Patents by Inventor Sean C. Foley
Sean C. Foley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10671578Abstract: Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for providing classification job estimation for a data security platform comprising one or more data sources, the method comprising: for each of the one or more data sources: counting the number of databases; counting the number of tables in each database; selecting a random database; selecting a random table within the random database; retrieving a database data sample from the random table; measuring one or more latencies associated with issuing and retrieving the database data sample; measuring a processing time required to evaluate the database data sample against one or more policy rules; compiling one or more mean times for the latencies and processing times; and calculating a data source scan time using the one or more mean times and the number of tables in each database; and calculType: GrantFiled: December 15, 2016Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Sean C. Foley, Shuyan He
-
Patent number: 10397279Abstract: Data traffic is monitored on a network with data access elements thereof collected and compared to security rules. An audit data collection is sent to a repository responsive to data access elements matching a condition of the security rules, where security rules having the condition designate the audit data collection and repository. A tag to data traffic is applied responsive to the matching condition. Comparing of collected data access elements to the corresponding security rules having the matching condition is discontinued responsive to applying the tag. The tag indicates a repository and the data traffic includes a connection and session. An audit data collection is sent to the repository indicated by the tag for a data access responsive to the tag in the tagged data traffic. The method continues sending audit data for future data accesses in the tagged data traffic without comparing to the corresponding security rules again.Type: GrantFiled: December 20, 2017Date of Patent: August 27, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sean C. Foley, Ury Segal, Shidong Shan
-
Patent number: 10110637Abstract: Data traffic is monitored on a network with data access elements thereof collected and compared to security rules. An audit data collection is sent to a repository responsive to data access elements matching a condition of the security rules, where security rules having the condition designate the audit data collection and repository. A tag to data traffic is applied responsive to the matching condition. Comparing of collected data access elements to the corresponding security rules having the matching condition is discontinued responsive to applying the tag. The tag indicates a repository and the data traffic includes a connection and session. An audit data collection is sent to the repository indicated by the tag for a data access responsive to the tag in the tagged data traffic. The method continues sending audit data for future data accesses in the tagged data traffic without comparing to the corresponding security rules again.Type: GrantFiled: October 22, 2017Date of Patent: October 23, 2018Assignee: International Business Machines CorporationInventors: Sean C. Foley, Ury Segal, Shidong Shan
-
Publication number: 20180173735Abstract: Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for providing classification job estimation for a data security platform comprising one or more data sources, the method comprising: for each of the one or more data sources: counting the number of databases; counting the number of tables in each database; selecting a random database; selecting a random table within the random database; retrieving a database data sample from the random table; measuring one or more latencies associated with issuing and retrieving the database data sample; measuring a processing time required to evaluate the database data sample against one or more policy rules; compiling one or more mean times for the latencies and processing times; and calculating a data source scan time using the one or more mean times and the number of tables in each database; and calculType: ApplicationFiled: December 15, 2016Publication date: June 21, 2018Inventors: Sean C. Foley, Shuyan He
-
Publication number: 20180139243Abstract: Data traffic is monitored on a network with data access elements thereof collected and compared to security rules. An audit data collection is sent to a repository responsive to data access elements matching a condition of the security rules, where security rules having the condition designate the audit data collection and repository. A tag to data traffic is applied responsive to the matching condition. Comparing of collected data access elements to the corresponding security rules having the matching condition is discontinued responsive to applying the tag. The tag indicates a repository and the data traffic includes a connection and session. An audit data collection is sent to the repository indicated by the tag for a data access responsive to the tag in the tagged data traffic. The method continues sending audit data for future data accesses in the tagged data traffic without comparing to the corresponding security rules again.Type: ApplicationFiled: December 20, 2017Publication date: May 17, 2018Inventors: Sean C. Foley, Ury Segal, Shidong Shan
-
Patent number: 9973536Abstract: Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules. A first audit data collection is sent to a first repository in response to one or more data access elements of a first data access matching a first condition of one of the security rules. The one of the security rules having the first condition designates the first audit data collection and the first repository. A second audit data collection is sent to a second repository in response to one or more data access elements of a second data access matching a second condition of one of the security rules. The one of the security rules having the second condition designates the second audit data collection and the second repository.Type: GrantFiled: July 21, 2015Date of Patent: May 15, 2018Assignee: International Business Machines CorporationInventors: Sean C. Foley, Ury Segal, Shidong Shan
-
Publication number: 20180063196Abstract: Data traffic is monitored on a network with data access elements thereof collected and compared to security rules. An audit data collection is sent to a repository responsive to data access elements matching a condition of the security rules, where security rules having the condition designate the audit data collection and repository. A tag to data traffic is applied responsive to the matching condition. Comparing of collected data access elements to the corresponding security rules having the matching condition is discontinued responsive to applying the tag. The tag indicates a repository and the data traffic includes a connection and session. An audit data collection is sent to the repository indicated by the tag for a data access responsive to the tag in the tagged data traffic. The method continues sending audit data for future data accesses in the tagged data traffic without comparing to the corresponding security rules again.Type: ApplicationFiled: October 22, 2017Publication date: March 1, 2018Inventors: Sean C. Foley, Ury Segal, Shidong Shan
-
Patent number: 9785670Abstract: A method, system, and/or computer program product revises a policy that provides rules on how to alter statements to access or manipulate data in a database. A user interface (UI) has a field containing a sample database query statement. The sample database query statement is parsed into clauses, where each clause depicts a specific type of grammatical structure. A different hyperlink is associated with each of the clauses. In response to receiving a signal activating a particular hyperlink for a particular clause, change options, for the particular clause, are presented from a resource that presents change options for the specific type of grammatical structure. User-selected changes to the particular clause are incorporated into a new rule, which causes a clause of the particular type of grammatical structure in any database query statement to be changed. Each change becomes a new rule in a revised policy.Type: GrantFiled: March 2, 2015Date of Patent: October 10, 2017Assignee: International Business Machines CorporationInventors: Steven Buschman, Sean C. Foley, Minhui Yang
-
Patent number: 9785669Abstract: A method, system, and/or computer program product revises a policy that provides rules on how to alter statements to access or manipulate data in a database. A user interface (UI) has a field containing a sample database query statement. The sample database query statement is parsed into clauses, where each clause depicts a specific type of grammatical structure. A different hyperlink is associated with each of the clauses. In response to receiving a signal activating a particular hyperlink for a particular clause, change options, for the particular clause, are presented from a resource that presents change options for the specific type of grammatical structure. User-selected changes to the particular clause are incorporated into a new rule, which causes a clause of the particular type of grammatical structure in any database query statement to be changed. Each change becomes a new rule in a revised policy.Type: GrantFiled: May 21, 2014Date of Patent: October 10, 2017Assignee: International Business Machines CorporationInventors: Steven Buschman, Sean C. Foley, Minhui Yang
-
Patent number: 9721092Abstract: An application that runs in a process virtual machine is monitored by injecting listening code into a target class of the application. The listening code collects and forwards data to a monitoring agent. The target class is configured for monitoring according to alternative embodiments. In response to the process virtual machine providing notification of an event, such a loading the target class, the listening code may be injected into the target class. In another embodiment, the process virtual machine is configured to load a first mirror class containing a mirror entry point to the application. A mirror target class is loaded in response to a request to load the target class. The mirror target class contains a mirror entry point to the target class and the listening code. In another embodiment, listening code may be added to the target class before running the application.Type: GrantFiled: March 27, 2014Date of Patent: August 1, 2017Assignee: International Busines Machines CorporationInventor: Sean C. Foley
-
Patent number: 9710379Abstract: According to an aspect, a user interface is provided for assisting a user with identifying parameters for starting an application that utilizes real-time garbage collection (GC). The parameters include a fixed heap size and a GC central processing unit (CPU) utilization. Responsive to receiving a request from the user, the user is provided with options for profiling the application. The profiling includes executing the application. The options include targeting the GC CPU utilization to meet real-time requirements, targeting the heap size to meet the real-time requirements, and targeting a balance between the GC CPU utilization and the heap size to meet the real-time requirements. Responsive to detecting a selection of an option by the user, the application is profiled according to the option selected. The user is presented with results of the profiling via the user interface. The results include values for the parameters.Type: GrantFiled: February 27, 2015Date of Patent: July 18, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Sean C. Foley
-
Patent number: 9684786Abstract: An application that runs in a process virtual machine is monitored by injecting listening code into a target class of the application. The listening code collects and forwards data to a monitoring agent. The target class is configured for monitoring according to alternative embodiments. In response to the process virtual machine providing notification of an event, such a loading the target class, the listening code may be injected into the target class. In another embodiment, the process virtual machine is configured to load a first minor class containing a minor entry point to the application. A mirror target class is loaded in response to a request to load the target class. The minor target class contains a minor entry point to the target class and the listening code. In another embodiment, listening code may be added to the target class before running the application.Type: GrantFiled: September 2, 2014Date of Patent: June 20, 2017Assignee: International Business Machines CorporationInventor: Sean C. Foley
-
Publication number: 20160253103Abstract: According to an aspect, a user interface is provided for assisting a user with identifying parameters for starting an application that utilizes real-time garbage collection (GC). The parameters include a fixed heap size and a GC central processing unit (CPU) utilization. Responsive to receiving a request from the user, the user is provided with options for profiling the application. The profiling includes executing the application. The options include targeting the GC CPU utilization to meet real-time requirements, targeting the heap size to meet the real-time requirements, and targeting a balance between the GC CPU utilization and the heap size to meet the real-time requirements. Responsive to detecting a selection of an option by the user, the application is profiled according to the option selected. The user is presented with results of the profiling via the user interface. The results include values for the parameters.Type: ApplicationFiled: February 27, 2015Publication date: September 1, 2016Inventor: Sean C. Foley
-
Publication number: 20150339483Abstract: A method, system, and/or computer program product revises a policy that provides rules on how to alter statements to access or manipulate data in a database. A user interface (UI) has a field containing a sample database query statement. The sample database query statement is parsed into clauses, where each clause depicts a specific type of grammatical structure. A different hyperlink is associated with each of the clauses. In response to receiving a signal activating a particular hyperlink for a particular clause, change options, for the particular clause, are presented from a resource that presents change options for the specific type of grammatical structure. User-selected changes to the particular clause are incorporated into a new rule, which causes a clause of the particular type of grammatical structure in any database query statement to be changed. Each change becomes a new rule in a revised policy.Type: ApplicationFiled: May 21, 2014Publication date: November 26, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: STEVEN BUSCHMAN, SEAN C. FOLEY, MINHUI YANG
-
Publication number: 20150339306Abstract: A method, system, and/or computer program product revises a policy that provides rules on how to alter statements to access or manipulate data in a database. A user interface (UI) has a field containing a sample database query statement. The sample database query statement is parsed into clauses, where each clause depicts a specific type of grammatical structure. A different hyperlink is associated with each of the clauses. In response to receiving a signal activating a particular hyperlink for a particular clause, change options, for the particular clause, are presented from a resource that presents change options for the specific type of grammatical structure. User-selected changes to the particular clause are incorporated into a new rule, which causes a clause of the particular type of grammatical structure in any database query statement to be changed. Each change becomes a new rule in a revised policy.Type: ApplicationFiled: March 2, 2015Publication date: November 26, 2015Inventors: STEVEN BUSCHMAN, SEAN C. FOLEY, MINHUI YANG
-
Publication number: 20150326616Abstract: Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules. A first audit data collection is sent to a first repository in response to one or more data access elements of a first data access matching a first condition of one of the security rules. The one of the security rules having the first condition designates the first audit data collection and the first repository. A second audit data collection is sent to a second repository in response to one or more data access elements of a second data access matching a second condition of one of the security rules. The one of the security rules having the second condition designates the second audit data collection and the second repository.Type: ApplicationFiled: July 21, 2015Publication date: November 12, 2015Inventors: Sean C. Foley, Ury Segal, Shidong Shan
-
Publication number: 20150278511Abstract: An application that runs in a process virtual machine is monitored by injecting listening code into a target class of the application. The listening code collects and forwards data to a monitoring agent. The target class is configured for monitoring according to alternative embodiments. In response to the process virtual machine providing notification of an event, such a loading the target class, the listening code may be injected into the target class. In another embodiment, the process virtual machine is configured to load a first minor class containing a minor entry point to the application. A mirror target class is loaded in response to a request to load the target class. The minor target class contains a minor entry point to the target class and the listening code. In another embodiment, listening code may be added to the target class before running the application.Type: ApplicationFiled: September 2, 2014Publication date: October 1, 2015Inventor: Sean C. Foley
-
Publication number: 20150278515Abstract: An application that runs in a process virtual machine is monitored by injecting listening code into a target class of the application. The listening code collects and forwards data to a monitoring agent. The target class is configured for monitoring according to alternative embodiments. In response to the process virtual machine providing notification of an event, such a loading the target class, the listening code may be injected into the target class. In another embodiment, the process virtual machine is configured to load a first mirror class containing a mirror entry point to the application. A mirror target class is loaded in response to a request to load the target class. The mirror target class contains a mirror entry point to the target class and the listening code. In another embodiment, listening code may be added to the target class before running the application.Type: ApplicationFiled: March 27, 2014Publication date: October 1, 2015Applicant: International Business Machines CorporationInventor: Sean C. Foley
-
Patent number: 9124619Abstract: Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules providing sets of predefined data access elements for identifying predefined data accesses. First audit data collections for data accesses are sent to a first repository. For a data access that matches one of the rules, a second audit data collection defined by the matching rule is sent to at least a second repository designated by the matching rule.Type: GrantFiled: December 8, 2012Date of Patent: September 1, 2015Assignee: International Business Machines CorporationInventors: Sean C. Foley, Ury Segal, Shidong Shan
-
Patent number: 9106682Abstract: Data traffic is monitored on a network and data access elements thereof are collected. The collected data access elements are compared to security rules providing sets of predefined data access elements for identifying predefined data accesses. First audit data collections for data accesses are sent to a first repository. For a data access that matches one of the rules, a second audit data collection defined by the matching rule is sent to at least a second repository designated by the matching rule.Type: GrantFiled: July 8, 2013Date of Patent: August 11, 2015Assignee: International Business Machines CorporationInventors: Sean C. Foley, Ury Segal, Shidong Shan