Patents by Inventor Barry Mosakowski
Barry Mosakowski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11748246Abstract: An approach is provided in which the approach collects distributed test results from multiple users, wherein at least one of the multiple users is an untrusted user. The approach aggregates the distributed test results in response to determining that each one of the distributed test results corresponds to the same system under test. The approach then presents the aggregated test results as a trusted test result.Type: GrantFiled: April 28, 2021Date of Patent: September 5, 2023Assignee: International Business Machines CorporationInventors: Shelley Lambert, Timothy Peter Ellison, Haechul Shin, Gennaro A. Cuomo, Barry Mosakowski, Mark Anthony Parzygnat
-
Publication number: 20220353076Abstract: An approach is provided in which the approach collects distributed test results from multiple users, wherein at least one of the multiple users is an untrusted user. The approach aggregates the distributed test results in response to determining that each one of the distributed test results corresponds to the same system under test. The approach then presents the aggregated test results as a trusted test result.Type: ApplicationFiled: April 28, 2021Publication date: November 3, 2022Inventors: SHELLEY LAMBERT, Timothy Peter Ellison, Haechul Shin, Gennaro A. Cuomo, Barry Mosakowski, Mark Anthony Parzygnat
-
Patent number: 10880073Abstract: An example operation may include one or more of monitoring, by an adaptive traffic engine, transactions data of a blockchain, detecting, by the adaptive traffic engine, a transaction commit event time out in a blockchain, determining, by the adaptive traffic engine, a processing queue of a the blockchain, measuring, by the adaptive traffic engine, a sending rate of the blockchain, and adjusting the sending rate, by the adaptive traffic engine, based on the transaction commit event time out, the processing queue and the sending rate to optimize performance of the blockchain.Type: GrantFiled: August 8, 2018Date of Patent: December 29, 2020Assignee: International Business Machines CorporationInventors: Dongming Hwang, Barry Mosakowski, Jianjun Zhang
-
Publication number: 20200052881Abstract: An example operation may include one or more of monitoring, by an adaptive traffic engine, transactions data of a blockchain, detecting, by the adaptive traffic engine, a transaction commit event time out in a blockchain, determining, by the adaptive traffic engine, a processing queue of a the blockchain, measuring, by the adaptive traffic engine, a sending rate of the blockchain, and adjusting the sending rate, by the adaptive traffic engine, based on the transaction commit event time out, the processing queue and the sending rate to optimize performance of the blockchain.Type: ApplicationFiled: August 8, 2018Publication date: February 13, 2020Inventors: Dongming Hwang, Barry Mosakowski, Jianjun Zhang
-
Patent number: 10523491Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.Type: GrantFiled: October 25, 2010Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
-
Patent number: 10171322Abstract: The described herein relates to a method executed by a passport service executed by at least one processor coupled to at least one memory. The method includes creating a passport on a cloud application that comprises connectivity details for a tunnel and activating an on-premise appliance of an on-premise system by delivering the passport to the on-premise appliance to build the tunnel. The method further includes generating a passport token via the passport, wherein the passport token comprises dynamically generated connectivity properties. The method also includes binding the cloud application and the on-premise appliance based on the dynamically generated connectivity properties of the passport token and the connectivity details of the passport.Type: GrantFiled: January 11, 2016Date of Patent: January 1, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Neal J. Alewine, Chih-Hsiung Liu, Barry Mosakowski, Srinivasan Muralidharan
-
Enabling an on-premises resource to be exposed to a public cloud application securely and seamlessly
Patent number: 10044756Abstract: An application deployed in a public cloud is enabled to access an on-premises resource securely and without requiring additional ports on a firewall. A pair of security gateways is instantiated, one at the cloud, and another located on-premises. Each gateway can access information that is necessary to locate and establish a secure connection to the on-premises resource. In response to a determination that the application needs to access the on-premises resource, the data set is used to locate the resource. A communication request is then issued from the cloud gateway to the on-premises gateway over a socket-based communication channel established between the gateways. The communication request is sent over an HTTP-based protocol such that the application is able to access the on-premises resource without requiring an additional IP address/port to be defined at the firewall. Proxied connectivity is then enabled from the application to the on-premises resource.Type: GrantFiled: August 24, 2015Date of Patent: August 7, 2018Assignee: International Business Machines CorporationInventors: Linwood Hugh Overby, Jr., Anthony Ffrench, Barry Mosakowski, Adolfo Francisco Rodriguez -
Enabling an on-premises resource to be exposed to a public cloud application securely and seamlessly
Patent number: 10038721Abstract: An application deployed in a public cloud is enabled to access an on-premises resource securely and without requiring additional ports on a firewall. A pair of security gateways is instantiated, one at the cloud, and another located on-premises. Each gateway can access information that is necessary to locate and establish a secure connection to the on-premises resource. In response to a determination that the application needs to access the on-premises resource, the data set is used to locate the resource. A communication request is then issued from the cloud gateway to the on-premises gateway over a socket-based communication channel established between the gateways. The communication request is sent over an HTTP-based protocol such that the application is able to access the on-premises resource without requiring an additional IP address/port to be defined at the firewall. Proxied connectivity is then enabled from the application to the on-premises resource.Type: GrantFiled: February 16, 2015Date of Patent: July 31, 2018Assignee: International Business Machines CorporationInventors: Linwood Hugh Overby, Jr., Anthony Ffrench, Barry Mosakowski, Adolfo Francisco Rodriguez -
Patent number: 9742621Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. Finally, the method can include re-binding the application endpoint to a second of the different network resource nodes in response to detecting the outage.Type: GrantFiled: February 28, 2012Date of Patent: August 22, 2017Assignee: International Business Machines CorporationInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
-
Publication number: 20170201509Abstract: The described herein relates to a method executed by a passport service executed by at least one processor coupled to at least one memory. The method includes creating a passport on a cloud application that comprises connectivity details for a tunnel and activating an on-premise appliance of an on-premise system by delivering the passport to the on-premise appliance to build the tunnel. The method further includes generating a passport token via the passport, wherein the passport token comprises dynamically generated connectivity properties. The method also includes binding the cloud application and the on-premise appliance based on the dynamically generated connectivity properties of the passport token and the connectivity details of the passport.Type: ApplicationFiled: January 11, 2016Publication date: July 13, 2017Inventors: Neal J. Alewine, Chih-Hsiung Liu, Barry Mosakowski, Srinivasan Muralidharan
-
Enabling an on-premises resource to be exposed to a public cloud application securely and seamlessly
Publication number: 20160241633Abstract: An application deployed in a public cloud is enabled to access an on-premises resource securely and without requiring additional ports on a firewall. A pair of security gateways is instantiated, one at the cloud, and another located on-premises. Each gateway can access information that is necessary to locate and establish a secure connection to the on-premises resource. In response to a determination that the application needs to access the on-premises resource, the data set is used to locate the resource. A communication request is then issued from the cloud gateway to the on-premises gateway over a socket-based communication channel established between the gateways. The communication request is sent over an HTTP-based protocol such that the application is able to access the on-premises resource without requiring an additional IP address/port to be defined at the firewall. Proxied connectivity is then enabled from the application to the on-premises resource.Type: ApplicationFiled: February 16, 2015Publication date: August 18, 2016Inventors: Linwood Hugh Overby, JR., Anthony Ffrench, Barry Mosakowski, Adolfo Francisco Rodriguez -
Enabling an on-premises resource to be exposed to a public cloud application securely and seamlessly
Publication number: 20160241596Abstract: An application deployed in a public cloud is enabled to access an on-premises resource securely and without requiring additional ports on a firewall. A pair of security gateways is instantiated, one at the cloud, and another located on-premises. Each gateway can access information that is necessary to locate and establish a secure connection to the on-premises resource. In response to a determination that the application needs to access the on-premises resource, the data set is used to locate the resource. A communication request is then issued from the cloud gateway to the on-premises gateway over a socket-based communication channel established between the gateways. The communication request is sent over an HTTP-based protocol such that the application is able to access the on-premises resource without requiring an additional IP address/port to be defined at the firewall. Proxied connectivity is then enabled from the application to the on-premises resource.Type: ApplicationFiled: August 24, 2015Publication date: August 18, 2016Inventors: Linwood Hugh Overby, JR., Anthony Ffrench, Barry Mosakowski, Adolfo Francisco Rodriguez -
Patent number: 8458768Abstract: Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.Type: GrantFiled: May 19, 2011Date of Patent: June 4, 2013Assignee: International Business Machines CorporationInventors: Roy F. Brabson, Barry Mosakowski, Linwood H. Overby, Jr.
-
Publication number: 20120213059Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. Finally, the method can include re-binding the application endpoint to a second of the different network resource nodes in response to detecting the outage.Type: ApplicationFiled: February 28, 2012Publication date: August 23, 2012Applicant: International Business Machines CorporationInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
-
Publication number: 20110219442Abstract: Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.Type: ApplicationFiled: May 19, 2011Publication date: September 8, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roy F. Brabson, Barry Mosakowski, Linwood H. Overby, JR.
-
Patent number: 7984479Abstract: Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.Type: GrantFiled: April 17, 2006Date of Patent: July 19, 2011Assignee: International Business Machines CorporationInventors: Roy F. Brabson, Barry Mosakowski, Linwood H. Overby, Jr.
-
Publication number: 20110038256Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.Type: ApplicationFiled: October 25, 2010Publication date: February 17, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
-
Patent number: 7821921Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.Type: GrantFiled: April 22, 2007Date of Patent: October 26, 2010Assignee: International Business Machines CorporationInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T Huynh, Barry Mosakowski
-
Publication number: 20080259790Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.Type: ApplicationFiled: April 22, 2007Publication date: October 23, 2008Applicant: International Business Machines CorporationInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
-
Publication number: 20070245401Abstract: Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.Type: ApplicationFiled: April 17, 2006Publication date: October 18, 2007Inventors: Roy Brabson, Barry Mosakowski, Linwood Overby