Patents by Inventor Maria Hanna Oleszkiewicz

Maria Hanna Oleszkiewicz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11868310
    Abstract: Systems and methods for composite storage of data across tiers of a multi-tenant storage device are provided. In embodiments, a method includes determining attributes associated with each query in a set of queries; determining whether each of the attributes meet respective predetermined threshold values for a first storage tier, a second storage tier and a third storage tier based on statistical data generated for the attributes; updating storage rules for at least one of the first storage tier, the second storage tier and the third storage tier based on the determining; receiving data from the tenant for storage; dividing the data into at least a first portion and a second portion based on the storage rules; and storing the at least the first portion and the second portion on separate ones of the first storage tier, the second storage tier and the third storage tier based on the storage rules.
    Type: Grant
    Filed: February 25, 2020
    Date of Patent: January 9, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Daniel Jakub Ryszka, Blazej Rafal Rutkowski
  • Patent number: 11556827
    Abstract: A computer-implemented method for transferring data is provided. In an illustrative embodiment, the method includes retrieving, by a computer, an original dataset to be sent from a sender to a receiver. The method also includes generating, by the computer, a model based on at least a subset of the original dataset. The model generates a predicted dataset. The model is selected from a plurality of model types based on data complexity of the original dataset and a desired level of approximation of the predicted dataset to the original dataset. The method also includes transferring, by the computer, the model to the receiver. The receiver uses the model to generate the predicted dataset, wherein the predicted dataset matches the original dataset to a selected degree of approximation. Transfer of the model is quicker than transfer of the original dataset.
    Type: Grant
    Filed: May 15, 2020
    Date of Patent: January 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Daniel Jakub Ryszka, Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Blazej Rafal Rutkowski
  • Patent number: 11263346
    Abstract: A method for controlling exposure of sensitive data though a logging system is provided. The method comprises: upon receiving a request by the request handler, determining sensitive data as part of the request by applying a rule, converting the data into a transformed format, and registering the data together with a related data field label with a log handler. Then, upon receiving by the log handler a log entry, converting each expression of the log entry into the transformed format, and comparing each transformed expression with each of the sensitive data in the transformed format. Upon determining a match of one of the transformed expressions with one of the sensitive data in the transformed format, the method comprises issuing an alert indicating that the log entry comprises sensitive data.
    Type: Grant
    Filed: July 18, 2019
    Date of Patent: March 1, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Blazej Rafal Rutkowski, Daniel Jakub Ryszka
  • Publication number: 20210357795
    Abstract: A computer-implemented method for transferring data is provided. In an illustrative embodiment, the method includes retrieving, by a computer, an original dataset to be sent from a sender to a receiver. The method also includes generating, by the computer, a model based on at least a subset of the original dataset. The model generates a predicted dataset. The model is selected from a plurality of model types based on data complexity of the original dataset and a desired level of approximation of the predicted dataset to the original dataset. The method also includes transferring, by the computer, the model to the receiver. The receiver uses the model to generate the predicted dataset, wherein the predicted dataset matches the original dataset to a selected degree of approximation. Transfer of the model is quicker than transfer of the original dataset.
    Type: Application
    Filed: May 15, 2020
    Publication date: November 18, 2021
    Inventors: Daniel Jakub Ryszka, Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Blazej Rafal Rutkowski
  • Patent number: 11151285
    Abstract: A method for controlling exposure of sensitive data though a logging system is provided. The method comprises: upon receiving a request by the request handler, determining sensitive data as part of the request by applying a rule, converting the data into a transformed format, and registering the data together with a related data field label with a log handler. Then, upon receiving by the log handler a log entry, converting each expression of the log entry into the transformed format, and comparing each transformed expression with each of the sensitive data in the transformed format. Upon determining a match of one of the transformed expressions with one of the sensitive data in the transformed format, the method comprises issuing an alert indicating that the log entry comprises sensitive data.
    Type: Grant
    Filed: March 6, 2019
    Date of Patent: October 19, 2021
    Assignee: International Business Machines Corporation
    Inventors: Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Blazej Rafal Rutkowski, Daniel Jakub Ryszka
  • Publication number: 20210263887
    Abstract: Systems and methods for composite storage of data across tiers of a multi-tenant storage device are provided. In embodiments, a method includes determining attributes associated with each query in a set of queries; determining whether each of the attributes meet respective predetermined threshold values for a first storage tier, a second storage tier and a third storage tier based on statistical data generated for the attributes; updating storage rules for at least one of the first storage tier, the second storage tier and the third storage tier based on the determining; receiving data from the tenant for storage; dividing the data into at least a first portion and a second portion based on the storage rules; and storing the at least the first portion and the second portion on separate ones of the first storage tier, the second storage tier and the third storage tier based on the storage rules.
    Type: Application
    Filed: February 25, 2020
    Publication date: August 26, 2021
    Inventors: Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Daniel Jakub Ryszka, Blazej Rafal Rutkowski
  • Publication number: 20200285773
    Abstract: A method for controlling exposure of sensitive data though a logging system is provided. The method comprises: upon receiving a request by the request handler, determining sensitive data as part of the request by applying a rule, converting the data into a transformed format, and registering the data together with a related data field label with a log handler. Then, upon receiving by the log handler a log entry, converting each expression of the log entry into the transformed format, and comparing each transformed expression with each of the sensitive data in the transformed format. Upon determining a match of one of the transformed expressions with one of the sensitive data in the transformed format, the method comprises issuing an alert indicating that the log entry comprises sensitive data.
    Type: Application
    Filed: July 18, 2019
    Publication date: September 10, 2020
    Inventors: Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Blazej Rafal Rutkowski, Daniel Jakub Ryszka
  • Publication number: 20200285772
    Abstract: A method for controlling exposure of sensitive data though a logging system is provided. The method comprises: upon receiving a request by the request handler, determining sensitive data as part of the request by applying a rule, converting the data into a transformed format, and registering the data together with a related data field label with a log handler. Then, upon receiving by the log handler a log entry, converting each expression of the log entry into the transformed format, and comparing each transformed expression with each of the sensitive data in the transformed format. Upon determining a match of one of the transformed expressions with one of the sensitive data in the transformed format, the method comprises issuing an alert indicating that the log entry comprises sensitive data.
    Type: Application
    Filed: March 6, 2019
    Publication date: September 10, 2020
    Inventors: Bartlomiej Tomasz Malecki, Maria Hanna Oleszkiewicz, Blazej Rafal Rutkowski, Daniel Jakub Ryszka