Patents by Inventor Edmond Chow

Edmond Chow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9444786
    Abstract: An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy Validation Server Program (PVSP) that operates on a Policy Validation Server (PVS) connected to the WE by a secure communication link. The PVMP converts a workflow to a workflow representation (WR) and sends the WR to the PVS. The PVSP compares the steps in the WR to a security policy identified for that WR and determines whether the WR is in compliance. In addition, the PVSP validates a checksum for the WR and logs the checksum for subsequent comparisons. The PVSP uses the checksum to determine whether a policy has changed during execution of the workflow.
    Type: Grant
    Filed: May 23, 2012
    Date of Patent: September 13, 2016
    Assignee: ServiceNow, Inc.
    Inventors: Rhonda L. Childress, Edmond Chow, David Bruce Kumhyr, Stephen James Watt
  • Patent number: 8473966
    Abstract: An inter-processor communication approach is applicable to a message passing pattern called iterative exchange. In such patterns, two processors exchange messages, then perform a computation, and then this process is repeated. If two sets of send and receive buffers are used, then it is possible to guarantee that a receive buffer on the receiver's side is always available to receive the message. A message passing system controls which buffers are used for sending and receiving. These buffers are registered beforehand, thereby avoiding repeated registration at the time messages are sent. The sender is initially informed of all the possible receive buffers that the receiver will use, and the sender then uses these receive buffers alternately. Examples of this approach can avoid the use of multiple-step rendezvous protocols, memory copies, and memory registrations when a message needs to be sent.
    Type: Grant
    Filed: October 1, 2007
    Date of Patent: June 25, 2013
    Assignee: D.E. Shaw Research, LLC
    Inventor: Edmond Chow
  • Publication number: 20120240187
    Abstract: An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy Validation Server Program (PVSP) that operates on a Policy Validation Server (PVS) connected to the WE by a secure communication link. The PVMP converts a workflow to a workflow representation (WR) and sends the WR to the PVS. The PVSP compares the steps in the WR to a security policy identified for that WR and determines whether the WR is in compliance. In addition, the PVSP validates a checksum for the WR and logs the checksum for subsequent comparisons. The PVSP uses the checksum to determine whether a policy has changed during execution of the workflow.
    Type: Application
    Filed: May 23, 2012
    Publication date: September 20, 2012
    Applicant: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Edmond Chow, David Bruce Kumhyr, Stephen James Watt
  • Patent number: 8230042
    Abstract: An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy Validation Server Program (PVSP) that operates on a Policy Validation Server (PVS) connected to the WE by a secure communication link. The PVMP converts a workflow to a workflow representation (WR) and sends the WR to the PVS. The PVSP compares the steps in the WR to a security policy identified for that WR and determines whether the WR is in compliance. In addition, the PVSP validates a checksum for the WR and logs the checksum for subsequent comparisons. The PVSP uses the checksum to determine whether a policy has changed during execution of the workflow. If the WR is not in compliance, if the checksum cannot be validated, or if a policy has changed, then a failure notification is sent to the WE. Otherwise, a success notification is sent to the WR.
    Type: Grant
    Filed: April 19, 2005
    Date of Patent: July 24, 2012
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Edmond Chow, David Bruce Kumhyr, Stephen James Watt
  • Patent number: 7769807
    Abstract: An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy Validation Server Program (PVSP) that operates on a Policy Validation Server (PVS) connected to the WE by a secure communication link. The PVMP converts a workflow to a workflow representation (WR) and sends the WR to the PVS. The PVSP compares the steps in the WR to a security policy identified for that WR and determines whether the WR is in compliance. In addition, the PVSP validates a checksum for the WR and logs the checksum for subsequent comparisons. The PVSP uses the checksum to determine whether a policy has changed during execution of the workflow. If the WR is not in compliance, if the checksum cannot be validated, or if a policy has changed, then a failure notification is sent to the WE. Otherwise, a success notification is sent to the WR.
    Type: Grant
    Filed: July 18, 2008
    Date of Patent: August 3, 2010
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Edmond Chow, David Bruce Kumhyr, Stephen James Watt
  • Publication number: 20090019123
    Abstract: An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy Validation Server Program (PVSP) that operates on a Policy Validation Server (PVS) connected to the WE by a secure communication link. The PVMP converts a workflow to a workflow representation (WR) and sends the WR to the PVS. The PVSP compares the steps in the WR to a security policy identified for that WR and determines whether the WR is in compliance. In addition, the PVSP validates a checksum for the WR and logs the checksum for subsequent comparisons. The PVSP uses the checksum to determine whether a policy has changed during execution of the workflow. If the WR is not in compliance, if the checksum cannot be validated, or if a policy has changed, then a failure notification is sent to the WE. Otherwise, a success notification is sent to the WR.
    Type: Application
    Filed: July 18, 2008
    Publication date: January 15, 2009
    Inventors: Rhonda L Childress, Edmond Chow, David Bruce Kumhyr, Stephen James Watt
  • Publication number: 20080082988
    Abstract: An inter-processor communication approach is applicable to a message passing pattern called iterative exchange. In such patterns, two processors exchange messages, then perform a computation, and then this process is repeated. If two sets of send and receive buffers are used, then it is possible to guarantee that a receive buffer on the receiver's side is always available to receive the message. A message passing system controls which buffers are used for sending and receiving. These buffers are registered beforehand, thereby avoiding repeated registration at the time messages are sent. The sender is initially informed of all the possible receive buffers that the receiver will use, and the sender then uses these receive buffers alternately. Examples of this approach can avoid the use of multiple-step rendezvous protocols, memory copies, and memory registrations when a message needs to be sent.
    Type: Application
    Filed: October 1, 2007
    Publication date: April 3, 2008
    Applicant: D. E. Shaw Research, LLC
    Inventor: Edmond Chow
  • Publication number: 20070100680
    Abstract: The invention, referred to herein as PeaCoCk, uses a unique blend of technologies from statistics, information theory, and graph theory to quantify and discover patterns in relationships between entities, such as products and customers, as evidenced by purchase behavior. In contrast to traditional purchase-frequency based market basket analysis techniques, such as association rules which mostly generate obvious and spurious associations, PeaCoCk employs information-theoretic notions of consistency and similarity, which allows robust statistical analysis of the true, statistically significant, and logical associations between products. Therefore, PeaCoCk lends itself to reliable, robust predictive analytics based on purchase-behavior.
    Type: Application
    Filed: October 21, 2005
    Publication date: May 3, 2007
    Inventors: Shailesh Kumar, Edmond Chow, Michinari Momma
  • Publication number: 20070094067
    Abstract: The invention, referred to herein as PeaCoCk, uses a unique blend of technologies from statistics, information theory, and graph theory to quantify and discover patterns in relationships between entities, such as products and customers, as evidenced by purchase behavior. In contrast to traditional purchase-frequency based market basket analysis techniques, such as association rules which mostly generate obvious and spurious associations, PeaCoCk employs information-theoretic notions of consistency and similarity, which allows robust statistical analysis of the true, statistically significant, and logical associations between products. Therefore, PeaCoCk lends itself to reliable, robust predictive analytics based on purchase-behavior.
    Type: Application
    Filed: February 15, 2006
    Publication date: April 26, 2007
    Inventors: Shailesh Kumar, Edmond Chow, Michinari Momma
  • Publication number: 20070094066
    Abstract: The invention, referred to herein as PeaCoCk, uses a unique blend of technologies from statistics, information theory, and graph theory to quantify and discover patterns in relationships between entities, such as products and customers, as evidenced by purchase behavior. In contrast to traditional purchase-frequency based market basket analysis techniques, such as association rules which mostly generate obvious and spurious associations, PeaCoCk employs information-theoretic notions of consistency and similarity, which allows robust statistical analysis of the true, statistically significant, and logical associations between products. Therefore, PeaCoCk lends itself to reliable, robust predictive analytics based on purchase-behavior.
    Type: Application
    Filed: January 6, 2006
    Publication date: April 26, 2007
    Inventors: Shailesh Kumar, Edmond Chow, Michinari Momma
  • Publication number: 20060235964
    Abstract: An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy Validation Server Program (PVSP) that operates on a Policy Validation Server (PVS) connected to the WE by a secure communication link. The PVMP converts a workflow to a workflow representation (WR) and sends the WR to the PVS. The PVSP compares the steps in the WR to a security policy identified for that WR and determines whether the WR is in compliance. In addition, the PVSP validates a checksum for the WR and logs the checksum for subsequent comparisons. The PVSP uses the checksum to determine whether a policy has changed during execution of the workflow. If the WR is not in compliance, if the checksum cannot be validated, or if a policy has changed, then a failure notification is sent to the WE. Otherwise, a success notification is sent to the WR.
    Type: Application
    Filed: April 19, 2005
    Publication date: October 19, 2006
    Inventors: Rhonda Childress, Edmond Chow, Stephen Watt, David Kumhyr