Patents by Inventor Ivan Matthew Milman

Ivan Matthew Milman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210097342
    Abstract: A method, system, and computer program product for identifying reference data values in a source data set. The method may include inputting a block of attribute values to a predefined machine learning model. The method may also include receiving an indication of a presentation layout of the block of the attribute values and an associated reference data extraction method. The method may also include determining a reading direction of the block of values. The method may also include identifying one or more inspection areas in the reading direction of the block of values. The method may also include determining sets of the one or more inspection areas that share a common presentation feature. The method may also include identifying tokens in an inspection area. The method may also include determining if the inspection area includes reference data values. The method may also include outputting the reference data values.
    Type: Application
    Filed: September 26, 2019
    Publication date: April 1, 2021
    Inventors: Martin Oberhofer, Joerg Rehr, Ivan Matthew Milman, Sushain Pandit
  • Patent number: 10796014
    Abstract: A system and method for managing and controlling data licenses for information assets. An information asset is stored in a repository, and registered in a catalog for the repository. A data license is associated with the information asset in the catalog, wherein the data license is stored as part of the information asset's metadata in the catalog. Access to the information asset stored in the repository is controlled based on the data license. A new data license is automatically created for a new information asset derived from an existing information asset, wherein the new data license is derived from an existing data license for the existing information asset. A lineage graph of the information asset is automatically created for audit purposes, to show that the information asset has been accessed in compliance with the data license.
    Type: Grant
    Filed: December 27, 2017
    Date of Patent: October 6, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ivan Matthew Milman, Martin Oberhofer, Sushain Pandit, Charles Daniel Wolfson
  • Patent number: 10341307
    Abstract: An application is instrumented with a document protection service provider interface (SPI). The interface is used to call an external function, e.g., an encryption utility, to facilitate secure document exchange between a sending entity and a receiving entity. When the application invokes the SPI, the user is provided with a display panel. The end user provides a password for encryption key generation, together with an indication of desired encryption strength. The service provider uses the password to generate an encryption key. In one embodiment, the service provider provides the key to the service provider interface, which then uses the key to encrypt the document and to complete the file transfer operation. In the alternative, the service provider itself performs encryption. The SPI generates and sends a message to the receiving entity that includes the key or a link to enable the receiving entity to retrieve the key.
    Type: Grant
    Filed: November 5, 2017
    Date of Patent: July 2, 2019
    Assignee: International Business Machines Corporation
    Inventors: Heather Maria Hinton, Ivan Matthew Milman
  • Publication number: 20190197250
    Abstract: A system and method for managing and controlling data licenses for information assets. An information asset is stored in a repository, and registered in a catalog for the repository. A data license is associated with the information asset in the catalog, wherein the data license is stored as part of the information asset's metadata in the catalog. Access to the information asset stored in the repository is controlled based on the data license. A new data license is automatically created for a new information asset derived from an existing information asset, wherein the new data license is derived from an existing data license for the existing information asset. A lineage graph of the information asset is automatically created for audit purposes, to show that the information asset has been accessed in compliance with the data license.
    Type: Application
    Filed: December 27, 2017
    Publication date: June 27, 2019
    Inventors: Ivan Matthew Milman, Martin Oberhofer, Sushain Pandit, Charles Daniel Wolfson
  • Patent number: 10169723
    Abstract: A multi-component auditing environment uses a set of log-enabled components that are capable of being triggered during an information flow in a data processing system. A “master” compliance component receives data from each log-enabled component in the set of log-enabled components, the data indicating a set of logging properties that are associated with or provided by that log-enabled component. The master compliance component determines, for a given compliance policy, which of a set of one or more events are required from one or more of the individual log-enabled components in the set of log-enabled components. As a result of the determining step, the master compliance component then configures one of more of the individual log-enabled components, e.g. by generating one or more configuration events that are then sent to the one or more individual components. This configuration may take place remotely, i.e., over a network connection.
    Type: Grant
    Filed: November 11, 2009
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Heather Maria Hinton, Ivan Matthew Milman
  • Publication number: 20180063093
    Abstract: An application is instrumented with a document protection service provider interface (SPI). The interface is used to call an external function, e.g., an encryption utility, to facilitate secure document exchange between a sending entity and a receiving entity. When the application invokes the SPI, the user is provided with a display panel. The end user provides a password for encryption key generation, together with an indication of desired encryption strength. The service provider uses the password to generate an encryption key. In one embodiment, the service provider provides the key to the service provider interface, which then uses the key to encrypt the document and to complete the file transfer operation. In the alternative, the service provider itself performs encryption. The SPI generates and sends a message to the receiving entity that includes the key or a link to enable the receiving entity to retrieve the key.
    Type: Application
    Filed: November 5, 2017
    Publication date: March 1, 2018
    Inventors: Heather Maria Hinton, Ivan Matthew Milman
  • Patent number: 9813388
    Abstract: An application is instrumented with a document protection service provider interface (SPI). The interface is used to call an external function, e.g., an encryption utility, to facilitate secure document exchange between a sending entity and a receiving entity. When the application invokes the SPI, the user is provided with a display panel. The end user provides a password for encryption key generation, together with an indication of desired encryption strength. The service provider uses the password to generate an encryption key. In one embodiment, the service provider provides the key to the service provider interface, which then uses the key to encrypt the document and to complete the file transfer operation. In the alternative, the service provider itself performs encryption. The SPI generates and sends a message to the receiving entity that includes the key or a link to enable the receiving entity to retrieve the key.
    Type: Grant
    Filed: July 18, 2016
    Date of Patent: November 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Heather Maria Hinton, Ivan Matthew Milman
  • Publication number: 20170099264
    Abstract: An application is instrumented with a document protection service provider interface (SPI). The interface is used to call an external function, e.g., an encryption utility, to facilitate secure document exchange between a sending entity and a receiving entity. When the application invokes the SPI, the user is provided with a display panel. The end user provides a password for encryption key generation, together with an indication of desired encryption strength. The service provider uses the password to generate an encryption key. In one embodiment, the service provider provides the key to the service provider interface, which then uses the key to encrypt the document and to complete the file transfer operation. In the alternative, the service provider itself performs encryption. The SPI generates and sends a message to the receiving entity that includes the key or a link to enable the receiving entity to retrieve the key.
    Type: Application
    Filed: July 18, 2016
    Publication date: April 6, 2017
    Inventors: Heather Maria Hinton, Ivan Matthew Milman
  • Patent number: 9455976
    Abstract: A network-based appliance includes a mechanism to erase data on the appliance's local storage. The appliance's normal system reset operation is overridden to enable a local user to place the appliance into a safe mode during which remote erasure of the storage is permitted, provided that mode is entered within a first time period following initiation of a system reset. If the appliance is placed in the mode within the time period, it can then receive commands to wipe the local storage. Once the safe mode is entered by detecting one or more actions of a local user, preferably the appliance data itself is wiped by another person or entity that is remote from the device. Thus, physical (local) presence to the appliance is necessary to place the device in the safe mode, while non-physical (remote) presence with respect to the appliance enables actual wiping of the storage device.
    Type: Grant
    Filed: June 3, 2014
    Date of Patent: September 27, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Ivan Matthew Milman, Ronald Dwayne Martin, Kalpesh Hira
  • Patent number: 9397981
    Abstract: A document management (DM), data leak prevention (DLP) or similar application in a data processing system is instrumented with a document protection service provider interface (SPI). The service provider interface is used to call an external function, such as an encryption utility, that is used to facilitate secure document exchange between a sending entity and a receiving entity. The encryption utility may be configured for local download to and installation in the machine on which the SPI is invoked, but a preferred approach is to use the SPI to invoke an external encryption utility as a “service.” In such case, the external encryption utility is implemented by a service provider. When the calling program invokes the SPI, preferably the user is provided with a display panel. Using that panel, the end user provides a password that is used for encryption key generation, together with an indication of the desired encryption strength. The service provider uses the password to generate the encryption key.
    Type: Grant
    Filed: April 20, 2009
    Date of Patent: July 19, 2016
    Assignee: International Business Machines Corporation
    Inventors: Heather Maria Hinton, Ivan Matthew Milman
  • Patent number: 9342353
    Abstract: A technique for selecting an information service implementation includes receiving a service request that includes a tenant identifier that uniquely identifies a calling tenant. Transformation logic to service the service request is selected based on the received tenant identifier. One or more data sources and one or more data targets are selected for the service request based on the received tenant identifier. Data from the selected data sources is processed using the selected transformation logic and the processed data is stored at the selected data targets.
    Type: Grant
    Filed: October 6, 2012
    Date of Patent: May 17, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas Cherel, Ivan Matthew Milman, Martin Oberhofer, Donald Andrew Padilla
  • Publication number: 20150350218
    Abstract: A network-based appliance includes a mechanism to erase data on the appliance's local storage. The appliance's normal system reset operation is overridden to enable a local user to place the appliance into a safe mode during which remote erasure of the storage is permitted, provided that mode is entered within a first time period following initiation of a system reset. If the appliance is placed in the mode within the time period, it can then receive commands to wipe the local storage. Once the safe mode is entered by detecting one or more actions of a local user, preferably the appliance data itself is wiped by another person or entity that is remote from the device. Thus, physical (local) presence to the appliance is necessary to place the device in the safe mode, while non-physical (remote) presence with respect to the appliance enables actual wiping of the storage device.
    Type: Application
    Filed: September 30, 2014
    Publication date: December 3, 2015
    Inventors: Ivan Matthew Milman, Ronald Dwayne Martin, Kalpesh Hira
  • Publication number: 20150350175
    Abstract: A network-based appliance includes a mechanism to erase data on the appliance's local storage. The appliance's normal system reset operation is overridden to enable a local user to place the appliance into a safe mode during which remote erasure of the storage is permitted, provided that mode is entered within a first time period following initiation of a system reset. If the appliance is placed in the mode within the time period, it can then receive commands to wipe the local storage. Once the safe mode is entered by detecting one or more actions of a local user, preferably the appliance data itself is wiped by another person or entity that is remote from the device. Thus, physical (local) presence to the appliance is necessary to place the device in the safe mode, while non-physical (remote) presence with respect to the appliance enables actual wiping of the storage device.
    Type: Application
    Filed: June 3, 2014
    Publication date: December 3, 2015
    Applicant: International Business Machines Corporation
    Inventors: Ivan Matthew Milman, Ronald Dwayne Martin, Kalpesh Hira
  • Patent number: 8819820
    Abstract: Gap analysis is performed on security capabilities of a computer system compared to a desired or targeted security model according to one or more security requirement by providing a data structure of security capabilities of a computer system under analysis, wherein each capability is classified in a formal security capability reference model with a mean having a set of attributes and a goal; determining the security capabilities of the deployed system-under-analysis; matching the security capabilities of the deployed system-under-analysis with the security capabilities defined in the data structure; determining one or more gaps in security capabilities between the deployed system and a security reference model goal; and displaying the gaps to a user in a report.
    Type: Grant
    Filed: November 19, 2012
    Date of Patent: August 26, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ivan Matthew Milman, Martin Oberhofer, Sushain Pandit, Calvin Stacy Powers
  • Publication number: 20140143878
    Abstract: Gap analysis is performed on security capabilities of a computer system compared to a desired or targeted security model according to one or more security requirement by providing a data structure of security capabilities of a computer system under analysis, wherein each capability is classified in a formal security capability reference model with a mean having a set of attributes and a goal; determining the security capabilities of the deployed system-under-analysis; matching the security capabilities of the deployed system-under-analysis with the security capabilities defined in the data structure; determining one or more gaps in security capabilities between the deployed system and a security reference model goal; and displaying the gaps to a user in a report.
    Type: Application
    Filed: November 19, 2012
    Publication date: May 22, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ivan Matthew Milman, Martin Oberhofer, Sushain Pandit, Calvin Stacy Powers
  • Publication number: 20140143879
    Abstract: Gap analysis is performed on security capabilities of a computer system compared to a desired or targeted security model according to one or more security requirement by providing a data structure of security capabilities of a computer system under analysis, wherein each capability is classified in a formal security capability reference model with a mean having a set of attributes and a goal; determining the security capabilities of the deployed system-under-analysis; matching the security capabilities of the deployed system-under-analysis with the security capabilities defined in the data structure; determining one or more gaps in security capabilities between the deployed system and a security reference model goal; and displaying the gaps to a user in a report.
    Type: Application
    Filed: January 14, 2013
    Publication date: May 22, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ivan Matthew Milman, Martin Oberhofer, Sushain Pandit, Calvin Stacy Powers
  • Patent number: 8719311
    Abstract: A method, apparatus and computer program product, for generating a framework for supporting a homogeneous view of an information collection managed in a heterogeneous system of information storage sources. The framework includes an information collection data model mapped to an information source data model, and an information storage services data model mapped to the information source data model. The information collection data model defines information to be collected and stored as an information collection in one or more information storage sources. The information source data model references data sets containing the information defined in the information collection data model. The information storage services data model defines information storage services for accessing and performing operations on the one or more information storage sources storing the information collection.
    Type: Grant
    Filed: March 18, 2011
    Date of Patent: May 6, 2014
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Blight, Amanda Elizabeth Chessell, Dan Jeffrey Mandelstein, Ivan Matthew Milman, Charles Daniel Wolfson
  • Publication number: 20140101299
    Abstract: A technique for selecting an information service implementation includes receiving a service request that includes a tenant identifier that uniquely identifies a calling tenant. Transformation logic to service the service request is selected based on the received tenant identifier. One or more data sources and one or more data targets are selected for the service request based on the received tenant identifier. Data from the selected data sources is processed using the selected transformation logic and the processed data is stored at the selected data targets.
    Type: Application
    Filed: October 6, 2012
    Publication date: April 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: THOMAS CHEREL, IVAN MATTHEW MILMAN, MARTIN OBERHOFER, DONALD ANDREW PADILLA
  • Patent number: 8443189
    Abstract: An approach is provided for selecting one or more trust factors from trust factors included in a trust index repository. Thresholds are identified corresponding to one or more of the selected trust factors. Actions are identified to perform when the selected trust factors reach the corresponding threshold values. The identified thresholds, identified actions, and selected trust factors are stored in a data store. The selected trust factors are monitored by comparing one or more trust metadata scores with the stored identified thresholds. The stored identified actions that correspond to the selected trust factors are performed when one or more of the trust metadata scores reach the identified thresholds. At least one of the actions includes an event notification that is provided to a trust data consumer.
    Type: Grant
    Filed: October 24, 2008
    Date of Patent: May 14, 2013
    Assignee: International Business Machines Corporation
    Inventors: Chung-Sheng Li, Ivan Matthew Milman, Guenter Anton Sauter, Harald Clyde Smith, Charles Daniel Wolfson
  • Patent number: 8290960
    Abstract: An approach is provided for selecting a trust factor from trust factors that are included in a trust index repository. A trust metaphor is associated with the selected trust factor. The trust metaphor includes various context values. Range values are received and the trust metaphor, context values, and range values are associated with the selected trust factor. A request is received from a data consumer, the request corresponding to a trust factor metadata score that is associated with the selected trust factor. The trust factor metadata score is retrieved and matched with the range values. The matching results in one of the context values being selected based on the retrieved trust factor metadata score. The selected context value is then provided to the data consumer.
    Type: Grant
    Filed: October 24, 2008
    Date of Patent: October 16, 2012
    Assignee: International Business Machines Corporation
    Inventors: Chung-Sheng Li, Ivan Matthew Milman, Guenter Anton Sauter, Harald Clyde Smith, Charles Daniel Wolfson