Patents by Inventor Mark J. Anderson
Mark J. Anderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250051326Abstract: Crystalline forms of Compound I: pharmaceutically acceptable salts thereof, and solvates and hydrates thereof are disclosed. Pharmaceutical compositions comprising the same, methods of treating cystic fibrosis using the same, and methods for making the same are also disclosed.Type: ApplicationFiled: October 24, 2023Publication date: February 13, 2025Inventors: Yi Shi, Kevin J. Gagnon, Jicong Li, Jennifer Lu, Ales Medek, Muna Shrestha, Michael Waldo, Beili Zhang, Carl L. Zwicker, Corey Don Anderson, Jeremy J. Clemens, Thomas Cleveland, Timothy Richard Coon, Bryan Frieman, Peter Grootenhuis, Sara Sabina Hadida Ruah, Jason McCartney, Mark Thomas Miller, Prasuna Paraselli, Fabrice Pierre, Sara E. Swift, Jinglan Zhou
-
Patent number: 12218795Abstract: The Internet can be configured to provide communications to a large number of Internet-of-Things (IoT) devices. Devices can be designed to address the need for network layers, from central servers, through gateways, down to edge devices, to grow unhindered, to discover and make accessible connected resources, and to support the ability to hide and compartmentalize connected resources. Network protocols can be part of the fabric supporting human accessible services that operate regardless of location, time, or space. Innovations can include service delivery and associated infrastructure, such as hardware and software. Services may be provided in accordance with specified Quality of Service (QoS) terms. The use of IoT devices and networks can be included in a heterogeneous network of connectivity including wired and wireless technologies.Type: GrantFiled: August 29, 2022Date of Patent: February 4, 2025Assignee: INTEL CORPORATIONInventors: Ned M. Smith, Keith Nolan, Mark Kelly, Gregory Burns, Michael Nolan, John Brady, Cliodhna Ni Scanaill, Niall Cahill, Thiago Macieira, Zheng Zhang, Glen J. Anderson, Igor Muttik, Davide Carboni, Eugene Ryan, Richard Davies, Toby M. Kohlenberg, Maarten Koning, Jakub Wenus, Rajesh Poornachandran, William C. Deleeuw, Ravikiran Chukka
-
Publication number: 20250039041Abstract: A trusted communications environment includes a primary participant with a group creator and a distributed ledger, and a secondary participant with communication credentials. An Internet of Things (IoT) network includes a trusted execution environment with a chain history for a blockchain, a root-of-trust for chaining, and a root-of-trust for archives. An IoT network includes an IoT device with a communication system, an onboarding tool, a device discoverer, a trust builder, a shared domain creator, and a shared resource directory. An IoT network includes an IoT device with a communication system, a policy decision engine, a policy repository, a policy enforcement engine, and a peer monitor. An IoT network includes an IoT device with a host environment and a trusted reliability engine to apply a failover action if the host environment fails. An IoT network includes an IoT server including secure booter/measurer, trust anchor, authenticator, key manager, and key generator.Type: ApplicationFiled: October 11, 2024Publication date: January 30, 2025Inventors: Ned M. Smith, Keith Nolan, Mark Kelly, Michael Nolan, John Brady, Thiago Macieira, Zheng Zhang, Glen J. Anderson, Igor Muttik
-
Patent number: 11829334Abstract: A method of controlling resynchronization of a source database and a target database may comprise detecting that a connection between the source database and the target database has been restored. Based on the detecting, the method may also comprise identifying a first edit flag for a first row in a first table on the source database. Based on the identifying, the method may also comprise sending the first row from the source database to the target database. Based on the sending, the method may also comprise clearing the first edit flag for the first row.Type: GrantFiled: June 12, 2020Date of Patent: November 28, 2023Assignee: International Business Machines CorporationInventors: Matthew A Neill, Mark J. Anderson, Craig S. Aldrich, Donald Frederick Zimmerman
-
Publication number: 20220414253Abstract: An approach for identifying privileged access to a database is provided. A processor receives a query plan to search the database. A processor determines the query plan includes a request that accesses privileged data. A processor generates an updated query plan with an indication of the request that accesses privileged data. A processor sends the updated query plan for an audit of the query plan.Type: ApplicationFiled: June 23, 2021Publication date: December 29, 2022Inventors: Craig S. Aldrich, Mark J. Anderson
-
Patent number: 11334686Abstract: Techniques for computer security are provided. A request to access a first file referenced as a variable in a source code of an application is received. A file name of the first file is then retrieved from a runtime stack, and the file name is stored in a system-wide accessible cross-reference file.Type: GrantFiled: December 3, 2019Date of Patent: May 17, 2022Assignee: International Business Machines CorporationInventors: Mark J. Anderson, Scott Forstie, Jeffrey M. Uehling
-
Publication number: 20210390081Abstract: A method of controlling resynchronization of a source database and a target database may comprise detecting that a connection between the source database and the target database has been restored. Based on the detecting, the method may also comprise identifying a first edit flag for a first row in a first table on the source database. Based on the identifying, the method may also comprise sending the first row from the source database to the target database. Based on the sending, the method may also comprise clearing the first edit flag for the first row.Type: ApplicationFiled: June 12, 2020Publication date: December 16, 2021Inventors: Matthew A Neill, Mark J. Anderson, Craig S. Aldrich, Donald Frederick Zimmerman
-
Patent number: 11194633Abstract: Techniques for warm cloning of computing nodes are provided. A request to clone a first computing node is received. Upon determining that a first transaction of a plurality of transactions is ongoing, a first moment in time when data associated with the first transaction was coherent on the first computing node is identified. Tracking data related to the first transaction is collected, beginning at the first moment in time. Further, a first storage associated with the first computing node is copied to a second storage associated with a second computing node, where the first transaction continues during the copying. The tracking data related to the first transaction is then transmitted to the second computing node.Type: GrantFiled: September 5, 2019Date of Patent: December 7, 2021Assignee: International Business Machines CorporationInventors: Mark J. Anderson, Thomas P. Giordano, Scott D. Helt, David Jones, Curtis D. Schemmel, Shauna Rollings, Yun Wang, Jennifer A. Dervin, Kristopher C. Whitney
-
Publication number: 20210073044Abstract: Techniques for warm cloning of computing nodes are provided. A request to clone a first computing node is received. Upon determining that a first transaction of a plurality of transactions is ongoing, a first moment in time when data associated with the first transaction was coherent on the first computing node is identified. Tracking data related to the first transaction is collected, beginning at the first moment in time. Further, a first storage associated with the first computing node is copied to a second storage associated with a second computing node, where the first transaction continues during the copying. The tracking data related to the first transaction is then transmitted to the second computing node.Type: ApplicationFiled: September 5, 2019Publication date: March 11, 2021Inventors: Mark J. ANDERSON, Thomas P. GIORDANO, Scott D. HELT, David JONES, Curtis D. SCHEMMEL, Shauna ROLLINGS, Yun WANG, Jennifer A. DERVIN, Kristopher C. WHITNEY
-
Patent number: 10810199Abstract: A query optimizer improves the efficiency of a computer database system utilizing an input-output correlator used with a create function that indicates a correlation between an input to the function and an output of the function. In an example, the input-output correlator is an OR OUTPUT parameter of a create table function. The query optimizer determines whether it can pass a value of a query to the input of the function in response to the input-output correlator. Under appropriate conditions, the query optimizer passes the query value to the input of the function to significantly reduce the amount of data returned by the function thereby reducing the load on database resources.Type: GrantFiled: August 30, 2018Date of Patent: October 20, 2020Assignee: International Business Machines CorporationInventors: Craig S. Aldrich, Mark J. Anderson
-
Patent number: 10650156Abstract: Systems, methods, and computer program products to perform an operation comprising receiving, from an application executing on a system, a request to access a data file, receiving data describing the request, wherein the data describing the request includes data from a runtime stack of the application, wherein the data from the runtime stack includes a program statement number, identifying, in a protected memory block, a first rule for accessing the data file, wherein the first rule specifies a program statement number permitted to access the data file, and upon determining that the program statement number from the runtime stack does not match the program statement number specified in the first rule, restricting access to the data file by the application.Type: GrantFiled: April 26, 2017Date of Patent: May 12, 2020Assignee: International Business Machines CorporationInventors: Mark J. Anderson, Scott Forstie, Jeffrey M. Uehling
-
Publication number: 20200104532Abstract: Techniques for computer security are provided. A request to access a first file referenced as a variable in a source code of an application is received. A file name of the first file is then retrieved from a runtime stack, and the file name is stored in a system-wide accessible cross-reference file.Type: ApplicationFiled: December 3, 2019Publication date: April 2, 2020Inventors: Mark J. ANDERSON, Scott FORSTIE, Jeffrey M. UEHLING
-
Publication number: 20200073985Abstract: A query optimizer improves the efficiency of a computer database system utilizing an input-output correlator used with a create function that indicates a correlation between an input to the function and an output of the function. In an example, the input-output correlator is an OR OUTPUT parameter of a create table function. The query optimizer determines whether it can pass a value of a query to the input of the function in response to the input-output correlator. Under appropriate conditions, the query optimizer passes the query value to the input of the function to significantly reduce the amount of data returned by the function thereby reducing the load on database resources.Type: ApplicationFiled: August 30, 2018Publication date: March 5, 2020Inventors: Craig S. Aldrich, Mark J. Anderson
-
Patent number: 10540523Abstract: Systems, methods, and computer program products to perform an operation comprising receiving, from an application executing on a system, a request to access a data file, wherein the data file is referenced by a variable name in a source code of the application, receiving data describing the request, wherein the data describing the request is obtained from a runtime stack of the application and includes a name of the application and a name of the data file, wherein the name of the data file is used as a value for the variable name, and storing an indication that the application accessed the data file in a cross-reference data store for the system.Type: GrantFiled: April 26, 2017Date of Patent: January 21, 2020Assignee: International Business Machines CorporationInventors: Mark J. Anderson, Scott Forstie, Jeffrey M. Uehling
-
Patent number: 10346625Abstract: Systems, methods, and computer program products to perform an operation comprising monitoring a set of file access requests to a file from an application to obtain permission and identity information related to the monitored requests, wherein the monitoring includes obtaining a runtime stack from the application, determining, based on environment information in the runtime stack, whether a first set of privileges available to the application are greater than a second set of privileges available to a the user of the application, storing the permission and identity information and an indication of whether the first set of privileges is greater than the second set of privileges in a data file, and adjusting the privileges for the user based on the determination.Type: GrantFiled: October 31, 2016Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Mark J. Anderson, Carol S. Budnik, Anna P. Dietenberger, Scott Forstie, Brian J. Hasselbeck, Allen K. Mei, Ellen B. Streifel, Jeffrey M. Uehling
-
Publication number: 20190188309Abstract: A system and a method for keeping two versions of a mirrored database in sync is provided. A connection is monitored between a primary database and a secondary database. When a loss of the connection between the primary database and the secondary database is detected, the primary database is monitored for changes. When a modification is detected to at least one row in the primary database, a value of a change indicator is changed for the corresponding row indicating that the row was modified. Once the connection between the primary and the secondary databases is restored, the primary database is queried for the value of the change indicator indicating the corresponding row was modified to obtain a current value for data in the corresponding row of the primary database, and the corresponding row in the secondary database is updated with the current value for the corresponding row.Type: ApplicationFiled: December 14, 2017Publication date: June 20, 2019Inventors: Mark J. Anderson, David G. Carlson, Dan A. Christy, Thomas P. Giordano, David F. Owen
-
Publication number: 20180314845Abstract: Systems, methods, and computer program products to perform an operation comprising receiving, from an application executing on a system, a request to access a data file, receiving data describing the request, wherein the data describing the request includes data from a runtime stack of the application, wherein the data from the runtime stack includes a program statement number, identifying, in a protected memory block, a first rule for accessing the data file, wherein the first rule specifies a program statement number permitted to access the data file, and upon determining that the program statement number from the runtime stack does not match the program statement number specified in the first rule, restricting access to the data file by the application.Type: ApplicationFiled: April 26, 2017Publication date: November 1, 2018Inventors: Mark J. ANDERSON, Scott FORSTIE, Jeffrey M. UEHLING
-
Publication number: 20180314843Abstract: Systems, methods, and computer program products to perform an operation comprising receiving, from an application executing on a system, a request to access a data file, wherein the data file is referenced by a variable name in a source code of the application, receiving data describing the request, wherein the data describing the request is obtained from a runtime stack of the application and includes a name of the application and a name of the data file, wherein the name of the data file is used as a value for the variable name, and storing an indication that the application accessed the data file in a cross-reference data store for the system.Type: ApplicationFiled: April 26, 2017Publication date: November 1, 2018Inventors: Mark J. ANDERSON, Scott FORSTIE, Jeffrey M. UEHLING
-
Publication number: 20180121665Abstract: Systems, methods, and computer program products to perform an operation comprising monitoring a set of file access requests to a file from an application to obtain permission and identity information related to the monitored requests, wherein the monitoring includes obtaining a runtime stack from the application, determining, based on environment information in the runtime stack, whether a first set of privileges available to the application are greater than a second set of privileges available to a the user of the application, storing the permission and identity information and an indication of whether the first set of privileges is greater than the second set of privileges in a data file, and adjusting the privileges for the user based on the determination.Type: ApplicationFiled: October 31, 2016Publication date: May 3, 2018Inventors: Mark J. ANDERSON, Carol S. BUDNIK, Anna P. DIETENBERGER, Scott FORSTIE, Brian J. HASSELBECK, Allen K. MEI, Ellen B. STREIFEL, Jeffrey M. UEHLING
-
Patent number: 9951392Abstract: Methods and kits are provided for calibrating a cell-free protein synthesis reaction for optimal activity. The method includes the steps of providing an extract competent for cell-free protein synthesis (CFPS); performing cell-free protein synthesis with the extract; measuring a first reaction end-point where in vitro protein synthesis plateaus; measuring a second reaction end-point where Energy Charge of the extract declines to a level in a range from about 0.40 to about 0.80 of Energy Charge of a control extract; and adjusting Energy Charge of the extract to a level in a range from about 0.80 to about 1.0 of the control extract.Type: GrantFiled: March 16, 2015Date of Patent: April 24, 2018Assignee: Northwestern UniversityInventors: Michael C. Jewett, Jennifer A. Schoborg, Charles Eric Hodgman, Mark J. Anderson