Patents by Inventor Angela Marie Schuett

Angela Marie Schuett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8429758
    Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.
    Type: Grant
    Filed: July 27, 2012
    Date of Patent: April 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
  • Patent number: 8332959
    Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.
    Type: Grant
    Filed: June 4, 2008
    Date of Patent: December 11, 2012
    Assignee: International Business Machines Corporation
    Inventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
  • Publication number: 20120291144
    Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.
    Type: Application
    Filed: July 27, 2012
    Publication date: November 15, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Weifeng CHEN, Zhen LIU, Anton RIABOV, Angela Marie SCHUETT
  • Patent number: 8276192
    Abstract: A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: September 25, 2012
    Assignee: International Business Machines Corporation
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Genady Ya. Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Grant Wagner
  • Patent number: 8099781
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Grant
    Filed: July 23, 2009
    Date of Patent: January 17, 2012
    Assignee: International Business Machines Corporation
    Inventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Patent number: 8087090
    Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range by mapping the effectiveness of performing the mitigation measures to determine a residual risk after a mitigation measure has been implemented.
    Type: Grant
    Filed: June 2, 2008
    Date of Patent: December 27, 2011
    Assignee: International Business Machines Corporation
    Inventors: Pau-Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Patent number: 8032924
    Abstract: A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first channel label to determine if the processing component can read data attributes of the first channel label; and reading the data attributes of the first channel label when the principal label is equal to or has precedence over the first channel label, wherein the principal label includes a read label and a write label and at least one of a selection label, an addition label or a suppression label.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: October 4, 2011
    Assignee: International Business Machines Corporation
    Inventors: Weifeng Chen, Alexandre V. Evfimievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner
  • Patent number: 8020213
    Abstract: A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first channel label to determine if the processing component can read data attributes of the first channel label; and reading the data attributes of the first channel label when the principal label is equal to or has precedence over the first channel label, wherein the principal label includes a read label and a write label and at least one of a selection label, an addition label or a suppression label.
    Type: Grant
    Filed: August 1, 2006
    Date of Patent: September 13, 2011
    Assignee: International Business Machines Corporation
    Inventors: Weifeng Chen, Alexandre V. Evfunievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner
  • Patent number: 7832007
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Grant
    Filed: January 10, 2006
    Date of Patent: November 9, 2010
    Assignee: International Business Machines Corporation
    Inventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Publication number: 20090282487
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Application
    Filed: July 23, 2009
    Publication date: November 12, 2009
    Applicant: International Business Machines Corporation
    Inventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Publication number: 20090228990
    Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.
    Type: Application
    Filed: June 4, 2008
    Publication date: September 10, 2009
    Inventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
  • Patent number: 7530110
    Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range.
    Type: Grant
    Filed: May 6, 2005
    Date of Patent: May 5, 2009
    Assignee: International Business Machines Corporation
    Inventors: Pau-Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Publication number: 20090064343
    Abstract: A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first channel label to determine if the processing component can read data attributes of the first channel label; and reading the data attributes of the first channel label when the principal label is equal to or has precedence over the first channel label, wherein the principal label includes a read label and a write label and at least one of a selection label, an addition label or a suppression label.
    Type: Application
    Filed: May 30, 2008
    Publication date: March 5, 2009
    Inventors: Weifeng Chen, Alexandre V. Evfimievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner
  • Publication number: 20090055890
    Abstract: A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
    Type: Application
    Filed: May 30, 2008
    Publication date: February 26, 2009
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Genady Ya. Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktotovich Riabov, Pankai Rohatgi, Angela Marie Schuett, Grant Wagner
  • Publication number: 20080263662
    Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range.
    Type: Application
    Filed: June 2, 2008
    Publication date: October 23, 2008
    Inventors: Pau-Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Publication number: 20080034439
    Abstract: A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first channel label to determine if the processing component can read data attributes of the first channel label; and reading the data attributes of the first channel label when the principal label is equal to or has precedence over the first channel label, wherein the principal label includes a read label and a write label and at least one of a selection label, an addition label or a suppression label.
    Type: Application
    Filed: August 1, 2006
    Publication date: February 7, 2008
    Inventors: Weifeng Chen, Alexandre V. Evfimievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner
  • Publication number: 20080016547
    Abstract: A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
    Type: Application
    Filed: July 11, 2006
    Publication date: January 17, 2008
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Genady Ya. Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Grant Wagner
  • Publication number: 20080005778
    Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.
    Type: Application
    Filed: July 3, 2006
    Publication date: January 3, 2008
    Inventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett