Patents by Inventor Abdulhamid Adebowale Adebayo

Abdulhamid Adebowale Adebayo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230229812
    Abstract: One or more systems, devices, computer program products and/or computer-implemented methods of use provided herein relate to compliance mapping, and more particularly to aggregated mapping of one or more sets of context-based compliance data with standard compliance data, such as from a target domain and one or more associate domains. A system can comprise a memory that stores computer executable components, and a processor that executes the computer executable components stored in the memory, wherein the computer executable components can comprise a mapping component that can map a compliance control for a target domain based on a model trained by an active learning process that incorporates a plurality of contexts representing relationships between entities and associate domain specific dependencies.
    Type: Application
    Filed: January 18, 2022
    Publication date: July 20, 2023
    Inventors: Abdulhamid Adebowale Adebayo, Anca Sailer, Muhammed Fatih Bulut, Daby Mousse Sow
  • Publication number: 20230177169
    Abstract: An apparatus, a method, and a computer program product are provided that combine policy compliance with vulnerability management to provide a more accurate risk assessment of an environment. The method includes training a policy machine learning model using a first training dataset to generate a policy machine learning model to produce mitigation technique classifications and training a vulnerability machine learning model using a second training dataset to generate a vulnerability machine learning model to produce weakness type classifications. The method also includes mapping the mitigation technique classifications to attack techniques to produce a policy mapping and mapping the weakness type classifications to the attack techniques to produce a vulnerability mapping. The method further includes producing a risk assessment of a vulnerability based on the policy mapping and the vulnerability mapping.
    Type: Application
    Filed: December 8, 2021
    Publication date: June 8, 2023
    Inventors: Muhammed Fatih Bulut, Abdulhamid Adebowale Adebayo, Lilian Mathias Ngweta, Ting Dai, Constantin Mircea Adam, Daby Mousse Sow, Steven Ocepek
  • Publication number: 20230155984
    Abstract: Techniques for managing and processing of configuration changes associated with a service container associated with a service mesh are presented. An application management component can determine immutable configuration data (ICD) relating to configuration change processing for the service container based on policies received from an application owner. A message processing component (MMC) of a service proxy associated with the service container can receive, via a control plane, a message associated with an untrusted entity. MMC can determine whether the message comprises a configuration change request relating to interaction between the application and the service mesh, and, if so, can determine whether to allow the service proxy to process the configuration change based on analysis of the configuration change and ICD. If ICD indicates the configuration change is not allowed, service proxy can discard the request.
    Type: Application
    Filed: November 18, 2021
    Publication date: May 18, 2023
    Inventors: Constantin Mircea Adam, Nerla Jean-Louis, Hubertus Franke, Edward Charles Snible, Abdulhamid Adebowale Adebayo
  • Publication number: 20220413847
    Abstract: A content generation method includes receiving a control document comprising one or more control clauses, identifying actionable content for the one or more control clauses, generating a programming language template for the one or more control clauses, identifying a closest existing control clause from a database for each of the one or more control clause, identifying a programming language implementation of the closest existing control clause, identifying similarities and differences between the programming language implementation and the generated programming language template, and annotating the programming language implementation for the closest existing control clause based on the identified similarities and differences.
    Type: Application
    Filed: June 25, 2021
    Publication date: December 29, 2022
    Inventors: Muhammed Fatih Bulut, Abdulhamid Adebowale Adebayo, Sai ZENG, RINKU KANWAR
  • Publication number: 20220383093
    Abstract: A computer system, program code, and a method are provided to leverage an AI model with respect to a target specification for a target standard. The AI model is configured to identify at least one candidate control associated with a corresponding standard. A map is subject to traversal to identify the candidate control in the map. Source and destination controls of the map are leveraged to identify at least one mapped control associated with the target standard. The AI model is selectively subject to training with the mapped control and the target standard.
    Type: Application
    Filed: May 26, 2021
    Publication date: December 1, 2022
    Applicant: International Business Machines Corporation
    Inventors: Abdulhamid Adebowale Adebayo, Muhammed Fatih Bulut, Sai Zeng, Milton H. Hernandez