Patents by Inventor Scott R. Trent

Scott R. Trent has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11195137
    Abstract: One embodiment provides model-driven and automated generation of information technology (IT) solutions including obtaining a set of business and technical requirements for IT infrastructure and applications. A client business and technical requirement model is generated based on generic model constructs and extending with constructs specific to capturing client requirements. A draft IT solution is generated using an automated model-driven process to generate the draft IT solution configuration for client requirements for a target shared resource environment offering. The generated draft IT solution is translated into a language of a constraint satisfaction engine that propagates values of chosen attributes in the draft solution to identify valid values for unset attributes, and identifies conflicts. An IT solutions interface is generated based on auto-population of verified attribute results.
    Type: Grant
    Filed: May 18, 2017
    Date of Patent: December 7, 2021
    Assignee: International Business Machines Corporation
    Inventors: Takayuki Kushida, Hamid R. Motahari Nezhad, Taiga Nakamura, Scott R. Trent, Peifeng Yin, Karen F. Yorav
  • Patent number: 10305936
    Abstract: A method and system are provided for performing a security inspection of a set of virtual images. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes applying a bisection method against a path in the tree from the root to a given one of the plurality of leaves having a given one of the virtual images in which a security violation has been identified to find a particular one of the virtual images that is a root cause of the security violation. The method also includes performing a corrective action for any of the plurality of images having the security violation.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: May 28, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Masayoshi Mizutani, Takahide Nogayama, Raymond H. P. Rudy, Scott R. Trent, Yuta Tsuboi, Yuji Watanabe
  • Publication number: 20180336503
    Abstract: One embodiment provides model-driven and automated generation of information technology (IT) solutions including obtaining a set of business and technical requirements for IT infrastructure and applications. A client business and technical requirement model is generated based on generic model constructs and extending with constructs specific to capturing client requirements. A draft IT solution is generated using an automated model-driven process to generate the draft IT solution configuration for client requirements for a target shared resource environment offering. The generated draft IT solution is translated into a language of a constraint satisfaction engine that propagates values of chosen attributes in the draft solution to identify valid values for unset attributes, and identifies conflicts. An IT solutions interface is generated based on auto-population of verified attribute results.
    Type: Application
    Filed: May 18, 2017
    Publication date: November 22, 2018
    Inventors: Takayuki Kushida, Hamid R. Motahari Nezhad, Taiga Nakamura, Scott R. Trent, Peifeng Yin, Karen F. Yorav
  • Publication number: 20180241780
    Abstract: A method and system are provided for performing a security inspection of a set of virtual images. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes applying a bisection method against a path in the tree from the root to a given one of the plurality of leaves having a given one of the virtual images in which a security violation has been identified to find a particular one of the virtual images that is a root cause of the security violation. The method also includes performing a corrective action for any of the plurality of images having the security violation.
    Type: Application
    Filed: April 23, 2018
    Publication date: August 23, 2018
    Inventors: Masayoshi Mizutani, Takahide Nogayama, Raymond H.P. Rudy, Scott R. Trent, Yuta Tsuboi, Yuji Watanabe
  • Patent number: 10003613
    Abstract: A method and system are provided for performing a security inspection of a set of virtual images in a cloud infrastructure. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes identifying a security violation in a given one of the virtual images at a given one of the plurality of leaves. The method also includes applying a bisection method against a path in the tree from the root to the given one of the plurality of leaves to find a particular one of the virtual images that is a root cause of the security violation. The method additionally includes performing a corrective action for any of the plurality of images having the security violation.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: June 19, 2018
    Assignee: International Business Machines Corporation
    Inventors: Masayoshi Mizutani, Takahide Nogayama, Raymond H. P. Rudy, Scott R. Trent, Yuta Tsuboi, Yuji Watanabe
  • Publication number: 20170180422
    Abstract: A method and system are provided for performing a security inspection of a set of virtual images in a cloud infrastructure. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes identifying a security violation in a given one of the virtual images at a given one of the plurality of leaves. The method also includes applying a bisection method against a path in the tree from the root to the given one of the plurality of leaves to find a particular one of the virtual images that is a root cause of the security violation. The method additionally includes performing a corrective action for any of the plurality of images having the security violation.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Inventors: Masayoshi Mizutani, Takahide Nogayama, Raymond H.P. Rudy, Scott R. Trent, Yuta Tsuboi, Yuji Watanabe