Patents by Inventor Constantin M. Adam
Constantin M. Adam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11500705Abstract: An actuator to execute on a server may be automatically selected based on risk of failure and damage to the server. Requirement specification and environment parameters may be received. A subset of actuators may be selected based on a risk threshold from an actuator catalog database storing actuator information and actuator risk metadata associated with a plurality of actuators. The actuator risk metadata may be augmented with risk information. A ranked list of the subset of actuators may be generated based on the actuator risk metadata associated with each actuator in the subset. An actuator in the ranked list may be executed on the server.Type: GrantFiled: November 4, 2019Date of Patent: November 15, 2022Assignee: International Business Machines CorporationInventors: Constantin M. Adam, Anuradha Bhamidipaty, Jayan Nallacherry, Debasisha K. Padhi, Yaoping Ruan, Frederick Y.-F. Wu
-
Patent number: 11176508Abstract: Embodiments relate to an intelligent computer platform to utilize machine learning techniques to minimize compliance risk. Data, collected from a plurality of sources is subject to analysis and correlation to assess impact across data points. The assessment measures impact between at least two different compliance domains, facilitates understanding of cross-impact between compliance domains, and provides an estimation of compliance risk. A recommendation plan for one or more new compliance activities is created and dynamically subject to a machine learning reinforcement algorithm.Type: GrantFiled: March 12, 2019Date of Patent: November 16, 2021Assignee: International Business Machines CorporationInventors: Jinho Hwang, Constantin M. Adam, Muhammed Fatih Bulut, Milton H. Hernandez
-
Patent number: 11178110Abstract: A method provides for controlling compliance remediation that includes performing compliance inspection runs by account nodes for multiple accounts. Inspection results of the inspection runs from each account node are aggregated by an account cognitive policy advisory (CPA) service. The inspection results from each account are aggregated. It is determined whether remediations are required by analyzing the inspection results combined with a current compliance mode of a server. Upon a determination that the current compliance mode of the server is a first mode, the account CPA service determines whether a policy fingerprint has changed. Upon a change to the policy fingerprint, compliance enforcement runs on the account nodes are temporarily suspended.Type: GrantFiled: August 20, 2019Date of Patent: November 16, 2021Assignee: International Business Machines CorporationInventors: Constantin M. Adam, Jeffrey E. Lammers, Muhammed Fatih Bulut, Milton H. Hernandez, Maja Vukovic
-
Patent number: 11038779Abstract: A self-service experience for a change requester is provided. Authorized endpoint changes are identified along with corresponding change types. Resource attributes are identified and corresponding parameters of the resources are changed according to change window requirements. Where the changes comply with business policies, the changes are executed.Type: GrantFiled: August 2, 2019Date of Patent: June 15, 2021Assignee: International Business Machines CorporationInventors: Constantin M. Adam, Shang Q. Guo, Brian L. Peterson, John J. Rofrano, Frederick Y. Wu, Sai Zeng
-
Publication number: 20210058370Abstract: A method provides for controlling compliance remediation that includes performing compliance inspection runs by account nodes for multiple accounts. Inspection results of the inspection runs from each account node are aggregated by an account cognitive policy advisory (CPA) service. The inspection results from each account are aggregated. It is determined whether remediations are required by analyzing the inspection results combined with a current compliance mode of a server. Upon a determination that the current compliance mode of the server is a first mode, the account CPA service determines whether a policy fingerprint has changed. Upon a change to the policy fingerprint, compliance enforcement runs on the account nodes are temporarily suspended.Type: ApplicationFiled: August 20, 2019Publication date: February 25, 2021Inventors: Constantin M. Adam, Jeffrey E. Lammers, Muhammed Fatih Bulut, Milton H. Hernandez, Maja Vukovic
-
Patent number: 10839168Abstract: An intelligent computer platform to provide intent identification, mining and refinement, and dynamic application of the intent to pipeline. Natural language processing (NLP) is utilized with respect to the intent identification and refinement. A pipeline tool to support the function of the intent is identified, and a corresponding dynamic modification of a corresponding pipeline template takes place to integrate the tool into a stage of the corresponding template. Program code that aligns with the dynamic modification of the pipeline template is generated, thereby incorporating the searched intents into the functional aspect(s) represented in the pipeline.Type: GrantFiled: February 19, 2019Date of Patent: November 17, 2020Assignee: International Business Machines CorporationInventors: John Rofrano, Anup Kalia, Constantin M. Adam, Maja Vukovic
-
Publication number: 20200293970Abstract: Embodiments relate to an intelligent computer platform to utilize machine learning techniques to minimize compliance risk. Data, collected from a plurality of sources is subject to analysis and correlation to assess impact across data points. The assessment measures impact between at least two different compliance domains, facilitates understanding of cross-impact between compliance domains, and provides an estimation of compliance risk. A recommendation plan for one or more new compliance activities is created and dynamically subject to a machine learning reinforcement algorithm.Type: ApplicationFiled: March 12, 2019Publication date: September 17, 2020Applicant: International Business Machines CorporationInventors: Jinho Hwang, Constantin M. Adam, Muhammed Fatih Bulut, Milton H. Hernandez
-
Publication number: 20200265118Abstract: An intelligent computer platform to provide intent identification, mining and refinement, and dynamic application of the intent to pipeline. Natural language processing (NLP) is utilized with respect to the intent identification and refinement. A pipeline tool to support the function of the intent is identified, and a corresponding dynamic modification of a corresponding pipeline template takes place to integrate the tool into a stage of the corresponding template. Program code that aligns with the dynamic modification of the pipeline template is generated, thereby incorporating the searched intents into the functional aspect(s) represented in the pipeline.Type: ApplicationFiled: February 19, 2019Publication date: August 20, 2020Applicant: International Business Machines CorporationInventors: John Rofrano, Anup Kalia, Constantin M. Adam, Maja Vukovic
-
Publication number: 20200065171Abstract: An actuator to execute on a server may be automatically selected based on risk of failure and damage to the server. Requirement specification and environment parameters may be received. A subset of actuators may be selected based on a risk threshold from an actuator catalog database storing actuator information and actuator risk metadata associated with a plurality of actuators. The actuator risk metadata may be augmented with risk information. A ranked list of the subset of actuators may be generated based on the actuator risk metadata associated with each actuator in the subset. An actuator in the ranked list may be executed on the server.Type: ApplicationFiled: November 4, 2019Publication date: February 27, 2020Inventors: Constantin M. Adam, Anuradha Bhamidipaty, Jayan Nallacherry, Debasisha K. Padhi, Yaoping Ruan, Frederick Y.-F. Wu
-
Patent number: 10552241Abstract: An actuator to execute on a server may be automatically selected based on risk of failure and damage to the server. Requirement specification and environment parameters may be received. A subset of actuators may be selected based on a risk threshold from an actuator catalog database storing actuator information and actuator risk metadata associated with a plurality of actuators. The actuator risk metadata may be augmented with risk information. A ranked list of the subset of actuators may be generated based on the actuator risk metadata associated with each actuator in the subset. An actuator in the ranked list may be executed on the server.Type: GrantFiled: June 22, 2016Date of Patent: February 4, 2020Assignee: International Business Machines CorporationInventors: Constantin M. Adam, Anuradha Bhamidipaty, Jayan Nallacherry, Debasisha K. Padhi, Yaoping Ruan, Frederick Y.-F. Wu
-
Publication number: 20190356561Abstract: A self-service experience for a change requester is provided. Authorized endpoint changes are identified along with corresponding change types. Resource attributes are identified and corresponding parameters of the resources are changed according to change window requirements. Where the changes comply with business policies, the changes are executed.Type: ApplicationFiled: August 2, 2019Publication date: November 21, 2019Inventors: Constantin M. Adam, Shang Q. Guo, Brian L. Peterson, John J. Rofrano, Frederick Y. Wu, Sai Zeng
-
Patent number: 10452850Abstract: On a computer system, a shell is invoked, through which a plurality of commands and/or scripts can be executed. Individual ones of the plurality of commands and/or scripts are validated. Given individual ones of the plurality of commands and/or scripts, for which the validation is successful, are executed via the shell.Type: GrantFiled: August 18, 2014Date of Patent: October 22, 2019Assignee: International Business Machines CorporationInventors: Constantin M. Adam, Shang Q. Guo, John J. Rofrano, Yaoping Ruan, Frederick Y. Wu, Sai Zeng
-
Patent number: 10454676Abstract: A method forms a key pair for a user. The key pair has a public key and a private key that is unique to the user and that is encrypted using a passphrase formed from an enterprise password of the user and an identification that uniquely identifies in the enterprise a device by which the user gains access. The method stores the private key in the user device and stores the public key in an enterprise server that is accessed by the user. The method provides the private key from the user device to a client, such as a SSH client, in conjunction with the password and the identification, decrypts the private key to obtain the decrypted password and the identification, and allows the user to access the enterprise server only if the decrypted password and the identification match the password and the identification provided with the private key.Type: GrantFiled: June 22, 2015Date of Patent: October 22, 2019Assignee: International Business Machines CorporationInventors: Constantin M. Adam, Milton H. Hernandez, Vugranam C. Sreedhar, Prema Vivekanandan
-
Patent number: 10447757Abstract: A method is provided to eliminate many of the manual steps in a server change management process, creating a self-service experience for a change requester. The method may automatically retrieve the current state of a server; constrain the requested change to a valid, feasible specification; verify that the requested change is compliant with business policies; implement the changes automatically; and develop a knowledge base of automated change risk that is used to modify the change management business process by identifying safe changes that can be performed outside of change windows and/or during change freezes. The method can be applied to changes to physical servers, virtual servers, and servers in a cloud environment.Type: GrantFiled: August 20, 2015Date of Patent: October 15, 2019Assignee: International Business Machines CorporationInventors: Constantin M. Adam, Shang Q. Guo, Brian L. Peterson, John J. Rofrano, Frederick Y. Wu, Sai Zeng
-
Patent number: 10361927Abstract: It is determined whether a user is authorized to carry out a management operation on a plurality of information technology assets in parallel, based on a role of the user and at least one characteristic of the management operation. A risk level of the management operation, and at least one characteristic of the plurality of information technology assets, are both determined. Based on the risk level and the at least one characteristic of the plurality of information technology assets, an execution pattern for the management operation is specified. In at least some cases, the management operation is carried out on the plurality of information technology assets in parallel, in accordance with the execution pattern.Type: GrantFiled: September 30, 2014Date of Patent: July 23, 2019Assignee: International Business Machines CorporationInventors: Constantin M. Adam, Shang Q. Guo, Rajeev Puri, Yaoping Ruan, Cashchakanith Venugopal, Frederick Y. Wu, Sai Zeng
-
Patent number: 10348727Abstract: A method forms a key pair for a user. The key pair has a public key and a private key that is unique to the user and that is encrypted using a passphrase formed from an enterprise password of the user and an identification that uniquely identifies in the enterprise a device by which the user gains access. The method stores the private key in the user device and stores the public key in an enterprise server that is accessed by the user. The method provides the private key from the user device to a client, such as a SSH client, in conjunction with the password and the identification, decrypts the private key to obtain the decrypted password and the identification, and allows the user to access the enterprise server only if the decrypted password and the identification match the password and the identification provided with the private key.Type: GrantFiled: February 13, 2015Date of Patent: July 9, 2019Assignee: International Business Machines corporationInventors: Constantin M. Adam, Milton H. Hernandez, Vugranam C. Sreedhar, Prema Vivekanandan
-
Patent number: 10176182Abstract: Deleting files may include identifying files stored in a storage device to delete based on one or more deletion rules. The identified files are categorized into at least a first group and a second group. Deletion of files may be triggered based on a free space threshold. Deletion of files in the first group may be triggered. If the free space threshold is not met by deleting the files in the first group, deletion of files in the second group is triggered based on one or more of prioritization and cost optimization.Type: GrantFiled: August 31, 2015Date of Patent: January 8, 2019Assignee: International Business Machines CorporationInventors: Constantin M. Adam, John J. Rofrano, Shang Q. Guo, Frederick Y.-F. Wu, Sai Zeng
-
Patent number: 9940466Abstract: A computer-implemented agent process running on a first computer automatically intercepts a command issued from the first computer to execute on a target computer prior to invocation of the command on the target computer. A server profile built for an application running on the target computer that supports the command may be retrieved. At least based on the server profile a risk enforcement policy is dynamically constructed. Based on the risk enforcement policy, one or more computer-executable enforcement actions to perform prior to sending the command to the target computer for execution is determined. Based on executing of one or more of the computer-executable enforcement actions, the command may be transmitted to execute on the target computer or prevented from executing on the target computer.Type: GrantFiled: December 7, 2016Date of Patent: April 10, 2018Assignee: International Business Machines CorporationInventors: Constantin M. Adam, Nikolaos Anerousis, Vysakh K. Chandran, Milton H. Hernandez, Debasisha K. Padhi, Yaoping Ruan, Fabio M. Tanada, Frederick Y.-F. Wu, Sai Zeng
-
Publication number: 20170371730Abstract: An actuator to execute on a server may be automatically selected based on risk of failure and damage to the server. Requirement specification and environment parameters may be received. A subset of actuators may be selected based on a risk threshold from an actuator catalog database storing actuator information and actuator risk metadata associated with a plurality of actuators. The actuator risk metadata may be augmented with risk information. A ranked list of the subset of actuators may be generated based on the actuator risk metadata associated with each actuator in the subset. An actuator in the ranked list may be executed on the server.Type: ApplicationFiled: June 22, 2016Publication date: December 28, 2017Inventors: Constantin M. Adam, Anuradha Bhamidipaty, Jayan Nallacherry, Debasisha K. Padhi, Yaoping Ruan, Frederick Y.-F. Wu
-
Patent number: 9736160Abstract: Methods, systems, and computer program products for a protected graphical user interface for role-based application and data access are provided herein. A method for controlling access on an endpoint device to at least a portion of an application includes obtaining a default configuration indicating whether one or more widget functions associated with the application are enabled in a graphical user interface; modifying one or more of the widget functions in the default configuration to a disabled status in the graphical user interface based on a privilege configuration; determining if one or more user click events generated using the graphical user interface are associated with a widget function having the disabled status; and preventing the user click events having the disabled status from being provided to an operating system for further processing, wherein at least one of the steps is carried out by a computing device.Type: GrantFiled: July 31, 2014Date of Patent: August 15, 2017Assignee: International Business Machines CorporationInventors: Constantin M. Adam, Shang Q. Guo, John J. Rofrano, Yaoping Ruan, Frederick Yung-Fung Wu, Sai Zeng