Patents by Inventor Ivan M. Milman
Ivan M. Milman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140280342Abstract: Provided are techniques for secure matching supporting fuzzy data. A first bloom filter for a first data element is retrieved, wherein each of the characters in the data element has been encrypted with a beginning offset position of the character and encrypted with an end offset position of the character to produce two encrypted values that are added to the first bloom filter. A second bloom filter for a second data element is retrieved. The first bloom filter and the second bloom filter are compared to determine whether there is a match between the first data element and the second data element.Type: ApplicationFiled: March 13, 2013Publication date: September 18, 2014Inventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Publication number: 20140281856Abstract: Provided are to a computer program product, system, and method for determining linkage metadata of content of a target document to source documents.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brian P. Byrne, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
-
Patent number: 8832779Abstract: Provided are techniques for providing security in a computing system with identity mediation policies that are enterprise service bus (EBS) independent. A mediator component performs service-level operation such as message brokering, identity mediation, and transformation to enhance interoperability among service consumers and service providers. A mediator component may also delegate identity related operations to a token service of handler. Identity mediation may include such operations as identity determination, or “identification,” authentication, authorization, identity transformation and security audit.Type: GrantFiled: March 13, 2012Date of Patent: September 9, 2014Assignee: International Business Machines CorporationInventors: Ivan M. Milman, Martin Oberhofer, Dmitriy Fot
-
Publication number: 20140223001Abstract: Lifecycle management for blueprints of information technology systems includes determining, using a processor, a component referenced by a blueprint defining an information technology system and determining a component tool used to manage the component. The component is registered with a sensor within the component tool. Responsive to detecting a change in status of the component within the component tool, the sensor sends a notification.Type: ApplicationFiled: October 30, 2013Publication date: August 7, 2014Applicant: International Business Machines CorporationInventors: Brian P. Byrne, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
-
Publication number: 20140222991Abstract: Lifecycle management for blueprints of information technology systems includes determining, using a processor, a component referenced by a blueprint defining an information technology system and determining a component tool used to manage the component. The component is registered with a sensor within the component tool. Responsive to detecting a change in status of the component within the component tool, the sensor sends a notification.Type: ApplicationFiled: February 5, 2013Publication date: August 7, 2014Applicant: International Business Machines CorporationInventors: Brian P. Byrne, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
-
Publication number: 20140164399Abstract: Method, system, and computer program product to improve a coverage of a plurality of classifications between a plurality of terms in a glossary and a set of values in a reference data management system, by identifying a first classification, of the plurality of classifications in the glossary, between a first term in the glossary and a first set of values in the reference data management system, detecting a relationship between the first set of values and a second set of values in the reference data management system, and upon determining that a relevance score for a relevant value from the second set of values exceeds a predefined threshold, identifying the relevant value to be classified with the term in the glossary, wherein the glossary is configured to create a second classification between the first term and the relevant value.Type: ApplicationFiled: December 7, 2012Publication date: June 12, 2014Applicant: International Business Machines CorporationInventors: Dan J. Mandelstein, Ivan M. Milman, Sushain Pandit
-
Publication number: 20140136577Abstract: Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information.Type: ApplicationFiled: July 16, 2013Publication date: May 15, 2014Inventors: Thomas Cherel, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Publication number: 20140136576Abstract: Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information.Type: ApplicationFiled: November 15, 2012Publication date: May 15, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas Cherel, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Patent number: 8694918Abstract: Techniques are disclosed for generating a view of a data flow model. One or more groupings of data flow objects in the data flow model is determined, based on an ontology. At least a first one of the groupings is collapsed in the view. The view is output for display in a user interface configured to selectively expand and collapse the first group based on user input.Type: GrantFiled: February 6, 2012Date of Patent: April 8, 2014Assignee: International Business Machines CorporationInventors: Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
-
Publication number: 20140006339Abstract: A method, system and computer program product for identifying reference data tables in an Extract-Transform-Load (ETL) process, by identifying, by operation of one or more computer processors, at least a first reference data operator in the process, wherein the first reference data operator references one or more tables and evaluating at least a first table referenced by the reference data operator to determine whether the first table is a reference data table by assigning a score to the first table, wherein the score is indicative of the likelihood that the first table is a reference data table and wherein a reference data table contains a set of values that describes other data.Type: ApplicationFiled: August 28, 2013Publication date: January 2, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dan J. MANDELSTEIN, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
-
Patent number: 8589912Abstract: A method, system and program are provided for managing the installation and configuration of a software product by using a proxy service to loosely couple the installation and/or configuration of constituent modules within the installation/configuration flow of the software product. The proxy service invokes the installation/configuration processing of an existing software component, thereby reducing the complexity associated with installing new component installation processes every time a component is to be supported, especially where the software products and new component(s) do not share the same installation/configuration platforms.Type: GrantFiled: June 29, 2007Date of Patent: November 19, 2013Assignee: International Business Machines CorporationInventors: Heather M. Hinton, Ivan M. Milman, Patrick R. Wardrop
-
Patent number: 8583626Abstract: A method, system and computer program product for identifying reference data tables in an Extract-Transform-Load (ETL) process, by identifying, by operation of one or more computer processors, at least a first reference data operator in the process, wherein the first reference data operator references one or more tables and evaluating at least a first table referenced by the reference data operator to determine whether the first table is a reference data table by assigning a score to the first table, wherein the score is indicative of the likelihood that the first table is a reference data table and wherein a reference data table contains a set of values that describes other data.Type: GrantFiled: March 8, 2012Date of Patent: November 12, 2013Assignee: International Business Machines CorporationInventors: Dan J. Mandelstein, Ivan M. Milman, Martin Oberhofer, Sushain Pandit
-
Publication number: 20130275170Abstract: A method, computer program product, and system for information governance crowd sourcing by, responsive to receiving a data quality exception identifying one or more data quality errors in a data store, identifying a performance level required to correct the data quality errors, selecting, from a crowd hierarchy, a first one or more crowds meeting the defined performance level, wherein the crowd hierarchy ranks the performance of one or more crowds, and routing, by operation of one or more computer processors, the one or more data quality errors to the selected crowds for correction.Type: ApplicationFiled: May 3, 2013Publication date: October 17, 2013Applicant: International Business Machines CorporationInventors: Robert Kern, Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
-
Publication number: 20130275803Abstract: A method, computer program product, and system for information governance crowd sourcing by, responsive to receiving a data quality exception identifying one or more data quality errors in a data store, identifying a performance level required to correct the data quality errors, selecting, from a crowd hierarchy, a first one or more crowds meeting the defined performance level, wherein the crowd hierarchy ranks the performance of one or more crowds, and routing, by operation of one or more computer processors, the one or more data quality errors to the selected crowds for correction.Type: ApplicationFiled: April 13, 2012Publication date: October 17, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert Kern, Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
-
Patent number: 8555351Abstract: A method, system and computer-usable medium are disclosed for validating user credentials submitted to a data source by an untrusted intermediary. An untrusted intermediary attempts to access a data source on behalf of a user. The untrusted intermediary challenges the user to provide credentials of the type and format required to access the data provided by the data source. The user's trust client connects to an authentication service and identification credentials of the required type and format are generated. The identification credentials are conveyed to the user's trust client, which then provides them to the user's client, which in turn conveys them to the untrusted intermediary. The untrusted intermediary then presents the identification credentials to an authentication plug-in of the data source. The authentication plug-in validates the authenticity of the provided credentials with their associated authentication service.Type: GrantFiled: September 29, 2008Date of Patent: October 8, 2013Assignee: International Business Machines CorporationInventors: Neil I. Readshaw, Ivan M. Milman
-
Publication number: 20130238596Abstract: A method, system and computer program product for identifying reference data tables in an Extract-Transform-Load (ETL) process, by identifying, by operation of one or more computer processors, at least a first reference data operator in the process, wherein the first reference data operator references one or more tables and evaluating at least a first table referenced by the reference data operator to determine whether the first table is a reference data table by assigning a score to the first table, wherein the score is indicative of the likelihood that the first table is a reference data table and wherein a reference data table contains a set of values that describes other data.Type: ApplicationFiled: March 8, 2012Publication date: September 12, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
-
Publication number: 20130238641Abstract: A method, computer program product and system for managing tenant-specific data sets in a multi-tenant system, by receiving a request to convert a data set in a physical data store from a first type of multi-tenant deployment to a second type of multi-tenant deployment, retrieving tenant identification metadata identifying a tenant making the request, modifying the data set in the physical data store based on the second type of multi-tenant deployment, and modifying metadata associated with an abstraction layer to allow the modified data set to be accessed.Type: ApplicationFiled: March 8, 2012Publication date: September 12, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit, Daniel C. Wolfson
-
Publication number: 20130238557Abstract: A method, computer program product and system for managing tenant-specific data sets in a multi-tenant system, by receiving a request to convert a data set in a physical data store from a first type of multi-tenant deployment to a second type of multi-tenant deployment, retrieving tenant identification metadata identifying a tenant making the request, modifying the data set in the physical data store based on the second type of multi-tenant deployment, and modifying metadata associated with an abstraction layer to allow the modified data set to be accessed.Type: ApplicationFiled: March 14, 2013Publication date: September 12, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit, Charles D. Wolfson
-
Publication number: 20130238550Abstract: Techniques are disclosed for identifying transcoding tables in an Extract-Transform-Load (ETL) process, by identifying, by operation of one or more computer processors, records passing through an operator configured to replace values in the records with values from at least one table linked to the operator before being sent to an output table, wherein the operator specifies an operation for extracting, transforming, or loading data stored in one or more source systems into storage by a target system, and evaluating at least a first table linked to the operator to determine whether the first table is a transcoding table by assigning a score to the first table, wherein the score is indicative of the likelihood that the first table is a transcoding table, wherein a transcoding table is used to harmonize values from a plurality of tables in the one or more source systems to a table in the target.Type: ApplicationFiled: March 8, 2012Publication date: September 12, 2013Applicant: International Business Machines CorporationInventors: Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
-
Publication number: 20130212073Abstract: According to one embodiment of the present invention, a system analyzes data in response to detecting occurrence of an event, and includes a computer system including at least one processor. The system maps fields between the data and a fingerprint definition identifying relevant fields of the data to produce a fingerprint for the data. The data is deleted after occurrence of the event. The produced fingerprint is stored in a data repository, and retrieved in response to detection of the event occurrence after the data has been deleted. The system analyzes the retrieved fingerprint to evaluate an impact of the event on corresponding deleted data. Embodiments of the present invention further include a method and computer program product for analyzing data in response to detecting occurrence of an event in substantially the same manner described above.Type: ApplicationFiled: February 27, 2012Publication date: August 15, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kristen E. Cochrane, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla