Patents by Inventor Ted A. Habeck
Ted A. Habeck has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11372997Abstract: Automatically generating audit logs is provided. Audit log statement insertion points are identified in components of an application based on a static code analysis identifying start and end operations on sensitive data in the components of the application. The application is instrumented with audit log statements at the audit log statement insertion points in the components of the application. Audit logs of monitored sensitive data activity events in the application are generated using the audit log statements at the audit log statement insertion points in the components of the application.Type: GrantFiled: March 10, 2020Date of Patent: June 28, 2022Assignee: International Business Machines CorporationInventors: Suresh N. Chari, Ted A. Habeck, Ashish Kundu, Ian M. Molloy
-
Patent number: 10891371Abstract: Detecting malicious user activity is provided. A profile for a user that accesses a set of protected assets is generated based on static information representing an organizational view and associated attributes corresponding to the user and based on dynamic information representing observable actions made by the user. A plurality of analytics is applied on the profile corresponding to the user to generate an aggregate risk score for the user accessing the set of protected assets based on applying the plurality of analytics on the profile of the user. A malicious user activity alert is generated in response to the aggregate risk score for the user accessing the set of protected assets being greater than an alert threshold value. The malicious user activity alert is sent to an analyst for feedback.Type: GrantFiled: October 10, 2019Date of Patent: January 12, 2021Assignee: International Business Machines CorporationInventors: Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken
-
Publication number: 20200210609Abstract: Automatically generating audit logs is provided. Audit log statement insertion points are identified in components of an application based on a static code analysis identifying start and end operations on sensitive data in the components of the application. The application is instrumented with audit log statements at the audit log statement insertion points in the components of the application. Audit logs of monitored sensitive data activity events in the application are generated using the audit log statements at the audit log statement insertion points in the components of the application.Type: ApplicationFiled: March 10, 2020Publication date: July 2, 2020Inventors: Suresh N. Chari, Ted A. Habeck, Ashish Kundu, Ian M. Molloy
-
Patent number: 10628600Abstract: Automatically generating audit logs is provided. Audit log statement insertion points are identified in software components of an application based on a static code analysis identifying start and end operations on sensitive data in the software components of the application. The application is instrumented with audit log statements at the audit log statement insertion points in the software components of the application. Audit logs of monitored sensitive data activity events in the application are generated using the audit log statements at the audit log statement insertion points in the software components of the application. A dynamic code analysis is performed on the application during execution of the application to prevent executing source code of the application from recording in the audit logs the sensitive data processed by the application.Type: GrantFiled: March 6, 2018Date of Patent: April 21, 2020Assignee: International Business Machines CorporationInventors: Suresh N. Chari, Ted A. Habeck, Ashish Kundu, Ian M. Molloy
-
Patent number: 10599837Abstract: Detecting malicious user activity is provided. A profile for a user that accesses a set of protected assets is generated based on static information representing an organizational view and associated attributes corresponding to the user and based on dynamic information representing observable actions made by the user. A plurality of analytics is applied on the profile corresponding to the user to generate an aggregate risk score for the user accessing the set of protected assets based on applying the plurality of analytics on the profile of the user. A malicious user activity alert is generated in response to the aggregate risk score for the user accessing the set of protected assets being greater than an alert threshold value. The malicious user activity alert is sent to an analyst for feedback.Type: GrantFiled: March 31, 2016Date of Patent: March 24, 2020Assignee: International Business Machines CorporationInventors: Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken
-
Publication number: 20200042699Abstract: Detecting malicious user activity is provided. A profile for a user that accesses a set of protected assets is generated based on static information representing an organizational view and associated attributes corresponding to the user and based on dynamic information representing observable actions made by the user. A plurality of analytics is applied on the profile corresponding to the user to generate an aggregate risk score for the user accessing the set of protected assets based on applying the plurality of analytics on the profile of the user. A malicious user activity alert is generated in response to the aggregate risk score for the user accessing the set of protected assets being greater than an alert threshold value. The malicious user activity alert is sent to an analyst for feedback.Type: ApplicationFiled: October 10, 2019Publication date: February 6, 2020Inventors: Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken
-
Patent number: 10482265Abstract: Log(s) of IT events are accessed in a distributed system that includes a distributed application. The distributed system includes multiple data objects. The distributed application uses, processes, or otherwise accesses one or more of data objects. The IT events concern the distributed application and concern accesses by the distributed application to the data object(s). The IT events are correlated with a selected set of the data objects. Risks are estimated to the selected set of data objects based on the information technology events. Estimating risks uses at least ranks of compliance rules as these rules apply to the data objects in the system, and vulnerability scores of systems corresponding to the set of data objects and information technology events. Information is output that allows a user to determine the estimated risks for the selected set of data objects. Techniques for determining ranks of compliance rules are also disclosed.Type: GrantFiled: December 30, 2015Date of Patent: November 19, 2019Assignee: International Business Machines CorporationInventors: Suresh N. Chari, Ted Habeck, Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis, Josyula R. Rao, Marc P. Stoecklin
-
Publication number: 20180196958Abstract: Automatically generating audit logs is provided. Audit log statement insertion points are identified in software components of an application based on a static code analysis identifying start and end operations on sensitive data in the software components of the application. The application is instrumented with audit log statements at the audit log statement insertion points in the software components of the application. Audit logs of monitored sensitive data activity events in the application are generated using the audit log statements at the audit log statement insertion points in the software components of the application. A dynamic code analysis is performed on the application during execution of the application to prevent executing source code of the application from recording in the audit logs the sensitive data processed by the application.Type: ApplicationFiled: March 6, 2018Publication date: July 12, 2018Inventors: Suresh N. Chari, Ted A. Habeck, Ashish Kundu, Ian M. Molloy
-
Patent number: 10007801Abstract: Automatically generating audit logs is provided. Audit log statement insertion points are identified in components of an application based on a static code analysis identifying start and end operations on sensitive data in the components of the application. The application is instrumented with audit log statements at the audit log statement insertion points in the components of the application. Audit logs of monitored sensitive data activity events in the application are generated using the audit log statements at the audit log statement insertion points in the components of the application.Type: GrantFiled: April 22, 2016Date of Patent: June 26, 2018Assignee: International Business Machines CorporationInventors: Suresh N. Chari, Ted A. Habeck, Ashish Kundu, Ian M. Molloy
-
Publication number: 20170308712Abstract: Automatically generating audit logs is provided. Audit log statement insertion points are identified in components of an application based on a static code analysis identifying start and end operations on sensitive data in the components of the application. The application is instrumented with audit log statements at the audit log statement insertion points in the components of the application. Audit logs of monitored sensitive data activity events in the application are generated using the audit log statements at the audit log statement insertion points in the components of the application.Type: ApplicationFiled: April 22, 2016Publication date: October 26, 2017Inventors: Suresh N. Chari, Ted A. Habeck, Ashish Kundu, Ian M. Molloy
-
Publication number: 20170286671Abstract: Detecting malicious user activity is provided. A profile for a user that accesses a set of protected assets is generated based on static information representing an organizational view and associated attributes corresponding to the user and based on dynamic information representing observable actions made by the user. A plurality of analytics is applied on the profile corresponding to the user to generate an aggregate risk score for the user accessing the set of protected assets based on applying the plurality of analytics on the profile of the user. A malicious user activity alert is generated in response to the aggregate risk score for the user accessing the set of protected assets being greater than an alert threshold value. The malicious user activity alert is sent to an analyst for feedback.Type: ApplicationFiled: March 31, 2016Publication date: October 5, 2017Inventors: Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken
-
Publication number: 20160364794Abstract: Identifying fraudulent transactions is provided. Transactions data corresponding to a plurality of transactions between accounts are obtained from one or more different transaction channels. At least one graph of transaction payment relationships between the accounts is generated from the transaction data. Features are extracted from the at least one graph of transaction payment relationships between the accounts. A fraud score for a current transaction is generated based on the extracted features from the at least one graph of transaction payment relationships between the accounts.Type: ApplicationFiled: September 23, 2015Publication date: December 15, 2016Inventors: Suresh N. Chari, Ted A. Habeck, Coenraad Jan Jonker, Frank Jördens, Ian M. Molloy, Youngja Park, Cornelis van Schaik, Mark Edwin Wiggerman
-
Patent number: 8789188Abstract: Systems and methods are presented for automatically determining the security requirements of program code during the creation or modification of that program code and for presenting the necessary security permissions to a developer of the program code at the time of the creation or modification of the program code. A cache is established containing program code segments including library calls and application program interfaces that require security permissions at runtime. The cache also includes the security permissions associated with the stored program code segments. Program code editing is monitored in real time during the editing, and instances of edits that add, modify or delete the stored program code segments from the program code being edited are identified. The security permissions associated with the program code segments that are modified by the edits are retrieved from the cache.Type: GrantFiled: October 5, 2007Date of Patent: July 22, 2014Assignee: International Business Machines CorporationInventors: Ted A. Habeck, Lawrence Koved, Jeff McAffer, Marco Pistoia
-
Publication number: 20090094667Abstract: Systems and methods are presented for automatically determining the security requirements of program code during the creation or modification of that program code and for presenting the necessary security permissions to a developer of the program code at the time of the creation or modification of the program code. A cache is established containing program code segments including library calls and application program interfaces that require security permissions at runtime. The cache also includes the security permissions associated with the stored program code segments. Program code editing is monitored in real time during the editing, and instances of edits that add, modify or delete the stored program code segments from the program code being edited are identified. The security permissions associated with the program code segments that are modified by the edits are retrieved from the cache.Type: ApplicationFiled: October 5, 2007Publication date: April 9, 2009Applicant: International Business Machines CorporationInventors: Ted A. Habeck, Lawrence Koved, Jeff McAffer, Marco Pistoia
-
Patent number: 6771756Abstract: A system and method to facilitate communications among team members or subscribers using a virtual assistant and a derived points of contact (POC) list to initiate contacts. The virtual assistant automates the task of reaching a party to be contacted through trying a variety of POC options until a connection is established or the options are exhausted. The system takes advantage of the POC provided by a person to be contacted, reducing the burden of maintaining a complete personal contact list by each team member or subscriber. The virtual assistant uses the derived POC list to establish a preferred method for contacting a team member or subscriber.Type: GrantFiled: March 1, 2001Date of Patent: August 3, 2004Assignee: International Business Machines CorporationInventors: Paul B. Chou, Ted A. Habeck, Steve Moimann, Jennifer C. Lai, Stella J. Mitchell, Cezar Pendus, Jung-Mu Tang, David A. Wood