Patents by Inventor Donald A. Padilla
Donald A. Padilla has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10169207Abstract: Input of a video file is received. The video file includes video of a representation of a wearable device. One or more motion vector data is determined based on the video file. One or more motion sensor data is generated based on the motion vector data. One or more test results are determined using the motion sensor data. The video file, the motion vector data, and the motion sensor data are stored.Type: GrantFiled: February 15, 2018Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Subhajit Bhuiya, Vijay Ekambaram, Donald A. Padilla, Sushain Pandit
-
Patent number: 10162736Abstract: Input of a video file is received. The video file includes video of a representation of a wearable device. One or more motion vector data is determined based on the video file. One or more motion sensor data is generated based on the motion vector data. One or more test results are determined using the motion sensor data. The video file, the motion vector data, and the motion sensor data are stored.Type: GrantFiled: November 17, 2016Date of Patent: December 25, 2018Assignee: International Business Machines CorporationInventors: Subhajit Bhuiya, Vijay Ekambaram, Donald A. Padilla, Sushain Pandit
-
Publication number: 20180150388Abstract: Input of a video file is received. The video file includes video of a representation of a wearable device. One or more motion vector data is determined based on the video file. One or more motion sensor data is generated based on the motion vector data. One or more test results are determined using the motion sensor data. The video file, the motion vector data, and the motion sensor data are stored.Type: ApplicationFiled: February 15, 2018Publication date: May 31, 2018Inventors: Subhajit Bhuiya, Vijay Ekambaram, Donald A. Padilla, Sushain Pandit
-
Publication number: 20180137034Abstract: Input of a video file is received. The video file includes video of a representation of a wearable device. One or more motion vector data is determined based on the video file. One or more motion sensor data is generated based on the motion vector data. One or more test results are determined using the motion sensor data. The video file, the motion vector data, and the motion sensor data are stored.Type: ApplicationFiled: November 17, 2016Publication date: May 17, 2018Inventors: Subhajit Bhuiya, Vijay Ekambaram, Donald A. Padilla, Sushain Pandit
-
Patent number: 9652511Abstract: Provided are techniques for secure matching supporting fuzzy data. A first bloom filter for a first data element is retrieved, wherein each of the characters in the data element has been encrypted with a beginning offset position of the character and encrypted with an end offset position of the character to produce two encrypted values that are added to the first bloom filter. A second bloom filter for a second data element is retrieved. The first bloom filter and the second bloom filter are compared to determine whether there is a match between the first data element and the second data element.Type: GrantFiled: March 13, 2013Date of Patent: May 16, 2017Assignee: International Business Machines CorporationInventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Patent number: 9652512Abstract: Provided are techniques for secure matching supporting fuzzy data. A first bloom filter for a first data element is retrieved, wherein each of the characters in the data element has been encrypted with a beginning offset position of the character and encrypted with an end offset position of the character to produce two encrypted values that are added to the first bloom filter. A second bloom filter for a second data element is retrieved. The first bloom filter and the second bloom filter are compared to determine whether there is a match between the first data element and the second data element.Type: GrantFiled: September 23, 2014Date of Patent: May 16, 2017Assignee: International Business Machines CorporationInventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Patent number: 9600684Abstract: Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information.Type: GrantFiled: November 15, 2012Date of Patent: March 21, 2017Assignee: International Business Machines CorporationInventors: Thomas Cherel, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Patent number: 9600685Abstract: Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information.Type: GrantFiled: July 16, 2013Date of Patent: March 21, 2017Assignee: International Business Machines CorporationInventors: Thomas Cherel, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Publication number: 20150012564Abstract: Provided are techniques for secure matching supporting fuzzy data. A first bloom filter for a first data element is retrieved, wherein each of the characters in the data element has been encrypted with a beginning offset position of the character and encrypted with an end offset position of the character to produce two encrypted values that are added to the first bloom filter. A second bloom filter for a second data element is retrieved. The first bloom filter and the second bloom filter are compared to determine whether there is a match between the first data element and the second data element.Type: ApplicationFiled: September 23, 2014Publication date: January 8, 2015Inventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Patent number: 8930325Abstract: According to one embodiment of the present invention, a system analyzes data in response to detecting occurrence of an event, and includes a computer system including at least one processor. The system maps fields between the data and a fingerprint definition identifying relevant fields of the data to produce a fingerprint for the data. The data is deleted after occurrence of the event. The produced fingerprint is stored in a data repository, and retrieved in response to detection of the event occurrence after the data has been deleted. The system analyzes the retrieved fingerprint to evaluate an impact of the event on corresponding deleted data. Embodiments of the present invention further include a method and computer program product for analyzing data in response to detecting occurrence of an event in substantially the same manner described above.Type: GrantFiled: February 15, 2012Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Kristen E. Cochrane, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Patent number: 8930326Abstract: According to one embodiment of the present invention, a system analyzes data in response to detecting occurrence of an event, and includes a computer system including at least one processor. The system maps fields between the data and a fingerprint definition identifying relevant fields of the data to produce a fingerprint for the data. The data is deleted after occurrence of the event. The produced fingerprint is stored in a data repository, and retrieved in response to detection of the event occurrence after the data has been deleted. The system analyzes the retrieved fingerprint to evaluate an impact of the event on corresponding deleted data. Embodiments of the present invention further include a method and computer program product for analyzing data in response to detecting occurrence of an event in substantially the same manner described above.Type: GrantFiled: February 27, 2012Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Kristen E. Cochrane, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Publication number: 20140365423Abstract: A method and system are disclosed for determining relative connectedness from temporal data. A user iterates through a list of items implemented on a mobile device. As each item on the list is located it is marked to generate a corresponding timestamp. The timestamps are then used to generate a timestamped list, which in turn is processed to determine the amount of elapsed time between each item on the list being located. The timestamped list data is then processed to generate relative connectedness data, which in turn is processed to generate a relative connectedness graph. The relative connectedness graph is then processed to assign coordinates to each item on the list. In turn, the coordinates are used to generate a map of the items.Type: ApplicationFiled: November 15, 2013Publication date: December 11, 2014Applicant: International Business Machines CorporationInventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Publication number: 20140365106Abstract: A method and system are disclosed for determining relative connectedness from temporal data. A user iterates through a list of items implemented on a mobile device. As each item on the list is located it is marked to generate a corresponding timestamp. The timestamps are then used to generate a timestamped list, which in turn is processed to determine the amount of elapsed time between each item on the list being located. The timestamped list data is then processed to generate relative connectedness data, which in turn is processed to generate a relative connectedness graph. The relative connectedness graph is then processed to assign coordinates to each item on the list. In turn, the coordinates are used to generate a map of the items.Type: ApplicationFiled: June 10, 2013Publication date: December 11, 2014Inventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Publication number: 20140280342Abstract: Provided are techniques for secure matching supporting fuzzy data. A first bloom filter for a first data element is retrieved, wherein each of the characters in the data element has been encrypted with a beginning offset position of the character and encrypted with an end offset position of the character to produce two encrypted values that are added to the first bloom filter. A second bloom filter for a second data element is retrieved. The first bloom filter and the second bloom filter are compared to determine whether there is a match between the first data element and the second data element.Type: ApplicationFiled: March 13, 2013Publication date: September 18, 2014Inventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Publication number: 20140136577Abstract: Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information.Type: ApplicationFiled: July 16, 2013Publication date: May 15, 2014Inventors: Thomas Cherel, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Publication number: 20140136576Abstract: Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information.Type: ApplicationFiled: November 15, 2012Publication date: May 15, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas Cherel, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Publication number: 20130212072Abstract: According to one embodiment of the present invention, a system analyzes data in response to detecting occurrence of an event, and includes a computer system including at least one processor. The system maps fields between the data and a fingerprint definition identifying relevant fields of the data to produce a fingerprint for the data. The data is deleted after occurrence of the event. The produced fingerprint is stored in a data repository, and retrieved in response to detection of the event occurrence after the data has been deleted. The system analyzes the retrieved fingerprint to evaluate an impact of the event on corresponding deleted data. Embodiments of the present invention further include a method and computer program product for analyzing data in response to detecting occurrence of an event in substantially the same manner described above.Type: ApplicationFiled: February 15, 2012Publication date: August 15, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kristen E. Cochrane, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
-
Publication number: 20130212073Abstract: According to one embodiment of the present invention, a system analyzes data in response to detecting occurrence of an event, and includes a computer system including at least one processor. The system maps fields between the data and a fingerprint definition identifying relevant fields of the data to produce a fingerprint for the data. The data is deleted after occurrence of the event. The produced fingerprint is stored in a data repository, and retrieved in response to detection of the event occurrence after the data has been deleted. The system analyzes the retrieved fingerprint to evaluate an impact of the event on corresponding deleted data. Embodiments of the present invention further include a method and computer program product for analyzing data in response to detecting occurrence of an event in substantially the same manner described above.Type: ApplicationFiled: February 27, 2012Publication date: August 15, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kristen E. Cochrane, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla