Patents by Inventor Thomas E. Hamilton

Thomas E. Hamilton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9881304
    Abstract: An API transaction risk assessment equipment is disclosed that receives an API transaction request through a data network from an application processed by a source node, and generates a risk assessment score based on context information that characterizes the API transaction request. The risk assessment score indicates a level of trustworthiness of the API transaction request for processing by an application on a destination node. The API transaction risk assessment equipment then controls deliverability of the API transaction request through the data network to the destination node for processing based on the risk assessment score. Corresponding methods by API transaction risk assessment equipment are disclosed.
    Type: Grant
    Filed: January 24, 2014
    Date of Patent: January 30, 2018
    Assignee: CA, Inc.
    Inventors: Kenneth William Scott Morrison, Thomas E. Hamilton, III, James D. Reno
  • Publication number: 20170343946
    Abstract: A method and system for monitoring replaceable components of a work unit is disclosed. The method assigns an RFID tag to each wear part of a work unit. Prior to each operating cycle, the RFID tags are read and the RFID tags are correlated to corresponding wear parts. During operation of the work unit, operating parameters are read from the pumping unit and associated with each of the wear parts. A real-time life cycle status is determined for each of the wear parts based upon historic operating parameters and present operating parameters. Based upon the real-time life cycle status, the system and method of the present disclosure predicts the remaining wear life and relays this information to interested third parties. Interested third parties can then contact the equipment owner to provide information as to when parts need to be replaced prior to failure.
    Type: Application
    Filed: May 19, 2017
    Publication date: November 30, 2017
    Applicant: Construction Forms, Inc.
    Inventors: James L. Bury, Thomas E. Hamilton, Matthew Thomas Bullis
  • Patent number: 9769167
    Abstract: A method includes authenticating a user of a client device and sending a response to the client device. The response includes browser code configured to retrieve respective first values for a plurality of device properties from the client device. The method also includes storing session information for the user in a memory. The session information includes the first values and criteria for triggering validation of the client device. The method further includes receiving a request, sent from a requesting device, to access a protected resource and determining whether the request is authenticated by determining that the request is associated with the session information and determining that the criteria has been met. Determining whether the request is authenticated also includes retrieving respective second values for the plurality of device properties from the requesting device, and determining whether the second values match the first values to authenticate the request.
    Type: Grant
    Filed: June 18, 2014
    Date of Patent: September 19, 2017
    Assignee: CA, Inc.
    Inventors: David Arthur Mary, Herbert Paul Mehlhorn, Thomas E. Hamilton, III, Ganesh Gudaru, Rohit Ganda, Chavvakula Ravikanth
  • Patent number: 9661013
    Abstract: Methods of operating an application programming interface (API) request risk assessment system include receiving an API request from a source computer application that is directed to a destination computer application. A risk assessment score is generated based on a characteristic of the API request. The risk assessment score indicates a level of trustworthiness of the source computer application. Deliverability of the API request to the destination computer application is controlled based on the risk assessment score. Related methods of operating a source computer and related operations by API request risk assessment systems and source computers are disclosed.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: May 23, 2017
    Assignee: CA, INC.
    Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
  • Patent number: 9462011
    Abstract: A method includes receiving an application programming interface (API) request from a source computer application that is directed to a destination computer application. An attack response message that is configured to trigger operation of a defined action by the source computer application is sent to the source computer application. Deliverability of the API request to the destination computer application is controlled based on whether the attack response message triggered operation of the defined action. Related operations by API request risk assessment systems are disclosed.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: October 4, 2016
    Assignee: CA, Inc.
    Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
  • Patent number: 9386078
    Abstract: Some aspects of the present disclosure operate an application programming interface (API) risk assessment equipment. An API transaction request is received from an application processed by a source node. A risk assessment score is generated based on comparison of content of the API transaction request to content of earlier API transaction requests. The risk assessment score indicates trustworthiness of the API transaction request. Deliverability of the API transaction request to a destination node for processing is controlled based on the risk assessment score.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: July 5, 2016
    Assignee: CA, Inc.
    Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
  • Publication number: 20150373015
    Abstract: A method includes authenticating a user of a client device and sending a response to the client device. The response includes browser code configured to retrieve respective first values for a plurality of device properties from the client device. The method also includes storing session information for the user in a memory. The session information includes the first values and criteria for triggering validation of the client device. The method further includes receiving a request, sent from a requesting device, to access a protected resource and determining whether the request is authenticated by determining that the request is associated with the session information and determining that the criteria has been met. Determining whether the request is authenticated also includes retrieving respective second values for the plurality of device properties from the requesting device, and determining whether the second values match the first values to authenticate the request.
    Type: Application
    Filed: June 18, 2014
    Publication date: December 24, 2015
    Applicant: CA, INC.
    Inventors: David Arthur Mary, Herbert Paul Mehlhorn, Thomas E. Hamilton, III, Ganesh Gudaru, Rohit Ganda, Chavvakula Ravikanth
  • Publication number: 20150350249
    Abstract: A method includes receiving an application programming interface (API) request from a source computer application that is directed to a destination computer application. An attack response message that is configured to trigger operation of a defined action by the source computer application is sent to the source computer application. Deliverability of the API request to the destination computer application is controlled based on whether the attack response message triggered operation of the defined action. Related operations by API request risk assessment systems are disclosed.
    Type: Application
    Filed: May 30, 2014
    Publication date: December 3, 2015
    Applicant: CA, Inc.
    Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
  • Publication number: 20150350174
    Abstract: Some aspects of the present disclosure operate an application programming interface (API) risk assessment equipment. An API transaction request is received from an application processed by a source node. A risk assessment score is generated based on comparison of content of the API transaction request to content of earlier API transaction requests. The risk assessment score indicates trustworthiness of the API transaction request. Deliverability of the API transaction request to a destination node for processing is controlled based on the risk assessment score.
    Type: Application
    Filed: May 30, 2014
    Publication date: December 3, 2015
    Applicant: CA, Inc.
    Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
  • Publication number: 20150350234
    Abstract: Methods of operating an application programming interface (API) request risk assessment system include receiving an API request from a source computer application that is directed to a destination computer application. A risk assessment score is generated based on a characteristic of the API request. The risk assessment score indicates a level of trustworthiness of the source computer application. Deliverability of the API request to the destination computer application is controlled based on the risk assessment score. Related methods of operating a source computer and related operations by API request risk assessment systems and source computers are disclosed.
    Type: Application
    Filed: May 30, 2014
    Publication date: December 3, 2015
    Applicant: CA, Inc.
    Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
  • Publication number: 20150213449
    Abstract: An API transaction risk assessment equipment is disclosed that receives an API transaction request through a data network from an application processed by a source node, and generates a risk assessment score based on context information that characterizes the API transaction request. The risk assessment score indicates a level of trustworthiness of the API transaction request for processing by an application on a destination node. The API transaction risk assessment equipment then controls deliverability of the API transaction request through the data network to the destination node for processing based on the risk assessment score. Corresponding methods by API transaction risk assessment equipment are disclosed.
    Type: Application
    Filed: January 24, 2014
    Publication date: July 30, 2015
    Applicant: CA, Inc.
    Inventors: Kenneth William Scott Morrison, Thomas E. Hamilton, III, James D. Reno
  • Patent number: 7586871
    Abstract: A communication node and corresponding method for processing data communication passing through the node between a first data network and a second data network is described. The method includes detecting an event associated with data communication arriving at the node from the first data network, and determining whether the data communication is to be suspended for service at the node based on the detected event. Suspended data communication is processed based on information in the data communication. Return data communication arriving at the node from the second data network in response to the processed data communication from the first data network is detected. The detected return data communication is allowed to pass through the node without processing the detected return data communication.
    Type: Grant
    Filed: January 11, 2006
    Date of Patent: September 8, 2009
    Assignee: Bytemobile Network Services Corporation
    Inventors: Thomas E. Hamilton, Chuanfei Chen, Kenneth Gerard Descoteaux, Clifford S. Atwood
  • Publication number: 20030182464
    Abstract: Managing messages by storing messages in queues and providing a macro queue that is associated with the queues. An application programming interface is initiates a request to the macro queue to obtain a message stored in one of the queues without identifying a particular queue. The macro queue selects a queue from among the queues, and then selects a message from the selected queue. The macro queue may select a message from a queue based on queue priority or queue service time quality. A remote queue proxy is used to establish a communication link between a remote application programming interface and the macro queue. The queues and the macro queue are implemented using object oriented programming principles.
    Type: Application
    Filed: February 15, 2002
    Publication date: September 25, 2003
    Inventors: Thomas E. Hamilton, Kevin Kicklighter, Charles R. Davis
  • Publication number: 20030177283
    Abstract: A method in a network is provided. The method includes receiving messages from an application program in an application program interface (API), and passing the messages from the API to a control process in a mobile service switching platform (MSSP). A system is also provided. The system includes a Gateway General Packet Radio Service Support Node (GGSN) linked to control process in a Mobile Service Switching Platform (MSSP), a group of globally connected computers linked to the control process, an application program interface (API) connected to the control process, and an application system executing an application process linked to the API.
    Type: Application
    Filed: March 18, 2002
    Publication date: September 18, 2003
    Inventors: Thomas E. Hamilton, Clifford S. Atwood
  • Publication number: 20020176377
    Abstract: A method of operating a wireless network is provided. A method of providing a sponsored packet switched data service including receiving a request in a wireless network for a sponsored packet switched data service from a user, determining a sponsor for the requested service in accordance with stored policies, determining a billing in accordance with the stored policies, monitoring a session between the user and the sponsor, and billing the sponsor on completion of the session. A method includes, in a wireless network, receiving a request from a user for a packet switched data service, determining a provider for the service according to stored policies, determining a billing arrangement for the service according to the stored policies, and tracking the service between the user and the provider.
    Type: Application
    Filed: February 2, 2002
    Publication date: November 28, 2002
    Inventor: Thomas E. Hamilton
  • Publication number: 20020178118
    Abstract: A method of providing transaction-based packet switched data services on a wireless network is presented. A method of managing a wireless network includes receiving a user request for a packet switched data service, determining a provider for the service according to stored policies, and determining a billing arrangement for the service according to the stored policies.
    Type: Application
    Filed: February 1, 2002
    Publication date: November 28, 2002
    Inventors: Thomas E. Hamilton, Simon Cavenett
  • Publication number: 20020176378
    Abstract: An approach to handling packet-based data communication sessions between users and one or more data services is used for creating, provisioning, and using the data services to monitor and control packet-based data sessions between mobile terminals in a wireless telephone network and service providers accessible to those mobile terminals over a data network, for example over the Internet. For any particular mobile terminal, multiple service interactions, which may overlap in time, can be handled during a period of time during which the mobile terminal maintains data communication with the system. In one aspect the approach features a provisioning a service on the node, which includes configuring a detection point for the service. The node processes communication. This processing includes monitoring the communication to identify matches to the configured detection point. On identifying a match to the configured detection point, service logic for the service is notified of the detection point.
    Type: Application
    Filed: February 2, 2002
    Publication date: November 28, 2002
    Inventors: Thomas E. Hamilton, Clifford S. Atwood, Urmesh Sirsiwal, Kenneth Gerard Descoteaux
  • Publication number: 20020177431
    Abstract: A method of providing packet switched data services on a wireless network is presented. The method of providing a sponsored packet switched data service in a wireless network including receiving a request for a sponsored packet switched data service from a user, determining a sponsor for the requested service in accordance with stored policies, determining a session billing in accordance with the stored policies, establishing a session between the user and the sponsor, and billing the sponsor on completion of the session.
    Type: Application
    Filed: February 1, 2002
    Publication date: November 28, 2002
    Inventors: Thomas E. Hamilton, Simon Cavenett