Patents by Inventor ARTHUR J. BARR

ARTHUR J. BARR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10572330
    Abstract: Aspects are related to reducing size of diagnostic data downloads. To reduce the size, format and content are read from a diagnostic data file so that pre-defined priority rules may be applied to the diagnostic data file and/or a subset of the diagnostic data file utilizing the format or the content. Then, a priority level is assigned to the diagnostic data file or the subset based on an ability of that file or that subset to diagnose a failure as determined by the pre-defined priority rules. Next, an ordering of the diagnostic data file and/or the subset into a file stream occurs, followed by a streaming of the file stream to a remote diagnostic system. A notification can be received from the remote diagnostic system to stop the streaming if sufficient diagnostic data to diagnose the failure has been received by the remote diagnostic system.
    Type: Grant
    Filed: May 26, 2017
    Date of Patent: February 25, 2020
    Assignee: International Business Machines Corporation
    Inventors: Arthur J. Barr, Oliver M. Deakin
  • Patent number: 10341693
    Abstract: A method manages substantially continuous delivery of a data stream to a mobile communications device through sequential access thereby to respective receivers from a networked arrangement of wireless transceivers at known locations. A current location and velocity of the mobile communications device is determined. Based on a determined current location and velocity of the mobile communications device, a prediction for a next wireless transceiver to be accessed is generated, and a portion of the data stream is pre-cached at a predicted next wireless transceiver.
    Type: Grant
    Filed: September 7, 2012
    Date of Patent: July 2, 2019
    Assignee: International Business Machines Corporation
    Inventors: Arthur J. Barr, Ian O. Partridge, Adam J. Pilkington, David S. Renshaw, Andrew Taylor, Thomas Van Der Veen
  • Patent number: 10114686
    Abstract: Aspects are related to reducing size of diagnostic data downloads. To reduce the size, format and content are read from a diagnostic data file so that pre-defined priority rules may be applied to the diagnostic data file and/or a subset of the diagnostic data file utilizing the format or the content. Then, a priority level is assigned to the diagnostic data file or the subset based on an ability of that file or that subset to diagnose a failure as determined by the pre-defined priority rules. Next, an ordering of the diagnostic data file and/or the subset into a file stream occurs, followed by a streaming of the file stream to a remote diagnostic system. A notification can be received from the remote diagnostic system to stop the streaming if sufficient diagnostic data to diagnose the failure has been received by the remote diagnostic system.
    Type: Grant
    Filed: July 15, 2015
    Date of Patent: October 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Arthur J. Barr, Oliver M. Deakin
  • Publication number: 20170262327
    Abstract: Aspects are related to reducing size of diagnostic data downloads. To reduce the size, format and content are read from a diagnostic data file so that pre-defined priority rules may be applied to the diagnostic data file and/or a subset of the diagnostic data file utilizing the format or the content. Then, a priority level is assigned to the diagnostic data file or the subset based on an ability of that file or that subset to diagnose a failure as determined by the pre-defined priority rules. Next, an ordering of the diagnostic data file and/or the subset into a file stream occurs, followed by a streaming of the file stream to a remote diagnostic system. A notification can be received from the remote diagnostic system to stop the streaming if sufficient diagnostic data to diagnose the failure has been received by the remote diagnostic system.
    Type: Application
    Filed: May 26, 2017
    Publication date: September 14, 2017
    Inventors: Arthur J. Barr, Oliver M. Deakin
  • Patent number: 9535794
    Abstract: A computer receives a heartbeat message that includes both program reset information and at least one segment, of the heartbeat message, that is configured to indicate whether or not a first program is functioning correctly. The computer determines if the heartbeat message includes the indication that the first program is functioning correctly. If the computer determines that the heartbeat message indicates that the first program is functioning correctly, then the computer sends a data stream to the first program.
    Type: Grant
    Filed: July 26, 2013
    Date of Patent: January 3, 2017
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Arthur J. Barr, Stuart J. Hayton, Robert B. Nicholson, Colin J. Thorne
  • Patent number: 9288234
    Abstract: A method of operating a network message interceptor for enforcing a security policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, and the security policy identifying at least one valid security standards for communication over the network, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting from the handshake message an identification of a security standard selected for the communication between the first and second endpoints; determining a validity status of the identified security standard based on the security policy; and preventing communication between the first and second endpoints based on a negatively determined validity status of the identified security standard.
    Type: Grant
    Filed: July 31, 2012
    Date of Patent: March 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
  • Publication number: 20160044023
    Abstract: A method of operating a network message interceptor for enforcing an authentication policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting a certificate for an authenticating one of the endpoints from the handshake message; determining a validity status of the certificate for confirming an identity of the authenticating endpoint; and preventing communication between the first and second endpoints based on a negatively determined validity status of the certificate.
    Type: Application
    Filed: October 22, 2015
    Publication date: February 11, 2016
    Applicant: GLOBALFOUNDRIES Inc.
    Inventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
  • Patent number: 9251028
    Abstract: A method, system, and/or computer program product manages code instrumentation in a production computer program. Performance data from instrumentation code associated with a portion of code of a production computer program is received. One or more processors compare the performance data to a predetermined performance threshold. In response to the performance data meeting the predetermined performance threshold, one or more processors remove the instrumentation code for the portion of code.
    Type: Grant
    Filed: June 25, 2013
    Date of Patent: February 2, 2016
    Assignee: International Business Machines Corporation
    Inventors: Arthur J. Barr, Hannah J. Deakin
  • Publication number: 20160028845
    Abstract: Aspects are related to reducing size of diagnostic data downloads. To reduce the size, format and content are read from a diagnostic data file so that pre-defined priority rules may be applied to the diagnostic data file and/or a subset of the diagnostic data file utilizing the format or the content. Then, a priority level is assigned to the diagnostic data file or the subset based on an ability of that file or that subset to diagnose a failure as determined by the pre-defined priority rules. Next, an ordering of the diagnostic data file and/or the subset into a file stream occurs, followed by a streaming of the file stream to a remote diagnostic system. A notification can be received from the remote diagnostic system to stop the streaming if sufficient diagnostic data to diagnose the failure has been received by the remote diagnostic system.
    Type: Application
    Filed: July 15, 2015
    Publication date: January 28, 2016
    Inventors: Arthur J. Barr, Oliver M. Deakin
  • Publication number: 20150033072
    Abstract: A computer receives a heartbeat message that includes both program reset information and at least one segment, of the heartbeat message, that is configured to indicate whether or not a first program is functioning correctly. The computer determines if the heartbeat message includes the indication that the first program is functioning correctly. If the computer determines that the heartbeat message indicates that the first program is functioning correctly, then the computer sends a data stream to the first program.
    Type: Application
    Filed: July 26, 2013
    Publication date: January 29, 2015
    Applicant: International Business Machines Corporation
    Inventors: Arthur J. Barr, Stuart J. Hayton, Robert B. Nicholson, Colin J. Thorne
  • Publication number: 20140331287
    Abstract: A method of operating a network message interceptor for enforcing an authentication policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting a certificate for an authenticating one of the endpoints from the handshake message; determining a validity status of the certificate for confirming an identity of the authenticating endpoint; and preventing communication between the first and second endpoints based on a negatively determined validity status of the certificate.
    Type: Application
    Filed: July 31, 2012
    Publication date: November 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
  • Publication number: 20140250468
    Abstract: A method manages substantially continuous delivery of a data stream to a mobile communications device through sequential access thereby to respective receivers from a networked arrangement of wireless transceivers at known locations. A current location and velocity of the mobile communications device is determined. Based on a determined current location and velocity of the mobile communications device, a prediction for a next wireless transceiver to be accessed is generated, and a portion of the data stream is pre-cached at a predicted next wireless transceiver.
    Type: Application
    Filed: September 7, 2012
    Publication date: September 4, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Arthur J. Barr, Ian O. Partridge, Adam J. Pilkington, David S. Renshaw, Andrew Taylor, Thomas Van Der Veen
  • Publication number: 20140196108
    Abstract: A method of operating a network message interceptor for enforcing a security policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, and the security policy identifying at least one valid security standards for communication over the network, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting from the handshake message an identification of a security standard selected for the communication between the first and second endpoints; determining a validity status of the identified security standard based on the security policy; and preventing communication between the first and second endpoints based on a negatively determined validity status of the identified security standard.
    Type: Application
    Filed: July 31, 2012
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
  • Publication number: 20140040866
    Abstract: A method, system, and/or computer program product manages code instrumentation in a production computer program. Performance data from instrumentation code associated with a portion of code of a production computer program is received. One or more processors compare the performance data to a predetermined performance threshold. In response to the performance data meeting the predetermined performance threshold, one or more processors remove the instrumentation code for the portion of code.
    Type: Application
    Filed: June 25, 2013
    Publication date: February 6, 2014
    Inventors: ARTHUR J. BARR, HANNAH J. DEAKIN