Patents by Inventor Robert B. Nicholson
Robert B. Nicholson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160132522Abstract: According to one exemplary embodiment, a method for time-shifted uploading of a data file through a backhaul network to a backend provider is provided. The method may include intercepting an upload request from an originating user located at a network edge. The method may include caching the data file associated with the upload request upstream of the backhaul network. This method may include uploading a placeholder file to the backend provider. The method may include receiving a file ID from the backend provider. The method may include mapping the received file ID to the cached data file. The method may include intercepting a request to access the data file by a requesting user. The method may include sending the requesting user the cached data file. The method may include uploading a copy of the data file to the backend provider based on a backhaul utilization policy.Type: ApplicationFiled: November 11, 2014Publication date: May 12, 2016Inventors: Kang-Won Lee, Robert B. Nicholson, Ramya Raghavendra, Paul Schmitt, Dinesh C. Verma
-
Patent number: 9312991Abstract: Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet.Type: GrantFiled: October 4, 2012Date of Patent: April 12, 2016Assignee: International Business Machines CorporationInventors: Dakshi Agrawal, Bruce O. Anthony, Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh C. Verma
-
Patent number: 9312990Abstract: Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet.Type: GrantFiled: September 13, 2012Date of Patent: April 12, 2016Assignee: International Business Machines CorporationInventors: Dakshi Agrawal, Bruce O. Anthony, Jr., Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh C. Verma
-
Patent number: 9288234Abstract: A method of operating a network message interceptor for enforcing a security policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, and the security policy identifying at least one valid security standards for communication over the network, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting from the handshake message an identification of a security standard selected for the communication between the first and second endpoints; determining a validity status of the identified security standard based on the security policy; and preventing communication between the first and second endpoints based on a negatively determined validity status of the identified security standard.Type: GrantFiled: July 31, 2012Date of Patent: March 15, 2016Assignee: International Business Machines CorporationInventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
-
Patent number: 9288718Abstract: Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism.Type: GrantFiled: February 15, 2013Date of Patent: March 15, 2016Assignee: International Business Machines CorporationInventors: Dakshi Agrawal, Bongjun Ko, Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh Verma
-
Patent number: 9264365Abstract: Embodiments of the present invention provide a method, system and computer program product for split transport control protocol (TCP) flow control management in a cellular broadband network. In an embodiment of the invention, a method for split TCP flow control management in a cellular broadband network is provided. The method includes first determining a context for a packet received as part of a data flow in a base station of a cellular broadband network and then selecting either an end-to-end TCP connection or a split TCP connection to support the data flow. Thereafter, the data flow is routed using the selected connection.Type: GrantFiled: July 31, 2012Date of Patent: February 16, 2016Assignee: International Business Machines CorporationInventors: Dakshi Agrawal, Bruce O. Anthony, Jr., Thai V. (Franck) Le, Robert B. Nicholson, Vasileios Pappas, Maroun Touma, Dinesh Verma
-
Publication number: 20160044023Abstract: A method of operating a network message interceptor for enforcing an authentication policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting a certificate for an authenticating one of the endpoints from the handshake message; determining a validity status of the certificate for confirming an identity of the authenticating endpoint; and preventing communication between the first and second endpoints based on a negatively determined validity status of the certificate.Type: ApplicationFiled: October 22, 2015Publication date: February 11, 2016Applicant: GLOBALFOUNDRIES Inc.Inventors: Arthur J. Barr, Oliver M. Deakin, Robert B. Nicholson, Colin J. Thorne
-
Patent number: 9253278Abstract: Disclosed is a program for validating a web cache independent of an origin server. A computer in between a client computer and the origin server computer receives a request for a resource and an entity tag (ETag) corresponding to the request. The computer forwards the request to the origin server and subsequently receives the resource. The computer generates an ETag for the received resource and compares the generated ETag to the ETag corresponding to the request. If the ETags match, the computer sends an indication toward the client computer that the resource has not been modified.Type: GrantFiled: January 30, 2012Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventors: Stuart J. Hayton, David R. Jones, Alwyn R. Lobo, Robert B. Nicholson, Graeme P. Vetterlein
-
Publication number: 20160028816Abstract: An apparatus for controlling a storage system having a data replication function, comprises: a storage array component being operable to send notification to a replication engine that a write of data to a primary storage location by a host is subject to data replication; the replication engine being operable to receive the notification and in response to instruct the storage array to copy the data to a secondary storage location; wherein the data is copied to the secondary storage location unmediated by the replication engine.Type: ApplicationFiled: October 5, 2015Publication date: January 28, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kenneth F. DAY, Robert B. NICHOLSON, Lee J. SANDERS, William J. SCALES
-
Publication number: 20150382176Abstract: Various embodiments detecting wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity.Type: ApplicationFiled: September 2, 2015Publication date: December 31, 2015Applicant: International Business Machines CorporationInventors: Dakshi AGRAWAL, Bongjun KO, Franck LE, Robert B. NICHOLSON, Vasileios PAPPAS, Dinesh VERMA
-
Publication number: 20150350872Abstract: Various embodiments detect wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity.Type: ApplicationFiled: August 12, 2015Publication date: December 3, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dakshi AGRAWAL, Bongjun KO, Franck LE, Robert B. NICHOLSON, Vasileios PAPPAS, Dinesh VERMA
-
Patent number: 9191827Abstract: Various embodiments detect wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity.Type: GrantFiled: February 15, 2013Date of Patent: November 17, 2015Assignee: International Business Machines CorporationInventors: Dakshi Agrawal, Bongjun Ko, Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh Verma
-
Patent number: 9167438Abstract: Various embodiments detecting wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity.Type: GrantFiled: August 31, 2012Date of Patent: October 20, 2015Assignee: International Business Machines CorporationInventors: Dakshi Agrawal, Bongjun Ko, Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh Verma
-
Patent number: 9152515Abstract: An apparatus for controlling a storage system having a data replication function, comprises: a storage array component being operable to send notification to a replication engine that a write of data to a primary storage location by a host is subject to data replication; the replication engine being operable to receive the notification and in response to instruct the storage array to copy the data to a secondary storage location; wherein the data is copied to the secondary storage location unmediated by the replication engine.Type: GrantFiled: November 27, 2007Date of Patent: October 6, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kenneth F. Day, III, Robert B. Nicholson, Lee J. Sanders, Bill J. Seales
-
Patent number: 9125032Abstract: A method, system, and computer program product for caching data in a cellular network is provided. Information from a cellular network regarding location, speed, direction of travel, and bandwidth for a user can be used to determine how much data should be cached for the user. More specifically, the time period for how long a user will be in a cell of a cellular network can be calculated using information received from the cellular network. The calculated time period can be used to calculate how much data will be used by a user for the calculated time period with only the amount of data needed for the time period being cached.Type: GrantFiled: May 2, 2013Date of Patent: September 1, 2015Assignee: International Business Machines CorporationInventors: Erik J. Burckart, Duke Chang, Victor S. Moore, Robert B. Nicholson
-
Publication number: 20150156607Abstract: A mobile device is associated with a mobile communications network. The mobile device comprises: a transmitter for sending a request, to the mobile communications network, for a secure location verification (LV) message; a receiver for receiving the requested LV message, wherein the LV message is digitally secured so as to enable a selected third party application program to verify an authenticity of the LV message, wherein the LV message comprises location data determined by the mobile communications network as representing a location of the mobile device and identification data for identifying the mobile device; and the transmitter for sending the received LV message to the third party application program so as to enable the third party application program to verify the location of the mobile device.Type: ApplicationFiled: November 25, 2014Publication date: June 4, 2015Inventors: BHARAT V. BEDI, ROBERT B. NICHOLSON
-
Patent number: 9014023Abstract: Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A first service mechanism in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services based on the broken out data. A second service mechanism in the core network performs one or more mobile network services based on the network traffic remaining after the first service mechanism performs its breakout. An optional third service mechanism coupled to the core network provides one or more mobile network services in the mobile data network. An overlay network allows the first, second and third service mechanisms to communicate with each other. The overlay network is preferably a private virtual network.Type: GrantFiled: September 15, 2011Date of Patent: April 21, 2015Assignee: International Business Machines CorporationInventors: Bruce O. Anthony, Jr., Ronald L. Billau, Canio Cillis, Robert B. Nicholson
-
Publication number: 20150032974Abstract: Method and system are provided for object caching with mobility management for mobile data communication. The method may include: intercepting and snooping data communications at a base station between a user equipment and a content server without terminating communications; implementing object caching at the base station using snooped data communications; implementing object caching at an object cache server in the network, wherein the object cache server proxies communications to the content server from the user equipment; and maintaining synchrony between an object cache at the base station and an object cache at the object cache server.Type: ApplicationFiled: February 8, 2013Publication date: January 29, 2015Inventors: Oliver M. Deakin, Victor S. Moore, Robert B. Nicholson, Colin J. Thorne
-
Publication number: 20150033072Abstract: A computer receives a heartbeat message that includes both program reset information and at least one segment, of the heartbeat message, that is configured to indicate whether or not a first program is functioning correctly. The computer determines if the heartbeat message includes the indication that the first program is functioning correctly. If the computer determines that the heartbeat message indicates that the first program is functioning correctly, then the computer sends a data stream to the first program.Type: ApplicationFiled: July 26, 2013Publication date: January 29, 2015Applicant: International Business Machines CorporationInventors: Arthur J. Barr, Stuart J. Hayton, Robert B. Nicholson, Colin J. Thorne
-
Publication number: 20150029940Abstract: Method and system are provided for optimization of mobile data communication using byte caching. The method includes: intercepting data communications at a base station, wherein the data communications are between a user equipment and a network; and implementing byte caching at the base station to optimize data transfer between the base station and a byte cache server in the network at a peering point; wherein the network containing the base station supports mobility management of data transfer to and from the user equipment. The method includes providing a byte cache server as a transparent proxy with byte caching functionality where traffic for the user equipment is no longer tunnelled.Type: ApplicationFiled: February 5, 2013Publication date: January 29, 2015Applicant: International Business Machines CorporationInventors: Dakshi Agrawal, Victor S. Moore, Robert B. Nicholson