Patents by Inventor RYAN THOMAS RAWLINS

RYAN THOMAS RAWLINS has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210034794
    Abstract: A system is provided. The system includes a computing resource, a cable insertable into the computing resource, a locking element and a controller. The locking element is configured to assume a locked condition in which the cable is locked to the computing resource or prevented from insertion into the computing resource and an unlocked condition in which the cable is removable from the computing resource and permitted to be inserted into the computing resource. The controller is configured to define rules for users. The rules are associated with respective identifiers (IDs) of each of the users and establish criteria associated with each user for causing the locking element to assume one of the locked and unlocked conditions.
    Type: Application
    Filed: July 29, 2019
    Publication date: February 4, 2021
    Inventors: Andrew C. M. Hicks, RYAN THOMAS RAWLINS, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Publication number: 20210036463
    Abstract: A locking element for use with a cable having a plug insertable into a plug receiver of a housing is provided. The locking element includes a connector body connected to the plug and including a receiving feature insertable through an aperture of the housing. The locking element further includes a locking feature configured to assume one of a locked condition in which the locking feature locks onto the receiving feature or prevents insertion of the receiving feature through the aperture and an unlocked condition in which the locking feature unlocks the receiving feature or permits insertion of the receiving feature through the aperture and an actuator coupled to the locking feature and configured to control the locking feature to assume the one of the locked and unlocked conditions.
    Type: Application
    Filed: July 29, 2019
    Publication date: February 4, 2021
    Inventors: Andrew C. M. Hicks, Khaalid Persaud Juggan McMillan, Christopher V. DeRobertis, RYAN THOMAS RAWLINS
  • Publication number: 20210034785
    Abstract: A system is provided and includes a securable resource, a locking element configured to assume a locked condition in which the securable resource is locked and an unlocked condition in which the securable resource is unlocked, a controller and a physical authentication interface. The controller is receptive of an instruction to authorize users to unlock the securable resource and configured to perform operating system (OS) level authentication of the users and OS level control of the locking element in accordance with the instruction to authorize users and the OS level authentication. The physical authentication interface is configured to enable or disable a capability of the controller to perform the OS level authentication.
    Type: Application
    Filed: July 29, 2019
    Publication date: February 4, 2021
    Inventors: Andrew C. M. Hicks, RYAN THOMAS RAWLINS, Christopher V. DeRobertis, Khaalid Persaud Juggan McMillan
  • Publication number: 20200394129
    Abstract: A method for automatically avoiding fault paths in software code of a System Under Test (SUT) includes generating a plurality of fingerprints by executing a plurality of regression tests. Each of the plurality of fingerprints uniquely identifies a specific code path in the software code of the SUT. A critical error is detected during execution of the software code of the SUT. A fault code path in the software code of the SUT associated with the critical error is identified by analyzing the plurality of generated fingerprints. At least one fingerprint associated with the fault code path in the software code of the SUT is identified. During subsequent execution of the software code of the SUT, the identified fault code path in the software code of the SUT is automatically prevented from being executed based on the identified at least one fingerprint.
    Type: Application
    Filed: June 13, 2019
    Publication date: December 17, 2020
    Inventors: Andrew Hicks, Dale E. Blue, Ryan Thomas Rawlins, Rachel Brill, Deborah A. Furman
  • Publication number: 20200394125
    Abstract: A method for identifying optimal tests includes defining functional coverage by a test suite based on a functional coverage model of a System Under Test (SUT). The test suite includes a plurality of tests. The functional coverage model includes a plurality of attributes, each attribute having a set of possible values. The functional coverage model defines possible combinations of values of the attributes as covered by the test suite. A subset of the possible combinations of values is determined. A subset of the plurality of tests is selected that is operative to cover the determined subset of the possible combinations of values. A plurality of trees is generated to represent the selected subset of tests. Complexity of the generated trees is analyzed based on user-specified criteria. An optimal tree is selected from the subset of the plurality of trees to achieve the objective of the test suite.
    Type: Application
    Filed: June 13, 2019
    Publication date: December 17, 2020
    Inventors: Andrew Hicks, Dale E. Blue, RYAN THOMAS RAWLINS
  • Publication number: 20200394127
    Abstract: Systems, methods, and computer-readable media are described for utilizing breakpoint value-based fingerprints of failing regression test cases to determine specific components of a System Under Test (SUT) that are causing a fault such as specific lines of source code. A failing test case from a regression run is selected and fault localization and inverse combinatorics techniques are employed to generate a set of failing test cases around the selected failing test case. A set of test fingerprints corresponding to the set of failing test cases is compared to a set of test fingerprints corresponding to a set of passing test cases to determine breakpoints that are indicated as being encountered during execution of at least one failing test case and that are not encountered during execution of any of the passing test cases. Specific lines of source code that correspond to these breakpoints are then identified as causing the fault.
    Type: Application
    Filed: June 13, 2019
    Publication date: December 17, 2020
    Inventors: ANDREW HICKS, DALE E. BLUE, RYAN THOMAS RAWLINS, STEVEN M. PARTLOW
  • Publication number: 20200394128
    Abstract: Systems, methods, and computer-readable media are described for performing revision control for a System Under Test (SUT) such as a body of source code. Prior to committing code changes, a collection of breakpoints associated with the portion(s) of source code being changed are determined. Stored fingerprints corresponding to regression test cases are evaluated to identify a set of stored fingerprints that are cumulatively indicative of the collection of breakpoints. Attributes respectively stored in association with the set of stored fingerprints are determined and a corresponding group of regression test cases are determined. The code changes are committed responsive to successful execution of the selected group of regression test cases.
    Type: Application
    Filed: June 13, 2019
    Publication date: December 17, 2020
    Inventors: ANDREW HICKS, DALE E. BLUE, RYAN THOMAS RAWLINS, STEVEN PARTLOW
  • Publication number: 20200394126
    Abstract: A method for reducing test case infrastructure includes generating a first plurality of fingerprints for a first plurality of test cases. Each of the first plurality of fingerprints is associated with one of the first plurality of test cases. Each of the first plurality of fingerprints uniquely identifies a specific code path covered by a corresponding test case. A second plurality of test cases is generated based on a functional coverage model of the SUT. A second plurality of fingerprints is generated for the second plurality of test cases. Each of the second plurality of fingerprints is associated with one of the second plurality of test cases. The first plurality of fingerprints is compared to the second plurality of fingerprints to identify one or more matching fingerprints. One or more test cases is identified within the first plurality of test cases associated with the one or more matching fingerprints.
    Type: Application
    Filed: June 13, 2019
    Publication date: December 17, 2020
    Inventors: Andrew Hicks, Dale E. Blue, RYAN THOMAS RAWLINS