Patents by Inventor Colin R. Penfold
Colin R. Penfold has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11663324Abstract: Concepts for acquiring information for identifying a security configuration for an application are proposed. In particular, the information is obtained by running the application in a development environment, detecting security requests made on behalf of the application, and then storing security information associated with the security requests in a security log. Using this concept, a security log may be obtained from which an appropriate security configuration may be determined.Type: GrantFiled: August 10, 2021Date of Patent: May 30, 2023Assignee: International Business Machines CorporationInventors: Colin R. Penfold, Darren R. Beard, David Michael Key, Andrew David Clifton
-
Publication number: 20230140267Abstract: A method and system are provided for code coverage for test systems for testing source code. The method obtains a trace with trace records written at entry and exit to one or more test modules for function calls to the test modules. The method compares response codes for the functions extracted from the trace with a finite list of response codes retrieved from metadata for the source code for the functions and analyzes a code coverage based on the comparison.Type: ApplicationFiled: November 4, 2021Publication date: May 4, 2023Inventors: Colin R. Penfold, Darren R. Beard, Michael John Fish, Jeremy Weaving
-
Publication number: 20230051461Abstract: Concepts for acquiring information for identifying a security configuration for an application are proposed. In particular, the information is obtained by running the application in a development environment, detecting security requests made on behalf of the application, and then storing security information associated with the security requests in a security log. Using this concept, a security log may be obtained from which an appropriate security configuration may be determined.Type: ApplicationFiled: August 10, 2021Publication date: February 16, 2023Inventors: Colin R. Penfold, Darren R. Beard, David Michael Key, Andrew David Clifton
-
Patent number: 11099970Abstract: Method and system are provided for capturing task traces for multiple tasks. The method includes capturing in a task trace structure recent trace data entries for a task of multiple tasks segmented into a predefined number of available blocks, wherein a task trace structure is provided for each of multiple tasks in parallel, wherein trace data entries are written to a block with a timestamp of the trace data entries. The method also includes storing in a global trace structure pushed blocks from the multiple task trace structures of older data that exceed the predefined number of blocks of the task trace structures, wherein the blocks are ordered in the global trace structure by the pushed order of the blocks from the multiple task trace structures.Type: GrantFiled: January 24, 2020Date of Patent: August 24, 2021Assignee: International Business Machines CorporationInventor: Colin R. Penfold
-
Patent number: 10956232Abstract: A method, computer system, and a computer program product for instructing the use of application programming interface (API) commands in a runtime environment is provided. The present invention may include receiving, by a computer processor, a source code with a high level language API command. The present invention may include accessing, by a computer processor, metadata for the source code and determining whether the metadata includes an instruction to be applied to the high level language API command, and applying, by a computer processor, the instruction to the high level language API command. The present invention may include processing, by a computer processor, the high level language API command to a low level code using a command translator, wherein the processing occurs after the applying the instruction.Type: GrantFiled: August 22, 2019Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Darren R. Beard, Colin R. Penfold, Ian J. Mitchell
-
Patent number: 10673835Abstract: A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. The security token is validated and, in response to a positive validation, security information is extracted. The security information is processed to validate the transaction request and a set of validation attributes is generated. The set of validation attributes is stored in a read-only data object. A transaction server is notified of the read-only data object to authorize processing of the transaction request by the transaction server.Type: GrantFiled: March 6, 2018Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Elisabetta Flamini, Colin R. Penfold
-
Publication number: 20200159645Abstract: Method and system are provided for capturing task traces for multiple tasks. The method includes capturing in a task trace structure recent trace data entries for a task of multiple tasks segmented into a predefined number of available blocks, wherein a task trace structure is provided for each of multiple tasks in parallel, wherein trace data entries are written to a block with a timestamp of the trace data entries. The method also includes storing in a global trace structure pushed blocks from the multiple task trace structures of older data that exceed the predefined number of blocks of the task trace structures, wherein the blocks are ordered in the global trace structure by the pushed order of the blocks from the multiple task trace structures.Type: ApplicationFiled: January 24, 2020Publication date: May 21, 2020Inventor: Colin R. Penfold
-
Publication number: 20200081819Abstract: Method and system are provided for capturing task traces for multiple tasks. The method includes capturing in a task trace structure recent trace data entries for a task segmented into a predefined number of available blocks, wherein a task trace structure is provided for each of multiple tasks in parallel, wherein trace data entries are written to a block with a timestamp of the trace data entries. The method also includes storing in a global trace structure pushed blocks from the multiple task trace structures of older data that exceed the predefined number of blocks of the task trace structures, wherein the blocks are ordered in the global trace structure by the pushed order of the blocks from the multiple task trace structures.Type: ApplicationFiled: September 11, 2018Publication date: March 12, 2020Inventor: Colin R. Penfold
-
Patent number: 10579505Abstract: Method and system are provided for capturing task traces for multiple tasks. The method includes capturing in a task trace structure recent trace data entries for a task segmented into a predefined number of available blocks, wherein a task trace structure is provided for each of multiple tasks in parallel, wherein trace data entries are written to a block with a timestamp of the trace data entries. The method also includes storing in a global trace structure pushed blocks from the multiple task trace structures of older data that exceed the predefined number of blocks of the task trace structures, wherein the blocks are ordered in the global trace structure by the pushed order of the blocks from the multiple task trace structures.Type: GrantFiled: September 11, 2018Date of Patent: March 3, 2020Assignee: International Business Machines CorporationInventor: Colin R. Penfold
-
Publication number: 20190377615Abstract: A method, computer system, and a computer program product for instructing the use of application programming interface (API) commands in a runtime environment is provided. The present invention may include receiving, by a computer processor, a source code with a high level language API command. The present invention may include accessing, by a computer processor, metadata for the source code and determining whether the metadata includes an instruction to be applied to the high level language API command, and applying, by a computer processor, the instruction to the high level language API command. The present invention may include processing, by a computer processor, the high level language API command to a low level code using a command translator, wherein the processing occurs after the applying the instruction.Type: ApplicationFiled: August 22, 2019Publication date: December 12, 2019Inventors: Darren R. Beard, Colin R. Penfold, Ian J. Mitchell
-
Patent number: 10452454Abstract: A method, computer system, and a computer program product for instructing the use of application programming interface (API) commands in a runtime environment is provided. The present invention may include receiving, by a computer processor, a source code with a high level language API command. The present invention may include accessing, by a computer processor, metadata for the source code and determining whether the metadata includes an instruction to be applied to the high level language API command, and applying, by a computer processor, the instruction to the high level language API command. The present invention may include processing, by a computer processor, the high level language API command to a low level code using a command translator, wherein the processing occurs after the applying the instruction.Type: GrantFiled: June 7, 2018Date of Patent: October 22, 2019Assignee: International Business Machines CorporationInventors: Darren R. Beard, Colin R. Penfold, Ian J. Mitchell
-
Publication number: 20190163470Abstract: A method, system, and computer program product for identifying skills for product areas includes: receiving change data from a first computing device, the change data including at least change sets, check-in history, and product areas; analyzing the change data to determine dimensions of change, the dimensions of change including at least a size of change, an age of change, and a quantity of changes; calculating a program skill level for each program of one or more programs using the dimensions of the change, the software product having one or more product areas, each product area having one or more programs; calculating a product skill level for each product area of the one or more product areas using the calculated program skill levels for each program; and providing an output having a visual representation of the skill level for each product area.Type: ApplicationFiled: November 27, 2017Publication date: May 30, 2019Inventors: Darren R. Beard, Jenny J. He, Andrew Wright, Colin R. Penfold
-
Patent number: 10142326Abstract: A received security token includes first access control attributes and a signature of a first identity provider of a first security domain. Additional access control attributes provided by a second identity provider of a second security domain are added into the received security token. The received security token with the added additional access control attributes is re-signed, with a private key associated with a certificate of a second service provider in the second security domain. The re-signing is an assertion in the second security domain that the added additional access control attributes have been provided by the second identity provider of the second security domain. The re-signed received security token is issued for consuming, using the added additional access control attributes, by any service provider in the second security domain.Type: GrantFiled: August 18, 2017Date of Patent: November 27, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Elisabetta Flamini, Colin R. Penfold
-
Patent number: 10042670Abstract: A method, system and computer program product for handling a unit of work in a transaction processing system, in which the system comprises one or more production regions operating minimal or no diagnostic functions and one or more diagnostic regions operating maximal or full diagnostic functions. A unit of work is received, which is routed to a production region. After receiving a notification that the work has failed, the work is routed to a diagnostic region.Type: GrantFiled: May 14, 2012Date of Patent: August 7, 2018Assignee: International Business Machines CorporationInventors: Paul Johnson, Colin R. Penfold
-
Publication number: 20180198777Abstract: A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. The security token is validated and, in response to a positive validation, security information is extracted. The security information is processed to validate the transaction request and a set of validation attributes is generated. The set of validation attributes is stored in a read-only data object. A transaction server is notified of the read-only data object to authorize processing of the transaction request by the transaction server.Type: ApplicationFiled: March 6, 2018Publication date: July 12, 2018Inventors: Elisabetta Flamini, Colin R. Penfold
-
Patent number: 9948631Abstract: A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. The security token is validated and, in response to a positive validation, security information is extracted. The security information is processed to validate the transaction request and a set of validation attributes is generated. The set of validation attributes is stored in a read-only data object. A transaction server is notified of the read-only data object to authorize processing of the transaction request by the transaction server.Type: GrantFiled: February 10, 2015Date of Patent: April 17, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Elisabetta Flamini, Colin R. Penfold
-
Publication number: 20170374060Abstract: A received security token includes first access control attributes and a signature of a first identity provider of a first security domain. Additional access control attributes provided by a second identity provider of a second security domain are added into the received security token. The received security token with the added additional access control attributes is re-signed, with a private key associated with a certificate of a second service provider in the second security domain. The re-signing is an assertion in the second security domain that the added additional access control attributes have been provided by the second identity provider of the second security domain. The re-signed received security token is issued for consuming, using the added additional access control attributes, by any service provider in the second security domain.Type: ApplicationFiled: August 18, 2017Publication date: December 28, 2017Inventors: Elisabetta Flamini, Colin R. Penfold
-
Patent number: 9769152Abstract: Attribute-based access control is performed across a first and a second security domain in a federated distributed processing environment. A security token received in the second security domain from a first service provider in the first security domain includes access control attributes. Access control information associated with a request to process an online transaction in the second security domain is received from an identity provider in the second security domain. The access control information is mapped into access control attributes compatible with a format of the access control attributes of the received security token. The mapped access control attributes are appended to the received security token to create a modified security token. The modified security token is signed with a certificate of a second service provider in the second security domain, and the modified security token is issued for consuming by any service provider in the second security domain.Type: GrantFiled: February 10, 2015Date of Patent: September 19, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Elisabetta Flamini, Colin R. Penfold
-
Patent number: 9411661Abstract: A transaction processing system is operated. A first resource is locked as a shared resource by a first task executing on a computing device. The first task attempts to lock a second resource as an exclusive resource. The occurrence of a deadlock is ascertained. A second task that wishes to use the locked first resource is identified. A current position of the first task with respect to the first resource is stored. The lock on the first resource is removed. The second task is prompted to use the first resource. The first task locks the first resource as the shared resource. The first task is repositioned with respect to first resource according to the stored position. The first task locks the second resource as the exclusive resource. The first task is performed.Type: GrantFiled: April 6, 2010Date of Patent: August 9, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Martin W. J. Cocks, Dai C. Middleton, Colin R. Penfold, Helen M. Witter
-
Publication number: 20150244705Abstract: A single sign-on is implemented in an online transaction processing system. A security token extracted from a transaction request is received. The security token is validated and, in response to a positive validation, security information is extracted. The security information is processed to validate the transaction request and a set of validation attributes is generated. The set of validation attributes is stored in a read-only data object. A transaction server is notified of the read-only data object to authorize processing of the transaction request by the transaction server.Type: ApplicationFiled: February 10, 2015Publication date: August 27, 2015Inventors: Elisabetta Flamini, Colin R. Penfold