Patents by Inventor Fred Cummins
Fred Cummins has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140324492Abstract: A method, and corresponding hardware and software implementations, including receiving a client login from a client user; loading contextual information including at least one contextual parameter; determining a business process according to the contextual information; and executing the business process.Type: ApplicationFiled: July 8, 2014Publication date: October 30, 2014Inventor: Fred A. Cummins
-
Patent number: 8850593Abstract: In one implementation, encrypted data and a virtual machine are stored together as a virtual machine-data image, wherein the virtual machine is configured to EXERT management control over the data based on policies set by an owner of the data. In another implementation, metadata defining or tagging policies for usage of data is associated with the data. Control capabilities of service providers are mapped to the policies, wherein those service provider environments that best satisfy the controls mapped to the policies are identified.Type: GrantFiled: May 12, 2011Date of Patent: September 30, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Marc Brandt, Fred A. Cummins, Siani Pearson, Sharad Singhal
-
Patent number: 8775194Abstract: A method, and corresponding hardware and software implementations, including receiving a client login from a client user; loading contextual information including at least one contextual parameter; determining a business process according to the contextual information; and executing the business process.Type: GrantFiled: October 7, 2005Date of Patent: July 8, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventor: Fred A. Cummins
-
Patent number: 8559171Abstract: A docking station for a mini personal computer. The docking station formed of the shell of a laptop computer at which a user keyboard and a display screen are supported at the docking station. Additional elements, such as a computer hard drive or computer mass storage device are also supported at the docking station. When the mini personal computer is received at a docking port of the docking station, the processor of the mini personal computer is able to make use of the elements supported at the docking station.Type: GrantFiled: February 22, 2008Date of Patent: October 15, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventor: Fred A. Cummins
-
Publication number: 20120290850Abstract: In one implementation, encrypted data and a virtual machine are stored together as a virtual machine-data image, wherein the virtual machine is configured to EXERT management control over the data based on policies set by an owner of the data. In another implementation, metadata defining or tagging policies for usage of data is associated with the data. Control capabilities of service providers are mapped to the policies, wherein those service provider environments that best satisfy the controls mapped to the policies are identified.Type: ApplicationFiled: May 12, 2011Publication date: November 15, 2012Inventors: Marc Brandt, Fred A. Cummins, Siani Pearson, Sharad Singhal
-
Publication number: 20100031140Abstract: Systems, methods, and apparatus, including software tangibly stored on a computer readable medium, involve verifying an electronic document. A display document is generated based on a content document and a transformation document. The content document includes content data, and the transformation document includes format data. The display document includes information adapted to generate a graphical representation of the content data formatted according to the format data. A digital signature is generated using data from the content document and the transformation document. The digital signature is stored. The digital signature may be used, for example, to confirm that a signer has reviewed and/or endorsed a display document generated based on the content document and the transformation document.Type: ApplicationFiled: August 1, 2008Publication date: February 4, 2010Inventor: Fred A. Cummins
-
Publication number: 20100030604Abstract: Systems, methods, and apparatus, including software tangibly stored on a computer readable medium, involve executing a business process. A business rules repository that stores multiple business rules is maintained. Each business rule defines logic used in one or more business processes. A business process is identified, and the business process includes business operations and an identification of one or more business rules in the business rules repository. A business rule is retrieved from the business rules repository to a business process execution module based on the identification included in the business process. The retrieved business rule is executed using the business process execution module. One or more of the business operations is identified for execution based on a result of executing the retrieved business rule. The identified business operation is executed using the business process execution module.Type: ApplicationFiled: August 1, 2008Publication date: February 4, 2010Inventor: Fred A. Cummins
-
Publication number: 20090231801Abstract: A docking station for a mini personal computer. The docking station formed of the shell of a laptop computer at which a user keyboard and a display screen are supported at the docking station. Additional elements, such as a computer hard drive or computer mass storage device are also supported at the docking station. When the mini personal computer is received at a docking port of the docking station, the processor of the mini personal computer is able to make use of the elements supported at the docking station.Type: ApplicationFiled: February 22, 2008Publication date: September 17, 2009Applicant: ELECTRONIC DATA SYSTEMS CORPORATIONInventor: FRED A. CUMMINS
-
Patent number: 7562215Abstract: A method for providing document-level security for electronic documents comprises identifying a plurality of roles for the electronic document, the plurality of roles comprising at least one role associated with a first participant ID of a first client. The roles are dynamically stored in the electronic document. One or more participant IDs are dynamically stored in the electronic document, including at least the first participant ID, wherein each participant ID is associated with at least one role. A second participant ID of a second client is determined and the second client's ability to access the electronic document is automatically determined based, at least in part, on the second participant ID and the stored roles and participant IDs.Type: GrantFiled: May 21, 2003Date of Patent: July 14, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventor: Fred A. Cummins
-
Patent number: 7472421Abstract: The security risk associated with a computer system may be quantified by identifying a computer system, identifying a risk associated with the computer system, the risk relating to an event that may interrupt a normal operating mode of the computer system, determining a likelihood that the event associated with the risk will occur, determining a cost associated with the event occurring on the computer system, and quantifying the risk into an impact value by using the likelihood and the cost.Type: GrantFiled: September 30, 2002Date of Patent: December 30, 2008Assignee: Electronic Data Systems CorporationInventor: Fred A. Cummins
-
Publication number: 20080104092Abstract: A method for integrating business rules into automated business processes comprising identifying an entity affected by a data update initiated by a step of an automated business process. The method further comprises accessing a rule registry comprising a plurality of business rules, each business rule corresponding to one or more entities, and determining which business rules in the rule registry to evaluate by determining from the plurality of business rules one or more business rules that correspond to the entity affected by the data update. The method further comprises, for each of the business rules determined to correspond to the entity affected by the data update, evaluating the business rule in context to determine whether performing the data update would violate the business rule and, if it is determined that performing the data update would violate the business rule, raising an exception in accordance with the violated business rule.Type: ApplicationFiled: October 27, 2006Publication date: May 1, 2008Applicant: Electronic Data Systems CorporationInventor: Fred A. Cummins
-
Publication number: 20080021753Abstract: A method for service-oriented design, including performing a role analysis, performing a services synthesis, performing an organization design, and transformation planning to produce a service oriented transformation plan. Also included is a related data processing system and computer program product.Type: ApplicationFiled: July 7, 2006Publication date: January 24, 2008Applicant: Electronic Data Systems CorporationInventor: Fred A. Cummins
-
Publication number: 20070219861Abstract: A method, system, tool, and computer program product for modeling human motivation within an enterprise thereby allowing a manager to properly design or change organizational structure, select personnel for projects, select goals, and consider values and relationships to design incentives to properly motivate individuals in order to achieve enterprise objectives. In one embodiment, the tool includes structurally monitoring and quantifying the effect of at least one incentive on the achievement of a goal in at least a plurality of individuals within the enterprise. The method and system structurally monitor and quantify the effect of community values, personal incentives or relationships on the achievement of a goal in at least a plurality of similarly situated individuals within the enterprise, as well as the effect of dependence on supporting goals on the achievement of a goal in at least a plurality of individuals within the enterprise.Type: ApplicationFiled: March 20, 2006Publication date: September 20, 2007Inventor: Fred Cummins
-
Publication number: 20070083406Abstract: A method, and corresponding hardware and software implementations, including receiving a client login from a client user; loading contextual information including at least one contextual parameter; determining a business process according to the contextual information; and executing the business process.Type: ApplicationFiled: October 7, 2005Publication date: April 12, 2007Applicant: Electronic Data Systems CorporationInventor: Fred Cummins
-
Publication number: 20070050364Abstract: In certain embodiments, a method for implementing one or more business rules in an entity includes receiving a database operation corresponding to one or more database components of one or more operational databases and invoking, in response to receiving the database operation, a rule evaluation service. The rule evaluation service is operable to (1) determine one or more appropriate business rules to evaluate based on the database operation; (2) evaluate the one or more appropriate business rules to determine whether allowing the database operation to be performed will violate any of the one or more business rules; and (3) determine, if it is determined that allowing the database operation to be performed will violate one or more of the evaluated business rules, an appropriate action to initiate for handling the determined violation.Type: ApplicationFiled: September 1, 2005Publication date: March 1, 2007Inventor: Fred Cummins
-
Publication number: 20060156407Abstract: The security risk associated with a computer system may be quantified by identifying a computer system, identifying a risk associated with the computer system, the risk relating to an event that may interrupt a normal operating mode of the computer system, determining a likelihood that the event associated with the risk will occur, determining a cost associated with the event occurring on the computer system, and quantifying the risk into an impact value by using the likelihood and the cost.Type: ApplicationFiled: September 30, 2002Publication date: July 13, 2006Inventor: Fred Cummins
-
Publication number: 20050209832Abstract: A method for improving the development of embedded systems. A preferred process includes a taxonomy for embedded systems that serves as the unified communications standard for all development activities, a digital repository of historical solutions (frameworks), and an expert system to select/configure/generate the initial framework based on a knowledge-base (rules) of configuration best-practices and using an inference engine.Type: ApplicationFiled: February 3, 2005Publication date: September 22, 2005Applicant: Electronic Data Systems CorporationInventors: Kas Kasravi, Fred Cummins, Edwin Suckstorff, Michael Taljonick
-
Publication number: 20040237035Abstract: A method for providing document-level security for electronic documents comprises identifying a plurality of roles for the electronic document, the plurality of roles comprising at least one role associated with a first participant ID of a first client. The roles are dynamically stored in the electronic document. One or more participant IDs are dynamically stored in the electronic document, including at least the first participant ID, wherein each participant ID is associated with at least one role. A second participant ID of a second client is determined and the second client's ability to access the electronic document is automatically determined based, at least in part, on the second participant ID and the stored roles and participant IDs.Type: ApplicationFiled: May 21, 2003Publication date: November 25, 2004Inventor: Fred A. Cummins
-
Publication number: 20040083269Abstract: A system and method for sharing knowledge through adaptive electronic message distribution presents an electronic message topics menu on a web page associated with an electronic message system. The electronic message topic menu permits the user to select topics of interest. Upon the user's selecting the topics of interest from the electronic message topics menu, the system adds the user's electronic message address to electronic message distribution lists associated with the selected topic of interest. The system further monitors user actions relating to electronic message received from the electronic message distribution list to adapt the distribution of electronic message from distribution lists according to user-demonstrated interests.Type: ApplicationFiled: October 29, 2002Publication date: April 29, 2004Applicant: Electronic Data Systems CorporationInventor: Fred A. Cummins
-
Method and system for maintaining consistency of shared objects based upon instance variable locking
Patent number: 6289410Abstract: The invention comprises a method and system for maintaining the integrity of shared objects based upon instance variable locking. In accordance with the method of the invention, a locking tag is attached to an instance variable, indicating that the instance variable was read by a first process. Reads of the instance variable by a second process are allowed while the first locking tag is present. A second locking tag is attached to the instance variable, indicating that the instance variable was read by the second process.Type: GrantFiled: July 18, 1996Date of Patent: September 11, 2001Assignee: Electronic Data Systems CorporationInventor: Fred A. Cummins