Patents by Inventor Kenneth Blackwell

Kenneth Blackwell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11277487
    Abstract: A method for utilizing a proxy server interface includes measuring at least one of physiological or neurological functions of a subject by a hardware sensor in a measurement system, the hardware sensor configured to generate a signal containing information of the at least one of physiological or neurological functions, manipulating the signal by a processor, the measurement system including a first memory configured to store the manipulated signal, outputting the signal to the proxy server interface, the proxy server interface configured to buffer the signal in a second memory, and polling the proxy server interface for the buffered signal by an Internet browser. Outputting the signal to the proxy server interface and polling the proxy server interface for the buffered signal occurs asynchronously.
    Type: Grant
    Filed: December 16, 2020
    Date of Patent: March 15, 2022
    Inventors: Timothy G. Royer, Aaron Kenneth Blackwell
  • Patent number: 10050978
    Abstract: Various embodiments of the invention increase security of a network of interoperable devices. In certain embodiments, this is accomplished by a security module that uses a user-definable security policy that sets forth one or more tests for validating input data or commands received from an IoT device. A validator receives the command via a command controller and performs a security analysis of the command according to the security policy. Responsive to the security analysis, the validator generates a validation signal in order to authorize or reject further processing of the command.
    Type: Grant
    Filed: October 16, 2015
    Date of Patent: August 14, 2018
    Assignee: DELL PRODUCTS LP
    Inventors: Michael John Morton, Aaron Kenneth Blackwell, Richard A. Backhouse
  • Patent number: 9836377
    Abstract: A method includes receiving respective statistics for a plurality of infrastructure implementations. Each infrastructure implementation includes a respective organization and a respective deployment architecture. The method also includes determining a selected infrastructure implementation of the plurality of infrastructure implementations. The method further includes determining, using a processor, first particular implementations comparable to the selected infrastructure implementations from the plurality of infrastructure implementations, based on characteristics of the respective organization of the selected infrastructure implementation. The method additionally includes determining comparison metrics. The determining comparison metrics includes anonymizing the respective organization of each of the first particular implementations, and aggregating the respective statistics of each of the anonymized first particular implementations into comparison statistics.
    Type: Grant
    Filed: September 18, 2013
    Date of Patent: December 5, 2017
    Assignee: CA, Inc.
    Inventors: Debra J Danielson, Kenneth Blackwell
  • Patent number: 9632904
    Abstract: A method, system, and computer program product for raising an alert when some subject process is impacted by performance degradation of a software application are disclosed. The real word process may be modeled and executed on a computing device. Service dependencies in the modeled process are correlated to services provided by a managed application. An APM system monitors the managed application to determine when the services it provides may have some degradation. When a degradation of performance of the managed application is determined, a modeled process that has a service dependency that correlates to the degraded performance is determined. Then, an alert is generated to indicate that the process being modeled may be comprised. Therefore, instead of simply reporting that the managed application has some degradation, the alert provides a warning that some broader process outside of the managed application may be compromised.
    Type: Grant
    Filed: February 15, 2013
    Date of Patent: April 25, 2017
    Assignee: CA, Inc.
    Inventors: Erik M. Erikson, Aaron Kenneth Blackwell, Trey Kubena
  • Publication number: 20170111373
    Abstract: Various embodiments of the invention increase security of a network of interoperable devices. In certain embodiments, this is accomplished by a security module that is uses a user-definable security policy that sets forth one or more tests for validating input data or commands received from an IoT device. A validator receives the command via a command controller and performs a security analysis of the command according to the security policy. Responsive to the security analysis, the validator generated a validation signal in order to authorize or reject further processing of the command.
    Type: Application
    Filed: October 16, 2015
    Publication date: April 20, 2017
    Applicant: DELL PRODUCTS L.P.
    Inventors: Michael John Morton, Aaron Kenneth Blackwell, Richard A. Backhouse
  • Patent number: 9202185
    Abstract: A model is used to provide a user interface to track flows through at least one application of a computer system. The model relates the structural aspects of the at least one application to a behavioral model such as a business transaction hierarchy. The structural part of the model includes linked Vertex and Edge records. Vertex records for different instances of a component can be aggregated to provide a single vertex or node for display in a user interface. A Vertex record is linked to an Agent record and a Metric Path record. The Edge records identify tail and head components of a call. A set of Edge records can be associated with a Transaction record in the behavioral part of the model. A Transaction record can be associated with a Business Transaction Record, and a Business Transaction record can be associated with a Business Service Record.
    Type: Grant
    Filed: April 8, 2011
    Date of Patent: December 1, 2015
    Assignee: CA, Inc.
    Inventors: Vladimir Umansky, Indranil Basak, Abhijit Sawant, Aaron Kenneth Blackwell, Jeffrey R Cobb
  • Patent number: 9037705
    Abstract: A method, system and computer program product are disclosed for routing performance data to compute nodes. According to one aspect of the present disclosure each of a plurality of compute nodes are assigned a topic. Each topic may be associated with a set of calculations. Labeled performance metrics for an application are received. Each performance metric is labeled with a context under which the performance metric was collected. A topic is associated with each of the performance metrics based on the labeled context. Each respective node listens for a topic assigned to it in order to access the performance metrics associated with the assigned topic. Each respective node analyzes the performance metrics associated with the topic assigned to it.
    Type: Grant
    Filed: November 28, 2012
    Date of Patent: May 19, 2015
    Assignee: CA, Inc.
    Inventors: Aaron Kenneth Blackwell, Marco Gagliardi, Benny Tseng, David Tootill, Mark S. LoSacco, Ramana V. Lokavarapu, Gabriel D. Underwood
  • Patent number: 8789181
    Abstract: There are techniques for detecting and preventing possible security violations in a computer network. The security violation detection may be based on data attached to transactions as they flow through one or more software applications. A transaction that is processed by a sequence of software components that execute on one or more electronic devices may be traced. Data that is associated with the transaction as the transaction flows through the sequence of software components may be accessed. The accessed data may be analyzed to detect a possible security violation. The accessed data may be compared to one or more pre-defined patterns. The transaction may be intercepted upon detection of a possible security violation.
    Type: Grant
    Filed: April 11, 2012
    Date of Patent: July 22, 2014
    Assignee: CA, Inc.
    Inventor: Aaron Kenneth Blackwell
  • Publication number: 20140149575
    Abstract: A method, system and computer program product are disclosed for routing performance data to compute nodes. According to one aspect of the present disclosure each of a plurality of compute nodes are assigned a topic. Each topic may be associated with a set of calculations. Labeled performance metrics for an application are received. Each performance metric is labeled with a context under which the performance metric was collected. A topic is associated with each of the performance metrics based on the labeled context. Each respective node listens for a topic assigned to it in order to access the performance metrics associated with the assigned topic. Each respective node analyzes the performance metrics associated with the topic assigned to it.
    Type: Application
    Filed: November 28, 2012
    Publication date: May 29, 2014
    Applicant: CA, INC.
    Inventors: Aaron Kenneth Blackwell, Marco Gagliardi, Benny Tseng, David Tootill, Mark S. LoSacco, Ramana V. Lokavarapu, Gabriel D. Underwood
  • Patent number: 8726383
    Abstract: Disclosed herein are techniques for detecting possible security intrusions in a computer network. The security intrusion detection may be based on analyzing patterns of how transactions flow through one or more software applications. For example, patterns of transaction flows are determined for an initial time period to establish a baseline of normal flow patterns. These normal flow patterns may be compared with patterns for transaction flows for a later time period. Deviations in the patterns of transaction flow may indicate a possible security intrusion.
    Type: Grant
    Filed: February 14, 2011
    Date of Patent: May 13, 2014
    Assignee: CA, Inc.
    Inventor: Aaron Kenneth Blackwell
  • Publication number: 20130276108
    Abstract: There are techniques for detecting and preventing possible security violations in a computer network. The security violation detection may be based on data attached to transactions as they flow through one or more software applications. A transaction that is processed by a sequence of software components that execute on one or more electronic devices may be traced. Data that is associated with the transaction as the transaction flows through the sequence of software components may be accessed. The accessed data may be analyzed to detect a possible security violation. The accessed data may be compared to one or more pre-defined patterns. The transaction may be intercepted upon detection of a possible security violation.
    Type: Application
    Filed: April 11, 2012
    Publication date: October 17, 2013
    Applicant: CA, INC.
    Inventor: Aaron Kenneth Blackwell
  • Publication number: 20120259793
    Abstract: A model is used to provide a user interface to track flows through at least one application of a computer system. The model relates the structural aspects of the at least one application to a behavioral model such as a business transaction hierarchy. The structural part of the model includes linked Vertex and Edge records. Vertex records for different instances of a component can be aggregated to provide a single vertex or node for display in a user interface. A Vertex record is linked to an Agent record and a Metric Path record. The Edge records identify tail and head components of a call. A set of Edge records can be associated with a Transaction record in the behavioral part of the model. A Transaction record can be associated with a Business Transaction Record, and a Business Transaction record can be associated with a Business Service Record.
    Type: Application
    Filed: April 8, 2011
    Publication date: October 11, 2012
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Vladimir Umansky, Indranil Basak, Abhijit Sawant, Aaron Kenneth Blackwell, Jeffrey R. Cobb
  • Publication number: 20120210428
    Abstract: Disclosed herein are techniques for detecting possible security intrusions in a computer network. The security intrusion detection may be based on analyzing patterns of how transactions flow through one or more software applications. For example, patterns of transaction flows are determined for an initial time period to establish a baseline of normal flow patterns. These normal flow patterns may be compared with patterns for transaction flows for a later time period. Deviations in the patterns of transaction flow may indicate a possible security intrusion.
    Type: Application
    Filed: February 14, 2011
    Publication date: August 16, 2012
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventor: Aaron Kenneth Blackwell
  • Patent number: 7003781
    Abstract: A method and system is disclosed for monitoring an operation of a distributed data processing system. The system can include a plurality of applications running on a plurality of host processors and communicating with one another, such as through a message passing technique. The method includes steps executed in individual ones of the plurality of applications, of (a) examining individual ones of generated API calls to determine if a particular API call meets predetermined API call criteria; (b) if a particular API call meets the predetermined API call criteria, storing all or a portion of the content of the API call as a stored event; (c) processing a plurality of the stored events to identify logically correlated events, such as those associated with a business transaction; and (d) displaying all or a portion of the stored API call content data for the logically correlated events.
    Type: Grant
    Filed: May 5, 2000
    Date of Patent: February 21, 2006
    Assignee: Bristol Technology Inc.
    Inventors: Aaron Kenneth Blackwell, Aage Bendiksen, Benny Tseng, Zhongliang Lu, Amal Shah