Patents by Inventor Claire Vishik
Claire Vishik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230100152Abstract: Federated learning accelerators and related methods are disclosed. An example edge device includes neural network trainer circuitry to train a neural network to generate a model update for a machine learning model using local data; a federated learning accelerator to perform one or more federated learning workloads associated with the training; and model update provider circuitry to transmit the model update to an aggregator device.Type: ApplicationFiled: September 24, 2021Publication date: March 30, 2023Inventors: Reshma Lal, Nalini Kumar, Ruchika Singh, Claire Vishik
-
Publication number: 20220300617Abstract: A system and method of enhancing the trustworthiness of an artificial intelligence system include detecting whether a data element includes an existing data domain tag, processing the data element into a transformed data element, generating a data domain tag, where the data domain tag includes at least a data domain identifier and a timestamp, appending the data domain tag to the transformed data element, creating a signature for the transformed data element and the appended data domain tag using a private key, and creating another signature for the data domain tag using the private key.Type: ApplicationFiled: June 1, 2022Publication date: September 22, 2022Applicant: Intel CorporationInventors: Claire Vishik, Reshma Lal, Santosh Ghosh
-
Publication number: 20130147511Abstract: The output of a physically unclonable function (PUF) may be processed to reduce its size. The post-processing result is served as a device intrinsic unclonable identifier and is signed by the device manufacturer to create a certificate stored on board the same device that includes the physically unclonable function. This scheme may not require online verification and complex error correction on PUFs in some cases.Type: ApplicationFiled: December 7, 2011Publication date: June 13, 2013Inventors: Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik
-
Publication number: 20080001722Abstract: An identification tag includes a microchip to store identification information. The identification information includes a model number of an item associated with the identification tag and location information associated with a manufacturer of the item. The identification tag also includes an antenna adapted to communicate with a receiver via radio frequencies.Type: ApplicationFiled: September 14, 2007Publication date: January 3, 2008Applicant: SBC Knowledge Ventures, L.P.Inventors: Claire Vishik, G. Kartha
-
Publication number: 20070242824Abstract: A server computer system outputs a downloader component to a client computer. The downloader component enables the client computer to download an encrypted file. After outputting the downloader component, the server computer system cooperates with the downloader component to output the encrypted file to the client computer. The server computer system outputs a user profile to the client computer. The user profile contains a key to decrypt the encrypted file into a digital content item. The server computer system outputs a file management component to the client computer. The file management component is to manage usage of the encrypted file at the client computer based on one or more terms of usage associated with the encrypted file.Type: ApplicationFiled: April 12, 2006Publication date: October 18, 2007Applicant: SBC Knowledge Ventures, LPInventor: Claire Vishik
-
Publication number: 20070112765Abstract: A method is disclosed for adaptably maintaining a taxonomy defined by a plurality of nodes arranged hierarchically.Type: ApplicationFiled: January 8, 2007Publication date: May 17, 2007Applicant: SBC Technology Resources, Inc.Inventor: Claire Vishik
-
Publication number: 20070101413Abstract: The present disclosure is directed to a system and method to manage data flow in a network. The method can include storing a plurality of profiles of a user, wherein each profile includes user data. The method can also include receiving a request for a portion of user data. The method also includes selecting a type of credential, at least partially based on: an origin of the request, the user data requested, a transaction value, a plurality of data disbursement rules, or any combination thereof.Type: ApplicationFiled: October 31, 2005Publication date: May 3, 2007Applicant: SBC Knowledge Ventures, L.P.Inventors: Claire Vishik, Lalitha Suryanarayana
-
Publication number: 20070079136Abstract: Methods and systems perform authentication based at least in part of the context of the transaction. In one embodiment, the context can be determined and trigger different rules with regard to access to the information or ability to immediately execute the transaction. In another embodiment, a method can include registering a device as a trusted device. The device can include a biometric input module. Biometric data can be used to authenticate a user, and the user may be requested to resubmit biometric data during the same session. In a further embodiment, a hacker may obtain unauthorized access to a victim's account information. The hacker may not be authenticated because he would not have access to a currently valid credential.Type: ApplicationFiled: September 30, 2005Publication date: April 5, 2007Applicant: SBC Knowledge Ventures, LPInventors: Claire Vishik, Lalitha Suryanarayana
-
Publication number: 20070016499Abstract: An account management system (100) has a communications interface (110), a memory (104), and a processor (102). The processor is programmed to receive (202) customer profile information for a customer, determine (204) a credit rating according to the profile information, identify (206) services that can be offered according to the credit rating, establish (208) a permanently active account for said customer, and enable or disable (209) services in response to customer demands.Type: ApplicationFiled: July 15, 2005Publication date: January 18, 2007Applicant: SBC Knowledge Ventures LPInventors: Claire Vishik, Lalitha Suryanarayana
-
Publication number: 20060285659Abstract: A phone system can include a phone terminal that includes a biometric data input device. Methods of using the phone terminal can include receiving biometric data of a user at the phone terminal and comparing the biometric data to saved biometric data. A comparison of the received and saved biometric data can be performed to locate one or more configuration files for a user, to authenticate or otherwise confirm the identity of a party, perform another activity, or any combination thereof. In one embodiment, the biometric data, other data, or a combination thereof can be used to access one or more configuration files that can be used to configure a phone terminal or a data processing system outside of the phone terminal. In another embodiment, the identity of a calling party, a called party, one or more other parties, or any combination thereof can be authenticated or otherwise confirmed.Type: ApplicationFiled: June 2, 2005Publication date: December 21, 2006Applicant: SBC Knowledge Ventures, LPInventors: Lalitha Suryanarayana, Michael Grannan, Claire Vishik
-
Publication number: 20060203973Abstract: A presence device operable in a first mode and a second mode is associated with a communication device. In the first mode, a user using the presence device is biometrically authenticated and a presence confirmation input is received from the communication device. In the second mode, a user-entered log-in input is received from the communication device. A central presence database is updated to indicate that the communication device is active for the user. A received message which is to be routed to the user is sent to the active device indicated by the central presence database.Type: ApplicationFiled: May 4, 2006Publication date: September 14, 2006Inventors: Claire Vishik, Sreenivasa Gorti, Paul Vleck
-
Publication number: 20060195333Abstract: A method for creating an electronic marketplace includes receiving from a first client a request to create an electronic marketplace and receiving information about a product associated with the marketplace. The information includes at least one of first product information and a reference to second product information. The method also includes creating a marketplace metacatalog associated with the marketplace using a template, storing the first product information in the marketplace metacatalog if the information about the product includes the first product information, and associating the reference to the second product information with the marketplace metacatalog if the information about the product includes the reference. The method further includes communicating at least a portion of at least one of the first product information and the second product information to a second client using the marketplace metacatalog.Type: ApplicationFiled: April 3, 2006Publication date: August 31, 2006Inventors: Claire Vishik, Suresh Damodaran-Kamal
-
Publication number: 20060152370Abstract: Automatic information capture and management is enhanced with RFID tags that provide complex information about an object in combination with intelligent systems that apply ontological classification of the object based on the captured information. An intelligent system includes a local RFID system, a central information clearinghouse which may further include one or more data mart having a subset of the clearinghouse information, a search and match engine with fuzzy matching capability, a rule engine, and one or more ontology to facilitate the use of the information captured about the object.Type: ApplicationFiled: December 30, 2004Publication date: July 13, 2006Inventors: Claire Vishik, G. Kartha
-
Publication number: 20050254481Abstract: Via a user interface, a user creates a device group that identifies communication devices of the user, the devices having different communication addresses. At least one of the devices is user-designated to receive an aggregated list of communications made with the devices in the user-defined device group. Communications made using devices in the group are detected, entries for the aggregated list are generated based thereon, and the entries are provided to the designated communication device(s). Thereafter, the user edits the user-defined device group via the user interface to add a communication device thereto or to remove a communication device therefrom.Type: ApplicationFiled: May 11, 2004Publication date: November 17, 2005Inventors: Claire Vishik, Lalitha Suryanarayana
-
Publication number: 20050243993Abstract: A method is provided for synchronizing disparate customized address books which each include contact information including an email address for a customer. The method includes storing identification information for each communications partner. Each communications partner is associated with a different disparate customized address book. The identification information is used to update the disparate customized address books when the contact information of the customer is changed to changed contact information. The method also includes determining when the contact information of the customer changes to changed contact information. The method further includes updating each of the disparate customized address books to include the changed contact information when the contact information of the customer is changed to the changed contact information.Type: ApplicationFiled: July 8, 2005Publication date: November 3, 2005Applicant: SBC Properties, L.P.Inventors: Christopher McKinzie, Claire Vishik
-
Publication number: 20050108160Abstract: A line-by-line user interface enables a user to question individual line items in a transaction. The user interface provides multiple links to multiple destinations for multiple question types per line item to facilitate routing a user request to an appropriate destination based on its question type. An extensible Markup Language (XML) representation of each of the individual line items can be processed to automatically create the line-by-line user interface. The XML representation includes tags within which the multiple links per line item are defined.Type: ApplicationFiled: November 17, 2003Publication date: May 19, 2005Inventor: Claire Vishik