Patents by Inventor Paul A. Ashley

Paul A. Ashley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9512782
    Abstract: An end-wall component of the mainstream gas annulus of a gas turbine engine has a cooling arrangement including one or more circumferentially extending rows of ballistic cooling holes through which, in use, dilution cooling air is jetted into the mainstream gas to reduce the mainstream gas temperature adjacent the end-wall. A portion of the cooling holes are first cooling holes angled such that the direction of the dilution cooling air jetted therethrough has, on entry into the mainstream gas annulus, a component in one tangential direction. A portion of the cooling holes are second cooling holes angled such that the direction of the dilution cooling air jetted therethrough has, on entry into the mainstream gas annulus, a component in the opposite tangential direction. The first and second cooling holes are arranged such that the cooling air from jets having entry components in opposing tangential directions collide and coalesce.
    Type: Grant
    Filed: November 4, 2013
    Date of Patent: December 6, 2016
    Assignee: ROLLS-ROYCE plc
    Inventors: Dougal Jackson, Paul Ashley Denman, Vivek Ross Savarianadam
  • Patent number: 9374689
    Abstract: A machine has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to match a communication sender number or a communication receiver number associated with a communication to a synthetic identity. A parameter associated with the synthetic identity is selected. Delivery of the communication is coordinated such that the recipient of the communication views the parameter upon receipt of the communication.
    Type: Grant
    Filed: December 19, 2014
    Date of Patent: June 21, 2016
    Assignee: Anonyome Labs, Inc.
    Inventors: Paul Ashley, Steve Shillingford, Greg Clark, Simon Canning, Tim Bartley, Neil Readshaw
  • Patent number: 9372987
    Abstract: A machine has a processor and a memory storing instructions executed by the processor to issue a challenge in response to a first request, evaluate a response to the challenge to establish confirmation that the first request originated from a human user, issue a user identification in response to the confirmation, store the user identification with encrypted identity data, receive a second request that includes the user identification, and return the encrypted identity data in response to the second request.
    Type: Grant
    Filed: December 19, 2014
    Date of Patent: June 21, 2016
    Assignee: Anonyome Labs, Inc.
    Inventors: Paul Ashley, Steve Shillingford, Greg Clark, Tim Bartley, Neil Readshaw, Christopher Choi
  • Publication number: 20160164685
    Abstract: One or more computer processors identify a first certificate that is used to establish a secure Internet connection. One or more computer processors identify a stored second certificate that shares at least one attribute with the first certificate. One or more computer processors determine a policy action based, at least in part, on a result of a comparison between an attribute of the first certificate and an attribute of the second certificate.
    Type: Application
    Filed: February 18, 2016
    Publication date: June 9, 2016
    Inventors: Paul A. Ashley, Carsten Hagemann
  • Publication number: 20160149950
    Abstract: A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer; directing all traffic from the illicit intrusion to the cloned computer; observing activities of the illicit intrusion interacting with the cloned computer; and dynamically adapting the cloned computer to perform activities of predicted interest to the illicit intrusion based on the observed activities of the illicit intrusion. The steps of the method may be performed by one or more computing devices.
    Type: Application
    Filed: November 21, 2014
    Publication date: May 26, 2016
    Inventors: Paul A. Ashley, Anthony M. Butler, Ghada M. ELKeissi, Leny Veliyathuparambil
  • Patent number: 9300656
    Abstract: One or more computer processors identify a first certificate that is used to establish a secure Internet connection. One or more computer processors identify a stored second certificate that shares at least one attribute with the first certificate. One or more computer processors determine a policy action based, at least in part, on a result of a comparison between an attribute of the first certificate and an attribute of the second certificate.
    Type: Grant
    Filed: August 21, 2014
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, Carsten Hagemann
  • Patent number: 9301132
    Abstract: A method, system and a computer program product for managing distribution of software updates in Near Field Communication (NFC) mobile devices includes retrieving information of one or more softwares in one or more NFC mobile devices by a NFC reader in communication range with the one or more NFC mobile devices, transmitting the retrieved information from the NFC reader to a distribution server which determines if the one or more softwares requires an update based on the retrieved information, in response to said determination, receiving an available updated software or update components of the one or more softwares from the distribution server to the NFC reader and transmitting thereof from the NFC reader to a secure element of the one or more NFC mobile devices whose one or more softwares require an updation.
    Type: Grant
    Filed: November 7, 2013
    Date of Patent: March 29, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
  • Publication number: 20160057131
    Abstract: One or more computer processors identify a first certificate that is used to establish a secure Internet connection. One or more computer processors identify a stored second certificate that shares at least one attribute with the first certificate. One or more computer processors determine a policy action based, at least in part, on a result of a comparison between an attribute of the first certificate and an attribute of the second certificate.
    Type: Application
    Filed: August 21, 2014
    Publication date: February 25, 2016
    Inventors: Paul A. Ashley, Carsten Hagemann
  • Publication number: 20160057133
    Abstract: One or more computer processors identify a first certificate that is used to establish a secure Internet connection. One or more computer processors identify a stored second certificate that shares at least one attribute with the first certificate. One or more computer processors determine a policy action based, at least in part, on a result of a comparison between an attribute of the first certificate and an attribute of the second certificate.
    Type: Application
    Filed: June 2, 2015
    Publication date: February 25, 2016
    Inventors: Paul A. Ashley, Carsten Hagemann
  • Patent number: 9270684
    Abstract: An approach is provided to verify a network address. In the approach, a network address is received from a domain name service (DNS) based on a requested uniform resource locator (URL) that corresponds to a requested domain. A set of one or more network addresses previously established as corresponding to the requested domain is retrieved from a data store accessible from the information handling system. The information handling system is automatically connected to the network address in response to the received network address matching one of the set of one or more retrieved network addresses.
    Type: Grant
    Filed: April 17, 2013
    Date of Patent: February 23, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Paul A. Ashley, Carsten Hagemann
  • Patent number: 9198031
    Abstract: A method, system and a computer program product for managing distribution of software updates in Near Field Communication (NFC) mobile devices includes retrieving information of one or more softwares in one or more NFC mobile devices by a NFC reader in communication range with the one or more NFC mobile devices, transmitting the retrieved information from the NFC reader to a distribution server which determines if the one or more softwares requires an update based on the retrieved information, in response to said determination, receiving an available updated software or update components of the one or more softwares from the distribution server to the NFC reader and transmitting thereof from the NFC reader to a secure element of the one or more NFC mobile devices whose one or more softwares require an updation.
    Type: Grant
    Filed: June 6, 2014
    Date of Patent: November 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
  • Patent number: 9154507
    Abstract: A role and entitlements mining system uses network intelligence to facilitate role definition. The system records traffic on a network. The traffic is analyzed to identify the user and application involved. The matched data is then provided to an analytics engine, which analyzes that data to attempt to derive an initial set of one or more roles and the application entitlements for each role. Each role derived by the analytics engine identifies one or more users who are identified as belonging to the role, as well as one or more application entitlements. Preferably, one or more directory services are then interrogated for known group and user relationships to detect whether the roles identified by the analytics engine can be modified or enriched. Evaluation of the known group and user relationships provides a way to identify a more granular set of role definitions. A role-based access control policy is then generated.
    Type: Grant
    Filed: October 15, 2012
    Date of Patent: October 6, 2015
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, John W. Court, Christopher J. Hockings
  • Patent number: 9088409
    Abstract: A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the exchange of security keys, the home TSM delegates to the roaming TSM access to the second partition of the SIM.
    Type: Grant
    Filed: June 25, 2013
    Date of Patent: July 21, 2015
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
  • Patent number: 9088410
    Abstract: A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the exchange of security keys, the home TSM delegates to the roaming TSM access to the second partition of the SIM.
    Type: Grant
    Filed: September 2, 2014
    Date of Patent: July 21, 2015
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
  • Publication number: 20150131797
    Abstract: A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.
    Type: Application
    Filed: March 7, 2014
    Publication date: May 14, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: PAUL A. ASHLEY, ANTHONY M. BUTLER, RAVI KOTHARI, YU-CHEN LIN
  • Publication number: 20150134561
    Abstract: A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.
    Type: Application
    Filed: November 8, 2013
    Publication date: May 14, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: PAUL A. ASHLEY, ANTHONY M. BUTLER, RAVI KOTHARI, YU-CHEN LIN
  • Publication number: 20150126110
    Abstract: A method, system and a computer program product for managing distribution of software updates in Near Field Communication (NFC) mobile devices includes retrieving information of one or more softwares in one or more NFC mobile devices by a NFC reader in communication range with the one or more NFC mobile devices, transmitting the retrieved information from the NFC reader to a distribution server which determines if the one or more softwares requires an update based on the retrieved information, in response to said determination, receiving an available updated software or update components of the one or more softwares from the distribution server to the NFC reader and transmitting thereof from the NFC reader to a secure element of the one or more NFC mobile devices whose one or more softwares require an updation.
    Type: Application
    Filed: June 6, 2014
    Publication date: May 7, 2015
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
  • Publication number: 20150126108
    Abstract: A method, system and a computer program product for managing distribution of software updates in Near Field Communication (NFC) mobile devices includes retrieving information of one or more softwares in one or more NFC mobile devices by a NFC reader in communication range with the one or more NFC mobile devices, transmitting the retrieved information from the NFC reader to a distribution server which determines if the one or more softwares requires an update based on the retrieved information, in response to said determination, receiving an available updated software or update components of the one or more softwares from the distribution server to the NFC reader and transmitting thereof from the NFC reader to a secure element of the one or more NFC mobile devices whose one or more softwares require an updation.
    Type: Application
    Filed: November 7, 2013
    Publication date: May 7, 2015
    Applicant: International Business Machines Corporation
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
  • Publication number: 20150074105
    Abstract: In a method for allocating and storing application data for applications of mobile devices, one or more processors receive one or more portions of application data of an application selected by a user of a mobile computing device. The one or more processors determine where to store each of the one or more portions of application data based on predefined instructions. The one or more processors cause each of the one or more portions of application data to be stored based on the determination.
    Type: Application
    Filed: August 27, 2014
    Publication date: March 12, 2015
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
  • Publication number: 20150074275
    Abstract: In a method for allocating and storing application data for applications of mobile devices, one or more processors receive one or more portions of application data of an application selected by a user of a mobile computing device. The one or more processors determine where to store each of the one or more portions of application data based on predefined instructions. The one or more processors cause each of the one or more portions of application data to be stored based on the determination.
    Type: Application
    Filed: September 10, 2013
    Publication date: March 12, 2015
    Applicant: International Business Machines Corporation
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin