Patents by Inventor Galina Grunin

Galina Grunin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9742619
    Abstract: A program product and system that implements a method for adding an Information Technology (IT) structure A to an IT structure X. A first list of all dependencies of elements in a composition of X is received. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs. A second list of all dependencies of A is received. It is determined that no dependency of A in the second list has an exclusion with a class Z to which an element E in the composition of X belongs. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs and ensuring that A's dependencies are satisfied followed by adding A to X.
    Type: Grant
    Filed: January 6, 2014
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky
  • Patent number: 9742761
    Abstract: A method, computer program product, and computer system for authenticating user access to a computing system using dynamic tokens are provided. A login request from a client is received, and in response, a token request from the client is issued. The token request identifies one or more sequence positions. One or more client tokens generated by the client are received based on the one or more sequence positions of the tokens. A sequence of tokens based on a first seed and a first algorithm are generated. The login request is authenticated by comparing the one or more client tokens with the sequence of tokens, based at least in part, on the one or more sequence positions.
    Type: Grant
    Filed: November 10, 2015
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
  • Publication number: 20170163648
    Abstract: An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information.
    Type: Application
    Filed: February 15, 2017
    Publication date: June 8, 2017
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
  • Patent number: 9674203
    Abstract: An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: June 6, 2017
    Assignee: International Business Machines Corporation
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
  • Publication number: 20170149779
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Application
    Filed: February 7, 2017
    Publication date: May 25, 2017
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Publication number: 20170134363
    Abstract: A method, computer program product, and computer system for authenticating user access to a computing system using dynamic tokens are provided. A login request from a client is received, and in response, a token request from the client is issued. The token request identifies one or more sequence positions. One or more client tokens generated by the client are received based on the one or more sequence positions of the tokens. A sequence of tokens based on a first seed and a first algorithm are generated. The login request is authenticated by comparing the one or more client tokens with the sequence of tokens, based at least in part, on the one or more sequence positions.
    Type: Application
    Filed: November 10, 2015
    Publication date: May 11, 2017
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
  • Patent number: 9602489
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: October 22, 2014
    Date of Patent: March 21, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Publication number: 20160350338
    Abstract: An approach for enabling collaborative development of a database application is provided. Specifically, this approach provides a database development and collaboration tool (DDCT), which can be utilized by multiple developers involved in a particular software project, to enable automated synchronization and database version control by allowing a database development language and data changes to be stored in a metadata form that is general to more than one database management system (DBMS). Each developer is united and able to collaborate through the system, thus ensuring that a change to a database structure and/or data in a static data table created in a particular database language by one developer is automatically incorporated in the overall development process. Furthermore, the DDCT provides the opportunity to maintain a single repository entry for more than one DBMS, which simplifies synchronization.
    Type: Application
    Filed: August 9, 2016
    Publication date: December 1, 2016
    Inventors: Marina A. Greenstein, Galina Grunin, Maria N. Schwenger, Pandikumar Swamikrishnan
  • Publication number: 20160277420
    Abstract: An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information.
    Type: Application
    Filed: March 16, 2015
    Publication date: September 22, 2016
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
  • Patent number: 9442996
    Abstract: An approach for enabling collaborative development of a database application is provided. Specifically, this approach provides a database development and collaboration tool (DDCT), which can be utilized by multiple developers involved in a particular software project, to enable automated synchronization and database version control by allowing a database development language and data changes to be stored in a metadata form that is general to more than one database management system (DBMS). Each developer is united and able to collaborate through the system, thus ensuring that a change to a database structure and/or data in a static data table created in a particular database language by one developer is automatically incorporated in the overall development process. Furthermore, the DDCT provides the opportunity to maintain a single repository entry for more than one DBMS, which simplifies synchronization.
    Type: Grant
    Filed: January 15, 2014
    Date of Patent: September 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: Marina A. Greenstein, Galina Grunin, Maria N. Schwenger, Pandikumar Swamikrishnan
  • Publication number: 20160104360
    Abstract: A method includes pairing at least two tags and attaching each one of the at least two tags to objects; a computer device sensing the proximity of each tagged object; and the computer device issuing alerts depending on the sensed proximity of each tagged object, wherein a first alert is triggered when one of the tagged objects leaves a secured area without a corresponding paired tagged object.
    Type: Application
    Filed: October 11, 2014
    Publication date: April 14, 2016
    Inventors: Galina Grunin, David Edward Nachman, Nader M. Nassar, Tamer Nassar
  • Patent number: 9264393
    Abstract: Embodiments of the present invention provide a method, system, and program product for managing the flow of electronic mail. A computing device receives from a sender a first electronic mail addressed to first and second recipients in a serial propagation mode, and in response, the computing device transmits the first electronic mail en route to the first but not the second recipient. A computing device receives a second electronic mail from the first recipient as a response to the first electronic mail, and in response, a computing device transmits the first electronic email to the second recipient.
    Type: Grant
    Filed: February 13, 2013
    Date of Patent: February 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
  • Publication number: 20150253745
    Abstract: An embodiment of the invention provides a method for a utility consumption advisor, wherein a target electricity consumption for a predefined time period is received with a user interface. User parameters are also received with the user interface, the user parameters including a list of electricity consumption items that may not be modified, a list of electricity consumption items that may be modified, and a range of modification for each of the listed electricity consumption items that may be modified. The user's electricity consumption history is determined; and, an electricity utilization plan is generated for the predefined time period with a processor. The electricity utilization plan is generated based on the target electricity consumption, the user parameters, and the user's electricity consumption history. The electricity utilization plan is implemented by wirelessly controlling the electricity consumption items that may be modified.
    Type: Application
    Filed: March 5, 2014
    Publication date: September 10, 2015
    Applicant: International Business Machines Corporation
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer Nassar
  • Publication number: 20150199395
    Abstract: An approach for enabling collaborative development of a database application is provided. Specifically, this approach provides a database development and collaboration tool (DDCT), which can be utilized by multiple developers involved in a particular software project, to enable automated synchronization and database version control by allowing a database development language and data changes to be stored in a metadata form that is general to more than one database management system (DBMS). Each developer is united and able to collaborate through the system, thus ensuring that a change to a database structure and/or data in a static data table created in a particular database language by one developer is automatically incorporated in the overall development process. Furthermore, the DDCT provides the opportunity to maintain a single repository entry for more than one DBMS, which simplifies synchronization.
    Type: Application
    Filed: January 15, 2014
    Publication date: July 16, 2015
    Applicant: International Business Machines Corporation
    Inventors: Marina A. Greenstein, Galina Grunin, Maria N. Schwenger, Pandikumar Swamikrishnan
  • Publication number: 20150040191
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Application
    Filed: October 22, 2014
    Publication date: February 5, 2015
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Publication number: 20150020176
    Abstract: Techniques for advanced login security using personalized, user-specific urls are provided. In one aspect, a method for authenticating a user is provided. The method includes the following steps. A personalized login url and credentials (e.g., username and password) are stored for the user. Upon receipt of a login url from the user, it is verified whether the login url matches the personalized url stored for the user. If the login url matches the personalized url for the user, then the user is provided with a user-specific login page where the user can enter credentials, otherwise access is denied. The user is authenticated only if the credentials the user enters match the credentials stored for the user, otherwise denying access.
    Type: Application
    Filed: September 20, 2013
    Publication date: January 15, 2015
    Applicant: International Business Machines Corporation
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
  • Publication number: 20150020178
    Abstract: Techniques for advanced login security using personalized, user-specific urls are provided. In one aspect, a method for authenticating a user is provided. The method includes the following steps. A personalized login url and credentials (e.g., username and password) are stored for the user. Upon receipt of a login url from the user, it is verified whether the login url matches the personalized url stored for the user. If the login url matches the personalized url for the user, then the user is provided with a user-specific login page where the user can enter credentials, otherwise access is denied. The user is authenticated only if the credentials the user enters match the credentials stored for the user, otherwise denying access.
    Type: Application
    Filed: July 12, 2013
    Publication date: January 15, 2015
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
  • Patent number: 8914644
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: December 16, 2014
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Publication number: 20140229554
    Abstract: Embodiments of the present invention provide a method, system, and program product for managing the flow of electronic mail. A computing device receives from a sender a first electronic mail addressed to first and second recipients in a serial propagation mode, and in response, the computing device transmits the first electronic mail en route to the first but not the second recipient. A computing device receives a second electronic mail from the first recipient as a response to the first electronic mail, and in response, a computing device transmits the first electronic email to the second recipient.
    Type: Application
    Filed: February 13, 2013
    Publication date: August 14, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
  • Publication number: 20140122686
    Abstract: A program product and system that implements a method for adding an Information Technology (IT) structure A to an IT structure X. A first list of all dependencies of elements in a composition of X is received. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs. A second list of all dependencies of A is received. It is determined that no dependency of A in the second list has an exclusion with a class Z to which an element E in the composition of X belongs. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs and ensuring that A's dependencies are satisfied followed by adding A to X.
    Type: Application
    Filed: January 6, 2014
    Publication date: May 1, 2014
    Applicant: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky