Patents by Inventor Thomas Jarvis
Thomas Jarvis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10218575Abstract: A method of configuring a telecommunications network comprising the steps of: providing a first set of time dependent network data, a network related parameter varying with time; identifying abnormalities embedded within said first set of data; providing a first set of external event data; associating respective abnormalities with corresponding event data; generating a model to represent an impact of the, or each, class of event, represented by the event data; using the, or each, model in combination with extrapolated data to predict future variation in the network related parameter; repeating this simulation for alternative input conditions; selecting a solution from the output of one the simulations; and implementing a modification to the network corresponding to the/or each respective input condition.Type: GrantFiled: February 16, 2016Date of Patent: February 26, 2019Assignee: BAE SYSTEMS plcInventors: Iain Norman Nicol Reid, Richard Thomas Jarvis, David Nicholson
-
Publication number: 20180212829Abstract: A method of configuring a telecommunications network comprising the steps of: providing a first set of time dependent network data, a network related parameter varying with time; identifying abnormalities embedded within said first set of data; providing a first set of external event data; associating respective abnormalities with corresponding event data; generating a model to represent an impact of the, or each, class of event, represented by the event data; using the, or each, model in combination with extrapolated data to predict future variation in the network related parameter; repeating this simulation for alternative input conditions; selecting a solution from the output of one the simulations; and implementing a modification to the network corresponding to the/or each respective input condition.Type: ApplicationFiled: February 16, 2016Publication date: July 26, 2018Applicant: BAE SYSTEMS plcInventors: IAIN NORMAN NICOL REID, RICHARD THOMAS JARVIS, DAVID NICHOLSON
-
Patent number: 9934233Abstract: A method and apparatus are provided to store transaction records in a retrievable form and to enable subsequent search and retrieval of stored transaction records. Transaction records are captured and then grouped according to predetermined grouping criteria such that they may be indexed to a first level and then efficiently compressed for bulk storage. In the event that records need to be retrieved subsequently, the first level index may be used to select one or more groups of records satisfying first level search criteria and, following retrieval of the selected groups from storage and de-compression, a second level index may be created to enable a more detailed record-level search for matching records in the retrieved groups. Preferably, the same indexing technique is used for both the first and second level of indexing.Type: GrantFiled: December 16, 2013Date of Patent: April 3, 2018Assignee: BAE SYSTEMS plcInventors: Iain Norman Nicol Reid, Richard Thomas Jarvis, Dafydd Huw Lewis Winfield, Peter Stuart Gardiner
-
Patent number: 9294923Abstract: A mobile communications fraud detection system is provided in which one or more probe devices are deployed to intercept predetermined types of data being carried over selected interfaces within the mobile communications network. In particular, the probe devices are arranged to intercept data being carried between equipment responsible for providing the air interface to mobile communications devices using the network and equipment interfacing with the mobile network's core switching equipment. Fraudulent activity relating to gateway fraud, revenue sharing fraud, credit or debit card fraud, spam generation and fraudulent or other activity indicative of the presence of malware executing on a mobile communications device.Type: GrantFiled: August 30, 2012Date of Patent: March 22, 2016Assignee: BAE SYSTEMS plcInventors: Matthew John Meacham, Richard Thomas Jarvis
-
Publication number: 20150347443Abstract: A method and apparatus are provided to store transaction records in a retrievable form and to enable subsequent search and retrieval of stored transaction records. Transaction records are captured and then grouped according to predetermined grouping criteria such that they may be indexed to a first level and then efficiently compressed for bulk storage. In the event that records need to be retrieved subsequently, the first level index may be used to select one or more groups of records satisfying first level search criteria and, following retrieval of the selected groups from storage and de-compression, a second level index may be created to enable a more detailed record-level search for matching records in the retrieved groups. Preferably, the same indexing technique is used for both the first and second level of indexing.Type: ApplicationFiled: December 16, 2013Publication date: December 3, 2015Applicant: BAE SYSTEMS plcInventors: IAIN NORMAN NICOL REID, RICHARD THOMAS JARVIS, DAFYDD HUW LEWIS WINFIELD, PETER STUART GARDINER
-
Publication number: 20140370850Abstract: A mobile communications fraud detection system is provided in which one or more probe devices are deployed to intercept predetermined types of data being carried over selected interfaces within the mobile communications network. In particular, the probe devices are arranged to intercept data being carried between equipment responsible for providing the air interface to mobile communications devices using the network and equipment interfacing with the mobile network's core switching equipment. Fraudulent activity relating to gateway fraud, revenue sharing fraud, credit or debit card fraud, spam generation and fraudulent or other activity indicative of the presence of malware executing on a mobile communications device.Type: ApplicationFiled: August 30, 2012Publication date: December 18, 2014Applicant: BAE SYSTEMS plcInventors: Matthew John Meacham, Richard Thomas Jarvis
-
Patent number: 8870295Abstract: A cargo hauling attachment includes a frame and a bed hingedly secured to the frame. The frame is rigidly attached to the front of a tractor and the bed is pivotable relative to the frame by a linear actuator. A pair of freely rotating wheels is provided beneath the frame to support the attachment and to improve maneuverability of the attachment. A lift gate having multiple dual motion hinge assemblies may be provided in certain embodiments.Type: GrantFiled: October 12, 2011Date of Patent: October 28, 2014Inventors: Eric O. Pope, Thomas Jarvis
-
Publication number: 20070299904Abstract: Provided are a method, system, and program for managing resources in which a local processor sends remote operation requests to be executed by a remote processor having multiple resources. In the illustrated embodiment, the local processor and the remote processor each have a resource manager, each of which maintains a control set for each resource of the remote processor. Each control set of the remote processor resource manager includes a queue for queuing remote operation requests awaiting execution in connection with the resource associated with the control set. Each control set of the local processor resource manager includes a credit counter which keeps track of permissible outstanding remote operation requests. Each local processor control set credit counter is decremented for each remote operation request for the associated resource sent to the remote processor and is incremented for each acknowledgment received from the remote processor.Type: ApplicationFiled: September 7, 2007Publication date: December 27, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James Springer, Thomas Jarvis, Gail Spear, Sam Werner, Richard Martinez, Matthew Sanchez, Theresa Brown
-
Publication number: 20070294589Abstract: Method, apparatus and program product are provided for the invalidation of faulty metadata in a storage controller coupled to a host device. Faulty metadata may include metadata which no longer matches the associated customer data tracks stored on a DASD or other storage device. When faulty metadata is detected, metadata tracks are selected to be invalidated. A command is received through a host interface, without the controller being taken off-line from the host, and the specified metadata tracks are invalidated. Subsequently, the invalidated metadata tracks are rebuilt. The disclosed method, apparatus and program product invalidate the faulty metadata with reduced impact on normal host/controller I/O operations.Type: ApplicationFiled: August 29, 2007Publication date: December 20, 2007Applicant: IBM CORPORATIONInventors: Thomas Jarvis, Ronald Kern
-
Publication number: 20070186047Abstract: Provided are a method, system, and program for destaging a track from cache to a storage device. The destaged track is retained in the cache. Verification is made of whether the storage device successfully completed writing data. Indication is made of destaged tracks eligible for removal from the cache that were destaged before the storage device is verified in response to verifying that the storage device is successfully completing the writing of data.Type: ApplicationFiled: April 18, 2007Publication date: August 9, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas Jarvis, Michael Hartung, Karl Nielsen, Jeremy Pinson, Steven Lowe
-
Publication number: 20070154744Abstract: To mitigate bubble blockage in water passageways (78, 85), in or near reactant gas flow field plates (74, 81) of fuel cells (38), passageways are configured with (a) intersecting polygons, obtuse angles including triangles, trapezoids, or (b) hydrophobic surfaces (111), or (c) differing adjacent channels (127, 128), or (d) water permeable layers (93, 115, 116, 119) adjacent to water channels or hydrophobic/hydrophilic layers (114, 120).Type: ApplicationFiled: December 30, 2005Publication date: July 5, 2007Inventors: Robert Darling, Evan Rege, Ryan Balliet, Jeremy Meyers, Craig Evans, Thomas Jarvi
-
Publication number: 20070154747Abstract: To mitigate bubble blockage in water passageways (78, 85), in or near reactant gas flow field plates (74, 81) of fuel cells (38), passageways are configured with (a) cross sections having intersecting polygons or other shapes, obtuse angles including triangles and trapezoids, or (b) hydrophobic surfaces (111), or (c) differing adjacent channels (127, 128), or (d) water permeable layers (93, 115, 116, 119) adjacent to water channels or hydrophobic/hydrophilic layers (114, 120), or (e) diverging channels (152).Type: ApplicationFiled: December 13, 2006Publication date: July 5, 2007Inventors: Robert Darling, Evan Rege, Ryan Balliet, Jeremy Meyers, Craig Evans, Thomas Jarvi, Sitaram Ramaswamy
-
Publication number: 20070073907Abstract: Method, device and computer program product for determining a characteristic of an identifiable component. The method includes: receiving identification information representative of an identity of components that belong to a group of components, determining at least one characteristic of an identifiable component in response to the received identification information, and performing at least one characteristic responsive operation. The device includes an identifiable component and a component characteristic determiner. The component characteristic determiner is adapted to receive identification information representative of an identity of components that belong to a group of components and to determine at least one characteristic of the identifiable component in response to a relationship between the received identification information and reference identification information. The device is adapted to perform at least one characteristic responsive information.Type: ApplicationFiled: September 13, 2005Publication date: March 29, 2007Applicant: International Business Machines CorporationInventors: Michael Factor, Thomas Jarvis, Robert Kubo, Orit Nissan-Messing, Gary Valentin, Elena Yerushalmi, Aviad Zlotnick
-
Publication number: 20070028065Abstract: Provided are a method, system, and program for forming a consistency group of data. Information is provided on a consistency group relationship indicating a plurality of slave controllers and, for each indicated slave controller, a slave storage unit managed by the slave controller. A command is transmitted to each slave controller in the consistency group relationship to cause each slave controller to transmit data in the slave storage unit to a remote storage in a manner that forms the consistency group. A determination is made as to whether all the slave controllers successfully transmitted the data in the slave storage units that is part of the consistency group to the remote storage.Type: ApplicationFiled: September 6, 2006Publication date: February 1, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gail Spear, Robert Bartfai, Edward Lin, William Micka, Olympia Gluck, Aviad Zlotnick, Michael Factor, Thomas Jarvis, Sam Werner
-
Publication number: 20060224849Abstract: Provided are a method, system, and article of manufacture, wherein a request is received for switching a logical volume from one state to another state, wherein the logical volume is in a mirrored state if data corresponding to the logical volume is mirrored from a first storage to a second storage, and wherein the logical volume is in a non-mirrored state if the data corresponding to the logical volume is not mirrored from the first storage to the second storage. A determination is made as to whether to perform the switching, in response to receiving the request.Type: ApplicationFiled: March 31, 2005Publication date: October 5, 2006Inventors: Shah Rezaul Islam, Thomas Jarvis, Matthew Kalos, Robert Kubo
-
Publication number: 20060156308Abstract: A deadlock-prevention system includes a resource-access key passed from a parent process to a spawned process that includes the parent processes' level of access to a system resource. Optionally, the resource-access key includes a shared-access request based on the expectation by the parent process that the child process will need shared-access to a system resource. The resource-access key is presented by the child process to a resource-allocation algorithm. The resource-allocation algorithm identifies the resource-access key, allows the child process to bypass a resource-allocation queue, and grants shared access to the resource to the child process, preventing deadlock.Type: ApplicationFiled: January 7, 2005Publication date: July 13, 2006Inventors: Thomas Jarvis, Kenneth Todd
-
Publication number: 20060112312Abstract: An apparatus, system, and method are disclosed for adjusting trace data granularity. An initialization module sets a base granularity for trace data recorded for a component. A registration module registers a condition counter comprising a condition set. The threshold module sets a count threshold for the condition counter. An increment module counts each instance of the condition set. An adjustment module adjusts the granularity of trace data stored for the component to a modified granularity if the condition count exceeds the count threshold. In one embodiment, a timer module times an adjusted trace data granularity time interval. The adjustment module may set the granularity of the trace data to the base granularity when the adjusted trace data granularity time interval exceeds a specified time interval.Type: ApplicationFiled: November 18, 2004Publication date: May 25, 2006Inventors: Gary Dickenson, Thomas Jarvis, Paul Richards
-
Publication number: 20060106996Abstract: Provided are a method, system and program for updating data shared among systems. A first and second systems maintain a first and second copies, respectively, of shared data stored in a storage device. The first system obtains a first lock to the shared data, wherein the first lock applies to the first system accessing the shared data. The first system sends to the second system a first message requesting a second lock to the shared data, wherein the second lock applies to the second system accessing the shared data; The second system obtains the second lock to the shared data for the first system in response to the first message sends to the first system a second message indicating the second lock to the shared data was granted.Type: ApplicationFiled: November 15, 2004Publication date: May 18, 2006Inventors: Said Ahmad, Thomas Jarvis, Kenneth Todd
-
Publication number: 20060080510Abstract: A method is disclosed to manage a data cache. The method provides a data cache comprising a plurality of tracks, where each track comprises one or more segments. The method further maintains a first LRU list comprising one or more first tracks having a low reuse potential, maintains a second LRU list comprising one or more second tracks having a high reuse potential, and sets a target size for the first LRU list. The method then accesses a track, and determines if that accessed track comprises a first track. If the method determines that the accessed track comprises a first track, then the method increases the target size for said first LRU list. Alternatively, if the method determines that the accessed track comprises a second track, then the method decreases the target size for said first LRU list. The method demotes tracks from the first LRU list if its size exceeds the target size; otherwise, the method evicts tracks from the second LRU list.Type: ApplicationFiled: October 12, 2004Publication date: April 13, 2006Inventors: Michael Benhase, Binny Gill, Thomas Jarvis, Dharmendra Modha
-
Publication number: 20050257097Abstract: Method, apparatus and program product are provided for the invalidation of faulty metadata in a storage controller coupled to a host device. Faulty metadata may include metadata which no longer matches the associated customer data tracks stored on a DASD or other storage device. When faulty metadata is detected, metadata tracks are selected to be invalidated. A command is received through a host interface, without the controller being taken off-line from the host, and the specified metadata tracks are invalidated. Subsequently, the invalidated metadata tracks are rebuilt. The disclosed method, apparatus and program product invalidate the faulty metadata with reduced impact on normal host/controller I/O operations.Type: ApplicationFiled: April 30, 2004Publication date: November 17, 2005Applicant: International Business Machines (IBM) CorporationInventors: Thomas Jarvis, Ronald Kern