Patents by Inventor Christopher William Lewis Hobbs

Christopher William Lewis Hobbs has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11036575
    Abstract: A method to detect hardware and software errors in an embedded system is disclosed. The method includes: detecting or measuring, by a plurality of sensors, an operating state of the embedded system; operating a plurality of replicated computation engines in group synchrony, wherein the plurality of replicated computation engines are replicated instances of a single computation engine and wherein the plurality of replicated computation engines are grouped into one or more groups such that, for each group, each member of the group starts in a same processing logic state and processes same events in the same order; intercepting output of the plurality of sensors and transmitting the output to each replicated computation engine of a group in a defined order; and actuating selected computation engines of the plurality of replicated computation engines and arbitrating between outputs of the selected computation engines.
    Type: Grant
    Filed: September 13, 2019
    Date of Patent: June 15, 2021
    Assignee: BlackBerry Limited
    Inventors: Christopher William Lewis Hobbs, Kerry Wayne Johnson
  • Patent number: 10848520
    Abstract: In some implementations, a method of managing access to resources in a single device including receiving, from a first resource assigned to a first perimeter, a request to access a second resource assigned to a second perimeter different from the first perimeter. The single device includes the first perimeter and the second perimeter. Whether access to the second resource is prohibited is determined based on a management policy for the first perimeter. The management policy defining one or more rules for accessing resources assigned to the second perimeter including the second resource.
    Type: Grant
    Filed: April 4, 2017
    Date of Patent: November 24, 2020
    Assignee: BlackBerry Limited
    Inventors: Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Daniel Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse, Christopher William Lewis Hobbs
  • Patent number: 10600146
    Abstract: A method automatically verifies information to ensure it is rendered correctly on a display screen. The method generates an electronic configuration file that controls the interactions between a graphics monitoring unit and a system application stored in an electronic memory. The method retrieves data stored in a portion of a display's memory that holds the content of a screen image to be rendered on the display screen and compares the data stored in a portion of a display's memory with second data provided by the system application to verify that the screen image is displayed on the display screen correctly. The method transmits the results of the comparison to the system application.
    Type: Grant
    Filed: August 5, 2016
    Date of Patent: March 24, 2020
    Assignee: 2236008 Ontario Inc.
    Inventors: Patrick Christopher Lee, Christopher William Lewis Hobbs
  • Publication number: 20200042375
    Abstract: A method to detect hardware and software errors in an embedded system is disclosed. The method includes: detecting or measuring, by a plurality of sensors, an operating state of the embedded system; operating a plurality of replicated computation engines in group synchrony, wherein the plurality of replicated computation engines are replicated instances of a single computation engine and wherein the plurality of replicated computation engines are grouped into one or more groups such that, for each group, each member of the group starts in a same processing logic state and processes same events in the same order; intercepting output of the plurality of sensors and transmitting the output to each replicated computation engine of a group in a defined order; and actuating selected computation engines of the plurality of replicated computation engines and arbitrating between outputs of the selected computation engines.
    Type: Application
    Filed: September 13, 2019
    Publication date: February 6, 2020
    Applicant: 2236008 Ontario Inc.
    Inventors: Christopher William Lewis HOBBS, Kerry Wayne JOHNSON
  • Patent number: 10509692
    Abstract: A system and method enables loosely-coupled lock-step computing including sensors that detect or measure a physical property and server groups. Each server group is serially linked to another server group and includes server instances operating in virtual synchrony. Virtual synchrony middleware receives outputs from multiple server instances and renders a single reply based on the outputs from the multiple server instances. The virtual synchrony middleware replicates and orders incoming requests to the server groups to ensure each of the server instances of that server group receives the same incoming requests in the same order.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: December 17, 2019
    Assignee: 2236008 Ontario Inc.
    Inventors: Kerry Wayne Johnson, Christopher William Lewis Hobbs, Peter Shook
  • Patent number: 10417077
    Abstract: A system and method that detects hardware and software errors in an embedded system that includes detecting or measuring an operating state; causing one or more computation engines to operates in group synchrony; causing one or more active monitors that monitor the computation engines to an automotive integrity level to operate in group synchrony; synchronizing the communication between and from the plurality of computation engines and the plurality of active monitors, respectively; and arbitrating the output generated by the computation engines and the active monitors.
    Type: Grant
    Filed: September 29, 2016
    Date of Patent: September 17, 2019
    Assignee: 2236008 Ontario Inc.
    Inventors: Christopher William Lewis Hobbs, Kerry Wayne Johnson
  • Publication number: 20180349214
    Abstract: A system and method enables loosely-coupled lock-step computing including sensors that detect or measure a physical property and server groups. Each server group is serially linked to another server group and includes server instances operating in virtual synchrony. Virtual synchrony middleware receives outputs from multiple server instances and renders a single reply based on the outputs from the multiple server instances. The virtual synchrony middleware replicates and orders incoming requests to the server groups to ensure each of the server instances of that server group receives the same incoming requests in the same order.
    Type: Application
    Filed: May 31, 2017
    Publication date: December 6, 2018
    Inventors: Kerry Wayne Johnson, Christopher William Lewis Hobbs, Peter Shook
  • Publication number: 20180089010
    Abstract: A system and method that detects hardware and software errors in an embedded system that includes detecting or measuring an operating state; causing one or more computation engines to operates in group synchrony; causing one or more active monitors that monitor the computation engines to an automotive integrity level to operate in group synchrony; synchronizing the communication between and from the plurality of computation engines and the plurality of active monitors, respectively; and arbitrating the output generated by the computation engines and the active monitors.
    Type: Application
    Filed: September 29, 2016
    Publication date: March 29, 2018
    Inventors: Christopher William Lewis Hobbs, Kerry Wayne Johnson
  • Publication number: 20180040099
    Abstract: A method automatically verifies information to ensure it is rendered correctly on a display screen. The method generates an electronic configuration file that controls the interactions between a graphics monitoring unit and a system application stored in an electronic memory. The method retrieves data stored in a portion of a display's memory that holds the content of a screen image to be rendered on the display screen and compares the data stored in a portion of a display's memory with second data provided by the system application to verify that the screen image is displayed on the display screen correctly. The method transmits the results of the comparison to the system application.
    Type: Application
    Filed: August 5, 2016
    Publication date: February 8, 2018
    Inventors: Patrick Christopher Lee, Christopher William Lewis Hobbs
  • Patent number: 9720915
    Abstract: In some implementations, a method for managing data in a user device includes pushing first metadata for a first resource in a first perimeter to a service external to the first perimeter. The first perimeter is configured to prevent external resources from accessing resources in the first perimeter. Second metadata for a second resource in a second perimeter is pushed to the external service. The external service is external to the second perimeter, the second perimeter being configured to prevent external resources from accessing resources in the second perimeter. Information is presented to the user based on a combination of the first metadata and the second metadata.
    Type: Grant
    Filed: January 29, 2014
    Date of Patent: August 1, 2017
    Assignees: BlackBerry Limited, 2236008 Ontario Inc.
    Inventors: Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Daniel Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse, Christopher William Lewis Hobbs
  • Publication number: 20170208098
    Abstract: In some implementations, a method of managing access to resources in a single device including receiving, from a first resource assigned to a first perimeter, a request to access a second resource assigned to a second perimeter different from the first perimeter. The single device includes the first perimeter and the second perimeter. Whether access to the second resource is prohibited is determined based on a management policy for the first perimeter. The management policy defining one or more rules for accessing resources assigned to the second perimeter including the second resource.
    Type: Application
    Filed: April 4, 2017
    Publication date: July 20, 2017
    Inventors: Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Daniel Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse, Christopher William Lewis Hobbs
  • Patent number: 9613219
    Abstract: In some implementations, a method of managing access to resources in a single device including receiving, from a first resource assigned to a first perimeter, a request to access a second resource assigned to a second perimeter different from the first perimeter. The single device includes the first perimeter and the second perimeter. Whether access to the second resource is prohibited is determined based on a management policy for the first perimeter. The management policy defining one or more rules for accessing resources assigned to the second perimeter including the second resource.
    Type: Grant
    Filed: November 10, 2011
    Date of Patent: April 4, 2017
    Assignees: BlackBerry Limited, 2236008 Ontario Inc.
    Inventors: Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Daniel Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse, Christopher William Lewis Hobbs
  • Patent number: 9563780
    Abstract: In some implementations, a method of managing access to resources in a single device including receiving, from a first resource assigned to a first perimeter, a request to access a second resource assigned to a second perimeter different from the first perimeter. The single device includes the first perimeter and the second perimeter. Whether access to the second resource is prohibited is determined based on a management policy for the first perimeter. The management policy defining one or more rules for accessing resources assigned to the second perimeter including the second resource.
    Type: Grant
    Filed: November 10, 2011
    Date of Patent: February 7, 2017
    Assignees: BlackBerry Limited, 2236008 Ontario Inc.
    Inventors: Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Daniel Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse, Christopher William Lewis Hobbs
  • Publication number: 20140304687
    Abstract: A system and method for compilation validation uses a second compiler, in addition to the compiler under test, to generate intermediate code (a.k.a. certificates). A checker processes the output of the two compilers and generates a statement of correctness regarding the output of the compiler under test.
    Type: Application
    Filed: April 4, 2014
    Publication date: October 9, 2014
    Inventors: Christopher William Lewis Hobbs, Akramul Azim
  • Patent number: 8799227
    Abstract: In some implementations, a method for managing data in a user device includes pushing first metadata for a first resource in a first perimeter to a service external to the first perimeter. The first perimeter is configured to prevent external resources from accessing resources in the first perimeter. Second metadata for a second resource in a second perimeter is pushed to the external service. The external service is external to the second perimeter, the second perimeter being configured to prevent external resources from accessing resources in the second perimeter. Information is presented to the user based on a combination of the first metadata and the second metadata.
    Type: Grant
    Filed: February 16, 2012
    Date of Patent: August 5, 2014
    Assignees: BlackBerry Limited, 2236008 Ontario Inc.
    Inventors: Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse, Christopher William Lewis Hobbs
  • Publication number: 20140207821
    Abstract: In some implementations, a method for managing data in a user device includes pushing first metadata for a first resource in a first perimeter to a service external to the first perimeter. The first perimeter is configured to prevent external resources from accessing resources in the first perimeter. Second metadata for a second resource in a second perimeter is pushed to the external service. The external service is external to the second perimeter, the second perimeter being configured to prevent external resources from accessing resources in the second perimeter. Information is presented to the user based on a combination of the first metadata and the second metadata.
    Type: Application
    Filed: January 29, 2014
    Publication date: July 24, 2014
    Inventors: Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Daniel Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse, Christopher William Lewis Hobbs
  • Publication number: 20130124583
    Abstract: In some implementations, a method for managing data in a user device includes pushing first metadata for a first resource in a first perimeter to a service external to the first perimeter. The first perimeter is configured to prevent external resources from accessing resources in the first perimeter. Second metadata for a second resource in a second perimeter is pushed to the external service. The external service is external to the second perimeter, the second perimeter being configured to prevent external resources from accessing resources in the second perimeter. Information is presented to the user based on a combination of the first metadata and the second metadata.
    Type: Application
    Filed: February 16, 2012
    Publication date: May 16, 2013
    Inventors: Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse, Christopher William Lewis Hobbs
  • Publication number: 20130125198
    Abstract: In some implementations, a method of managing access to resources in a single device including receiving, from a first resource assigned to a first perimeter, a request to access a second resource assigned to a second perimeter different from the first perimeter. The single device includes the first perimeter and the second perimeter. Whether access to the second resource is prohibited is determined based on a management policy for the first perimeter. The management policy defining one or more rules for accessing resources assigned to the second perimeter including the second resource.
    Type: Application
    Filed: November 10, 2011
    Publication date: May 16, 2013
    Inventors: Geordon Thomas Ferguson, Christopher Lyle Bender, Alberto Daniel Zubiri, Kenneth Cyril Schneider, Oliver Whitehouse, Christopher William Lewis Hobbs
  • Patent number: 6282170
    Abstract: Following failure of part of the network, a restoration process is carried out. A restoration route around the failed part is selected, and at least a portion of the capacity of links along the restoration route is allocated. The restoration route may be completed without delay. If it can be optimised subsequently, it will be changed, to eliminate any loops, or to use routes further away from the failed part, to avoid congestion close to the failed part.
    Type: Grant
    Filed: May 29, 1997
    Date of Patent: August 28, 2001
    Assignee: Nortel Networks Limited
    Inventors: Mark Bentall, Brian Charles Hargrave Turton, Christopher William Lewis Hobbs