Patents by Inventor Liviu Rodean
Liviu Rodean has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11829811Abstract: A computer program product configured to execute a method for exchanging electronic data. The method includes receiving, using an API, a request to transmit data from a source trading partner to a destination trading partner; querying a name server, using a domain name system protocol, the name server comprising a subdomain of the destination trading partner to send the data to, wherein the subdomain is mapped to a destination access point, wherein a name of the subdomain conforms to a common format, wherein an address of the subdomain conforms to another common format; determining the address of the subdomain based on the querying of the name server; addressing the data, using another API, to be sent to the address of the subdomain; and transmitting the data, using the another API, to the destination access point by virtue of the subdomain's mapping to the destination access point.Type: GrantFiled: September 17, 2021Date of Patent: November 28, 2023Assignees: INTERNATIONAL BUSINESS MACHINES CORPORATION, YOUREDI LTD.Inventors: Marshall Allen Lamb, Liviu Rodean, Sami Petteri Tähtinen, Mats Bernhard von Weissenberg
-
Publication number: 20230089128Abstract: A computer program product configured to execute a method for exchanging electronic data. The method includes receiving, using an API, a request to transmit data from a source trading partner to a destination trading partner; querying a name server, using a domain name system protocol, the name server comprising a subdomain of the destination trading partner to send the data to, wherein the subdomain is mapped to a destination access point, wherein a name of the subdomain conforms to a common format, wherein an address of the subdomain conforms to another common format; determining the address of the subdomain based on the querying of the name server; addressing the data, using another API, to be sent to the address of the subdomain; and transmitting the data, using the another API, to the destination access point by virtue of the subdomain's mapping to the destination access point.Type: ApplicationFiled: September 17, 2021Publication date: March 23, 2023Inventors: Marshall Allen Lamb, Liviu Rodean, Sami Petteri Tähtinen, Mats Bernhard von Weissenberg
-
Patent number: 11157338Abstract: Provided are techniques for throttling using message partitioning and buffering. A plurality of messages are stored in an input topics buffer, where the input topics buffer is stored in a plurality of partitions, and where each of the partitions of the plurality of partitions is associated with a tenant subgroup of a plurality of tenant subgroups of a tenant. A message of the plurality of messages from the tenant subgroup of the tenant is selected. A throttle count for the tenant subgroup is retrieved. A maximum message threshold for the tenant is retrieved. In response to determining that the throttle count is less than the maximum message threshold, the message is moved from the input topics buffer to a work topics buffer. In response to determining that the throttle count is equal to or greater than the maximum message threshold, throttling the tenant subgroup.Type: GrantFiled: October 30, 2019Date of Patent: October 26, 2021Assignee: International Business Machines CorporationInventors: Liviu Rodean, Tyler Wilgenbusch, Charles Patton Giles, Vincent Tkac
-
Patent number: 11138308Abstract: A method, system and computer-usable medium for preventing a single point of failure in accessing encrypted data. In certain embodiments passwords of multiple system administrators are encrypted with a master key to generate encrypted master keys respectively associated with each system administrator. In certain embodiments, the passwords of the multiple system administrators are also one-way hashed to generate multiple one-way hashed passwords respectively associated with each system administrator. In certain embodiments, the user identifiers and plain text passwords may be used to decrypt the master key based on the encrypted master keys and one-way hashed passwords.Type: GrantFiled: September 19, 2018Date of Patent: October 5, 2021Assignee: International Business Machines CorporationInventors: Jagadeesh Sreeram, Akhil Sivanantha, Liviu Rodean
-
Publication number: 20210133008Abstract: Provided are techniques for throttling using message partitioning and buffering. A plurality of messages are stored in an input topics buffer, where the input topics buffer is stored in a plurality of partitions, and where each of the partitions of the plurality of partitions is associated with a tenant subgroup of a plurality of tenant subgroups of a tenant. A message of the plurality of messages from the tenant subgroup of the tenant is selected. A throttle count for the tenant subgroup is retrieved. A maximum message threshold for the tenant is retrieved. In response to determining that the throttle count is less than the maximum message threshold, the message is moved from the input topics buffer to a work topics buffer. In response to determining that the throttle count is equal to or greater than the maximum message threshold, throttling the tenant subgroup.Type: ApplicationFiled: October 30, 2019Publication date: May 6, 2021Inventors: Liviu Rodean, Tyler Wilgenbusch, Charles Patton Giles, Vincent Tkac
-
Patent number: 10726163Abstract: An electrical signal indicative of an intrusion is detected at an application executing in a cryptographic data processing system. In response to the detection, an instruction is constructed in the application for the cryptographic data processing system. Using a processor, the instruction causes a cryptographic data item to be removed from a portion of a memory device installed in the cryptographic system.Type: GrantFiled: November 17, 2016Date of Patent: July 28, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Justin L. Harrison, Liviu Rodean
-
Patent number: 10629189Abstract: Arrangements relate to automatically taking notes in a virtual meeting. The virtual meeting has meeting content that includes a plurality of meeting content streams. One or more of the meeting content streams is in a non-text format. The one or more meeting content streams in a non-text format can be converted into text. As a result, the plurality of meeting content streams is in text format. The text of the plurality of meeting content streams can be analyzed to identify a key element within the text. Consolidated system notes that include the key element can be generated.Type: GrantFiled: March 17, 2014Date of Patent: April 21, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edwin W. Peters, Sherry L. Platek, Nitty T. Pulikan, Balaji Ranganathan, Liviu Rodean, Balasubramanian Sivasubramanian, Eric Woods
-
Patent number: 10629188Abstract: Arrangements relate to automatically taking notes in a virtual meeting. The virtual meeting has meeting content that includes a plurality of meeting content streams. One or more of the meeting content streams is in a non-text format. The one or more meeting content streams in a non-text format can be converted into text. As a result, the plurality of meeting content streams is in text format. The text of the plurality of meeting content streams can be analyzed to identify a key element within the text. Consolidated system notes that include the key element can be generated.Type: GrantFiled: March 15, 2013Date of Patent: April 21, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edwin W. Peters, Sherry L. Platek, Nitty T. Pulikan, Balaji Ranganathan, Liviu Rodean, Balasubramanian Sivasubramanian, Eric Woods
-
Publication number: 20200089868Abstract: A method, system and computer-usable medium for preventing a single point of failure in accessing encrypted data. In certain embodiments passwords of multiple system administrators are encrypted with a master key to generate encrypted master keys respectively associated with each system administrator. In certain embodiments, the passwords of the multiple system administrators are also one-way hashed to generate multiple one-way hashed passwords respectively associated with each system administrator. In certain embodiments, the user identifiers and plain text passwords may be used to decrypt the master key based on the encrypted master keys and one-way hashed passwords.Type: ApplicationFiled: September 19, 2018Publication date: March 19, 2020Inventors: Jagadeesh Sreeram, Akhil Sivanantha, Liviu Rodean
-
Publication number: 20180139037Abstract: An electrical signal indicative of an intrusion is detected at an application executing in a cryptographic data processing system. In response to the detection, an instruction is constructed in the application for the cryptographic data processing system. Using a processor, the instruction causes a cryptographic data item to be removed from a portion of a memory device installed in the cryptographic system.Type: ApplicationFiled: November 17, 2016Publication date: May 17, 2018Applicant: International Business Machines CorporationInventors: Justin L. Harrison, Liviu Rodean
-
Patent number: 9444790Abstract: A method and system providing remote access for threat removal to a computer system. A remote virtual private network (VPN) connection is established to an application on a remote computer utilizing a plug and play communications device having a trusted embedded component. The plug and play communications device is connectable to a first computer. Access is allowed to the first computer by the application on the remote computer using the VPN to perform threat removal operations on the first computer.Type: GrantFiled: December 17, 2014Date of Patent: September 13, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Justin L. Harrison, Dustin M. Mann, Liviu Rodean
-
Publication number: 20160182455Abstract: A method and system providing remote access for threat removal to a computer system. A remote virtual private network (VPN) connection is established to an application on a remote computer utilizing a plug and play communications device having a trusted embedded component. The plug and play communications device is connectable to a first computer. Access is allowed to the first computer by the application on the remote computer using the VPN to perform threat removal operations on the first computer.Type: ApplicationFiled: December 17, 2014Publication date: June 23, 2016Inventors: Justin L. Harrison, Dustin M. Mann, Liviu Rodean
-
Publication number: 20150066935Abstract: Arrangements relate to crowdsourcing and consolidating user notes taken within a virtual meeting. Notes from one or more meeting attendees can be received. The received user notes can be analyzed to identify a key element therein using natural language processing. The analysis of received user notes can be performed by a processor. A consolidated system notes can be generated. The consolidated system notes can include the key element.Type: ApplicationFiled: October 24, 2014Publication date: March 5, 2015Inventors: Edwin W. Peters, Sherry L. Platek, Nitty T. Pulikan, Balaji Ranganathan, Liviu Rodean, Balasubramanian Sivasubramanian, Eric Woods
-
Publication number: 20140278405Abstract: Arrangements relate to automatically taking notes in a virtual meeting. The virtual meeting has meeting content that includes a plurality of meeting content streams. One or more of the meeting content streams is in a non-text format. The one or more meeting content streams in a non-text format can be converted into text. As a result, the plurality of meeting content streams is in text format. The text of the plurality of meeting content streams can be analyzed to identify a key element within the text. Consolidated system notes that include the key element can be generated.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edwin W. Peters, Sherry L. Platek, Nitty T. Pulikan, Balaji Ranganathan, Liviu Rodean, Balasubramanian Sivasubramanian, Eric Woods
-
Publication number: 20140278377Abstract: Arrangements relate to automatically taking notes in a virtual meeting. The virtual meeting has meeting content that includes a plurality of meeting content streams. One or more of the meeting content streams is in a non-text format. The one or more meeting content streams in a non-text format can be converted into text. As a result, the plurality of meeting content streams is in text format. The text of the plurality of meeting content streams can be analyzed to identify a key element within the text. Consolidated system notes that include the key element can be generated.Type: ApplicationFiled: March 17, 2014Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Edwin W. Peters, Sherry L. Platek, Nitty T. Pulikan, Balaji Ranganathan, Liviu Rodean, Balasubramanian Sivasubramanian, Eric Woods