Patents by Inventor Spyridon Antonatos

Spyridon Antonatos has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200245141
    Abstract: Embodiments for privacy protection of entities in a transportation system by a processor. Route instructions may be provided to an approximate destination located within a defined proximity of an entity for a transportation service for protecting a current location of an entity. The approximate destination may be dynamically adjusted to converge with the current location of the entity as the transportation service approaches the entity.
    Type: Application
    Filed: January 30, 2019
    Publication date: July 30, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon ANTONATOS, Adi BOTEA, Stefano BRAGHIN, Naoise HOLOHAN, Akihiro KISHIMOTO
  • Patent number: 10700864
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Grant
    Filed: July 12, 2017
    Date of Patent: June 30, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Patent number: 10700866
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Grant
    Filed: December 14, 2017
    Date of Patent: June 30, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Publication number: 20200162253
    Abstract: Various embodiments are provided for authenticating an entity in non-secure communication channels via secure out-of-bands channels. An operator may be authenticated to have access to a secured location associated with an entity upon determining the operator retrieved and communicated a unique token, provided by the user and stored at the secured location, back to the user.
    Type: Application
    Filed: November 19, 2018
    Publication date: May 21, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Elizabeth DALY, Spyridon ANTONATOS, Stefano BRAGHIN
  • Patent number: 10614236
    Abstract: Embodiments for performing self-contained, consistent data masking in a distributed computing environment by a processor. A data masking operation is performed on one or more datasets in one of a plurality of data formats such that a key of each value of each key-value pair representing a common set of columns or paths for the one or more datasets is masked.
    Type: Grant
    Filed: March 1, 2017
    Date of Patent: April 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon Antonatos, Stefano Braghin, Ioannis Gkoufas, Pol Mac Aonghusa
  • Publication number: 20200026847
    Abstract: To improve the security performance of a computer system, a retrieval component executing on at least one hardware processor obtains a list of known compromised passwords. A validation component executing on the at least one hardware processor obtains a specification of a putative password and risk-scores the putative password based at least in part on presence of the putative password in the list of known compromised passwords. The system obtains a specification of an actual password chosen in accordance with the risk score of the putative password. Access to at least one aspect of the computer system is controlled based on the actual chosen password.
    Type: Application
    Filed: July 18, 2018
    Publication date: January 23, 2020
    Inventors: Derek Wayne Botti, Elizabeth Daly, Martin Stephenson, Spyridon Antonatos, Stefano Braghin
  • Publication number: 20190236305
    Abstract: Techniques facilitating automatically detecting unauthorized use of sensitive information in content communicated over a network are provided. A computer-implemented method can comprise receiving, by a system operatively coupled to a processor, from a first entity, data associated with the first entity and one or more rules defining use of the data by a second entity. The data and the one or more rules can be defined by the first entity. The computer-implemented method can also comprise analyzing, by the system, content communicated over a network by the second entity to determine whether the content violates the one or more rules. The computer-implemented method can further comprise generating, by the system, information indicative of one or more violations of the one or more rules based on a determination that the content violates the one or more rules.
    Type: Application
    Filed: January 29, 2018
    Publication date: August 1, 2019
    Inventors: Spyridon Antonatos, Stefano Braghin, Naoise Holohan, Pol Mac Aonghusa
  • Publication number: 20190205507
    Abstract: Embodiments for watermarking anonymized datasets using decoys in a computing environment are provided. One or more decoy records may be embedded in an anonymized dataset such that a re-identification attack on the anonymized dataset targets the one or more decoy records.
    Type: Application
    Filed: January 2, 2018
    Publication date: July 4, 2019
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon ANTONATOS, Stefano BRAGHIN, Naoise HOLOHAN, Pol MAC AONGHUSA
  • Patent number: 10242000
    Abstract: Distributed, consistent utility-preserving data masking is provided by retrieving an original value from a data table; initiating a communication with a mapping service to ascertain whether or not a masking table of the mapping service includes a fictionalized value associated with the original value; when the masking table does not include a fictionalized value associated with the original value, producing a fictionalized value for the original value wherein the fictionalized value preserves at least one utility function of the original value, updating the mapping service to include the fictionalized value in the masking table, and applying a first masking operation by replacing the retrieved original value with the fictionalized value.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: March 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Spyridon Antonatos, Stefano Braghin, Aris Gkoulalas-Divanis, Olivier Verscheure
  • Publication number: 20190087604
    Abstract: Embodiments for data anonymity by a processor. A dataset may be transformed into an anonymous dataset by applying a differential privacy operation and a clustering operation to the dataset.
    Type: Application
    Filed: September 21, 2017
    Publication date: March 21, 2019
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon ANTONATOS, Stefano BRAGHIN, Naoise HOLOHAN, Pol MAC AONGHUSA
  • Publication number: 20190020477
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Application
    Filed: December 14, 2017
    Publication date: January 17, 2019
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Publication number: 20190020475
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Application
    Filed: July 12, 2017
    Publication date: January 17, 2019
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Publication number: 20180322310
    Abstract: A method, system and computer program product for providing privacy protection to data streams in a distributed computing environment. The method includes concurrently processing, by a plurality of computer machines, data streams of attributes containing data values received by each of the plurality of local computer machines; indexing the data values for each attribute 1of the plurality of data streams received by each of the plurality of local computer machines; providing the indexed data values to a main computer machine; integrating, by the main computer machine, the local computer machine indexed data values into a global index data structure for the plurality of data streams; and identifying privacy vulnerabilities of the attributes that are direct identifiers and quasi-identifiers based on the global index.
    Type: Application
    Filed: July 17, 2018
    Publication date: November 8, 2018
    Inventors: Spyridon Antonatos, Stefano Braghin, Aris Gkoulalas-Divanis, Olivier Verscheure
  • Patent number: 10095883
    Abstract: A method and system for automatically identifying and protecting privacy vulnerabilities in data streams includes indexing data values for each attribute of the data stream received by local virtual machines based on a schema of each data stream, classifying the data attributes of the plurality of data streams into known data types, integrating the local virtual machine indexes into a global index data structure for the data streams including single attribute data values, identifying privacy vulnerabilities in the data as attributes that are direct identifiers based on the attribute data values stored in the global index and combinations of attributes that are quasi-identifiers based on the low frequency of certain combinations of attribute data value pairs by computing the frequency based on the single attribute data values stored in the global index and providing privacy protection to the data streams by applying data transformations on the discovered direct identifiers and the quasi-identifiers.
    Type: Grant
    Filed: July 22, 2016
    Date of Patent: October 9, 2018
    Assignee: International Business Machines Corporation
    Inventors: Spyridon Antonatos, Stefano Braghin, Aris Gkoulalas-Divanis, Olivier Verscheure
  • Publication number: 20180253562
    Abstract: Embodiments for performing self-contained, consistent data masking in a distributed computing environment by a processor. A data masking operation is performed on one or more datasets in one of a plurality of data formats such that a key of each value of each key-value pair representing a common set of columns or paths for the one or more datasets is masked.
    Type: Application
    Filed: March 1, 2017
    Publication date: September 6, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon ANTONATOS, Stefano BRAGHIN, Ioannis GKOUFAS, Pol MAC AONGHUSA
  • Publication number: 20180025179
    Abstract: A method and system for automatically identifying and protecting privacy vulnerabilities in data streams includes indexing data values for each attribute of the data stream received by local virtual machines based on a schema of each data stream, classifying the data attributes of the plurality of data streams into known data types, integrating the local virtual machine indexes into a global index data structure for the data streams including single attribute data values, identifying privacy vulnerabilities in the data as attributes that are direct identifiers based on the attribute data values stored in the global index and combinations of attributes that are quasi-identifiers based on the low frequency of certain combinations of attribute data value pairs by computing the frequency based on the single attribute data values stored in the global index and providing privacy protection to the data streams by applying data transformations on the discovered direct identifiers and the quasi-identifiers.
    Type: Application
    Filed: July 22, 2016
    Publication date: January 25, 2018
    Inventors: Spyridon Antonatos, Stefano Braghin, Aris Gkoulalas-Divanis, Olivier Verscheure
  • Publication number: 20170344495
    Abstract: Distributed, consistent utility-preserving data masking is provided by retrieving an original value from a data table; initiating a communication with a mapping service to ascertain whether or not a masking table of the mapping service includes a fictionalized value associated with the original value; when the masking table does not include a fictionalized value associated with the original value, producing a fictionalized value for the original value wherein the fictionalized value preserves at least one utility function of the original value, updating the mapping service to include the fictionalized value in the masking table, and applying a first masking operation by replacing the retrieved original value with the fictionalized value.
    Type: Application
    Filed: May 27, 2016
    Publication date: November 30, 2017
    Inventors: Spyridon Antonatos, Stefano Braghin, Aris Gkoulalas-Divanis, Olivier Verscheure
  • Publication number: 20120005206
    Abstract: An apparatus for defining an index in an index file representing a volume of traffic a computer system comprises a data processing module. The data processing module defines an index corresponding to a traffic data sequence and a first parameter of the traffic data sequence in a first record of the index file. An apparatus for evaluating a candidate signature representing a pre-determined class of traffic in a computing system compares a signature data sequence with entries in an index file and determines whether the candidate signature satisfies an evaluation criterion.
    Type: Application
    Filed: February 5, 2008
    Publication date: January 5, 2012
    Inventors: Konstantinos Anagnostakis, Spyridon Antonatos