Patents by Inventor Malgorzata Steinder

Malgorzata Steinder has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11875288
    Abstract: A compliance discovery and integration process is implemented in association with a cloud-based security and compliance platform and associated CI/CD framework. The process assumes an existing DevOps-based deployment of a product, such as an enterprise application that executes in a runtime production environment. The technique of this disclosure addresses the problem of misalignment between a compliance policy and the product's post-deployment regulation posture by providing tools and methods that enable pro-active augmentation of governance and compliance policy during the pre-deployment phase and with respect to a next deployment of the product (e.g., a next or updated version). Thus, when the product is later deployed in its next deployment, its regulation posture (post-deployment) is already consistent with the compliance policy.
    Type: Grant
    Filed: December 3, 2021
    Date of Patent: January 16, 2024
    Assignee: International Business Machines Corporation
    Inventors: Anca Sailer, Christopher John Butler, Arun Kumar, Malgorzata Steinder, James R. Doran, Philippe Mulet
  • Publication number: 20230177435
    Abstract: A method, apparatus and computer program product for automated security and regulatory compliance in association with an enterprise. A set of security and compliance controls that operate in association with the enterprise are provided. One or more compliance policies that are enforced by the set of security and compliance controls are encapsulated according to a common data format. One or more customer-specific security/compliance requirements associated with the enterprise are collected. Using microservices-based modular components, the customer-specific security/compliance requirements are then transformed into machine-readable representations having the common data format and that conform to the one or more compliance policies being enforced by the set of security and compliance controls. The one or more compliance policies including the one or more transformed security/compliance requirements are then activated to facilitate the security and regulatory compliance.
    Type: Application
    Filed: December 3, 2021
    Publication date: June 8, 2023
    Applicant: International Business Machines Corporation
    Inventors: Anca Sailer, Christopher John Butler, Arun Kumar, Malgorzata Steinder
  • Publication number: 20230177426
    Abstract: A compliance discovery and integration process is implemented in association with a cloud-based security and compliance platform and associated CI/CD framework. The process assumes an existing DevOps-based deployment of a product, such as an enterprise application that executes in a runtime production environment. The technique of this disclosure addresses the problem of misalignment between a compliance policy and the product’s post-deployment regulation posture by providing tools and methods that enable pro-active augmentation of governance and compliance policy during the pre-deployment phase and with respect to a next deployment of the product (e.g., a next or updated version). Thus, when the product is later deployed in its next deployment, its regulation posture (post-deployment) is already consistent with the compliance policy.
    Type: Application
    Filed: December 3, 2021
    Publication date: June 8, 2023
    Applicant: International Business Machines Corporation
    Inventors: Anca Sailer, Christopher John Butler, Arun Kumar, Malgorzata Steinder, James R. Doran, Philippe Mulet
  • Patent number: 11652631
    Abstract: Techniques regarding the use of digital identity tokens describing a computer application to obtain authorization to confidential data based on one or more policies are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a trusted platform module component that can generate a digital identity token that is bound to a computer application process. The computer executable components can also comprise a key authenticity component that can compare the digital identity token to a security key to retrieve a security credential.
    Type: Grant
    Filed: June 27, 2019
    Date of Patent: May 16, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mariusz Sabath, Jia Jun Brandon Lum, Malgorzata Steinder, Daniel Pittner
  • Patent number: 11501319
    Abstract: An approach is provided that receives multimedia content and extracts a set of metadata from the content. The extraction of metadata includes performing image analysis on the multimedia content. The approach then analyzes the set of metadata with the analysis resulting in a set of regulations that apply to the multimedia content. The approach compares the set of metadata to the set of regulations and allows publication of the multimedia content when the comparison reveals that the multimedia content is in compliance with the set of regulations, and inhibits publication of the multimedia content when the multimedia content fails to comply with the set of regulations.
    Type: Grant
    Filed: October 28, 2020
    Date of Patent: November 15, 2022
    Assignee: International Business Machines Corporation
    Inventors: Bo Yang, Anca Sailer, Priya A Ashok Nagpurkar, Malgorzata Steinder, Zhong Su
  • Patent number: 11409880
    Abstract: Techniques facilitating security hardening systems that host containers are provided. In one example, a system comprises: a memory that stores computer executable components; and a processor that executes computer executable components stored in the memory. The computer executable components comprise: a boot component performs a portion of a trusted boot sequence to securely boot the system to a defined secure state wherein one or more types of administrative access to a container memory are deactivated. The computer executable components also comprise: a core service component started as a part of the trusted boot sequence and that securely obtains one or more decryption keys for use with the container memory; and a runtime decryption component that uses the one or more decryption keys to perform runtime decryption of one or more files accessed by a container associated with the container memory.
    Type: Grant
    Filed: July 11, 2019
    Date of Patent: August 9, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hai Huang, Jia Jun Brandon Lum, Sahil Suneja, Ricardo Andrei Koller Jemio, Malgorzata Steinder
  • Publication number: 20220129913
    Abstract: An approach is provided that receives multimedia content and extracts a set of metadata from the content. The extraction of metadata includes performing image analysis on the multimedia content. The approach then analyzes the set of metadata with the analysis resulting in a set of regulations that apply to the multimedia content. The approach compares the set of metadata to the set of regulations and allows publication of the multimedia content when the comparison reveals that the multimedia content is in compliance with the set of regulations, and inhibits publication of the multimedia content when the multimedia content fails to comply with the set of regulations.
    Type: Application
    Filed: October 28, 2020
    Publication date: April 28, 2022
    Inventors: Bo Yang, Anca Sailer, Priya A Ashok Nagpurkar, Malgorzata Steinder, Zhong Su
  • Patent number: 10915369
    Abstract: Technology for selecting job characteristics to determine the similarity among jobs in terms of performance. Technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to successful performance of a requested new job by a cloud. Also, technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to failure when performing a requested new job by the cloud. When the new job request is accepted, because its characteristics of the new job matches job characteristics characterized by success and/or fails to match job characteristics characterized by failure, then the new job is said to lead to a “reward” or an “expected reward” because the new job will be rewarded by being allowed to use, by an admission controller of a cloud management system, use of cloud computing resources of the cloud.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: February 9, 2021
    Assignee: International Business Machines Corporation
    Inventors: Chen Wang, Ali Kanso, Stefania V. Costache, Alaa S. Youssef, Malgorzata Steinder
  • Patent number: 10897497
    Abstract: Aspects of the invention include selecting a node for an infrastructure update. The selected node is included in a cluster of nodes executing workloads that include containers. A future workload is prevented from being scheduled on the selected node. A workload currently executing on the selected node is migrated to another node included in the cluster of nodes. Infrastructure code on the selected node is updated, and in response to the updating, the ability to schedule a future workload on the selected node is enabled.
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: January 19, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mariusz Sabath, Jia Jun Brandon Lum, Alaa Youssef, Malgorzata Steinder, Asser Nasreldin Tantawi
  • Publication number: 20210012011
    Abstract: Techniques facilitating security hardening systems that host containers are provided. In one example, a system comprises: a memory that stores computer executable components; and a processor that executes computer executable components stored in the memory. The computer executable components comprise: a boot component performs a portion of a trusted boot sequence to securely boot the system to a defined secure state wherein one or more types of administrative access to a container memory are deactivated. The computer executable components also comprise: a core service component started as a part of the trusted boot sequence and that securely obtains one or more decryption keys for use with the container memory; and a runtime decryption component that uses the one or more decryption keys to perform runtime decryption of one or more files accessed by a container associated with the container memory.
    Type: Application
    Filed: July 11, 2019
    Publication date: January 14, 2021
    Inventors: Hai Huang, Jia Jun Brandon Lum, Sahil Suneja, Ricardo Andrei Koller Jemio, Malgorzata Steinder
  • Patent number: 10887246
    Abstract: Techniques and a system for adaptive data packing are provided. In one example, a system includes a container component and a computing node component. The container component monitors one or more resources for container data in a network environment and determines variability data representative of a variability of the one or more resources for the container data during a period of time. The computing node component that selects a computing node in the network environment for particular container data based on the variability data.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: January 5, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Asser Nasreldin Tantawi, Malgorzata Steinder
  • Publication number: 20200412540
    Abstract: Techniques regarding the use of digital identity tokens describing a computer application to obtain authorization to confidential data based on one or more policies are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a trusted platform module component that can generate a digital identity token that is bound to a computer application process. The computer executable components can also comprise a key authenticity component that can compare the digital identity token to a security key to retrieve a security credential.
    Type: Application
    Filed: June 27, 2019
    Publication date: December 31, 2020
    Inventors: Mariusz Sabath, Jia Jun Brandon Lum, Malgorzata Steinder, Daniel Pittner
  • Publication number: 20200244589
    Abstract: Techniques and a system for adaptive data packing are provided. In one example, a system includes a container component and a computing node component. The container component monitors one or more resources for container data in a network environment and determines variability data representative of a variability of the one or more resources for the container data during a period of time. The computing node component that selects a computing node in the network environment for particular container data based on the variability data.
    Type: Application
    Filed: January 30, 2019
    Publication date: July 30, 2020
    Inventors: Asser Nasreldin Tantawi, Malgorzata Steinder
  • Publication number: 20200174842
    Abstract: Technology for selecting job characteristics to determine the similarity among jobs in terms of performance. Technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to successful performance of a requested new job by a cloud. Also, technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to failure when performing a requested new job by the cloud. When the new job request is accepted, because its characteristics of the new job matches job characteristics characterized by success and/or fails to match job characteristics characterized by failure, then the new job is said to lead to a “reward” or an “expected reward” because the new job will be rewarded by being allowed to use, by an admission controller of a cloud management system, use of cloud computing resources of the cloud.
    Type: Application
    Filed: November 29, 2018
    Publication date: June 4, 2020
    Inventors: Chen Wang, Ali Kanso, Stefania V. Costache, Alaa S. Youssef, Malgorzata Steinder
  • Publication number: 20200153898
    Abstract: Aspects of the invention include selecting a node for an infrastructure update. The selected node is included in a cluster of nodes executing workloads that include containers. A future workload is prevented from being scheduled on the selected node. A workload currently executing on the selected node is migrated to another node included in the cluster of nodes. Infrastructure code on the selected node is updated, and in response to the updating, the ability to schedule a future workload on the selected node is enabled.
    Type: Application
    Filed: November 13, 2018
    Publication date: May 14, 2020
    Inventors: Mariusz Sabath, Jia Jun Brandon Lum, Alaa Youssef, Malgorzata Steinder, Asser Nasreldin Tantawi
  • Patent number: 10491538
    Abstract: Disclosed is a novel system and method for managing requests for an additional virtual machine. The method begins with operating at least one virtual machine accessing at least one computer resource associated with at least one physical machine within a computing cluster. One or more non-deterministic virtual machine requests for the computer resource are received. An over-utilization of the computer resource as a probability distribution function is modeled. In one example, the probability distribution function is a Beta distribution function to represent a one of a plurality of probability distribution functions. Next, an additional virtual machine on the physical machine associated with the computer resource is added in response to a probability of a utilization of the computer resource being greater than a probalistic bound on the over-utilization of the computer resource. Otherwise, the additional virtual machine is not added.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: November 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Yurdaer N. Doganata, Malgorzata Steinder, Asser N. Tantawi, Merve Unuvar
  • Patent number: 10326649
    Abstract: There are provided a method for operating a cloud computing infrastructure. In one embodiment, the method performs allocation domain modeling and provides a cloud scheduler framework that takes as input desired optimization objectives and the workload constraints and efficiently produces a placement solution that satisfies the constraints while optimizing the objectives in a way that adjusts itself depending on the objectives. As the objectives change, e.g., due to actions from system administrators or due to changes in business policies, the system optimizes itself accordingly and still produces efficient and optimized placement solutions. The method constructs an Allocation Domain (AD) that is a particular facet for allocating a logical entity to a physical entity. An AD is created using: variables, functional definitions (functions of variables), and a policy specification that includes a Boolean expression (of the functional definitions).
    Type: Grant
    Filed: July 17, 2015
    Date of Patent: June 18, 2019
    Assignee: International Business Machines Corporation
    Inventors: Malgorzata Steinder, Asser N. Tantawi
  • Patent number: 10225207
    Abstract: Placing an application on a private portion and a public portion of a hybrid computing environment for processing. An application may be received for placement and processing. A primary processing objective and a split preference of the application may be determined. The split preference indicates whether the application can be processed using one or both of the private portion and the public portion of the hybrid computing environment. The application may be placed on one or both of the private portion and the public portion of the hybrid computing environment for processing, based on the primary processing objective and based on the split preference.
    Type: Grant
    Filed: August 25, 2014
    Date of Patent: March 5, 2019
    Assignee: International Business Machines Corporation
    Inventors: Malgorzata Steinder, Merve Unuvar, Asser N. Tantawi
  • Patent number: 10146563
    Abstract: Using a metadata of a layer, a prediction factor including a level of participation of the layer in a set of container images is computed. Each container image includes a corresponding set of layers and is usable to configure a container in a container-based virtualized data processing environment. Using a set of levels of participation corresponding to a set of layers, and using a condition in a prediction algorithm, a subset of layers that have to be pre-provisioned at a node is predicted. The subset of layers is adjusted, to form an adjusted subset of layers, by looking ahead at a container requirement of a workload that is planned for processing at a future time. The adjusted subset of layers is caused to be provisioned on the node prior to the future time.
    Type: Grant
    Filed: August 3, 2016
    Date of Patent: December 4, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paolo Dettori, Andrew R. Low, Aaron J. Quirk, Seetharami R. Seelam, Michael J. Spreitzer, Malgorzata Steinder, Lin Sun
  • Publication number: 20180131631
    Abstract: Disclosed is a novel system and method for managing requests for an additional virtual machine. The method begins with operating at least one virtual machine accessing at least one computer resource associated with at least one physical machine within a computing cluster. One or more non-deterministic virtual machine requests for the computer resource are received. An over-utilization of the computer resource as a probability distribution function is modeled. In one example, the probability distribution function is a Beta distribution function to represent a one of a plurality of probability distribution functions. Next, an additional virtual machine on the physical machine associated with the computer resource is added in response to a probability of a utilization of the computer resource being greater than a probalistic bound on the over-utilization of the computer resource. Otherwise, the additional virtual machine is not added.
    Type: Application
    Filed: December 4, 2017
    Publication date: May 10, 2018
    Inventors: Yurdaer N. DOGANATA, Malgorzata STEINDER, Asser N. TANTAWI, Merve UNUVAR