Patents by Inventor Kevin Cornell

Kevin Cornell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060130008
    Abstract: A method, system and apparatus for the model-to-model transformation by element-kind of a source model are proposed. An element-kind model-to-model transformation can include one or more transform elements defining a traversal of a source model, an element-kind mapping and the conversion from source models to target models. The element-kind mapping can include a set of associations between element-kinds for the source model and corresponding transformation rules to produce target objects in a target model.
    Type: Application
    Filed: December 10, 2004
    Publication date: June 15, 2006
    Applicant: International Business Machines Corporation
    Inventors: Duong Nguyen, Mahboob Ashraf, Kevin Cornell
  • Publication number: 20060130009
    Abstract: A method, system and apparatus for processing a model-to-model transformation. The method can include dynamically accepting a transformation to apply to a source model in order to produce a target model. More specifically, the method can include traversing a hierarchy for the source model and applying rules in the transformation to objects in the hierarchy to produce the target model. For instance, the traversing step can include sequentially processing a list of transform elements in the transformation. In one aspect of the invention, the processing step can include loading content extractors among the transform elements. Subsequently, other transform elements can be identified through the loaded content extractors in order to traverse the hierarchy.
    Type: Application
    Filed: December 10, 2004
    Publication date: June 15, 2006
    Applicant: International Business Machines Corporation
    Inventors: Kevin Cornell, Eric Funk, Duong Nguyen, David Ruest
  • Publication number: 20060130011
    Abstract: A method, system and apparatus for extending an existing model-to-model transformation. A method for extending a model-to-model transformation can include merging an extension to the model-to-model transformation with the model-to-model transformation to produce an extended model-to-model transformation. Specifically, the merging step can include identifying insertion points for specified transform elements in the model-to-model transformation and inserting the specified transform elements at the identified insertion points in the model-to-model transformation to produce an extended model-to-model transformation. Subsequently, the extended model-to-model transformation can be dynamically applied to a source model in order to produce a target model.
    Type: Application
    Filed: December 10, 2004
    Publication date: June 15, 2006
    Applicant: International Business Machines Corporation
    Inventors: Kevin Cornell, Eric Funk
  • Publication number: 20060008210
    Abstract: A network TAP that provides access to data communicated in a network. The TAP includes a first port for connecting to a pluggable optoelectronic module such as an optical transceiver, a link port for connecting to an optical link configured to receive and send data to the optical transceiver, and a TAP port for relaying diverted optical data to a storage and/or analyzing device. Couplers are used to split the optical signals entering the TAP from the first port and/or the link port such that a useable portion of the optical signal(s) can be stored and/or analyzed. The TAP also includes optical devices for relaying optical signals between components in the TAP.
    Type: Application
    Filed: April 29, 2005
    Publication date: January 12, 2006
    Inventors: Kevin Cornell, Mark Farley
  • Publication number: 20050114697
    Abstract: Secure point to point network connections. Secure communications are accomplished between connection points. The first partner sends authentication information to a second partner. The second partner authenticates the authentication information from the first partner to verify the identity of the first partner. If the identity of the first partner is verified, high-speed data maybe streamed to the first partner. A connection between the first and second partners is policed to discover unauthorized devices connected to the connection or to discover the disconnection of a partner from the connection. If an unauthorized device is discovered or if a partner is removed, high-speed data is no longer sent on the connection.
    Type: Application
    Filed: November 9, 2004
    Publication date: May 26, 2005
    Inventors: Kevin Cornell, Paul Gentieu, Arthur Lawson, Stephen Gordy, Lucy Hosking
  • Publication number: 20050114663
    Abstract: Secure point to point network communications. Secure point to point network communications are accomplished by sending data across a secure link. Trusted partners at the link are matched to each other. To ensure that no un-trusted partners are on the link, authentication is performed. One of the points may be a secure tap. The secure tap authenticates a trusted partner by receiving a hardware embedded encryption key or value derived from the hardware embedded encryption key from the trusted partner. Data sent on the trusted link is encrypted to prevent interception of the data. The secure tap polices the link to ensure that no un-trusted partners are attached to the link and that the trusted partner is not removed from the link. If un-trusted partners are added to the link or trusted partners removed from the link, the secure tap ceases sending data.
    Type: Application
    Filed: October 28, 2004
    Publication date: May 26, 2005
    Inventors: Kevin Cornell, Paul Gentieu, Arthur Lawson, Stephen Gordy, Lucy Hosking
  • Publication number: 20050114710
    Abstract: A host bus adapter for use in secure network devices. The host bus adapter includes a network connector for connecting to a network such as a fiber-optic or Ethernet network. The network connector may connect to a physical layer device where the physical layer device is configured to receive high-speed network communications from the network connector. A decryption module is connected to the physical layer device for the decrypting high-speed encrypted network traffic received from the physical layer device. The host bus adapter includes an interface that is configured to connect to the host device. Authentication logic is included in the host bus adapter to authenticate and/or authenticate to a trusted partner.
    Type: Application
    Filed: October 28, 2004
    Publication date: May 26, 2005
    Inventors: Kevin Cornell, Paul Gentieu, Arthur Lawson, Stephen Gordy, Lucy Hosking