Patents by Inventor Anthony Ashley

Anthony Ashley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240115810
    Abstract: The present disclosure relates to medicament injection devices. An injection device includes: a movable dosage programming component comprising a rotary encoder system having a predefined angular periodicity, a sensor arrangement including a first optical sensor configured to detect movement of the movable dosage programming component relative to the sensor arrangement during dosing of a medicament, wherein the first optical sensor is configured to operate in a strobe-sampling mode at a first frequency, a second optical sensor configured to detect movement of the rotary encoder system relative to the second optical sensor wherein the second optical sensor is configured to operate in a strobe-sampling mode at a second frequency lower than the first frequency, and a processor arrangement configured to, based on the detected movement, determine a medicament dosage administered by the injection device.
    Type: Application
    Filed: December 14, 2023
    Publication date: April 11, 2024
    Inventors: Michael Schabbach, Anthony Paul Morris, Ronald Antony Smith, Brian Charles Molyneux, Paul Richard Draper, Craig Ashley Mason, Oliver Charles Gazeley, Daniel Edward Clark, David Aubrey Plumptre, Aidan Michael O'Hare, Richard James Thomas, Felix Kramer, Beat Wyss, Philipp Müller
  • Patent number: 9621592
    Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: April 11, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul Anthony Ashley, Stefan Berger, Tian Cheng Liu, He Yuan Huang, Sreekanth Ramakrishna Iyer, Ashish Kundu, Nataraj Nagaratnam, Dimitrios Pendarakis, Ronald Becker Williams
  • Patent number: 9609023
    Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.
    Type: Grant
    Filed: February 10, 2015
    Date of Patent: March 28, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul Anthony Ashley, Stefan Berger, Tian Cheng Liu, He Yuan Huang, Sreekanth Ramakrishna Iyer, Ashish Kundu, Nataraj Nagaratnam, Dimitrios Pendarakis, Ronald Becker Williams
  • Publication number: 20160284006
    Abstract: A system for advertising items which are close to their expiry dates, the system comprising: a merchant device configured to upload information about an item which is close to its expiry date; a service provider server configured to receive the uploaded information and to store the uploaded information in an item database; and a user device configured to receive at least part of the uploaded information from the item database, to receive a user's selection of the item, and to transmit a reserve request to the service provider server, wherein the service provider server is further configured to forward the reserve request to the merchant device such that the item is reserved for the user.
    Type: Application
    Filed: July 29, 2015
    Publication date: September 29, 2016
    Applicant: ARGADNEL VENTURES LIMITED
    Inventors: MICHAEL ANTHONY ASHLEY OSBORNE, Hazel Elizabeth Osborne, Ashley James Edward Osborne, Nicholas Robinson Horsthuis
  • Publication number: 20160234250
    Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.
    Type: Application
    Filed: February 10, 2015
    Publication date: August 11, 2016
    Inventors: Paul Anthony ASHLEY, Stefan Berger, Tian Cheng Liu, He Yuan Huang, Sreekanth Ramakrishna Iyer, Ashish Kundu, Nataraj Nagaratnam, Dimitrios Pendarakis, Ronald Becker Williams
  • Publication number: 20160234224
    Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.
    Type: Application
    Filed: June 25, 2015
    Publication date: August 11, 2016
    Inventors: Paul Anthony ASHLEY, Stefan BERGER, Tian Cheng LIU, He Yuan HUANG, Sreekanth Ramakrishna IYER, Ashish KUNDU, Nataraj NAGARATNAM, Dimitrios PENDARAKIS, Ronald Becker WILLIAMS
  • Patent number: 8925082
    Abstract: An intrusion detection system (IDS) is enhanced to operate in a cluster of such systems, and IDSs organized into a cluster cooperate to exchange IP reputation influencing events information between or among the cooperating systems in real-time to enhance overall system response time and to prevent otherwise hidden attacks from damaging network resources. An IDS includes an IP reputation analytics engine to analyze new and existing events, correlate information, and to raise potential alerts. The IP reputation analytics engines may implement an algorithm, such as a pattern matching algorithm, a continuous data mining algorithm, or the like, to facilitate this operation. Clustering IDS endpoints to share IP reputation influencing events, using the cluster-wide view to determine IP reputation, and feeding the cluster-wide view back to the IDS endpoints, provides for enhanced and early detection of threats that is much more reliable and scalable as compared to prior art techniques.
    Type: Grant
    Filed: August 22, 2012
    Date of Patent: December 30, 2014
    Assignee: International Business Machines Corporation
    Inventor: Paul Anthony Ashley
  • Publication number: 20140059683
    Abstract: An intrusion detection system (IDS) is enhanced to operate in a cluster of such systems, and IDSs organized into a cluster cooperate to exchange IP reputation influencing events information between or among the cooperating systems in real-time to enhance overall system response time and to prevent otherwise hidden attacks from damaging network resources. An IDS includes an IP reputation analytics engine to analyze new and existing events, correlate information, and to raise potential alerts. The IP reputation analytics engines may implement an algorithm, such as a pattern matching algorithm, a continuous data mining algorithm, or the like, to facilitate this operation. Clustering IDS endpoints to share IP reputation influencing events, using the cluster-wide view to determine IP reputation, and feeding the cluster-wide view back to the IDS endpoints, provides for enhanced and early detection of threats that is much more reliable and scalable as compared to prior art techniques.
    Type: Application
    Filed: August 22, 2012
    Publication date: February 27, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Paul Anthony Ashley
  • Patent number: 8464311
    Abstract: A method is presented for processing data for a privacy policy concerning management of personally identifiable information. A proxy intercepts a first message from a server to a client and determines that the first message initiates collection of personally identifiable information from a user of the client. The proxy then sends a second message to the client that requests consent from the user to the privacy policy. If the user provides consent within a third message that is received by the proxy from the client, then the proxy sends the intercepted first message to the client. If the user does not provide consent, then the proxy sends a fourth message to the server that fails the collection of personally identifiable information from the client by the server. The proxy may also obtain user preferences for options concerning management of the personally identifiable information by a data processing system.
    Type: Grant
    Filed: October 28, 2004
    Date of Patent: June 11, 2013
    Assignee: International Business Machines Corporation
    Inventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
  • Patent number: 8095658
    Abstract: A method, system, and computer program product is presented for providing access to a set of resources in a distributed data processing system. A reverse proxy server receives a resource request from a client and determines whether or not it is managing a session identifier that was previously associated with the client by the reverse proxy server; if so, it retrieves the session identifier, otherwise it obtains a session identifier and associates the session identifier with the client using information that is managed by the reverse proxy server. The reverse proxy server then modifies the resource request to include the session identifier and forwards the modified resource request to an application server.
    Type: Grant
    Filed: May 7, 2004
    Date of Patent: January 10, 2012
    Assignee: International Business Machines Corporation
    Inventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
  • Patent number: 7921152
    Abstract: A method, system, apparatus, and computer program product are presented for processing cookies that are transmitted from a server through a proxy server to a client that is operated by a user. The proxy server detects that a response message from the server for the client has an associated cookie. The proxy server extracts a domain identifier associated with the server from the response message, and the proxy server retrieves a set of parameters that contain domain identifiers that are associated with indications of whether to block transmission of cookies from servers associated with the domain identifiers. The proxy server then processes the cookie in the response message in accordance with the retrieved set of parameters and the extracted domain identifier, either blocking or not blocking cookies from the identified domain. Blocked cookies are cached for subsequent use. Multiple sets of parameters may be configured by the user.
    Type: Grant
    Filed: July 17, 2003
    Date of Patent: April 5, 2011
    Assignee: International Business Machines Corporation
    Inventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
  • Patent number: 7797726
    Abstract: A method is presented for enforcing a privacy policy concerning management of personally identifiable information in a centralized manner through a privacy proxy agent. A proxy intercepts a message from a first system to a second system, e.g., from a server to a client, and determines whether the message is associated with an operation on personally identifiable information; if not, then the proxy sends the message to the second system, but if so, then the proxy determines whether the operation on the personally identifiable information is compliant with a privacy policy and with user preference information with respect to the privacy policy for a user who is associated the personally identifiable information. If the message is compliant with the privacy policy and user preference data, then the proxy sends the first message to the second system; otherwise, an error indication is returned to the first system.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: September 14, 2010
    Assignee: International Business Machines Corporation
    Inventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
  • Patent number: 7734642
    Abstract: This invention automates the selection of purpose usages when a user agent interacts with a web site that has been enabled for automated purpose usage information exchange. A user first configures the purpose usage automation in his or her user agent. At this stage, which typically occurs off-line, the user decides on a level of automation when specifying the one or more purpose usages. If desired, this preference may depend on how “trusted” the site is to the user. Later, when the user navigates to an organization's web site, the user agent communicates the purpose usage settings to the organization according to the level of purpose usage automation that has been configured. In particular, when a user's agent visits a web site, the user agent detects that “automated purpose usage” is enabled for the web site. The web site then provides the user agent with a list of one or more purpose usage options required or desired by the organization.
    Type: Grant
    Filed: April 24, 2007
    Date of Patent: June 8, 2010
    Assignee: International Business Machines Corporation
    Inventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
  • Publication number: 20080270802
    Abstract: The present invention provides a way to protect PII (or, more generally, any user “sensitive” information) throughout its life cycle in an organization. The techniques described herein ensure that a user's PII is protecting during storage, access or transfer of the data. Preferably, this objective is accomplished by associating given metadata with a given piece of PII and then storing the PII and metadata in a “privacy protecting envelope.” The given metadata includes, without limitation, the privacy policy that applies to the PII, as well as a set of one more purpose usages for the PII that the system has collected from an end user's user agent (e.g., a web browser), preferably in an automated manner. Preferably, the PII data, the privacy policy, and the user preferences (the purpose usages) are formatted in a structured document, such as XML.
    Type: Application
    Filed: April 24, 2007
    Publication date: October 30, 2008
    Inventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
  • Publication number: 20080270414
    Abstract: This invention automates the selection of purpose usages when a user agent interacts with a web site that has been enabled for automated purpose usage information exchange. A user first configures the purpose usage automation in his or her user agent. At this stage, which typically occurs off-line, the user decides on a level of automation when specifying the one or more purpose usages. If desired, this preference may depend on how “trusted” the site is to the user. Later, when the user navigates to an organization's web site, the user agent communicates the purpose usage settings to the organization according to the level of purpose usage automation that has been configured. In particular, when a user's agent visits a web site, the user agent detects that “automated purpose usage” is enabled for the web site. The web site then provides the user agent with a list of one or more purpose usage options required or desired by the organization.
    Type: Application
    Filed: April 24, 2007
    Publication date: October 30, 2008
    Inventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
  • Patent number: 7395424
    Abstract: A method is presented for performing authentication operations. When a client requests a resource from a server, a non-certificate-based authentication operation is performed through an SSL (Secure Sockets Layer) session between the server and the client. When the client requests another resource, the server determines to step up to a more restrictive level of authentication, and a certificate-based authentication operation is performed through the SSL session without exiting or renegotiating the SSL session prior to completion of the certificate-based authentication operation. During the certificate-based authentication procedure, an executable module is downloaded to the client from the server through the SSL session, after which the server receives through the SSL session a digital signature that has been generated by the executable module using a digital certificate at the client. In response to successfully verifying the digital signature at the server, the server provides access to a requested resource.
    Type: Grant
    Filed: July 17, 2003
    Date of Patent: July 1, 2008
    Assignee: International Business Machines Corporation
    Inventors: Paul Anthony Ashley, Sridhar R. Muppidi, Mark Vandenwauver
  • Patent number: 6536578
    Abstract: A sensor for a coin acceptor includes an inductor connected in a series resonant circuit. The sensor coils are arranged in a series resonant configuration with the resonant capacitance made up of two identical capacitors, one on either side of the sensor. The series resonant configuration reduces the effects on sensor readings of common mode noise on the coin acceptor power supply.
    Type: Grant
    Filed: August 13, 2001
    Date of Patent: March 25, 2003
    Assignee: Coin Controls Limited
    Inventor: Anthony Ashley