Patents by Inventor Michael P. Shute
Michael P. Shute has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11663682Abstract: A method, computer program product, and system includes a processor(s) determining, based on obtaining data from the one or more sensors over the wireless communications connection, that individuals are within a given vicinity. The processor(s) queries personal computing devices associated with the individuals to determine an identity of each individual in the given vicinity. The processor(s) assigns a service provider(s) to a portion of the identified individuals. The processor(s) obtains preference information related to the portion and determines environmental information related to an environment experienced by the portion by locating at least one sensor within a predetermined distance of the portion, and communicating, over the wireless communications connection, with the at least one sensor. The processor(s) generate simulations for providing services to the portion that include temporal parameters and selects an optimal simulation.Type: GrantFiled: August 12, 2019Date of Patent: May 30, 2023Assignee: International Business Machines CorporationInventors: Michael Bender, Rhonda L. Childress, Michael P. Shute
-
Patent number: 11341186Abstract: A method, computer program product, and a system where a processor(s) obtains a video from a user, via a client, and segments the video into temporal shots that comprise a timeline of the video. The processor(s) cognitively analyze the video, by applying an image recognition algorithm to identify image entities in each temporal shot of the video and by applying a data structure comprising a user profile of the user to the temporal shots, to identity personal entities in each temporal shot of the video. The program code generates a search index for the video, utilizing the user entities (image entities and personal entities), where each entry of the search index is a given user entity and a linkage to a given temporal shot and the linkage indicates a location of the given user entity in the timeline of the video.Type: GrantFiled: June 19, 2019Date of Patent: May 24, 2022Assignee: International Business Machines CorporationInventors: Michael Bender, Michael P. Shute, Siddhartha Sood, Evelyn R. Anderson
-
Patent number: 11321676Abstract: Systems and methods for managing flexible events in an electronic calendar are disclosed. In embodiments, a computer-implemented method comprises: determining, by a computing device, that an electronic calendar event is a flexible event based on recording data of the electronic calendar event indicating that a recording of the electronic calendar event may be available; determining, by the computing device, an end date by which the electronic calendar event must be completed based on the scheduling data; and displaying, by the computing device, an electronic calendar with the electronic calendar event to a user.Type: GrantFiled: November 25, 2019Date of Patent: May 3, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Bender, Gordan G. Greenlee, Michael P. Shute, Siddhartha Sood
-
Patent number: 11151215Abstract: A computer-implemented method includes: generating a first list of uniform resource locators (URLs) available on a page when accessed using privileged credentials; storing one or more first URL outputs associated with the first list of URLs including the content of webpages accessed using the privileged credentials; generating a second list of URLs when accessed using non-privileged credentials; generating a third list of URLs, wherein the third list of URLs includes URLs included in the first list of URLs and not included in the second list of URLs; storing a second URL output including content of a webpage mapped to a particular URL in the third list of URLs when the particular URL is accessed using the non-privileged credentials; determining that the second URL output matches a particular first URL output associated with the particular URL; and outputting an alert identifying that the webpage is accessible by an unauthorized user.Type: GrantFiled: September 24, 2019Date of Patent: October 19, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Bender, David E. Nachman, Michael P. Shute, Keith R. Walker
-
Patent number: 10958458Abstract: A method, computer program product, and a system include a processor(s) that monitors an event, as a proxy for an invitee, to assign or periodically update a value (the value shifts temporally during the event). The processor(s) monitors the event by analyzing sentiment and emotion in verbal content, generate a speech baseline for each attendee, i.e., tone neutral vocal communication patterns, determine an aggregate tone for the event, and generating and progressive update, during the monitoring, the value (the value represents deviations in tone from the aggregate tone in portions of the verbal content proximate to an occurrence of one or more keywords relevant to the invitee, based on the aggregate tone and the speech baseline for each of the one or more attendees). The processor(s) determine that the value has exceeded a threshold and trigger an action to facilitate connection of the invitee to the event.Type: GrantFiled: April 3, 2018Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Michael Bender, Michael P. Shute, Gordan G. Greenlee, Siddhartha Sood
-
Patent number: 10938823Abstract: In an approach for authenticating a request for an electronic transaction, a computer receives a request for an electronic transaction on a user account. The computer determines whether the request from the user for the electronic transaction is suspicious. The computer then determines, based on at least a response from at least one contact of the user, whether the request for the electronic transaction is suspicious to the at least one contact.Type: GrantFiled: April 16, 2018Date of Patent: March 2, 2021Assignee: International Business Machines CorporationInventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Publication number: 20200401621Abstract: A method, computer program product, and a system where a processor(s) obtains a video from a user, via a client, and segments the video into temporal shots that comprise a timeline of the video. The processor(s) cognitively analyze the video, by applying an image recognition algorithm to identify image entities in each temporal shot of the video and by applying a data structure comprising a user profile of the user to the temporal shots, to identity personal entities in each temporal shot of the video. The program code generates a search index for the video, utilizing the user entities (image entities and personal entities), where each entry of the search index is a given user entity and a linkage to a given temporal shot and the linkage indicates a location of the given user entity in the timeline of the video.Type: ApplicationFiled: June 19, 2019Publication date: December 24, 2020Inventors: Michael Bender, Michael P. Shute, Siddhartha Sood, Evelyn R. Anderson
-
Patent number: 10771538Abstract: Aspects automatically provisioning of cloud resources for ETL job execution as a function of optimizer output data. Access paths identify overall cost and individual step operator costs and statistics relative to cloud resources for executing an SQL commands against a relational database. In one aspect operator steps having high step costs are identified and amounts, types or speeds of a cloud resources associated with the step are adjusted to thereby reduce the step cost and the access path overall cost. In another aspect SQL text descriptors and step costs and function statistics are compared to knowledge base criteria for matches to criteria associated inefficient configurations cloud resources for revision to improve corresponding operation efficiency. In another aspect usages of cloud resources by operator steps are monitored and logged and compared to historic data of similar steps to determine under or over-utilization of resources.Type: GrantFiled: October 8, 2015Date of Patent: September 8, 2020Assignee: International Business Machines CorporationInventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Patent number: 10757178Abstract: Aspects automatically provisioning of cloud resources for ETL job execution as a function of optimizer output data. Access paths identify overall cost and individual step operator costs and statistics relative to cloud resources for executing an SQL commands against a relational database. In one aspect operator steps having high step costs are identified and amounts, types or speeds of a cloud resources associated with the step are adjusted to thereby reduce the step cost and the access path overall cost. In another aspect SQL text descriptors and step costs and function statistics are compared to knowledge base criteria for matches to criteria associated inefficient configurations cloud resources for revision to improve corresponding operation efficiency. In another aspect usages of cloud resources by operator steps are monitored and logged and compared to historic data of similar steps to determine under or over-utilization of resources.Type: GrantFiled: February 21, 2018Date of Patent: August 25, 2020Assignee: International Business Machines CorporationInventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Patent number: 10701140Abstract: Aspects automatically provision cloud resources for Extract, Transform and Load job execution as a function of optimizer output data. Aspect access paths identify overall cost and individual step operator costs and statistics relative to cloud resources for executing structured English query language command against a relational database. In one aspect operator steps having high step costs are identified and amounts, types or speeds of a cloud resources associated with the step are adjusted to reduce step cost and access path overall cost. In another aspect structured English query language text descriptors and step costs and function statistics are compared to knowledge base criteria for matches to criteria associated inefficient configurations cloud resources for revision to improve corresponding operation efficiency. In another aspect usages of cloud resources by operator steps are monitored and logged and compared to historic data of similar steps to determine under or over-utilization of resources.Type: GrantFiled: February 21, 2018Date of Patent: June 30, 2020Assignee: International Business Machines CorporationInventors: Michael Bender, David E. Nachman, Michael P. Shute
-
Patent number: 10664859Abstract: An unexpressed liking and an unexpressed dislike of a user, which are not specified in the user's preference are determined by cognitive analytics. The unexpressed liking and dislike correspond to a first and second characteristic of items, respectively. In a list, a first item having the first characteristic and available in an inventory is included, which is, and a second item having the second characteristic and also available in the inventory is excluded. Items included in the list are arranged according to the user's degrees of liking or the items. An item having the first characteristic is determined to be absent from the inventory. Using completed sales information received from a set of retailer systems, an estimated value of a lost sales opportunity produced when the absent item is purchased is computed. The prioritized list and an accommodation offer responsive to the cost of the lost opportunity are presented.Type: GrantFiled: May 12, 2016Date of Patent: May 26, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Bender, Edward T. Childress, Rhonda Childress, Michael P. Shute
-
Publication number: 20200090134Abstract: Systems and methods for managing flexible events in an electronic calendar are disclosed. In embodiments, a computer-implemented method comprises: determining, by a computing device, that an electronic calendar event is a flexible event based on recording data of the electronic calendar event indicating that a recording of the electronic calendar event may be available; determining, by the computing device, an end date by which the electronic calendar event must be completed based on the scheduling data; and displaying, by the computing device, an electronic calendar with the electronic calendar event to a user.Type: ApplicationFiled: November 25, 2019Publication date: March 19, 2020Inventors: Michael BENDER, Gordan G. GREENLEE, Michael P. SHUTE, Siddhartha SOOD
-
Patent number: 10565564Abstract: Systems and methods for managing flexible events in an electronic calendar are disclosed. In embodiments, a computer-implemented method comprises: determining, by a computing device, that an electronic calendar event is a flexible event based on recording data of the electronic calendar event indicating that a recording of the electronic calendar event may be available; determining, by the computing device, an end date by which the electronic calendar event must be completed based on the scheduling data; and displaying, by the computing device, an electronic calendar with the electronic calendar event to a user.Type: GrantFiled: March 8, 2017Date of Patent: February 18, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Bender, Gordan G. Greenlee, Michael P. Shute, Siddhartha Sood
-
Publication number: 20200019582Abstract: A computer-implemented method includes: generating a first list of uniform resource locators (URLs) available on a page when accessed using privileged credentials; storing one or more first URL outputs associated with the first list of URLs including the content of webpages accessed using the privileged credentials; generating a second list of URLs when accessed using non-privileged credentials; generating a third list of URLs, wherein the third list of URLs includes URLs included in the first list of URLs and not included in the second list of URLs; storing a second URL output including content of a webpage mapped to a particular URL in the third list of URLs when the particular URL is accessed using the non-privileged credentials; determining that the second URL output matches a particular first URL output associated with the particular URL; and outputting an alert identifying that the webpage is accessible by an unauthorized user.Type: ApplicationFiled: September 24, 2019Publication date: January 16, 2020Inventors: Michael BENDER, David E. NACHMAN, Michael P. SHUTE, Keith R. WALKER
-
Publication number: 20190362447Abstract: A method, computer program product, and system includes a processor(s) determining, based on obtaining data from the one or more sensors over the wireless communications connection, that individuals are within a given vicinity. The processor(s) queries personal computing devices associated with the individuals to determine an identity of each individual in the given vicinity. The processor(s) assigns a service provider(s) to a portion of the identified individuals. The processor(s) obtains preference information related to the portion and determines environmental information related to an environment experienced by the portion by locating at least one sensor within a predetermined distance of the portion, and communicating, over the wireless communications connection, with the at least one sensor. The processor(s) generate simulations for providing services to the portion that include temporal parameters and selects an optimal simulation.Type: ApplicationFiled: August 12, 2019Publication date: November 28, 2019Inventors: Michael Bender, Rhonda L. Childress, Michael P. Shute
-
Patent number: 10460002Abstract: A computer-implemented method includes: generating a first list of uniform resource locators (URLs) available on a page when accessed using privileged credentials; storing one or more first URL outputs associated with the first list of URLs including the content of webpages accessed using the privileged credentials; generating a second list of URLs when accessed using non-privileged credentials; generating a third list of URLs, wherein the third list of URLs includes URLs included in the first list of URLs and not included in the second list of URLs; storing a second URL output including content of a webpage mapped to a particular URL in the third list of URLs when the particular URL is accessed using the non-privileged credentials; determining that the second URL output matches a particular first URL output associated with the particular URL; and outputting an alert identifying that the webpage is accessible by an unauthorized user.Type: GrantFiled: June 1, 2018Date of Patent: October 29, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Bender, David E. Nachman, Michael P. Shute, Keith R. Walker
-
Publication number: 20190305976Abstract: A method, computer program product, and a system include a processor(s) that monitors an event, as a proxy for an invitee, to assign or periodically update a value (the value shifts temporally during the event). The processor(s) monitors the event by analyzing sentiment and emotion in verbal content, generate a speech baseline for each attendee, i.e., tone neutral vocal communication patterns, determine an aggregate tone for the event, and generating and progressive update, during the monitoring, the value (the value represents deviations in tone from the aggregate tone in portions of the verbal content proximate to an occurrence of one or more keywords relevant to the invitee, based on the aggregate tone and the speech baseline for each of the one or more attendees). The processor(s) determine that the value has exceeded a threshold and trigger an action to facilitate connection of the invitee to the event.Type: ApplicationFiled: April 3, 2018Publication date: October 3, 2019Inventors: Michael Bender, Michael P. Shute, Gordan G. Greenlee, Siddhartha Sood
-
Patent number: 10424028Abstract: A method, computer program product, and system includes a processor(s) determining, based on obtaining data from the one or more sensors over the wireless communications connection, that individuals are within a given vicinity. The processor(s) queries personal computing devices associated with the individuals to determine an identity of each individual in the given vicinity. The processor(s) assigns a service provider(s) to a portion of the identified individuals. The processor(s) obtains preference information related to the portion and determines environmental information related to an environment experienced by the portion by locating at least one sensor within a predetermined distance of the portion, and communicating, over the wireless communications connection, with the at least one sensor. The processor(s) generate simulations for providing services to the portion that include temporal parameters and selects an optimal simulation.Type: GrantFiled: January 9, 2017Date of Patent: September 24, 2019Assignee: International Business Machines CorporationInventors: Michael Bender, Rhonda L. Childress, Michael P. Shute
-
Patent number: 10397166Abstract: In general, embodiments of the invention provide an approach for saving communication content to a social network for later recall. Specifically, communication data is received from multiple input data streams. The communication data is scanned and tags are generated from the most frequent, non-excluded words. The communication data, along with the tags, are saved to the social network in a single output stream.Type: GrantFiled: January 6, 2015Date of Patent: August 27, 2019Assignee: International Business Machines CorporationInventors: Michael Bender, Gordan G. Greenlee, David E. Nachman, Michael P. Shute
-
Publication number: 20180276307Abstract: A computer-implemented method includes: generating a first list of uniform resource locators (URLs) available on a page when accessed using privileged credentials; storing one or more first URL outputs associated with the first list of URLs including the content of webpages accessed using the privileged credentials; generating a second list of URLs when accessed using non-privileged credentials; generating a third list of URLs, wherein the third list of URLs includes URLs included in the first list of URLs and not included in the second list of URLs; storing a second URL output including content of a webpage mapped to a particular URL in the third list of URLs when the particular URL is accessed using the non-privileged credentials; determining that the second URL output matches a particular first URL output associated with the particular URL; and outputting an alert identifying that the webpage is accessible by an unauthorized user.Type: ApplicationFiled: June 1, 2018Publication date: September 27, 2018Inventors: Michael BENDER, David E. NACHMAN, Michael P. SHUTE, Keith R. WALKER