Patents by Inventor Paul C. Castro

Paul C. Castro has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8850393
    Abstract: Techniques are provided for testing new software slated to be deployed on a target machine population with a number of target machines having a number of existing software programs. Method steps can include obtaining a list of depending software programs on selected ones of the target machines. The list can include those of the existing software programs which depend on the new software and/or those of the existing software programs on which the new software depends. The steps can further include identifying relevant test cases based on the list of depending software programs, instantiating a plurality of test client platforms characteristic of the target machine population, and testing the relevant test cases on the plurality of test client platforms to identify failures.
    Type: Grant
    Filed: May 22, 2008
    Date of Patent: September 30, 2014
    Assignee: International Business Machines Corporation
    Inventors: Paul C. Castro, Frederique A. Giraud, Ravindranath Konuru, Apratim Purakayastha, Danny L. Yeh
  • Publication number: 20140229827
    Abstract: Systems and methods for providing content using dynamic action templates are provided. A method for providing content to at least one user, comprises corresponding at least one action to at least one action template, associating the content with the at least one action, and presenting the content to the at least one user, wherein the at least one action template is appended to the content.
    Type: Application
    Filed: August 13, 2013
    Publication date: August 14, 2014
    Applicant: International Business Machines Corporation
    Inventors: Paul C. Castro, Yun-Wu Huang
  • Publication number: 20140229826
    Abstract: Systems and methods for providing content using dynamic action templates are provided. A method for providing content to at least one user, comprises corresponding at least one action to at least one action template, associating the content with the at least one action, and presenting the content to the at least one user, wherein the at least one action template is appended to the content.
    Type: Application
    Filed: February 13, 2013
    Publication date: August 14, 2014
    Applicant: International Business Machines Corporation
    Inventors: Paul C. Castro, Yun-Wu Huang
  • Publication number: 20140222994
    Abstract: Methods and systems for enabling an application to track provenance information include analyzing an application binary to discover injection points for provenance tracking code; overwriting instructions in the application binary at the injection points to create an instrumented application, where the overwritten instructions link the application binary to one or more instrumented libraries that invoke a provenance layer to track data operations; and deploying the instrumented application on a client device.
    Type: Application
    Filed: February 7, 2013
    Publication date: August 7, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul C. Castro, Marco Pistoia, John Ponzo
  • Publication number: 20140223000
    Abstract: Systems for enabling an application to track provenance include an application analysis module configured to analyze an application binary to discover injection points for provenance tracking code; and an instruction alteration module configured to overwrite instructions in the application binary at the injection points to create an instrumented application. The overwritten instructions link the application binary to one or more instrumented libraries that invoke a provenance layer to track data operations.
    Type: Application
    Filed: September 17, 2013
    Publication date: August 7, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul C. Castro, Marco Pistoia, John Ponzo
  • Publication number: 20140189786
    Abstract: Systems for proximity-based access control include a proximity module configured to determine whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance; a policy engine comprising a processor configured to determine whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold; and a security module configured to activate a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device.
    Type: Application
    Filed: September 18, 2013
    Publication date: July 3, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul C. Castro, Yunwu Huang, Marco Pistoia, Umut Topkara
  • Publication number: 20140189785
    Abstract: Methods and systems for proximity-based access control include determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance; determining whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold with a processor; and activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device.
    Type: Application
    Filed: January 3, 2013
    Publication date: July 3, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul C. Castro, Yunwu Huang, Marco Pistoia, Umut Topkara
  • Publication number: 20140181025
    Abstract: A method includes monitoring, on a computing device, data events corresponding to manipulation of data by an application. The monitoring is performed by a data library service that is embedded in the application. The method includes, in response to the monitoring indicating first data on the computing device is modified by the application, synchronizing, by the computing device under control at least in part of the data library service, second data stored on one or more storage providers in a network with the first data modified by the application and stored on the computing device. Apparatus and computer program products are also disclosed.
    Type: Application
    Filed: September 16, 2013
    Publication date: June 26, 2014
    Applicant: International Business Machines Corporation
    Inventors: Paul C. Castro, Marco Pistoia, John Ponzo
  • Publication number: 20140181023
    Abstract: A method includes monitoring, on a computing device, data events corresponding to manipulation of data by an application. The monitoring is performed by a data library service that is embedded in the application. The method includes, in response to the monitoring indicating first data on the computing device is modified by the application, synchronizing, by the computing device under control at least in part of the data library service, second data stored on one or more storage providers in a network with the first data modified by the application and stored on the computing device. Apparatus and computer program products are also disclosed.
    Type: Application
    Filed: December 21, 2012
    Publication date: June 26, 2014
    Applicant: International Business Machines Corporation
    Inventors: Paul C. Castro, Marco Pistoia, John Ponzo
  • Publication number: 20140150071
    Abstract: User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are currently logged in and authenticated to access a secure resource. A video connection is established between the user of the client device and the set of designated users that are currently logged in and authenticated to access the secure resource. In addition, an authentication request screen is sent showing captured video authentication data corresponding to the user of the client device to the set of designated users that are currently logged in and authenticated to access the secure resource.
    Type: Application
    Filed: November 29, 2012
    Publication date: May 29, 2014
    Applicant: International Business Machines Corporation
    Inventors: Paul C. Castro, Umut Topkara
  • Publication number: 20140150072
    Abstract: User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are currently logged in and authenticated to access a secure resource. A video connection is established between the user of the client device and the set of designated users that are currently logged in and authenticated to access the secure resource. In addition, an authentication request screen is sent showing captured video authentication data corresponding to the user of the client device to the set of designated users that are currently logged in and authenticated to access the secure resource.
    Type: Application
    Filed: January 4, 2013
    Publication date: May 29, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul C. Castro, Umut Topkara
  • Publication number: 20140137246
    Abstract: An example includes intercepting one or more activities performed by an application on a computing device. The intercepting uses an instrumentation layer separating the application from an operating system on the computing device. The one or more activities are compared with one or more anomaly detection policies in a policy configuration file to detect or not detect presence of one or more anomalies. In response to the comparison detecting presence of one or more anomalies, indication(s) of the one or more anomalies are stored. Another example includes receiving indication(s) of anomaly(ies) experienced by an application on computing device(s) and analyzing the indication(s) of the anomaly(ies) to determine whether corrective action(s) should be issued. Responsive to a determination corrective action(s) should be issued based on the analyzing, the corrective action(s) are issued to the computing device(s). Methods, program products, and apparatus are disclosed.
    Type: Application
    Filed: September 18, 2013
    Publication date: May 15, 2014
    Applicant: International Business Machines Corporation
    Inventors: Mauro Baluda, Paul C. Castro, Marco Pistoia, John J. Ponzo
  • Publication number: 20140137203
    Abstract: User authentication is provided. At least one of a social network and a business network of each user in a plurality of users is accessed. User history data of each user in the plurality of users is monitored in the at least one of the social network and the business network. Challenge questions requiring a user response are generated based on monitoring the user history data of the users. The user response to a generated challenge question is evaluated. A set of events is triggered based on evaluating the user response.
    Type: Application
    Filed: November 15, 2012
    Publication date: May 15, 2014
    Applicant: International Business Machines Corporation
    Inventors: Paul C. Castro, Joseph W. Ligman, David M. Lubensky, Marco Pistoia, John J. Ponzo, Umut Topkara
  • Publication number: 20140137239
    Abstract: An example includes intercepting one or more activities performed by an application on a computing device. The intercepting uses an instrumentation layer separating the application from an operating system on the computing device. The one or more activities are compared with one or more anomaly detection policies in a policy configuration file to detect or not detect presence of one or more anomalies. In response to the comparison detecting presence of one or more anomalies, indication(s) of the one or more anomalies are stored. Another example includes receiving indication(s) of anomaly(ies) experienced by an application on computing device(s) and analyzing the indication(s) of the anomaly(ies) to determine whether corrective action(s) should be issued. Responsive to a determination corrective action(s) should be issued based on the analyzing, the corrective action(s) are issued to the computing device(s). Methods, program products, and apparatus are disclosed.
    Type: Application
    Filed: November 14, 2012
    Publication date: May 15, 2014
    Applicant: International Business Machines Corporation
    Inventors: Mauro Baluda, Paul C. Castro, Marco Pistoia, John J. Ponzo
  • Publication number: 20140129589
    Abstract: Improved descriptive query techniques are provided. More particularly, techniques are provided for specifying and processing descriptive queries for data providers grouped into provider kinds with hierarchical containment relationships. The query may include arbitrary boolean combinations of arbitrary tests on the values of attributes of the data providers.
    Type: Application
    Filed: January 9, 2014
    Publication date: May 8, 2014
    Applicant: International Business Machines Corporation
    Inventors: Norman H. Cohen, Paul C. Castro, Archan Misra
  • Patent number: 8661016
    Abstract: Improved descriptive query techniques are provided. More particularly, techniques are provided for specifying and processing descriptive queries for data providers grouped into provider kinds with hierarchical containment relationships. The query may include arbitrary boolean combinations of arbitrary tests on the values of attributes of the data providers.
    Type: Grant
    Filed: February 21, 2012
    Date of Patent: February 25, 2014
    Assignee: International Business Machines Corporation
    Inventors: Norman H. Cohen, Paul C. Castro, Archan Misra
  • Publication number: 20120331060
    Abstract: A method for sharing documents includes initiating a sharing session with a first participant and a second participant, wherein the first participant is communicatively connected to the second participant via a server, receiving a control request having an action from the first participant, determining whether the control request includes a share page action, and retrieving components of the page with available component types and sending components associated with preferences of the first participant to the first participant and components associated with preferences of the second participant to the second participant responsive to determining that the control request includes the share page action.
    Type: Application
    Filed: September 10, 2012
    Publication date: December 27, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul C. Castro, Yun-Wu Huang, Peter Kissa, John J. Ponzo, Gegi Thomas
  • Publication number: 20120150904
    Abstract: Improved descriptive query techniques are provided. More particularly, techniques are provided for specifying and processing descriptive queries for data providers grouped into provider kinds with hierarchical containment relationships. The query may include arbitrary boolean combinations of arbitrary tests on the values of attributes of the data providers.
    Type: Application
    Filed: February 21, 2012
    Publication date: June 14, 2012
    Applicant: International Business Machines Corporation
    Inventors: Norman Howard Cohen, Paul C. Castro, Archan Misra
  • Patent number: 8200647
    Abstract: Improved descriptive query techniques are provided. More particularly, techniques are provided for specifying and processing descriptive queries for data providers grouped into provider kinds with hierarchical containment relationships. The query may include arbitrary boolean combinations of arbitrary tests on the values of attributes of the data providers.
    Type: Grant
    Filed: January 12, 2009
    Date of Patent: June 12, 2012
    Assignee: International Business Machines Corporation
    Inventors: Norman Howard Cohen, Paul C. Castro, Archan Misra
  • Patent number: 8108338
    Abstract: Techniques for replicating data in a system having a data tier with a plurality of data sources and an application tier with a plurality of applications are provided. Such techniques can include creating an instance of an information model of the data that is specified by a schema. The model can be created in a form that is suitable for manipulation by at least one of the applications and that forms at least a portion of a model tier that is intermediate the data tier and the application tier. A replica of an instance of the information model can be created in a form suitable for remote transmission, and a consistency policy can be obtained that specifies a level of consistency required between the instance of the information model and the replica.
    Type: Grant
    Filed: October 31, 2008
    Date of Patent: January 31, 2012
    Assignee: International Business Machines Corporation
    Inventors: Paul C. Castro, Frederique A. Giraud, Ravindranath Konuru, Apratim Purakayastha, Danny L. Yeh