Patents by Inventor Debra Danielson

Debra Danielson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200136831
    Abstract: Provided is a process that includes: determining whether to execute an asset based on records documenting requirements for the asset. A first one of the records published to a blockchain and implicating requirements published to the blockchain in at least one record, wherein determining whether record holders agree to execute the asset comprises: accessing the first record, verifying the first record published to the blockchain has not been tampered with subsequent to publishing, and identifying requirements and criteria of the first record; accessing the second record and identifying requirements and values of the second record; and verifying each of the requirements and the criteria in the first record are satisfied by respective criteria and values specified in the second record. Agreement to execution of the asset is published to the blockchain upon determining the requirements and criteria of the first record are satisfied by the second record.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Inventors: Debra Danielson, Brendan Doherty
  • Patent number: 10592693
    Abstract: According to another embodiment of the disclosure, a method includes determining a first original identifier. The original identifier uniquely identifies a first original identity. The method also includes sending a request to a cooperative synthetic identity manager to create a first cooperative synthetic identity case for the first original identity. The method further includes receiving, from the cooperative synthetic identity manager, a first case identifier that uniquely identifies the first cooperative synthetic identity case. The method also includes requesting, from a first data entity, first cooperative synthetic identity information for the first original identity. The first cooperative synthetic identity information request comprises the first case identifier and the first original identifier. The method also includes receiving, from the first data entity, the first cooperative synthetic identity information.
    Type: Grant
    Filed: January 12, 2017
    Date of Patent: March 17, 2020
    Assignee: CA, Inc.
    Inventors: Diane Norris, Debra Danielson, Carol Piccus, Karen Sleeth, Stephen Tyler
  • Patent number: 10460129
    Abstract: According to one embodiment of the disclosure, a method includes receiving, from a first requestor, a request to create a cooperative synthetic identity case for an original identity. The method includes determining whether a cooperative synthetic identity case has already been created for the original identity. The method also includes generating a case identifier that uniquely identifies the cooperative synthetic identity case. The method further includes associating the case identifier with an expiration period. The method also includes storing the cooperative synthetic identity case, the case identifier, and the expiration period to a memory. The method also includes sending the case identifier to the first requestor.
    Type: Grant
    Filed: January 12, 2017
    Date of Patent: October 29, 2019
    Assignee: CA, Inc.
    Inventors: Diane Norris, Debra Danielson, Carol Piccus, Karen Sleeth, Stephen Tyler
  • Patent number: 10419427
    Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.
    Type: Grant
    Filed: September 20, 2018
    Date of Patent: September 17, 2019
    Assignee: CA, Inc.
    Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
  • Publication number: 20190036904
    Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.
    Type: Application
    Filed: September 20, 2018
    Publication date: January 31, 2019
    Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
  • Patent number: 10122706
    Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: November 6, 2018
    Assignee: CA, Inc.
    Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
  • Publication number: 20180196962
    Abstract: According to another embodiment of the disclosure, a method includes determining a first original identifier. The original identifier uniquely identifies a first original identity. The method also includes sending a request to a cooperative synthetic identity manager to create a first cooperative synthetic identity case for the first original identity. The method further includes receiving, from the cooperative synthetic identity manager, a first case identifier that uniquely identifies the first cooperative synthetic identity case. The method also includes requesting, from a first data entity, first cooperative synthetic identity information for the first original identity. The first cooperative synthetic identity information request comprises the first case identifier and the first original identifier. The method also includes receiving, from the first data entity, the first cooperative synthetic identity information.
    Type: Application
    Filed: January 12, 2017
    Publication date: July 12, 2018
    Inventors: Diane NORRIS, Debra DANIELSON, Carol PICCUS, Karen SLEETH, Stephen TYLER
  • Publication number: 20180196961
    Abstract: According to one embodiment of the disclosure, a method includes receiving, from a first requestor, a request to create a cooperative synthetic identity case for an original identity. The method includes determining whether a cooperative synthetic identity case has already been created for the original identity. The method also includes generating a case identifier that uniquely identifies the cooperative synthetic identity case. The method further includes associating the case identifier with an expiration period. The method also includes storing the cooperative synthetic identity case, the case identifier, and the expiration period to a memory. The method also includes sending the case identifier to the first requestor.
    Type: Application
    Filed: January 12, 2017
    Publication date: July 12, 2018
    Inventors: Diane NORRIS, Debra DANIELSON, Carol PICCUS, Karen SLEETH, Stephen TYLER
  • Publication number: 20180198769
    Abstract: According to another embodiment of the disclosure, a method includes receiving, from an analyzing entity, a request for first cooperative synthetic identity information. The first cooperative synthetic identity information request comprises a first case identifier and a first original identifier. The first original identifier uniquely identifies a first original identity. The method also includes determining, based on the first original identifier, a plurality of information corresponding to the first original identity.
    Type: Application
    Filed: January 12, 2017
    Publication date: July 12, 2018
    Inventors: Diane NORRIS, Debra DANIELSON, Carol PICCUS, Karen SLEETH, Stephen TYLER
  • Publication number: 20180124033
    Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.
    Type: Application
    Filed: October 27, 2016
    Publication date: May 3, 2018
    Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
  • Patent number: 9910487
    Abstract: A current task flow path of a user is identified based on task flow nodes of the current task flow path, and a data context of the task flow nodes. The task flow nodes may include actions performed by the user with one or more software applications. A suggestion point of the current task flow path is detected. The suggestion point may be detected based upon a user action indicating that the user needs assistance to proceed with the current task flow path. A candidate task flow node is selected responsive to a comparison of the current task flow path to historical task flows. A suggestion is displayed to the user based on the candidate task flow node.
    Type: Grant
    Filed: August 16, 2013
    Date of Patent: March 6, 2018
    Assignee: CA, Inc.
    Inventors: Howard Abrams, Debra Danielson, Mark Addleman
  • Patent number: 9778914
    Abstract: According to one aspect of the present disclosure, a computer-implemented method is disclosed in which a software development log whose entries describe potential features for a future release of a first software program is accessed to obtain a text description of a feature from an entry. The text description is decomposed using a predefined n-gram decomposition technique to produce a first set of n-grams. The method includes determining whether a second software program includes the feature. The determining includes comparing the first set of n-grams to a second set of n-grams which describe the second software program, and calculating a similarity metric based on the comparing that indicates an extent to which matches for the n-grams in the first set are present in the second set. The software development log is updated based on the determining.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: October 3, 2017
    Assignee: CA, Inc.
    Inventors: Debra Danielson, Navid Rezvani
  • Publication number: 20160378435
    Abstract: According to one aspect of the present disclosure, a computer-implemented method is disclosed in which a software development log whose entries describe potential features for a future release of a first software program is accessed to obtain a text description of a feature from an entry. The text description is decomposed using a predefined n-gram decomposition technique to produce a first set of n-grams. The method includes determining whether a second software program includes the feature. The determining includes comparing the first set of n-grams to a second set of n-grams which describe the second software program, and calculating a similarity metric based on the comparing that indicates an extent to which matches for the n-grams in the first set are present in the second set. The software development log is updated based on the determining.
    Type: Application
    Filed: June 25, 2015
    Publication date: December 29, 2016
    Inventors: Debra Danielson, Navid Rezvani
  • Publication number: 20070067729
    Abstract: A method for generating a graphical icon to represent a software module is disclosed. The method includes the steps of processing a description of the module stored within a database through a glossary to obtain a normalized description, parsing the normalized description to abstract the module and identify at least one component of the module, obtaining at least one icon component for the at least one module component, and assembling the at least one icon component into the graphical icon.
    Type: Application
    Filed: September 20, 2005
    Publication date: March 22, 2007
    Inventors: Debra Danielson, Miguel Rivera