Patents by Inventor Galina Grunin
Galina Grunin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9742619Abstract: A program product and system that implements a method for adding an Information Technology (IT) structure A to an IT structure X. A first list of all dependencies of elements in a composition of X is received. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs. A second list of all dependencies of A is received. It is determined that no dependency of A in the second list has an exclusion with a class Z to which an element E in the composition of X belongs. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs and ensuring that A's dependencies are satisfied followed by adding A to X.Type: GrantFiled: January 6, 2014Date of Patent: August 22, 2017Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky
-
Patent number: 9742761Abstract: A method, computer program product, and computer system for authenticating user access to a computing system using dynamic tokens are provided. A login request from a client is received, and in response, a token request from the client is issued. The token request identifies one or more sequence positions. One or more client tokens generated by the client are received based on the one or more sequence positions of the tokens. A sequence of tokens based on a first seed and a first algorithm are generated. The login request is authenticated by comparing the one or more client tokens with the sequence of tokens, based at least in part, on the one or more sequence positions.Type: GrantFiled: November 10, 2015Date of Patent: August 22, 2017Assignee: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Publication number: 20170163648Abstract: An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information.Type: ApplicationFiled: February 15, 2017Publication date: June 8, 2017Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Patent number: 9674203Abstract: An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information.Type: GrantFiled: March 16, 2015Date of Patent: June 6, 2017Assignee: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Publication number: 20170149779Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: ApplicationFiled: February 7, 2017Publication date: May 25, 2017Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Publication number: 20170134363Abstract: A method, computer program product, and computer system for authenticating user access to a computing system using dynamic tokens are provided. A login request from a client is received, and in response, a token request from the client is issued. The token request identifies one or more sequence positions. One or more client tokens generated by the client are received based on the one or more sequence positions of the tokens. A sequence of tokens based on a first seed and a first algorithm are generated. The login request is authenticated by comparing the one or more client tokens with the sequence of tokens, based at least in part, on the one or more sequence positions.Type: ApplicationFiled: November 10, 2015Publication date: May 11, 2017Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Patent number: 9602489Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: GrantFiled: October 22, 2014Date of Patent: March 21, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Publication number: 20160350338Abstract: An approach for enabling collaborative development of a database application is provided. Specifically, this approach provides a database development and collaboration tool (DDCT), which can be utilized by multiple developers involved in a particular software project, to enable automated synchronization and database version control by allowing a database development language and data changes to be stored in a metadata form that is general to more than one database management system (DBMS). Each developer is united and able to collaborate through the system, thus ensuring that a change to a database structure and/or data in a static data table created in a particular database language by one developer is automatically incorporated in the overall development process. Furthermore, the DDCT provides the opportunity to maintain a single repository entry for more than one DBMS, which simplifies synchronization.Type: ApplicationFiled: August 9, 2016Publication date: December 1, 2016Inventors: Marina A. Greenstein, Galina Grunin, Maria N. Schwenger, Pandikumar Swamikrishnan
-
Publication number: 20160277420Abstract: An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information.Type: ApplicationFiled: March 16, 2015Publication date: September 22, 2016Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Patent number: 9442996Abstract: An approach for enabling collaborative development of a database application is provided. Specifically, this approach provides a database development and collaboration tool (DDCT), which can be utilized by multiple developers involved in a particular software project, to enable automated synchronization and database version control by allowing a database development language and data changes to be stored in a metadata form that is general to more than one database management system (DBMS). Each developer is united and able to collaborate through the system, thus ensuring that a change to a database structure and/or data in a static data table created in a particular database language by one developer is automatically incorporated in the overall development process. Furthermore, the DDCT provides the opportunity to maintain a single repository entry for more than one DBMS, which simplifies synchronization.Type: GrantFiled: January 15, 2014Date of Patent: September 13, 2016Assignee: International Business Machines CorporationInventors: Marina A. Greenstein, Galina Grunin, Maria N. Schwenger, Pandikumar Swamikrishnan
-
Publication number: 20160104360Abstract: A method includes pairing at least two tags and attaching each one of the at least two tags to objects; a computer device sensing the proximity of each tagged object; and the computer device issuing alerts depending on the sensed proximity of each tagged object, wherein a first alert is triggered when one of the tagged objects leaves a secured area without a corresponding paired tagged object.Type: ApplicationFiled: October 11, 2014Publication date: April 14, 2016Inventors: Galina Grunin, David Edward Nachman, Nader M. Nassar, Tamer Nassar
-
Patent number: 9264393Abstract: Embodiments of the present invention provide a method, system, and program product for managing the flow of electronic mail. A computing device receives from a sender a first electronic mail addressed to first and second recipients in a serial propagation mode, and in response, the computing device transmits the first electronic mail en route to the first but not the second recipient. A computing device receives a second electronic mail from the first recipient as a response to the first electronic mail, and in response, a computing device transmits the first electronic email to the second recipient.Type: GrantFiled: February 13, 2013Date of Patent: February 16, 2016Assignee: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Publication number: 20150253745Abstract: An embodiment of the invention provides a method for a utility consumption advisor, wherein a target electricity consumption for a predefined time period is received with a user interface. User parameters are also received with the user interface, the user parameters including a list of electricity consumption items that may not be modified, a list of electricity consumption items that may be modified, and a range of modification for each of the listed electricity consumption items that may be modified. The user's electricity consumption history is determined; and, an electricity utilization plan is generated for the predefined time period with a processor. The electricity utilization plan is generated based on the target electricity consumption, the user parameters, and the user's electricity consumption history. The electricity utilization plan is implemented by wirelessly controlling the electricity consumption items that may be modified.Type: ApplicationFiled: March 5, 2014Publication date: September 10, 2015Applicant: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer Nassar
-
Publication number: 20150199395Abstract: An approach for enabling collaborative development of a database application is provided. Specifically, this approach provides a database development and collaboration tool (DDCT), which can be utilized by multiple developers involved in a particular software project, to enable automated synchronization and database version control by allowing a database development language and data changes to be stored in a metadata form that is general to more than one database management system (DBMS). Each developer is united and able to collaborate through the system, thus ensuring that a change to a database structure and/or data in a static data table created in a particular database language by one developer is automatically incorporated in the overall development process. Furthermore, the DDCT provides the opportunity to maintain a single repository entry for more than one DBMS, which simplifies synchronization.Type: ApplicationFiled: January 15, 2014Publication date: July 16, 2015Applicant: International Business Machines CorporationInventors: Marina A. Greenstein, Galina Grunin, Maria N. Schwenger, Pandikumar Swamikrishnan
-
Publication number: 20150040191Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: ApplicationFiled: October 22, 2014Publication date: February 5, 2015Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Publication number: 20150020176Abstract: Techniques for advanced login security using personalized, user-specific urls are provided. In one aspect, a method for authenticating a user is provided. The method includes the following steps. A personalized login url and credentials (e.g., username and password) are stored for the user. Upon receipt of a login url from the user, it is verified whether the login url matches the personalized url stored for the user. If the login url matches the personalized url for the user, then the user is provided with a user-specific login page where the user can enter credentials, otherwise access is denied. The user is authenticated only if the credentials the user enters match the credentials stored for the user, otherwise denying access.Type: ApplicationFiled: September 20, 2013Publication date: January 15, 2015Applicant: International Business Machines CorporationInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Publication number: 20150020178Abstract: Techniques for advanced login security using personalized, user-specific urls are provided. In one aspect, a method for authenticating a user is provided. The method includes the following steps. A personalized login url and credentials (e.g., username and password) are stored for the user. Upon receipt of a login url from the user, it is verified whether the login url matches the personalized url stored for the user. If the login url matches the personalized url for the user, then the user is provided with a user-specific login page where the user can enter credentials, otherwise access is denied. The user is authenticated only if the credentials the user enters match the credentials stored for the user, otherwise denying access.Type: ApplicationFiled: July 12, 2013Publication date: January 15, 2015Inventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Patent number: 8914644Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: GrantFiled: September 12, 2013Date of Patent: December 16, 2014Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Publication number: 20140229554Abstract: Embodiments of the present invention provide a method, system, and program product for managing the flow of electronic mail. A computing device receives from a sender a first electronic mail addressed to first and second recipients in a serial propagation mode, and in response, the computing device transmits the first electronic mail en route to the first but not the second recipient. A computing device receives a second electronic mail from the first recipient as a response to the first electronic mail, and in response, a computing device transmits the first electronic email to the second recipient.Type: ApplicationFiled: February 13, 2013Publication date: August 14, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Galina Grunin, David E. Nachman, Nader M. Nassar, Tamer M. Nassar
-
Publication number: 20140122686Abstract: A program product and system that implements a method for adding an Information Technology (IT) structure A to an IT structure X. A first list of all dependencies of elements in a composition of X is received. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs. A second list of all dependencies of A is received. It is determined that no dependency of A in the second list has an exclusion with a class Z to which an element E in the composition of X belongs. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs and ensuring that A's dependencies are satisfied followed by adding A to X.Type: ApplicationFiled: January 6, 2014Publication date: May 1, 2014Applicant: International Business Machines CorporationInventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky