BackgroundCheck.run
Search For

Diane H Shannon, 77150 Williamston Ridge Dr, Youngsville, NC 27596

Diane Shannon Phones & Addresses

150 Williamston Ridge Dr, Youngsville, NC 27596    919-5690108    919-5709371   

Tarboro, NC   

Algonquin, IL   

Detroit, MI   

Algonquin, IL   

Mentions for Diane H Shannon

Publications & IP owners

Us Patents

Methods Systems And Computer Program Products For Processing Complex Policy Rules Based On Rule Form Type

US Patent:
6662235, Dec 9, 2003
Filed:
Aug 24, 2000
Appl. No.:
09/645147
Inventors:
Gregory M. Callis - Morrisville NC
Jon Kevin Franks - Holly Springs NC
Lap Thiet Huynh - Apex NC
Loan Nguyen - Durham NC
Diane Iupe Shannon - Raleigh NC
David Yu Pin Yang - Cary NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 954
US Classification:
709318, 709223
Abstract:
Embodiments of the present invention include methods, systems and computer program products which provide for a complex policy rule structured in a plurality of levels wherein the complex policy rule selects an action for execution based on a plurality of individual policy conditions. An event is received having an associated value defining a point in a space covered by the individual policy conditions. The following operations are performed if the complex policy rule is a CNF policy rule. A plurality of summary conditions are generated, each of the summary conditions being associated with one of the levels. The associated value of the received event is compared to a selected one of the summary conditions to determine if the selected one of the summary conditions is met. Operations repeat for others of the summary conditions and individual policy conditions until either one of the summary conditions is not met or all individual policy conditions for one of the levels are not met, allowing the policy rule to be skipped, or until at least one of the individual policy conditions for each level is met. DNF policy rule processing is also provided.

Methods Systems And Computer Program Products For Processing An Event Based On Policy Rules Using Hashing

US Patent:
6820121, Nov 16, 2004
Filed:
Aug 24, 2000
Appl. No.:
09/645651
Inventors:
Gregory M. Callis - Morrisville NC
Jon Kevin Franks - Holly Springs NC
Lap Thiet Huynh - Apex NC
Loan Nguyen - Durham NC
Diane Iupe Shannon - Raleigh NC
David Yu Pin Yang - Cary NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15173
US Classification:
709225, 709250, 711216
Abstract:
Embodiments of the present invention include methods, systems and computer program products which provide for processing an event having a classification based on associated policy rules where the policy rules are conditioned on the classification. A policy rules hash table is provided including a plurality of policy rule entries, each policy rule entry being associated with a hash index. A hash index is generated using a classification hash length based on the classification of the event, the classification having an associated length at least equal to the classification hash length. A policy rule entry in the policy rules hash table is identified that corresponds to the generated hash index. It is determined if a classification field length associated with the identified policy rule corresponds to the classification hash length. The identified policy rule entry is executed if the hash length associated with the identified policy rule corresponds to the classification hash length.

Automatic Generation Of Reusable Network Configuration Objects

US Patent:
8606925, Dec 10, 2013
Filed:
Apr 4, 2011
Appl. No.:
13/079792
Inventors:
Kimberly T. Bailey - Raleigh NC, US
Jeffrey B. Cates - Raleigh NC, US
Diane I. Shannon - Raleigh NC, US
Mark T. Wright - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/173
US Classification:
709226, 718104
Abstract:
A system automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The system automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.

Automatic Generation Of Reusable Network Configuration Objects

US Patent:
8612602, Dec 17, 2013
Filed:
Mar 17, 2012
Appl. No.:
13/423186
Inventors:
Kimberly T. Bailey - Raleigh NC, US
Jeffrey B. Cates - Raleigh NC, US
Diane I. Shannon - Raleigh NC, US
Mark T. Wright - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/173
US Classification:
709226, 718104
Abstract:
A method automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The method automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.

Cleaning Sensitive Data From A Diagnostic-Ready Clean Copy

US Patent:
2020007, Mar 5, 2020
Filed:
Aug 28, 2018
Appl. No.:
16/114540
Inventors:
- Armonk NY, US
Diane Iupe Shannon - Raleigh NC, US
International Classification:
G06F 21/62
Abstract:
A computer-implemented method includes receiving, by an application, a request to copy application data of the application, where the application data includes sensitive data generated by the application. The application identifies each instance of the sensitive data in the application data. The application generates a clean copy of the application data, where generating the clean copy includes removing each instance of the sensitive data from the application data. The clean copy is returned responsive to the request to copy the application data.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.