Patents by Inventor Craig Lawton

Craig Lawton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11582027
    Abstract: A device management service of a provider network maintain a device repository that is accessible to a remote managed network. The device management service assigns different service credentials for different edge devices indicated by the device repository. For a particular edge device, the device management service provides, based on the service credentials assigned for the edge device, secure transmission of a message between the device management service and a network manager of the managed network. The network manager of the managed network provides secure transmission of the message between the network manager and the edge device based on local credentials assigned for the edge device.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: February 14, 2023
    Assignee: Amazon Technologies, Inc.
    Inventor: Craig Lawton
  • Patent number: 10740201
    Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
    Type: Grant
    Filed: April 11, 2018
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, Puthukode G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
  • Publication number: 20180267871
    Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
    Type: Application
    Filed: April 11, 2018
    Publication date: September 20, 2018
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, Puthukode G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
  • Patent number: 10042724
    Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
    Type: Grant
    Filed: June 22, 2016
    Date of Patent: August 7, 2018
    Assignee: International Business Machines Corporation
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, Puthukode G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
  • Publication number: 20160306721
    Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
    Type: Application
    Filed: June 22, 2016
    Publication date: October 20, 2016
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P.G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
  • Patent number: 9411697
    Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
    Type: Grant
    Filed: September 24, 2012
    Date of Patent: August 9, 2016
    Assignee: International Business Machines Corporation
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P. G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
  • Patent number: 8606659
    Abstract: A system for establishing and maintaining inventories of computing environment assets comprising one or more custom collector interfaces that detect movement of assets from one environment to another, and an inventory scanner which modifies inventories for each environment based on monitored asset movements. The present invention is of especial benefit to autonomic and on-demand computing architectures.
    Type: Grant
    Filed: December 22, 2008
    Date of Patent: December 10, 2013
    Assignee: International Business Machines Corporation
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, Puthukode G. Ramachandran, Lorin Evan Ullmann, John Whitfield
  • Patent number: 8311991
    Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
    Type: Grant
    Filed: May 11, 2011
    Date of Patent: November 13, 2012
    Assignee: International Business Machines Corporation
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, Puthukode G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
  • Patent number: 8301643
    Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
    Type: Grant
    Filed: May 11, 2011
    Date of Patent: October 30, 2012
    Assignee: International Business Machines Corporation
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P. G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
  • Publication number: 20110214010
    Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
    Type: Application
    Filed: May 11, 2011
    Publication date: September 1, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORP.
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P.G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
  • Publication number: 20110214009
    Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
    Type: Application
    Filed: May 11, 2011
    Publication date: September 1, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORP.
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P.G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
  • Patent number: 7953703
    Abstract: Near clones for a set of targeted computing systems are provided by evaluating different configurations of the targeted computing systems including lists of installed hardware components and installed software components; determining a subset of components in common among the different configurations; determining an initial pseudo-clone configuration including the subset of components and excluding components which are not in common among the different target hardware configurations; for each of the targeted computing systems, producing a finish-out workflow of installation steps and components to be installed into an incompletely configured computer system according to the pseudo-clone configuration to produce an operational clone system; and outputting the pseudo-clone configuration and the workflow to a provisioning management system for subsequent realization of a pseudo-clone backup computing system and further subsequent realization of one or more operational clone systems.
    Type: Grant
    Filed: February 17, 2005
    Date of Patent: May 31, 2011
    Assignee: International Business Machines Corporation
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P. G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
  • Publication number: 20090099942
    Abstract: A system for establishing and maintaining inventories of computing environment assets comprising one or more custom collector interfaces that detect movement of assets from one environment to another, and an inventory scanner which modifies inventories for each environment based on monitored asset movements. The present invention is of especial benefit to autonomic and on-demand computing architectures.
    Type: Application
    Filed: December 22, 2008
    Publication date: April 16, 2009
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P. G. Ramachandran, Lorin Evan Ullmann, John Whitfield
  • Patent number: 7499865
    Abstract: Environment asset inventories of computing environment assets are arranged into computing environments, and at least one collector interface is disposed between the environments to detect movement of an asset and to produce asset movement reports. Upon receipt of a movement report, one or more backup copies of a environment asset inventory are accessed, and compared a modified environment asset inventory. A history of each asset in each inventory is maintained. A history report regarding the life of an asset from first introduction into an environment throughout movements between environments is produced, including any applicable patches and upgrades configured into an environment. A discrepancy report is generated including assets, locations, status, and a revision level indicators.
    Type: Grant
    Filed: December 17, 2004
    Date of Patent: March 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, Puthukode G. Ramachandran, Lorin Evan Ullmann, John Whitfield
  • Publication number: 20060190775
    Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
    Type: Application
    Filed: February 17, 2005
    Publication date: August 24, 2006
    Applicant: International Business Machines Corporation
    Inventors: Vijay Aggarwal, Craig Lawton, Christopher Peters, P.G. Ramachandran, Lorin Ullmann, John Whitfield
  • Publication number: 20060178953
    Abstract: A system for establishing and maintaining inventories of computing environment assets comprising one or more custom collector interfaces that detect movement of assets from one environment to another, and an inventory scanner which modifies inventories for each environment based on monitored asset movements. The present invention is of especial benefit to autonomic and on-demand computing architectures.
    Type: Application
    Filed: December 17, 2004
    Publication date: August 10, 2006
    Applicant: International Business Machines Corporation
    Inventors: Vijay Aggarwal, Craig Lawton, Christopher Peters, P.G. Ramachandran, Lorin Ullmann, John Whitfield
  • Publication number: 20060136490
    Abstract: Workflows for execution by an autonomic provision management system to yield near clones and replacement systems for a set of targeted computing solutions are provided by determining a common denominator set of workflow steps among the workflows for the targeted computing systems, including workflows to morph a near clone to a specific targeted solution when executed a provisioning management system. Common portions of workflows are identified and archived as workflow templates for re-use in development of new workflows, thus virtualizing the process of subsequent workflow design which use the templates. Multi-level criteria-based searching is provided to workflow designers for finding and re-using existing workflows and workflow templates according to degree of matching common steps, quickest implementation, highest available, or other criteria.
    Type: Application
    Filed: December 17, 2004
    Publication date: June 22, 2006
    Applicant: International Business Machines Corporation
    Inventors: Vijay Aggarwal, Craig Lawton, Christopher Peters, P.G. Ramachandran, Lorin Ullmann, John Whitfield
  • Publication number: 20060106801
    Abstract: A method, computer program product and system for protecting the location of an installed middleware application. An installer program may generate a private/public key pair at build time of a middleware application. Upon the installer program installing the middleware application, the installation location of the middleware application may be encrypted using the generated private key and then discarding the private key. The encrypted installation location of the middleware application may be decrypted by a subsequent installer program upon receiving a public key from the developer of the middleware application. Since the public key was not shipped with the middleware application, an illegitimate program, such as a Trojan horse, may not be able to decrypt the installation location of the middleware application. Since the public key may only be obtained from the developer of the middleware application, only legitimate programs may be able to decrypt the location of the installed middleware application.
    Type: Application
    Filed: November 12, 2004
    Publication date: May 18, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Cox, Craig Lawton, Jonathan Lewis, Christopher Peters, Lorin Ullmann, Douglas Wood
  • Publication number: 20060106821
    Abstract: A method, computer program product and system for determining ownership of containers. An installer program may edit stored information, such as ownership, about software component(s) it installed in a container. Upon a subsequent installer program planning to install a software component in that container, software, referred to as a “collector,” may identify the owners of the software components stored in that container. The collector may then search the rules in a rules database to determine the ownership of the container based on the ownership of the software components in the container. By mapping the software components stored in a container with their respective owners, the ownership of a container may be determined.
    Type: Application
    Filed: November 12, 2004
    Publication date: May 18, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Cox, Craig Lawton, Jonathan Lewis, Christopher Peters, Lorin Ullmann
  • Publication number: 20060070061
    Abstract: A method, computer program product and system for allowing multiple decisions to be made by multiple decision makers during software installation. A developer of an installer program may select the decisions to be made during the installation process. The developer may further designate the decision makers to handle each of these decisions in a configuration file. The configuration file may be compiled into executable code where the executable code may be embedded in the installer program. By the developer designating multiple decision makers to handle multiple decisions, multiple decision makers may now be able to be involved during the software installation process.
    Type: Application
    Filed: September 30, 2004
    Publication date: March 30, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Cox, Craig Lawton, Jonathan Lewis, Christopher Peters, Lorin Ullmann