Patents by Inventor Christian L. Hunt

Christian L. Hunt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190018965
    Abstract: A local environment verification method, performed by a server of a computer network, includes injecting, into a linear communication orbit, a bundle of information items regarding deployment of a respective local environment verification framework at each of a first subset of nodes in the computer network. The bundle of information items is distributed to a respective node of the first subset of nodes through the linear communication orbit, and used to establish the respective local environment verification framework at the respective node of the first subset of nodes. The respective node of the first subset of nodes is configured to perform a set of local environment verifications using the respective local environment verification framework. The method further includes injecting, into the linear communication orbit, a query message to collect respective local results of the set of local environment verifications from the first subset of nodes.
    Type: Application
    Filed: July 11, 2018
    Publication date: January 17, 2019
    Inventors: James B. Hoscheit, Kevin N. Smathers, Connor J. Hindley, Christian L. Hunt
  • Patent number: 10095864
    Abstract: A remote server dispatches an instruction packet to a node in a network through a linear communication orbit formed by a collection of nodes. The instruction packet propagates from node to node along the linear communication orbit until reaching the node. The instruction packet includes instructions for establishing a direct duplex connection between the node and the remote server. After dispatching the instruction packet to the node through the linear communication orbit, the remote server receives, from the node, a request for establishing the direct duplex connection. In response to receiving the request from the node, the remote server establishes the direct duplex connection. After establishing the direct duplex connection, the remote server issues instructions to the node to upload local data from the node to the remote server through the direct duplex connection.
    Type: Grant
    Filed: July 20, 2016
    Date of Patent: October 9, 2018
    Assignee: TANIUM INC.
    Inventors: Christian L. Hunt, Thomas R. Gissel, Aaron Tarter, Daniel Floyd, Benjamin Hobbs
  • Publication number: 20180013768
    Abstract: This application is directed to an integrity monitoring method performed at a computational machine in a linear communication orbit. The computational machine receives a watch list through the linear communication orbit. The watch list identifies objects for which events are to be monitored at the computational machine. While a plurality of events are occurring locally at the computational machine, the computational machine identifies the plurality of events in real-time. The identified events include events for the objects identified by the watch list, and event information for these identified events is stored in a local database of the computational machine. In response to an integrity reporting request received through the linear communication orbit, the computational machine identifies event information for at least some of the objects identified by the watch list in the local database, and returns the identified event information to a server system through the linear communication orbit.
    Type: Application
    Filed: September 22, 2017
    Publication date: January 11, 2018
    Inventors: Christian L. Hunt, Thomas R. Gissel, Aaron Tarter, Daniel Floyd, Benjamin Hobbs, Michael Smith
  • Publication number: 20170264589
    Abstract: A remote server dispatches an instruction packet to a node in a network through a linear communication orbit formed by a collection of nodes. The instruction packet propagates from node to node along the linear communication orbit until reaching the node. The instruction packet includes instructions for establishing a direct duplex connection between the node and the remote server. After dispatching the instruction packet to the node through the linear communication orbit, the remote server receives, from the node, a request for establishing the direct duplex connection. In response to receiving the request from the node, the remote server establishes the direct duplex connection. After establishing the direct duplex connection, the remote server issues instructions to the node to upload local data from the node to the remote server through the direct duplex connection.
    Type: Application
    Filed: July 20, 2016
    Publication date: September 14, 2017
    Inventors: Christian L. Hunt, Thomas R. Gissel, Aaron Tarter, Daniel Floyd, Benjamin Hobbs
  • Publication number: 20170264588
    Abstract: A respective node in a linear communication orbit receives an instruction packet through the linear communication orbit, where the instruction packet has been propagated from a starting node to the respective node through one or more upstream nodes along the linear communication orbit, and the instruction packet includes an instruction for establishing a direct duplex connection between the respective node and a respective server. In response to receiving the instruction packet, the respective node sends an outbound connection request to the respective server to establish the direct duplex connection. The respective node then uploads local data to the respective server through the direct duplex connection (e.g., in response to one or more queries, instructions, and requests received from the respective server through the direct duplex connection), where the respective server performs analysis on the local data received from the respective node through the direct duplex connection.
    Type: Application
    Filed: July 20, 2016
    Publication date: September 14, 2017
    Inventors: Christian L. Hunt, Thomas R. Gissel, Aaron Tarter, Daniel Floyd, Benjamin Hobbs
  • Publication number: 20170264627
    Abstract: A method for evaluating indicators of compromise (IOCs) is performed at a device having one or more processors and memory. The method includes receiving respective specifications of a plurality of IOCs, wherein the respective specifications of each IOC of the plurality of IOCs includes a respective cost associated with evaluating the IOC. The method further includes dynamically determining an order for evaluating the plurality of IOCs based on the respective costs associated with the plurality of IOCs, and determining whether a threat is present based on results for evaluating one or more of the plurality of IOCs in accordance with the dynamically determined order, instead of an order by which the plurality of IOCs have been received at the device.
    Type: Application
    Filed: July 20, 2016
    Publication date: September 14, 2017
    Inventors: Christian L. Hunt, Thomas R. Gissel, Thomas W. Savage
  • Patent number: 9317302
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to content layout in a pervasive device display and provide a method, system and computer program product for the dynamic selection of a content layout for content in a pervasive device display. In one embodiment of the invention, a dynamic content layout method for pervasive devices can include obtaining display characteristics for a host pervasive device, locating a layout mode corresponding to the obtained display characteristics, and arranging panels of a graphical user interface for an application in the host pervasive device according to the located layout mode.
    Type: Grant
    Filed: January 30, 2006
    Date of Patent: April 19, 2016
    Assignee: International Business Machines Corporation
    Inventors: Christian L. Hunt, Charles Le Vay, Ethan K. Merrill, Jake Palmer
  • Patent number: 8710954
    Abstract: The present invention discloses an active data tag device (100) which includes an expiration event generator (108), and a memory (106) which has tag data (116) stored therein. Upon the occurrence (614) of and expiration event, the tag disables access to the tag data.
    Type: Grant
    Filed: April 30, 2008
    Date of Patent: April 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Kenneth L. Greenlee, Christian L. Hunt, Anne I. Ryan
  • Patent number: 8378787
    Abstract: The present invention discloses a data tag device (100) which initially operates in either an active mode or a semi-active mode (604). The data tag device includes tag circuitry including a interface element (104), a controller element (102), and a memory (106) in which tag data (116) is stored. A battery is provided which is initially coupled to the tag circuitry. A decoupling feature (402) is used to destructively decouple the battery from the tag circuitry when it is desired to disable the data tag device and reduce the ability of third parties to obtain the tag data. The data tag device is configured to detect the destructive decoupling (606, 608), and disable the data tag in response.
    Type: Grant
    Filed: June 6, 2008
    Date of Patent: February 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Kenneth L. Greenlee, Christian L. Hunt, Steven M. Miller, Anne I. Ryan
  • Patent number: 8305218
    Abstract: The invention provides a system and program product for attenuating a radio frequency identification (RFID) reader. In one embodiment, the system includes optimizing a coverage area of an RFID reader.
    Type: Grant
    Filed: August 13, 2008
    Date of Patent: November 6, 2012
    Assignee: International Business Machines Corporation
    Inventors: Christian L. Hunt, Vincent M. Padua, Robin A. Radez, William A. Reichert, III, Gregory C. Smith, Oriana J. Williams
  • Patent number: 8035490
    Abstract: In a wireless tag identification and processing architecture and infrastructure, a method and system that eliminates redundant reporting and processing of the same event observed by different reader/sensors. Reader/sensors and their respective connected controllers are configured as peers when they observe or cover the same spatial region. When an event is observed within the spatial region, the first controller to receive the event data reports the electronic tag data and event data to the next higher processing domain and to its peer controllers. Then when the same electronic tag data or other event data indicating that a subsequent event is actually the same event as observed earlier is received by another peer controller, the another peer controller does not report nor process the electronic tag data and other event data to the next higher processing domain or to its peer controllers.
    Type: Grant
    Filed: December 7, 2006
    Date of Patent: October 11, 2011
    Assignee: International Business Machines Corporation
    Inventors: Christian L. Hunt, Jake Palmer
  • Patent number: 8010654
    Abstract: A method, system and program product for monitoring resources servicing a business transaction is provided. The method includes providing a transaction manager that monitors a business transaction serviced by one or more resources, with each of the resources and the transaction manager having a protocol stack configured to send and receive load-monitoring headers in protocol messages. The method further includes specifying, in a protocol request header in a protocol request message, collection of performance metrics for a resource, collecting, by the resources, the performance metrics specified in the protocol request message and sending the performance metrics collected to the transaction manager, in a protocol response header in a protocol response message. Further, the method includes pre-configuring with policies the protocol stack on a subset of the resources, such that the pre-configured resources can act as monitoring agents on behalf of peer resources and send alerts to a resource manager.
    Type: Grant
    Filed: December 21, 2006
    Date of Patent: August 30, 2011
    Assignee: International Business Machines Corporation
    Inventors: Christian L. Hunt, Roger M. Meli, Denilson Nastacio, Balan Subramanian
  • Patent number: 7932829
    Abstract: The present invention discloses a data tag device (100) which initially operates in a passive mode where the tag responds to queries (412). While operating passively, an expiration event occurs (512, 514) which causes the tag to disable a battery (110), preventing subsequent operation in the passive mode, resulting in the tag disabling access to the tag data.
    Type: Grant
    Filed: June 5, 2008
    Date of Patent: April 26, 2011
    Assignee: International Business Machines Corporation
    Inventors: Kenneth L. Greenlee, Christian L. Hunt, Steven M. Miller, Anne I. Ryan
  • Patent number: 7928846
    Abstract: The present invention discloses a data tag device (100) which initially operates in an active mode where the tag occasionally transmits an unsolicited beacon (412). While operating, an expiration event occurs (512, 514) which causes the tag to disable a battery (110), preventing subsequent operation in an active mode, but may continue operating in a passive mode.
    Type: Grant
    Filed: June 5, 2008
    Date of Patent: April 19, 2011
    Assignee: International Business Machines Corporation
    Inventors: Kenneth L. Greenlee, Christian L. Hunt, Steven M. Miller, Anne I. Ryan
  • Patent number: 7855644
    Abstract: The present invention discloses a data tag device (100) which initially operates in an active mode (304). The data tag device includes tag circuitry including a interface element (104), a controller element (102), and a memory (106) in which tag data (116) is stored. A battery (110) is provided which is initially coupled to the tag circuitry by a connector means (130) which allows non-destructive removal and replacement of the battery. The data tag device is configured to detect the removal of the battery (306, 308), and disable the data tag in response (310).
    Type: Grant
    Filed: June 6, 2008
    Date of Patent: December 21, 2010
    Assignee: International Business Machines Corporation
    Inventors: Kenneth L. Greenlee, Christian L. Hunt, Steven M. Miller, Anne I. Ryan
  • Publication number: 20100039236
    Abstract: The present invention provides a time-based operational window for RFID tags. A method in accordance with an embodiment includes: associating an operational window with the RFID tag; determining if a current time is within the operational window; operating the RFID tag if the current time is within the operational window; and not operating the RFID tag if the current time is outside the operational window.
    Type: Application
    Filed: August 14, 2008
    Publication date: February 18, 2010
    Inventors: Kenneth L. Greenlee, Christian L. Hunt, Anne I. Ryan
  • Publication number: 20090303017
    Abstract: The present invention discloses a data tag device (100) which initially operates in either an active mode or a semi-active mode (604). The data tag device includes tag circuitry including a interface element (104), a controller element (102), and a memory (106) in which tag data (116) is stored. A battery is provided which is initially coupled to the tag circuitry. A decoupling feature (402) is used to destructively decouple the battery from the tag circuitry when it is desired to disable the data tag device and reduce the ability of third parties to obtain the tag data. The data tag device is configured to detect the destructive decoupling (606, 608), and disable the data tag in response.
    Type: Application
    Filed: June 6, 2008
    Publication date: December 10, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: KENNETH L. GREENLEE, CHRISTIAN L. HUNT, STEVEN M. MILLER, ANNE I. RYAN
  • Publication number: 20090303061
    Abstract: The present invention discloses a data tag device (100) which initially operates in an active mode (304). The data tag device includes tag circuitry including a interface element (104), a controller element (102), and a memory (106) in which tag data (116) is stored. A battery (110) is provided which is initially coupled to the tag circuitry by a connector means (130) which allows non-destructive removal and replacement of the battery. The data tag device is configured to detect the removal of the battery (306, 308), and disable the data tag in response (310).
    Type: Application
    Filed: June 6, 2008
    Publication date: December 10, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kenneth L. GREENLEE, Christian L. HUNT, Steven M. MILLER, Anne I. RYAN
  • Publication number: 20090303020
    Abstract: The present invention discloses a data tag device (100) which initially operates in an active mode where the tag occasionally transmits an unsolicited beacon (412). While operating, an expiration event occurs (512, 514) which causes the tag to disable a battery (110), preventing subsequent operation in an active mode, but may continue operating in a passive mode.
    Type: Application
    Filed: June 5, 2008
    Publication date: December 10, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: KENNETH L. GREENLEE, CHRISTIAN L. HUNT, STEVEN M. MILLER, ANNE I. RYAN
  • Publication number: 20090303049
    Abstract: The present invention discloses a data tag device (100) which initially operates in a passive mode where the tag responds to queries (412). While operating passively, an expiration event occurs (512, 514) which causes the tag to disable a battery (110), preventing subsequent operation in the passive mode, resulting in the tag disabling access to the tag data.
    Type: Application
    Filed: June 5, 2008
    Publication date: December 10, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: KENNETH L. GREENLEE, CHRISTIAN L. HUNT, STEVEN M. MILLER, ANNE I. RYAN