Patents by Inventor Martin Oberhofer

Martin Oberhofer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190251290
    Abstract: A computer implemented method for data anonymization comprises: receiving a request for data that needs anonymization. The request comprises at least one field descriptor of data to be retrieved and a usage scenario of a user for the requested data. Then, based on the usage scenario, an anonymization algorithm to be applied to the data that is referred to by the field descriptor is determined. Subsequently, the determined anonymization algorithm is applied to the data that is referred to by the field descriptor. A testing is performed, as to whether the degree of anonymization fulfills a requirement that is related to the usage scenario. In the case, the requirement is fulfilled, access to the anonymized data is provided.
    Type: Application
    Filed: April 23, 2019
    Publication date: August 15, 2019
    Inventors: ALBERT MAIER, MARTIN OBERHOFER, YANNICK SAILLET
  • Publication number: 20190197250
    Abstract: A system and method for managing and controlling data licenses for information assets. An information asset is stored in a repository, and registered in a catalog for the repository. A data license is associated with the information asset in the catalog, wherein the data license is stored as part of the information asset's metadata in the catalog. Access to the information asset stored in the repository is controlled based on the data license. A new data license is automatically created for a new information asset derived from an existing information asset, wherein the new data license is derived from an existing data license for the existing information asset. A lineage graph of the information asset is automatically created for audit purposes, to show that the information asset has been accessed in compliance with the data license.
    Type: Application
    Filed: December 27, 2017
    Publication date: June 27, 2019
    Inventors: Ivan Matthew Milman, Martin Oberhofer, Sushain Pandit, Charles Daniel Wolfson
  • Publication number: 20190188312
    Abstract: User information categorization using consent-based class rules is described. Consent from a user is received regarding at least one functional area where user information is shareable is received. Based on the consent, at least one data class that is permitted to be shared is determined. A user information designation is associated with the at least one data class and class rules are applied to user information associated with the user information designation based on the association between the user information designation and the at least one data class.
    Type: Application
    Filed: December 14, 2017
    Publication date: June 20, 2019
    Inventors: Sushain Pandit, Martin Oberhofer, Steven Lockwood
  • Publication number: 20190188601
    Abstract: A method for presenting search query results is provided. The method may include detecting an occurrence of the trigger event. The method may include determining a category of information based on data associated with the trigger event. The method may include identifying at least one constraint based on the determined category of information. The method may include appending to the identified at least one constraint to the determined category of information. The method may include generating at least one search query. The method may include selecting at least one candidate website based on the category of information. The method may include performing the at least one search query on the at least one candidate website. The method may include filtering each search query result within the search query results. The method may include sending each filtered search query result within the search query results to a user.
    Type: Application
    Filed: February 22, 2019
    Publication date: June 20, 2019
    Inventors: Geetika T. Lakshmanan, Martin A. Oberhofer
  • Publication number: 20190179888
    Abstract: A method for generating data standardization rules includes receiving a training data set containing tokenized and tagged data values. A set of machine mining models is built using different learning algorithms for identifying tags and tag patterns using the training set. For each data value in a further data set: a tokenization is applied on the data value, resulting in a set of tokens. For each token of the set of tokens one or more tag candidates are determined using a lookup dictionary of tags and tokens and/or at least part of the set of machine mining models, resulting for each token of the set of tokens in a list of possible tags. Unique combinations of the sets of tags of the further data set having highest aggregated confidence values are provided for use as standardization rules.
    Type: Application
    Filed: December 12, 2017
    Publication date: June 13, 2019
    Inventors: Yannick Saillet, Martin Oberhofer, Namit Kabra
  • Patent number: 10311075
    Abstract: Method and system are provided for refactoring of databases to include soft type information. The method may include: carrying out data profiling of soft type data to generate an attribute list with mapping suggestions to a hardened database structure; generating a data model definition and extract, transform, and load logic for transforming the soft type data based on the attribute list and mapping suggestions; executing the data model definition to create a new or modified database structure; moving data from an existing database structure to the new or modified database structure; and regenerating a services interface for access to the data.
    Type: Grant
    Filed: December 5, 2014
    Date of Patent: June 4, 2019
    Assignee: International Business Machines Corporation
    Inventors: Nicholas Kanellos, Jonathan Limburn, Ivan M. Milman, Martin Oberhofer
  • Patent number: 10311393
    Abstract: In a method for determining appropriate runtime environments for execution of a process model, a computer receives a process model. The process model includes a plurality of activities, wherein two activities are linked by a relationship. The computer determines that the two activities linked by a relationship match a process pattern. The computer determines one or more runtime environments for execution of the process model, wherein each of the one or more runtime environments is capable of executing the process pattern.
    Type: Grant
    Filed: September 19, 2017
    Date of Patent: June 4, 2019
    Assignee: International Business Machines Corporation
    Inventors: Khirallah Birkler, Boris Feist, Martin A. Oberhofer, Torsten Wilms
  • Publication number: 20190156060
    Abstract: A computer implemented method for data anonymization comprises: receiving a request for data that needs anonymization. The request comprises at least one field descriptor of data to be retrieved and a usage scenario of a user for the requested data. Then, based on the usage scenario, an anonymization algorithm to be applied to the data that is referred to by the field descriptor is determined. Subsequently, the determined anonymization algorithm is applied to the data that is referred to by the field descriptor. A testing is performed, as to whether the degree of anonymization fulfills a requirement that is related to the usage scenario. In the case, the requirement is fulfilled, access to the anonymized data is provided.
    Type: Application
    Filed: November 17, 2017
    Publication date: May 23, 2019
    Inventors: ALBERT MAIER, MARTIN OBERHOFER, YANNICK SAILLET
  • Publication number: 20190156000
    Abstract: The invention relates to a computer-implemented method for user authentication using a cryptographically secured register. An authentication request for authenticating the user is received. The user is authenticated using a root identity of the user. A successful authentication requires receiving a credential assigned to a root identifier of the root identity of the user. An authentication context of the requested authentication is identified. One of the one or more delegated identities assigned to the root identity of the user and assigned to the identified authentication context is identified. In response to a successful authentication of the user, an authentication token is issued confirming the successful user authentication and identifying the successfully authenticated user by the delegated identifier of the identified delegated identity.
    Type: Application
    Filed: November 20, 2017
    Publication date: May 23, 2019
    Inventors: PHILIPP HOFFMANN, DAVID LEBUTSCH, MARTIN OBERHOFER, DANIEL PITTNER, MEHMET UENLUETEPE
  • Patent number: 10290007
    Abstract: The present disclosure details a method and system used for turning human participants who control avatars in a virtual world setting into real life marketing leads. In one embodiment, a virtual location is presented within a virtual world to facilitate interaction with an avatar. The avatar is identified within a master data management system, and a profile of the human behind the avatar is created or retrieved. To encourage the human user to provide real-world information through the avatar within the virtual world, an incentive is offered and awarded as necessary. The real-world information about the human user, such as address or demographic information about the human user is collected and stored in the profile, and eventually synchronized with a CRM system. As appropriate, the data collected and compiled in the CRM system may be used to launch marketing campaigns.
    Type: Grant
    Filed: January 22, 2009
    Date of Patent: May 14, 2019
    Assignee: International Business Machines Corporation
    Inventors: Albert Maier, Dirk Nowak, Martin Oberhofer, Thomas Schwarz, Baxter R. Yazbek
  • Patent number: 10289961
    Abstract: A method for presenting search query results is provided. The method may include detecting an occurrence of the trigger event. The method may include determining a category of information based on data associated with the trigger event. The method may include identifying at least one constraint based on the determined category of information. The method may include appending to the identified at least one constraint to the determined category of information. The method may include generating at least one search query. The method may include selecting at least one candidate website based on the category of information. The method may include performing the at least one search query on the at least one candidate website. The method may include filtering each search query result within the search query results. The method may include sending each filtered search query result within the search query results to a user.
    Type: Grant
    Filed: November 24, 2014
    Date of Patent: May 14, 2019
    Assignee: International Business Machines Corporation
    Inventors: Geetika T. Lakshmanan, Martin A. Oberhofer
  • Publication number: 20190139576
    Abstract: Systems and methods for tagging video content are disclosed. A method includes: receiving a video stream from a user computer device, the video stream including audio data and video data; determining a candidate audio tag based on analyzing the audio data; establishing an audio confidence score of the candidate audio tag based on the analyzing of the audio data; determining a candidate video tag based on analyzing the video data; establishing a video confidence score of the candidate video tag based on the analyzing of the video data; determining a correlation factor of the candidate audio tag relative to the candidate video tag; and assigning a tag to a portion in the video stream based on the correlation factor exceeding a correlation threshold value and at least one of the audio confidence score exceeding an audio threshold value and the video confidence score exceeding a video threshold value.
    Type: Application
    Filed: November 6, 2017
    Publication date: May 9, 2019
    Inventors: Mark P. Delaney, Robert H. Grant, Trudy L. Hewitt, Martin A. Oberhofer
  • Publication number: 20190130027
    Abstract: The invention relates to a computer-implemented method for classifying a set of data values. For each of the data values of the set of data values, a set of one or more terms associated with the respective data value is determined using one or more first knowledge bases. A set of common terms is determined. The set of common terms comprises terms present in more than one of the sets of terms. For each of the common terms, a number of hits for a lookup query against one or more second knowledge data bases is determined. One or more common terms of the set of common terms with the smallest number of hits are determined and a result is returned. The result comprises the one or more common terms with the smallest number of hits as one or more candidate classes for classifying the set of data values.
    Type: Application
    Filed: November 2, 2017
    Publication date: May 2, 2019
    Inventors: ALBERT MAIER, MARTIN OBERHOFER, YANNICK SAILLET
  • Publication number: 20190122226
    Abstract: A method, computer system, and a computer program product for smart validation of suspicious activity reports is provided. The present invention may include receiving a plurality of suspicious activity data from a reporting software. The present invention may also include analyzing the plurality of suspicious activity data using a plurality of analytics, wherein the analysis validates the plurality of stored suspicious activity data using the plurality of analytics. The present invention may then include providing feedback to a user based on the analyzed plurality of suspicious activity.
    Type: Application
    Filed: October 20, 2017
    Publication date: April 25, 2019
    Inventors: Vijay Ekambaram, Ivan M. Milman, Martin Oberhofer, Sushain Pandit
  • Patent number: 10262149
    Abstract: The program controls access to data objects stored on a tangible device of a computer system within an enterprise. A user request to access a data object identifies a user role by looking up the user identification in an enterprise directory. The program determines whether the role of the user is permitted access to a system and also determines a risk score representing a risk of dissemination of the requested data object. The program compares the risk score of the requested data object to a pre-configured threshold value of the requested data object and controls access to the requested data object, based on the role of the user, and the risk score associated with the risk of disseminating the requested data object.
    Type: Grant
    Filed: June 16, 2017
    Date of Patent: April 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Ivan M. Milman, Martin Oberhofer, Sushain Pandit
  • Patent number: 10255364
    Abstract: A user interface is generated that displays a set of selectable terms from a glossary of business terms and is configured to generate a business metadata query that identifies a forum with member profiles. A data movement executable is generated that identifies the forum and an analytical processing environment. The data movement executable is deployed and data is moved from the forum into the analytical processing environment. Analytics are performed on the data from the forum. Metadata is identified from the analytics. The glossary of business terms is updated using the metadata from the analytics.
    Type: Grant
    Filed: November 24, 2014
    Date of Patent: April 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Brian P. Byrne, Ivan M. Milman, Martin Oberhofer, Sushain Pandit
  • Publication number: 20190102259
    Abstract: A logging process in a data storage system having a set of storage tiers, each storage tier of the set of storage tiers having different performance characteristics, wherein the set of storage tiers is divided into a plurality of subsets of storage tiers using the performance characteristics, may include initiating the logging process for creating a separate log file for each of the plurality of subsets of storage tiers for maintaining a history of data changes in the subset of storage tiers, thereby creating a plurality of log files. In response to a change in data stored in at least one storage tier of a subset of storage tiers of the plurality of subsets of storage tiers, one or more log records including information about the change may be generated and written into respective log files.
    Type: Application
    Filed: November 30, 2018
    Publication date: April 4, 2019
    Inventors: Martin Oberhofer, Jens P. Seifert, Kostas Rakopoulos, Stephen Rees
  • Publication number: 20190095391
    Abstract: Embodiments relate to processing a data set stored in a computer system. In one aspect, a method of processing a data set stored in a computer system includes providing one or more parameters for quantifying data quality of the data set. A processor generates, for each parameter of the one or more parameters, a reference pattern indicating a dysfunctional behavior of the values of the parameter. The data set is processed to obtain values of the one or more parameters. A parameter of the one or more parameters is identified whose obtained values match a corresponding reference pattern of the generated reference patterns. The identified parameter is assigned a resource weight value indicating the amount of processing resources required to fix the dysfunctional behavior of the identified parameter.
    Type: Application
    Filed: November 29, 2018
    Publication date: March 28, 2019
    Inventors: Sebastian Nelke, Martin Oberhofer, Yannick Saillet, Jens Seifert
  • Publication number: 20190095801
    Abstract: A method, computer system, and computer program product for providing recommendations about processing datasets. A set of machine learning models are provided for use in respectively determining data processing action performable on a dataset based on a respective set of features of the dataset. A current dataset is received. A set of features of the current dataset are determined. One or more data processing actions are generated to be executed on the current dataset, which are determined by at least two machine learning models of the provided set, based on the determined set of features of the current dataset. One or more of the data processing actions are performed on the current dataset.
    Type: Application
    Filed: September 22, 2017
    Publication date: March 28, 2019
    Inventors: Yannick Saillet, Martin A. Oberhofer, Jens P. Seifert
  • Patent number: 10210227
    Abstract: Embodiments relate to processing a data set stored in a computer system. In one aspect, a method of processing a data set stored in a computer system includes providing one or more parameters for quantifying data quality of the data set. A processor generates, for each parameter of the one or more parameters, a reference pattern indicating a dysfunctional behavior of the values of the parameter. The data set is processed to obtain values of the one or more parameters. A parameter of the one or more parameters is identified whose obtained values match a corresponding reference pattern of the generated reference patterns. The identified parameter is assigned a resource weight value indicating the amount of processing resources required to fix the dysfunctional behavior of the identified parameter.
    Type: Grant
    Filed: May 13, 2015
    Date of Patent: February 19, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sebastian Nelke, Martin Oberhofer, Yannick Saillet, Jens Seifert