Patents by Inventor Shripad Nadgowda
Shripad Nadgowda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11157474Abstract: Techniques facilitating representing and analyzing cloud computing data as pseudo systems are provided. A system comprises a memory that stores, and a processor that executes, computer executable components. The computer executable components comprise a framework component and a generation component. The framework component can recreate a system state of a computing device as a pseudo system state for the computing device. The pseudo system state can be decoupled from an original operating state of the computing device and can comprise data abstracted from the original operating state. The data abstracted can mimic an operation of the computing device. The generation component can create the pseudo system state and can facilitate black-box execution of software over the pseudo system state. The black-box execution of software can comprise running applications in the pseudo system state as if the applications were executing in the original operating state of the computing device.Type: GrantFiled: August 22, 2019Date of Patent: October 26, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mustafa Bal, Canturk Isci, Shripad Nadgowda
-
Patent number: 11151024Abstract: An artificial intelligence (AI) platform to support a continuous integration and deployment pipeline for software development and operations (DevOps). One or more running processes are subject to monitoring to identify presence of vulnerabilities. An automated rebuild of the monitored processes is initiated, which includes constructing a map representing a relationship of test code elements corresponding to different portions of source code. The identified vulnerable source code reflected in a new container image is subject to an automatic verification to ascertain if the source code is covered by at least one of the represented test code elements. A risk assessment is employed as part of the verification. A new container image is selectively deployed responsive to the risk assessment.Type: GrantFiled: August 9, 2019Date of Patent: October 19, 2021Assignee: International Business Machines CorporationInventors: Jinho Hwang, Shripad Nadgowda, Hai Huang, Orna Raz
-
Patent number: 11144289Abstract: An artificial intelligence (AI) platform to support a continuous integration and deployment (CI/CD) pipeline for software development and operations (DevOps). One or more dependency graphs are generated based on application artifacts. A machine learning (ML) model is leveraged to capture a relationship between components in the dependency graph(s) and one or more pipeline artifacts. Responsive a change of an application artifact, the captured relationship is leveraged to identify an impact of the detected change on the pipeline artifact(s). The CI/CD pipeline is selectively optimized and executed based on the identified impact to improve the efficiency of the pipeline and the deployment time.Type: GrantFiled: May 19, 2020Date of Patent: October 12, 2021Assignee: International Business Machines CorporationInventors: Jinho Hwang, Muhammed Fatih Bulut, Ali Kanso, Shripad Nadgowda
-
Publication number: 20210304063Abstract: Embodiments relate to a computer system, computer program product, and computer-implemented method to train a machine learning (ML) model using artificial intelligence to learn an association between (regulatory) compliance requirements and features of micro-service training datasets. The trained ML model is leveraged to determine the compliance requirements of a micro-service requiring classification. In an exemplary embodiment, once the micro-service has been classified with respect to applicable compliance requirements, the classified micro-service may be used as an additional micro-service training dataset to further train the ML model and thereby improve its performance.Type: ApplicationFiled: March 30, 2020Publication date: September 30, 2021Applicant: International Business Machines CorporationInventors: Muhammed Fatih Bulut, Jinho Hwang, Ali Kanso, Shripad Nadgowda
-
Patent number: 11100233Abstract: Embodiments relate to an intelligent computer platform to for optimizing operating system vulnerability analysis. A build manifest is parsed and actions associated with operating system packages that contribute to an image build are identified. The identified actions are executed and a minimum build image is created. The minimum image build is scanned and evaluated to identify one or more vulnerabilities present in the minimum image build. Remedial measures are identified and applied to the identified vulnerabilities. The build manifest is executed with the applied remedial measures.Type: GrantFiled: June 26, 2019Date of Patent: August 24, 2021Assignee: International Business Machines CorporationInventor: Shripad Nadgowda
-
Publication number: 20210248228Abstract: Techniques regarding managing one or more software application build processes are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a control component that can execute a freeze algorithm that modifies an incorporation of a software artifact within a software application build set. The freeze algorithm can prevent implementation of a change to the software artifact by a version control program.Type: ApplicationFiled: February 11, 2020Publication date: August 12, 2021Inventors: Shripad Nadgowda, James Doran
-
Patent number: 11074055Abstract: Systems, computer-implemented methods, and computer program products that facilitate identifying computer software vulnerabilities, and more specifically, execute an approximate representation of software to produce a fingerprint are provided. In one example, a system is provided. The system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can include a filter component and an execution component. The filter component can filter a platform-independent intermediate representation to a filtered representation. The execution component can execute the filtered representation on a virtual machine to produce an output vector which can be used to identify computer software vulnerabilities.Type: GrantFiled: June 14, 2019Date of Patent: July 27, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anthony C. Byrne, Shripad Nadgowda, Seetharami R. Seelam
-
Patent number: 11075983Abstract: Techniques facilitating compliance aware service registry and load balancing are provided. A system can comprise a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can comprise an extraction component that removes a service from a load balancer ring based on a first determination by a verification component that a compliance state of the service is a non-compliant state. Further, the computer executable components can comprise an insertion component that adds the service to the load balancer ring based on a second determination by the verification component that, after a defined amount of time, the compliance state of the service is a compliant state.Type: GrantFiled: November 20, 2019Date of Patent: July 27, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Canturk Isci, Shripad Nadgowda
-
Publication number: 20210126949Abstract: A method provides for collecting data source images from multiple repositories. Application dependencies are discovered from the data source images. Status results are determined based on vulnerability and compliance scanning of all dependent sources for each data source image. The status results are aggregated across all data source images for each of the multiple repositories. Remediations are determined for violations indicated by the aggregated status results. Each of the remediations is aggregated and ordered to define a single global remediation solution.Type: ApplicationFiled: October 29, 2019Publication date: April 29, 2021Inventors: Shripad Nadgowda, Alessandro Morari, James R. Doran
-
Publication number: 20210042217Abstract: An artificial intelligence (AI) platform to support a continuous integration and deployment pipeline for software development and operations (DevOps). One or more running processes are subject to monitoring to identify presence of vulnerabilities. An automated rebuild of the monitored processes is initiated, which includes constructing a map representing a relationship of test code elements corresponding to different portions of source code. The identified vulnerable source code reflected in a new container image is subject to an automatic verification to ascertain if the source code is covered by at least one of the represented test code elements. A risk assessment is employed as part of the verification. A new container image is selectively deployed responsive to the risk assessment.Type: ApplicationFiled: August 9, 2019Publication date: February 11, 2021Applicant: International Business Machines CorporationInventors: Jinho Hwang, Shripad Nadgowda, Hai Huang, Orna Raz
-
Patent number: 10896260Abstract: A system for determining vulnerability of an application container is provided. The system receives a report associating a first version of a software package with a vulnerability and a second version of the software package as being an update that fixes the vulnerability. The system receives the first version and the second version of the software package. The second version has one or more files that correspond to files in the first version. The system identifies a changed file in the first version of the software package that is different from a corresponding file in the second version of the software package. The system identifies a container file in an application container that matches the changed file in the first version of the software package. The system associates the identified container file with the vulnerability.Type: GrantFiled: October 16, 2018Date of Patent: January 19, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shripad Nadgowda, Sastry Duri
-
Publication number: 20200410106Abstract: Embodiments relate to an intelligent computer platform to for optimizing operating system vulnerability analysis. A build manifest is parsed and actions associated with operating system packages that contribute to an image build are identified. The identified actions are executed and a minimum build image is created. The minimum image build is scanned and evaluated to identify one or more vulnerabilities present in the minimum image build. Remedial measures are identified and applied to the identified vulnerabilities. The build manifest is executed with the applied remedial measures.Type: ApplicationFiled: June 26, 2019Publication date: December 31, 2020Applicant: International Business Machines CorporationInventor: Shripad Nadgowda
-
Publication number: 20200394028Abstract: Systems, computer-implemented methods, and computer program products that facilitate identifying computer software vulnerabilities, and more specifically, execute an approximate representation of software to produce a fingerprint are provided. In one example, a system is provided. The system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can include a filter component and an execution component. The filter component can filter a platform-independent intermediate representation to a filtered representation. The execution component can execute the filtered representation on a virtual machine to produce an output vector which can be used to identify computer software vulnerabilities.Type: ApplicationFiled: June 14, 2019Publication date: December 17, 2020Inventors: Anthony C. Byrne, Shripad Nadgowda, Seetharami R. Seelam
-
Patent number: 10833955Abstract: A container cloud platform that allows software functions to be shared by multiple applications in different application containers is provided. The service functions are containerized and disaggregated from the application containers. The containerized services are delivered as a capsule for applications that invoke the service functions at application runtime. The images of the service containers are deployed at the host computing devices operating the corresponding application containers. The container cloud platform monitors the deployed service containers for their execution as well as their termination.Type: GrantFiled: January 3, 2018Date of Patent: November 10, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Canturk Isci, Shripad Nadgowda
-
Publication number: 20200326931Abstract: Embodiments relate to a system, program product, and method for evaluating and controlling configuration of a build manifest. An application build manifest is discovered and is subjected to parsing process in which one or more components that comprise the application are identified. The build manifest is monitored for changes to the identified components, and a change notification is generated in response to a change in an identified component. Each generated change notification is assigned a classification. The change notifications are applied selectively to update the manifest, wherein the selective update is based on the classification of the change notification.Type: ApplicationFiled: April 15, 2019Publication date: October 15, 2020Applicant: International Business Machines CorporationInventors: Shripad Nadgowda, Priya Ashok Nagpurkar
-
Patent number: 10803177Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided.Type: GrantFiled: July 19, 2017Date of Patent: October 13, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Constantin Mircea Adam, Nikolaos Anerousis, Jinho Hwang, Shripad Nadgowda, Maja Vukovic
-
Patent number: 10789368Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided.Type: GrantFiled: December 14, 2017Date of Patent: September 29, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Constantin Mircea Adam, Nikolaos Anerousis, Jinho Hwang, Shripad Nadgowda, Maja Vukovic
-
Patent number: 10778709Abstract: Techniques facilitating cloud-native extensibility provided to security analytics are provided. A system comprises a memory that stores, and a processor that executes, computer executable components. The computer executable components can comprise a security component that implements an instance of an encapsulated security application. The encapsulated security application can be embedded into a container image as an extended analytic script. The computer executable components can also comprise an execution component that applies the instance of the encapsulated security application to a simulated system state of a computing device during subsequent scanning operations that result in respective analytics for scanning operations of the subsequent scanning operations.Type: GrantFiled: October 31, 2018Date of Patent: September 15, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shripad Nadgowda, Canturk Isci
-
Publication number: 20200137091Abstract: Techniques facilitating cloud-native extensibility provided to security analytics are provided. A system comprises a memory that stores, and a processor that executes, computer executable components. The computer executable components can comprise a security component that implements an instance of an encapsulated security application. The encapsulated security application can be embedded into a container image as an extended analytic script. The computer executable components can also comprise an execution component that applies the instance of the encapsulated security application to a simulated system state of a computing device during subsequent scanning operations that result in respective analytics for scanning operations of the subsequent scanning operations.Type: ApplicationFiled: October 31, 2018Publication date: April 30, 2020Inventors: Shripad Nadgowda, Canturk Isci
-
Publication number: 20200117807Abstract: A system for determining vulnerability of an application container is provided. The system receives a report associating a first version of a software package with a vulnerability and a second version of the software package as being an update that fixes the vulnerability. The system receives the first version and the second version of the software package. The second version has one or more files that correspond to files in the first version. The system identifies a changed file in the first version of the software package that is different from a corresponding file in the second version of the software package. The system identifies a container file in an application container that matches the changed file in the first version of the software package. The system associates the identified container file with the vulnerability.Type: ApplicationFiled: October 16, 2018Publication date: April 16, 2020Inventors: Shripad Nadgowda, Sastry Duri