Patents by Inventor Mark J. Anderson

Mark J. Anderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250051326
    Abstract: Crystalline forms of Compound I: pharmaceutically acceptable salts thereof, and solvates and hydrates thereof are disclosed. Pharmaceutical compositions comprising the same, methods of treating cystic fibrosis using the same, and methods for making the same are also disclosed.
    Type: Application
    Filed: October 24, 2023
    Publication date: February 13, 2025
    Inventors: Yi Shi, Kevin J. Gagnon, Jicong Li, Jennifer Lu, Ales Medek, Muna Shrestha, Michael Waldo, Beili Zhang, Carl L. Zwicker, Corey Don Anderson, Jeremy J. Clemens, Thomas Cleveland, Timothy Richard Coon, Bryan Frieman, Peter Grootenhuis, Sara Sabina Hadida Ruah, Jason McCartney, Mark Thomas Miller, Prasuna Paraselli, Fabrice Pierre, Sara E. Swift, Jinglan Zhou
  • Patent number: 12218795
    Abstract: The Internet can be configured to provide communications to a large number of Internet-of-Things (IoT) devices. Devices can be designed to address the need for network layers, from central servers, through gateways, down to edge devices, to grow unhindered, to discover and make accessible connected resources, and to support the ability to hide and compartmentalize connected resources. Network protocols can be part of the fabric supporting human accessible services that operate regardless of location, time, or space. Innovations can include service delivery and associated infrastructure, such as hardware and software. Services may be provided in accordance with specified Quality of Service (QoS) terms. The use of IoT devices and networks can be included in a heterogeneous network of connectivity including wired and wireless technologies.
    Type: Grant
    Filed: August 29, 2022
    Date of Patent: February 4, 2025
    Assignee: INTEL CORPORATION
    Inventors: Ned M. Smith, Keith Nolan, Mark Kelly, Gregory Burns, Michael Nolan, John Brady, Cliodhna Ni Scanaill, Niall Cahill, Thiago Macieira, Zheng Zhang, Glen J. Anderson, Igor Muttik, Davide Carboni, Eugene Ryan, Richard Davies, Toby M. Kohlenberg, Maarten Koning, Jakub Wenus, Rajesh Poornachandran, William C. Deleeuw, Ravikiran Chukka
  • Publication number: 20250039041
    Abstract: A trusted communications environment includes a primary participant with a group creator and a distributed ledger, and a secondary participant with communication credentials. An Internet of Things (IoT) network includes a trusted execution environment with a chain history for a blockchain, a root-of-trust for chaining, and a root-of-trust for archives. An IoT network includes an IoT device with a communication system, an onboarding tool, a device discoverer, a trust builder, a shared domain creator, and a shared resource directory. An IoT network includes an IoT device with a communication system, a policy decision engine, a policy repository, a policy enforcement engine, and a peer monitor. An IoT network includes an IoT device with a host environment and a trusted reliability engine to apply a failover action if the host environment fails. An IoT network includes an IoT server including secure booter/measurer, trust anchor, authenticator, key manager, and key generator.
    Type: Application
    Filed: October 11, 2024
    Publication date: January 30, 2025
    Inventors: Ned M. Smith, Keith Nolan, Mark Kelly, Michael Nolan, John Brady, Thiago Macieira, Zheng Zhang, Glen J. Anderson, Igor Muttik
  • Patent number: 11829334
    Abstract: A method of controlling resynchronization of a source database and a target database may comprise detecting that a connection between the source database and the target database has been restored. Based on the detecting, the method may also comprise identifying a first edit flag for a first row in a first table on the source database. Based on the identifying, the method may also comprise sending the first row from the source database to the target database. Based on the sending, the method may also comprise clearing the first edit flag for the first row.
    Type: Grant
    Filed: June 12, 2020
    Date of Patent: November 28, 2023
    Assignee: International Business Machines Corporation
    Inventors: Matthew A Neill, Mark J. Anderson, Craig S. Aldrich, Donald Frederick Zimmerman
  • Publication number: 20220414253
    Abstract: An approach for identifying privileged access to a database is provided. A processor receives a query plan to search the database. A processor determines the query plan includes a request that accesses privileged data. A processor generates an updated query plan with an indication of the request that accesses privileged data. A processor sends the updated query plan for an audit of the query plan.
    Type: Application
    Filed: June 23, 2021
    Publication date: December 29, 2022
    Inventors: Craig S. Aldrich, Mark J. Anderson
  • Patent number: 11334686
    Abstract: Techniques for computer security are provided. A request to access a first file referenced as a variable in a source code of an application is received. A file name of the first file is then retrieved from a runtime stack, and the file name is stored in a system-wide accessible cross-reference file.
    Type: Grant
    Filed: December 3, 2019
    Date of Patent: May 17, 2022
    Assignee: International Business Machines Corporation
    Inventors: Mark J. Anderson, Scott Forstie, Jeffrey M. Uehling
  • Publication number: 20210390081
    Abstract: A method of controlling resynchronization of a source database and a target database may comprise detecting that a connection between the source database and the target database has been restored. Based on the detecting, the method may also comprise identifying a first edit flag for a first row in a first table on the source database. Based on the identifying, the method may also comprise sending the first row from the source database to the target database. Based on the sending, the method may also comprise clearing the first edit flag for the first row.
    Type: Application
    Filed: June 12, 2020
    Publication date: December 16, 2021
    Inventors: Matthew A Neill, Mark J. Anderson, Craig S. Aldrich, Donald Frederick Zimmerman
  • Patent number: 11194633
    Abstract: Techniques for warm cloning of computing nodes are provided. A request to clone a first computing node is received. Upon determining that a first transaction of a plurality of transactions is ongoing, a first moment in time when data associated with the first transaction was coherent on the first computing node is identified. Tracking data related to the first transaction is collected, beginning at the first moment in time. Further, a first storage associated with the first computing node is copied to a second storage associated with a second computing node, where the first transaction continues during the copying. The tracking data related to the first transaction is then transmitted to the second computing node.
    Type: Grant
    Filed: September 5, 2019
    Date of Patent: December 7, 2021
    Assignee: International Business Machines Corporation
    Inventors: Mark J. Anderson, Thomas P. Giordano, Scott D. Helt, David Jones, Curtis D. Schemmel, Shauna Rollings, Yun Wang, Jennifer A. Dervin, Kristopher C. Whitney
  • Publication number: 20210073044
    Abstract: Techniques for warm cloning of computing nodes are provided. A request to clone a first computing node is received. Upon determining that a first transaction of a plurality of transactions is ongoing, a first moment in time when data associated with the first transaction was coherent on the first computing node is identified. Tracking data related to the first transaction is collected, beginning at the first moment in time. Further, a first storage associated with the first computing node is copied to a second storage associated with a second computing node, where the first transaction continues during the copying. The tracking data related to the first transaction is then transmitted to the second computing node.
    Type: Application
    Filed: September 5, 2019
    Publication date: March 11, 2021
    Inventors: Mark J. ANDERSON, Thomas P. GIORDANO, Scott D. HELT, David JONES, Curtis D. SCHEMMEL, Shauna ROLLINGS, Yun WANG, Jennifer A. DERVIN, Kristopher C. WHITNEY
  • Patent number: 10810199
    Abstract: A query optimizer improves the efficiency of a computer database system utilizing an input-output correlator used with a create function that indicates a correlation between an input to the function and an output of the function. In an example, the input-output correlator is an OR OUTPUT parameter of a create table function. The query optimizer determines whether it can pass a value of a query to the input of the function in response to the input-output correlator. Under appropriate conditions, the query optimizer passes the query value to the input of the function to significantly reduce the amount of data returned by the function thereby reducing the load on database resources.
    Type: Grant
    Filed: August 30, 2018
    Date of Patent: October 20, 2020
    Assignee: International Business Machines Corporation
    Inventors: Craig S. Aldrich, Mark J. Anderson
  • Patent number: 10650156
    Abstract: Systems, methods, and computer program products to perform an operation comprising receiving, from an application executing on a system, a request to access a data file, receiving data describing the request, wherein the data describing the request includes data from a runtime stack of the application, wherein the data from the runtime stack includes a program statement number, identifying, in a protected memory block, a first rule for accessing the data file, wherein the first rule specifies a program statement number permitted to access the data file, and upon determining that the program statement number from the runtime stack does not match the program statement number specified in the first rule, restricting access to the data file by the application.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: May 12, 2020
    Assignee: International Business Machines Corporation
    Inventors: Mark J. Anderson, Scott Forstie, Jeffrey M. Uehling
  • Publication number: 20200104532
    Abstract: Techniques for computer security are provided. A request to access a first file referenced as a variable in a source code of an application is received. A file name of the first file is then retrieved from a runtime stack, and the file name is stored in a system-wide accessible cross-reference file.
    Type: Application
    Filed: December 3, 2019
    Publication date: April 2, 2020
    Inventors: Mark J. ANDERSON, Scott FORSTIE, Jeffrey M. UEHLING
  • Publication number: 20200073985
    Abstract: A query optimizer improves the efficiency of a computer database system utilizing an input-output correlator used with a create function that indicates a correlation between an input to the function and an output of the function. In an example, the input-output correlator is an OR OUTPUT parameter of a create table function. The query optimizer determines whether it can pass a value of a query to the input of the function in response to the input-output correlator. Under appropriate conditions, the query optimizer passes the query value to the input of the function to significantly reduce the amount of data returned by the function thereby reducing the load on database resources.
    Type: Application
    Filed: August 30, 2018
    Publication date: March 5, 2020
    Inventors: Craig S. Aldrich, Mark J. Anderson
  • Patent number: 10540523
    Abstract: Systems, methods, and computer program products to perform an operation comprising receiving, from an application executing on a system, a request to access a data file, wherein the data file is referenced by a variable name in a source code of the application, receiving data describing the request, wherein the data describing the request is obtained from a runtime stack of the application and includes a name of the application and a name of the data file, wherein the name of the data file is used as a value for the variable name, and storing an indication that the application accessed the data file in a cross-reference data store for the system.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: January 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Mark J. Anderson, Scott Forstie, Jeffrey M. Uehling
  • Patent number: 10346625
    Abstract: Systems, methods, and computer program products to perform an operation comprising monitoring a set of file access requests to a file from an application to obtain permission and identity information related to the monitored requests, wherein the monitoring includes obtaining a runtime stack from the application, determining, based on environment information in the runtime stack, whether a first set of privileges available to the application are greater than a second set of privileges available to a the user of the application, storing the permission and identity information and an indication of whether the first set of privileges is greater than the second set of privileges in a data file, and adjusting the privileges for the user based on the determination.
    Type: Grant
    Filed: October 31, 2016
    Date of Patent: July 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Mark J. Anderson, Carol S. Budnik, Anna P. Dietenberger, Scott Forstie, Brian J. Hasselbeck, Allen K. Mei, Ellen B. Streifel, Jeffrey M. Uehling
  • Publication number: 20190188309
    Abstract: A system and a method for keeping two versions of a mirrored database in sync is provided. A connection is monitored between a primary database and a secondary database. When a loss of the connection between the primary database and the secondary database is detected, the primary database is monitored for changes. When a modification is detected to at least one row in the primary database, a value of a change indicator is changed for the corresponding row indicating that the row was modified. Once the connection between the primary and the secondary databases is restored, the primary database is queried for the value of the change indicator indicating the corresponding row was modified to obtain a current value for data in the corresponding row of the primary database, and the corresponding row in the secondary database is updated with the current value for the corresponding row.
    Type: Application
    Filed: December 14, 2017
    Publication date: June 20, 2019
    Inventors: Mark J. Anderson, David G. Carlson, Dan A. Christy, Thomas P. Giordano, David F. Owen
  • Publication number: 20180314845
    Abstract: Systems, methods, and computer program products to perform an operation comprising receiving, from an application executing on a system, a request to access a data file, receiving data describing the request, wherein the data describing the request includes data from a runtime stack of the application, wherein the data from the runtime stack includes a program statement number, identifying, in a protected memory block, a first rule for accessing the data file, wherein the first rule specifies a program statement number permitted to access the data file, and upon determining that the program statement number from the runtime stack does not match the program statement number specified in the first rule, restricting access to the data file by the application.
    Type: Application
    Filed: April 26, 2017
    Publication date: November 1, 2018
    Inventors: Mark J. ANDERSON, Scott FORSTIE, Jeffrey M. UEHLING
  • Publication number: 20180314843
    Abstract: Systems, methods, and computer program products to perform an operation comprising receiving, from an application executing on a system, a request to access a data file, wherein the data file is referenced by a variable name in a source code of the application, receiving data describing the request, wherein the data describing the request is obtained from a runtime stack of the application and includes a name of the application and a name of the data file, wherein the name of the data file is used as a value for the variable name, and storing an indication that the application accessed the data file in a cross-reference data store for the system.
    Type: Application
    Filed: April 26, 2017
    Publication date: November 1, 2018
    Inventors: Mark J. ANDERSON, Scott FORSTIE, Jeffrey M. UEHLING
  • Publication number: 20180121665
    Abstract: Systems, methods, and computer program products to perform an operation comprising monitoring a set of file access requests to a file from an application to obtain permission and identity information related to the monitored requests, wherein the monitoring includes obtaining a runtime stack from the application, determining, based on environment information in the runtime stack, whether a first set of privileges available to the application are greater than a second set of privileges available to a the user of the application, storing the permission and identity information and an indication of whether the first set of privileges is greater than the second set of privileges in a data file, and adjusting the privileges for the user based on the determination.
    Type: Application
    Filed: October 31, 2016
    Publication date: May 3, 2018
    Inventors: Mark J. ANDERSON, Carol S. BUDNIK, Anna P. DIETENBERGER, Scott FORSTIE, Brian J. HASSELBECK, Allen K. MEI, Ellen B. STREIFEL, Jeffrey M. UEHLING
  • Patent number: 9951392
    Abstract: Methods and kits are provided for calibrating a cell-free protein synthesis reaction for optimal activity. The method includes the steps of providing an extract competent for cell-free protein synthesis (CFPS); performing cell-free protein synthesis with the extract; measuring a first reaction end-point where in vitro protein synthesis plateaus; measuring a second reaction end-point where Energy Charge of the extract declines to a level in a range from about 0.40 to about 0.80 of Energy Charge of a control extract; and adjusting Energy Charge of the extract to a level in a range from about 0.80 to about 1.0 of the control extract.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: April 24, 2018
    Assignee: Northwestern University
    Inventors: Michael C. Jewett, Jennifer A. Schoborg, Charles Eric Hodgman, Mark J. Anderson