Peter J. Johnson
Peter J. Johnson, Bloomer, WI US
Patent application number | Description | Published |
---|---|---|
20120210743 | REFRIGERATED TRAILER DOOR HAVING AN AUTOMOTIVE-STYLE HANDLE AND LOCKING MECHANISM - A door for a refrigerated trailer including a door pan formed of fiberglass reinforced plastic, the door pan having an inner surface and an outer surface. A door sheet is formed of fiberglass reinforced plastic and has an inner surface and an outer surface. A foamed plastic core is provided between the inner surfaces of the door pan and the door sheet. A housing is mounted between the inner surfaces of the door pan and the door sheet and is substantially encapsulated within the foamed plastic core. An automotive-style handle and locking mechanism is mounted to the housing. | 08-23-2012 |
20140013666 | REFRIGERATED TRAILER DOOR HAVING AN AUTOMOTIVE-STYLE HANDLE AND LOCKING MECHANISM - A door for a refrigerated trailer including a door pan formed of fiberglass reinforced plastic, the door pan having an inner surface and an outer surface. A door sheet is formed of fiberglass reinforced plastic and has an inner surface and an outer surface. A foamed plastic core is provided between the inner surfaces of the door pan and the door sheet. A housing is mounted between the inner surfaces of the door pan and the door sheet and is substantially encapsulated within the foamed plastic core. An automotive-style handle and locking mechanism is mounted to the housing. | 01-16-2014 |
Peter J. Johnson, Winchester GB
Patent application number | Description | Published |
---|---|---|
20120304151 | REALTIME TRACKING OF SOFTWARE COMPONENTS - The disclosure is for run-time accessing a software component is provided, together with a computer system embodying the same, and a software utility directing the method. Initially a software component is loaded and analysed to identify one or more features thereof, which features are checked against a database. Following the check, the component is classified as one of at least first, second, and third component types. A first component type is run without amendment. A second component type is replaced by a component of equivalent functionality prior to running. A third component type is blocked from running. | 11-29-2012 |
20120304152 | REALTIME TRACKING OF SOFTWARE COMPONENTS - The disclosure is for run-time accessing a software component is provided, together with a computer system embodying the same, and a software utility directing the method. Initially a software component is loaded and analysed to identify one or more features thereof, which features are checked against a database. Following the check, the component is classified as one of at least first, second, and third component types. A first component type is run without amendment. A second component type is replaced by a component of equivalent functionality prior to running. A third component type is blocked from running. | 11-29-2012 |
20140059044 | NODE VALIDATION IN A NETWORK - A method of operating a network of connected nodes comprises the steps of maintaining a trust value for each node in the network, maintaining one or more attributes for each node in the network, each attribute comprising a value and a respective confidence level, and performing a validation of a specific attribute of a specific node. The validation comprises the steps of querying nodes connected to the specific node for specific attribute values for the specific node, creating a results set from the returned attribute values from the connected nodes and the trust values of the connected nodes, and processing the results set according to a predefined algorithm to determine a new value and/or a new confidence level for the specific attribute of the specific node. | 02-27-2014 |
Peter J. Johnson, Hursley Park GB
Patent application number | Description | Published |
---|---|---|
20140074456 | REFINING HIERARCHIES IN OBJECT-ORIENTED MODELS - Embodiments are directed to refining hierarchies in object-oriented models. A method includes providing a business object model in the form of an object-oriented model having one or more members with multiple distinct verbalizations and identifying distinct verbalizations of a given business object model member. The method also includes reviewing existing rules of the business object model to produce mappings of the distinct verbalizations and any attributes or operations used in conjunction with the distinct verbalizations of members of the business object model and analysing the mappings to identify patterns of use of the distinct verbalizations. The method further includes categorising a distinct verbalization as a superclass or subclass. | 03-13-2014 |
Peter J. Johnson, Hampshire GB
Patent application number | Description | Published |
---|---|---|
20150271327 | VERIFYING TELEPHONE CALLER ORIGIN - An aspect includes verifying a telephone caller origin carried out at a security application. The verifying includes activating a security process during an active telephone call to a user received at a first call identifier, accessing registered user service providers to obtain contact details of a registered service provider purporting to be the origin of the active telephone call, and sending a query to the obtained contact details of the registered service provider. The query includes the first call identifier. The verifying also includes receiving a returned query result confirming or denying that the telephone call is from the registered service provider. | 09-24-2015 |
Peter J. Johnson, Hursley GB
Patent application number | Description | Published |
---|---|---|
20160094640 | PROCESSING A MESSAGE RECEIVED BY A MESSAGE SERVER - A message received by a message server is processed. The message server includes a query store for storing query requests, value data for the query requests, and response time data for the query requests. A message is received and at least one query request is determined from the message. The at least one query request is sent to a query server. A timeout period is determined from the response time data for a query request stored in the query store. In the case that no response to the query request is received within the timeout period, a value is determined from the value data for the query request stored in the query store. Alternatively, in the case that a response to the query request is received within the timeout period, a value is determined from the response, value data for the value is stored in the query store, and response time data for the period the response took to be received is stored in the query store. An action in response to the message is then determined using the value obtained from the query store or the value obtained from the response, and the action is performed. | 03-31-2016 |