Patents by Inventor Colin J. Thorne
Colin J. Thorne has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10120801Abstract: Method and system are provided for object caching with mobility management for mobile data communication. The method may include: intercepting and snooping data communications at a base station between a user equipment and a content server without terminating communications; implementing object caching at the base station using snooped data communications; implementing object caching at an object cache server in the network, wherein the object cache server proxies communications to the content server from the user equipment; and maintaining synchrony between an object cache at the base station and an object cache at the object cache server.Type: GrantFiled: February 8, 2013Date of Patent: November 6, 2018Assignee: GLOBALFOUNDRIES INC.Inventors: Oliver M. Deakin, Victor S. Moore, Robert B. Nicholson, Colin J. Thorne
-
Patent number: 9560557Abstract: A processor-implemented method, apparatus, and/or computer program product move Open Systems Interconnection (OSI) layer 4 connections between wirelessly-connected user equipment to a series of cell-towers, wherein an OSI layer 4 connection is extracted out of the underlying cellular protocols at the series of cell-towers. A detection is made that user equipment, which has a broken-out layer 4 connection, has moved from a first cell-tower to a second cell-tower. Traffic for an existing layer 4 connection from the user equipment is tunnelled between the first cell-tower and the second cell-tower. In response to a predetermined trigger event occurring, an ongoing bidirectional flow of data packets is migrated from the user equipment over to layer 4 connections maintained at the second cell-tower. Furthermore, OSI layer 4 connections for all server ports other than the proxied active layer 4 connections that are proxied in the web cache are byte cached.Type: GrantFiled: July 7, 2016Date of Patent: January 31, 2017Assignee: International Business Machines CorporationInventors: Bruce O. Anthony, Jr., Ronald L. Billau, Chatschik Bisdikian, Canio Cillis, Victor S. Moore, Erich M. Nahum, Robert B. Nicholson, Colin J. Thorne, Dinesh C. Verma
-
Patent number: 9535794Abstract: A computer receives a heartbeat message that includes both program reset information and at least one segment, of the heartbeat message, that is configured to indicate whether or not a first program is functioning correctly. The computer determines if the heartbeat message includes the indication that the first program is functioning correctly. If the computer determines that the heartbeat message indicates that the first program is functioning correctly, then the computer sends a data stream to the first program.Type: GrantFiled: July 26, 2013Date of Patent: January 3, 2017Assignee: GLOBALFOUNDRIES INC.Inventors: Arthur J. Barr, Stuart J. Hayton, Robert B. Nicholson, Colin J. Thorne
-
Publication number: 20160316400Abstract: A processor-implemented method, apparatus, and/or computer program product move Open Systems Interconnection (OSI) layer 4 connections between wirelessly-connected user equipment to a series of cell-towers, wherein an OSI layer 4 connection is extracted out of the underlying cellular protocols at the series of cell-towers. A detection is made that user equipment, which has a broken-out layer 4 connection, has moved from a first cell-tower to a second cell-tower. Traffic for an existing layer 4 connection from the user equipment is tunnelled between the first cell-tower and the second cell-tower. In response to a predetermined trigger event occurring, an ongoing bidirectional flow of data packets is migrated from the user equipment over to layer 4 connections maintained at the second cell-tower. Furthermore, OSI layer 4 connections for all server ports other than the proxied active layer 4 connections that are proxied in the web cache are byte cached.Type: ApplicationFiled: July 7, 2016Publication date: October 27, 2016Inventors: BRUCE O. ANTHONY, JR., RONALD L. BILLAU, CHATSCHIK BISDIKIAN, CANIO CILLIS, VICTOR S. MOORE, ERICH M. NAHUM, ROBERT B. NICHOLSON, COLIN J. THORNE, DINESH C. VERMA
-
Patent number: 9451504Abstract: A processor-implemented method, apparatus, and/or computer program product move Open Systems Interconnection (OSI) layer 4 connections between wirelessly-connected user equipment to a series of cell-towers, wherein an OSI layer 4 connection is extracted out of the underlying cellular protocols at the series of cell-towers. A detection is made that user equipment, which has a broken-out layer 4 connection, has moved from a first cell-tower to a second cell-tower. Traffic for an existing layer 4 connection from the user equipment is tunnelled between the first cell-tower and the second cell-tower. A predetermined trigger event is identified. In response to the predetermined trigger event occurring, an ongoing bidirectional flow of data packets is migrated from the user equipment over to layer 4 connections maintained at the second cell-tower.Type: GrantFiled: January 3, 2013Date of Patent: September 20, 2016Assignee: International Business Machines CorporationInventors: Bruce O. Anthony, Jr., Ronald L. Billau, Chatschik Bisdikian, Canio Cillis, Victor S. Moore, Erich M. Nahum, Robert B. Nicholson, Colin J. Thorne, Dinesh C. Verma
-
Patent number: 9288234Abstract: A method of operating a network message interceptor for enforcing a security policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, and the security policy identifying at least one valid security standards for communication over the network, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting from the handshake message an identification of a security standard selected for the communication between the first and second endpoints; determining a validity status of the identified security standard based on the security policy; and preventing communication between the first and second endpoints based on a negatively determined validity status of the identified security standard.Type: GrantFiled: July 31, 2012Date of Patent: March 15, 2016Assignee: International Business Machines CorporationInventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
-
Publication number: 20160044023Abstract: A method of operating a network message interceptor for enforcing an authentication policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting a certificate for an authenticating one of the endpoints from the handshake message; determining a validity status of the certificate for confirming an identity of the authenticating endpoint; and preventing communication between the first and second endpoints based on a negatively determined validity status of the certificate.Type: ApplicationFiled: October 22, 2015Publication date: February 11, 2016Applicant: GLOBALFOUNDRIES Inc.Inventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
-
Publication number: 20150032974Abstract: Method and system are provided for object caching with mobility management for mobile data communication. The method may include: intercepting and snooping data communications at a base station between a user equipment and a content server without terminating communications; implementing object caching at the base station using snooped data communications; implementing object caching at an object cache server in the network, wherein the object cache server proxies communications to the content server from the user equipment; and maintaining synchrony between an object cache at the base station and an object cache at the object cache server.Type: ApplicationFiled: February 8, 2013Publication date: January 29, 2015Inventors: Oliver M. Deakin, Victor S. Moore, Robert B. Nicholson, Colin J. Thorne
-
Publication number: 20150033072Abstract: A computer receives a heartbeat message that includes both program reset information and at least one segment, of the heartbeat message, that is configured to indicate whether or not a first program is functioning correctly. The computer determines if the heartbeat message includes the indication that the first program is functioning correctly. If the computer determines that the heartbeat message indicates that the first program is functioning correctly, then the computer sends a data stream to the first program.Type: ApplicationFiled: July 26, 2013Publication date: January 29, 2015Applicant: International Business Machines CorporationInventors: Arthur J. Barr, Stuart J. Hayton, Robert B. Nicholson, Colin J. Thorne
-
Publication number: 20140331287Abstract: A method of operating a network message interceptor for enforcing an authentication policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting a certificate for an authenticating one of the endpoints from the handshake message; determining a validity status of the certificate for confirming an identity of the authenticating endpoint; and preventing communication between the first and second endpoints based on a negatively determined validity status of the certificate.Type: ApplicationFiled: July 31, 2012Publication date: November 6, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
-
Publication number: 20140196108Abstract: A method of operating a network message interceptor for enforcing a security policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, and the security policy identifying at least one valid security standards for communication over the network, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting from the handshake message an identification of a security standard selected for the communication between the first and second endpoints; determining a validity status of the identified security standard based on the security policy; and preventing communication between the first and second endpoints based on a negatively determined validity status of the identified security standard.Type: ApplicationFiled: July 31, 2012Publication date: July 10, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne