Patents by Inventor Paul C. Castro
Paul C. Castro has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8850393Abstract: Techniques are provided for testing new software slated to be deployed on a target machine population with a number of target machines having a number of existing software programs. Method steps can include obtaining a list of depending software programs on selected ones of the target machines. The list can include those of the existing software programs which depend on the new software and/or those of the existing software programs on which the new software depends. The steps can further include identifying relevant test cases based on the list of depending software programs, instantiating a plurality of test client platforms characteristic of the target machine population, and testing the relevant test cases on the plurality of test client platforms to identify failures.Type: GrantFiled: May 22, 2008Date of Patent: September 30, 2014Assignee: International Business Machines CorporationInventors: Paul C. Castro, Frederique A. Giraud, Ravindranath Konuru, Apratim Purakayastha, Danny L. Yeh
-
Publication number: 20140229827Abstract: Systems and methods for providing content using dynamic action templates are provided. A method for providing content to at least one user, comprises corresponding at least one action to at least one action template, associating the content with the at least one action, and presenting the content to the at least one user, wherein the at least one action template is appended to the content.Type: ApplicationFiled: August 13, 2013Publication date: August 14, 2014Applicant: International Business Machines CorporationInventors: Paul C. Castro, Yun-Wu Huang
-
Publication number: 20140229826Abstract: Systems and methods for providing content using dynamic action templates are provided. A method for providing content to at least one user, comprises corresponding at least one action to at least one action template, associating the content with the at least one action, and presenting the content to the at least one user, wherein the at least one action template is appended to the content.Type: ApplicationFiled: February 13, 2013Publication date: August 14, 2014Applicant: International Business Machines CorporationInventors: Paul C. Castro, Yun-Wu Huang
-
Publication number: 20140222994Abstract: Methods and systems for enabling an application to track provenance information include analyzing an application binary to discover injection points for provenance tracking code; overwriting instructions in the application binary at the injection points to create an instrumented application, where the overwritten instructions link the application binary to one or more instrumented libraries that invoke a provenance layer to track data operations; and deploying the instrumented application on a client device.Type: ApplicationFiled: February 7, 2013Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul C. Castro, Marco Pistoia, John Ponzo
-
Publication number: 20140223000Abstract: Systems for enabling an application to track provenance include an application analysis module configured to analyze an application binary to discover injection points for provenance tracking code; and an instruction alteration module configured to overwrite instructions in the application binary at the injection points to create an instrumented application. The overwritten instructions link the application binary to one or more instrumented libraries that invoke a provenance layer to track data operations.Type: ApplicationFiled: September 17, 2013Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul C. Castro, Marco Pistoia, John Ponzo
-
Publication number: 20140189786Abstract: Systems for proximity-based access control include a proximity module configured to determine whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance; a policy engine comprising a processor configured to determine whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold; and a security module configured to activate a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device.Type: ApplicationFiled: September 18, 2013Publication date: July 3, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul C. Castro, Yunwu Huang, Marco Pistoia, Umut Topkara
-
Publication number: 20140189785Abstract: Methods and systems for proximity-based access control include determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance; determining whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold with a processor; and activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device.Type: ApplicationFiled: January 3, 2013Publication date: July 3, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul C. Castro, Yunwu Huang, Marco Pistoia, Umut Topkara
-
Publication number: 20140181025Abstract: A method includes monitoring, on a computing device, data events corresponding to manipulation of data by an application. The monitoring is performed by a data library service that is embedded in the application. The method includes, in response to the monitoring indicating first data on the computing device is modified by the application, synchronizing, by the computing device under control at least in part of the data library service, second data stored on one or more storage providers in a network with the first data modified by the application and stored on the computing device. Apparatus and computer program products are also disclosed.Type: ApplicationFiled: September 16, 2013Publication date: June 26, 2014Applicant: International Business Machines CorporationInventors: Paul C. Castro, Marco Pistoia, John Ponzo
-
Publication number: 20140181023Abstract: A method includes monitoring, on a computing device, data events corresponding to manipulation of data by an application. The monitoring is performed by a data library service that is embedded in the application. The method includes, in response to the monitoring indicating first data on the computing device is modified by the application, synchronizing, by the computing device under control at least in part of the data library service, second data stored on one or more storage providers in a network with the first data modified by the application and stored on the computing device. Apparatus and computer program products are also disclosed.Type: ApplicationFiled: December 21, 2012Publication date: June 26, 2014Applicant: International Business Machines CorporationInventors: Paul C. Castro, Marco Pistoia, John Ponzo
-
Publication number: 20140150071Abstract: User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are currently logged in and authenticated to access a secure resource. A video connection is established between the user of the client device and the set of designated users that are currently logged in and authenticated to access the secure resource. In addition, an authentication request screen is sent showing captured video authentication data corresponding to the user of the client device to the set of designated users that are currently logged in and authenticated to access the secure resource.Type: ApplicationFiled: November 29, 2012Publication date: May 29, 2014Applicant: International Business Machines CorporationInventors: Paul C. Castro, Umut Topkara
-
Publication number: 20140150072Abstract: User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are currently logged in and authenticated to access a secure resource. A video connection is established between the user of the client device and the set of designated users that are currently logged in and authenticated to access the secure resource. In addition, an authentication request screen is sent showing captured video authentication data corresponding to the user of the client device to the set of designated users that are currently logged in and authenticated to access the secure resource.Type: ApplicationFiled: January 4, 2013Publication date: May 29, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul C. Castro, Umut Topkara
-
Publication number: 20140137246Abstract: An example includes intercepting one or more activities performed by an application on a computing device. The intercepting uses an instrumentation layer separating the application from an operating system on the computing device. The one or more activities are compared with one or more anomaly detection policies in a policy configuration file to detect or not detect presence of one or more anomalies. In response to the comparison detecting presence of one or more anomalies, indication(s) of the one or more anomalies are stored. Another example includes receiving indication(s) of anomaly(ies) experienced by an application on computing device(s) and analyzing the indication(s) of the anomaly(ies) to determine whether corrective action(s) should be issued. Responsive to a determination corrective action(s) should be issued based on the analyzing, the corrective action(s) are issued to the computing device(s). Methods, program products, and apparatus are disclosed.Type: ApplicationFiled: September 18, 2013Publication date: May 15, 2014Applicant: International Business Machines CorporationInventors: Mauro Baluda, Paul C. Castro, Marco Pistoia, John J. Ponzo
-
AUTOMATICALLY GENERATING CHALLENGE QUESTIONS INFERRED FROM USER HISTORY DATA FOR USER AUTHENTICATION
Publication number: 20140137203Abstract: User authentication is provided. At least one of a social network and a business network of each user in a plurality of users is accessed. User history data of each user in the plurality of users is monitored in the at least one of the social network and the business network. Challenge questions requiring a user response are generated based on monitoring the user history data of the users. The user response to a generated challenge question is evaluated. A set of events is triggered based on evaluating the user response.Type: ApplicationFiled: November 15, 2012Publication date: May 15, 2014Applicant: International Business Machines CorporationInventors: Paul C. Castro, Joseph W. Ligman, David M. Lubensky, Marco Pistoia, John J. Ponzo, Umut Topkara -
Publication number: 20140137239Abstract: An example includes intercepting one or more activities performed by an application on a computing device. The intercepting uses an instrumentation layer separating the application from an operating system on the computing device. The one or more activities are compared with one or more anomaly detection policies in a policy configuration file to detect or not detect presence of one or more anomalies. In response to the comparison detecting presence of one or more anomalies, indication(s) of the one or more anomalies are stored. Another example includes receiving indication(s) of anomaly(ies) experienced by an application on computing device(s) and analyzing the indication(s) of the anomaly(ies) to determine whether corrective action(s) should be issued. Responsive to a determination corrective action(s) should be issued based on the analyzing, the corrective action(s) are issued to the computing device(s). Methods, program products, and apparatus are disclosed.Type: ApplicationFiled: November 14, 2012Publication date: May 15, 2014Applicant: International Business Machines CorporationInventors: Mauro Baluda, Paul C. Castro, Marco Pistoia, John J. Ponzo
-
Publication number: 20140129589Abstract: Improved descriptive query techniques are provided. More particularly, techniques are provided for specifying and processing descriptive queries for data providers grouped into provider kinds with hierarchical containment relationships. The query may include arbitrary boolean combinations of arbitrary tests on the values of attributes of the data providers.Type: ApplicationFiled: January 9, 2014Publication date: May 8, 2014Applicant: International Business Machines CorporationInventors: Norman H. Cohen, Paul C. Castro, Archan Misra
-
Patent number: 8661016Abstract: Improved descriptive query techniques are provided. More particularly, techniques are provided for specifying and processing descriptive queries for data providers grouped into provider kinds with hierarchical containment relationships. The query may include arbitrary boolean combinations of arbitrary tests on the values of attributes of the data providers.Type: GrantFiled: February 21, 2012Date of Patent: February 25, 2014Assignee: International Business Machines CorporationInventors: Norman H. Cohen, Paul C. Castro, Archan Misra
-
Publication number: 20120331060Abstract: A method for sharing documents includes initiating a sharing session with a first participant and a second participant, wherein the first participant is communicatively connected to the second participant via a server, receiving a control request having an action from the first participant, determining whether the control request includes a share page action, and retrieving components of the page with available component types and sending components associated with preferences of the first participant to the first participant and components associated with preferences of the second participant to the second participant responsive to determining that the control request includes the share page action.Type: ApplicationFiled: September 10, 2012Publication date: December 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul C. Castro, Yun-Wu Huang, Peter Kissa, John J. Ponzo, Gegi Thomas
-
Publication number: 20120150904Abstract: Improved descriptive query techniques are provided. More particularly, techniques are provided for specifying and processing descriptive queries for data providers grouped into provider kinds with hierarchical containment relationships. The query may include arbitrary boolean combinations of arbitrary tests on the values of attributes of the data providers.Type: ApplicationFiled: February 21, 2012Publication date: June 14, 2012Applicant: International Business Machines CorporationInventors: Norman Howard Cohen, Paul C. Castro, Archan Misra
-
Patent number: 8200647Abstract: Improved descriptive query techniques are provided. More particularly, techniques are provided for specifying and processing descriptive queries for data providers grouped into provider kinds with hierarchical containment relationships. The query may include arbitrary boolean combinations of arbitrary tests on the values of attributes of the data providers.Type: GrantFiled: January 12, 2009Date of Patent: June 12, 2012Assignee: International Business Machines CorporationInventors: Norman Howard Cohen, Paul C. Castro, Archan Misra
-
Patent number: 8108338Abstract: Techniques for replicating data in a system having a data tier with a plurality of data sources and an application tier with a plurality of applications are provided. Such techniques can include creating an instance of an information model of the data that is specified by a schema. The model can be created in a form that is suitable for manipulation by at least one of the applications and that forms at least a portion of a model tier that is intermediate the data tier and the application tier. A replica of an instance of the information model can be created in a form suitable for remote transmission, and a consistency policy can be obtained that specifies a level of consistency required between the instance of the information model and the replica.Type: GrantFiled: October 31, 2008Date of Patent: January 31, 2012Assignee: International Business Machines CorporationInventors: Paul C. Castro, Frederique A. Giraud, Ravindranath Konuru, Apratim Purakayastha, Danny L. Yeh