Patents by Inventor ARTHUR J. BARR
ARTHUR J. BARR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10572330Abstract: Aspects are related to reducing size of diagnostic data downloads. To reduce the size, format and content are read from a diagnostic data file so that pre-defined priority rules may be applied to the diagnostic data file and/or a subset of the diagnostic data file utilizing the format or the content. Then, a priority level is assigned to the diagnostic data file or the subset based on an ability of that file or that subset to diagnose a failure as determined by the pre-defined priority rules. Next, an ordering of the diagnostic data file and/or the subset into a file stream occurs, followed by a streaming of the file stream to a remote diagnostic system. A notification can be received from the remote diagnostic system to stop the streaming if sufficient diagnostic data to diagnose the failure has been received by the remote diagnostic system.Type: GrantFiled: May 26, 2017Date of Patent: February 25, 2020Assignee: International Business Machines CorporationInventors: Arthur J. Barr, Oliver M. Deakin
-
Patent number: 10341693Abstract: A method manages substantially continuous delivery of a data stream to a mobile communications device through sequential access thereby to respective receivers from a networked arrangement of wireless transceivers at known locations. A current location and velocity of the mobile communications device is determined. Based on a determined current location and velocity of the mobile communications device, a prediction for a next wireless transceiver to be accessed is generated, and a portion of the data stream is pre-cached at a predicted next wireless transceiver.Type: GrantFiled: September 7, 2012Date of Patent: July 2, 2019Assignee: International Business Machines CorporationInventors: Arthur J. Barr, Ian O. Partridge, Adam J. Pilkington, David S. Renshaw, Andrew Taylor, Thomas Van Der Veen
-
Patent number: 10114686Abstract: Aspects are related to reducing size of diagnostic data downloads. To reduce the size, format and content are read from a diagnostic data file so that pre-defined priority rules may be applied to the diagnostic data file and/or a subset of the diagnostic data file utilizing the format or the content. Then, a priority level is assigned to the diagnostic data file or the subset based on an ability of that file or that subset to diagnose a failure as determined by the pre-defined priority rules. Next, an ordering of the diagnostic data file and/or the subset into a file stream occurs, followed by a streaming of the file stream to a remote diagnostic system. A notification can be received from the remote diagnostic system to stop the streaming if sufficient diagnostic data to diagnose the failure has been received by the remote diagnostic system.Type: GrantFiled: July 15, 2015Date of Patent: October 30, 2018Assignee: International Business Machines CorporationInventors: Arthur J. Barr, Oliver M. Deakin
-
Publication number: 20170262327Abstract: Aspects are related to reducing size of diagnostic data downloads. To reduce the size, format and content are read from a diagnostic data file so that pre-defined priority rules may be applied to the diagnostic data file and/or a subset of the diagnostic data file utilizing the format or the content. Then, a priority level is assigned to the diagnostic data file or the subset based on an ability of that file or that subset to diagnose a failure as determined by the pre-defined priority rules. Next, an ordering of the diagnostic data file and/or the subset into a file stream occurs, followed by a streaming of the file stream to a remote diagnostic system. A notification can be received from the remote diagnostic system to stop the streaming if sufficient diagnostic data to diagnose the failure has been received by the remote diagnostic system.Type: ApplicationFiled: May 26, 2017Publication date: September 14, 2017Inventors: Arthur J. Barr, Oliver M. Deakin
-
Patent number: 9535794Abstract: A computer receives a heartbeat message that includes both program reset information and at least one segment, of the heartbeat message, that is configured to indicate whether or not a first program is functioning correctly. The computer determines if the heartbeat message includes the indication that the first program is functioning correctly. If the computer determines that the heartbeat message indicates that the first program is functioning correctly, then the computer sends a data stream to the first program.Type: GrantFiled: July 26, 2013Date of Patent: January 3, 2017Assignee: GLOBALFOUNDRIES INC.Inventors: Arthur J. Barr, Stuart J. Hayton, Robert B. Nicholson, Colin J. Thorne
-
Patent number: 9288234Abstract: A method of operating a network message interceptor for enforcing a security policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, and the security policy identifying at least one valid security standards for communication over the network, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting from the handshake message an identification of a security standard selected for the communication between the first and second endpoints; determining a validity status of the identified security standard based on the security policy; and preventing communication between the first and second endpoints based on a negatively determined validity status of the identified security standard.Type: GrantFiled: July 31, 2012Date of Patent: March 15, 2016Assignee: International Business Machines CorporationInventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
-
Publication number: 20160044023Abstract: A method of operating a network message interceptor for enforcing an authentication policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting a certificate for an authenticating one of the endpoints from the handshake message; determining a validity status of the certificate for confirming an identity of the authenticating endpoint; and preventing communication between the first and second endpoints based on a negatively determined validity status of the certificate.Type: ApplicationFiled: October 22, 2015Publication date: February 11, 2016Applicant: GLOBALFOUNDRIES Inc.Inventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
-
Patent number: 9251028Abstract: A method, system, and/or computer program product manages code instrumentation in a production computer program. Performance data from instrumentation code associated with a portion of code of a production computer program is received. One or more processors compare the performance data to a predetermined performance threshold. In response to the performance data meeting the predetermined performance threshold, one or more processors remove the instrumentation code for the portion of code.Type: GrantFiled: June 25, 2013Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventors: Arthur J. Barr, Hannah J. Deakin
-
Publication number: 20160028845Abstract: Aspects are related to reducing size of diagnostic data downloads. To reduce the size, format and content are read from a diagnostic data file so that pre-defined priority rules may be applied to the diagnostic data file and/or a subset of the diagnostic data file utilizing the format or the content. Then, a priority level is assigned to the diagnostic data file or the subset based on an ability of that file or that subset to diagnose a failure as determined by the pre-defined priority rules. Next, an ordering of the diagnostic data file and/or the subset into a file stream occurs, followed by a streaming of the file stream to a remote diagnostic system. A notification can be received from the remote diagnostic system to stop the streaming if sufficient diagnostic data to diagnose the failure has been received by the remote diagnostic system.Type: ApplicationFiled: July 15, 2015Publication date: January 28, 2016Inventors: Arthur J. Barr, Oliver M. Deakin
-
Publication number: 20150033072Abstract: A computer receives a heartbeat message that includes both program reset information and at least one segment, of the heartbeat message, that is configured to indicate whether or not a first program is functioning correctly. The computer determines if the heartbeat message includes the indication that the first program is functioning correctly. If the computer determines that the heartbeat message indicates that the first program is functioning correctly, then the computer sends a data stream to the first program.Type: ApplicationFiled: July 26, 2013Publication date: January 29, 2015Applicant: International Business Machines CorporationInventors: Arthur J. Barr, Stuart J. Hayton, Robert B. Nicholson, Colin J. Thorne
-
Publication number: 20140331287Abstract: A method of operating a network message interceptor for enforcing an authentication policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting a certificate for an authenticating one of the endpoints from the handshake message; determining a validity status of the certificate for confirming an identity of the authenticating endpoint; and preventing communication between the first and second endpoints based on a negatively determined validity status of the certificate.Type: ApplicationFiled: July 31, 2012Publication date: November 6, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
-
Publication number: 20140250468Abstract: A method manages substantially continuous delivery of a data stream to a mobile communications device through sequential access thereby to respective receivers from a networked arrangement of wireless transceivers at known locations. A current location and velocity of the mobile communications device is determined. Based on a determined current location and velocity of the mobile communications device, a prediction for a next wireless transceiver to be accessed is generated, and a portion of the data stream is pre-cached at a predicted next wireless transceiver.Type: ApplicationFiled: September 7, 2012Publication date: September 4, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Arthur J. Barr, Ian O. Partridge, Adam J. Pilkington, David S. Renshaw, Andrew Taylor, Thomas Van Der Veen
-
Publication number: 20140196108Abstract: A method of operating a network message interceptor for enforcing a security policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, and the security policy identifying at least one valid security standards for communication over the network, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting from the handshake message an identification of a security standard selected for the communication between the first and second endpoints; determining a validity status of the identified security standard based on the security policy; and preventing communication between the first and second endpoints based on a negatively determined validity status of the identified security standard.Type: ApplicationFiled: July 31, 2012Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
-
Publication number: 20140040866Abstract: A method, system, and/or computer program product manages code instrumentation in a production computer program. Performance data from instrumentation code associated with a portion of code of a production computer program is received. One or more processors compare the performance data to a predetermined performance threshold. In response to the performance data meeting the predetermined performance threshold, one or more processors remove the instrumentation code for the portion of code.Type: ApplicationFiled: June 25, 2013Publication date: February 6, 2014Inventors: ARTHUR J. BARR, HANNAH J. DEAKIN