Patents by Inventor Debra Danielson
Debra Danielson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200136831Abstract: Provided is a process that includes: determining whether to execute an asset based on records documenting requirements for the asset. A first one of the records published to a blockchain and implicating requirements published to the blockchain in at least one record, wherein determining whether record holders agree to execute the asset comprises: accessing the first record, verifying the first record published to the blockchain has not been tampered with subsequent to publishing, and identifying requirements and criteria of the first record; accessing the second record and identifying requirements and values of the second record; and verifying each of the requirements and the criteria in the first record are satisfied by respective criteria and values specified in the second record. Agreement to execution of the asset is published to the blockchain upon determining the requirements and criteria of the first record are satisfied by the second record.Type: ApplicationFiled: October 31, 2018Publication date: April 30, 2020Inventors: Debra Danielson, Brendan Doherty
-
Patent number: 10592693Abstract: According to another embodiment of the disclosure, a method includes determining a first original identifier. The original identifier uniquely identifies a first original identity. The method also includes sending a request to a cooperative synthetic identity manager to create a first cooperative synthetic identity case for the first original identity. The method further includes receiving, from the cooperative synthetic identity manager, a first case identifier that uniquely identifies the first cooperative synthetic identity case. The method also includes requesting, from a first data entity, first cooperative synthetic identity information for the first original identity. The first cooperative synthetic identity information request comprises the first case identifier and the first original identifier. The method also includes receiving, from the first data entity, the first cooperative synthetic identity information.Type: GrantFiled: January 12, 2017Date of Patent: March 17, 2020Assignee: CA, Inc.Inventors: Diane Norris, Debra Danielson, Carol Piccus, Karen Sleeth, Stephen Tyler
-
Patent number: 10460129Abstract: According to one embodiment of the disclosure, a method includes receiving, from a first requestor, a request to create a cooperative synthetic identity case for an original identity. The method includes determining whether a cooperative synthetic identity case has already been created for the original identity. The method also includes generating a case identifier that uniquely identifies the cooperative synthetic identity case. The method further includes associating the case identifier with an expiration period. The method also includes storing the cooperative synthetic identity case, the case identifier, and the expiration period to a memory. The method also includes sending the case identifier to the first requestor.Type: GrantFiled: January 12, 2017Date of Patent: October 29, 2019Assignee: CA, Inc.Inventors: Diane Norris, Debra Danielson, Carol Piccus, Karen Sleeth, Stephen Tyler
-
Patent number: 10419427Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.Type: GrantFiled: September 20, 2018Date of Patent: September 17, 2019Assignee: CA, Inc.Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
-
Publication number: 20190036904Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.Type: ApplicationFiled: September 20, 2018Publication date: January 31, 2019Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
-
Patent number: 10122706Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.Type: GrantFiled: October 27, 2016Date of Patent: November 6, 2018Assignee: CA, Inc.Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
-
Publication number: 20180196962Abstract: According to another embodiment of the disclosure, a method includes determining a first original identifier. The original identifier uniquely identifies a first original identity. The method also includes sending a request to a cooperative synthetic identity manager to create a first cooperative synthetic identity case for the first original identity. The method further includes receiving, from the cooperative synthetic identity manager, a first case identifier that uniquely identifies the first cooperative synthetic identity case. The method also includes requesting, from a first data entity, first cooperative synthetic identity information for the first original identity. The first cooperative synthetic identity information request comprises the first case identifier and the first original identifier. The method also includes receiving, from the first data entity, the first cooperative synthetic identity information.Type: ApplicationFiled: January 12, 2017Publication date: July 12, 2018Inventors: Diane NORRIS, Debra DANIELSON, Carol PICCUS, Karen SLEETH, Stephen TYLER
-
Publication number: 20180196961Abstract: According to one embodiment of the disclosure, a method includes receiving, from a first requestor, a request to create a cooperative synthetic identity case for an original identity. The method includes determining whether a cooperative synthetic identity case has already been created for the original identity. The method also includes generating a case identifier that uniquely identifies the cooperative synthetic identity case. The method further includes associating the case identifier with an expiration period. The method also includes storing the cooperative synthetic identity case, the case identifier, and the expiration period to a memory. The method also includes sending the case identifier to the first requestor.Type: ApplicationFiled: January 12, 2017Publication date: July 12, 2018Inventors: Diane NORRIS, Debra DANIELSON, Carol PICCUS, Karen SLEETH, Stephen TYLER
-
Publication number: 20180198769Abstract: According to another embodiment of the disclosure, a method includes receiving, from an analyzing entity, a request for first cooperative synthetic identity information. The first cooperative synthetic identity information request comprises a first case identifier and a first original identifier. The first original identifier uniquely identifies a first original identity. The method also includes determining, based on the first original identifier, a plurality of information corresponding to the first original identity.Type: ApplicationFiled: January 12, 2017Publication date: July 12, 2018Inventors: Diane NORRIS, Debra DANIELSON, Carol PICCUS, Karen SLEETH, Stephen TYLER
-
Publication number: 20180124033Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.Type: ApplicationFiled: October 27, 2016Publication date: May 3, 2018Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
-
Patent number: 9910487Abstract: A current task flow path of a user is identified based on task flow nodes of the current task flow path, and a data context of the task flow nodes. The task flow nodes may include actions performed by the user with one or more software applications. A suggestion point of the current task flow path is detected. The suggestion point may be detected based upon a user action indicating that the user needs assistance to proceed with the current task flow path. A candidate task flow node is selected responsive to a comparison of the current task flow path to historical task flows. A suggestion is displayed to the user based on the candidate task flow node.Type: GrantFiled: August 16, 2013Date of Patent: March 6, 2018Assignee: CA, Inc.Inventors: Howard Abrams, Debra Danielson, Mark Addleman
-
Patent number: 9778914Abstract: According to one aspect of the present disclosure, a computer-implemented method is disclosed in which a software development log whose entries describe potential features for a future release of a first software program is accessed to obtain a text description of a feature from an entry. The text description is decomposed using a predefined n-gram decomposition technique to produce a first set of n-grams. The method includes determining whether a second software program includes the feature. The determining includes comparing the first set of n-grams to a second set of n-grams which describe the second software program, and calculating a similarity metric based on the comparing that indicates an extent to which matches for the n-grams in the first set are present in the second set. The software development log is updated based on the determining.Type: GrantFiled: June 25, 2015Date of Patent: October 3, 2017Assignee: CA, Inc.Inventors: Debra Danielson, Navid Rezvani
-
Publication number: 20160378435Abstract: According to one aspect of the present disclosure, a computer-implemented method is disclosed in which a software development log whose entries describe potential features for a future release of a first software program is accessed to obtain a text description of a feature from an entry. The text description is decomposed using a predefined n-gram decomposition technique to produce a first set of n-grams. The method includes determining whether a second software program includes the feature. The determining includes comparing the first set of n-grams to a second set of n-grams which describe the second software program, and calculating a similarity metric based on the comparing that indicates an extent to which matches for the n-grams in the first set are present in the second set. The software development log is updated based on the determining.Type: ApplicationFiled: June 25, 2015Publication date: December 29, 2016Inventors: Debra Danielson, Navid Rezvani
-
Publication number: 20070067729Abstract: A method for generating a graphical icon to represent a software module is disclosed. The method includes the steps of processing a description of the module stored within a database through a glossary to obtain a normalized description, parsing the normalized description to abstract the module and identify at least one component of the module, obtaining at least one icon component for the at least one module component, and assembling the at least one icon component into the graphical icon.Type: ApplicationFiled: September 20, 2005Publication date: March 22, 2007Inventors: Debra Danielson, Miguel Rivera