Patents by Inventor Judith H. Bank

Judith H. Bank has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9400186
    Abstract: Situational traveler experiences are collected over time from a number of diverse travelers. The situational traveler experiences are associated with one or more locations traversed by the number of diverse travelers using previous travel route recommendations. Contextual categories of the situational traveler experiences are identified. Historical analytics are performed on the collected situational traveler experiences within the contextual categories of the situational traveler experiences. A historically-contextual travel route suggestion, derived from the historical analytics performed on the collected situational traveler experiences within the contextual categories of the situational traveler experiences, is provided as part of a new travel route recommendation requested by a new traveler.
    Type: Grant
    Filed: February 16, 2015
    Date of Patent: July 26, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Judith H. Bank, Liam S. Harpur, Ruthie D. Lyle, Patrick J. O'Sullivan, Lin Sun
  • Publication number: 20160210593
    Abstract: Providing a requisite level of service for an electronic meeting. An embodiment can include receiving a request to schedule a first electronic meeting in a time slot, identifying an electronic meeting system to host the first electronic meeting, identifying a second electronic meeting scheduled to be hosted by the electronic meeting system in the time slot, determining an estimate of resource usage within the electronic meeting system during the time slot at least based on the second electronic meeting being scheduled to be hosted by the electronic meeting system in the time slot, comparing the estimate of resource usage with a threshold value, responsive to determining that the estimate of resource usage exceeds the threshold value, providing the requisite level of service to the first electronic meeting in the time slot by reducing anticipated resource usage of the electronic meeting system by the second electronic meeting.
    Type: Application
    Filed: March 25, 2016
    Publication date: July 21, 2016
    Inventors: Judith H. Bank, Patrick J. O'Sullivan
  • Publication number: 20160196351
    Abstract: Probable origination date may be derived by using a stream of data captured, for example, from the Internet and from other documentation sources such as historical information about a target object, its author, related environmental data, social media data, blogs, microblogs, posts, historical information, and/or other data sources. Techniques such as textual analysis, statistical analytics, and/or artificial intelligence may combine and correlate the information from data sources to extract clues that may indicate the original author and date of authorship. Based on the number of conflicting or validating references, and the relationships between them, a probability or confidence score in the accuracy of the analysis may be generated.
    Type: Application
    Filed: February 24, 2016
    Publication date: July 7, 2016
    Inventors: Judith H. Bank, Lisa M. W. Bradley, Aaron J. Quirk, Lin Sun
  • Publication number: 20160196261
    Abstract: Probable origination date may be derived by using a stream of data captured, for example, from the Internet and from other documentation sources such as historical information about a target object, its author, related environmental data, social media data, blogs, microblogs, posts, historical information, and/or other data sources. Techniques such as textual analysis, statistical analytics, and/or artificial intelligence may combine and correlate the information from data sources to extract clues that may indicate the original author and date of authorship. Based on the number of conflicting or validating references, and the relationships between them, a probability or confidence score in the accuracy of the analysis may be generated.
    Type: Application
    Filed: January 7, 2015
    Publication date: July 7, 2016
    Inventors: Judith H. Bank, Lisa M. W. Bradley, Aaron J. Quirk, Lin Sun
  • Publication number: 20160182642
    Abstract: Managing a co-browsing session of multiple users where there are multiple roles that each user may have, and each respective user has a role. Software manages a computer system to: (i) monitor the co-browsing session to detect a condition; and (ii) responsive to detection of the condition, change the role(s) of at least one user. The change of role(s) is made automatically and without human intervention.
    Type: Application
    Filed: March 3, 2016
    Publication date: June 23, 2016
    Inventors: Judith H. Bank, Lisa M. Bradley, Lin Sun
  • Publication number: 20160182612
    Abstract: A method, system, and computer program product for conforming text posted on a social networking Web site for posting on another social networking Web site. The method includes receiving text input by a user for posting on a first social networking Web site. The text is analyzed to identify topical and semantic attributes of the text that are extracted with natural language processing and semantic analysis, and then compared to a historical semantic communication style between the user and the intended recipients on one or more other target social networking Web sites. The text is then converted to have topical and semantic attributes for posting on the target social networking Web sites as appropriate for the user, recipient users and user groups, and the target Web sites.
    Type: Application
    Filed: December 18, 2014
    Publication date: June 23, 2016
    Inventors: Judith H. Bank, Lisa M.W. Bradley, Lin Sun
  • Publication number: 20160179171
    Abstract: A method, system and computer-usable medium are disclosed for detecting unanticipated consumption of power by a device. A first set of power consumption data is selected, followed by the collection of a second set of power consumption data, which respectively correspond to the consumption of a first and second amount of power by a device when it performs an authorized operation. The first and second sets of power consumption data are then compared to detect whether the second amount of power consumed is greater than the first amount of power consumed. If so, then a notification is generated, stating that the device has consumed an unanticipated greater amount of power as a result of performing the authorized operation.
    Type: Application
    Filed: December 17, 2014
    Publication date: June 23, 2016
    Applicant: International Business Machines Corporation
    Inventors: Judith H. Bank, Liam Harpur, Patrick J. O'Sullivan, Lin Sun
  • Publication number: 20160179649
    Abstract: A method, system and computer-usable medium are disclosed for detecting unanticipated consumption of power by a device. A first set of power consumption data is selected, followed by the collection of a second set of power consumption data, which respectively correspond to the consumption of a first and second amount of power by a device when it performs an authorized operation. The first and second sets of power consumption data are then compared to detect whether the second amount of power consumed is greater than the first amount of power consumed. If so, then a notification is generated, stating that the device has consumed an unanticipated greater amount of power as a result of performing the authorized operation.
    Type: Application
    Filed: July 30, 2015
    Publication date: June 23, 2016
    Inventors: Judith H. Bank, Liam Harpur, Patrick J. O'Sullivan, Lin Sun
  • Patent number: 9374421
    Abstract: A method for sharing a content item from an originator with one or more first-order recipients may include receiving a first grouping of one or more first-order recipients that is selected to receive the content item from the originator. The method may also include receiving one or more distribution objectives from the originator. The method may also include selecting a first share time for the content item. The method may also include predicting a first predicted grouping of second-order recipients derived from the first grouping of first-order recipients for the content item at the first share time. The method may also include determining whether the distribution objectives are met for the content item. The method may also include sharing the content item at the first share time in response to the distribution objectives being met for the content item.
    Type: Grant
    Filed: May 23, 2014
    Date of Patent: June 21, 2016
    Assignee: International Business Machines Corporation
    Inventors: Judith H. Bank, Liam Harpur, Ruthie D. Lyle, Patrick J. O'Sullivan, Lin Sun
  • Publication number: 20160173616
    Abstract: Communications from a primary communication session are transitioned to a secondary communication session. A primary communication from a primary communication session is detected, where the primary communication is between a first device and a second device, and where the primary communication session is a first type of communication session. A signal selecting a secondary communication session for future communications from the first device is received, where the secondary communication session is a second type of communication session that is different from the first type of communication session, and where the secondary communication session has been determined to be a preferable venue for the future communications from the first device. Future communications from the first device are then directed to the secondary communication session.
    Type: Application
    Filed: December 16, 2014
    Publication date: June 16, 2016
    Inventors: Judith H. Bank, Liam Harpur, Ruthie D. Lyle, Patrick J. O'Sullivan, Lin Sun
  • Publication number: 20160173506
    Abstract: Using a system distinct from a mobile device, the mobile device is switched from a first mode to a second mode to access a set of data storage locations in the mobile device. All malware-susceptible data stored in the set of data storage locations is received at the system from the mobile device to form received data, which is analyzed at the system to detect a malware from a set of malware in a first portion of the received data. Responsive to the analyzing, the first portion of the received data is modified at the system to form a modified first portion, wherein the modifying removes the malware from the first portion. The system stores the modified first portion in a first data storage location in the mobile device and a second portion of the received data in a second data storage location in the mobile device.
    Type: Application
    Filed: May 27, 2015
    Publication date: June 16, 2016
    Applicant: International Business Machines Corporation
    Inventors: JUDITH H. BANK, Lisa M. Bradley, Aaron J. Quirk, Lin Sun
  • Publication number: 20160171215
    Abstract: Using a system distinct from a mobile device, the mobile device is switched from a first mode to a second mode to access a set of data storage locations in the mobile device. All malware-susceptible data stored in the set of data storage locations is received at the system from the mobile device to form received data, which is analyzed at the system to detect a malware from a set of malware in a first portion of the received data. Responsive to the analyzing, the first portion of the received data is modified at the system to form a modified first portion, wherein the modifying removes the malware from the first portion. The system stores the modified first portion in a first data storage location in the mobile device and a second portion of the received data in a second data storage location in the mobile device.
    Type: Application
    Filed: December 12, 2014
    Publication date: June 16, 2016
    Applicant: International Business Machines Corporation
    Inventors: Judith H. Bank, Lisa M. Bradley, Aaron J. Quirk, Lin Sun
  • Patent number: 9367542
    Abstract: A technique for using a reference to identify permissions required to access a resource. One or more processors detect a reference in an electronic communication. The reference points to a resource stored in storage of a data processing system. The one or more processors identify a set of permissions required to access the resource pointed to by the reference in the electronic communication. The one or more processors then perform a set of access-oriented actions associated with the set of permissions.
    Type: Grant
    Filed: January 10, 2013
    Date of Patent: June 14, 2016
    Assignee: International Business Machines Corporation
    Inventors: Judith H. Bank, Liam Harpur, Ruthie D. Lyle, Patrick J. O'Sullivan, Lin Sun
  • Publication number: 20160156583
    Abstract: A method, system, and computer program product for selectively delaying social media messages in a social media environment are provided in the illustrative embodiments. A subject matter of a social media message is determined by analyzing the social media message at a first time after sending by a sender user and prior to publishing on a social media page of a receiver user. Using a delay rule related to the subject matter, a determination is made whether the publishing of the social media message on the social media page of receiver user should be delayed. Responsive to the delay rule concluding to delay the publishing, the publishing of the social media message on the social media page of the receiver user is delayed by a delay period.
    Type: Application
    Filed: December 2, 2014
    Publication date: June 2, 2016
    Applicant: International Business Machines Corporation
    Inventors: JUDITH H. BANK, Lisa M. Bradley, Aaron J. Quirk, Lin Sun
  • Patent number: 9349004
    Abstract: Provided are techniques for predicting the actions and evaluating the risk of a software install program including downloading a software installation program on a computing system, wherein execution of the software installation program installs a computing product on the computing system; disassembling the software installation program to produce a plurality of lines of instructions; analyzing each line of the plurality of lines or instructions to identify potential modifications to the computing system associated with the program; generating a report detailing the potential modifications to the computing system; and displaying the report so that a user may evaluate an impact of the potential modifications to the computing system in the event the software installation program is executed.
    Type: Grant
    Filed: December 4, 2013
    Date of Patent: May 24, 2016
    Assignee: International Business Machines Corporation
    Inventors: Judith H. Bank, Liam Harpur, Ruthie D. Lyle, Patrick J. O'Sullivan, Lin Sun
  • Publication number: 20160135031
    Abstract: A method, system and computer program product for enabling mobile computing devices to track data usage among mobile computing devices that share a data plan. A threshold amount of data to be consumed over a period of time (e.g., billing period) by the mobile computing devices belonging to the shared data plan is received. Upon receiving a message from one of these mobile computing devices that contains an identifier that indicates that the message pertains to data usage information for the shared data plan, the current data usage metrics for the mobile computing device that sent the message is retrieved from the message. The value of the aggregate data usage is updated with the retrieved data usage metrics. Actions, such as throttling the data usage, are performed in response to the aggregate data usage being within a designated amount of data to the threshold amount of data to be consumed.
    Type: Application
    Filed: May 18, 2015
    Publication date: May 12, 2016
    Inventors: Judith H. Bank, Lisa M. Bradley, Aaron J. Quirk, Lin Sun
  • Publication number: 20160134762
    Abstract: A method, system and computer program product for enabling mobile computing devices to track data usage among mobile computing devices that share a data plan. A threshold amount of data to be consumed over a period of time (e.g., billing period) by the mobile computing devices belonging to the shared data plan is received. Upon receiving a message from one of these mobile computing devices that contains an identifier that indicates that the message pertains to data usage information for the shared data plan, the current data usage metrics for the mobile computing device that sent the message is retrieved from the message. The value of the aggregate data usage is updated with the retrieved data usage metrics. Actions, such as throttling the data usage, are performed in response to the aggregate data usage being within a designated amount of data to the threshold amount of data to be consumed.
    Type: Application
    Filed: November 7, 2014
    Publication date: May 12, 2016
    Inventors: Judith H. Bank, Lisa M. Bradley, Aaron J. Quirk, Lin Sun
  • Patent number: 9338202
    Abstract: Managing a collaborative space includes providing a collaborative space in which a number of users collaborate from respective client devices, monitoring content of the collaborative space to determine a context of collaboration in the collaborative space, and changing an operation of at least one functionality of the collaborative space based on the determined context of collaboration in the collaborative space.
    Type: Grant
    Filed: August 14, 2013
    Date of Patent: May 10, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Judith H. Bank, Liam Harpur, Ruthie D. Lyle, Patrick J. O'Sullivan, Lin Sun
  • Patent number: 9317826
    Abstract: Providing a requisite level of service for an electronic meeting. An embodiment can include receiving a request to schedule a first electronic meeting in a time slot, identifying an electronic meeting system to host the first electronic meeting, identifying a second electronic meeting scheduled to be hosted by the electronic meeting system in the time slot, determining an estimate of resource usage within the electronic meeting system during the time slot at least based on the second electronic meeting being scheduled to be hosted by the electronic meeting system in the time slot, comparing the estimate of resource usage with a threshold value, responsive to determining that the estimate of resource usage exceeds the threshold value, providing the requisite level of service to the first electronic meeting in the time slot by reducing anticipated resource usage of the electronic meeting system by the second electronic meeting.
    Type: Grant
    Filed: April 30, 2013
    Date of Patent: April 19, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Judith H. Bank, Patrick J. O'Sullivan
  • Patent number: 9313282
    Abstract: Managing a co-browsing session of multiple users where there are multiple roles that each user may have, and each respective user has a role. Software manages a computer system to: (i) monitor the co-browsing session to detect a condition; and (ii) responsive to detection of the condition, change the role(s) of at least one user. The change of role(s) is made automatically and without human intervention.
    Type: Grant
    Filed: February 18, 2013
    Date of Patent: April 12, 2016
    Assignee: International Business Machines Corporation
    Inventors: Judith H. Bank, Lisa M. Bradley, Lin Sun