Patents by Inventor Ronald P. Doyle

Ronald P. Doyle has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20030208510
    Abstract: An adaptive data replication and caching system configured to enforce service terms at the network edge. Service terms can include, but are not limited to established quality of service (QoS) terms, as well as the terms of a service level agreement (SLA). This system can include a data caching system configured to cache application data in a data store and to satisfy queries for application data from the cache. The system also can include a data replication system configured to replicate application data in the data store and to satisfy queries for application data against the replicated application data. Finally, the adaptive data replication and caching system can include a configurator for configuring portions of the data store for exclusive use by the data caching system and the data replication system based upon the service terms.
    Type: Application
    Filed: April 12, 2002
    Publication date: November 6, 2003
    Applicant: International Business Machines Corporation
    Inventors: Ronald P. Doyle, Yongcheng Li, Dinesh Chandra Verma
  • Publication number: 20030195941
    Abstract: An adaptive data replication and caching system configured for deployment at the network edge. This system can include a data caching system configured to cache application data in a data store and to satisfy queries for application data from the cache. The system also can include a data replication system configured to replicate application data in the data store and to satisfy queries for application data against the replicated application data. Finally, the adaptive data replication and caching system can include a configurator for configuring portions of the data store for exclusive use by the data caching system and the data replication system.
    Type: Application
    Filed: April 12, 2002
    Publication date: October 16, 2003
    Applicant: International Business Machines Corporation
    Inventors: Khalil S. Amiri, Ronald P. Doyle, Yongcheng Li, Thomas Francis McElroy, Sanghyun Park, Renu Tewari, Dinesh Chandra Verman
  • Publication number: 20030187970
    Abstract: A method for managing multi-tier SLA relationships. The method can include first computing costs of utilizing edge server resources in a CDN, costs of dedicating content host resources in a content host in lieu of the utilization, and prospective revenues which can be generated by the content host providing services based on the resources to content consumers. Minimum QoS levels can be identified which must be maintained when providing the services to the content consumers according to QoS terms in established SLAs between the content host and individual ones of the content consumers. Finally, a new SLA can be established between the content host and the CDN. Importantly, the new SLA can include QoS terms for selectively allocating resources in the CDN. Moreover, the QoS terms can optimize revenues generated by the content host providing services based on the selective allocation of resources and the computed costs.
    Type: Application
    Filed: March 29, 2002
    Publication date: October 2, 2003
    Applicant: International Business Machines Corporation
    Inventors: Jeffrey S. Chase, Ronald P. Doyle, Steven D. Ims
  • Publication number: 20030159044
    Abstract: A method, system, computer program product, and method of doing business by providing a secure integrated device (such as a pervasive computing device) for which operating capabilities can be dynamically yet securely selected (including, but not limited to, pluggable connection of input/output devices and/or application processors that provide selected functions). Each input/output (I/O) device and application processor to be used is plugged in to a bus of a security core, and authenticates itself to the security core using public key infrastructure techniques, thereby creating a secure multi-function device. All of the multi-function device's input and output interactions with its environment necessarily traverse an I/O bus under the sole control of the security core. The only communication path between an application processor and the external environment (such as an I/O device) is through an application processor bus, which is likewise under control of the security core.
    Type: Application
    Filed: January 17, 2001
    Publication date: August 21, 2003
    Applicant: International Business Machines Corporation
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Peters
  • Publication number: 20030135522
    Abstract: Techniques are disclosed for storing content in distributed computing environments to reduce storage overhead and improve efficiency and/or speed of accessing and delivering the stored content. A content management system (or other authoring system, such as a text editor) supplies hints about dependencies among objects or files, such as which objects are embedded into a web page and which objects are referenced by the web page. These hints are then used when deploying the corresponding files on a storage system, such that the files which are likely to be retrieved together are (preferably) stored together. Optionally, run-time observations by a web server may be used as input to this process to determine how best to store content during a subsequent redeployment.
    Type: Application
    Filed: January 15, 2002
    Publication date: July 17, 2003
    Applicant: International Business Machines Corporation
    Inventors: Ronald P. Doyle, David L. Kaminsky
  • Publication number: 20030061278
    Abstract: Techniques are disclosed for addressing the name space mismatch between content servers (which use Uniform Resource Locators, or “URLs”) and content caching systems (which use file and path names). A file name-to-URL mapping is created for use by content caching systems, and data in protocol response messages (and optionally in protocol request messages) is augmented to transmit information for use in creating this mapping, enabling a content caching system to automatically and dynamically populate its file name-to-URL mapping. By having the file name available, the caching system can now respond to content management messages which identify the cached content by only the content's associated file name.
    Type: Application
    Filed: September 27, 2001
    Publication date: March 27, 2003
    Applicant: International Business Machines Corporation
    Inventors: Rajesh S. Agarwalla, Ronald P. Doyle, Tianyu Jiang, Thirumale Niranjan, Srikanth Ramamurthy
  • Publication number: 20030046357
    Abstract: Techniques are disclosed for storing document content in a manner which improves efficiency and/or speed of servicing content requests. Expected and/or observed popularity of stored objects is used to determine where a particular object should be physically placed in a distributed computing network. The disclosed techniques may be used for initially placing objects and/or for subsequently placing objects at different and/or additional locations in the network.
    Type: Application
    Filed: August 30, 2001
    Publication date: March 6, 2003
    Applicant: International Business Machines Corporation
    Inventors: Ronald P. Doyle, David L. Kaminsky, Rashmi Patel
  • Publication number: 20030046335
    Abstract: Techniques are disclosed for improving the serving of large objects (equivalently, large files) in distributed computing networks which include network-attached storage (“NAS”). Existing features of Hypertext Transfer Protocol (“HTTP”) and of Web server implementations are leveraged to achieve performance improvements in a novel way, and thereby greatly facilitate introduction of the present invention into existing networking environments. In particular, objects meeting certain criteria may be served using “redirect files” in which a redirect status code is used to cause content retrieval requests to be automatically redirected from the requesting client device to the NAS, such that the requested content is served from the NAS rather than through a Web server from a Web server farm.
    Type: Application
    Filed: August 30, 2001
    Publication date: March 6, 2003
    Applicant: International Business Machines Corporation
    Inventors: Ronald P. Doyle, David L. Kaminsky, David M. Ogle
  • Publication number: 20030043853
    Abstract: Methods, systems and computer program products are provided for determining if a packet has a spoofed source Internet Protocol (IP) address. A source media access control (MAC) address of the packet and the source IP address are evaluated to determine if the source IP address of the packet has been bound to the source MAC address at a source device of the packet. The packet is determined to have a spoofed source IP address if the evaluation indicates that the source IP address is not bound to the source MAC address. Such an evaluation may be made for packets having a subnet of the source IP address which matches a subnet from which the packet originated.
    Type: Application
    Filed: August 15, 2001
    Publication date: March 6, 2003
    Inventors: Ronald P. Doyle, John R. Hind, Thomas Narten, Marcia L. Peters
  • Publication number: 20030005116
    Abstract: An improved load balancing method, system, and computer program product handles popular object requests using a front-end cache, and hashing is applied only to the requests in the stream that were not handled by the front-end cache. A cache (e.g., a web proxy cache) is placed in front of a Level 7 switch, such that the cache services the popular requests from the cache based on the content of the request (e.g., based on the portion of an HTTP request following the domain name). The remaining requests are hashed and then routed to the back-end server. This allows the requests that make it past the cache to still be routed to the back-end server and take advantage of the efficiencies provided therefrom.
    Type: Application
    Filed: June 28, 2001
    Publication date: January 2, 2003
    Inventors: Jeffrey Scott Chase, Ronald P. Doyle
  • Publication number: 20020198659
    Abstract: The invention is a system combining a Global Positioning Satellite (GPS) receiver, an electronic compass and a two-way wireless communication system wherein a plurality of hunters each carry such a device. The device is adapted to determine its location using GPS, report that location to a base station or directly to other such devices, receive the location of the other hunters from the base station or directly from other of such devices, and to warn the hunter when aiming his weapon in the direction of another hunter that is within an unsafe distance.
    Type: Application
    Filed: June 20, 2001
    Publication date: December 26, 2002
    Inventors: Ronald P. Doyle, Marcia L. Peters
  • Publication number: 20020178259
    Abstract: Methods, systems, computer program products, and methods of doing business by performing load balancing of content requests using information regarding the cost of dynamically creating the requested document content. Cost metrics are gathered by a server which generates requested content, and may reflect processing at one or more other servers. This cost information is provided to a load balancing host. Several alternative approaches for providing the cost metrics may be used, including defining new headers for response messages, specifying cookie values, and so forth. The load balancing host may choose to route a subsequent request for that content to the server which most recently generated the content, or to another available server, depending on the cost of re-generating the content and the current load on those servers.
    Type: Application
    Filed: May 23, 2001
    Publication date: November 28, 2002
    Applicant: International Business Machines Corporation
    Inventors: Ronald P. Doyle, John R. Hind
  • Publication number: 20020099807
    Abstract: A cache management method and system for storing dynamic contents such as web pages. In a computing environment, a server maintains a cache for temporarily storing dynamic pages. Each of the cached pages is associated with resource information indicating a level of resources used to create the cached page. A newly created page replaces one of the cached pages in the cache if it is less expensive to recreate that cached page than to recreate the newly created page based on the resource information.
    Type: Application
    Filed: January 22, 2001
    Publication date: July 25, 2002
    Inventor: Ronald P. Doyle
  • Publication number: 20020095586
    Abstract: A method, system, computer program product, and method of doing business by improving security of a computing device. Continuous authentication of a user of the computing device, which may be (for example) a portable or personal computing device (also known as a “pervasive computing device”), is performed. The disclosed techniques also improve the security of operations or transactions carried out with such computing devices. Biometric sensors are preferably used for obtaining identifying information from users of computing devices, and this obtained information is compared to previously-stored biometric information which identifies the legitimate owner of the device. If the information matches, then it can be assumed that this user is the device owner, and a security-sensitive transaction is allowed to proceed so long as the biometric input is uninterrupted.
    Type: Application
    Filed: January 17, 2001
    Publication date: July 18, 2002
    Applicant: International Business Machines Corporation
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Peters
  • Publication number: 20020095587
    Abstract: A method, system, computer program product, and method of doing business by improving the security of transactions performed using smart cards, and also a card with an integrated biometric sensor. The disclosed techniques also improve the security of transactions carried out with devices such as personal or “pervasive computing” devices. Biometric sensors are used for obtaining identifying information from users of smart cards. In one aspect, this may be done by securely attaching a smart card reader and a biometric sensor to a security core which authenticates these devices using public key infrastructure techniques, and which securely controls information exchanged with these devices. In another aspect, this is done by integrating a biometric sensor with a smart card.
    Type: Application
    Filed: January 17, 2001
    Publication date: July 18, 2002
    Applicant: International Business Machines Corporation
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Peters
  • Patent number: 6315208
    Abstract: A method and system for providing temperature-sensitive water delivery using thermostatic controls on home plumbing systems including showers, sinks, and bathtubs. A biometric device is utilized to record user fingerprints and associate the user with a desired temperature setting. An electronic temperature control component is used to accurately specify the desired water temperature for the particular water outlet and a thermostatic gauge is used to determine when the desired temperature is reached. When the desired temperature is reached, then a specified action occurs to display this indication. An output display is used to indicate the fact that the desired temperature has been reached or the flow of water is diverted back to the output of the faucet. The water is routed to an input reservoir until the desired temperature is reached for the purpose of preventing burns or too hot (or cold) water coming out.
    Type: Grant
    Filed: May 23, 2000
    Date of Patent: November 13, 2001
    Assignee: International Business Machines Corporation
    Inventor: Ronald P. Doyle