Patents by Inventor Blazej Rafal Rutkowski
Blazej Rafal Rutkowski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11868310Abstract: Systems and methods for composite storage of data across tiers of a multi-tenant storage device are provided. In embodiments, a method includes determining attributes associated with each query in a set of queries; determining whether each of the attributes meet respective predetermined threshold values for a first storage tier, a second storage tier and a third storage tier based on statistical data generated for the attributes; updating storage rules for at least one of the first storage tier, the second storage tier and the third storage tier based on the determining; receiving data from the tenant for storage; dividing the data into at least a first portion and a second portion based on the storage rules; and storing the at least the first portion and the second portion on separate ones of the first storage tier, the second storage tier and the third storage tier based on the storage rules.Type: GrantFiled: February 25, 2020Date of Patent: January 9, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Daniel Jakub Ryszka, Blazej Rafal Rutkowski
-
Patent number: 11556860Abstract: An ML root model format having a root model definition, is converted into an ML target model format not having the root model definition. A learning system is assigned to the root model definition that is convertible to the machine learning target model format. A new version of the root model definition is ported from the ML root model to the format of the ML target model to generate a new version of the machine learning target model after a learning iteration of the learning system. Quality limits are determined using an X control chart method based on a cross-validation of fold results generated during a validation of the new version of the machine learning root model. A quality metric value of the new version of the ML target model is evaluated against the quality threshold values of the new version of the ML root model.Type: GrantFiled: April 15, 2019Date of Patent: January 17, 2023Assignee: International Business Machines CorporationInventors: Lukasz G. Cmielowski, Rafal Bigaj, Blazej Rafal Rutkowski, Wojciech Sobala
-
Patent number: 11556827Abstract: A computer-implemented method for transferring data is provided. In an illustrative embodiment, the method includes retrieving, by a computer, an original dataset to be sent from a sender to a receiver. The method also includes generating, by the computer, a model based on at least a subset of the original dataset. The model generates a predicted dataset. The model is selected from a plurality of model types based on data complexity of the original dataset and a desired level of approximation of the predicted dataset to the original dataset. The method also includes transferring, by the computer, the model to the receiver. The receiver uses the model to generate the predicted dataset, wherein the predicted dataset matches the original dataset to a selected degree of approximation. Transfer of the model is quicker than transfer of the original dataset.Type: GrantFiled: May 15, 2020Date of Patent: January 17, 2023Assignee: International Business Machines CorporationInventors: Daniel Jakub Ryszka, Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Blazej Rafal Rutkowski
-
Patent number: 11263346Abstract: A method for controlling exposure of sensitive data though a logging system is provided. The method comprises: upon receiving a request by the request handler, determining sensitive data as part of the request by applying a rule, converting the data into a transformed format, and registering the data together with a related data field label with a log handler. Then, upon receiving by the log handler a log entry, converting each expression of the log entry into the transformed format, and comparing each transformed expression with each of the sensitive data in the transformed format. Upon determining a match of one of the transformed expressions with one of the sensitive data in the transformed format, the method comprises issuing an alert indicating that the log entry comprises sensitive data.Type: GrantFiled: July 18, 2019Date of Patent: March 1, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Blazej Rafal Rutkowski, Daniel Jakub Ryszka
-
Publication number: 20210357795Abstract: A computer-implemented method for transferring data is provided. In an illustrative embodiment, the method includes retrieving, by a computer, an original dataset to be sent from a sender to a receiver. The method also includes generating, by the computer, a model based on at least a subset of the original dataset. The model generates a predicted dataset. The model is selected from a plurality of model types based on data complexity of the original dataset and a desired level of approximation of the predicted dataset to the original dataset. The method also includes transferring, by the computer, the model to the receiver. The receiver uses the model to generate the predicted dataset, wherein the predicted dataset matches the original dataset to a selected degree of approximation. Transfer of the model is quicker than transfer of the original dataset.Type: ApplicationFiled: May 15, 2020Publication date: November 18, 2021Inventors: Daniel Jakub Ryszka, Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Blazej Rafal Rutkowski
-
Patent number: 11151285Abstract: A method for controlling exposure of sensitive data though a logging system is provided. The method comprises: upon receiving a request by the request handler, determining sensitive data as part of the request by applying a rule, converting the data into a transformed format, and registering the data together with a related data field label with a log handler. Then, upon receiving by the log handler a log entry, converting each expression of the log entry into the transformed format, and comparing each transformed expression with each of the sensitive data in the transformed format. Upon determining a match of one of the transformed expressions with one of the sensitive data in the transformed format, the method comprises issuing an alert indicating that the log entry comprises sensitive data.Type: GrantFiled: March 6, 2019Date of Patent: October 19, 2021Assignee: International Business Machines CorporationInventors: Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Blazej Rafal Rutkowski, Daniel Jakub Ryszka
-
Publication number: 20210263887Abstract: Systems and methods for composite storage of data across tiers of a multi-tenant storage device are provided. In embodiments, a method includes determining attributes associated with each query in a set of queries; determining whether each of the attributes meet respective predetermined threshold values for a first storage tier, a second storage tier and a third storage tier based on statistical data generated for the attributes; updating storage rules for at least one of the first storage tier, the second storage tier and the third storage tier based on the determining; receiving data from the tenant for storage; dividing the data into at least a first portion and a second portion based on the storage rules; and storing the at least the first portion and the second portion on separate ones of the first storage tier, the second storage tier and the third storage tier based on the storage rules.Type: ApplicationFiled: February 25, 2020Publication date: August 26, 2021Inventors: Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Daniel Jakub Ryszka, Blazej Rafal Rutkowski
-
Publication number: 20200327457Abstract: An ML root model format having a root model definition, is converted into an ML target model format not having the root model definition. A learning system is assigned to the root model definition that is convertible to the machine learning target model format. A new version of the root model definition is ported from the ML root model to the format of the ML target model to generate a new version of the machine learning target model after a learning iteration of the learning system. Quality limits are determined using an X control chart method based on a cross-validation of fold results generated during a validation of the new version of the machine learning root model. A quality metric value of the new version of the ML target model is evaluated against the quality threshold values of the new version of the ML root model.Type: ApplicationFiled: April 15, 2019Publication date: October 15, 2020Inventors: Lukasz G. Cmielowski, Rafal Bigaj, Blazej Rafal Rutkowski, Wojciech Sobala
-
Publication number: 20200285773Abstract: A method for controlling exposure of sensitive data though a logging system is provided. The method comprises: upon receiving a request by the request handler, determining sensitive data as part of the request by applying a rule, converting the data into a transformed format, and registering the data together with a related data field label with a log handler. Then, upon receiving by the log handler a log entry, converting each expression of the log entry into the transformed format, and comparing each transformed expression with each of the sensitive data in the transformed format. Upon determining a match of one of the transformed expressions with one of the sensitive data in the transformed format, the method comprises issuing an alert indicating that the log entry comprises sensitive data.Type: ApplicationFiled: July 18, 2019Publication date: September 10, 2020Inventors: Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Blazej Rafal Rutkowski, Daniel Jakub Ryszka
-
Publication number: 20200285772Abstract: A method for controlling exposure of sensitive data though a logging system is provided. The method comprises: upon receiving a request by the request handler, determining sensitive data as part of the request by applying a rule, converting the data into a transformed format, and registering the data together with a related data field label with a log handler. Then, upon receiving by the log handler a log entry, converting each expression of the log entry into the transformed format, and comparing each transformed expression with each of the sensitive data in the transformed format. Upon determining a match of one of the transformed expressions with one of the sensitive data in the transformed format, the method comprises issuing an alert indicating that the log entry comprises sensitive data.Type: ApplicationFiled: March 6, 2019Publication date: September 10, 2020Inventors: Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Blazej Rafal Rutkowski, Daniel Jakub Ryszka