Patents by Inventor Oriana J. Love
Oriana J. Love has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8918426Abstract: Mechanisms are provided for performing a role engineering project for applying security roles to access operations targeting resources. A plurality of data objects representing one or more user identities, permissions, and resources of an organization computing system are received. One or more filter criteria for filtering the plurality of data objects to generate a subset of data objects for consideration during the role engineering project are received. The one or more filter criteria specify a scope of the role engineering project. The one or more filter criteria are applied to generate the subset of data objects. Role engineering project operations are performed on the subset of data objects to generate one or more security roles. The one or more security roles are deployed to the organization computing system to control access operations targeting resources of the organization computing system.Type: GrantFiled: March 14, 2013Date of Patent: December 23, 2014Assignee: International Business Machines CorporationInventors: Luis B. Casco-Arias Sanchez, Todd D. Jordan, David G. Kuehr-McLaren, Oriana J. Love, David W. Palmieri, Chrystian L. Plachco, Magesh Rajamani, Jeffrey T. Robke
-
Patent number: 8918425Abstract: Mechanisms are provided for performing a role engineering project for applying security roles to access operations targeting resources. A plurality of data objects representing one or more user identities, permissions, and resources of an organization computing system are received. One or more filter criteria for filtering the plurality of data objects to generate a subset of data objects for consideration during the role engineering project are received. The one or more filter criteria specify a scope of the role engineering project. The one or more filter criteria are applied to generate the subset of data objects. Role engineering project operations are performed on the subset of data objects to generate one or more security roles. The one or more security roles are deployed to the organization computing system to control access operations targeting resources of the organization computing system.Type: GrantFiled: October 21, 2011Date of Patent: December 23, 2014Assignee: International Business Machines CorporationInventors: Luis B. Casco-Arias Sanchez, Todd D. Jordan, David G. Kuehr-McLaren, Oriana J. Love, David W. Palmieri, Chrystian L. Plachco, Magesh Rajamani, Jeffrey T. Robke
-
Patent number: 8892739Abstract: Techniques are described for suggesting aliases for a resource within a computing environment based on user-provided aliases for the resource. Embodiments determine a plurality of user-provided aliases for the resource and generate a suggested alias for the resource based on the plurality of user-provided aliases. The suggested resource may be provided to a user of the computing environment. The suggested alias is then associated with the resource, such that the user may refer to the resource using the suggested alias for the resource.Type: GrantFiled: May 26, 2011Date of Patent: November 18, 2014Assignee: International Business Machines CorporationInventors: Denise A. Bell, Pamela F. Geiger, Oriana J. Love, Irgelkha Mejia
-
Patent number: 8788449Abstract: Boolean graphs and complex non-intuitive editors for authoring complex nested Boolean expressions can result in erroneous evaluation results by relying exclusively on the ability of an author of the Boolean expression to accurately incorporate operands into the Boolean expression to achieve the desired result. Functionality for analyzing the effect of operator changes can be incorporated into an intuitive graphical user interface for authoring the Boolean expression. The impact of the operator changes can be determined based on a position of the operator in the Boolean expression. Multiple evaluation orders for evaluating the operators and their associated operands can also be identified and presented to the programmer to resolve ambiguities, that may arise while evaluating the Boolean expression. The organization of the Boolean expression can be graphically depicted to reflect an evaluation order of the operators and their associated operands that comprise the Boolean expression.Type: GrantFiled: December 31, 2009Date of Patent: July 22, 2014Assignee: International Business Machines CorporationInventors: Oriana J. Love, Irgelkha Mejia, Borna Safabakhsh, Anderson E. Wolfe
-
Publication number: 20130104046Abstract: Mechanisms are provided for performing a role engineering project for applying security roles to access operations targeting resources. A plurality of data objects representing one or more user identities, permissions, and resources of an organization computing system are received. One or more filter criteria for filtering the plurality of data objects to generate a subset of data objects for consideration during the role engineering project are received. The one or more filter criteria specify a scope of the role engineering project. The one or more filter criteria are applied to generate the subset of data objects. Role engineering project operations are performed on the subset of data objects to generate one or more security roles. The one or more security roles are deployed to the organization computing system to control access operations targeting resources of the organization computing system.Type: ApplicationFiled: October 21, 2011Publication date: April 25, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Luis B. Casco-Arias Sanchez, Todd D. Jordan, David G. Kuehr-McLaren, Oriana J. Love, David W. Palmieri, Chrystian L. Plachco, Magesh Rajamani, Jeffrey T. Robke
-
Publication number: 20120303813Abstract: Techniques are described for suggesting aliases for a resource within a computing environment based on user-provided aliases for the resource. Embodiments determine a plurality of user-provided aliases for the resource and generate a suggested alias for the resource based on the plurality of user-provided aliases. The suggested resource may be provided to a user of the computing environment. The suggested alias is then associated with the resource, such that the user may refer to the resource using the suggested alias for the resource.Type: ApplicationFiled: May 26, 2011Publication date: November 29, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Denise A. Bell, Pamela F. Geiger, Oriana J. Love, Irgelkha Mejia
-
Publication number: 20120136866Abstract: A method, system and computer program product for assisting users to interact appropriately in social networking groups. Content posts in a social networking group are scanned and parsed in order to identify the events that led to these content posts. Each event is categorized and assigned a level of importance based on various factors, such as age, the number of comments and the environmental factors. These categorized events are grouped based on importance. A baseline of normal social acceptable behavior for the social networking group is established based on these grouped categorizations. Once a baseline of normal social acceptable behavior for the social networking group has been established, the user's content posts are analyzed in light of this baseline so that the user may be informed of potential faux pas in the social networking group and provided assistance to conform to the norm of that social networking group.Type: ApplicationFiled: November 30, 2010Publication date: May 31, 2012Applicant: International Business Machines CorporationInventors: Bernadette A. Carter, Al Chakra, Oriana J. Love
-
Publication number: 20120005566Abstract: A computer implemented method provides dynamically altered versions of a comprehension marker for a social network text entry. A computer presents a comprehension marker for a text entry in a social network. The comprehension marker provides additional information to explain the text entry. Dynamically altered versions of the comprehension marker from other readers are then received and presented.Type: ApplicationFiled: June 30, 2010Publication date: January 5, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: BERNADETTE A. CARTER, AL CHAKRA, ORIANA J. LOVE
-
Publication number: 20110277012Abstract: The different illustrative embodiments provide a method, data processing system, and computer program product for managing access to resources. A number of access permissions of a first user to a number of resources in a computer system are provided to a second user in response to a presentation of first credentials for the first user to the computer system. A level of presence of the first user relative to the computer system and/or the second user is monitored. The number of access permissions of the first user to the number of resources in the computer system continues to be provided to the second user as long as a preselected level of presence of the first user is present.Type: ApplicationFiled: May 7, 2010Publication date: November 10, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bernadette A. Carter, Al Chakra, Christopher A. Hambridge, Oriana J. Love
-
Publication number: 20110161272Abstract: Boolean graphs and complex non-intuitive editors for authoring complex nested Boolean expressions can result in erroneous evaluation results by relying exclusively on the ability of an author of the Boolean expression to accurately incorporate operands into the Boolean expression to achieve the desired result. Functionality for analyzing the effect of operator changes can be incorporated into an intuitive graphical user interface for authoring the Boolean expression. The impact of the operator changes can be determined based on a position of the operator in the Boolean expression. Multiple evaluation orders for evaluating the operators and their associated operands can also be identified and presented to the programmer to resolve ambiguities, that may arise while evaluating the Boolean expression. The organization of the Boolean expression can be graphically depicted to reflect an evaluation order of the operators and their associated operands that comprise the Boolean expression.Type: ApplicationFiled: December 31, 2009Publication date: June 30, 2011Applicant: International Business Machines CorporationInventors: Oriana J. Love, Irgelkha Mejia, Borna Safabakhsh, Anderson E. Wolfe