Patents by Inventor JEFFREY T. ROBKE
JEFFREY T. ROBKE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9229738Abstract: A message occurrence can be detected when a software application runs on a computing device. The message occurrence can be an occurrence where a text containing message is presented upon a user interface of the software application or a log associated with the software application is updated with a text containing message. A user context for the message occurrence can be determined. The user context can include a user sequence and an execution path. Message occurrence information can be conveyed to a message context catalog. Within the message context catalog, the message occurrence information can be indexed against unique message identifiers. Message occurrence information from the message context catalog can be presented in a computer's user interface when a message uniquely identified by the message identifier is presented in the user interface. The user interface can permit a user to edit text of messages.Type: GrantFiled: June 19, 2009Date of Patent: January 5, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ana C. Biazetti, Virginia D. Hill, Radhika Ramakrishnan, Jeffrey T. Robke, Latha Sivakumar, Mary E. Sturgeon
-
Patent number: 8918425Abstract: Mechanisms are provided for performing a role engineering project for applying security roles to access operations targeting resources. A plurality of data objects representing one or more user identities, permissions, and resources of an organization computing system are received. One or more filter criteria for filtering the plurality of data objects to generate a subset of data objects for consideration during the role engineering project are received. The one or more filter criteria specify a scope of the role engineering project. The one or more filter criteria are applied to generate the subset of data objects. Role engineering project operations are performed on the subset of data objects to generate one or more security roles. The one or more security roles are deployed to the organization computing system to control access operations targeting resources of the organization computing system.Type: GrantFiled: October 21, 2011Date of Patent: December 23, 2014Assignee: International Business Machines CorporationInventors: Luis B. Casco-Arias Sanchez, Todd D. Jordan, David G. Kuehr-McLaren, Oriana J. Love, David W. Palmieri, Chrystian L. Plachco, Magesh Rajamani, Jeffrey T. Robke
-
Patent number: 8918426Abstract: Mechanisms are provided for performing a role engineering project for applying security roles to access operations targeting resources. A plurality of data objects representing one or more user identities, permissions, and resources of an organization computing system are received. One or more filter criteria for filtering the plurality of data objects to generate a subset of data objects for consideration during the role engineering project are received. The one or more filter criteria specify a scope of the role engineering project. The one or more filter criteria are applied to generate the subset of data objects. Role engineering project operations are performed on the subset of data objects to generate one or more security roles. The one or more security roles are deployed to the organization computing system to control access operations targeting resources of the organization computing system.Type: GrantFiled: March 14, 2013Date of Patent: December 23, 2014Assignee: International Business Machines CorporationInventors: Luis B. Casco-Arias Sanchez, Todd D. Jordan, David G. Kuehr-McLaren, Oriana J. Love, David W. Palmieri, Chrystian L. Plachco, Magesh Rajamani, Jeffrey T. Robke
-
Automatic generation of user account policies based on configuration management database information
Patent number: 8819771Abstract: Mechanisms are provided for generating user account policies for generating user accounts to access resources of the data processing system. A determination is made that a user account policy for an identified resource in the data processing system is to be generated. Configuration information associated with the identified resource is retrieved from a configuration information database. A predefined user account policy template is retrieved from a user account policy template database system. A user account policy data structure is generated based on the retrieved configuration information and the retrieved predefined user account policy template.Type: GrantFiled: November 27, 2012Date of Patent: August 26, 2014Assignee: International Business Machines CorporationInventors: Ana C. Biazetti, Jeffrey T. Robke -
Automatic generation of user account policies based on configuration management database information
Patent number: 8806568Abstract: Mechanisms are provided for generating user account policies for generating user accounts to access resources of the data processing system. A determination is made that a user account policy for an identified resource in the data processing system is to be generated. Configuration information associated with the identified resource is retrieved from a configuration information database. A predefined user account policy template is retrieved from a user account policy template database system. A user account policy data structure is generated based on the retrieved configuration information and the retrieved predefined user account policy template.Type: GrantFiled: July 11, 2011Date of Patent: August 12, 2014Assignee: International Business Machines CorporationInventors: Ana C. Biazetti, Jeffrey T. Robke -
Publication number: 20130104046Abstract: Mechanisms are provided for performing a role engineering project for applying security roles to access operations targeting resources. A plurality of data objects representing one or more user identities, permissions, and resources of an organization computing system are received. One or more filter criteria for filtering the plurality of data objects to generate a subset of data objects for consideration during the role engineering project are received. The one or more filter criteria specify a scope of the role engineering project. The one or more filter criteria are applied to generate the subset of data objects. Role engineering project operations are performed on the subset of data objects to generate one or more security roles. The one or more security roles are deployed to the organization computing system to control access operations targeting resources of the organization computing system.Type: ApplicationFiled: October 21, 2011Publication date: April 25, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Luis B. Casco-Arias Sanchez, Todd D. Jordan, David G. Kuehr-McLaren, Oriana J. Love, David W. Palmieri, Chrystian L. Plachco, Magesh Rajamani, Jeffrey T. Robke
-
Automatic Generation of User Account Policies Based on Configuration Management Database Information
Publication number: 20130019276Abstract: Mechanisms are provided for generating user account policies for generating user accounts to access resources of the data processing system. A determination is made that a user account policy for an identified resource in the data processing system is to be generated. Configuration information associated with the identified resource is retrieved from a configuration information database. A predefined user account policy template is retrieved from a user account policy template database system. A user account policy data structure is generated based on the retrieved configuration information and the retrieved predefined user account policy template.Type: ApplicationFiled: July 11, 2011Publication date: January 17, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ana C. Biazetti, Jeffrey T. Robke -
Publication number: 20100325540Abstract: A message occurrence can be detected when a software application runs on a computing device. The message occurrence can be an occurrence where a text containing message is presented upon a user interface of the software application or a log associated with the software application is updated with a text containing message. A user context for the message occurrence can be determined. The user context can include a user sequence and an execution path. Message occurrence information can be conveyed to a message context catalog. Within the message context catalog, the message occurrence information can be indexed against unique message identifiers. Message occurrence information from the message context catalog can be presented in a computer's user interface when a message uniquely identified by the message identifier is presented in the user interface. The user interface can permit a user to edit text of messages.Type: ApplicationFiled: June 19, 2009Publication date: December 23, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: ANA C. BIAZETTI, VIRGINIA D. HILL, RADHIKA RAMAKRISHNAN, JEFFREY T. ROBKE, LATHA SIVAKUMAR, MARY E. STURGEON