Patents by Inventor Lloyd Wellington Mascarenhas

Lloyd Wellington Mascarenhas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240086525
    Abstract: One embodiment of the invention provides a method comprising identifying a tenant compromised by a security breach in a multi-tenant cloud environment including at least one virtual machine (VM), and storing at least one snapshot of the at least one VM. The method further comprises automatically performing containment of the security breach by mitigating the tenant compromised by the security breach. The method further comprises automatically performing remediation of at least one salvageable image in the environment by migrating one or more other tenants not yet compromised by the security breach in the environment to a sandbox, verifying the one or more other tenants are not compromised by the security breach by testing the one or more other tenants in the sandbox for a probationary period, and migrating the one or more other tenants to a new cloud container in production environment in response to the verifying.
    Type: Application
    Filed: September 12, 2022
    Publication date: March 14, 2024
    Inventors: Arielle Tovah Orazio, Lloyd Wellington Mascarenhas, Matthias Seul
  • Publication number: 20240037226
    Abstract: Described are techniques for multi-tenant security. The techniques include detecting malicious activity on a compromised application in a multi-tenant host. The techniques further include automatically performing a live migration of each tenant of the multi-tenant host to a respective single-tenant host. The techniques further include mitigating the malicious activity on the compromised application that is migrated to a single-tenant host, and automatically performing another live migration of each benign tenant to a new multi-tenant host.
    Type: Application
    Filed: July 27, 2022
    Publication date: February 1, 2024
    Inventors: TYLER LISOWSKI, Spencer Thomas Reynolds, Francisco Javier Rodriguez, Kodie Glosser, DENNIS WARNE, Lloyd Wellington Mascarenhas, Matthias Seul
  • Patent number: 11880482
    Abstract: A computer system controls access to data. A secure container that is based on an image file is instantiated at an endpoint device of a user, wherein the secure container includes encrypted data corresponding to the user. An access request to the secure container is authenticated by verifying credentials of the user. In response to verifying the credentials of the user, access to the data is granted. Access to the data is controlled by decrypting and enabling access to a portion of the data, wherein additional portions of the data are decrypted and made accessible based on user behavior.
    Type: Grant
    Filed: December 10, 2020
    Date of Patent: January 23, 2024
    Assignee: International Business Machines Corporation
    Inventors: Arielle Tovah Orazio, Matthias Seul, Christopher Pepin, Lloyd Wellington Mascarenhas
  • Publication number: 20230156016
    Abstract: A computer-implemented method, system and computer program product for protecting against application programming interface (API) attacks. A connection is established between an API user and an API provider. The established connection is then monitored to assess connection security and trustworthiness of the connection as well as trustworthiness of the API user and/or API provider. A score is then generated for each factor used in assessing the connection security and trustworthiness of the connection as well as the trustworthiness of the API user and/or API provider based on the monitoring. A level of risk for an API attack with respect to the API user and/or API provider is then generated based on such scores. An action (e.g., blocking traffic) is then performed with respect to the API user and/or API provider based on the level of risk for an API attack with respect to the API user and/or API provider, respectively.
    Type: Application
    Filed: November 15, 2021
    Publication date: May 18, 2023
    Inventors: Lloyd Wellington Mascarenhas, Matthias Seul, Arielle Tovah Orazio
  • Patent number: 11588847
    Abstract: A processor may detect a risk on a local machine. The processor may determine that the risk warrants a heightened-level remediation. The processor may connect the local machine to a cloud-based desktop environment. The processor may perform the heightened-level remediation on the local machine. The processor may merge data from the cloud-based desktop environment to the local machine in response to the heightened-level remediation being performed.
    Type: Grant
    Filed: December 15, 2020
    Date of Patent: February 21, 2023
    Assignee: International Business Machines Corporation
    Inventors: Lloyd Wellington Mascarenhas, Arielle Tovah Orazio, Christopher Pepin, Matthias Seul
  • Publication number: 20230035918
    Abstract: Approaches presented herein enable detecting and assessing evidence of malware intrusion. More specifically, scans of a system are performed, where the scans detect evidence of malware intrusion, and each of the scans generates a respective result. A severity score is assigned to each respective result of the scans, and an assessment score for the system is computed based on the severity score assigned to each respective result of the scans.
    Type: Application
    Filed: July 27, 2021
    Publication date: February 2, 2023
    Inventors: Arielle Tovah Orazio, Matthias Seul, Lloyd Wellington Mascarenhas, Christopher Pepin
  • Publication number: 20220191238
    Abstract: A processor may detect a risk on a local machine. The processor may determine that the risk warrants a heightened-level remediation. The processor may connect the local machine to a cloud-based desktop environment. The processor may perform the heightened-level remediation on the local machine. The processor may merge data from the cloud-based desktop environment to the local machine in response to the heightened-level remediation being performed.
    Type: Application
    Filed: December 15, 2020
    Publication date: June 16, 2022
    Inventors: Lloyd Wellington Mascarenhas, Arielle Tovah Orazio, Christopher Pepin, Matthias Seul
  • Publication number: 20220188445
    Abstract: A computer system controls access to data. A secure container that is based on an image file is instantiated at an endpoint device of a user, wherein the secure container includes encrypted data corresponding to the user. An access request to the secure container is authenticated by verifying credentials of the user. In response to verifying the credentials of the user, access to the data is granted. Access to the data is controlled by decrypting and enabling access to a portion of the data, wherein additional portions of the data are decrypted and made accessible based on user behavior.
    Type: Application
    Filed: December 10, 2020
    Publication date: June 16, 2022
    Inventors: Arielle Tovah Orazio, Matthias Seul, Christopher Pepin, Lloyd Wellington Mascarenhas