Patents by Inventor Dominic J. Storey
Dominic J. Storey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11032360Abstract: An integration flow is monitored to determine a processing location of a message. The integration flow includes a route, one or more nodes, and one or more secure connectors. A first message is received by the integration flow. A central processing unit serialization load is received including a serialization of the first message on a first secure connector and a deserialization of the first message on a second secure connector. A processing load of the first message running on a first node of the one or more nodes is received. A first threshold of a processing load of the first message is received. The first threshold is determined to have been reached. Based on the first threshold being reached, a processing location of the integration flow is altered such that the first message is processed on a second node of the one or more nodes.Type: GrantFiled: July 30, 2019Date of Patent: June 8, 2021Assignee: International Business Machines CorporationInventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 11016659Abstract: A tap associated with an active area on a user interface of a touchscreen device is received at a first time. The active area is associated with an origination time. It is determined that a period of time between the origination time and the first time is within a specified period of time. In response to the determining, an action associated with the active area is not performed.Type: GrantFiled: October 4, 2019Date of Patent: May 25, 2021Assignee: International Business Machines CorporationInventors: Caroline Church, Mark P. Frost, Dominic J. Storey, John F. Wesley, Lakshman S. B. Yatawara
-
Patent number: 10929554Abstract: A method and system for handling sensitive data required by an application in a secure computer system. The secure computer system transforms sensitive data in a request message from a data format required by the application into a data format required by a service in an external computer system. The secure computer system tokenizes the sensitive data by replacing the sensitive data with tokenized data and stores a mapping between the sensitive data and the tokenized data in the secure computer system. The secure computer system sends the request message to an external computer system and receives, from the external computer system, a response message that includes annotations for the tokenized data with transform instructions for transforming the transformed sensitive data from the data format required by the service into the data format required by the application. The secure computer system replaces the tokenized data with the sensitive data.Type: GrantFiled: June 13, 2019Date of Patent: February 23, 2021Assignee: International Business Machines CorporationInventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10922428Abstract: A method and system for handling sensitive data required by an application in a secure computer system. An external computer system that is external to the secure computer system receives a transformed request message that includes one or more data aspects having tokenized data that has replaced transformed sensitive data after sensitive data in the one or more aspects had been transformed from a data format required by a service in the external computer system into a data format required by the application. The external computer system generates a response message from the transformed request message by including, in the response message, annotations with transform instructions for transforming the transformed sensitive data, from the data format required by the service into the data format required by the application, after the tokenized data has been replaced by the transformed sensitive data in the one or more data aspects.Type: GrantFiled: June 13, 2019Date of Patent: February 16, 2021Assignee: International Business Machines CorporationInventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10901751Abstract: Systems and methods for building images used in software containers are disclosed. A computer-implemented method includes: receiving, at a host computer, plural commands defined in a build file; determining, by the host computer, one of the plural commands is indicated as a temporal layer; building, by the host computer, an image including respective layers corresponding to respective ones of the plural commands; deleting from the image, by the host computer, one of the respective layers corresponding to the one of the plural commands indicated as the temporal layer; and pushing, by the host computer, the image to a registry.Type: GrantFiled: May 17, 2018Date of Patent: January 26, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Martin A. Ross, Jack Evans, Robert M. Convery, Dominic J. Storey
-
Patent number: 10834059Abstract: A method and system for secure message handling of an application across deployment locations. The application is analyzed to identify processing nodes referencing one or more data aspects having deployment constraints on locations in which aspect data in the one or more data aspects may be deployed. It is ascertained whether the one or more data aspects are accessed by an identified processing node of the application. If so, a restriction is determined for the identified processing node based on deployment constraints included in the accessed one or more data aspects and the identified processing node is deployed according to the determined restriction for the identified processing node. If not, the identified processing node or a preceding processing node is marked to indicate a required tokenization of the one or more data aspects, wherein the tokenization removes the deployment constraints for the identified processing node.Type: GrantFiled: November 5, 2018Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10608915Abstract: Providing dynamic latency in an integration flow. An integration flow connecting multiple integration nodes and including at least one repeat node is managed, wherein a repeat node repeats by sending a message, a variation of a message, or an element of a message to multiple paths or to a single path multiple times. A repeat node is registered with a workload manager component for monitoring. Data relating to the effect on performance by the integration flow including the monitored repeat node is collected. Required latencies or variations of latencies between firing of repeats of the repeat node based on the collected data are determined. The latencies or variations of latencies between firing of the repeats of the repeat node are instructed to influence dynamically a flow of elements through the repeat node.Type: GrantFiled: January 16, 2019Date of Patent: March 31, 2020Assignee: International Business Machine CorporationInventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10601871Abstract: Method and system are provided for reconfiguration of security requirements for deployed components of applications. The method includes referencing a deployed application wherein the application is divided into processing components, which can be deployed in different locations. The method adds one or more application resources for the deployed application to a central repository with references to the processing components of the deployed application utilizing the resources. The method further involves: receiving an update to an application resource to modify a security requirement for the resource; checking the deployment locations of the processing components of deployed applications referenced to the updated application resource to ensure the processing components conform to the modified security requirement; and taking an action for each referenced processing component of the deployed application that does not conform to the modified security requirement.Type: GrantFiled: January 18, 2017Date of Patent: March 24, 2020Assignee: International Business Machines CorporationInventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10552035Abstract: A tap associated with an active area on a user interface of a touchscreen device is received at a first time. The active area is associated with an origination time. It is determined that a period of time between the origination time and the first time is within a specified period of time. In response to the determining, an action associated with the active area is not performed.Type: GrantFiled: June 13, 2018Date of Patent: February 4, 2020Assignee: International Business Machines CorporationInventors: Caroline Church, Mark P. Frost, Dominic J. Storey, John F. Wesley, Lakshman S. B. Yatawara
-
Publication number: 20200034035Abstract: A tap associated with an active area on a user interface of a touchscreen device is received at a first time. The active area is associated with an origination time. It is determined that a period of time between the origination time and the first time is within a specified period of time. In response to the determining, an action associated with the active area is not performed.Type: ApplicationFiled: October 4, 2019Publication date: January 30, 2020Inventors: Caroline Church, Mark P. Frost, Dominic J. Storey, John F. Wesley, Lakshman S.B. Yatawara
-
Publication number: 20190356734Abstract: An integration flow is monitored to determine a processing location of a message. The integration flow includes a route, one or more nodes, and one or more secure connectors. A first message is received by the integration flow. A central processing unit serialization load is received including a serialization of the first message on a first secure connector and a deserialization of the first message on a second secure connector. A processing load of the first message running on a first node of the one or more nodes is received. A first threshold of a processing load of the first message is received. The first threshold is determined to have been reached. Based on the first threshold being reached, a processing location of the integration flow is altered such that the first message is processed on a second node of the one or more nodes.Type: ApplicationFiled: July 30, 2019Publication date: November 21, 2019Inventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Publication number: 20190354382Abstract: Systems and methods for building images used in software containers are disclosed. A computer-implemented method includes: receiving, at a host computer, plural commands defined in a build file; determining, by the host computer, one of the plural commands is indicated as a temporal layer; building, by the host computer, an image including respective layers corresponding to respective ones of the plural commands; deleting from the image, by the host computer, one of the respective layers corresponding to the one of the plural commands indicated as the temporal layer; and pushing, by the host computer, the image to a registry.Type: ApplicationFiled: May 17, 2018Publication date: November 21, 2019Inventors: Martin A. Ross, Jack Evans, Robert M. Convery, Dominic J. Storey
-
Patent number: 10432707Abstract: An integration flow is monitored to determine a processing location of a message. The integration flow includes a route, one or more nodes, and one or more secure connectors. A first message is received by the integration flow. A central processing unit serialization load is received including a serialization of the first message on a first secure connector and a deserialization of the first message on a second secure connector. A processing load of the first message running on a first node of the one or more nodes is received. A first threshold of a processing load of the first message is received. The first threshold is determined to have been reached. Based on the first threshold being reached, a processing location of the integration flow is altered such that the first message is processed on a second node of the one or more nodes.Type: GrantFiled: March 2, 2016Date of Patent: October 1, 2019Assignee: International Business Machines CorporationInventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Publication number: 20190294813Abstract: A method and system for handling sensitive data required by an application in a secure computer system. An external computer system that is external to the secure computer system receives a transformed request message that includes one or more data aspects having tokenized data that has replaced transformed sensitive data after sensitive data in the one or more aspects had been transformed from a data format required by a service in the external computer system into a data format required by the application. The external computer system generates a response message from the transformed request message by including, in the response message, annotations with transform instructions for transforming the transformed sensitive data, from the data format required by the service into the data format required by the application, after the tokenized data has been replaced by the transformed sensitive data in the one or more data aspects.Type: ApplicationFiled: June 13, 2019Publication date: September 26, 2019Inventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Publication number: 20190294812Abstract: A method and system for handling sensitive data required by an application in a secure computer system. The secure computer system transforms sensitive data in a request message from a data format required by the application into a data format required by a service in an external computer system. The secure computer system tokenizes the sensitive data by replacing the sensitive data with tokenized data and stores a mapping between the sensitive data and the tokenized data in the secure computer system. The secure computer system sends the request message to an external computer system and receives, from the external computer system, a response message that includes annotations for the tokenized data with transform instructions for transforming the transformed sensitive data from the data format required by the service into the data format required by the application. The secure computer system replaces the tokenized data with the sensitive data.Type: ApplicationFiled: June 13, 2019Publication date: September 26, 2019Inventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10387670Abstract: Methods and associated data processing system for handling sensitive data required by an application in a secure computer system. The secure computer identifies sensitive data in one or more data aspects of a request message. The secure computer system tokenizes the sensitive data in the one or more data aspects by replacing the sensitive data with tokenized data and stores a mapping between the sensitive data and the tokenized data in the secure computer system. The secure computer system sends the request message to an external computer system. After the request message is sent to the external computer system, the secure computer system receives a response message from the external computer system. The response message includes annotations for the tokenized data with transform instructions for the tokenized data. The secure computer system replaces the tokenized data with the sensitive data and performs the transform instructions on the sensitive data.Type: GrantFiled: September 21, 2016Date of Patent: August 20, 2019Assignee: International Business Machines CorporationInventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Publication number: 20190166028Abstract: Providing dynamic latency in an integration flow. An integration flow connecting multiple integration nodes and including at least one repeat node is managed, wherein a repeat node repeats by sending a message, a variation of a message, or an element of a message to multiple paths or to a single path multiple times. A repeat node is registered with a workload manager component for monitoring. Data relating to the effect on performance by the integration flow including the monitored repeat node is collected. Required latencies or variations of latencies between firing of repeats of the repeat node based on the collected data are determined. The latencies or variations of latencies between firing of the repeats of the repeat node are instructed to influence dynamically a flow of elements through the repeat node.Type: ApplicationFiled: January 16, 2019Publication date: May 30, 2019Inventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10277489Abstract: Providing dynamic latency in an integration flow. An integration flow connecting multiple integration nodes and including at least one repeat node is managed, wherein a repeat node repeats by sending a message, a variation of a message, or an element of a message to multiple paths or to a single path multiple times. A repeat node is registered with a workload manager component for monitoring. Data relating to the effect on performance by the integration flow including the monitored repeat node is collected. Required latencies or variations of latencies between firing of repeats of the repeat node based on the collected data are determined. The latencies or variations of latencies between firing of the repeats of the repeat node are instructed to influence dynamically a flow of elements through the repeat node.Type: GrantFiled: September 20, 2018Date of Patent: April 30, 2019Assignee: International Business Machines CorporationInventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Publication number: 20190075086Abstract: A method and system for secure message handling of an application across deployment locations. The application is analyzed to identify processing nodes referencing one or more data aspects having deployment constraints on locations in which aspect data in the one or more data aspects may be deployed. It is ascertained whether the one or more data aspects are accessed by an identified processing node of the application. If so, a restriction is determined for the identified processing node based on deployment constraints included in the accessed one or more data aspects and the identified processing node is deployed according to the determined restriction for the identified processing node. If not, the identified processing node or a preceding processing node is marked to indicate a required tokenization of the one or more data aspects, wherein the tokenization removes the deployment constraints for the identified processing node.Type: ApplicationFiled: November 5, 2018Publication date: March 7, 2019Inventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Publication number: 20190020560Abstract: Providing dynamic latency in an integration flow. An integration flow connecting multiple integration nodes and including at least one repeat node is managed, wherein a repeat node repeats by sending a message, a variation of a message, or an element of a message to multiple paths or to a single path multiple times. A repeat node is registered with a workload manager component for monitoring. Data relating to the effect on performance by the integration flow including the monitored repeat node is collected. Required latencies or variations of latencies between firing of repeats of the repeat node based on the collected data are determined. The latencies or variations of latencies between firing of the repeats of the repeat node are instructed to influence dynamically a flow of elements through the repeat node.Type: ApplicationFiled: September 20, 2018Publication date: January 17, 2019Inventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey