Patents by Inventor Doga Tav

Doga Tav has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11290432
    Abstract: Embodiments are directed to a method of transferring data between a customer site and a benchmarking site, including: receiving, from the customer site, encrypted packet data, wherein the packet data is encrypted using a first key of a key pair; storing the encrypted packet data, by the processor, in a first cache at the benchmarking site; decrypting the encrypted packet data in the first cache, by the processor, using a second key of the key pair; storing decrypted packet data, by the processor, in a second cache at the benchmarking site; indexing the decrypted packet data in the second cache; storing indexed packet data as a dataset in a permanent storage device; and performing a benchmarking session on the indexed packet data.
    Type: Grant
    Filed: December 4, 2018
    Date of Patent: March 29, 2022
    Assignee: International Business Machines Corporation
    Inventors: Doga Tav, Wayne F. Tackabury
  • Publication number: 20220003442
    Abstract: A computer-implemented method for anomaly detection in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor, the method including: receiving, by the processor, a real-time airflow pattern detected from an airflow alerter, wherein the real-time airflow pattern is generated by a heating, ventilation, and air conditioning (HVAC) system in a particular facility; comparing, by the processor, the real-time airflow pattern to a predetermined airflow pattern for the HVAC system; and when the real-time airflow pattern is different from the predetermined airflow pattern, receiving, by the processor, an alert message indicating an anomaly from the airflow alerter.
    Type: Application
    Filed: July 1, 2020
    Publication date: January 6, 2022
    Inventors: Wayne Francis Tackabury, Cesar Augusto Rodriguez Bravo, Doga Tav
  • Publication number: 20220003449
    Abstract: A computer-implemented method for anomaly detection in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor. The method includes receiving a plurality of real-time airflow patterns acquired by a plurality of airflow alerters, wherein each real-time airflow pattern corresponds to a different airflow alerter; comparing each real-time airflow pattern with a predetermined airflow pattern, wherein each real-time airflow pattern corresponds to a different predetermined airflow pattern; when there is any real-time airflow pattern different from the corresponding predetermined airflow pattern, identifying a group of airflow alerters among the plurality of airflow alerters, wherein a real-time airflow pattern of each airflow alerter in the group is different from the corresponding predetermined airflow pattern; and identifying a location of an anomaly based on the group of airflow alerters.
    Type: Application
    Filed: July 1, 2020
    Publication date: January 6, 2022
    Inventors: Wayne Francis Tackabury, Cesar Augusto Rodriguez Bravo, Doga Tav
  • Patent number: 11151266
    Abstract: A technique for secure data storage and access during transition operations includes retrieving an encrypted instance of a data object from a data store. The retrieved encrypted instance of the data object is stored in a cryptcache. The encrypted instance in the cryptcache is decrypted to a cleartext instance of the data object and stored as the cleartext instance of the data object in a clearcache. The clearcache instance of the data object is secured by controlling an access window defining an amount of time the cleartext instance of the data object is accessible in the clearcache.
    Type: Grant
    Filed: December 6, 2017
    Date of Patent: October 19, 2021
    Assignee: International Business Machines Corporation
    Inventors: Wayne F. Tackabury, Doga Tav, Ronald B. Williams
  • Publication number: 20210266315
    Abstract: A method for a multi-factor authentication, the method receives results of an initial authentication of a user. Responsive to confirming the initial authentication, an image of a secondary set of authentication options is presented. An option selection is received from the user, wherein the selection is determined by tracking eye movement of the user over the image that includes the set of second factor authentication options. User facial activity is tracked corresponding to the selection made from the secondary set of authentication options. The monitored facial activity is compared to a pre-established authentication condition to determine whether a match exists with the selected secondary set of authentication options, and responsive to facial activity monitored matching the authentication condition pre-established by the user and corresponding to the selection made from the secondary set of authentication options, authentication of the user is confirmed.
    Type: Application
    Filed: February 24, 2020
    Publication date: August 26, 2021
    Inventors: Doga Tav, Ron Williams, Hyman David Chantz
  • Publication number: 20210157490
    Abstract: An access revocation system for removing user data from a service provider device includes a processing device and a memory storing instructions for performing an access revocation method. The method includes receiving user data from a user device via a data channel, storing the user data in a data storage module, and receiving an access revocation message via a request channel separate from the data channel. The method also includes decrypting the access revocation message and performing at least one action defined by the access revocation message, the at least one action including scrubbing of user data from the data storage module.
    Type: Application
    Filed: February 3, 2021
    Publication date: May 27, 2021
    Inventors: Doga Tav, Wayne F. Tackabury
  • Patent number: 10996874
    Abstract: An access revocation system for removing customer data from a service provider device includes a processing device and a memory storing instructions for performing an access revocation method. The method includes receiving customer data from a customer device via a data channel, storing the customer data in a data storage module, and receiving an access revocation message via a request channel separate from the data channel. The method also includes decrypting the access revocation message and performing at least one action defined by the access revocation message, the at least one action including scrubbing of customer data from the data storage module.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: May 4, 2021
    Assignee: International Business Machines Corporation
    Inventors: Doga Tav, Wayne F. Tackabury
  • Publication number: 20210026544
    Abstract: An access revocation system for removing customer data from a service provider device includes a processing device and a memory storing instructions for performing an access revocation method. The method includes receiving customer data from a customer device via a data channel, storing the customer data in a data storage module, and receiving an access revocation message via a request channel separate from the data channel. The method also includes decrypting the access revocation message and performing at least one action defined by the access revocation message, the at least one action including scrubbing of customer data from the data storage module.
    Type: Application
    Filed: July 23, 2019
    Publication date: January 28, 2021
    Inventors: Doga Tav, Wayne F. Tackabury
  • Publication number: 20200177562
    Abstract: Embodiments are directed to a method of transferring data between a customer site and a benchmarking site, including: receiving, from the customer site, encrypted packet data, wherein the packet data is encrypted using a first key of a key pair; storing the encrypted packet data, by the processor, in a first cache at the benchmarking site; decrypting the encrypted packet data in the first cache, by the processor, using a second key of the key pair; storing decrypted packet data, by the processor, in a second cache at the benchmarking site; indexing the decrypted packet data in the second cache; storing indexed packet data as a dataset in a permanent storage device; and performing a benchmarking session on the indexed packet data.
    Type: Application
    Filed: December 4, 2018
    Publication date: June 4, 2020
    Inventors: Doga Tav, Wayne F. Tackabury
  • Publication number: 20190171829
    Abstract: A technique for secure data storage and access during transition operations includes retrieving an encrypted instance of a data object from a data store. The retrieved encrypted instance of the data object is stored in a cryptcache. The encrypted instance in the cryptcache is decrypted to a cleartext instance of the data object and stored as the cleartext instance of the data object in a clearcache. The clearcache instance of the data object is secured by controlling an access window defining an amount of time the cleartext instance of the data object is accessible in the clearcache.
    Type: Application
    Filed: December 6, 2017
    Publication date: June 6, 2019
    Inventors: Wayne F. Tackabury, Doga Tav, Ronald B. Williams