Patents by Inventor John Hosie
John Hosie has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230315396Abstract: An integration flow can be improved with the use of a pattern identified from a pattern library. The identified pattern can include a snippet of nodes which are functionally equivalent to a subset of nodes in the integration flow. The pattern also lists an endpoint capable of performing the snippet of nodes. The integration flow can therefore be updated to cause the endpoint to perform the snippet of nodes.Type: ApplicationFiled: March 29, 2022Publication date: October 5, 2023Inventors: Chengxuan Xing, John Anthony Reeve, John Hosie, Benjamin Graham Thompson
-
Patent number: 11487602Abstract: A computer-implemented method for a multi-tenant integration environment includes, in response to an error occurring during a state of execution of an integration flow, generating error data for the error. The method further includes associating the generated error data with the error. The method further includes storing the generated error data in a data storage component. The generated error data includes (i) error state information corresponding to the state of execution of the integration flow and (ii) target state information corresponding to a target state of execution of the integration flow.Type: GrantFiled: March 15, 2021Date of Patent: November 1, 2022Assignee: International Business Machines CorporationInventors: John Anthony Reeve, Benjamin Graham Thompson, John Hosie, Alasdair John Paton
-
Publication number: 20220291987Abstract: A computer-implemented method for a multi-tenant integration environment includes, in response to an error occurring during a state of execution of an integration flow, generating error data for the error. The method further includes associating the generated error data with the error. The method further includes storing the generated error data in a data storage component. The generated error data includes (i) error state information corresponding to the state of execution of the integration flow and (ii) target state information corresponding to a target state of execution of the integration flow.Type: ApplicationFiled: March 15, 2021Publication date: September 15, 2022Inventors: John Anthony Reeve, Benjamin Graham Thompson, John Hosie, Alasdair John Paton
-
Patent number: 11032360Abstract: An integration flow is monitored to determine a processing location of a message. The integration flow includes a route, one or more nodes, and one or more secure connectors. A first message is received by the integration flow. A central processing unit serialization load is received including a serialization of the first message on a first secure connector and a deserialization of the first message on a second secure connector. A processing load of the first message running on a first node of the one or more nodes is received. A first threshold of a processing load of the first message is received. The first threshold is determined to have been reached. Based on the first threshold being reached, a processing location of the integration flow is altered such that the first message is processed on a second node of the one or more nodes.Type: GrantFiled: July 30, 2019Date of Patent: June 8, 2021Assignee: International Business Machines CorporationInventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10929554Abstract: A method and system for handling sensitive data required by an application in a secure computer system. The secure computer system transforms sensitive data in a request message from a data format required by the application into a data format required by a service in an external computer system. The secure computer system tokenizes the sensitive data by replacing the sensitive data with tokenized data and stores a mapping between the sensitive data and the tokenized data in the secure computer system. The secure computer system sends the request message to an external computer system and receives, from the external computer system, a response message that includes annotations for the tokenized data with transform instructions for transforming the transformed sensitive data from the data format required by the service into the data format required by the application. The secure computer system replaces the tokenized data with the sensitive data.Type: GrantFiled: June 13, 2019Date of Patent: February 23, 2021Assignee: International Business Machines CorporationInventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10922428Abstract: A method and system for handling sensitive data required by an application in a secure computer system. An external computer system that is external to the secure computer system receives a transformed request message that includes one or more data aspects having tokenized data that has replaced transformed sensitive data after sensitive data in the one or more aspects had been transformed from a data format required by a service in the external computer system into a data format required by the application. The external computer system generates a response message from the transformed request message by including, in the response message, annotations with transform instructions for transforming the transformed sensitive data, from the data format required by the service into the data format required by the application, after the tokenized data has been replaced by the transformed sensitive data in the one or more data aspects.Type: GrantFiled: June 13, 2019Date of Patent: February 16, 2021Assignee: International Business Machines CorporationInventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10834059Abstract: A method and system for secure message handling of an application across deployment locations. The application is analyzed to identify processing nodes referencing one or more data aspects having deployment constraints on locations in which aspect data in the one or more data aspects may be deployed. It is ascertained whether the one or more data aspects are accessed by an identified processing node of the application. If so, a restriction is determined for the identified processing node based on deployment constraints included in the accessed one or more data aspects and the identified processing node is deployed according to the determined restriction for the identified processing node. If not, the identified processing node or a preceding processing node is marked to indicate a required tokenization of the one or more data aspects, wherein the tokenization removes the deployment constraints for the identified processing node.Type: GrantFiled: November 5, 2018Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10666713Abstract: A facility for processing an event of a distributed processing environment is provided. The facility includes separating a plurality of processing flows into a plurality of flow groups, each flow group having a respective identifier. The identifier of each flow group is then associated with a respective topic. Based on the occurrence of an event, a message having a topic based on the event is published along with the identifier of the flow group associated with the topic. A processing flow of the flow group having the identifier of the message may then be used to process the event.Type: GrantFiled: March 28, 2017Date of Patent: May 26, 2020Assignee: International Business Machines CorporationInventors: Peter A. Broadhurst, John Hosie, Robert B. Nicholson, Robert W. Phippen, Jianjun Zhang
-
Patent number: 10608915Abstract: Providing dynamic latency in an integration flow. An integration flow connecting multiple integration nodes and including at least one repeat node is managed, wherein a repeat node repeats by sending a message, a variation of a message, or an element of a message to multiple paths or to a single path multiple times. A repeat node is registered with a workload manager component for monitoring. Data relating to the effect on performance by the integration flow including the monitored repeat node is collected. Required latencies or variations of latencies between firing of repeats of the repeat node based on the collected data are determined. The latencies or variations of latencies between firing of the repeats of the repeat node are instructed to influence dynamically a flow of elements through the repeat node.Type: GrantFiled: January 16, 2019Date of Patent: March 31, 2020Assignee: International Business Machine CorporationInventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10601871Abstract: Method and system are provided for reconfiguration of security requirements for deployed components of applications. The method includes referencing a deployed application wherein the application is divided into processing components, which can be deployed in different locations. The method adds one or more application resources for the deployed application to a central repository with references to the processing components of the deployed application utilizing the resources. The method further involves: receiving an update to an application resource to modify a security requirement for the resource; checking the deployment locations of the processing components of deployed applications referenced to the updated application resource to ensure the processing components conform to the modified security requirement; and taking an action for each referenced processing component of the deployed application that does not conform to the modified security requirement.Type: GrantFiled: January 18, 2017Date of Patent: March 24, 2020Assignee: International Business Machines CorporationInventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Publication number: 20190356734Abstract: An integration flow is monitored to determine a processing location of a message. The integration flow includes a route, one or more nodes, and one or more secure connectors. A first message is received by the integration flow. A central processing unit serialization load is received including a serialization of the first message on a first secure connector and a deserialization of the first message on a second secure connector. A processing load of the first message running on a first node of the one or more nodes is received. A first threshold of a processing load of the first message is received. The first threshold is determined to have been reached. Based on the first threshold being reached, a processing location of the integration flow is altered such that the first message is processed on a second node of the one or more nodes.Type: ApplicationFiled: July 30, 2019Publication date: November 21, 2019Inventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10432707Abstract: An integration flow is monitored to determine a processing location of a message. The integration flow includes a route, one or more nodes, and one or more secure connectors. A first message is received by the integration flow. A central processing unit serialization load is received including a serialization of the first message on a first secure connector and a deserialization of the first message on a second secure connector. A processing load of the first message running on a first node of the one or more nodes is received. A first threshold of a processing load of the first message is received. The first threshold is determined to have been reached. Based on the first threshold being reached, a processing location of the integration flow is altered such that the first message is processed on a second node of the one or more nodes.Type: GrantFiled: March 2, 2016Date of Patent: October 1, 2019Assignee: International Business Machines CorporationInventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Publication number: 20190294812Abstract: A method and system for handling sensitive data required by an application in a secure computer system. The secure computer system transforms sensitive data in a request message from a data format required by the application into a data format required by a service in an external computer system. The secure computer system tokenizes the sensitive data by replacing the sensitive data with tokenized data and stores a mapping between the sensitive data and the tokenized data in the secure computer system. The secure computer system sends the request message to an external computer system and receives, from the external computer system, a response message that includes annotations for the tokenized data with transform instructions for transforming the transformed sensitive data from the data format required by the service into the data format required by the application. The secure computer system replaces the tokenized data with the sensitive data.Type: ApplicationFiled: June 13, 2019Publication date: September 26, 2019Inventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Publication number: 20190294813Abstract: A method and system for handling sensitive data required by an application in a secure computer system. An external computer system that is external to the secure computer system receives a transformed request message that includes one or more data aspects having tokenized data that has replaced transformed sensitive data after sensitive data in the one or more aspects had been transformed from a data format required by a service in the external computer system into a data format required by the application. The external computer system generates a response message from the transformed request message by including, in the response message, annotations with transform instructions for transforming the transformed sensitive data, from the data format required by the service into the data format required by the application, after the tokenized data has been replaced by the transformed sensitive data in the one or more data aspects.Type: ApplicationFiled: June 13, 2019Publication date: September 26, 2019Inventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10409658Abstract: A method and associated system. For each message of a message batch, the message is assigned by a consumer to a partition of a log. Each partition of the log is associated with a respective processing engine. The message batch includes messages that includes the message. The consumer stores an offset value for each partition. Responsive to completion, by a distributor, of sending a last message in the message batch to the consumer, the distributor ascertains a target offset value for each partition based on a current offset value. In response to a processing engine completing processing of a message assigned to the partition associated with the processing engine, the consumer updates the stored offset value associated with the partition. The distributor determines when all messages of the batch have been processed based on the target offset values and the stored offset values.Type: GrantFiled: January 27, 2017Date of Patent: September 10, 2019Assignee: International Business Machines CorporationInventors: Peter A. Broadhurst, John Hosie, Robert B. Nicholson, Robert W. Phippen
-
Patent number: 10387670Abstract: Methods and associated data processing system for handling sensitive data required by an application in a secure computer system. The secure computer identifies sensitive data in one or more data aspects of a request message. The secure computer system tokenizes the sensitive data in the one or more data aspects by replacing the sensitive data with tokenized data and stores a mapping between the sensitive data and the tokenized data in the secure computer system. The secure computer system sends the request message to an external computer system. After the request message is sent to the external computer system, the secure computer system receives a response message from the external computer system. The response message includes annotations for the tokenized data with transform instructions for the tokenized data. The secure computer system replaces the tokenized data with the sensitive data and performs the transform instructions on the sensitive data.Type: GrantFiled: September 21, 2016Date of Patent: August 20, 2019Assignee: International Business Machines CorporationInventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Publication number: 20190166028Abstract: Providing dynamic latency in an integration flow. An integration flow connecting multiple integration nodes and including at least one repeat node is managed, wherein a repeat node repeats by sending a message, a variation of a message, or an element of a message to multiple paths or to a single path multiple times. A repeat node is registered with a workload manager component for monitoring. Data relating to the effect on performance by the integration flow including the monitored repeat node is collected. Required latencies or variations of latencies between firing of repeats of the repeat node based on the collected data are determined. The latencies or variations of latencies between firing of the repeats of the repeat node are instructed to influence dynamically a flow of elements through the repeat node.Type: ApplicationFiled: January 16, 2019Publication date: May 30, 2019Inventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Patent number: 10277489Abstract: Providing dynamic latency in an integration flow. An integration flow connecting multiple integration nodes and including at least one repeat node is managed, wherein a repeat node repeats by sending a message, a variation of a message, or an element of a message to multiple paths or to a single path multiple times. A repeat node is registered with a workload manager component for monitoring. Data relating to the effect on performance by the integration flow including the monitored repeat node is collected. Required latencies or variations of latencies between firing of repeats of the repeat node based on the collected data are determined. The latencies or variations of latencies between firing of the repeats of the repeat node are instructed to influence dynamically a flow of elements through the repeat node.Type: GrantFiled: September 20, 2018Date of Patent: April 30, 2019Assignee: International Business Machines CorporationInventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Publication number: 20190075086Abstract: A method and system for secure message handling of an application across deployment locations. The application is analyzed to identify processing nodes referencing one or more data aspects having deployment constraints on locations in which aspect data in the one or more data aspects may be deployed. It is ascertained whether the one or more data aspects are accessed by an identified processing node of the application. If so, a restriction is determined for the identified processing node based on deployment constraints included in the accessed one or more data aspects and the identified processing node is deployed according to the determined restriction for the identified processing node. If not, the identified processing node or a preceding processing node is marked to indicate a required tokenization of the one or more data aspects, wherein the tokenization removes the deployment constraints for the identified processing node.Type: ApplicationFiled: November 5, 2018Publication date: March 7, 2019Inventors: John Hosie, Daniel J. McGinnes, Martin A. Ross, Craig H. Stirling, Dominic J. Storey
-
Publication number: 20190020560Abstract: Providing dynamic latency in an integration flow. An integration flow connecting multiple integration nodes and including at least one repeat node is managed, wherein a repeat node repeats by sending a message, a variation of a message, or an element of a message to multiple paths or to a single path multiple times. A repeat node is registered with a workload manager component for monitoring. Data relating to the effect on performance by the integration flow including the monitored repeat node is collected. Required latencies or variations of latencies between firing of repeats of the repeat node based on the collected data are determined. The latencies or variations of latencies between firing of the repeats of the repeat node are instructed to influence dynamically a flow of elements through the repeat node.Type: ApplicationFiled: September 20, 2018Publication date: January 17, 2019Inventors: John Hosie, Martin A. Ross, Craig H. Stirling, Dominic J. Storey