Patents by Inventor Donald A. Padilla

Donald A. Padilla has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10169207
    Abstract: Input of a video file is received. The video file includes video of a representation of a wearable device. One or more motion vector data is determined based on the video file. One or more motion sensor data is generated based on the motion vector data. One or more test results are determined using the motion sensor data. The video file, the motion vector data, and the motion sensor data are stored.
    Type: Grant
    Filed: February 15, 2018
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Subhajit Bhuiya, Vijay Ekambaram, Donald A. Padilla, Sushain Pandit
  • Patent number: 10162736
    Abstract: Input of a video file is received. The video file includes video of a representation of a wearable device. One or more motion vector data is determined based on the video file. One or more motion sensor data is generated based on the motion vector data. One or more test results are determined using the motion sensor data. The video file, the motion vector data, and the motion sensor data are stored.
    Type: Grant
    Filed: November 17, 2016
    Date of Patent: December 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Subhajit Bhuiya, Vijay Ekambaram, Donald A. Padilla, Sushain Pandit
  • Publication number: 20180150388
    Abstract: Input of a video file is received. The video file includes video of a representation of a wearable device. One or more motion vector data is determined based on the video file. One or more motion sensor data is generated based on the motion vector data. One or more test results are determined using the motion sensor data. The video file, the motion vector data, and the motion sensor data are stored.
    Type: Application
    Filed: February 15, 2018
    Publication date: May 31, 2018
    Inventors: Subhajit Bhuiya, Vijay Ekambaram, Donald A. Padilla, Sushain Pandit
  • Publication number: 20180137034
    Abstract: Input of a video file is received. The video file includes video of a representation of a wearable device. One or more motion vector data is determined based on the video file. One or more motion sensor data is generated based on the motion vector data. One or more test results are determined using the motion sensor data. The video file, the motion vector data, and the motion sensor data are stored.
    Type: Application
    Filed: November 17, 2016
    Publication date: May 17, 2018
    Inventors: Subhajit Bhuiya, Vijay Ekambaram, Donald A. Padilla, Sushain Pandit
  • Patent number: 9652511
    Abstract: Provided are techniques for secure matching supporting fuzzy data. A first bloom filter for a first data element is retrieved, wherein each of the characters in the data element has been encrypted with a beginning offset position of the character and encrypted with an end offset position of the character to produce two encrypted values that are added to the first bloom filter. A second bloom filter for a second data element is retrieved. The first bloom filter and the second bloom filter are compared to determine whether there is a match between the first data element and the second data element.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: May 16, 2017
    Assignee: International Business Machines Corporation
    Inventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Patent number: 9652512
    Abstract: Provided are techniques for secure matching supporting fuzzy data. A first bloom filter for a first data element is retrieved, wherein each of the characters in the data element has been encrypted with a beginning offset position of the character and encrypted with an end offset position of the character to produce two encrypted values that are added to the first bloom filter. A second bloom filter for a second data element is retrieved. The first bloom filter and the second bloom filter are compared to determine whether there is a match between the first data element and the second data element.
    Type: Grant
    Filed: September 23, 2014
    Date of Patent: May 16, 2017
    Assignee: International Business Machines Corporation
    Inventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Patent number: 9600684
    Abstract: Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information.
    Type: Grant
    Filed: November 15, 2012
    Date of Patent: March 21, 2017
    Assignee: International Business Machines Corporation
    Inventors: Thomas Cherel, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Patent number: 9600685
    Abstract: Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information.
    Type: Grant
    Filed: July 16, 2013
    Date of Patent: March 21, 2017
    Assignee: International Business Machines Corporation
    Inventors: Thomas Cherel, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Publication number: 20150012564
    Abstract: Provided are techniques for secure matching supporting fuzzy data. A first bloom filter for a first data element is retrieved, wherein each of the characters in the data element has been encrypted with a beginning offset position of the character and encrypted with an end offset position of the character to produce two encrypted values that are added to the first bloom filter. A second bloom filter for a second data element is retrieved. The first bloom filter and the second bloom filter are compared to determine whether there is a match between the first data element and the second data element.
    Type: Application
    Filed: September 23, 2014
    Publication date: January 8, 2015
    Inventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Patent number: 8930325
    Abstract: According to one embodiment of the present invention, a system analyzes data in response to detecting occurrence of an event, and includes a computer system including at least one processor. The system maps fields between the data and a fingerprint definition identifying relevant fields of the data to produce a fingerprint for the data. The data is deleted after occurrence of the event. The produced fingerprint is stored in a data repository, and retrieved in response to detection of the event occurrence after the data has been deleted. The system analyzes the retrieved fingerprint to evaluate an impact of the event on corresponding deleted data. Embodiments of the present invention further include a method and computer program product for analyzing data in response to detecting occurrence of an event in substantially the same manner described above.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: January 6, 2015
    Assignee: International Business Machines Corporation
    Inventors: Kristen E. Cochrane, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Patent number: 8930326
    Abstract: According to one embodiment of the present invention, a system analyzes data in response to detecting occurrence of an event, and includes a computer system including at least one processor. The system maps fields between the data and a fingerprint definition identifying relevant fields of the data to produce a fingerprint for the data. The data is deleted after occurrence of the event. The produced fingerprint is stored in a data repository, and retrieved in response to detection of the event occurrence after the data has been deleted. The system analyzes the retrieved fingerprint to evaluate an impact of the event on corresponding deleted data. Embodiments of the present invention further include a method and computer program product for analyzing data in response to detecting occurrence of an event in substantially the same manner described above.
    Type: Grant
    Filed: February 27, 2012
    Date of Patent: January 6, 2015
    Assignee: International Business Machines Corporation
    Inventors: Kristen E. Cochrane, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Publication number: 20140365423
    Abstract: A method and system are disclosed for determining relative connectedness from temporal data. A user iterates through a list of items implemented on a mobile device. As each item on the list is located it is marked to generate a corresponding timestamp. The timestamps are then used to generate a timestamped list, which in turn is processed to determine the amount of elapsed time between each item on the list being located. The timestamped list data is then processed to generate relative connectedness data, which in turn is processed to generate a relative connectedness graph. The relative connectedness graph is then processed to assign coordinates to each item on the list. In turn, the coordinates are used to generate a map of the items.
    Type: Application
    Filed: November 15, 2013
    Publication date: December 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Publication number: 20140365106
    Abstract: A method and system are disclosed for determining relative connectedness from temporal data. A user iterates through a list of items implemented on a mobile device. As each item on the list is located it is marked to generate a corresponding timestamp. The timestamps are then used to generate a timestamped list, which in turn is processed to determine the amount of elapsed time between each item on the list being located. The timestamped list data is then processed to generate relative connectedness data, which in turn is processed to generate a relative connectedness graph. The relative connectedness graph is then processed to assign coordinates to each item on the list. In turn, the coordinates are used to generate a map of the items.
    Type: Application
    Filed: June 10, 2013
    Publication date: December 11, 2014
    Inventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Publication number: 20140280342
    Abstract: Provided are techniques for secure matching supporting fuzzy data. A first bloom filter for a first data element is retrieved, wherein each of the characters in the data element has been encrypted with a beginning offset position of the character and encrypted with an end offset position of the character to produce two encrypted values that are added to the first bloom filter. A second bloom filter for a second data element is retrieved. The first bloom filter and the second bloom filter are compared to determine whether there is a match between the first data element and the second data element.
    Type: Application
    Filed: March 13, 2013
    Publication date: September 18, 2014
    Inventors: Michael B. Litherland, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Publication number: 20140136577
    Abstract: Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information.
    Type: Application
    Filed: July 16, 2013
    Publication date: May 15, 2014
    Inventors: Thomas Cherel, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Publication number: 20140136576
    Abstract: Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information.
    Type: Application
    Filed: November 15, 2012
    Publication date: May 15, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas Cherel, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Publication number: 20130212072
    Abstract: According to one embodiment of the present invention, a system analyzes data in response to detecting occurrence of an event, and includes a computer system including at least one processor. The system maps fields between the data and a fingerprint definition identifying relevant fields of the data to produce a fingerprint for the data. The data is deleted after occurrence of the event. The produced fingerprint is stored in a data repository, and retrieved in response to detection of the event occurrence after the data has been deleted. The system analyzes the retrieved fingerprint to evaluate an impact of the event on corresponding deleted data. Embodiments of the present invention further include a method and computer program product for analyzing data in response to detecting occurrence of an event in substantially the same manner described above.
    Type: Application
    Filed: February 15, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kristen E. Cochrane, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla
  • Publication number: 20130212073
    Abstract: According to one embodiment of the present invention, a system analyzes data in response to detecting occurrence of an event, and includes a computer system including at least one processor. The system maps fields between the data and a fingerprint definition identifying relevant fields of the data to produce a fingerprint for the data. The data is deleted after occurrence of the event. The produced fingerprint is stored in a data repository, and retrieved in response to detection of the event occurrence after the data has been deleted. The system analyzes the retrieved fingerprint to evaluate an impact of the event on corresponding deleted data. Embodiments of the present invention further include a method and computer program product for analyzing data in response to detecting occurrence of an event in substantially the same manner described above.
    Type: Application
    Filed: February 27, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kristen E. Cochrane, Ivan M. Milman, Martin Oberhofer, Donald A. Padilla