Patents by Inventor Birgit M. Pfitzmann

Birgit M. Pfitzmann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8595792
    Abstract: A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed.
    Type: Grant
    Filed: July 19, 2012
    Date of Patent: November 26, 2013
    Assignee: International Business Machines Corporation
    Inventors: Alain C. Azagury, Murthy V. Devarakonda, Nikolai A. Joukov, Manoj Kumar, Birgit M. Pfitzmann, Norbert G. Vogl, Konstantinos Magoutis
  • Publication number: 20130304737
    Abstract: A classification system executing on one or more computer systems includes a processor and a memory coupled to the processor. The memory includes a discovery engine configured to navigate through non-volatile memory storage to discover an identity and location of one or more files in one or more computer storage systems by tracing the one or more files from file system mount points through file system objects and to disk objects. A classifier is configured to classify the one or more the files into a classification category. The one or more files are associated with the classification category and stored in at least one data structure. Methods are also provided.
    Type: Application
    Filed: May 10, 2012
    Publication date: November 14, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: NIKOLAI JOUKOV, AMITKUMAR M. PARADKAR, BIRGIT M. PFITZMANN, WILLIAM R. REOHR, PETER URBANETZ
  • Publication number: 20130290937
    Abstract: Calls to stop functions are identified in a computer program file. The stop functions are functions that interact with external resources. Parameters of the calls to the stop functions that are references to the external resources are identified. An analysis is performed over the computer program file to find out possible values of the parameters of the calls.
    Type: Application
    Filed: June 25, 2013
    Publication date: October 31, 2013
    Inventors: Nikolai A. Joukov, Birgit M. Pfitzmann, Marco Pistoia, Vasily Tarasov, Takaaki Tateishi, Norbert G. Vogl
  • Patent number: 8533659
    Abstract: Calls to stop functions are identified in a computer program file. The stop functions are functions that interact with external resources. Parameters of the calls to the stop functions that are references to the external resources are identified. An analysis is performed over the computer program file to find out possible values of the parameters of the calls.
    Type: Grant
    Filed: July 29, 2009
    Date of Patent: September 10, 2013
    Assignee: International Business Machines Corporation
    Inventors: Nikolai A. Joukov, Birgit M. Pfitzmann, Marco Pistoia, Vasily Tarasov, Takaaki Tateishi, Norbert G. Vogl
  • Publication number: 20120304179
    Abstract: Methods and systems for evaluating compatibility of a cloud of computers to perform one or more workload tasks. One or more computing solution aspects are determined that corresponding to one or more sets of workload factors, where the workload factors characterize one or more workloads, to characterize one or more computing solutions. The workload factors are compared to the computing solution aspects in a rule-based system to exclude computing solutions that cannot satisfy the workload factors. A computing solution is selected that has aspects that accommodate all of the workload factors to find a solution that accommodates the one or more individual workloads.
    Type: Application
    Filed: May 24, 2011
    Publication date: November 29, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: MURTHY DEVARAKONDA, KEITH C. GOODMAN, BIRGIT M. PFITZMANN, SHAYA POTTER
  • Publication number: 20120284243
    Abstract: A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed.
    Type: Application
    Filed: July 19, 2012
    Publication date: November 8, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alain C. Azagury, Murthy V. Devarakonda, Nikolai Joukov, Manoj Kumar, Konstantinos Magoutia, Birgit M. Pfitzmann, Norbert G. Vogl
  • Publication number: 20120284389
    Abstract: A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed.
    Type: Application
    Filed: July 19, 2012
    Publication date: November 8, 2012
    Applicant: International Business Machines Corporation
    Inventors: Alain C. Azagury, Murthy V. Devarakonda, Nikolai Joukov, Manoj Kumar, Konstantinos Magoutis, Birgit M. Pfitzmann, Norbert G. Vogl
  • Patent number: 8255972
    Abstract: A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed.
    Type: Grant
    Filed: June 6, 2008
    Date of Patent: August 28, 2012
    Assignee: International Business Machines Corporation
    Inventors: Alain C. Azagury, Murthy V. Devarakonda, Nikolai Joukov, Manoj Kumar, Konstantinos Magoutis, Birgit M. Pfitzmann, Norbert G. Vogl
  • Publication number: 20120204149
    Abstract: Software components migrated from a source server to a target server may be compared before and after a migration. In one aspect, discovery tools may be used to discover the source server's configurations before the migration. Similarly, discovery tools may be used to discover the target server's configurations after the migration. A migration design or plan may be applied to the discovered source server configurations to generate a desired target server configuration. The desired target server configurations may be compared with the discovered target server configurations. Deviations or differences between the discovered target server configurations and the desired target server configurations may be determined. A database of common or typical changes, which might not be specified in the migration plan, may be used to identify the common changes that occur as part of a migration process, from the deviations.
    Type: Application
    Filed: February 3, 2011
    Publication date: August 9, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nikolai A. Joukov, Birgit M. Pfitzmann
  • Patent number: 8205266
    Abstract: Software license management systems are provided in which a license to use a software product is represented by a data token. The systems have a software controller for controlling use of the software product at a user device, and a license management server for communicating with the software controller via a data communications network. The software controller allows use of the software product at the user device substantially only during a use period associated with a current data token supplied to the software controller by the license management server. An exchange token can be supplied to another, similar software controller when necessary to transfer the license, e.g. in the event of a breakdown. The software controller is adapted to supply either the current data token, or the exchange token, to the license management server to be exchanged for a new data token.
    Type: Grant
    Filed: January 28, 2005
    Date of Patent: June 19, 2012
    Assignee: International Business Machines Corporation
    Inventors: Birgit M. Pfitzmann, Michael P. Waidner
  • Publication number: 20120109844
    Abstract: A system and method for cost-based migration planning includes determining cost factors and constraints associated with at least one of migrating and transforming a plurality of components. A cost-based model is constructed using the cost factors and constraints. The cost-based model is applied to groupings of the plurality of components to provide a cost-based determination grouping scheme in accordance with the constraints. The grouping scheme is output to provide migration waves for migrating or transforming the plurality of components.
    Type: Application
    Filed: November 3, 2010
    Publication date: May 3, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Murthy Devarakonda, Nikolai A. Joukov, Birgit M. Pfitzmann, Lawrence H. Thompson
  • Publication number: 20120072903
    Abstract: A system and method for application migration include matching an infrastructure of a source application with a plurality of multi-image work sets from a catalog by selecting a mapping of components of the infrastructure with components in the multi-image work sets to provide one or more selected multi-images. The source application is migrated to a target environment using the one or more selected multi-images.
    Type: Application
    Filed: September 20, 2010
    Publication date: March 22, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: NIKOLAI A. JOUKOV, Birgit M. Pfitzmann
  • Publication number: 20120054727
    Abstract: A system and method includes discovering one or more instances of external resource access by statically analyzing application code. One or more locations of constants are identified in the application code and a configuration repository that specify addresses of discovered instances of external resource access. The application code and the configuration repository are updated to change values of the constants to enable migration.
    Type: Application
    Filed: August 30, 2010
    Publication date: March 1, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nikolai A. Joukov, Joel P. Ossher, Birgit M. Pfitzmann, Vasily Tarasov
  • Publication number: 20120047492
    Abstract: Configuration information associated with software installed on a production system may be discovered. A script is automatically generated for capturing data traffic from and to the software installed on the production system using the configuration information. The script may be executed to capture data traffic of the software running on the production system. A migrated version of the software may be executed on a test system using requests extracted from the captured data traffic. The responses in the captured data traffic may be compared with responses from the migrated version of the software.
    Type: Application
    Filed: August 17, 2010
    Publication date: February 23, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hai Huang, Nikolai A. Joukov, Birgit M. Pfitzmann
  • Patent number: 7987253
    Abstract: Provides methods, apparatus and systems for determining an applicable policy for an incoming message having a service-level addressing element. A method includes the following steps: a) applying a potentially applicable policy (P1) on the incoming message to make the service-level addressing element of the incoming message visible, b) if the service-level addressing element of the incoming message gets visible and is the one to which the currently applied policy (P1) is associated, the currently applied policy (P1) is determined to be the applicable policy, and if not associated c) repeating steps a) and b) with a further potentially applicable policy (P2 . . . Pn).
    Type: Grant
    Filed: August 7, 2008
    Date of Patent: July 26, 2011
    Assignee: International Business Machines Corporation
    Inventor: Birgit M. Pfitzmann
  • Patent number: 7941859
    Abstract: Method, system, and storage medium for reducing or minimizing access to sensitive information. A method includes identifying processes and data associated with a computer system and classifying each of the data as one of either sensitive information or non-sensitive information. The sensitive information includes at least one of: data that is personal to an individual, confidential data, and data that is legally subject to conditions of restricted use. For each of the processes the method includes selecting a process and a sensitive data item, modifying the sensitive data item, analyzing the behavior of at least the selected process, and preventing access of the sensitive data item by the selected process if, as a result of the analyzing, the sensitive data item is determined not to be needed by the selected process.
    Type: Grant
    Filed: June 23, 2004
    Date of Patent: May 10, 2011
    Assignee: International Business Machines Corporation
    Inventors: Jan L. Camenisch, Birgit M. Pfitzmann, Matthias Schunter, Michael P. Waidner
  • Publication number: 20110107327
    Abstract: The present invention describes a method and system for preparing a migration and consolidation of at least one source application to be migrated to or consolidated in at least one heterogeneous server device. A computing system selects at least one prospective target platform component based on an evaluation of at least one source platform component, a requirement of the at least one source application, and a compatibility and an affinity of the at least one prospective target platform component. The computing system collects first metadata of the at least one source platform component and the at least one prospective target platform component. The computing system collects second metadata associated with the migration and consolidation. The computing system groups the first metadata and the second metadata into a RFM (Request For Migration). The computing system prepares and configures a final target platform in accordance with the RFM.
    Type: Application
    Filed: October 29, 2009
    Publication date: May 5, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric J. Barkie, James R. S. Barros, II, Kamal Bhattacharya, Karen Cheng, Robert Filepp, Kevin D. Galloway, Nikolai Joukov, Jing Luo, Colm V. Malone, Birgit M. Pfitzmann, Brian L. Peterson, Harigovind V. Ramasamy, Kewei Sun, Norbert G. Vogl, David L. Westerman, Christopher C. Young
  • Publication number: 20110029946
    Abstract: Calls to stop functions are identified in a computer program file. The stop functions are functions that interact with external resources. Parameters of the calls to the stop functions that are references to the external resources are identified. An analysis is performed over the computer program file to find out possible values of the parameters of the calls.
    Type: Application
    Filed: July 29, 2009
    Publication date: February 3, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nikolai A. Joukov, Birgit M. Pfitzmann, Marco Pistoia, Vasily Tarasov, Takaaki Tateishi, Norbert G. Vogl
  • Publication number: 20100319060
    Abstract: A method and system for discovering dependencies, configurations and utilizations among IT resources are disclosed. A discovery team writes a prediscovery script without requesting credentials and sends it to a system administrator (SA) who already has necessary credentials to execute the prediscovery script. Then, the SA reviews the prediscovery script and executes the prediscovery script on a target server. While or after executing the prediscovery script, the target server generates a result of an execution of the prediscovery script and provides the result to an analysis system. The analysis system analyzes and parses the result and generates a user-friendly data (e.g., graph or spreadsheet) that represents the result. Then, the analysis system provides the user-friendly data to the discovery team. The analysis system does not require credentials and does not directly communicate with the target server except receiving the result of the executed prediscovery script from the target server.
    Type: Application
    Filed: June 16, 2009
    Publication date: December 16, 2010
    Applicant: International Business Machines Corporation
    Inventors: Louis E. Aiken, John K. Baker, Kamal Bhattacharya, Robert P. Boettcher, Murthy V. Devarakonda, Nikolai A. Joukov, Timothy P. Kane, SR., Steve Lee, Matthew A. Markley, Birgit M. Pfitzmann, Michael Tacci, Norbert G. Vogl, Anthony G.D. Walker
  • Patent number: 7836298
    Abstract: The invention relates to a method for providing an identity-related information (IRI) to a requesting entity (50) by means of an identity provider (40).
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: November 16, 2010
    Assignee: International Business Machines Corporation
    Inventors: Thomas R. Gross, Birgit M. Pfitzmann