Patents by Inventor Andrew W. Spyker

Andrew W. Spyker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8065280
    Abstract: The present invention is a method and system that provides visual, production level, high-performance, integrated and automatic data integrity verification in a Web-based, e-business or other similar application, using a middleware application server. Asynchronous messaging is utilized to achieve real-time data verification. When data is read and updated by the application running in the application server, a message containing certain aspects of the data is published to a data auditor “queue” in the message server. Publishing the data is an asynchronous and high-performance operation and thus does not significantly slow down the operation being performed by the application server. The message is delivered to the message server and control immediately returns to the application to continue processing. Concurrently, the auditor checks the values resulting from the transaction and determines if the transactions have been recorded accurately.
    Type: Grant
    Filed: December 17, 2003
    Date of Patent: November 22, 2011
    Assignee: International Business Machines Corporation
    Inventors: John S. Cox, Andrew W. Spyker
  • Patent number: 6922782
    Abstract: An apparatus and method for ensuring data integrity of unauthenticated code is provided. With the apparatus and method, a hash value of unauthenticated code is embedded in associated automatically authenticated code. When the automatically authenticated code is downloaded and executed, the automatically authenticated code may require that the unauthenticated code also be downloaded for proper execution of the automatically authenticated code on a particular client device. The unauthenticated code can be downloaded and its integrity verified by generating a hash value of the unauthenticated code and comparing the generated hash value to a hash value embedded in the automatically authenticated code. If there is a match, the unauthenticated code is verified. If there is not a match, the unauthenticated code has been corrupted during transmission and is not verified. As a result, the unauthenticated code is not used by the client device.
    Type: Grant
    Filed: June 15, 2000
    Date of Patent: July 26, 2005
    Assignee: International Business Machines Corporation
    Inventors: Andrew W. Spyker, Byron Allen Williams
  • Patent number: 6571389
    Abstract: A method, system, and computer-readable code for improving the manageability and usability of a Java environment. The advantages of applets and applications are combined, while avoiding particular disadvantages of both, resulting in a technique whereby all Java programs are executed without relying on use of a browser to provide a run-time environment. Techniques for improving the packaging of Java components, including run-time environments and extensions as well as applications, are defined. Dependencies are specified in a manner which enables them to be dynamically located and installed, and enables sharing dependent modules (including run-time environments) among applications. The dependency specification technique ensures that all dependent code will be automatically available at run-time, without requiring a user to perform manual installation.
    Type: Grant
    Filed: April 27, 1999
    Date of Patent: May 27, 2003
    Assignee: International Business Machines Corporation
    Inventors: Andrew W. Spyker, Matthew David Walnock