes: identifying, in a graphical user interface, a first user interface element and a second user interface element, the first and second user interface elements being of different types and associated with a first group of user interface elements; receiving, via a keyboard, input of a command to trigger a first interaction with both the first and second user interface elements; determining that the first interaction is not defined for one of the first and second user interface elements; and performing a related action associated with the first interaction to the one of the first and second user interface elements.
    Type: Application
    Filed: July 8, 2024
    Publication date: January 9, 2025
    Applicant: The Toronto-Dominion Bank
    Inventors: Samantha Marie Oliveira ESTOESTA, Isaiah Jared ERB, Ronald Allan KIELSTRA, Mathew VOLLICK
  • Publication number: 20240095819
    Abstract: A computer-implemented method is disclosed. The method includes: obtaining historical operations data for a resource account, the historical operations data identifying account operations performed by a user in connection with the resource account; generating display data for a graphical user interface for accessing the resource account, the display data including user interface elements associated with a first set of highest priority account operations that are selected based on the historical operations data for the resource account; obtaining user engagement data representing user interaction with the graphical user interface, the user engagement data identifying at least one account operation; identifying a second set of highest priority account operations based on the user engagement data; generating updated display data for the graphical user interface associated with the second set of highest priority account operations; and providing, to a client device for display thereon, the updated display data.
    Type: Application
    Filed: September 16, 2022
    Publication date: March 21, 2024
    Applicant: The Toronto-Dominion Bank
    Inventors: Anil Stewart BAKHLE, Ronald Allan KIELSTRA, Grace Yip, Lyn Michelle CRUZ
  • Patent number: 10747513
    Abstract: Provided is a method for string comparison. The method includes receiving a plurality of target strings. Each target string of the plurality of target strings comprises a sequence of characters. The method further includes creating a character index for the plurality of target strings having a plurality of entries corresponding to the sequence of characters. The method further includes prioritizing the plurality of entries. The method further includes determining an evaluation method for the plurality of target strings based on the plurality of prioritized entries. The method further includes performing the evaluation method for the plurality of target strings.
    Type: Grant
    Filed: January 15, 2019
    Date of Patent: August 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Xing Xing Pan, Jiu Fu Guo, Xiao Feng Guan, Allan Kielstra
  • Patent number: 10558509
    Abstract: Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key run time events during execution of a program. Each key run time event has a corresponding key run time event data structure associated with the program, and logging includes storing records associated with the key run time events, wherein each record is based on the key run time event data structure associated with the key run time event. The method further includes analyzing the records to determine if a current pattern of key run time events associated with the program during execution matches an expected pattern of key run time events and generating a security alert if the current pattern of key run time events does not match the expected pattern of key run time events for the program.
    Type: Grant
    Filed: February 13, 2019
    Date of Patent: February 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rachel E. Craik, Allan Kielstra, Ying Chau Raymond Mak, Melanie Ullmer
  • Publication number: 20190179686
    Abstract: Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key run time events during execution of a program. Each key run time event has a corresponding key run time event data structure associated with the program, and logging includes storing records associated with the key run time events, wherein each record is based on the key run time event data structure associated with the key run time event. The method further includes analyzing the records to determine if a current pattern of key run time events associated with the program during execution matches an expected pattern of key run time events and generating a security alert if the current pattern of key run time events does not match the expected pattern of key run time events for the program.
    Type: Application
    Filed: February 13, 2019
    Publication date: June 13, 2019
    Inventors: Rachel E. Craik, Allan Kielstra, Ying Chau Raymond Mak, Melanie Ullmer
  • Publication number: 20190146765
    Abstract: Provided is a method for string comparison. The method includes receiving a plurality of target strings. Each target string of the plurality of target strings comprises a sequence of characters. The method further includes creating a character index for the plurality of target strings having a plurality of entries corresponding to the sequence of characters. The method further includes prioritizing the plurality of entries. The method further includes determining an evaluation method for the plurality of target strings based on the plurality of prioritized entries. The method further includes performing the evaluation method for the plurality of target strings.
    Type: Application
    Filed: January 15, 2019
    Publication date: May 16, 2019
    Inventors: Xing Xing Pan, Jiu Fu Guo, Xiao Feng Guan, Allan Kielstra
  • Patent number: 10255048
    Abstract: Provided is a method for string comparison. The method includes receiving a plurality of target strings. Each target string of the plurality of target strings comprises a sequence of characters. The method further includes creating a character index for the plurality of target strings having a plurality of entries corresponding to the sequence of characters. The method further includes prioritizing the plurality of entries. The method further includes determining an evaluation method for the plurality of target strings based on the plurality of prioritized entries. The method further includes performing the evaluation method for the plurality of target strings.
    Type: Grant
    Filed: November 16, 2017
    Date of Patent: April 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Xing Xing Pan, Jiu Fu Guo, Xiao Feng Guan, Allan Kielstra
  • Patent number: 10248394
    Abstract: Provided is a method for string comparison. The method includes receiving a plurality of target strings. Each target string of the plurality of target strings comprises a sequence of characters. The method further includes creating a character index for the plurality of target strings having a plurality of entries corresponding to the sequence of characters. The method further includes prioritizing the plurality of entries. The method further includes determining an evaluation method for the plurality of target strings based on the plurality of prioritized entries. The method further includes performing the evaluation method for the plurality of target strings.
    Type: Grant
    Filed: August 18, 2017
    Date of Patent: April 2, 2019
    Assignee: International Business Machines Corporation
    Inventors: Xing Xing Pan, Jiu Fu Guo, Xiao Feng Guan, Allan Kielstra
  • Patent number: 10228988
    Abstract: Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key events during execution of a program. Each key event has a corresponding key event data structure associated with the program, and logging includes storing records associated with the key events, wherein each record is based on the key event data structure associated with the key event. The method further includes analyzing the records to determine if a current pattern of key events associated with the program during execution matches an expected pattern of key events and generating a security alert if the current pattern of key events does not match the expected pattern of key events for the program.
    Type: Grant
    Filed: November 4, 2015
    Date of Patent: March 12, 2019
    Assignee: International Business Machines Corporation
    Inventors: Rachel E. Craik, Allan Kielstra, Raymond Mak, Melanie Ullmer
  • Publication number: 20190056921
    Abstract: Provided is a method for string comparison. The method includes receiving a plurality of target strings. Each target string of the plurality of target strings comprises a sequence of characters. The method further includes creating a character index for the plurality of target strings having a plurality of entries corresponding to the sequence of characters. The method further includes prioritizing the plurality of entries. The method further includes determining an evaluation method for the plurality of target strings based on the plurality of prioritized entries. The method further includes performing the evaluation method for the plurality of target strings.
    Type: Application
    Filed: November 16, 2017
    Publication date: February 21, 2019
    Inventors: Xing Xing Pan, Jiu Fu Guo, Xiao Feng Guan, Allan Kielstra
  • Publication number: 20190056919
    Abstract: Provided is a method for string comparison. The method includes receiving a plurality of target strings. Each target string of the plurality of target strings comprises a sequence of characters. The method further includes creating a character index for the plurality of target strings having a plurality of entries corresponding to the sequence of characters. The method further includes prioritizing the plurality of entries. The method further includes determining an evaluation method for the plurality of target strings based on the plurality of prioritized entries. The method further includes performing the evaluation method for the plurality of target strings.
    Type: Application
    Filed: August 18, 2017
    Publication date: February 21, 2019
    Inventors: Xing Xing Pan, Jiu Fu Guo, Xiao Feng Guan, Allan Kielstra
  • Publication number: 20170123875
    Abstract: Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key events during execution of a program. Each key event has a corresponding key event data structure associated with the program, and logging includes storing records associated with the key events, wherein each record is based on the key event data structure associated with the key event. The method further includes analyzing the records to determine if a current pattern of key events associated with the program during execution matches an expected pattern of key events and generating a security alert if the current pattern of key events does not match the expected pattern of key events for the program.
    Type: Application
    Filed: November 4, 2015
    Publication date: May 4, 2017
    Inventors: Rachel E. Craik, Allan Kielstra, Raymond Mak, Melanie Ullmer
  • Patent number: 8056067
    Abstract: Data processing delay is reduced during data processing, using compiler optimization. Blocks of code are scanned in an order from blocks recurring most often to blocks recurring least often. In an order from blocks recurring most often to block recurring least often, shifts are inserted before arithmetic references, such that a previous use of the arithmetic reference does not require a shift, shifts are inserted after each memory use such that the next use of the memory does not require a shift, and shifts are inserted after each arithmetic reference such that the next use of the arithmetic reference requires no shift. In addition, if there is a mismatch between the last shifted amount of any one block and the required initial shifted amount in any of its successors, shifts are inserted to make up for the mismatch.
    Type: Grant
    Filed: September 29, 2006
    Date of Patent: November 8, 2011
    Assignee: International Business Machines Corporation
    Inventors: Michael Fulton, Allan Kielstra, Vijay Sundaresan
  • Patent number: 7954094
    Abstract: A computer-implemented method, computer program product and data processing system to improve runtime performance of executable program code when executed on the data-processing system. During execution, data is collected and analyzed to identify runtime behavior of the program code. Heuristic models are applied to select region(s) of the program code where application of a performance improvement algorithm is expected to improve runtime performance. Each selected region is recompiled using selected performance improvement algorithm(s) for that region to generate corresponding recompiled region(s), and the program code is modified to replace invocations of each selected region with invocations of the corresponding recompiled region. Alternatively or additionally, the program code may be recompiled to be adapted to characteristics of the execution environment of the data processing system.
    Type: Grant
    Filed: March 27, 2006
    Date of Patent: May 31, 2011
    Assignee: International Business Machines Corporation
    Inventors: Gheorghe Cascaval, Siddhartha Chatterjee, Evelyn Duesterwald, Allan Kielstra, Kevin Stoodley
  • Publication number: 20080098376
    Abstract: Data processing delay is reduced during data processing, using compiler optimization. Blocks of code are scanned in an order from blocks recurring most often to blocks recurring least often. In an order from blocks recurring most often to block recurring least often, shifts are inserted before arithmetic references, such that a previous use of the arithmetic reference does not require a shift, shifts are inserted after each memory use such that the next use of the memory does not require a shift, and shifts are inserted after each arithmetic reference such that the next use of the arithmetic reference requires no shift. In addition, if there is a mismatch between the last shifted amount of any one block and the required initial shifted amount in any of its successors, shifts are inserted to make up for the mismatch.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 24, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael Fulton, Allan Kielstra, Vijay Sundaresan
  • Publication number: 20070226698
    Abstract: A computer-implemented method, computer program product and data processing system to improve runtime performance of executable program code when executed on the data-processing system. During execution, data is collected and analyzed to identify runtime behavior of the program code. Heuristic models are applied to select region(s) of the program code where application of a performance improvement algorithm is expected to improve runtime performance. Each selected region is recompiled using selected performance improvement algorithm(s) for that region to generate corresponding recompiled region(s), and the program code is modified to replace invocations of each selected region with invocations of the corresponding recompiled region. Alternatively or additionally, the program code may be recompiled to be adapted to characteristics of the execution environment of the data processing system.
    Type: Application
    Filed: March 27, 2006
    Publication date: September 27, 2007
    Inventors: Gheorghe Cascaval, Siddhartha Chatterjee, Evelyn Duesterwald, Allan Kielstra, Kevin Stoodley
  • Publication number: 20060253656
    Abstract: A mechanism is provided that identifies instructions that access storage and may be candidates for catch prefetching. The mechanism augments these instructions so that any given instance of the instruction operates in one of four modes, namely normal, unexecuted, data gathering, and validation. In the normal mode, the instruction merely performs the function specified in the software runtime environment. An instruction in unexecuted mode, upon the next execution, is placed in data gathering mode. When an instruction in the data gathering mode is encountered, the mechanism of the present invention collects data to discover potential fixed storage access patterns. When an instruction is in validation mode, the mechanism of the present invention validates the presumed fixed storage access patterns.
    Type: Application
    Filed: May 3, 2005
    Publication date: November 9, 2006
    Inventors: Christopher Donawa, Allan Kielstra
  • Publication number: 20060190935
    Abstract: A method, apparatus, and computer instructions are provided for transforming Java Native Interface function calls to constants, internal just-in-time compiler operations or simpler intermediate representation. A compiler generates a plurality of intermediate representations for a plurality of native interface function calls. During inlining of native code, matching is performed on each native function call (against this list) and a list of native interface function calls is generated. For each native interface function call, a JIT call transformer attempts to replace the native interface function call with a constant, internal just-in-time compiler operation or a simpler intermediate representation depending on the type of native interface function call.
    Type: Application
    Filed: February 18, 2005
    Publication date: August 24, 2006
    Applicant: International Business Machines Corporation
    Inventors: Allan Kielstra, Levon Stepanian, Kevin Stoodley
  • Publication number: 20060190934
    Abstract: A method, apparatus, and computer instructions are provided for inlining native functions into compiled Java code. A conversion engine is provided by the present invention for converting the intermediate representation of native functions to the just-in-time (JIT) compiler's intermediate representation. With the converted intermediate representation, an inliner recursively inlines the converted JIT compiler's intermediate representation into the native callsite to remove the need of invoking the native function and subsequent native calls made by the function. The inlining process continues until either a call to an opaque function is encountered or until a JIT compiler intermediate representation growth limits are reached. The inliner also replaces calls to most native functions that are non-inlineable or opaque with calls to synthesized native functions that provide access to native libraries containing implementations of the original non-inlineable calls.
    Type: Application
    Filed: February 18, 2005
    Publication date: August 24, 2006
    Applicant: International Business Machines Corporation
    Inventors: Allan Kielstra, Levon Stepanian, Kevin Stoodley