Patents by Inventor Capen Brinkley

Capen Brinkley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11411984
    Abstract: Big data analysis methods and machine learning based models are used to provide offer recommendations to consumers that are probabilistically determined to be relevant to a given consumer. Machine learning based matching of user attributes and offer attributes is first performed to identify potentially relevant offers for a given consumer. A de-duplication process is then used to identify and eliminate any offers represented in the offer data that the consumer has already seen, has historically shown no interest in, has already accepted, that are directed to product or service types the user/consumer already owns, for which the user does not qualify, or that are otherwise deemed to be irrelevant to the consumer.
    Type: Grant
    Filed: July 22, 2020
    Date of Patent: August 9, 2022
    Assignee: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Thomas Bishop, Brett Weaver, Capen Brinkley
  • Publication number: 20200358811
    Abstract: Big data analysis methods and machine learning based models are used to provide offer recommendations to consumers that are probabilistically determined to be relevant to a given consumer. Machine learning based matching of user attributes and offer attributes is first performed to identify potentially relevant offers for a given consumer. A de-duplication process is then used to identify and eliminate any offers represented in the offer data that the consumer has already seen, has historically shown no interest in, has already accepted, that are directed to product or service types the user/consumer already owns, for which the user does not qualify, or that are otherwise deemed to be irrelevant to the consumer.
    Type: Application
    Filed: July 22, 2020
    Publication date: November 12, 2020
    Applicant: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Thomas Bishop, Brett Weaver, Capen Brinkley
  • Patent number: 10757133
    Abstract: A method and system include identifying a virtual asset creation template associated with virtual assets to be verified. A test virtual asset is generated using the virtual asset creation template and deployed in a testing environment. The test virtual asset is then analyzed in the testing environment to identify any vulnerabilities. If a vulnerability is identified in the designated test virtual asset, a remedy to the vulnerability is applied to the virtual asset creation template which is used to create a virtual asset in a production environment. The method and system further include monitoring the production environment virtual asset for potential security threats, with a virtual asset agent, and determining a severity of identified security threats. and potentially creating a new virtual asset with the virtual asset agent and decommissioning the current virtual asset as a result.
    Type: Grant
    Filed: January 26, 2018
    Date of Patent: August 25, 2020
    Assignee: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Thomas Bishop, Brett Weaver, Capen Brinkley
  • Patent number: 10050997
    Abstract: A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and system include monitoring a current a current virtual asset for potential security threats, with a virtual asset agent, according to one embodiment. The method and system include determining a severity of the potential security threats that are identified by the virtual asset agent, according to one embodiment. The method and system include creating a new virtual asset with the virtual asset agent and decommissioning the current virtual asset, according to one embodiment. The system and method receiving, with the new virtual asset, secrets that are associated with the current virtual asset to enable the new virtual asset to continue operations of the current virtual asset, according to one embodiment.
    Type: Grant
    Filed: December 26, 2017
    Date of Patent: August 14, 2018
    Assignee: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Thomas Bishop, Brett Weaver, Capen Brinkley
  • Publication number: 20180152473
    Abstract: A method and system include identifying a virtual asset creation template associated with virtual assets to be verified. A test virtual asset is generated using the virtual asset creation template and deployed in a testing environment. The test virtual asset is then analyzed in the testing environment to identify any vulnerabilities. If a vulnerability is identified in the designated test virtual asset, a remedy to the vulnerability is applied to the virtual asset creation template which is used to create a virtual asset in a production environment. The method and system further include monitoring the production environment virtual asset for potential security threats, with a virtual asset agent, and determining a severity of identified security threats. and potentially creating a new virtual asset with the virtual asset agent and decommissioning the current virtual asset as a result.
    Type: Application
    Filed: January 26, 2018
    Publication date: May 31, 2018
    Applicant: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Thomas Bishop, Brett Weaver, Capen Brinkley
  • Publication number: 20180124102
    Abstract: A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and system include monitoring a current a current virtual asset for potential security threats, with a virtual asset agent, according to one embodiment. The method and system include determining a severity of the potential security threats that are identified by the virtual asset agent, according to one embodiment. The method and system include creating a new virtual asset with the virtual asset agent and decommissioning the current virtual asset, according to one embodiment. The system and method receiving, with the new virtual asset, secrets that are associated with the current virtual asset to enable the new virtual asset to continue operations of the current virtual asset, according to one embodiment.
    Type: Application
    Filed: December 26, 2017
    Publication date: May 3, 2018
    Applicant: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Thomas Bishop, Brett Weaver, Capen Brinkley
  • Patent number: 9866581
    Abstract: A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and system include monitoring a current a current virtual asset for potential security threats, with a virtual asset agent, according to one embodiment. The method and system include determining a severity of the potential security threats that are identified by the virtual asset agent, according to one embodiment. The method and system include creating a new virtual asset with the virtual asset agent and decommissioning the current virtual asset, according to one embodiment. The system and method receiving, with the new virtual asset, secrets that are associated with the current virtual asset to enable the new virtual asset to continue operations of the current virtual asset, according to one embodiment.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: January 9, 2018
    Assignee: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Thomas Bishop, Brett Weaver, Capen Brinkley
  • Publication number: 20160371178
    Abstract: An application is implemented in the production environment in which the application will be used. Fabricated user data associated with the application implemented in the production environment is then generated and provided to the application as implemented in the production environment. The fabricated user data is then processed by the application in the production environment to transform the fabricated user data into fabricated user results data. In one embodiment, the fabricated user results data is then analyzed to evaluate the production environment and/or operation of the application in the production environment.
    Type: Application
    Filed: August 31, 2016
    Publication date: December 22, 2016
    Applicant: Intuit Inc.
    Inventors: Thomas Bishop, Javier Godinez, Capen Brinkley, Brett Weaver, M. Shannon Lietz, Luis Felipe Cabrera
  • Patent number: 9459987
    Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment.
    Type: Grant
    Filed: December 11, 2015
    Date of Patent: October 4, 2016
    Assignee: Intuit Inc.
    Inventors: Brett Weaver, Javier Godinez, Capen Brinkley, Thomas Bishop, M. Shannon Lietz, Luis Felipe Cabrera
  • Patent number: 9374389
    Abstract: Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment security compliance data for ensuring compliance with one or more application deployment security policies associated with the deployment of assets used to implement the application is generated. The asset security compliance data is then used to ensure each asset used to implement the application is created and used in compliance with asset security policies and the application deployment security compliance data is used to ensure that each asset used to implement the application is deployed in compliance with the application deployment security policies.
    Type: Grant
    Filed: April 25, 2014
    Date of Patent: June 21, 2016
    Assignee: Intuit Inc.
    Inventors: Thomas Bishop, Brett Weaver, Christian Price, Javier Godinez, Capen Brinkley, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20160098340
    Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment.
    Type: Application
    Filed: December 11, 2015
    Publication date: April 7, 2016
    Applicant: Intuit Inc.
    Inventors: Brett Weaver, Javier Godinez, Capen Brinkley, Thomas Bishop, M. Shannon Lietz, Luis Felipe Cabrera
  • Patent number: 9245117
    Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: January 26, 2016
    Assignee: Intuit Inc.
    Inventors: Brett Weaver, Javier Godinez, Capen Brinkley, Thomas Bishop, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150381651
    Abstract: A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and system include monitoring a current a current virtual asset for potential security threats, with a virtual asset agent, according to one embodiment. The method and system include determining a severity of the potential security threats that are identified by the virtual asset agent, according to one embodiment. The method and system include creating a new virtual asset with the virtual asset agent and decommissioning the current virtual asset, according to one embodiment. The system and method receiving, with the new virtual asset, secrets that are associated with the current virtual asset to enable the new virtual asset to continue operations of the current virtual asset, according to one embodiment.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Applicant: INTUIT INC.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Thomas Bishop, Brett Weaver, Capen Brinkley
  • Publication number: 20150312274
    Abstract: Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment security compliance data for ensuring compliance with one or more application deployment security policies associated with the deployment of assets used to implement the application is generated. The asset security compliance data is then used to ensure each asset used to implement the application is created and used in compliance with asset security policies and the application deployment security compliance data is used to ensure that each asset used to implement the application is deployed in compliance with the application deployment security policies.
    Type: Application
    Filed: April 25, 2014
    Publication date: October 29, 2015
    Applicant: INTUIT INC.
    Inventors: Thomas Bishop, Brett Weaver, Christian Price, Javier Godinez, Capen Brinkley, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150278517
    Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment.
    Type: Application
    Filed: March 31, 2014
    Publication date: October 1, 2015
    Applicant: Intuit Inc.
    Inventors: Brett Weaver, Javier Godinez, Capen Brinkley, Thomas Bishop, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150278523
    Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are provided. Actual user data is received. The actual user data is routed and processed in the production environment using a first backend system of the two or more backend systems. Fabricated user data is generated, routed, and also processed in the production environment but using a second backend system of the two or more backend systems. Results data from the processing of the fabricated user data is then analyzed to evaluate the production environment and/or operation of the application in the production environment.
    Type: Application
    Filed: March 31, 2014
    Publication date: October 1, 2015
    Applicant: Intuit Inc.
    Inventors: Capen Brinkley, Javier Godinez, Thomas Bishop, Brett Weaver, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150269064
    Abstract: An application is implemented in the production environment in which the application will be used. Fabricated user data associated with the application implemented in the production environment is then generated and provided to the application as implemented in the production environment. The fabricated user data is then processed by the application in the production environment to transform the fabricated user data into fabricated user results data. In one embodiment, the fabricated user results data is then analyzed to evaluate the production environment and/or operation of the application in the production environment.
    Type: Application
    Filed: March 21, 2014
    Publication date: September 24, 2015
    Applicant: INTUIT INC.
    Inventors: Thomas Bishop, Javier Godinez, Capen Brinkley, Brett Weaver, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150128130
    Abstract: Virtual host creation data used to instantiate a hardened task specific virtual host in a first computing environment is generated including hardening logic for providing enhanced security and trust for the hardened task specific virtual host and internal task specific logic for directing and/or allowing the hardened task specific virtual host to perform a specific function assigned to the hardened task specific virtual host. When task data is received indicating a task to be performed in the first computing environment requires the performance of the specific function assigned to the hardened task specific virtual host, the hardened task specific virtual host is automatically instantiated and/or deployed in the first computing environment.
    Type: Application
    Filed: November 1, 2013
    Publication date: May 7, 2015
    Applicant: Intuit Inc.
    Inventors: Brett Weaver, Capen Brinkley, Jeffrey M. Wolfe, Ankur Jain, M. Shannon Lietz, Luis Felipe Cabrera