Patents by Inventor Tyron Stading

Tyron Stading has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8782405
    Abstract: A method and apparatus is presented for providing transaction-level security. The method comprises determining security information associated with at least one object of a transaction and determining if a remote device is capable of providing a level of security indicated by at least a portion of the security information. The method further comprises transmitting the object to the remote device in response to determining that the remote device is capable of providing the level of security.
    Type: Grant
    Filed: March 18, 2004
    Date of Patent: July 15, 2014
    Assignee: International Business Machines Corporation
    Inventors: Folu Okunseinde, Tyron Stading
  • Publication number: 20110047166
    Abstract: In an embodiment, a computer-readable medium embodies instructions that, when executed by at least one processor, cause a computing system to perform operations including automatically defining one or more associations between a trademark record and a patent document and storing the one or more associations as mappings between trademarks and patent documents.
    Type: Application
    Filed: August 20, 2009
    Publication date: February 24, 2011
    Applicant: Innography, Inc.
    Inventors: Tyron Stading, Roji John, Shu-Wai Chow
  • Patent number: 7827205
    Abstract: A computer implemented method is provided for a bi-directional data mapping tool. The method for mapping between at least two data models comprises selecting a source including a first data model, selecting a target including a second data model and defining a relationship between the data in the source and the data in the target. The method further comprises generating a bi-directional map from at least portions of the source, the target, and the defined relationship.
    Type: Grant
    Filed: May 27, 2004
    Date of Patent: November 2, 2010
    Assignee: International Business Machines Corporation
    Inventors: Folu Okunseinde, Tyron Stading
  • Patent number: 7206977
    Abstract: An intelligent self-configurable adapter is provided. Before transferring data, the adapter configures itself. After configuring itself, the adapter then starts transmitting the data. During data transmission, the adapter monitors the connection to ensure that the transmission is within a certain performance level. If the data transfer falls below the performance level, the adapter may reconfigure itself using a recovery strategy.
    Type: Grant
    Filed: January 13, 2004
    Date of Patent: April 17, 2007
    Assignee: International Business Machines Corporation
    Inventors: Folu Okunseinde, Tyron Stading
  • Publication number: 20070067779
    Abstract: Software application integration, including constructing an application integration adapter where the constructing is carried out in dependence upon a profile. The profile includes data describing the adapter. Embodiments include communicating integration messages among applications through the adapter. Profiles include identifications of at least two communications transports, including configuration parameters for the data communications transports. In typical embodiments, constructing an application integration adapter includes creating the transports identified in the adapter profile, and configuring the transports in accordance with the configuration parameters.
    Type: Application
    Filed: August 28, 2006
    Publication date: March 22, 2007
    Inventors: Michael Gilfix, Jerry Malcolm, Foluso Okunseinde, Tyron Stading, Paul Williamson, Scott Winters
  • Publication number: 20060259447
    Abstract: Energy consumption meters are associated with owners who hold accounts with a power supplier. The meters are assigned meter identifiers and identifiers for their respective owners. Such a meter may be a parent meter having associated submeters. In response to being plugged into a power source from the power supplier, such a meter reports its owner identifier and meter identifier to the supplier. Also, in response to being plugged into a power source supplied by one of the parent meters, a meter communicates with the parent meter. This establishes that the parent meter is associated with the submeter. The submeter measures energy delivered reports this to the power supplier. Also, the indicated association of the submeter to the parent meter is reported to the power supplier. The receipt of this information enables the power supplier to debit and credit owner accounts in a manner permitting temporary associations of meters.
    Type: Application
    Filed: May 26, 2005
    Publication date: November 16, 2006
    Inventors: Jennifer Kings, Robert Peterson, Jon Richter, Ian Spivey, Tyron Stading, Rhys Ulerich
  • Publication number: 20060255122
    Abstract: A mechanism for ensuring the authenticity of written and printed documents. With the mechanism of the present invention, electronic ink is deposited onto a document, wherein the electronic ink deposited comprises at least one mark visible to a user. Current is applied to the electronic ink while the electronic ink is wet. The current is applied to the electronic ink in order to imprint a pattern in the ink. The electronic ink deposited on the document is then allowed to dry. The pattern in the electronic ink may then be examined to verify the authenticity of the document.
    Type: Application
    Filed: May 10, 2005
    Publication date: November 16, 2006
    Applicant: International Business Machines Corporation
    Inventors: Michael Gilfix, Tyron Stading
  • Publication number: 20060004854
    Abstract: A computer implemented method is provided for a bi-directional data mapping tool. The method for mapping between at least two data models comprises selecting a source including a first data model, selecting a target including a second data model and defining a relationship between the data in the source and the data in the target. The method further comprises generating a bi-directional map from at least portions of the source, the target, and the defined relationship.
    Type: Application
    Filed: May 27, 2004
    Publication date: January 5, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Folu Okunseinde, Tyron Stading
  • Publication number: 20060004810
    Abstract: Java class information is analyzed to determine if the code is standard for its particular class, and thus belongs to impliedly trustworthy software. An analysis tool performs a pre-analysis to train itself on standard class data for standard implementations of the object type and non-standard class data for non-standard implementations of the object type, and then performs a dynamic analysis of a received Java program to determine if its class data matches the criteria for a standard implementation of the object class.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Applicant: International Business Machines Corp.
    Inventors: Steven Atkin, Margot Casey, Tyron Stading
  • Publication number: 20060005161
    Abstract: An analysis tool extracts class data from Java objects originating from multiple vendors having a particular design specification. A database mining tool then creates training data from the extracted class data to create a definition of objects associated with the particular design specification. Various implementations of the defined classes are compared across various performance metrics, which are output for the program designer as a function of vendor. The designer then selects the best design choices based on the best practices of multiple vendors disclosed by the outputs of the analysis tool when implementing a new Java program.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Applicant: International Business Machines Corp.
    Inventors: Steven Atkin, Margot Casey, Tyron Stading
  • Publication number: 20060005166
    Abstract: An analysis tool extracts class data from Java objects within a potential plagiarizing Java program and the original Java program, and then compares classes common to the potential plagiarizing program and the original across various performance metrics. Similarities disclosed by the analysis tool are output for user or programmatic comparison of the matches between the potentially plagiarizing Java program byte code and the original program's byte code.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Inventors: Steven Atkin, Margot Casey, Tyron Stading
  • Publication number: 20060005177
    Abstract: Metadata describing common Java classes is extracted and utilized to optimize a Java program's performance based on the code requirements of the application. Data mining techniques extract metadata and other information about different sets of JVM byte code written by multiple vendors to determine the design choices and optimizations made by each vendor in implementing their JVM. Then, byte code in a Java application being programmed is analyzed in comparison to each vendor's JVM metadata and information. Based upon the application's requirements (for example footprint, performance, etc.), recommendations are generated that yield a newly compiled rt.jar that combines the best practices of each vendor together or recommends a particular vendor's standard JVM that is best suited for the application.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Applicant: International Business Machines Corp.
    Inventors: Steven Atkin, Margot Casey, Tyron Stading
  • Publication number: 20050234845
    Abstract: A tool is provided for testing integration logic in a hub-and-spoke integration scheme. The testing tool exercises all spokes of the integration project for all objects in the model. A test document is sent to each adapter, which converts the generic objects to application specific objects and then converts the application specific objects back to generic objects. The testing tool then documents the return document of each spoke. The result is a catalog of total mappings, partial mappings, and empty mappings. These results may be analyzed to identify disagreements, lost data, and unused fields. The model may then be corrected by updating the mappings.
    Type: Application
    Filed: April 8, 2004
    Publication date: October 20, 2005
    Applicant: International Business Machines Corporation
    Inventors: Foluso Okunseinde, Tyron Stading
  • Publication number: 20050209974
    Abstract: A method and apparatus is presented for providing transaction-level security. The method comprises determining security information associated with at least one object of a transaction and determining if a remote device is capable of providing a level of security indicated by at least a portion of the security information. The method further comprises transmitting the object to the remote device in response to determining that the remote device is capable of providing the level of security.
    Type: Application
    Filed: March 18, 2004
    Publication date: September 22, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Folu Okunseinde, Tyron Stading
  • Publication number: 20050160306
    Abstract: An intelligent self-configurable adapter is provided. Before transferring data, the adapter configures itself. After configuring itself, the adapter then starts transmitting the data. During data transmission, the adapter monitors the connection to ensure that the transmission is within a certain performance level. If the data transfer falls below the performance level, the adapter may reconfigure itself using a recovery strategy.
    Type: Application
    Filed: January 13, 2004
    Publication date: July 21, 2005
    Applicant: International Business Machines Corporation
    Inventors: Folu Okunseinde, Tyron Stading
  • Publication number: 20050086690
    Abstract: Delivering interactive non-intrusive advertising content, including receiving a selection signal indicating that a user has selected an item displayed on a television screen, the item having associated non-intrusive interactive advertising content; identifying the selected item; and displaying the associated non-intrusive interactive advertising content. Embodiments typically include receiving and storing advertising data that associates the selected item with a screen region and with interactive advertising content. Receiving the advertising data often includes receiving the advertising data encoded in a video signal that includes a video image of the item. In some embodiments, the advertising data is encoded in a digital data stream separate from a video signal, and receiving the advertising data is carried out by receiving the data stream through a digital network.
    Type: Application
    Filed: October 16, 2003
    Publication date: April 21, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael Gilfix, Scott Winters, Tyron Stading
  • Publication number: 20050015614
    Abstract: Provided is an apparatus and method for detecting fraudulent passwords so that computer break-in attempts can be distinguished from authorized users incorrectly entering their passwords. An actual password is mapped against a computer keyboard and the resultant data is stored in memory. The profile of an entered password is compared to the stored profile. If the profile of the entered password differs significantly from the stored profile, then the login attempt is flagged as an attempted intrusion. In one embodiment of the current invention, passwords are mapped according to the distance subsequent keystrokes are from each other. Different embodiments may have different mapping schemes. For example, mapping data may correspond to statistical data that corresponds to the likelihood that a particular character is typed by mistake when another character is intended.
    Type: Application
    Filed: July 17, 2003
    Publication date: January 20, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael Gilfix, Foluso Okunseinde, Tyron Stading
  • Publication number: 20050005103
    Abstract: A system and method for securing code segments and ensuring proper execution using state-based encryption is presented. A class loader captures a memory state snapshot and uses the memory state snapshot for generating a key that encrypts a class. The class loader subsequently captures additional memory state snapshots at specific execution cycle times, and uses the memory state snapshots to generate additional keys that encrypt subsequent code segments. The encrypted code segments are stored in a file that is distributed to client computers. The client computer decrypts the individual code segments using keys that are generated from client memory state snapshots. If a particular code segment is not loaded in order or has been altered, the code segment is not decrypted properly and the software program terminates.
    Type: Application
    Filed: June 12, 2003
    Publication date: January 6, 2005
    Applicant: International Business Machines Corporation
    Inventors: Steven Atkin, Tyron Stading