Patents by Inventor John C. Strassner
John C. Strassner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9059986Abstract: While facilitating (101) a call session for a participating entity having at least one federation-based benefit, one then uses (102) that at least one federation-based benefit to facilitate communications mobility for the participating entity during the call session. Such a call session can comprise, for example and at least in part, a wireless call session. The federation-based benefit itself can be one provided by a content provider, a services provider, or the like.Type: GrantFiled: March 31, 2008Date of Patent: June 16, 2015Assignee: Motorola Solutions, Inc.Inventors: Samir Dilipkumar Saklikar, Subir Saha, John C. Strassner
-
Patent number: 8484693Abstract: A method and computer program product for detecting a policy conflict in a managed system includes examining a plurality of policy rules for overlapping policy targets, in response to finding no overlapping policy targets, reporting that the policy rules do not conflict, and in response to finding overlapping policy targets, examining the plurality of policy rules for at least two rules having a same condition and a same event, and, in response to not finding at least two rules having a same condition and a same event, reporting that the policy rules do not conflict.Type: GrantFiled: April 27, 2007Date of Patent: July 9, 2013Inventors: Gregory W. Cox, David L. Raymer, John C. Strassner
-
Patent number: 8327414Abstract: A method and system for managing a policy includes, in response to determining the presence of a conflict, determining a semantic equivalence between a component of a policy rule and at least one additional policy rule. The determining a semantic equivalence is performed by using a semantic reasoning algorithm that includes the steps of determining a first policy target of a first policy rule and a second policy target of a second policy rule, determining a meaning of the first policy target and a meaning of the second policy rule, assigning a confidence value based on the determined meaning of the first policy, assigning a confidence value based on the determined meaning of the second policy, performing a semantic comparison between the first policy target and the second policy target, and determining, based at least in part on the semantic comparison, the presence of a conflict between the first and second policy targets.Type: GrantFiled: June 21, 2007Date of Patent: December 4, 2012Assignee: Motorola Solutions, Inc.Inventors: John C. Strassner, Gregory W. Cox
-
Patent number: 8078553Abstract: A system, method, and information processing system manage a network. At least one contract including one or more components is received at a network that uses a component based architecture. A first operation (422) in the set of operations associated with the contract (114) is mapped to a policy rule event (424) associated with at least one policy rule (116). A second operation (426) in the set of operations associated with the contract (114) is mapped to at least one policy rule condition (428) associated with the policy rule (116). A third operation (430) in the set of operations associated with the contract (116) is mapped to a policy rule action (432) associated with the policy rule (116). A fourth operation (440) in the set of operations associated with the contract (116) is mapped to a policy rule condition (442) associated with the other policy rule (420).Type: GrantFiled: June 27, 2008Date of Patent: December 13, 2011Assignee: Motorola Mobility, Inc.Inventors: John C. Strassner, Gregory W. Cox, David L. Raymer, Jr.
-
Patent number: 8019838Abstract: A system, method, and information processing system for managing a configuration of a network device. A current state associated with at least one network device (104) is determined (206). A set of commands (118) available for the current state of the network device (104) is retrieved (208). A next state associated with a current command is determined (216) for each command in the set of commands (118). A transition from the current state to the next state is created (218, 222) in response to determining a next state associated with a current command. A transition is determined to have been created for each command in the set of commands (118). An extended finite state machine (120) is created that includes at least the current state, the next state, and the transition for each of the commands in the set of commands (118).Type: GrantFiled: May 21, 2008Date of Patent: September 13, 2011Assignee: Motorola Solutions, Inc.Inventors: Michael Zhihe Z Jiang, Yan Liu, John C. Strassner, Jing Zhang
-
Publication number: 20110103265Abstract: While facilitating (101) a call session for a participating entity having at least one federation-based benefit, one then uses (102) that at least one federation-based benefit to facilitate communications mobility for the participating entity during the call session. Such a call session can comprise, for example and at least in part, a wireless call session. The federation-based benefit itself can be one provided by a content provider, a services provider, or the like.Type: ApplicationFiled: March 31, 2008Publication date: May 5, 2011Applicant: MOTOROLA, INC.Inventors: Samir Dilipkumar Saklikar, Subir Saha, John C. Strassner
-
Publication number: 20100011027Abstract: A system, method, and information processing system manage policy rules. A first unique identifier (121) associated with a first policy rule (120) is compared to at least a second unique identifier (130) associated with a second policy rule (202) in a set of policy rules (128). The first policy rule (120) and each policy rule in the set of policy rules (128) are associated with at least one common characteristic. The set of policy rules (128) are updated to include the policy rule (120) in response to the first unique identifier (121) failing to substantially match the at least second unique identifier (130). A notification (422) indicating a potential policy rule conflict exits between the policy rule (120) and the set of policy rules (128) is generated in response to the first unique identifier (121) substantially matching the at least second unique identifier (130).Type: ApplicationFiled: July 11, 2008Publication date: January 14, 2010Applicant: Motorola, Inc.Inventors: GREGORY W. COX, David L. RAYMER, JR., John C. STRASSNER, Steven DAVY
-
Publication number: 20090328133Abstract: A method, information processing system, and system manage network entities. At least a portion of at least one information model (120) for a first managed entity (104) and at least a second managed entity (106) is accessed. The portion of the at least one information model (120) includes a set of capabilities (542) associated with the first managed entity (104) and second managed entity (106), respectively. A first set of capabilities (708) supported by the first managed entity (104) and a second set of capabilities (710) supported by the second managed entity (106) are identified based on the portion of the at least one information model (120). A set of common capabilities (712) from the first set of capabilities (708) and the second set of capabilities (710) that is supported by both of the first managed entity (104) and the second managed entity (106) is determined.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: Motorola, Inc.Inventors: John C. Strassner, Gregory W. Cox, Zhi Fu, Yan Liu, David L. Raymer, JR.
-
Publication number: 20090327172Abstract: A method, information processing system, and network select machine learning algorithms for managing autonomous operations of network elements. A state (404) of at least one problem (406) and at least one context associated with the problem are received as input. A machine learning algorithm (118) is selected (410) based on the problem and context of the problem that have been received. The machine learning algorithm (118) that has been selected is outputted to an autonomic controller.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: Motorola, Inc.Inventors: Yan Liu, Michael Zhihe Z. Jiang, John C. Strassner, Jing Zhang
-
Publication number: 20090328188Abstract: A method, information processing system, and network limit access to an electronically available information asset. A request (304) from a source (204) to exchange an electronically available information asset with at least one destination (206) is received. An identity (306) associated with the source (204) and the destination (206) is established. A semantically augmented context (226) is generated. The semantically augmented context is information used to identify a meaning and a behavior of the context (226). The request is analyzed relative to the semantically augmented context (226) for determining whether the request is to be one of allowed and denied. The source (204) is allowed to exchange the electronically available information asset with the destination (206) when the request is determined to be allowed. The source (204) is prevented from exchanging the electronically available information asset with the destination (206) when the request is determined to be denied.Type: ApplicationFiled: May 1, 2008Publication date: December 31, 2009Applicant: Motorola, Inc.Inventors: David L. RAYMER, Barry MENICH, John C. STRASSNER
-
Publication number: 20090327179Abstract: A system, method, and information processing system manage a network. At least one contract including one or more components is received at a network that uses a component based architecture. A first operation (422) in the set of operations associated with the contract (114) is mapped to a policy rule event (424) associated with at least one policy rule (116). A second operation (426) in the set of operations associated with the contract (114) is mapped to at least one policy rule condition (428) associated with the policy rule (116). A third operation (430) in the set of operations associated with the contract (116) is mapped to a policy rule action (432) associated with the policy rule (116). A fourth operation (440) in the set of operations associated with the contract (116) is mapped to a policy rule condition (442) associated with the other policy rule (420).Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: Motorola, Inc.Inventors: John C. Strassner, Gregory W. Cox, David L. Raymer, JR.
-
Publication number: 20090300618Abstract: Determine (101) a particular task to be autonomously facilitated in cooperation with another entity that also has autonomous task facilitation capabilities and then identify (102) particular supportable task facilitation objects as correspond to the particular task to be facilitated. Then identify (103) particular supportable candidate capabilities as correspond to at least some of the particular supportable task facilitation objects followed by then determining (104), for at least some of the particular supportable candidate capabilities, a corresponding relative preference metric to provide a metricized preferences-and-cap abilities matrix as corresponds to the particular task and this particular apparatus. This metricized preferences-and-capabilities matrix can then be used (105) to negotiate a particular selection of capabilities to be employed in cooperation with the another entity when facilitating this particular task.Type: ApplicationFiled: June 3, 2008Publication date: December 3, 2009Applicant: MOTOROLA, INC.Inventors: Zhi Fu, John C. Strassner
-
Publication number: 20090292793Abstract: A system, method, and information processing system for managing a configuration of a network device. A current state associated with at least one network device (104) is determined (206). A set of commands (118) available for the current state of the network device (104) is retrieved (208). A next state associated with a current command is determined (216) for each command in the set of commands (118). A transition from the current state to the next state is created (218, 222) in response to determining a next state associated with a current command. A transition is determined to have been created for each command in the set of commands (118). An extended finite state machine (120) is created that includes at least the current state, the next state, and the transition for each of the commands in the set of commands (118).Type: ApplicationFiled: May 21, 2008Publication date: November 26, 2009Applicant: Motorola, Inc.Inventors: Michael Zhihe Jiang, Yan Liu, John C. Strassner, Jing Zhang
-
Publication number: 20090164499Abstract: A method and information processing system manage policy elements in an information processing system. At least one policy element (110) from a plurality of policy elements stored in at least one policy repository (108) is retrieved. The plurality of policy elements includes at least one of a plurality of reusable policy rules (110), a plurality of reusable policy rule components (118, 120, 122), a plurality of reusable policy rule templates, and a plurality of and policy rule component templates. A new reusable policy element is created from at least one of the policy element (110) that has been retrieved and a default policy element. The new reusable policy element is stored in the at least one policy repository (108). A reusable policy element is queried using metadata (224) associated with the reusable policy element.Type: ApplicationFiled: December 20, 2007Publication date: June 25, 2009Applicant: Motorola, Inc.Inventors: Srinivasa C. Samudrala, Gregory W. Cox, John C. Strassner
-
Publication number: 20090165078Abstract: A method for modifying policy elements is disclosed. At least one reusable policy element (110) is retrieved from at least one repository (108). The reusable policy element (110) includes at least one of a reusable policy rule (110), a reusable policy rule component (118, 120, 122), a reusable policy rule template, and a reusable policy rule component templates. The reusable policy element (110) is modified by one of editing the reusable policy element (110), and deleting the reusable policy element (110).Type: ApplicationFiled: December 20, 2007Publication date: June 25, 2009Applicant: Motorola, Inc.Inventors: SRINIVASA C. SAMUDRALA, Gregory W. Cox, John C. Strassner
-
Patent number: 7542956Abstract: The disparate data and commands from are received from a managed resource (102) and have potentially different semantics. The disparate data and commands are processed according to rules received from an autonomic manager (112) to produce a single normalized view of this information. The actual state of the managed resource is determined from the normalized view of disparate data. The actual state of the managed resource (102) is compared to a desired state of the managed resource (102). When a match does not exist between the actual state and the desired state, a configuration adjustment to the managed resource (102) and/or another resource is determined to allow the actual state to be the same as the desired state. Then, the configuration adjustment is applied to the managed resource (102). When a match exists between the actual state and the desired state, maintenance functions associated with the managed resource (102) are performed.Type: GrantFiled: June 7, 2006Date of Patent: June 2, 2009Assignee: Motorola, Inc.Inventors: John C. Strassner, Barry J. Menich
-
Publication number: 20080320550Abstract: A method and system for managing a policy includes, in response to determining the presence of a conflict, determining a semantic equivalence between a component of a policy rule and at least one additional policy rule. The determining a semantic equivalence is performed by using a semantic reasoning algorithm that includes the steps of determining a first policy target of a first policy rule and a second policy target of a second policy rule, determining a meaning of the first policy target and a meaning of the second policy rule, assigning a confidence value based on the determined meaning of the first policy, assigning a confidence value based on the determined meaning of the second policy, performing a semantic comparison between the first policy target and the second policy target, and determining, based at least in part on the semantic comparison, the presence of a conflict between the first and second policy targets.Type: ApplicationFiled: June 21, 2007Publication date: December 25, 2008Applicant: Motorola, Inc.Inventors: John C. STRASSNER, Gregory W. COX
-
Publication number: 20080271111Abstract: A method and computer program product for detecting a policy conflict in a managed system includes examining a plurality of policy rules for overlapping policy targets, in response to finding no overlapping policy targets, reporting that the policy rules do not conflict, and in response to finding overlapping policy targets, examining the plurality of policy rules for at least two rules having a same condition and a same event, and, in response to not finding at least two rules having a same condition and a same event, reporting that the policy rules do not conflict.Type: ApplicationFiled: April 27, 2007Publication date: October 30, 2008Applicant: Motorola, Inc.Inventors: Gregory W. Cox, David L. Raymer, John C. Strassner
-
Publication number: 20080271022Abstract: A method and system are disclosed for changing the structure of one or more policies and/or the order of application of one or more policies to resolve conflicts among a set of policies using graph-theoretic techniques. Policies are used to govern the states of managed entities (e.g., resources and services). The set of states of the set of managed entities are represented as nodes of a graph. The output of the set of applicable policies governing all or part of the nodes is then used to control the transition between some or all nodes in the graph.Type: ApplicationFiled: April 27, 2007Publication date: October 30, 2008Applicant: Motorola, Inc.Inventors: John C. Strassner, David L. Raymer
-
Publication number: 20080161941Abstract: A method and a device for managing state changes (Init, Run, Suspend, Resume, End) of a managed entity (302) includes a memory (906) and a processor (904) adapted to represent each state change of a managed entity (302) as a separate node (1-5) in a graph (300), represent a state transition as an edge (Eij) connecting a first node with a first state value to a second node with a second state value, and determine a cost (C) of each edge (Eij) that is part of a set of edges (E) that form at least two paths connecting the first node and the second by applying at least one policy (P) to each edge (Eij), the first and second nodes representing an initial and a final state change of the managed entity (302).Type: ApplicationFiled: December 29, 2006Publication date: July 3, 2008Applicant: Motorola, Inc.Inventors: John C. Strassner, David L. Raymer