Patents by Inventor Bradley Childs
Bradley Childs has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10681087Abstract: An access control system includes a memory, a processor, a host operating system (OS) executing on the processor, a container on the host OS, and a security manager running on the host OS. The container has a set of access control rules and includes a containerized utility. The security manager receives a request to run the utility to complete a transaction, retrieves credentials associated with the user, and determines a status of the credentials. The status of the credentials is privileged if the credentials are included in the set of access control rules and is non-privileged if the credentials are not included in the access control rules. Responsive to determining the status as privileged, the security manager executes an RBD command for the transaction to obtain a target RBD image, retrieves the target RBD image, and records the transaction.Type: GrantFiled: January 10, 2019Date of Patent: June 9, 2020Assignee: Red Hat, Inc.Inventors: Huamin Chen, Bradley Childs
-
Publication number: 20190166163Abstract: An access control system includes a memory, a processor, a host operating system (OS) executing on the processor, a container on the host OS, and a security manager running on the host OS. The container has a set of access control rules and includes a containerized utility. The security manager receives a request to run the utility to complete a transaction, retrieves credentials associated with the user, and determines a status of the credentials. The status of the credentials is privileged if the credentials are included in the set of access control rules and is non-privileged if the credentials are not included in the access control rules. Responsive to determining the status as privileged, the security manager executes an RBD command for the transaction to obtain a target RBD image, retrieves the target RBD image, and records the transaction.Type: ApplicationFiled: January 10, 2019Publication date: May 30, 2019Inventors: Huamin Chen, Bradley Childs
-
Patent number: 10182076Abstract: An access control system includes a memory, a processor, a host operating system (OS) executing on the processor, a container on the host OS, and a security manager running on the host OS. The container has a set of access control rules and includes a containerized utility. The security manager receives a request to run the utility to complete a transaction, retrieves credentials associated with the user, and determines a status of the credentials. The status of the credentials is privileged if the credentials are included in the set of access control rules and is non-privileged if the credentials are not included in the access control rules. Responsive to determining the status as privileged, the security manager executes an RBD command for the transaction to obtain a target RBD image, retrieves the target RBD image, and records the transaction.Type: GrantFiled: September 27, 2016Date of Patent: January 15, 2019Assignee: Red Hat, Inc.Inventors: Huamin Chen, Bradley Childs
-
Patent number: 9954958Abstract: Various examples are directed to systems and methods for executing a computing job at a computing node of a distributed computing system. A node controller may receive computing job request data from a system controller. The node controller may send job start data to a shared resource provider. The shared resource provider may mount a shared resource for the computing job indicated by the computing job request data. The node controller may send a heartbeat message to the system controller and receive from the system controller an acknowledgement message referencing the heartbeat message. The system controller may send to the shared resource provider, a job stop command. In response to the job stop command, the shared resource provider may dismount the shared resource.Type: GrantFiled: January 29, 2016Date of Patent: April 24, 2018Assignee: Red Hat, Inc.Inventors: Bradley Childs, Paul Morie, Huamin Chen
-
Publication number: 20180091555Abstract: An access control system includes a memory, a processor, a host operating system (OS) executing on the processor, a container on the host OS, and a security manager running on the host OS. The container has a set of access control rules and includes a containerized utility. The security manager receives a request to run the utility to complete a transaction, retrieves credentials associated with the user, and determines a status of the credentials. The status of the credentials is privileged if the credentials are included in the set of access control rules and is non-privileged if the credentials are not included in the access control rules. Responsive to determining the status as privileged, the security manager executes an RBD command for the transaction to obtain a target RBD image, retrieves the target RBD image, and records the transaction.Type: ApplicationFiled: September 27, 2016Publication date: March 29, 2018Inventors: Huamin Chen, Bradley Childs
-
Publication number: 20170223115Abstract: Various examples are directed to systems and methods for executing a computing job at a computing node of a distributed computing system. A node controller may receive computing job request data from a system controller. The node controller may send job start data to a shared resource provider. The shared resource provider may mount a shared resource for the computing job indicated by the computing job request data. The node controller may send a heartbeat message to the system controller and receive from the system controller an acknowledgement message referencing the heartbeat message. The system controller may send to the shared resource provider, a job stop command. In response to the job stop command, the shared resource provider may dismount the shared resource.Type: ApplicationFiled: January 29, 2016Publication date: August 3, 2017Inventors: Bradley Childs, Paul Morie, Huamin Chen
-
Publication number: 20140358616Abstract: Asset management for a computer-based system includes detecting, using a processor, a change to at least one of a plurality of assets of the computer-based system, wherein the plurality of assets are managed using version control, and determining a weight for each changed asset. Using the processor, an aggregate weight is calculated according to the weight of each changed asset and the aggregate weight is compared with a threshold weight. Responsive to determining that the aggregate weight exceeds the threshold weight, a state of the plurality of assets of the computer-based system is recorded.Type: ApplicationFiled: June 3, 2013Publication date: December 4, 2014Applicant: International Business Machines CorporationInventors: Philip T. Berkland, Leugim A. Bustelo, Bradley Childs, Robert S. Goodman, Justin Tyberg
-
Publication number: 20140208201Abstract: A mechanism is provided in a data processing system for presenting obfuscated content in a Web document. The mechanism divides source content into a plurality of rectangular portions and re-arranges the rectangular portions to form obfuscated content. The mechanism generates a Web content fragment that defines the plurality of rectangular portions of the obfuscated content as a plurality of group block elements. The mechanism generates style sheet code that defines the positional layout of the plurality of group block elements. The mechanism generates a Web document comprising the Web content fragment and the style sheet code and referencing the obfuscated content.Type: ApplicationFiled: January 22, 2013Publication date: July 24, 2014Applicant: International Business Machines CorporationInventors: Leugim A. Bustelo, Bradley Childs
-
Publication number: 20120212501Abstract: A theme editor system, including: a new color selector to receive a new base color value for a theme; a base color selector to select a current base color value; a color value modifier to calculate a new color value as a function of the current base color value, the new base color value, and a current color value from the theme; and an updater to write a new color value to a style rule, wherein the style rule is stored on a memory device.Type: ApplicationFiled: February 21, 2011Publication date: August 23, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Philip T. Berkland, Bradley Childs, Jon Ferraiolo, Jonathan M. Huestis, Javier H. Pedemonte, Adam L. Peller, William D. Reed
-
Patent number: 8004387Abstract: Methods, systems, and media to improve polling accuracy in RFID systems are disclosed. Embodiments comprise receiving information from one or more tags by a tag reader, comparing the information from the tags to other information, and adding the tag to an inventory if the tag does not exist in the other information. While some embodiments compare the tag information from the tags to baseline inventories for other areas, some embodiments compare it to current inventories for the other areas or compare it to a combination of both inventories. Some embodiments involve polling RFID tags in storage containers. Other embodiments involve machine-accessible mediums with instructions to receive information from the tag reader, analyze the information with baseline and current inventories of other areas, and store identification information for the tag in a current inventory database if the information is absent from the baseline and current inventories.Type: GrantFiled: October 24, 2008Date of Patent: August 23, 2011Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Bradley Childs, Joann Huffman, Stewart J. Hyman, David B. Kumhyr, Stephen J. Watt
-
Patent number: 7852219Abstract: Container manifests are tracked using a radio frequency identification (RFID) contents reader affixed to a container in which a plurality of RFID-tagged items are disposed, the contents reader being configured to collect and store identification information from all of the tagged items; and using an active RFID tag emulator affixed to the container which responds to an external reader activation code by receiving the collected information from the affixed RFID contents reader, and by transmitting the identification information to the external reader.Type: GrantFiled: April 24, 2008Date of Patent: December 14, 2010Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Bradley Childs, Joann Huffman, Stewart Jason Hyman, David Bruce Kumhyr, Stephen James Watt
-
Publication number: 20090315677Abstract: A system, method, and medium for tracking the contents of a container in which the items stored in the container are provided with radio frequency identification (“RFID”) tags, and a tracker affixed to the container periodically polls the items in the container to collect identification information. An electronic manifest, also attached to the container, is updated periodically to reflect items which have been added to the container or removed from the container since the last polling. The tracker emulates an RFID tag when polled by an external reader, responding by uploading the entire electronic manifest to the external reader. The external reader and the affixed reader preferably utilize distinct RFID protocols so as to produce a hierarchical manifest data structure with high integrity.Type: ApplicationFiled: April 24, 2008Publication date: December 24, 2009Inventors: Rhonda L Childress, Bradley Childs, Joann Huffman, Stewart Jason Hyman, David Bruce Kumhyr, Stehen James Watt
-
Publication number: 20090051490Abstract: Methods, systems, and media to improve polling accuracy in RFID systems are disclosed. Embodiments comprise receiving information from one or more tags by a tag reader, comparing the information from the tags to other information, and adding the tag to an inventory if the tag does not exist in the other information. While some embodiments compare the tag information from the tags to baseline inventories for other areas, some embodiments compare it to current inventories for the other areas or compare it to a combination of both inventories. Some embodiments involve polling RFID tags in storage containers. Other embodiments involve machine-accessible mediums with instructions to receive information from the tag reader, analyze the information with baseline and current inventories of other areas, and store identification information for the tag in a current inventory database if the information is absent from the baseline and current inventories.Type: ApplicationFiled: October 24, 2008Publication date: February 26, 2009Applicant: International Business Machines CorporationInventors: Rhonda L. Childress, Bradley Childs, Joann Huffman, Stewart J. Hyman, David B. Kumhyr, Stephen J. Watt
-
Patent number: 7468650Abstract: A method to improve polling accuracy in RFID systems is disclosed. Embodiments comprise receiving information from one or more tags by a tag reader, comparing the information from the tags to other information, and adding the tag to an inventory if the tag does not exist in the other information. While some embodiments compare the tag information from the tags to baseline inventories for other areas, some embodiments compare it to current inventories for the other areas or compare it to a combination of both inventories. Some embodiments involve polling RFID tags in storage containers.Type: GrantFiled: June 30, 2006Date of Patent: December 23, 2008Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Bradley Childs, Joann Huffman, Stewart J. Hyman, David B. Kumhyr, Stephen J. Watt
-
Patent number: 7385510Abstract: A system, method, and medium for tracking the contents of a container in which the items stored in the container are provided with radio frequency identification (“RFID”) tags, and a tracker affixed to the container periodically polls the items in the container to collect identification information. An electronic manifest, also attached to the container, is updated periodically to reflect items which have been added to the container or removed from the container since the last polling. The tracker emulates an RFID tag when polled by an external reader, responding by uploading the entire electronic manifest to the external reader. The external reader and the affixed reader preferably utilize distinct RFID protocols so as to produce a hierarchical manifest data structure with high integrity.Type: GrantFiled: June 30, 2006Date of Patent: June 10, 2008Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Bradley Childs, Joann Huffman, Stewart Jason Hyman, David Bruce Kumhyr, Stehen James Watt
-
Publication number: 20080001748Abstract: Methods, systems, and media to improve polling accuracy in RFID systems are disclosed. Embodiments comprise receiving information from one or more tags by a tag reader, comparing the information from the tags to other information, and adding the tag to an inventory if the tag does not exist in the other information. While some embodiments compare the tag information from the tags to baseline inventories for other areas, some embodiments compare it to current inventories for the other areas or compare it to a combination of both inventories. Some embodiments involve polling RFID tags in storage containers. Other embodiments involve machine-accessible mediums with instructions to receive information from the tag reader, analyze the information with baseline and current inventories of other areas, and store identification information for the tag in a current inventory database if the information is absent from the baseline and current inventories.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Inventors: Rhonda L. Childress, Bradley Childs, Joann Huffman, Stewart J. Hyman, David B. Kumhyr, Stephen J. Watt
-
Publication number: 20080001746Abstract: A system, method, and medium for tracking the contents of a container in which the items stored in the container are provided with radio frequency identification (“RFID”) tags, and a tracker affixed to the container periodically polls the items in the container to collect identification information. An electronic manifest, also attached to the container, is updated periodically to reflect items which have been added to the container or removed from the container since the last polling. The tracker emulates an RFID tag when polled by an external reader, responding by uploading the entire electronic manifest to the external reader. The external reader and the affixed reader preferably utilize distinct RFID protocols so as to produce a hierarchical manifest data structure with high integrity.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Inventors: Rhonda L. Childress, Bradley Childs, Joann Huffman, Stewart Jason Hyman, David Bruce Kumhyr, Stehen James Watt