Patents by Inventor Tyron Stading
Tyron Stading has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8782405Abstract: A method and apparatus is presented for providing transaction-level security. The method comprises determining security information associated with at least one object of a transaction and determining if a remote device is capable of providing a level of security indicated by at least a portion of the security information. The method further comprises transmitting the object to the remote device in response to determining that the remote device is capable of providing the level of security.Type: GrantFiled: March 18, 2004Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Folu Okunseinde, Tyron Stading
-
Publication number: 20110047166Abstract: In an embodiment, a computer-readable medium embodies instructions that, when executed by at least one processor, cause a computing system to perform operations including automatically defining one or more associations between a trademark record and a patent document and storing the one or more associations as mappings between trademarks and patent documents.Type: ApplicationFiled: August 20, 2009Publication date: February 24, 2011Applicant: Innography, Inc.Inventors: Tyron Stading, Roji John, Shu-Wai Chow
-
Patent number: 7827205Abstract: A computer implemented method is provided for a bi-directional data mapping tool. The method for mapping between at least two data models comprises selecting a source including a first data model, selecting a target including a second data model and defining a relationship between the data in the source and the data in the target. The method further comprises generating a bi-directional map from at least portions of the source, the target, and the defined relationship.Type: GrantFiled: May 27, 2004Date of Patent: November 2, 2010Assignee: International Business Machines CorporationInventors: Folu Okunseinde, Tyron Stading
-
Patent number: 7206977Abstract: An intelligent self-configurable adapter is provided. Before transferring data, the adapter configures itself. After configuring itself, the adapter then starts transmitting the data. During data transmission, the adapter monitors the connection to ensure that the transmission is within a certain performance level. If the data transfer falls below the performance level, the adapter may reconfigure itself using a recovery strategy.Type: GrantFiled: January 13, 2004Date of Patent: April 17, 2007Assignee: International Business Machines CorporationInventors: Folu Okunseinde, Tyron Stading
-
Publication number: 20070067779Abstract: Software application integration, including constructing an application integration adapter where the constructing is carried out in dependence upon a profile. The profile includes data describing the adapter. Embodiments include communicating integration messages among applications through the adapter. Profiles include identifications of at least two communications transports, including configuration parameters for the data communications transports. In typical embodiments, constructing an application integration adapter includes creating the transports identified in the adapter profile, and configuring the transports in accordance with the configuration parameters.Type: ApplicationFiled: August 28, 2006Publication date: March 22, 2007Inventors: Michael Gilfix, Jerry Malcolm, Foluso Okunseinde, Tyron Stading, Paul Williamson, Scott Winters
-
Publication number: 20060259447Abstract: Energy consumption meters are associated with owners who hold accounts with a power supplier. The meters are assigned meter identifiers and identifiers for their respective owners. Such a meter may be a parent meter having associated submeters. In response to being plugged into a power source from the power supplier, such a meter reports its owner identifier and meter identifier to the supplier. Also, in response to being plugged into a power source supplied by one of the parent meters, a meter communicates with the parent meter. This establishes that the parent meter is associated with the submeter. The submeter measures energy delivered reports this to the power supplier. Also, the indicated association of the submeter to the parent meter is reported to the power supplier. The receipt of this information enables the power supplier to debit and credit owner accounts in a manner permitting temporary associations of meters.Type: ApplicationFiled: May 26, 2005Publication date: November 16, 2006Inventors: Jennifer Kings, Robert Peterson, Jon Richter, Ian Spivey, Tyron Stading, Rhys Ulerich
-
Publication number: 20060255122Abstract: A mechanism for ensuring the authenticity of written and printed documents. With the mechanism of the present invention, electronic ink is deposited onto a document, wherein the electronic ink deposited comprises at least one mark visible to a user. Current is applied to the electronic ink while the electronic ink is wet. The current is applied to the electronic ink in order to imprint a pattern in the ink. The electronic ink deposited on the document is then allowed to dry. The pattern in the electronic ink may then be examined to verify the authenticity of the document.Type: ApplicationFiled: May 10, 2005Publication date: November 16, 2006Applicant: International Business Machines CorporationInventors: Michael Gilfix, Tyron Stading
-
Publication number: 20060004854Abstract: A computer implemented method is provided for a bi-directional data mapping tool. The method for mapping between at least two data models comprises selecting a source including a first data model, selecting a target including a second data model and defining a relationship between the data in the source and the data in the target. The method further comprises generating a bi-directional map from at least portions of the source, the target, and the defined relationship.Type: ApplicationFiled: May 27, 2004Publication date: January 5, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Folu Okunseinde, Tyron Stading
-
Publication number: 20060004810Abstract: Java class information is analyzed to determine if the code is standard for its particular class, and thus belongs to impliedly trustworthy software. An analysis tool performs a pre-analysis to train itself on standard class data for standard implementations of the object type and non-standard class data for non-standard implementations of the object type, and then performs a dynamic analysis of a received Java program to determine if its class data matches the criteria for a standard implementation of the object class.Type: ApplicationFiled: June 30, 2004Publication date: January 5, 2006Applicant: International Business Machines Corp.Inventors: Steven Atkin, Margot Casey, Tyron Stading
-
Publication number: 20060005161Abstract: An analysis tool extracts class data from Java objects originating from multiple vendors having a particular design specification. A database mining tool then creates training data from the extracted class data to create a definition of objects associated with the particular design specification. Various implementations of the defined classes are compared across various performance metrics, which are output for the program designer as a function of vendor. The designer then selects the best design choices based on the best practices of multiple vendors disclosed by the outputs of the analysis tool when implementing a new Java program.Type: ApplicationFiled: June 30, 2004Publication date: January 5, 2006Applicant: International Business Machines Corp.Inventors: Steven Atkin, Margot Casey, Tyron Stading
-
Publication number: 20060005166Abstract: An analysis tool extracts class data from Java objects within a potential plagiarizing Java program and the original Java program, and then compares classes common to the potential plagiarizing program and the original across various performance metrics. Similarities disclosed by the analysis tool are output for user or programmatic comparison of the matches between the potentially plagiarizing Java program byte code and the original program's byte code.Type: ApplicationFiled: June 30, 2004Publication date: January 5, 2006Inventors: Steven Atkin, Margot Casey, Tyron Stading
-
Publication number: 20060005177Abstract: Metadata describing common Java classes is extracted and utilized to optimize a Java program's performance based on the code requirements of the application. Data mining techniques extract metadata and other information about different sets of JVM byte code written by multiple vendors to determine the design choices and optimizations made by each vendor in implementing their JVM. Then, byte code in a Java application being programmed is analyzed in comparison to each vendor's JVM metadata and information. Based upon the application's requirements (for example footprint, performance, etc.), recommendations are generated that yield a newly compiled rt.jar that combines the best practices of each vendor together or recommends a particular vendor's standard JVM that is best suited for the application.Type: ApplicationFiled: June 30, 2004Publication date: January 5, 2006Applicant: International Business Machines Corp.Inventors: Steven Atkin, Margot Casey, Tyron Stading
-
Publication number: 20050234845Abstract: A tool is provided for testing integration logic in a hub-and-spoke integration scheme. The testing tool exercises all spokes of the integration project for all objects in the model. A test document is sent to each adapter, which converts the generic objects to application specific objects and then converts the application specific objects back to generic objects. The testing tool then documents the return document of each spoke. The result is a catalog of total mappings, partial mappings, and empty mappings. These results may be analyzed to identify disagreements, lost data, and unused fields. The model may then be corrected by updating the mappings.Type: ApplicationFiled: April 8, 2004Publication date: October 20, 2005Applicant: International Business Machines CorporationInventors: Foluso Okunseinde, Tyron Stading
-
Publication number: 20050209974Abstract: A method and apparatus is presented for providing transaction-level security. The method comprises determining security information associated with at least one object of a transaction and determining if a remote device is capable of providing a level of security indicated by at least a portion of the security information. The method further comprises transmitting the object to the remote device in response to determining that the remote device is capable of providing the level of security.Type: ApplicationFiled: March 18, 2004Publication date: September 22, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Folu Okunseinde, Tyron Stading
-
Publication number: 20050160306Abstract: An intelligent self-configurable adapter is provided. Before transferring data, the adapter configures itself. After configuring itself, the adapter then starts transmitting the data. During data transmission, the adapter monitors the connection to ensure that the transmission is within a certain performance level. If the data transfer falls below the performance level, the adapter may reconfigure itself using a recovery strategy.Type: ApplicationFiled: January 13, 2004Publication date: July 21, 2005Applicant: International Business Machines CorporationInventors: Folu Okunseinde, Tyron Stading
-
Publication number: 20050086690Abstract: Delivering interactive non-intrusive advertising content, including receiving a selection signal indicating that a user has selected an item displayed on a television screen, the item having associated non-intrusive interactive advertising content; identifying the selected item; and displaying the associated non-intrusive interactive advertising content. Embodiments typically include receiving and storing advertising data that associates the selected item with a screen region and with interactive advertising content. Receiving the advertising data often includes receiving the advertising data encoded in a video signal that includes a video image of the item. In some embodiments, the advertising data is encoded in a digital data stream separate from a video signal, and receiving the advertising data is carried out by receiving the data stream through a digital network.Type: ApplicationFiled: October 16, 2003Publication date: April 21, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Gilfix, Scott Winters, Tyron Stading
-
Publication number: 20050015614Abstract: Provided is an apparatus and method for detecting fraudulent passwords so that computer break-in attempts can be distinguished from authorized users incorrectly entering their passwords. An actual password is mapped against a computer keyboard and the resultant data is stored in memory. The profile of an entered password is compared to the stored profile. If the profile of the entered password differs significantly from the stored profile, then the login attempt is flagged as an attempted intrusion. In one embodiment of the current invention, passwords are mapped according to the distance subsequent keystrokes are from each other. Different embodiments may have different mapping schemes. For example, mapping data may correspond to statistical data that corresponds to the likelihood that a particular character is typed by mistake when another character is intended.Type: ApplicationFiled: July 17, 2003Publication date: January 20, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Gilfix, Foluso Okunseinde, Tyron Stading
-
Publication number: 20050005103Abstract: A system and method for securing code segments and ensuring proper execution using state-based encryption is presented. A class loader captures a memory state snapshot and uses the memory state snapshot for generating a key that encrypts a class. The class loader subsequently captures additional memory state snapshots at specific execution cycle times, and uses the memory state snapshots to generate additional keys that encrypt subsequent code segments. The encrypted code segments are stored in a file that is distributed to client computers. The client computer decrypts the individual code segments using keys that are generated from client memory state snapshots. If a particular code segment is not loaded in order or has been altered, the code segment is not decrypted properly and the software program terminates.Type: ApplicationFiled: June 12, 2003Publication date: January 6, 2005Applicant: International Business Machines CorporationInventors: Steven Atkin, Tyron Stading