Patents by Inventor Thomas E. Hamilton
Thomas E. Hamilton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9881304Abstract: An API transaction risk assessment equipment is disclosed that receives an API transaction request through a data network from an application processed by a source node, and generates a risk assessment score based on context information that characterizes the API transaction request. The risk assessment score indicates a level of trustworthiness of the API transaction request for processing by an application on a destination node. The API transaction risk assessment equipment then controls deliverability of the API transaction request through the data network to the destination node for processing based on the risk assessment score. Corresponding methods by API transaction risk assessment equipment are disclosed.Type: GrantFiled: January 24, 2014Date of Patent: January 30, 2018Assignee: CA, Inc.Inventors: Kenneth William Scott Morrison, Thomas E. Hamilton, III, James D. Reno
-
Publication number: 20170343946Abstract: A method and system for monitoring replaceable components of a work unit is disclosed. The method assigns an RFID tag to each wear part of a work unit. Prior to each operating cycle, the RFID tags are read and the RFID tags are correlated to corresponding wear parts. During operation of the work unit, operating parameters are read from the pumping unit and associated with each of the wear parts. A real-time life cycle status is determined for each of the wear parts based upon historic operating parameters and present operating parameters. Based upon the real-time life cycle status, the system and method of the present disclosure predicts the remaining wear life and relays this information to interested third parties. Interested third parties can then contact the equipment owner to provide information as to when parts need to be replaced prior to failure.Type: ApplicationFiled: May 19, 2017Publication date: November 30, 2017Applicant: Construction Forms, Inc.Inventors: James L. Bury, Thomas E. Hamilton, Matthew Thomas Bullis
-
Patent number: 9769167Abstract: A method includes authenticating a user of a client device and sending a response to the client device. The response includes browser code configured to retrieve respective first values for a plurality of device properties from the client device. The method also includes storing session information for the user in a memory. The session information includes the first values and criteria for triggering validation of the client device. The method further includes receiving a request, sent from a requesting device, to access a protected resource and determining whether the request is authenticated by determining that the request is associated with the session information and determining that the criteria has been met. Determining whether the request is authenticated also includes retrieving respective second values for the plurality of device properties from the requesting device, and determining whether the second values match the first values to authenticate the request.Type: GrantFiled: June 18, 2014Date of Patent: September 19, 2017Assignee: CA, Inc.Inventors: David Arthur Mary, Herbert Paul Mehlhorn, Thomas E. Hamilton, III, Ganesh Gudaru, Rohit Ganda, Chavvakula Ravikanth
-
Patent number: 9661013Abstract: Methods of operating an application programming interface (API) request risk assessment system include receiving an API request from a source computer application that is directed to a destination computer application. A risk assessment score is generated based on a characteristic of the API request. The risk assessment score indicates a level of trustworthiness of the source computer application. Deliverability of the API request to the destination computer application is controlled based on the risk assessment score. Related methods of operating a source computer and related operations by API request risk assessment systems and source computers are disclosed.Type: GrantFiled: May 30, 2014Date of Patent: May 23, 2017Assignee: CA, INC.Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
-
Patent number: 9462011Abstract: A method includes receiving an application programming interface (API) request from a source computer application that is directed to a destination computer application. An attack response message that is configured to trigger operation of a defined action by the source computer application is sent to the source computer application. Deliverability of the API request to the destination computer application is controlled based on whether the attack response message triggered operation of the defined action. Related operations by API request risk assessment systems are disclosed.Type: GrantFiled: May 30, 2014Date of Patent: October 4, 2016Assignee: CA, Inc.Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
-
Patent number: 9386078Abstract: Some aspects of the present disclosure operate an application programming interface (API) risk assessment equipment. An API transaction request is received from an application processed by a source node. A risk assessment score is generated based on comparison of content of the API transaction request to content of earlier API transaction requests. The risk assessment score indicates trustworthiness of the API transaction request. Deliverability of the API transaction request to a destination node for processing is controlled based on the risk assessment score.Type: GrantFiled: May 30, 2014Date of Patent: July 5, 2016Assignee: CA, Inc.Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
-
Publication number: 20150373015Abstract: A method includes authenticating a user of a client device and sending a response to the client device. The response includes browser code configured to retrieve respective first values for a plurality of device properties from the client device. The method also includes storing session information for the user in a memory. The session information includes the first values and criteria for triggering validation of the client device. The method further includes receiving a request, sent from a requesting device, to access a protected resource and determining whether the request is authenticated by determining that the request is associated with the session information and determining that the criteria has been met. Determining whether the request is authenticated also includes retrieving respective second values for the plurality of device properties from the requesting device, and determining whether the second values match the first values to authenticate the request.Type: ApplicationFiled: June 18, 2014Publication date: December 24, 2015Applicant: CA, INC.Inventors: David Arthur Mary, Herbert Paul Mehlhorn, Thomas E. Hamilton, III, Ganesh Gudaru, Rohit Ganda, Chavvakula Ravikanth
-
Publication number: 20150350249Abstract: A method includes receiving an application programming interface (API) request from a source computer application that is directed to a destination computer application. An attack response message that is configured to trigger operation of a defined action by the source computer application is sent to the source computer application. Deliverability of the API request to the destination computer application is controlled based on whether the attack response message triggered operation of the defined action. Related operations by API request risk assessment systems are disclosed.Type: ApplicationFiled: May 30, 2014Publication date: December 3, 2015Applicant: CA, Inc.Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
-
Publication number: 20150350174Abstract: Some aspects of the present disclosure operate an application programming interface (API) risk assessment equipment. An API transaction request is received from an application processed by a source node. A risk assessment score is generated based on comparison of content of the API transaction request to content of earlier API transaction requests. The risk assessment score indicates trustworthiness of the API transaction request. Deliverability of the API transaction request to a destination node for processing is controlled based on the risk assessment score.Type: ApplicationFiled: May 30, 2014Publication date: December 3, 2015Applicant: CA, Inc.Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
-
Publication number: 20150350234Abstract: Methods of operating an application programming interface (API) request risk assessment system include receiving an API request from a source computer application that is directed to a destination computer application. A risk assessment score is generated based on a characteristic of the API request. The risk assessment score indicates a level of trustworthiness of the source computer application. Deliverability of the API request to the destination computer application is controlled based on the risk assessment score. Related methods of operating a source computer and related operations by API request risk assessment systems and source computers are disclosed.Type: ApplicationFiled: May 30, 2014Publication date: December 3, 2015Applicant: CA, Inc.Inventors: James D. Reno, Thomas E. Hamilton, III, Kenneth William Scott Morrison
-
Publication number: 20150213449Abstract: An API transaction risk assessment equipment is disclosed that receives an API transaction request through a data network from an application processed by a source node, and generates a risk assessment score based on context information that characterizes the API transaction request. The risk assessment score indicates a level of trustworthiness of the API transaction request for processing by an application on a destination node. The API transaction risk assessment equipment then controls deliverability of the API transaction request through the data network to the destination node for processing based on the risk assessment score. Corresponding methods by API transaction risk assessment equipment are disclosed.Type: ApplicationFiled: January 24, 2014Publication date: July 30, 2015Applicant: CA, Inc.Inventors: Kenneth William Scott Morrison, Thomas E. Hamilton, III, James D. Reno
-
Patent number: 7586871Abstract: A communication node and corresponding method for processing data communication passing through the node between a first data network and a second data network is described. The method includes detecting an event associated with data communication arriving at the node from the first data network, and determining whether the data communication is to be suspended for service at the node based on the detected event. Suspended data communication is processed based on information in the data communication. Return data communication arriving at the node from the second data network in response to the processed data communication from the first data network is detected. The detected return data communication is allowed to pass through the node without processing the detected return data communication.Type: GrantFiled: January 11, 2006Date of Patent: September 8, 2009Assignee: Bytemobile Network Services CorporationInventors: Thomas E. Hamilton, Chuanfei Chen, Kenneth Gerard Descoteaux, Clifford S. Atwood
-
Publication number: 20030182464Abstract: Managing messages by storing messages in queues and providing a macro queue that is associated with the queues. An application programming interface is initiates a request to the macro queue to obtain a message stored in one of the queues without identifying a particular queue. The macro queue selects a queue from among the queues, and then selects a message from the selected queue. The macro queue may select a message from a queue based on queue priority or queue service time quality. A remote queue proxy is used to establish a communication link between a remote application programming interface and the macro queue. The queues and the macro queue are implemented using object oriented programming principles.Type: ApplicationFiled: February 15, 2002Publication date: September 25, 2003Inventors: Thomas E. Hamilton, Kevin Kicklighter, Charles R. Davis
-
Publication number: 20030177283Abstract: A method in a network is provided. The method includes receiving messages from an application program in an application program interface (API), and passing the messages from the API to a control process in a mobile service switching platform (MSSP). A system is also provided. The system includes a Gateway General Packet Radio Service Support Node (GGSN) linked to control process in a Mobile Service Switching Platform (MSSP), a group of globally connected computers linked to the control process, an application program interface (API) connected to the control process, and an application system executing an application process linked to the API.Type: ApplicationFiled: March 18, 2002Publication date: September 18, 2003Inventors: Thomas E. Hamilton, Clifford S. Atwood
-
Publication number: 20020176377Abstract: A method of operating a wireless network is provided. A method of providing a sponsored packet switched data service including receiving a request in a wireless network for a sponsored packet switched data service from a user, determining a sponsor for the requested service in accordance with stored policies, determining a billing in accordance with the stored policies, monitoring a session between the user and the sponsor, and billing the sponsor on completion of the session. A method includes, in a wireless network, receiving a request from a user for a packet switched data service, determining a provider for the service according to stored policies, determining a billing arrangement for the service according to the stored policies, and tracking the service between the user and the provider.Type: ApplicationFiled: February 2, 2002Publication date: November 28, 2002Inventor: Thomas E. Hamilton
-
Publication number: 20020178118Abstract: A method of providing transaction-based packet switched data services on a wireless network is presented. A method of managing a wireless network includes receiving a user request for a packet switched data service, determining a provider for the service according to stored policies, and determining a billing arrangement for the service according to the stored policies.Type: ApplicationFiled: February 1, 2002Publication date: November 28, 2002Inventors: Thomas E. Hamilton, Simon Cavenett
-
Publication number: 20020176378Abstract: An approach to handling packet-based data communication sessions between users and one or more data services is used for creating, provisioning, and using the data services to monitor and control packet-based data sessions between mobile terminals in a wireless telephone network and service providers accessible to those mobile terminals over a data network, for example over the Internet. For any particular mobile terminal, multiple service interactions, which may overlap in time, can be handled during a period of time during which the mobile terminal maintains data communication with the system. In one aspect the approach features a provisioning a service on the node, which includes configuring a detection point for the service. The node processes communication. This processing includes monitoring the communication to identify matches to the configured detection point. On identifying a match to the configured detection point, service logic for the service is notified of the detection point.Type: ApplicationFiled: February 2, 2002Publication date: November 28, 2002Inventors: Thomas E. Hamilton, Clifford S. Atwood, Urmesh Sirsiwal, Kenneth Gerard Descoteaux
-
Publication number: 20020177431Abstract: A method of providing packet switched data services on a wireless network is presented. The method of providing a sponsored packet switched data service in a wireless network including receiving a request for a sponsored packet switched data service from a user, determining a sponsor for the requested service in accordance with stored policies, determining a session billing in accordance with the stored policies, establishing a session between the user and the sponsor, and billing the sponsor on completion of the session.Type: ApplicationFiled: February 1, 2002Publication date: November 28, 2002Inventors: Thomas E. Hamilton, Simon Cavenett