Patents by Inventor Julian Timothy Dolby
Julian Timothy Dolby has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10977385Abstract: Methods and systems are provided for configurable and non-invasive protection of private information in a user input to a software application that handles real-time information. A method includes detecting, by a filter in real-time, private information in the user input. The method further includes forming, by the filter, a filtered user input from the user input, by maintaining non-private information from the user input in the filtered user input, extracting and encrypting the private information in the user input and attaching the encrypted private information to the filtered user input, and replacing the private information in the user input with unique identifiers in the filtered user input. The unique identifiers are configured to be exploitable by the software application to achieve an intended function of the software application for the user. The method also includes transmitting, by a communications redirector, the filtered user input over a communication channel.Type: GrantFiled: March 7, 2018Date of Patent: April 13, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Guillaume A. Baudart, Evelyn Duesterwald, Martin Hirzel, Avraham Ever Shinnar, Julian Timothy Dolby
-
Patent number: 10949464Abstract: A system for identifying a schema for storing graph data includes a database containing a graph dataset of data and relationships between data pairs and a list of storage methods that each are a distinct structural arrangement of the data and relationships from the graph data set. An analyzer module collects statistics for the graph dataset, and a data classification module uses the collected statistics to calculate metrics describing the data and relationships in the graph dataset, uses the calculated metrics to group the data and relationships into a plurality of graph dataset subsets and associates each graph dataset subset with one of the plurality of storage methods. The resulting group of storage methods associated with the plurality of graph dataset subsets includes a unique storage method for each graph dataset subset. The data and relationships in each graph dataset subset are arranged in accordance with associated storage methods.Type: GrantFiled: March 23, 2016Date of Patent: March 16, 2021Assignee: International Business Machines CorporationInventors: Mihaela Ancuta Bornea, Julian Timothy Dolby, Achille Belly Fokoue-Nkoutche, Anastasios Kementsietsidis, Kavitha Srinivas
-
Patent number: 10509804Abstract: A system for storing graph data as a multi-dimensional cluster having a database with a graph dataset containing data and relationships between data pairs and a schema list of storage methods that use a table with columns and rows associated with data or relationships. An analyzer module to collect statistics of a graph dataset and a dimension identification module to identify a plurality of dimensions that each represent a column in the table. A schema creation and loading module creates a modified storage method and having a plurality of distinct table blocks and a plurality of table block indexes, one index for each table block and arranges the data and relationships in the given graph dataset in accordance with the modified storage method to create the multi-dimensional cluster.Type: GrantFiled: March 24, 2016Date of Patent: December 17, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mihaela Ancuta Bornea, Julian Timothy Dolby, Achille Belly Fokoue-Nkoutche, Anastasios Kementsietsidis, Kavitha Srinivas
-
Publication number: 20190362095Abstract: A method and system of protecting user sensitive information from an application program of a user device are provided. The application program to be installed is received on the user device. Permissions to resources of the user device for the application program are identified. For each permission, mapping the permission to one or more sections of a code of the application program. For each mapped section of the code, a recipient of user sensitive information facilitated by the permission is determined. For each recipient, it is determined whether the recipient should be restricted. Upon determining that the recipient should not be restricted, the user sensitive information facilitated by the permission is provided to the recipient. However, upon determining that the recipient should be restricted, alternate information to the recipient.Type: ApplicationFiled: May 28, 2018Publication date: November 28, 2019Inventors: Omer Tripp, Julian Timothy Dolby, Marco Pistoia, Pietro Ferrara
-
Patent number: 10445507Abstract: Techniques that facilitate automated security testing of one or more mobile applications and/or one or more backend servers for the one or more mobile applications are provided. In one example, a system includes an analysis component and a security component. The analysis component can analyze computer instructions of a mobile application. The analysis component can also determine an identifier pattern comprising an application programming interface for one or more server endpoints associated with the mobile application. The security component can perform a security test for a server device based on the identifier pattern for the one or more server endpoints.Type: GrantFiled: September 23, 2016Date of Patent: October 15, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Salman Abdul Baset, Julian Timothy Dolby, Marianna Rapoport, Philippe Suter
-
Patent number: 10423873Abstract: Information flow analysis is conducted on conversational flow specifications of conversational agents. The conversational flow specification prescribes operation of a conversational agent and includes actions to be taken, inputs triggering the actions and input confirmations executed after receipt of a given input and before triggering a given action. The actions, inputs and input confirmations define conversational flow paths through the conversational flow specification. Unconfirmed conversational flow paths through the conversational flow specification are identified and reported to the author of the conversational flow specification. Each unconfirmed conversational flow path only contains inputs and actions and no input confirmations.Type: GrantFiled: December 1, 2017Date of Patent: September 24, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Matthew Richard Arnold, Julian Timothy Dolby, Martin Hirzel
-
Publication number: 20190278942Abstract: Methods and systems are provided for configurable and non-invasive protection of private information in a user input to a software application that handles real-time information. A method includes detecting, by a filter in real-time, private information in the user input. The method further includes forming, by the filter, a filtered user input from the user input, by maintaining non-private information from the user input in the filtered user input, extracting and encrypting the private information in the user input and attaching the encrypted private information to the filtered user input, and replacing the private information in the user input with unique identifiers in the filtered user input. The unique identifiers are configured to be exploitable by the software application to achieve an intended function of the software application for the user. The method also includes transmitting, by a communications redirector, the filtered user input over a communication channel.Type: ApplicationFiled: March 7, 2018Publication date: September 12, 2019Inventors: Guillaume A. Baudart, Evelyn Duesterwald, Martin Hirzel, Avraham Ever Shinnar, Julian Timothy Dolby
-
Patent number: 10409711Abstract: A method and system of determining whether a specification is an accurate representation of an application program interface (API) is provided. The specification is received electronically over a network. Service calls to be tested are identified based on the specification. A test case is created for each of the identified service calls. A sequence is created for the test cases. A test plan is generated based on the created sequence. The generated test plan is executed. Upon identifying an error in response to the executed test plan, a notification is generated, indicating that the specification is not an accurate representation of the API.Type: GrantFiled: June 12, 2017Date of Patent: September 10, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julian Timothy Dolby, Jim Alain Laredo, Aleksander Slominski, John Erik Wittern, Annie T. Ying, Christopher Young, Yunhui Zheng
-
Publication number: 20190171925Abstract: Information flow analysis is conducted on conversational flow specifications of conversational agents. The conversational flow specification prescribes operation of a conversational agent and includes actions to be taken, inputs triggering the actions and input confirmations executed after receipt of a given input and before triggering a given action. The actions, inputs and input confirmations define conversational flow paths through the conversational flow specification. Unconfirmed conversational flow paths through the conversational flow specification are identified and reported to the author of the conversational flow specification. Each unconfirmed conversational flow path only contains inputs and actions and no input confirmations.Type: ApplicationFiled: December 1, 2017Publication date: June 6, 2019Inventors: Matthew Richard ARNOLD, Julian Timothy DOLBY, Martin HIRZEL
-
Publication number: 20180357154Abstract: A method and system of determining whether a specification is an accurate representation of an application program interface (API) is provided. The specification is received electronically over a network. Service calls to be tested are identified based on the specification. A test case is created for each of the identified service calls. A sequence is created for the test cases. A test plan is generated based on the created sequence. The generated test plan is executed. Upon identifying an error in response to the executed test plan, a notification is generated, indicating that the specification is not an accurate representation of the API.Type: ApplicationFiled: June 12, 2017Publication date: December 13, 2018Inventors: Julian Timothy Dolby, Jim Alain Laredo, Aleksander Slominski, John Erik Wittern, Annie T. Ying, Christopher Young, Yunhui Zheng
-
Publication number: 20180089437Abstract: Techniques that facilitate automated security testing of one or more mobile applications and/or one or more backend servers for the one or more mobile applications are provided. In one example, a system includes an analysis component and a security component. The analysis component can analyze computer instructions of a mobile application. The analysis component can also determine an identifier pattern comprising an application programming interface for one or more server endpoints associated with the mobile application. The security component can perform a security test for a server device based on the identifier pattern for the one or more server endpoints.Type: ApplicationFiled: September 23, 2016Publication date: March 29, 2018Inventors: Salman Abdul Baset, Julian Timothy Dolby, Marianna Rapoport, Philippe Suter
-
Patent number: 9858419Abstract: A static analysis for identification of permission-requirements on stack-inspection authorization systems is provided. The analysis employs functional modularity for improved scalability. To enhance precision, the analysis utilizes program slicing to detect the origin of each parameter passed to a security-sensitive function. Furthermore, since strings are essential when defining permissions, the analysis integrates a sophisticated string analysis that models string computations.Type: GrantFiled: September 22, 2013Date of Patent: January 2, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julian Timothy Dolby, Emmanuel Geay, Marco Pistoia, Barbara G. Ryder, Takaaki Tateishi
-
Patent number: 9535950Abstract: A semantic query over an RDF database is received with RDF database statistics and access methods for evaluating triple patterns in the query. The semantic query is expressed as a parse tree containing triple patterns and logical relationships among the triple patterns. The parse tree and access methods create a data flow graph containing a plurality of triple pattern and access method pair nodes connected by a plurality of edges, and an optimal flow tree through the data flow graph is determined such that costs are minimized and all triple patterns in the semantic query are contained in the optimal flow tree. A structure independent execution tree defining a sequence of evaluation through the optimal flow tree is created and is transformed into a database structure dependent query plan. This is used to create an SQL query that is used to evaluate the semantic query over the RDF database.Type: GrantFiled: January 27, 2016Date of Patent: January 3, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mihaela Ancuta Bornea, Julian Timothy Dolby, Anastasios Kementsietsidis, Kavitha Srinivas
-
Publication number: 20160203206Abstract: A system for storing graph data as a multi-dimensional cluster having a database with a graph dataset containing data and relationships between data pairs and a schema list of storage methods that use a table with columns and rows associated with data or relationships. An analyzer module to collect statistics of a graph dataset and a dimension identification module to identify a plurality of dimensions that each represent a column in the table. A schema creation and loading module creates a modified storage method and having a plurality of distinct table blocks and a plurality of table block indexes, one index for each table block and arranges the data and relationships in the given graph dataset in accordance with the modified storage method to create the multi-dimensional cluster.Type: ApplicationFiled: March 24, 2016Publication date: July 14, 2016Applicant: International Business Machines CorporationInventors: Mihaela Ancuta Bornea, Julian Timothy Dolby, Achille Belly Fokoue-Nkoutche, Anastasios Kementsietsidis, Kavitha Srinivas
-
Publication number: 20160203236Abstract: A system for identifying a schema for storing graph data includes a database containing a graph dataset of data and relationships between data pairs and a list of storage methods that each are a distinct structural arrangement of the data and relationships from the graph data set. An analyzer module collects statistics for the graph dataset, and a data classification module uses the collected statistics to calculate metrics describing the data and relationships in the graph dataset, uses the calculated metrics to group the data and relationships into a plurality of graph dataset subsets and associates each graph dataset subset with one of the plurality of storage methods. The resulting group of storage methods associated with the plurality of graph dataset subsets includes a unique storage method for each graph dataset subset. The data and relationships in each graph dataset subset are arranged in accordance with associated storage methods.Type: ApplicationFiled: March 23, 2016Publication date: July 14, 2016Applicant: International Business Machines CorporationInventors: Mihaela Ancuta Bornea, Julian Timothy Dolby, Achille Belly Fokoue-Nkoutche, Anastasios Kementsietsidis, Kavitha Srinivas
-
Publication number: 20160140172Abstract: A semantic query over an RDF database is received with RDF database statistics and access methods for evaluating triple patterns in the query. The semantic query is expressed as a parse tree containing triple patterns and logical relationships among the triple patterns. The parse tree and access methods create a data flow graph containing a plurality of triple pattern and access method pair nodes connected by a plurality of edges, and an optimal flow tree through the data flow graph is determined such that costs are minimized and all triple patterns in the semantic query are contained in the optimal flow tree. A structure independent execution tree defining a sequence of evaluation through the optimal flow tree is created and is transformed into a database structure dependent query plan. This is used to create an SQL query that is used to evaluate the semantic query over the RDF database.Type: ApplicationFiled: January 27, 2016Publication date: May 19, 2016Applicant: International Business Machines CorporationInventors: Mihaela Ancuta Bornea, Julian Timothy Dolby, Anastasios Kementsietsidis, Kavitha Srinivas
-
Patent number: 9323825Abstract: A system for storing graph data as a multi-dimensional cluster having a database with a graph dataset containing data and relationships between data pairs and a schema list of storage methods that use a table with columns and rows associated with data or relationships. An analyzer module to collect statistics of a graph dataset and a dimension identification module to identify a plurality of dimensions that each represent a column in the table. A schema creation and loading module creates a modified storage method and having a plurality of distinct table blocks and a plurality of table block indexes, one index for each table block and arranges the data and relationships in the given graph dataset in accordance with the modified storage method to create the multi-dimensional cluster.Type: GrantFiled: August 14, 2013Date of Patent: April 26, 2016Assignee: International Business Machines CorporationInventors: Mihaela Ancuta Bornea, Julian Timothy Dolby, Achille Belly Fokoue-Nkoutche, Anastasios Kementsietsidis, Kavitha Srinivas
-
Patent number: 9323864Abstract: A system for identifying a schema for storing graph data includes a database containing a graph dataset of data and relationships between data pairs and a list of storage methods that each are a distinct structural arrangement of the data and relationships from the graph data set. An analyzer module collects statistics for the graph dataset, and a data classification module uses the collected statistics to calculate metrics describing the data and relationships in the graph dataset, uses the calculated metrics to group the data and relationships into a plurality of graph dataset subsets and. associates each graph dataset subset with one of the plurality of storage methods. The resulting group of storage methods associated with the plurality of graph dataset subsets includes a unique storage method for each graph dataset subset. The data and relationships in each graph dataset subset are arranged in accordance with associated storage methods.Type: GrantFiled: August 14, 2013Date of Patent: April 26, 2016Assignee: International Business Machines CorporationInventors: Mihaela Ancuta Bornea, Julian Timothy Dolby, Achille Belly Fokoue-Nkoutche, Anastasios Kementsietsidis, Kavitha Srinivas
-
Patent number: 9280585Abstract: A semantic query over an RDF database is received with RDF database statistics and access methods for evaluating triple patterns in the query. The semantic query is expressed as a parse tree containing triple patterns and logical relationships among the triple patterns. The parse tree and access methods create a data flow graph containing a plurality of triple pattern and access method pair nodes connected by a plurality of edges, and an optimal flow tree through the data flow graph is determined such that costs are minimized and all triple patterns in the semantic query are contained in the optimal flow tree. A structure independent execution tree defining a sequence of evaluation through the optimal flow tree is created and is transformed into a database structure dependent query plan. This is used to create an SQL query that is used to evaluate the semantic query over the RDF database.Type: GrantFiled: April 7, 2015Date of Patent: March 8, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mihaela Ancuta Bornea, Julian Timothy Dolby, Anastasios Kementsietsidis, Kavitha Srinivas
-
Publication number: 20150213089Abstract: A semantic query over an RDF database is received with RDF database statistics and access methods for evaluating triple patterns in the query. The semantic query is expressed as a parse tree containing triple patterns and logical relationships among the triple patterns. The parse tree and access methods create a data flow graph containing a plurality of triple pattern and access method pair nodes connected by a plurality of edges, and an optimal flow tree through the data flow graph is determined such that costs are minimized and all triple patterns in the semantic query are contained in the optimal flow tree. A structure independent execution tree defining a sequence of evaluation through the optimal flow tree is created and is transformed into a database structure dependent query plan. This is used to create an SQL query that is used to evaluate the semantic query over the RDF database.Type: ApplicationFiled: April 7, 2015Publication date: July 30, 2015Inventors: Mihaela Ancuta Bornea, Julian Timothy Dolby, Anastasios Kementsietsidis, Kavitha Srinivas