Patents by Inventor Frank Villavicencio
Frank Villavicencio has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230403276Abstract: A method for proving identity when registering for a service includes presenting by the entity a user with options for registering for the service, wherein the options comprise validating an identity of the user through a trusted partner. The method includes receiving, by the entity, user data from the trusted partner responsive to the user logging into a page on the trusted partner. The method includes validating the user identity for the service responsive to a determination that a user identifier from the trusted partner matches a user identifier on record with the entity. The method includes populating entity user data for the service according to the user data received from the trusted partner responsive to successfully validation of the user identity. In embodiments, a risk analysis score is determined for the user and registration steps for registering are selected based on comparison of the registration score with a threshold.Type: ApplicationFiled: August 21, 2023Publication date: December 14, 2023Applicant: ADP, Inc.Inventors: Kalyan VBH, Frank Villavicencio, Pavan Katamveera
-
Patent number: 11736481Abstract: A method for proving identity when registering for a service includes presenting by the entity a user with options for registering for the service, wherein the options comprise validating an identity of the user through a trusted partner. The method includes receiving, by the entity, user data from the trusted partner responsive to the user logging into a page on the trusted partner. The method includes validating the user identity for the service responsive to a determination that a user identifier from the trusted partner matches a user identifier on record with the entity. The method includes populating entity user data for the service according to the user data received from the trusted partner responsive to successfully validation of the user identity. In embodiments, a risk analysis score is determined for the user and registration steps for registering are selected based on comparison of the registration score with a threshold.Type: GrantFiled: April 5, 2019Date of Patent: August 22, 2023Assignee: ADP, Inc.Inventors: Kalyan Vbh, Frank Villavicencio, Pavan Katamveera
-
Publication number: 20220368536Abstract: A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.Type: ApplicationFiled: June 23, 2022Publication date: November 17, 2022Inventors: Prateek Mishra, Frank Villavicencio, Merajuddin Mohammad
-
Patent number: 11405216Abstract: A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.Type: GrantFiled: May 7, 2020Date of Patent: August 2, 2022Assignee: ADP, Inc.Inventors: Prateek Mishra, Frank Villavicencio, Merajuddin Mohammad
-
Patent number: 11200255Abstract: Synchronizing data across databases comprising generating a synchronization event in response to a change in source data in a source database. The synchronization event is published as a message in a source database internal queue. The message is then published in a message broker. Sink data in a sink database is synchronized according to the message in the message broker to match the change in source data in the source database.Type: GrantFiled: August 22, 2019Date of Patent: December 14, 2021Assignee: ADP, LLCInventors: Daniel Rodrigo Da Paz Pontes, Deepak Kaushal, Zhitao Xu, Muhammad Nuri, Eliezer Madeira de Campos, Lili Zhang, Kushal Gohil, Srilatha Usike, Supraja Kanapala, Jayesh Patel, Manish Patel, Tushar Phondge, Vincent Civetta, Frank Villavicencio
-
Publication number: 20210351935Abstract: A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.Type: ApplicationFiled: May 7, 2020Publication date: November 11, 2021Inventors: Prateek Mishra, Frank Villavicencio, Merajuddin Mohammad
-
Patent number: 11157513Abstract: A system and method for communicating events between applications. A first application receives event information for an event. A first action is performed by the first application in response to receiving the event information. The first application generates an event message comprising an event name and a message payload. The message payload comprises at least a portion of the event information. The first application publishes the event message by sending the event message to an event message pipeline. A second application may listen for the event message in the event message pipeline, receive the event message from the event message pipeline, and use the message payload to perform a second action, wherein the second action is different from the first action.Type: GrantFiled: August 9, 2019Date of Patent: October 26, 2021Assignee: ADP, LLCInventors: Zhitao Xu, Daniel Rodrigo da Paz Pontes, Kushal Gohil, Tushar Phondge, Frank Villavicencio, Supraja Kanapala, Soham Jambhekar, Lili Zhang, Suthakar Maharajan, Manish Patel, Srilatha Usike, Muhammad Nuri, Deepak Kaushal, Vincent Civetta, Thiago Nunes Kehl
-
Patent number: 10944743Abstract: A method, a computer system, and a computer program product for authenticating a transaction are provided. An authentication system receives the transaction over a particular channel of a plurality of support channels. A risk score is determined for the transaction based on a number of contextual risk factors. An authentication scheme is determined from a number of authentication schemes for authenticating an identity of the user within an authentication context. The authentication scheme is determined based on the particular channel and the risk score. In response to successfully authenticating the identity of the user within the authentication context, the authentication system determines whether the transaction is a permitted transaction based on an assurance level associated with the authentication context. In response to determining that the transaction is the permitted transaction, the transaction is authenticated.Type: GrantFiled: January 22, 2019Date of Patent: March 9, 2021Assignee: ADP, LLCInventors: Sonal Doshi, Frank Villavicencio, Suresh Bezawada
-
Publication number: 20210056124Abstract: Synchronizing data across databases comprising generating a synchronization event in response to a change in source data in a source database. The synchronization event is published as a message in a source database internal queue. The message is then published in a message broker. Sink data in a sink database is synchronized according to the message in the message broker to match the change in source data in the source database.Type: ApplicationFiled: August 22, 2019Publication date: February 25, 2021Inventors: Daniel Rodrigo Da Paz Pontes, Deepak Kaushal, Zhitao Xu, Muhammad Nuri, Eliezer Madeira de Campos, Lili Zhang, Kushal Gohil, Srilatha Usike, Supraja Kanapala, Jayesh Patel, Manish Patel, Tushar Phondge, Vincent Civetta, Frank Villavicencio
-
Publication number: 20210042321Abstract: A system and method for communicating events between applications. A first application receives event information for an event. A first action is performed by the first application in response to receiving the event information. The first application generates an event message comprising an event name and a message payload. The message payload comprises at least a portion of the event information. The first application publishes the event message by sending the event message to an event message pipeline. A second application may listen for the event message in the event message pipeline, receive the event message from the event message pipeline, and use the message payload to perform a second action, wherein the second action is different from the first action.Type: ApplicationFiled: August 9, 2019Publication date: February 11, 2021Inventors: Zhitao Xu, Daniel Rodrigo da Paz Pontes, Kushal Gohil, Tushar Phondge, Frank Villavicencio, Supraja Kanapala, Soham Jambhekar, Lili Zhang, Suthakar Maharajan, Manish Patel, Srilatha Usike, Muhammad Nuri, Deepak Kaushal, Vincent Civetta, Thiago Nunes Kehl
-
Publication number: 20200322335Abstract: A method for proving identity when registering for a service includes presenting by the entity a user with options for registering for the service, wherein the options comprise validating an identity of the user through a trusted partner. The method includes receiving, by the entity, user data from the trusted partner responsive to the user logging into a page on the trusted partner. The method includes validating the user identity for the service responsive to a determination that a user identifier from the trusted partner matches a user identifier on record with the entity. The method includes populating entity user data for the service according to the user data received from the trusted partner responsive to successfully validation of the user identity. In embodiments, a risk analysis score is determined for the user and registration steps for registering are selected based on comparison of the registration score with a threshold.Type: ApplicationFiled: April 5, 2019Publication date: October 8, 2020Inventors: Kalyan VBH, Frank Villavicencio, Pavan Katamveera
-
Publication number: 20200236105Abstract: A method, a computer system, and a computer program product for authenticating a transaction are provided. An authentication system receives the transaction over a particular channel of a plurality of support channels. A risk score is determined for the transaction based on a number of contextual risk factors. An authentication scheme is determined from a number of authentication schemes for authenticating an identity of the user within an authentication context. The authentication scheme is determined based on the particular channel and the risk score. In response to successfully authenticating the identity of the user within the authentication context, the authentication system determines whether the transaction is a permitted transaction based on an assurance level associated with the authentication context. In response to determining that the transaction is the permitted transaction, the transaction is authenticated.Type: ApplicationFiled: January 22, 2019Publication date: July 23, 2020Inventors: Sonal Doshi, Frank Villavicencio, Suresh Bezawada
-
Patent number: 10623402Abstract: A method, a computer system, and a computer program product for authenticating a transaction are provided. An authentication system receives the transaction over a particular channel of a plurality of support channels. A risk score is determined for the transaction based on a number of contextual risk factors. An authentication scheme is determined from a number of authentication schemes for authenticating an identity of the user within an authentication context. The authentication scheme is determined based on the particular channel and the risk score. In response to successfully authenticating the identity of the user within the authentication context, the authentication system determines whether the transaction is a permitted transaction based on an assurance level associated with the authentication context. In response to determining that the transaction is the permitted transaction, the transaction is authenticated.Type: GrantFiled: April 20, 2017Date of Patent: April 14, 2020Assignee: ADP, LLCInventors: Frank Villavicencio, Zhitao Xu, Vincent Civetta, Deepak Kaushal, Nishant Kaushik
-
Publication number: 20180309752Abstract: A method, a computer system, and a computer program product for authenticating a transaction are provided. An authentication system receives the transaction over a particular channel of a plurality of support channels. A risk score is determined for the transaction based on a number of contextual risk factors. An authentication scheme is determined from a number of authentication schemes for authenticating an identity of the user within an authentication context. The authentication scheme is determined based on the particular channel and the risk score. In response to successfully authenticating the identity of the user within the authentication context, the authentication system determines whether the transaction is a permitted transaction based on an assurance level associated with the authentication context. In response to determining that the transaction is the permitted transaction, the transaction is authenticated.Type: ApplicationFiled: April 20, 2017Publication date: October 25, 2018Inventors: Frank Villavicencio, Zhitao Xu, Vincent Civetta, Deepak Kaushal, Nishant Kaushik