Patents by Inventor Colin R. Penfold
Colin R. Penfold has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250227113Abstract: A method, computer program product, and computer system are provided for user access group discovery. The method includes: generating a matrix that depicts the respective resources of a set of resources accessed by each of a plurality of users; obtaining, for each user, a similarity measurement using the matrix, wherein the similarity measurement is based on a comparison of the resources accessed by the user to the resources accessed by the other users; generating, for each user, a feature vector for clustering the users into user access groups, wherein the feature vector represents the resources accessed by the user; applying the feature vectors and the similarity measurements to a centroid-based clustering algorithm to obtain the user access groups; and outputting the user access groups for application in a security environment.Type: ApplicationFiled: February 8, 2024Publication date: July 10, 2025Inventors: Erhan Mengusoglu, John Donald Taylor, Colin R. Penfold, Gregory Lubel, Mark John Pocock, David Michael Key
-
Patent number: 12253934Abstract: A method and system are provided for code coverage for test systems for testing source code. The method obtains a trace with trace records written at entry and exit to one or more test modules for function calls to the test modules. The method compares response codes for the functions extracted from the trace with a finite list of response codes retrieved from metadata for the source code for the functions and analyzes a code coverage based on the comparison.Type: GrantFiled: November 4, 2021Date of Patent: March 18, 2025Assignee: International Business Machines CorporationInventors: Colin R. Penfold, Darren R. Beard, Michael John Fish, Jeremy Weaving
-
Patent number: 11663324Abstract: Concepts for acquiring information for identifying a security configuration for an application are proposed. In particular, the information is obtained by running the application in a development environment, detecting security requests made on behalf of the application, and then storing security information associated with the security requests in a security log. Using this concept, a security log may be obtained from which an appropriate security configuration may be determined.Type: GrantFiled: August 10, 2021Date of Patent: May 30, 2023Assignee: International Business Machines CorporationInventors: Colin R. Penfold, Darren R. Beard, David Michael Key, Andrew David Clifton
-
Publication number: 20230140267Abstract: A method and system are provided for code coverage for test systems for testing source code. The method obtains a trace with trace records written at entry and exit to one or more test modules for function calls to the test modules. The method compares response codes for the functions extracted from the trace with a finite list of response codes retrieved from metadata for the source code for the functions and analyzes a code coverage based on the comparison.Type: ApplicationFiled: November 4, 2021Publication date: May 4, 2023Inventors: Colin R. Penfold, Darren R. Beard, Michael John Fish, Jeremy Weaving
-
Publication number: 20230051461Abstract: Concepts for acquiring information for identifying a security configuration for an application are proposed. In particular, the information is obtained by running the application in a development environment, detecting security requests made on behalf of the application, and then storing security information associated with the security requests in a security log. Using this concept, a security log may be obtained from which an appropriate security configuration may be determined.Type: ApplicationFiled: August 10, 2021Publication date: February 16, 2023Inventors: Colin R. Penfold, Darren R. Beard, David Michael Key, Andrew David Clifton
-
Patent number: 11099970Abstract: Method and system are provided for capturing task traces for multiple tasks. The method includes capturing in a task trace structure recent trace data entries for a task of multiple tasks segmented into a predefined number of available blocks, wherein a task trace structure is provided for each of multiple tasks in parallel, wherein trace data entries are written to a block with a timestamp of the trace data entries. The method also includes storing in a global trace structure pushed blocks from the multiple task trace structures of older data that exceed the predefined number of blocks of the task trace structures, wherein the blocks are ordered in the global trace structure by the pushed order of the blocks from the multiple task trace structures.Type: GrantFiled: January 24, 2020Date of Patent: August 24, 2021Assignee: International Business Machines CorporationInventor: Colin R. Penfold
-
Patent number: 10956232Abstract: A method, computer system, and a computer program product for instructing the use of application programming interface (API) commands in a runtime environment is provided. The present invention may include receiving, by a computer processor, a source code with a high level language API command. The present invention may include accessing, by a computer processor, metadata for the source code and determining whether the metadata includes an instruction to be applied to the high level language API command, and applying, by a computer processor, the instruction to the high level language API command. The present invention may include processing, by a computer processor, the high level language API command to a low level code using a command translator, wherein the processing occurs after the applying the instruction.Type: GrantFiled: August 22, 2019Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Darren R. Beard, Colin R. Penfold, Ian J. Mitchell
-
Patent number: 10673835Abstract: A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. The security token is validated and, in response to a positive validation, security information is extracted. The security information is processed to validate the transaction request and a set of validation attributes is generated. The set of validation attributes is stored in a read-only data object. A transaction server is notified of the read-only data object to authorize processing of the transaction request by the transaction server.Type: GrantFiled: March 6, 2018Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Elisabetta Flamini, Colin R. Penfold
-
Publication number: 20200159645Abstract: Method and system are provided for capturing task traces for multiple tasks. The method includes capturing in a task trace structure recent trace data entries for a task of multiple tasks segmented into a predefined number of available blocks, wherein a task trace structure is provided for each of multiple tasks in parallel, wherein trace data entries are written to a block with a timestamp of the trace data entries. The method also includes storing in a global trace structure pushed blocks from the multiple task trace structures of older data that exceed the predefined number of blocks of the task trace structures, wherein the blocks are ordered in the global trace structure by the pushed order of the blocks from the multiple task trace structures.Type: ApplicationFiled: January 24, 2020Publication date: May 21, 2020Inventor: Colin R. Penfold
-
Publication number: 20200081819Abstract: Method and system are provided for capturing task traces for multiple tasks. The method includes capturing in a task trace structure recent trace data entries for a task segmented into a predefined number of available blocks, wherein a task trace structure is provided for each of multiple tasks in parallel, wherein trace data entries are written to a block with a timestamp of the trace data entries. The method also includes storing in a global trace structure pushed blocks from the multiple task trace structures of older data that exceed the predefined number of blocks of the task trace structures, wherein the blocks are ordered in the global trace structure by the pushed order of the blocks from the multiple task trace structures.Type: ApplicationFiled: September 11, 2018Publication date: March 12, 2020Inventor: Colin R. Penfold
-
Patent number: 10579505Abstract: Method and system are provided for capturing task traces for multiple tasks. The method includes capturing in a task trace structure recent trace data entries for a task segmented into a predefined number of available blocks, wherein a task trace structure is provided for each of multiple tasks in parallel, wherein trace data entries are written to a block with a timestamp of the trace data entries. The method also includes storing in a global trace structure pushed blocks from the multiple task trace structures of older data that exceed the predefined number of blocks of the task trace structures, wherein the blocks are ordered in the global trace structure by the pushed order of the blocks from the multiple task trace structures.Type: GrantFiled: September 11, 2018Date of Patent: March 3, 2020Assignee: International Business Machines CorporationInventor: Colin R. Penfold
-
Publication number: 20190377615Abstract: A method, computer system, and a computer program product for instructing the use of application programming interface (API) commands in a runtime environment is provided. The present invention may include receiving, by a computer processor, a source code with a high level language API command. The present invention may include accessing, by a computer processor, metadata for the source code and determining whether the metadata includes an instruction to be applied to the high level language API command, and applying, by a computer processor, the instruction to the high level language API command. The present invention may include processing, by a computer processor, the high level language API command to a low level code using a command translator, wherein the processing occurs after the applying the instruction.Type: ApplicationFiled: August 22, 2019Publication date: December 12, 2019Inventors: Darren R. Beard, Colin R. Penfold, Ian J. Mitchell
-
Patent number: 10452454Abstract: A method, computer system, and a computer program product for instructing the use of application programming interface (API) commands in a runtime environment is provided. The present invention may include receiving, by a computer processor, a source code with a high level language API command. The present invention may include accessing, by a computer processor, metadata for the source code and determining whether the metadata includes an instruction to be applied to the high level language API command, and applying, by a computer processor, the instruction to the high level language API command. The present invention may include processing, by a computer processor, the high level language API command to a low level code using a command translator, wherein the processing occurs after the applying the instruction.Type: GrantFiled: June 7, 2018Date of Patent: October 22, 2019Assignee: International Business Machines CorporationInventors: Darren R. Beard, Colin R. Penfold, Ian J. Mitchell
-
Publication number: 20190163470Abstract: A method, system, and computer program product for identifying skills for product areas includes: receiving change data from a first computing device, the change data including at least change sets, check-in history, and product areas; analyzing the change data to determine dimensions of change, the dimensions of change including at least a size of change, an age of change, and a quantity of changes; calculating a program skill level for each program of one or more programs using the dimensions of the change, the software product having one or more product areas, each product area having one or more programs; calculating a product skill level for each product area of the one or more product areas using the calculated program skill levels for each program; and providing an output having a visual representation of the skill level for each product area.Type: ApplicationFiled: November 27, 2017Publication date: May 30, 2019Inventors: Darren R. Beard, Jenny J. He, Andrew Wright, Colin R. Penfold
-
Patent number: 10142326Abstract: A received security token includes first access control attributes and a signature of a first identity provider of a first security domain. Additional access control attributes provided by a second identity provider of a second security domain are added into the received security token. The received security token with the added additional access control attributes is re-signed, with a private key associated with a certificate of a second service provider in the second security domain. The re-signing is an assertion in the second security domain that the added additional access control attributes have been provided by the second identity provider of the second security domain. The re-signed received security token is issued for consuming, using the added additional access control attributes, by any service provider in the second security domain.Type: GrantFiled: August 18, 2017Date of Patent: November 27, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Elisabetta Flamini, Colin R. Penfold
-
Patent number: 10042670Abstract: A method, system and computer program product for handling a unit of work in a transaction processing system, in which the system comprises one or more production regions operating minimal or no diagnostic functions and one or more diagnostic regions operating maximal or full diagnostic functions. A unit of work is received, which is routed to a production region. After receiving a notification that the work has failed, the work is routed to a diagnostic region.Type: GrantFiled: May 14, 2012Date of Patent: August 7, 2018Assignee: International Business Machines CorporationInventors: Paul Johnson, Colin R. Penfold
-
Publication number: 20180198777Abstract: A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. The security token is validated and, in response to a positive validation, security information is extracted. The security information is processed to validate the transaction request and a set of validation attributes is generated. The set of validation attributes is stored in a read-only data object. A transaction server is notified of the read-only data object to authorize processing of the transaction request by the transaction server.Type: ApplicationFiled: March 6, 2018Publication date: July 12, 2018Inventors: Elisabetta Flamini, Colin R. Penfold
-
Patent number: 9948631Abstract: A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. The security token is validated and, in response to a positive validation, security information is extracted. The security information is processed to validate the transaction request and a set of validation attributes is generated. The set of validation attributes is stored in a read-only data object. A transaction server is notified of the read-only data object to authorize processing of the transaction request by the transaction server.Type: GrantFiled: February 10, 2015Date of Patent: April 17, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Elisabetta Flamini, Colin R. Penfold
-
Publication number: 20170374060Abstract: A received security token includes first access control attributes and a signature of a first identity provider of a first security domain. Additional access control attributes provided by a second identity provider of a second security domain are added into the received security token. The received security token with the added additional access control attributes is re-signed, with a private key associated with a certificate of a second service provider in the second security domain. The re-signing is an assertion in the second security domain that the added additional access control attributes have been provided by the second identity provider of the second security domain. The re-signed received security token is issued for consuming, using the added additional access control attributes, by any service provider in the second security domain.Type: ApplicationFiled: August 18, 2017Publication date: December 28, 2017Inventors: Elisabetta Flamini, Colin R. Penfold
-
Patent number: 9769152Abstract: Attribute-based access control is performed across a first and a second security domain in a federated distributed processing environment. A security token received in the second security domain from a first service provider in the first security domain includes access control attributes. Access control information associated with a request to process an online transaction in the second security domain is received from an identity provider in the second security domain. The access control information is mapped into access control attributes compatible with a format of the access control attributes of the received security token. The mapped access control attributes are appended to the received security token to create a modified security token. The modified security token is signed with a certificate of a second service provider in the second security domain, and the modified security token is issued for consuming by any service provider in the second security domain.Type: GrantFiled: February 10, 2015Date of Patent: September 19, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Elisabetta Flamini, Colin R. Penfold