Patents by Inventor Aaron Kershenbaum

Aaron Kershenbaum has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7860816
    Abstract: The present invention is a method and apparatus for safe ontology reasoning. In one embodiment, a method for building safe sub-ontology that includes one or more elements of a given ontology includes designating at least one the elements as a sensitive element, where a sensitive element is an element not to be revealed. The method then designates a safe sub-ontology such that the safe sub-ontology does not include any elements that, alone or in combination, allow inference of a sensitive element, in accordance with one or more given inference rules. In another embodiment, a method for building a potential sub-ontology includes designating at least one of the elements as a sensitive element and including a maximal number of the elements in the potential sub-ontology, wherein the maximal number includes the greatest number of elements that can be revealed, cumulatively, without allowing inference of a sensitive element, in accordance with one or more given inference rules.
    Type: Grant
    Filed: October 31, 2007
    Date of Patent: December 28, 2010
    Assignee: International Business Machines Corporation
    Inventors: Achille Fokoue-Nkoutche, Genady Grabarnik, Nagui Halim, Aaron Kershenbaum, Edith Schonberg, Larisa Shwartz, Kavitha Srinivas
  • Publication number: 20080065578
    Abstract: The present invention is a method and apparatus for safe ontology reasoning. In one embodiment, a method for building safe sub-ontology that includes one or more elements of a given ontology includes designating at least one the elements as a sensitive element, where a sensitive element is an element not to be revealed. The method then designates a safe sub-ontology such that the safe sub-ontology does not include any elements that, alone or in combination, allow inference of a sensitive element, in accordance with one or more given inference rules. In another embodiment, a method for building a potential sub-ontology includes designating at least one of the elements as a sensitive element and including a maximal number of the elements in the potential sub-ontology, wherein the maximal number includes the greatest number of elements that can be revealed, cumulatively, without allowing inference of a sensitive element, in accordance with one or more given inference rules.
    Type: Application
    Filed: October 31, 2007
    Publication date: March 13, 2008
    Inventors: Achille Fokoue-Nkoutche, Genady Grabarnik, Nagui Halim, Aaron Kershenbaum, Edith Schonberg, Larisa Shwartz, Kavitha Srinivas
  • Publication number: 20070198448
    Abstract: Methods and apparatus, including computer program products, for scalable ontology reasoning. A method of generating a summarized ontology includes loading an ontology from a store, eliminating relationships in the ontology, the eliminating relationships including an insertion of new relationships that simplify the ontology, eliminating individuals in the ontology, the eliminating individuals including insertion of new individuals to simplify the ontology, eliminating concepts in the ontology including insertion of new concepts to simplify the ontology, and generating the summarized ontology from the eliminating relationships, eliminating individuals and eliminating concepts.
    Type: Application
    Filed: February 21, 2006
    Publication date: August 23, 2007
    Inventors: Achille Fokoue-Nkoutche, Aaron Kershenbaum, Kavitha Srinivas
  • Publication number: 20070198449
    Abstract: The present invention is a method and apparatus for safe ontology reasoning. In one embodiment, a method for building safe sub-ontology that includes one or more elements of a given ontology includes designating at least one the elements as a sensitive element, where a sensitive element is an element not to be revealed. The method then designates a safe sub-ontology such that the safe sub-ontology does not include any elements that, alone or in combination, allow inference of a sensitive element, in accordance with one or more given inference rules. In another embodiment, a method for building a potential sub-ontology includes designating at least one of the elements as a sensitive element and including a maximal number of the elements in the potential sub-ontology, wherein the maximal number includes the greatest number of elements that can be revealed, cumulatively, without allowing inference of a sensitive element, in accordance with one or more given inference rules.
    Type: Application
    Filed: February 23, 2006
    Publication date: August 23, 2007
    Inventors: Achille Fokoue-Nkoutche, Genady Grabarnik, Nagui Halim, Aaron Kershenbaum, Edith Schonberg, Larisa Shwartz, Kavitha Srinivas
  • Publication number: 20070169124
    Abstract: A method, system and program product for minimizing unwanted synchronizations in a multithreading program. Program functions in a multithreading program that should not be synchronized are identified as input tails, e.g., manually identified. An invocation graph is constructed for the multithreading program with nodes identified as head nodes and tail nodes that correspond to the input tails. Synchronization information is collected for each node of the invocation graph. Sources of synchronization in the invocation graph are represented as source nodes. All paths from head nodes to tail nodes through at least one source node are identified.
    Type: Application
    Filed: November 10, 2005
    Publication date: July 19, 2007
    Inventors: Aaron Kershenbaum, Lawrence Koved, George Leeman, Darrell Reimer
  • Patent number: 7076804
    Abstract: This invention provides methods and apparatus for determining a set of authorization usage for collection of code. By using a program graph, the present invention identifies the code within in bounded paths in the program graph that use authorization. The level of precision is able to identify authorization usage to the level of basic blocks, methods, classes or other collections of code. By using the analysis technique described in this invention, we can determine the authorizations needed by collections code, including Java applets, servlets, and Enterprise JavaBeans. By using the present invention, it is possible, prior to loading the mobile code, to prompt the administrator or end-user to authorize or deny the code access to restricted the resources, or determine whether authorization testing will be required.
    Type: Grant
    Filed: May 11, 2001
    Date of Patent: July 11, 2006
    Assignee: International Business Machines Corporation
    Inventors: Aaron Kershenbaum, Lawrence Koved, Marco Pistoia
  • Publication number: 20050015752
    Abstract: A system and method for providing “static analysis” of programs to aid in improving runtime performance, stability, security and privacy characteristics of deployed application code. The method includes performing a set of analyses that sifts through the program code and identifies programming security and/or privacy model coding errors. In particular the invention focuses on identifying coding errors that cause loss of correctness, performance degradation, security, privacy and maintainability vulnerabilities. A deep analysis of the program is performed using detailed control and data flow analyses. These deeper analyses provide a much better perspective of the overall application behavior. This deep analysis is in contrast to shallow analyses in current industry tools, which inspect or model a single or a few classes at a time.
    Type: Application
    Filed: July 15, 2003
    Publication date: January 20, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bowen Alpern, Robert Johnson, Aaron Kershenbaum, Lawrence Koved, George Leeman, Marco Pistoia, Darrell Reimer, Kavitha Srinivas, Harini Srinivasan
  • Publication number: 20020184486
    Abstract: This invention provides methods and apparatus for determining a set of authorization usage for collection of code. By using a program graph, the present invention identifies the code within in bounded paths in the program graph that use authorization. The level of precision is able to identify authorization usage to the level of basic blocks, methods, classes or other collections of code. By using the analysis technique described in this invention, we can determine the authorizations needed by collections code, including Java applets, servlets, and Enterprise JavaBeans. By using the present invention, it is possible, prior to loading the mobile code, to prompt the administrator or end-user to authorize or deny the code access to restricted the resources, or determine whether authorization testing will be required.
    Type: Application
    Filed: May 11, 2001
    Publication date: December 5, 2002
    Applicant: International Business Machines Corporation
    Inventors: Aaron Kershenbaum, Lawrence Koved, Marco Pistoia
  • Publication number: 20020111818
    Abstract: A method for operating a data communication system comprises the steps of (a) originating an electronic commerce transaction at a first party, (b) transmitting the electronic commerce transaction through the data communications network towards a second party, (c) during the step of transmitting, inputting the electronic commerce transaction to an electronic commerce transaction filter that is interposed between two network components, and (e) operating the electronic commerce transaction filter to take some action with respect to the electronic commerce transaction.
    Type: Application
    Filed: February 15, 2001
    Publication date: August 15, 2002
    Applicant: International Business Machines Corporation
    Inventors: John F. Morar, David M. Chess, Aaron Kershenbaum, Edward J. Pring, Ian N. Whalley, Steve R. White