Patents by Inventor Tsz (Simon) Cheng
Tsz (Simon) Cheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8965897Abstract: A method for improving the usability of product feedback data can begin with the receipt of product feedback search parameters by an intelligent product feedback analytics tool. The product feedback search parameters can represent a product or a group of products. Product feedback search results having a rating value and/or textual feedback content can be obtained for the product feedback search parameters. For each product in the search results, a composite rating value can be synthesized from the rating values contained in the search results. For each product in the search results, the product feedback search results can be analyzed for analytic parameters using natural language processing techniques. An analytic parameter can represent a commonality within a subset of the search results. The product feedback search results, composite rating values, and analytic parameters can be presented within a user interface, providing context for the composite rating value.Type: GrantFiled: February 29, 2012Date of Patent: February 24, 2015Assignee: International Business Machines CorporationInventors: Lee A. Carbonell, Tsz Simon Cheng, Jeffrey L. Edgington, Pandian Mariadoss
-
Publication number: 20130226925Abstract: A method for improving the usability of product feedback data can begin with the receipt of product feedback search parameters by an intelligent product feedback analytics tool. The product feedback search parameters can represent a product or a group of products. Product feedback search results having a rating value and/or textual feedback content can be obtained for the product feedback search parameters. For each product in the search results, a composite rating value can be synthesized from the rating values contained in the search results. For each product in the search results, the product feedback search results can be analyzed for analytic parameters using natural language processing techniques. An analytic parameter can represent a commonality within a subset of the search results. The product feedback search results, composite rating values, and analytic parameters can be presented within a user interface, providing context for the composite rating value.Type: ApplicationFiled: February 29, 2012Publication date: August 29, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: LEE A. CARBONELL, TSZ SIMON CHENG, JEFFREY L. EDGINGTON, PANDIAN MARIADOSS
-
Patent number: 8346863Abstract: A method of initiating contact based upon automatically shared profile data can include a step of automatically and wirelessly exchanging profile information between at least two computing devices. A determination can be made as to whether a contact opportunity exists by comparing received profile information with a set of previously established contact rules. A notification of a contract opportunity can be automatically presented upon one of the computing devices, depending upon whether the profile information favorably compares with the contact rules.Type: GrantFiled: August 15, 2006Date of Patent: January 1, 2013Assignee: International Business Machines CorporationInventors: Tsz Simon Cheng, Daniel Hassell, Mathews Thomas
-
Patent number: 8234499Abstract: In the invention, incorrect authentication information for accessing at least one secured computing asset can be received. A similarity score between the incorrect authentication information and correct authentication information can be determined. One of many different access levels can be assigned to a computing session based upon the similarity score. Access consistent with the assigned access level can be granted. One access level can be an emulation access level that grants access to at least one simulated asset designed to mimic the secured asset. Access to the simulated asset can be provided in a fashion so that a user, who is likely an intruder, is unaware that they are not receiving the secured asset information. A tracking action can be optionally initiated against the intruder. Further, user behavior with the simulated session or a limited access session can be compared against a behavior profile to dynamically increase or decrease session permissions.Type: GrantFiled: June 26, 2007Date of Patent: July 31, 2012Assignee: International Business Machines CorporationInventors: Subil M. Abraham, Lee A. Carbonell, Tsz Simon Cheng, Mathews Thomas
-
Patent number: 7904833Abstract: An electronic commerce method can include the step of determining a plurality of e-commerce partners. For each partner, a partner identifier can be presented within a commerce GUI. In the commerce GUI, the partner identifier can be an expandable node. An expansion of at least one of the nodes can be presented within the commerce GUI. For each expansion, a transaction identifier can be presented as a child node of the expanded node. The transaction identifier can represent an electronic commerce transaction between a user of the commerce GUI and the associated e-commerce partner.Type: GrantFiled: December 8, 2003Date of Patent: March 8, 2011Assignee: International Business Machines CorporationInventors: Tsz Simon Cheng, Brent W. Cossey, Gregory P. Fitzpatrick
-
Patent number: 7756751Abstract: A software architecture can include an artifact layer and a configuration layer. The artifact layer can contain multiple application independent artifacts. A configuration layer can contain at least one application. The application can include multiple states in which the application executes instructions. The states can exist within execution spaces that are distributed across a network. The application uses artifacts of the artifact layer, which can operate in a state dependent manner.Type: GrantFiled: November 17, 2003Date of Patent: July 13, 2010Assignee: International Business Machines CorporationInventors: Tsz Simon Cheng, Ying Huang, Santhosh Kumaran, Amaresh Rajasekharan, Mathews Thomas, Frederick Y. Wu, Yiming Ye
-
Patent number: 7523316Abstract: A method (10) for managing the display of sensitive content in non-trusted environments can include the steps of interrogating (12) a list of policies associated with a given user and a physical device, determining (14) a location of the physical device, comparing (18) the location of the physical device with a list of trusted locations, and enforcing (20) a plurality of rules contained in the policy by limiting or restricting access to sensitive information based on the location.Type: GrantFiled: December 8, 2003Date of Patent: April 21, 2009Assignee: International Business Machines CorporationInventors: Tsz Simon Cheng, Brent W. Cossey, Gregory P. Fitzpatrick
-
Publication number: 20090006856Abstract: In the invention, incorrect authentication information for accessing at least one secured computing asset can be received. A similarity score between the incorrect authentication information and correct authentication information can be determined. One of many different access levels can be assigned to a computing session based upon the similarity score. Access consistent with the assigned access level can be granted. One access level can be an emulation access level that grants access to at least one simulated asset designed to mimic the secured asset. Access to the simulated asset can be provided in a fashion so that a user, who is likely an intruder, is unaware that they are not receiving the secured asset information. A tracking action can he optionally initiated against the intruder. Further, user behavior with the simulated session or a limited access session can be compared against a behavior profile to dynamically increase or decrease session permissions.Type: ApplicationFiled: June 26, 2007Publication date: January 1, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SUBIL ABRAHAM, LEE A. CARBONELL, TSZ SIMON CHENG, MATHEWS THOMAS
-
Patent number: 7313615Abstract: A method for managing communications including receiving a multitude of communication attempts from a multitude of communication sources. For each communication attempt, a communication event can be responsively determined. For each communication event, an event weight for the communication event can be determined. Each event weight can be compared to an event threshold associated with the communication event. At least one communication management action can be responsively performed. The communication management action can include a busy indication action, a queuing action, an automated response action, a linking action, a notification action, and/or a reformatting action.Type: GrantFiled: June 16, 2003Date of Patent: December 25, 2007Assignee: International Business Machines CorporationInventors: Gregory P Fitzpatrick, Tsz (Simon) Cheng
-
Publication number: 20050125673Abstract: A method (10) for managing the display of sensitive content in non-trusted environments can include the steps of interrogating (12) a list of policies associated with a given user and a physical device, determining (14) a location of the physical device, comparing (18) the location of the physical device with a list of trusted locations, and enforcing (20) a plurality of rules contained in the policy by limiting or restricting access to sensitive information based on the location.Type: ApplicationFiled: December 8, 2003Publication date: June 9, 2005Applicant: International Business Machines CorporationInventors: Tsz Simon Cheng, Brent Cossey, Gregory Fitzpatrick
-
Publication number: 20040255015Abstract: A method for managing communications including receiving a multitude of communication attempts from a multitude of communication sources. For each communication attempt, a communication event can be responsively determined. For each communication event, an event weight for the communication event can be determined. Each event weight can be compared to an event threshold associated with the communication event. At least one communication management action can be responsively performed. The communication management action can include a busy indication action, a queuing action, an automated response action, a linking action, a notification action, and/or a reformatting action.Type: ApplicationFiled: June 16, 2003Publication date: December 16, 2004Applicant: International Business Machines CorporationInventors: Gregory P. Fitzpatrick, Tsz (Simon) Cheng