Patents by Inventor Heidi Lagares-Greenblatt

Heidi Lagares-Greenblatt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170161211
    Abstract: According to one exemplary embodiment, a method for an automatic memory cloud is provided. The method may include detecting a trigger event. The method may include activating the automatic memory cloud based on detecting the trigger event. The method may include determining if new data is found on a primary device connected to the activated automatic memory cloud, wherein the new data has a data type and a data size. The method may include selecting a destination device from a plurality of secondary devices connected to the activated automatic memory cloud based on determining that the new data is found on the primary device, whereby the selected destination device has an available storage exceeding the data size and a usage type matches the data type associated with the new data. The method may include sending an instruction to transfer the new data from the primary device to the destination device.
    Type: Application
    Filed: June 29, 2016
    Publication date: June 8, 2017
    Inventors: Jessica P. Doherty, Heidi Lagares-Greenblatt, Justin A. McCoy
  • Publication number: 20170160958
    Abstract: According to one exemplary embodiment, a method for an automatic memory cloud is provided. The method may include detecting a trigger event. The method may include activating the automatic memory cloud based on detecting the trigger event. The method may include determining if new data is found on a primary device connected to the activated automatic memory cloud, wherein the new data has a data type and a data size. The method may include selecting a destination device from a plurality of secondary devices connected to the activated automatic memory cloud based on determining that the new data is found on the primary device, whereby the selected destination device has an available storage exceeding the data size and a usage type matches the data type associated with the new data. The method may include sending an instruction to transfer the new data from the primary device to the destination device.
    Type: Application
    Filed: December 3, 2015
    Publication date: June 8, 2017
    Inventors: Jessica P. Doherty, Heidi Lagares-Greenblatt, Justin A. McCoy
  • Publication number: 20170131954
    Abstract: One or more information for printing associated with one or more users is determined. One or more printers having one or more physical media associated with the one or more printers is determined. A first indication is received from a user of the one or more users to print the one or more information associated with the user. An order of the one or more information to be printed on the one or more physical media is determined. The order minimizes the usage of space on the one or more physical media.
    Type: Application
    Filed: November 6, 2015
    Publication date: May 11, 2017
    Inventors: Heidi Lagares-Greenblatt, Jenny S. Li, Xinlin Wang
  • Publication number: 20170091481
    Abstract: A computer identifies one or more privacy settings. The computer receives a query for information. The computer determines whether a response to the query satisfies the one or more privacy settings. If the computer determines that the response to the query does not satisfy the one or more privacy settings, the computer alters the response to satisfy the one or more privacy settings.
    Type: Application
    Filed: November 4, 2015
    Publication date: March 30, 2017
    Inventors: Yuk L. Chan, Heidi Lagares-Greenblatt, Deepti M. Naphade
  • Publication number: 20170093926
    Abstract: A computer identifies one or more privacy settings. The computer receives a query for information. The computer determines whether a response to the query satisfies the one or more privacy settings. If the computer determines that the response to the query does not satisfy the one or more privacy settings, the computer alters the response to satisfy the one or more privacy settings.
    Type: Application
    Filed: September 30, 2015
    Publication date: March 30, 2017
    Inventors: Yuk L. Chan, Heidi Lagares-Greenblatt, Deepti M. Naphade
  • Publication number: 20170083691
    Abstract: A system and a computer program product are provided for identifying a strength of an input picture password formed by performing a sequence of gestures relative to a picture. The system includes a memory device for storing a crowdsource history of picture passwords formed by tracking a plurality of picture passwords used to authenticate a plurality of users. Each of the plurality of users has a respective user profile. The system further includes a processor-based demography-based pattern usage assessment generator for generating a demography-based pattern usage assessment by analyzing the crowd source history and the user profile of the plurality of users. The system also includes a user-perceptible indication device for providing an indication of the strength of the input picture password in accordance with the demography-based pattern usage assessment.
    Type: Application
    Filed: September 23, 2015
    Publication date: March 23, 2017
    Inventors: YUK L. CHAN, HEIDI LAGARES-GREENBLATT, DEEPTI NAPHADE
  • Publication number: 20170085592
    Abstract: A method is provided for identifying a strength of an input picture password formed by performing a sequence of gestures relative to a picture. The method includes storing, in a memory device, a crowdsource history of picture passwords formed by tracking a plurality of picture passwords used to authenticate a plurality of users. Each of the plurality of users has a respective user profile. The method further includes generating, by a processor-based demography-based pattern usage assessment generator, a demography-based pattern usage assessment by analyzing the crowd source history and the user profile of the plurality of users. The method also includes providing, by a user-perceptible indication device, an indication of the strength of the input picture password in accordance with the demography-based pattern usage assessment.
    Type: Application
    Filed: March 8, 2016
    Publication date: March 23, 2017
    Inventors: YUK L. CHAN, HEIDI LAGARES-GREENBLATT, DEEPTI NAPHADE
  • Publication number: 20170063982
    Abstract: A method, computer program product, and computer system for receiving, at a second computing device by a first computing device, an invitation to establish a peer to peer communication channel. The second computing device may accept the invitation. An application may be utilized on the second computing device. Content created by the application on the second computing device may be automatically shared with the first computing device, via the peer to peer communication channel, based upon utilization of the application on the second computing device. Access to the content may be prevented on the second computing device.
    Type: Application
    Filed: September 2, 2015
    Publication date: March 2, 2017
    Inventors: Jessica P. Doherty, Heidi Lagares-Greenblatt, Justin A. McCoy
  • Publication number: 20170063773
    Abstract: A method, computer program product, and computer system for receiving, at a second computing device by a first computing device, an invitation to establish a peer to peer communication channel. The second computing device may accept the invitation. An application may be utilized on the second computing device. Content created by the application on the second computing device may be automatically shared with the first computing device, via the peer to peer communication channel, based upon utilization of the application on the second computing device. Access to the content may be prevented on the second computing device.
    Type: Application
    Filed: October 23, 2015
    Publication date: March 2, 2017
    Inventors: Jessica P. Doherty, Heidi Lagares-Greenblatt, Justin A. McCoy
  • Publication number: 20120183270
    Abstract: A system and computer-implemented method for determining whether a user of a computer system is a human or a computer program that includes determining whether a camera device is connected with the computer system, requesting the user to perform an action and reviewing the recorded image and validating whether the requested action has been performed by the user, based on one or more of a determined level of confidence that the user is a human, and any detected error in the recorded image. The recorded image is accepted or rejected based on policy settings of a service provider in view of the one or more of the determined confidence level and any detected error in the recorded image, wherein accepting the recorded image corresponds to a determination that the user is a human.
    Type: Application
    Filed: January 14, 2011
    Publication date: July 19, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael L. Greenblatt, Heidi Lagares-Greenblatt