Patents by Inventor Julian T. Dolby
Julian T. Dolby has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11663110Abstract: A debugging tool and method for statically verifying programs that invoke web-based services through API calls is provided. The tool receives source code that comprises one or more invocation of web APIs for requesting web-based services. The tool also receives a set of web API specifications. The tool extracts a set of request information for each web API invocation in the source code, the set of request information including a usage string of an URL endpoint. The tool verifies whether the set of request information complies with the received web API specifications and reports a result of the verification.Type: GrantFiled: October 31, 2016Date of Patent: May 30, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julian T. Dolby, Jim A. Laredo, John E. Wittern, Annie T. T. Ying, Yunhui Zheng
-
Patent number: 11206228Abstract: Aspects of the present invention disclose a method, computer program product, and system for detecting and mitigating adversarial virtual interactions. The method includes one or more processors initiating a mitigation protocol on interactions between the user and the virtual agent, wherein the mitigation protocol is based on the actions performed by the user while interacting with the virtual agent. The method further includes one or more processors, in response to initiating the mitigation protocol on interactions between the user and the virtual agent, generating a lower fidelity response from the virtual agent to the user, wherein the lower fidelity response is a progressive dilution of the precision of language of an original response from the virtual agent to the user prior to the user exceeding the risk level threshold.Type: GrantFiled: January 20, 2020Date of Patent: December 21, 2021Assignee: International Business Machines CorporationInventors: Guillaume A. Baudart, Julian T. Dolby, Evelyn Duesterwald, David J. Piorkowski
-
Patent number: 10942708Abstract: A tool that automatically generates a web API specification from a web API documentation is provided. The tool extracts a base uniform resource locator (URL) string from the received documentation by identifying URL strings in the documentation that are valid web application programming interface (API) calls. The tool infers path templates by identifying and clustering path expressions in the documentation that invoke the same URL endpoints. The tool extracts hypertext transfer protocol (HTTP) request type and query parameters associated with the inferred path templates. The tool generates a specification that includes the extracted base URL, the inferred path templates, the extracted HTTP request types, and the extracted query parameters.Type: GrantFiled: January 10, 2017Date of Patent: March 9, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julian T. Dolby, John E. Wittern, Jinqiu Yang, Annie T. T. Ying
-
Publication number: 20200153763Abstract: Aspects of the present invention disclose a method, computer program product, and system for detecting and mitigating adversarial virtual interactions. The method includes one or more processors initiating a mitigation protocol on interactions between the user and the virtual agent, wherein the mitigation protocol is based on the actions performed by the user while interacting with the virtual agent. The method further includes one or more processors, in response to initiating the mitigation protocol on interactions between the user and the virtual agent, generating a lower fidelity response from the virtual agent to the user, wherein the lower fidelity response is a progressive dilution of the precision of language of an original response from the virtual agent to the user prior to the user exceeding the risk level threshold.Type: ApplicationFiled: January 20, 2020Publication date: May 14, 2020Inventors: Guillaume A. Baudart, Julian T. Dolby, Evelyn Duesterwald, David J. Piorkowski
-
Patent number: 10621333Abstract: Online security analysis is provided by installing an analysis agent on a mobile device. The analysis agent monitors the mobile device to detect an initiation of installation for a new application that is to be installed on the mobile device. In response to the initiation of installation, the analysis agent quarantines a set of resources corresponding to the new application; analyzes the set of resources to determine whether or not at least one of a potential security threat or a security misconfiguration exists; and, in response to determining that at least one of the potential security threat or the security misconfiguration exists, generates an alert for informing a user that the potential security threat or the security misconfiguration exists.Type: GrantFiled: August 8, 2016Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Julian T. Dolby, Pietro Ferrara, Marco Pistoia, Omer Tripp
-
Patent number: 10574598Abstract: Aspects of the present invention disclose a method, computer program product, and system for detecting and mitigating adversarial virtual interactions. The method includes one or more processors detecting a user communication that is interacting with a virtual agent. The method further includes one or more processors determining a risk level associated with the detected user communication based on one or more actions performed by the detected user while interacting with the virtual agent. The method further includes one or more processors in response to determining that the determined risk level associated with the detected user communication exceeds a risk level threshold, initiating, a mitigation protocol on interactions between the detected user and the virtual agent, where the mitigation protocol is based on the actions performed by the detected user while interacting with the virtual agent.Type: GrantFiled: October 18, 2017Date of Patent: February 25, 2020Assignee: International Business Machines CorporationInventors: Guillaume A. Baudart, Julian T. Dolby, Evelyn Duesterwald, David J. Piorkowski
-
Publication number: 20190116136Abstract: Aspects of the present invention disclose a method, computer program product, and system for detecting and mitigating adversarial virtual interactions. The method includes one or more processors detecting a user communication that is interacting with a virtual agent. The method further includes one or more processors determining a risk level associated with the detected user communication based on one or more actions performed by the detected user while interacting with the virtual agent. The method further includes one or more processors in response to determining that the determined risk level associated with the detected user communication exceeds a risk level threshold, initiating, a mitigation protocol on interactions between the detected user and the virtual agent, where the mitigation protocol is based on the actions performed by the detected user while interacting with the virtual agent.Type: ApplicationFiled: October 18, 2017Publication date: April 18, 2019Inventors: Guillaume A. Baudart, Julian T. Dolby, Evelyn Duesterwald, David J. Piorkowski
-
Publication number: 20180196643Abstract: A tool that automatically generates a web API specification from a web API documentation is provided. The tool extracts a base uniform resource locator (URL) string from the received documentation by identifying URL strings in the documentation that are valid web application programming interface (API) calls. The tool infers path templates by identifying and clustering path expressions in the documentation that invoke the same URL endpoints. The tool extracts hypertext transfer protocol (HTTP) request type and query parameters associated with the inferred path templates. The tool generates a specification that includes the extracted base URL, the inferred path templates, the extracted HTTP request types, and the extracted query parameters.Type: ApplicationFiled: January 10, 2017Publication date: July 12, 2018Inventors: Julian T. Dolby, John E. Wittern, Jinqiu Yang, Annie T. T. Ying
-
Publication number: 20180121320Abstract: A debugging tool and method for statically verifying programs that invoke web-based services through API calls is provided. The tool receives source code that comprises one or more invocation of web APIs for requesting web-based services. The tool also receives a set of web API specifications. The tool extracts a set of request information for each web API invocation in the source code, the set of request information including a usage string of an URL endpoint. The tool verifies whether the set of request information complies with the received web API specifications and reports a result of the verification.Type: ApplicationFiled: October 31, 2016Publication date: May 3, 2018Inventors: Julian T. Dolby, Jim A. Laredo, John E. Wittern, Annie T. T. Ying, Yunhui Zheng
-
Publication number: 20180039774Abstract: Online security analysis is provided by installing an analysis agent on a mobile device. The analysis agent monitors the mobile device to detect an initiation of installation for a new application that is to be installed on the mobile device. In response to the initiation of installation, the analysis agent quarantines a set of resources corresponding to the new application; analyzes the set of resources to determine whether or not at least one of a potential security threat or a security misconfiguration exists; and, in response to determining that at least one of the potential security threat or the security misconfiguration exists, generates an alert for informing a user that the potential security threat or the security misconfiguration exists.Type: ApplicationFiled: August 8, 2016Publication date: February 8, 2018Applicant: International Business Machines CorporationInventors: Julian T. Dolby, Pietro Ferrara, Marco Pistoia, Omer Tripp
-
Patent number: 9733927Abstract: In an approach for determining compatibility between a computing device and a software application, a processor receives code of a software application. A processor generates a call graph for the software application using the code, wherein the call graph describes at least a first type of hardware component required to execute the software application. A processor identifies a set of one or more hardware components included within a computing device. A processor determines whether the computing device is compatible with the software application based on, at least, the call graph and the determined set of one or more hardware components included within the computing device.Type: GrantFiled: November 11, 2015Date of Patent: August 15, 2017Assignee: International Business Machines CorporationInventors: Julian T. Dolby, Pietro Ferrara, Marco Pistoia, Omer Tripp
-
Publication number: 20170131999Abstract: In an approach for determining compatibility between a computing device and a software application, a processor receives code of a software application. A processor generates a call graph for the software application using the code, wherein the call graph describes at least a first type of hardware component required to execute the software application. A processor identifies a set of one or more hardware components included within a computing device. A processor determines whether the computing device is compatible with the software application based on, at least, the call graph and the determined set of one or more hardware components included within the computing device.Type: ApplicationFiled: November 11, 2015Publication date: May 11, 2017Inventors: Julian T. Dolby, Pietro Ferrara, Marco Pistoia, Omer Tripp
-
Patent number: 8607191Abstract: A method for business process to customized program code mapping in a pre-packaged computing solution can include establishing a connection from a business process to code mapping module executing in memory by a processor of a computer to a source pre-packaged computing solution, extracting both a business process hierarchy (BPH) and customized program code from the source pre-packaged computing solution, storing the BPH and the extracted customized program code in storage coupled to the computer, selecting a business process in the BPH and mapping the selected business process to corresponding portions of the customized program code, and generating and displaying in the computer a dependency graph indicating dependency relationships of the mapped portions of the customized program code for the selected business process of the BPH of the source pre-packaged computing solution.Type: GrantFiled: June 30, 2010Date of Patent: December 10, 2013Assignee: International Business Machines CorporationInventors: Julian T. Dolby, Richard T. Goodwin, Anca A. Ivan, Igor A. Naumov, Manas R. Kumar Singh
-
Patent number: 8549490Abstract: A method for static code analyzing customizations to a pre-packaged computing solution can include establishing a communicative connection from a recommendation generation module to a pre-packaged computing solution and authenticating into the pre-packaged computing solution. Customized program code can be extracted from the pre-packaged computing solution and a call graph of the customized program code can be constructed such that the call graph indicates method calls to different interfaces for program code of the pre-packaged computing solution. Finally, a report can be generated identifying customized program code to be adapted to a new version of the pre-packaged computing solution based upon changes in the different interfaces shown by the call graph to be used in the new version of the pre-packaged computing solution and modifications required for the customized program code to call the different interfaces in the new version of the pre-packaged computing solution.Type: GrantFiled: September 29, 2009Date of Patent: October 1, 2013Assignee: International Business Machines CorporationInventors: Julian T. Dolby, Richard T. Goodwin, Anca Andreea Ivan, Manas R. Kumar Singh
-
Patent number: 8527946Abstract: The present invention provides a programming model based on a relational view of the heap which defines identity declaratively, obviating the need for equals( ) and hashcode( ) methods. Each element in the heap (called a tuple) belongs to a relation type and relates an immutable identity to mutable state. The model entails a stricter contract: identity never changes during an execution. Objects, values, and singletons arise as special cases of tuples.Type: GrantFiled: March 6, 2007Date of Patent: September 3, 2013Assignee: International Business Machines CorporationInventors: Mandana Vaziri-Farahani, Frank Tip, Stephen J. Fink, Julian T. Dolby
-
Patent number: 8141054Abstract: A method, an information processing system, and a computer readable medium, are used to detect atomic-set serializability violations in an execution of a program. A set of classes associated with a program to be analyzed is identified. The set of classes include a set of fields. At least one subset of fields in the set of fields in the identified classes is selected. A set of code fragments associated with an execution of the program is selected. Data accesses in the selected set of code fragments are observed. It is determined if the selected set of code fragments is serializable for each selected subset of fields.Type: GrantFiled: August 8, 2007Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventors: Julian T. Dolby, Christian J. Hammer, Frank Tip, Mandana Vaziri-Farahani
-
Publication number: 20120005647Abstract: Embodiments of the present invention provide a method, system and computer program product for business process to customized program code mapping in a pre-packaged computing solution. The method can include establishing a connection from a business process to code mapping module executing in memory by a processor of a computer to a source pre-packaged computing solution, extracting both a business process hierarchy (BPH) and customized program code from the source pre-packaged computing solution and storing the BPH and the extracted customized program code in storage coupled to the computer. The method further can include selecting a business process in the BPH and mapping the selected business process to corresponding portions of the customized program code.Type: ApplicationFiled: June 30, 2010Publication date: January 5, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julian T. Dolby, Richard T. Goodwin, Anca A. Ivan, Igor A. Naumov, Manas R. Kumar Singh
-
Publication number: 20110078667Abstract: A method for static code analyzing customizations to a pre-packaged computing solution can include establishing a communicative connection from a recommendation generation module to a pre-packaged computing solution and authenticating into the pre-packaged computing solution. Customized program code can be extracted from the pre-packaged computing solution and a call graph of the customized program code can be constructed such that the call graph indicates method calls to different interfaces for program code of the pre-packaged computing solution. Finally, a report can be generated identifying customized program code to be adapted to a new version of the pre-packaged computing solution based upon changes in the different interfaces shown by the call graph to be used in the new version of the pre-packaged computing solution and modifications required for the customized program code to call the different interfaces in the new version of the pre-packaged computing solution.Type: ApplicationFiled: September 29, 2009Publication date: March 31, 2011Applicant: International Business Machines CorporationInventors: Julian T. Dolby, Richard T. Goodwin, Anca Andreea Ivan, Manas R. Kumar Singh
-
Publication number: 20090044174Abstract: A method, an information processing system, and a computer readable medium, are used to detect atomic-set serializability violations in an execution of a program. A set of classes associated with a program to be analyzed is identified. The set of classes include a set of fields. At least one subset of fields in the set of fields in the identified classes is selected. A set of code fragments associated with an execution of the program is selected. Data accesses in the selected set of code fragments are observed. It is determined if the selected set of code fragments is serializable for each selected subset of fields.Type: ApplicationFiled: August 8, 2007Publication date: February 12, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julian T. Dolby, Christian J. Hammer, Frank Tip, Mandana Vaziri-Farahani
-
Publication number: 20080222602Abstract: The present invention provides a programming model based on a relational view of the heap which defines identity declaratively, obviating the need for equals( ) and hashcode( ) methods. Each element in the heap (called a tuple) belongs to a relation type and relates an immutable identity to mutable state. The model entails a stricter contract: identity never changes during an execution. Objects, values, and singletons arise as special cases of tuples.Type: ApplicationFiled: March 6, 2007Publication date: September 11, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mandana Vaziri-Farahani, Frank Tip, Stephen J. Fink, Julian T. Dolby