Patents by Inventor Jane B. Marcus

Jane B. Marcus has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11516164
    Abstract: A request initiated by a first user in a social network to add at least a second user of the social network as a contact of the first user in the social network can be received. A security policy for the second user can be accessed and, based on the security policy, whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request can be determined. Responsive to determining that the first user is authorized to add the second user as the contact of the first user in the social network without prompting the second user to approve the request, the second user can be added as the contact of the first user in the social network without prompting the second user to approve the request.
    Type: Grant
    Filed: August 8, 2017
    Date of Patent: November 29, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Patent number: 11176185
    Abstract: An aspect of topic generation includes parsing communications conducted by users through an application. The communications include a communication generated by a sender and response communications received from recipients in reply to the communication generated by the sender. An aspect also includes identifying keywords and indications of sentiment from the parsed communications, determining a focus of the communication generated by the sender based on the keywords identified from the parsing, and formulating a topic for a publication based on criteria including a frequency of occurrence of the keywords in the parsed communications, a threshold level of the indications of sentiment that appear in the parsed communications, and/or a number of the communications containing one or more of the keywords having corresponding timestamps that fall within a threshold period of time. An aspect further includes submitting the topic for publication to the sender.
    Type: Grant
    Filed: April 15, 2019
    Date of Patent: November 16, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Stevens, Purvi K. Trivedi
  • Publication number: 20190243849
    Abstract: An aspect of topic generation includes parsing communications conducted by users through an application. The communications include a communication generated by a sender and response communications received from recipients in reply to the communication generated by the sender. An aspect also includes identifying keywords and indications of sentiment from the parsed communications, determining a focus of the communication generated by the sender based on the keywords identified from the parsing, and formulating a topic for a publication based on criteria including a frequency of occurrence of the keywords in the parsed communications, a threshold level of the indications of sentiment that appear in the parsed communications, and/or a number of the communications containing one or more of the keywords having corresponding timestamps that fall within a threshold period of time. An aspect further includes submitting the topic for publication to the sender.
    Type: Application
    Filed: April 15, 2019
    Publication date: August 8, 2019
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Stevens, Purvi K. Trivedi
  • Patent number: 10324968
    Abstract: An aspect of topic generation includes parsing communications conducted by users through an application. The communications include a communication generated by a sender and response communications received from recipients in reply to the communication generated by the sender. An aspect also includes identifying keywords, timestamps, and indications of sentiment from the parsed communications through natural language processing, determining a focus of the communication generated by the sender based on the keywords identified from the parsing, and formulating a topic for a publication based on criteria including a frequency of occurrence of the keywords in the parsed communications, a threshold level of the indications of sentiment that appear in the parsed communications, and/or a number of the communications containing one or more of the keywords having corresponding timestamps that fall within a threshold period of time. An aspect further includes submitting the topic for publication to the sender.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: June 18, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Stevens, Purvi K. Trivedi
  • Patent number: 10165002
    Abstract: A system for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying engine to identify attributes associated with each of the user accounts of the social network, a matching engine to match the attributes associated with each of the user accounts of the social network, a determining engine to determine when one of the user accounts is an imposter account associated with identity theft of a victim account, a calculating engine to calculate a threshold, and an executing engine to execute an action against the identity theft of the victim account by the imposter account.
    Type: Grant
    Filed: February 23, 2017
    Date of Patent: December 25, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Patent number: 10165003
    Abstract: A method for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying engine to identify attributes associated with each of the user accounts of the social network, a matching engine to match the attributes associated with each of the user accounts of the social network, a determining engine to determine when one of the user accounts is an imposter account associated with identity theft of a victim account, a calculating engine to calculate a threshold, and an executing engine to execute an action against the identity theft of the victim account by the imposter account.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: December 25, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Publication number: 20180124107
    Abstract: A method for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying engine to identify attributes associated with each of the user accounts of the social network, a matching engine to match the attributes associated with each of the user accounts of the social network, a determining engine to determine when one of the user accounts is an imposter account associated with identity theft of a victim account, a calculating engine to calculate a threshold, and an executing engine to execute an action against the identity theft of the victim account by the imposter account.
    Type: Application
    Filed: December 28, 2017
    Publication date: May 3, 2018
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Stevens, Purvi K. Trivedi
  • Publication number: 20170359289
    Abstract: A request initiated by a first user in a social network to add at least a second user of the social network as a contact of the first user in the social network can be received. A security policy for the second user can be accessed and, based on the security policy, whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request can be determined. Responsive to determining that the first user is authorized to add the second user as the contact of the first user in the social network without prompting the second user to approve the request, the second user can be added as the contact of the first user in the social network without prompting the second user to approve the request.
    Type: Application
    Filed: August 8, 2017
    Publication date: December 14, 2017
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Patent number: 9769100
    Abstract: A request to add at least a second user of a social network as a contact of a first user in the social network can be received. A social hierarchy indicating a hierarchical relationship between the first user and the second user can be accessed. Based on the hierarchical relationship between the first user and the second user, whether the second user must approve the request in order for the at least second user to be added as the contact of the first user in the social network can be determined. Responsive to determining that it is not required that the at least second user must approve the request in order for the at least second user to be added as the contact of the first user in the social network, the second user can be added as the contact of the first user in the social network without prompting the second user to approve the request.
    Type: Grant
    Filed: February 27, 2017
    Date of Patent: September 19, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Publication number: 20170220675
    Abstract: An aspect of topic generation includes parsing communications conducted by users through an application. The communications include a communication generated by a sender and response communications received from recipients in reply to the communication generated by the sender. An aspect also includes identifying keywords, timestamps, and indications of sentiment from the parsed communications through natural language processing, determining a focus of the communication generated by the sender based on the keywords identified from the parsing, and formulating a topic for a publication based on criteria including a frequency of occurrence of the keywords in the parsed communications, a threshold level of the indications of sentiment that appear in the parsed communications, and/or a number of the communications containing one or more of the keywords having corresponding timestamps that fall within a threshold period of time. An aspect further includes submitting the topic for publication to the sender.
    Type: Application
    Filed: January 29, 2016
    Publication date: August 3, 2017
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Stevens, Purvi K. Trivedi
  • Patent number: 9690920
    Abstract: A secure database includes a catalog of information about one or more identity providers (IdPs) that are trusted by a service provider (SP) to authenticate users on the SP's behalf. The catalog securely stores one or more IdP configurations. An entry in the database stores information associated with the trusted IdP including artifacts to identify the IdP, artifacts used by the IdP for cryptographic operations, and a specification of one or more website(s) serviced by the trusted identity provider. Upon receipt by the SP of identity information representing a user that has authenticated to an IdP, information in the catalog of information is used to determine whether the IdP is trusted to authenticate the user on the service provider's behalf. The determination verifies that the SP uses the IdP and that a binding between an IdP identifier and at least one IdP cryptographic artifact is valid.
    Type: Grant
    Filed: August 30, 2012
    Date of Patent: June 27, 2017
    Assignee: International Business Machines Corporation
    Inventors: Jane B. Marcus, Alan D. Eldridge, David Scott Kern, Jr., Michael J. Kerrigan, Patrick Charles Mancuso, Robert John Paganetti
  • Publication number: 20170171126
    Abstract: A request to add at least a second user of a social network as a contact of a first user in the social network can be received. A social hierarchy indicating a hierarchical relationship between the first user and the second user can be accessed. Based on the hierarchical relationship between the first user and the second user, whether the second user must approve the request in order for the at least second user to be added as the contact of the first user in the social network can be determined. Responsive to determining that it is not required that the at least second user must approve the request in order for the at least second user to be added as the contact of the first user in the social network, the second user can be added as the contact of the first user in the social network without prompting the second user to approve the request.
    Type: Application
    Filed: February 27, 2017
    Publication date: June 15, 2017
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Publication number: 20170163681
    Abstract: A system for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying engine to identify attributes associated with each of the user accounts of the social network, a matching engine to match the attributes associated with each of the user accounts of the social network, a determining engine to determine when one of the user accounts is an imposter account associated with identity theft of a victim account, a calculating engine to calculate a threshold, and an executing engine to execute an action against the identity theft of the victim account by the imposter account.
    Type: Application
    Filed: February 23, 2017
    Publication date: June 8, 2017
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Patent number: 9648031
    Abstract: A method for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying engine to identify attributes associated with each of the user accounts of the social network, a matching engine to match the attributes associated with each of the user accounts of the social network, a determining engine to determine when one of the user accounts is an imposter account associated with identity theft of a victim account, a calculating engine to calculate a threshold, and an executing engine to execute an action against the identity theft of the victim account by the imposter account.
    Type: Grant
    Filed: May 11, 2015
    Date of Patent: May 9, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Patent number: 9648030
    Abstract: A system for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying engine to identify attributes associated with each of the user accounts of the social network, a matching engine to match the attributes associated with each of the user accounts of the social network, a determining engine to determine when one of the user accounts is an imposter account associated with identity theft of a victim account, a calculating engine to calculate a threshold, and an executing engine to execute an action against the identity theft of the victim account by the imposter account.
    Type: Grant
    Filed: November 11, 2014
    Date of Patent: May 9, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Patent number: 9621672
    Abstract: A request to add at least a second user of a social network as a contact of a first user in the social network can be received. A social hierarchy indicating a hierarchical relationship between the first user and the second user can be accessed. Based on the hierarchical relationship between the first user and the second user, whether the second user must approve the request in order for the at least second user to be added as the contact of the first user in the social network can be determined. Responsive to determining that it is not required that the at least second user must approve the request in order for the at least second user to be added as the contact of the first user in the social network, the second user can be added as the contact of the first user in the social network without prompting the second user to approve the request.
    Type: Grant
    Filed: May 15, 2013
    Date of Patent: April 11, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Publication number: 20160134657
    Abstract: A system for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying engine to identify attributes associated with each of the user accounts of the social network, a matching engine to match the attributes associated with each of the user accounts of the social network, a determining engine to determine when one of the user accounts is an imposter account associated with identity theft of a victim account, a calculating engine to calculate a threshold, and an executing engine to execute an action against the identity theft of the victim account by the imposter account.
    Type: Application
    Filed: November 11, 2014
    Publication date: May 12, 2016
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Publication number: 20160134645
    Abstract: A method for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying engine to identify attributes associated with each of the user accounts of the social network, a matching engine to match the attributes associated with each of the user accounts of the social network, a determining engine to determine when one of the user accounts is an imposter account associated with identity theft of a victim account, a calculating engine to calculate a threshold, and an executing engine to execute an action against the identity theft of the victim account by the imposter account.
    Type: Application
    Filed: May 11, 2015
    Publication date: May 12, 2016
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Patent number: 9160695
    Abstract: A first computer receives a first message that includes an electronic attachment from a second computer over a communications network. The first computer saves the electronic attachment in a storage device. The first computer removes the electronic attachment from the first message. The first computer adds a link to the first message; wherein the link permits access to download the saved electronic attachment. The first computer sends to a third computer the first message including the link that permits access to download the saved electronic attachment.
    Type: Grant
    Filed: January 3, 2013
    Date of Patent: October 13, 2015
    Assignee: International Business Machines Corporation
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Publication number: 20140344370
    Abstract: A request to add at least a second user of a social network as a contact of a first user in the social network can be received. A social hierarchy indicating a hierarchical relationship between the first user and the second user can be accessed. Based on the hierarchical relationship between the first user and the second user, whether the second user must approve the request in order for the at least second user to be added as the contact of the first user in the social network can be determined. Responsive to determining that it is not required that the at least second user must approve the request in order for the at least second user to be added as the contact of the first user in the social network, the second user can be added as the contact of the first user in the social network without prompting the second user to approve the request.
    Type: Application
    Filed: May 15, 2013
    Publication date: November 20, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi