Patents by Inventor Ivan M. Milman

Ivan M. Milman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140280342
    Abstract: Provided are techniques for secure matching supporting fuzzy data. A first bloom filter for a first data element is retrieved, wherein each of the characters in the data element has been encrypted with a beginning offset position of the character and encrypted with an end offset position of the character to produce two encrypted values that are added to the first bloom filter. A second bloom filter for a second data element is retrieved. The first bloom filter and the second bloom filter are compared to determine whether there is a match between the first data element and the second data element.
    Type: Application
    Filed: March 13, 2013
    Publication date: September 18, 2014
    Inventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Publication number: 20140281856
    Abstract: Provided are to a computer program product, system, and method for determining linkage metadata of content of a target document to source documents.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Brian P. Byrne, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
  • Patent number: 8832779
    Abstract: Provided are techniques for providing security in a computing system with identity mediation policies that are enterprise service bus (EBS) independent. A mediator component performs service-level operation such as message brokering, identity mediation, and transformation to enhance interoperability among service consumers and service providers. A mediator component may also delegate identity related operations to a token service of handler. Identity mediation may include such operations as identity determination, or “identification,” authentication, authorization, identity transformation and security audit.
    Type: Grant
    Filed: March 13, 2012
    Date of Patent: September 9, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ivan M. Milman, Martin Oberhofer, Dmitriy Fot
  • Publication number: 20140223001
    Abstract: Lifecycle management for blueprints of information technology systems includes determining, using a processor, a component referenced by a blueprint defining an information technology system and determining a component tool used to manage the component. The component is registered with a sensor within the component tool. Responsive to detecting a change in status of the component within the component tool, the sensor sends a notification.
    Type: Application
    Filed: October 30, 2013
    Publication date: August 7, 2014
    Applicant: International Business Machines Corporation
    Inventors: Brian P. Byrne, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
  • Publication number: 20140222991
    Abstract: Lifecycle management for blueprints of information technology systems includes determining, using a processor, a component referenced by a blueprint defining an information technology system and determining a component tool used to manage the component. The component is registered with a sensor within the component tool. Responsive to detecting a change in status of the component within the component tool, the sensor sends a notification.
    Type: Application
    Filed: February 5, 2013
    Publication date: August 7, 2014
    Applicant: International Business Machines Corporation
    Inventors: Brian P. Byrne, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
  • Publication number: 20140164399
    Abstract: Method, system, and computer program product to improve a coverage of a plurality of classifications between a plurality of terms in a glossary and a set of values in a reference data management system, by identifying a first classification, of the plurality of classifications in the glossary, between a first term in the glossary and a first set of values in the reference data management system, detecting a relationship between the first set of values and a second set of values in the reference data management system, and upon determining that a relevance score for a relevant value from the second set of values exceeds a predefined threshold, identifying the relevant value to be classified with the term in the glossary, wherein the glossary is configured to create a second classification between the first term and the relevant value.
    Type: Application
    Filed: December 7, 2012
    Publication date: June 12, 2014
    Applicant: International Business Machines Corporation
    Inventors: Dan J. Mandelstein, Ivan M. Milman, Sushain Pandit
  • Publication number: 20140136577
    Abstract: Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information.
    Type: Application
    Filed: July 16, 2013
    Publication date: May 15, 2014
    Inventors: Thomas Cherel, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Publication number: 20140136576
    Abstract: Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information.
    Type: Application
    Filed: November 15, 2012
    Publication date: May 15, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas Cherel, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Patent number: 8694918
    Abstract: Techniques are disclosed for generating a view of a data flow model. One or more groupings of data flow objects in the data flow model is determined, based on an ontology. At least a first one of the groupings is collapsed in the view. The view is output for display in a user interface configured to selectively expand and collapse the first group based on user input.
    Type: Grant
    Filed: February 6, 2012
    Date of Patent: April 8, 2014
    Assignee: International Business Machines Corporation
    Inventors: Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
  • Publication number: 20140006339
    Abstract: A method, system and computer program product for identifying reference data tables in an Extract-Transform-Load (ETL) process, by identifying, by operation of one or more computer processors, at least a first reference data operator in the process, wherein the first reference data operator references one or more tables and evaluating at least a first table referenced by the reference data operator to determine whether the first table is a reference data table by assigning a score to the first table, wherein the score is indicative of the likelihood that the first table is a reference data table and wherein a reference data table contains a set of values that describes other data.
    Type: Application
    Filed: August 28, 2013
    Publication date: January 2, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dan J. MANDELSTEIN, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
  • Patent number: 8589912
    Abstract: A method, system and program are provided for managing the installation and configuration of a software product by using a proxy service to loosely couple the installation and/or configuration of constituent modules within the installation/configuration flow of the software product. The proxy service invokes the installation/configuration processing of an existing software component, thereby reducing the complexity associated with installing new component installation processes every time a component is to be supported, especially where the software products and new component(s) do not share the same installation/configuration platforms.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: November 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Heather M. Hinton, Ivan M. Milman, Patrick R. Wardrop
  • Patent number: 8583626
    Abstract: A method, system and computer program product for identifying reference data tables in an Extract-Transform-Load (ETL) process, by identifying, by operation of one or more computer processors, at least a first reference data operator in the process, wherein the first reference data operator references one or more tables and evaluating at least a first table referenced by the reference data operator to determine whether the first table is a reference data table by assigning a score to the first table, wherein the score is indicative of the likelihood that the first table is a reference data table and wherein a reference data table contains a set of values that describes other data.
    Type: Grant
    Filed: March 8, 2012
    Date of Patent: November 12, 2013
    Assignee: International Business Machines Corporation
    Inventors: Dan J. Mandelstein, Ivan M. Milman, Martin Oberhofer, Sushain Pandit
  • Publication number: 20130275170
    Abstract: A method, computer program product, and system for information governance crowd sourcing by, responsive to receiving a data quality exception identifying one or more data quality errors in a data store, identifying a performance level required to correct the data quality errors, selecting, from a crowd hierarchy, a first one or more crowds meeting the defined performance level, wherein the crowd hierarchy ranks the performance of one or more crowds, and routing, by operation of one or more computer processors, the one or more data quality errors to the selected crowds for correction.
    Type: Application
    Filed: May 3, 2013
    Publication date: October 17, 2013
    Applicant: International Business Machines Corporation
    Inventors: Robert Kern, Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
  • Publication number: 20130275803
    Abstract: A method, computer program product, and system for information governance crowd sourcing by, responsive to receiving a data quality exception identifying one or more data quality errors in a data store, identifying a performance level required to correct the data quality errors, selecting, from a crowd hierarchy, a first one or more crowds meeting the defined performance level, wherein the crowd hierarchy ranks the performance of one or more crowds, and routing, by operation of one or more computer processors, the one or more data quality errors to the selected crowds for correction.
    Type: Application
    Filed: April 13, 2012
    Publication date: October 17, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert Kern, Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
  • Patent number: 8555351
    Abstract: A method, system and computer-usable medium are disclosed for validating user credentials submitted to a data source by an untrusted intermediary. An untrusted intermediary attempts to access a data source on behalf of a user. The untrusted intermediary challenges the user to provide credentials of the type and format required to access the data provided by the data source. The user's trust client connects to an authentication service and identification credentials of the required type and format are generated. The identification credentials are conveyed to the user's trust client, which then provides them to the user's client, which in turn conveys them to the untrusted intermediary. The untrusted intermediary then presents the identification credentials to an authentication plug-in of the data source. The authentication plug-in validates the authenticity of the provided credentials with their associated authentication service.
    Type: Grant
    Filed: September 29, 2008
    Date of Patent: October 8, 2013
    Assignee: International Business Machines Corporation
    Inventors: Neil I. Readshaw, Ivan M. Milman
  • Publication number: 20130238596
    Abstract: A method, system and computer program product for identifying reference data tables in an Extract-Transform-Load (ETL) process, by identifying, by operation of one or more computer processors, at least a first reference data operator in the process, wherein the first reference data operator references one or more tables and evaluating at least a first table referenced by the reference data operator to determine whether the first table is a reference data table by assigning a score to the first table, wherein the score is indicative of the likelihood that the first table is a reference data table and wherein a reference data table contains a set of values that describes other data.
    Type: Application
    Filed: March 8, 2012
    Publication date: September 12, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
  • Publication number: 20130238641
    Abstract: A method, computer program product and system for managing tenant-specific data sets in a multi-tenant system, by receiving a request to convert a data set in a physical data store from a first type of multi-tenant deployment to a second type of multi-tenant deployment, retrieving tenant identification metadata identifying a tenant making the request, modifying the data set in the physical data store based on the second type of multi-tenant deployment, and modifying metadata associated with an abstraction layer to allow the modified data set to be accessed.
    Type: Application
    Filed: March 8, 2012
    Publication date: September 12, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit, Daniel C. Wolfson
  • Publication number: 20130238557
    Abstract: A method, computer program product and system for managing tenant-specific data sets in a multi-tenant system, by receiving a request to convert a data set in a physical data store from a first type of multi-tenant deployment to a second type of multi-tenant deployment, retrieving tenant identification metadata identifying a tenant making the request, modifying the data set in the physical data store based on the second type of multi-tenant deployment, and modifying metadata associated with an abstraction layer to allow the modified data set to be accessed.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 12, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit, Charles D. Wolfson
  • Publication number: 20130238550
    Abstract: Techniques are disclosed for identifying transcoding tables in an Extract-Transform-Load (ETL) process, by identifying, by operation of one or more computer processors, records passing through an operator configured to replace values in the records with values from at least one table linked to the operator before being sent to an output table, wherein the operator specifies an operation for extracting, transforming, or loading data stored in one or more source systems into storage by a target system, and evaluating at least a first table linked to the operator to determine whether the first table is a transcoding table by assigning a score to the first table, wherein the score is indicative of the likelihood that the first table is a transcoding table, wherein a transcoding table is used to harmonize values from a plurality of tables in the one or more source systems to a table in the target.
    Type: Application
    Filed: March 8, 2012
    Publication date: September 12, 2013
    Applicant: International Business Machines Corporation
    Inventors: Dan J. Mandelstein, Ivan M. Milman, Martin A. Oberhofer, Sushain Pandit
  • Publication number: 20130212073
    Abstract: According to one embodiment of the present invention, a system analyzes data in response to detecting occurrence of an event, and includes a computer system including at least one processor. The system maps fields between the data and a fingerprint definition identifying relevant fields of the data to produce a fingerprint for the data. The data is deleted after occurrence of the event. The produced fingerprint is stored in a data repository, and retrieved in response to detection of the event occurrence after the data has been deleted. The system analyzes the retrieved fingerprint to evaluate an impact of the event on corresponding deleted data. Embodiments of the present invention further include a method and computer program product for analyzing data in response to detecting occurrence of an event in substantially the same manner described above.
    Type: Application
    Filed: February 27, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kristen E. Cochrane, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla