Patents by Inventor Sean C. Foley

Sean C. Foley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10671578
    Abstract: Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for providing classification job estimation for a data security platform comprising one or more data sources, the method comprising: for each of the one or more data sources: counting the number of databases; counting the number of tables in each database; selecting a random database; selecting a random table within the random database; retrieving a database data sample from the random table; measuring one or more latencies associated with issuing and retrieving the database data sample; measuring a processing time required to evaluate the database data sample against one or more policy rules; compiling one or more mean times for the latencies and processing times; and calculating a data source scan time using the one or more mean times and the number of tables in each database; and calcul
    Type: Grant
    Filed: December 15, 2016
    Date of Patent: June 2, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sean C. Foley, Shuyan He
  • Patent number: 10397279
    Abstract: Data traffic is monitored on a network with data access elements thereof collected and compared to security rules. An audit data collection is sent to a repository responsive to data access elements matching a condition of the security rules, where security rules having the condition designate the audit data collection and repository. A tag to data traffic is applied responsive to the matching condition. Comparing of collected data access elements to the corresponding security rules having the matching condition is discontinued responsive to applying the tag. The tag indicates a repository and the data traffic includes a connection and session. An audit data collection is sent to the repository indicated by the tag for a data access responsive to the tag in the tagged data traffic. The method continues sending audit data for future data accesses in the tagged data traffic without comparing to the corresponding security rules again.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: August 27, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sean C. Foley, Ury Segal, Shidong Shan
  • Patent number: 10110637
    Abstract: Data traffic is monitored on a network with data access elements thereof collected and compared to security rules. An audit data collection is sent to a repository responsive to data access elements matching a condition of the security rules, where security rules having the condition designate the audit data collection and repository. A tag to data traffic is applied responsive to the matching condition. Comparing of collected data access elements to the corresponding security rules having the matching condition is discontinued responsive to applying the tag. The tag indicates a repository and the data traffic includes a connection and session. An audit data collection is sent to the repository indicated by the tag for a data access responsive to the tag in the tagged data traffic. The method continues sending audit data for future data accesses in the tagged data traffic without comparing to the corresponding security rules again.
    Type: Grant
    Filed: October 22, 2017
    Date of Patent: October 23, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sean C. Foley, Ury Segal, Shidong Shan
  • Publication number: 20180173735
    Abstract: Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for providing classification job estimation for a data security platform comprising one or more data sources, the method comprising: for each of the one or more data sources: counting the number of databases; counting the number of tables in each database; selecting a random database; selecting a random table within the random database; retrieving a database data sample from the random table; measuring one or more latencies associated with issuing and retrieving the database data sample; measuring a processing time required to evaluate the database data sample against one or more policy rules; compiling one or more mean times for the latencies and processing times; and calculating a data source scan time using the one or more mean times and the number of tables in each database; and calcul
    Type: Application
    Filed: December 15, 2016
    Publication date: June 21, 2018
    Inventors: Sean C. Foley, Shuyan He
  • Publication number: 20180139243
    Abstract: Data traffic is monitored on a network with data access elements thereof collected and compared to security rules. An audit data collection is sent to a repository responsive to data access elements matching a condition of the security rules, where security rules having the condition designate the audit data collection and repository. A tag to data traffic is applied responsive to the matching condition. Comparing of collected data access elements to the corresponding security rules having the matching condition is discontinued responsive to applying the tag. The tag indicates a repository and the data traffic includes a connection and session. An audit data collection is sent to the repository indicated by the tag for a data access responsive to the tag in the tagged data traffic. The method continues sending audit data for future data accesses in the tagged data traffic without comparing to the corresponding security rules again.
    Type: Application
    Filed: December 20, 2017
    Publication date: May 17, 2018
    Inventors: Sean C. Foley, Ury Segal, Shidong Shan
  • Patent number: 9973536
    Abstract: Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules. A first audit data collection is sent to a first repository in response to one or more data access elements of a first data access matching a first condition of one of the security rules. The one of the security rules having the first condition designates the first audit data collection and the first repository. A second audit data collection is sent to a second repository in response to one or more data access elements of a second data access matching a second condition of one of the security rules. The one of the security rules having the second condition designates the second audit data collection and the second repository.
    Type: Grant
    Filed: July 21, 2015
    Date of Patent: May 15, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sean C. Foley, Ury Segal, Shidong Shan
  • Publication number: 20180063196
    Abstract: Data traffic is monitored on a network with data access elements thereof collected and compared to security rules. An audit data collection is sent to a repository responsive to data access elements matching a condition of the security rules, where security rules having the condition designate the audit data collection and repository. A tag to data traffic is applied responsive to the matching condition. Comparing of collected data access elements to the corresponding security rules having the matching condition is discontinued responsive to applying the tag. The tag indicates a repository and the data traffic includes a connection and session. An audit data collection is sent to the repository indicated by the tag for a data access responsive to the tag in the tagged data traffic. The method continues sending audit data for future data accesses in the tagged data traffic without comparing to the corresponding security rules again.
    Type: Application
    Filed: October 22, 2017
    Publication date: March 1, 2018
    Inventors: Sean C. Foley, Ury Segal, Shidong Shan
  • Patent number: 9785670
    Abstract: A method, system, and/or computer program product revises a policy that provides rules on how to alter statements to access or manipulate data in a database. A user interface (UI) has a field containing a sample database query statement. The sample database query statement is parsed into clauses, where each clause depicts a specific type of grammatical structure. A different hyperlink is associated with each of the clauses. In response to receiving a signal activating a particular hyperlink for a particular clause, change options, for the particular clause, are presented from a resource that presents change options for the specific type of grammatical structure. User-selected changes to the particular clause are incorporated into a new rule, which causes a clause of the particular type of grammatical structure in any database query statement to be changed. Each change becomes a new rule in a revised policy.
    Type: Grant
    Filed: March 2, 2015
    Date of Patent: October 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Steven Buschman, Sean C. Foley, Minhui Yang
  • Patent number: 9785669
    Abstract: A method, system, and/or computer program product revises a policy that provides rules on how to alter statements to access or manipulate data in a database. A user interface (UI) has a field containing a sample database query statement. The sample database query statement is parsed into clauses, where each clause depicts a specific type of grammatical structure. A different hyperlink is associated with each of the clauses. In response to receiving a signal activating a particular hyperlink for a particular clause, change options, for the particular clause, are presented from a resource that presents change options for the specific type of grammatical structure. User-selected changes to the particular clause are incorporated into a new rule, which causes a clause of the particular type of grammatical structure in any database query statement to be changed. Each change becomes a new rule in a revised policy.
    Type: Grant
    Filed: May 21, 2014
    Date of Patent: October 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Steven Buschman, Sean C. Foley, Minhui Yang
  • Patent number: 9721092
    Abstract: An application that runs in a process virtual machine is monitored by injecting listening code into a target class of the application. The listening code collects and forwards data to a monitoring agent. The target class is configured for monitoring according to alternative embodiments. In response to the process virtual machine providing notification of an event, such a loading the target class, the listening code may be injected into the target class. In another embodiment, the process virtual machine is configured to load a first mirror class containing a mirror entry point to the application. A mirror target class is loaded in response to a request to load the target class. The mirror target class contains a mirror entry point to the target class and the listening code. In another embodiment, listening code may be added to the target class before running the application.
    Type: Grant
    Filed: March 27, 2014
    Date of Patent: August 1, 2017
    Assignee: International Busines Machines Corporation
    Inventor: Sean C. Foley
  • Patent number: 9710379
    Abstract: According to an aspect, a user interface is provided for assisting a user with identifying parameters for starting an application that utilizes real-time garbage collection (GC). The parameters include a fixed heap size and a GC central processing unit (CPU) utilization. Responsive to receiving a request from the user, the user is provided with options for profiling the application. The profiling includes executing the application. The options include targeting the GC CPU utilization to meet real-time requirements, targeting the heap size to meet the real-time requirements, and targeting a balance between the GC CPU utilization and the heap size to meet the real-time requirements. Responsive to detecting a selection of an option by the user, the application is profiled according to the option selected. The user is presented with results of the profiling via the user interface. The results include values for the parameters.
    Type: Grant
    Filed: February 27, 2015
    Date of Patent: July 18, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Sean C. Foley
  • Patent number: 9684786
    Abstract: An application that runs in a process virtual machine is monitored by injecting listening code into a target class of the application. The listening code collects and forwards data to a monitoring agent. The target class is configured for monitoring according to alternative embodiments. In response to the process virtual machine providing notification of an event, such a loading the target class, the listening code may be injected into the target class. In another embodiment, the process virtual machine is configured to load a first minor class containing a minor entry point to the application. A mirror target class is loaded in response to a request to load the target class. The minor target class contains a minor entry point to the target class and the listening code. In another embodiment, listening code may be added to the target class before running the application.
    Type: Grant
    Filed: September 2, 2014
    Date of Patent: June 20, 2017
    Assignee: International Business Machines Corporation
    Inventor: Sean C. Foley
  • Publication number: 20160253103
    Abstract: According to an aspect, a user interface is provided for assisting a user with identifying parameters for starting an application that utilizes real-time garbage collection (GC). The parameters include a fixed heap size and a GC central processing unit (CPU) utilization. Responsive to receiving a request from the user, the user is provided with options for profiling the application. The profiling includes executing the application. The options include targeting the GC CPU utilization to meet real-time requirements, targeting the heap size to meet the real-time requirements, and targeting a balance between the GC CPU utilization and the heap size to meet the real-time requirements. Responsive to detecting a selection of an option by the user, the application is profiled according to the option selected. The user is presented with results of the profiling via the user interface. The results include values for the parameters.
    Type: Application
    Filed: February 27, 2015
    Publication date: September 1, 2016
    Inventor: Sean C. Foley
  • Publication number: 20150339483
    Abstract: A method, system, and/or computer program product revises a policy that provides rules on how to alter statements to access or manipulate data in a database. A user interface (UI) has a field containing a sample database query statement. The sample database query statement is parsed into clauses, where each clause depicts a specific type of grammatical structure. A different hyperlink is associated with each of the clauses. In response to receiving a signal activating a particular hyperlink for a particular clause, change options, for the particular clause, are presented from a resource that presents change options for the specific type of grammatical structure. User-selected changes to the particular clause are incorporated into a new rule, which causes a clause of the particular type of grammatical structure in any database query statement to be changed. Each change becomes a new rule in a revised policy.
    Type: Application
    Filed: May 21, 2014
    Publication date: November 26, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: STEVEN BUSCHMAN, SEAN C. FOLEY, MINHUI YANG
  • Publication number: 20150339306
    Abstract: A method, system, and/or computer program product revises a policy that provides rules on how to alter statements to access or manipulate data in a database. A user interface (UI) has a field containing a sample database query statement. The sample database query statement is parsed into clauses, where each clause depicts a specific type of grammatical structure. A different hyperlink is associated with each of the clauses. In response to receiving a signal activating a particular hyperlink for a particular clause, change options, for the particular clause, are presented from a resource that presents change options for the specific type of grammatical structure. User-selected changes to the particular clause are incorporated into a new rule, which causes a clause of the particular type of grammatical structure in any database query statement to be changed. Each change becomes a new rule in a revised policy.
    Type: Application
    Filed: March 2, 2015
    Publication date: November 26, 2015
    Inventors: STEVEN BUSCHMAN, SEAN C. FOLEY, MINHUI YANG
  • Publication number: 20150326616
    Abstract: Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules. A first audit data collection is sent to a first repository in response to one or more data access elements of a first data access matching a first condition of one of the security rules. The one of the security rules having the first condition designates the first audit data collection and the first repository. A second audit data collection is sent to a second repository in response to one or more data access elements of a second data access matching a second condition of one of the security rules. The one of the security rules having the second condition designates the second audit data collection and the second repository.
    Type: Application
    Filed: July 21, 2015
    Publication date: November 12, 2015
    Inventors: Sean C. Foley, Ury Segal, Shidong Shan
  • Publication number: 20150278515
    Abstract: An application that runs in a process virtual machine is monitored by injecting listening code into a target class of the application. The listening code collects and forwards data to a monitoring agent. The target class is configured for monitoring according to alternative embodiments. In response to the process virtual machine providing notification of an event, such a loading the target class, the listening code may be injected into the target class. In another embodiment, the process virtual machine is configured to load a first mirror class containing a mirror entry point to the application. A mirror target class is loaded in response to a request to load the target class. The mirror target class contains a mirror entry point to the target class and the listening code. In another embodiment, listening code may be added to the target class before running the application.
    Type: Application
    Filed: March 27, 2014
    Publication date: October 1, 2015
    Applicant: International Business Machines Corporation
    Inventor: Sean C. Foley
  • Publication number: 20150278511
    Abstract: An application that runs in a process virtual machine is monitored by injecting listening code into a target class of the application. The listening code collects and forwards data to a monitoring agent. The target class is configured for monitoring according to alternative embodiments. In response to the process virtual machine providing notification of an event, such a loading the target class, the listening code may be injected into the target class. In another embodiment, the process virtual machine is configured to load a first minor class containing a minor entry point to the application. A mirror target class is loaded in response to a request to load the target class. The minor target class contains a minor entry point to the target class and the listening code. In another embodiment, listening code may be added to the target class before running the application.
    Type: Application
    Filed: September 2, 2014
    Publication date: October 1, 2015
    Inventor: Sean C. Foley
  • Patent number: 9124619
    Abstract: Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules providing sets of predefined data access elements for identifying predefined data accesses. First audit data collections for data accesses are sent to a first repository. For a data access that matches one of the rules, a second audit data collection defined by the matching rule is sent to at least a second repository designated by the matching rule.
    Type: Grant
    Filed: December 8, 2012
    Date of Patent: September 1, 2015
    Assignee: International Business Machines Corporation
    Inventors: Sean C. Foley, Ury Segal, Shidong Shan
  • Patent number: 9106682
    Abstract: Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules providing sets of predefined data access elements for identifying predefined data accesses. First audit data collections for data accesses are sent to a first repository. For a data access that matches one of the rules, a second audit data collection defined by the matching rule is sent to at least a second repository designated by the matching rule.
    Type: Grant
    Filed: July 8, 2013
    Date of Patent: August 11, 2015
    Assignee: International Business Machines Corporation
    Inventors: Sean C. Foley, Ury Segal, Shidong Shan