Patents by Inventor Luis Felipe Cabrera

Luis Felipe Cabrera has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9432459
    Abstract: A system that implements a scalable data storage service may maintain tables in a non-relational data store on behalf of clients. The system may provide a Web services interface through which service requests are received, and an API usable to request that a table be created, deleted, or described; that an item be stored, retrieved, deleted, or its attributes modified; or that a table be queried (or scanned) with filtered items and/or their attributes returned. An asynchronous workflow may be invoked to create or delete a table. Items stored in tables may be partitioned and indexed using a simple or composite primary key. The system may not impose pre-defined limits on table size, and may employ a flexible schema. The service may provide a best-effort or committed throughput model. The system may automatically scale and/or re-partition tables in response to detecting workload changes, node failures, or other conditions or anomalies.
    Type: Grant
    Filed: December 22, 2014
    Date of Patent: August 30, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Swaminathan Sivasubramanian, Stefano Stefani, Chiranjeeb Buragahain, Rande A. Blackman, Timothy Andrew Rath, Raymond S. Bradford, Grant Alexander MacDonald McAlister, Jakub Kulesza, James R. Hamilton, Luis Felipe Cabrera
  • Publication number: 20160248798
    Abstract: A method and system for automating threat model generation and pattern identification for an application includes identifying components of an application, and receiving security information that identifies whether security measures were implemented within the application to secure the application against security threats. The method further receives an identification of external events, and receiving first patterns from one or more first virtual assets. A database is populated with the first patterns and the external events and then second patterns are received and compared to the first patterns. The method and system include distributing the identification of the one of the external events to the one or more second virtual assets, if the second patterns are similar to the first patterns, according to one embodiment.
    Type: Application
    Filed: March 31, 2016
    Publication date: August 25, 2016
    Applicant: Intuit Inc.
    Inventors: Luis Felipe Cabrera, M. Shannon Lietz, Javier Godinez
  • Patent number: 9418236
    Abstract: Employment role data, trust data, and special permissions data, associated with a party is automatically obtained and/or monitored. The employment role data associated with the party, the trust data associated with the party, and the special permissions data associated with the party, is then analyzed to determine a set of allowed access permissions data to be associated with the party, the set of allowed access permissions data providing the party access to one or more resources. It is then either recommended that the set of allowed access permissions data be provided to the party, or the set of allowed access permissions data is automatically provided to the party.
    Type: Grant
    Filed: November 13, 2013
    Date of Patent: August 16, 2016
    Assignee: Intuit Inc.
    Inventors: Luis Felipe Cabrera, M. Shannon Lietz, Brad A. Rambur, Christian Price, William Q. Bonney
  • Publication number: 20160234015
    Abstract: A secure secrets proxy is instantiated in a first computing environment and includes secure secrets proxy authentication data for identifying itself to a secrets distribution management system in a second computing environment as a trusted virtual asset to receive and cache secrets data in a secure secrets cache outside the second computing environment. A virtual asset requests one or more secrets, triggering a process to authenticate the requesting virtual asset, gathering authorized secrets data representing secrets the virtual asset is allowed to have. The secure secrets proxy is provided data representing the requested secrets and stores that secrets data in the secure secrets cache of the proxy.
    Type: Application
    Filed: April 20, 2016
    Publication date: August 11, 2016
    Applicant: Intuit Inc.
    Inventors: Luis Felipe Cabrera, M. Shannon Lietz, James Armitage, Oleg Gryb, Elangovan Shanmugam, Sabu Kuruvila Philip, Brett Weaver, Thomas Bishop, Troy Otillio, Jinglei Whitehouse, Jeffrey M. Wolfe, Ankur Jain
  • Publication number: 20160234300
    Abstract: Techniques are described for managing distributed execution of programs. In some situations, the techniques include dynamically modifying the distributed program execution in various manners, such as based on monitored status information. The dynamic modifying of the distributed program execution may include adding and/or removing computing nodes from a cluster that is executing the program, modifying the amount of computing resources that are available for the distributed program execution, terminating or temporarily suspending execution of the program (e.g., if an insufficient quantity of computing nodes of the cluster are available to perform execution), etc.
    Type: Application
    Filed: April 19, 2016
    Publication date: August 11, 2016
    Inventors: Richendra Khanna, Peter Sirota, Ian P. Nowland, Richard J. Cole, Jai Vasanth, Andrew J. Hitchcock, Luis Felipe Cabrera
  • Publication number: 20160217534
    Abstract: A method and system gathers user tax data for a user, from one or more sources of tax information, to prepare the user's tax return within a tax return preparation system, in one embodiment. The method and system populate a database with relationships between existing user metadata and one or more sources of tax information, in one embodiment. The method and system analyze new user metadata for the user to identify which of the one or more sources of tax information are relevant to the user, in one embodiment. The method and system retrieve new user tax data from the identified ones of the one or more sources of tax information that are relevant to the new user metadata of the user, in one embodiment. The method and system populate the user's tax return with the new user data, within the tax return preparation system, in one embodiment.
    Type: Application
    Filed: January 28, 2015
    Publication date: July 28, 2016
    Applicant: INTUIT INC.
    Inventors: Jonathan R. Goldman, Massimo Mascaro, Luis Felipe Cabrera, William T. Laaser
  • Patent number: 9396338
    Abstract: A secure secrets proxy is instantiated in a first computing environment and includes secure secrets proxy authentication data for identifying itself to a secrets distribution management system in a second computing environment as a trusted virtual asset to receive and cache secrets data in a secure secrets cache outside the second computing environment. The secure secrets proxy requests one or more secrets to be cached and is then provided data representing the requested secrets in the secure secrets cache. The secure secrets proxy then receives secrets application request data from a second virtual asset instantiated in the first computing environment requesting one or more secrets be applied to second virtual asset data. The secure secrets proxy then obtains the required secrets from the secure secrets cache and coordinates the application of the secrets to the second virtual asset data.
    Type: Grant
    Filed: October 15, 2013
    Date of Patent: July 19, 2016
    Assignee: Intuit Inc.
    Inventors: Luis Felipe Cabrera, M. Shannon Lietz
  • Patent number: 9390288
    Abstract: Virtual asset creation data used to create a virtual asset is generated through a virtual asset creation system that includes primary virtual asset data. Secondary authentication data is also generated. When the virtual asset is launched, the secondary authentication data is passed to the virtual asset from the virtual asset creation system. The primary virtual asset data and secondary authentication data from the virtual asset creation system and the virtual asset, and/or one or more other sources associated with the virtual asset, are then sent to a virtual asset validation system through different communication channels. If the primary virtual asset data and secondary authentication data from the two sources match, or have a defined threshold level of similarity, the status of the virtual asset is transformed to the status of validated virtual asset eligible to receive sensitive data.
    Type: Grant
    Filed: November 1, 2013
    Date of Patent: July 12, 2016
    Assignee: Intuit Inc.
    Inventors: Oleg Gryb, Jinglei Whitehouse, Elangovan Shanmugam, Ankur Jain, III, Mark Basler, M. Shannon Lietz, Sabu Kuruvila Philip, Luis Felipe Cabrera, Thomas Bishop
  • Publication number: 20160197951
    Abstract: An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters, including security threat patterns, are defined and analysis trigger data is generated. The one or more analysis trigger monitoring systems are used to monitor at least a portion of the message traffic sent to, or sent from, the one or more virtual assets to detect any message including one or more of the one or more analysis trigger parameters. Any detected message is identified as a potential security threat and is assigned a threat score, which is provided to the virtual asset. A copy of at least a portion of any detected message including one or more of the one or more analysis trigger parameters is then transferred to one or more analysis systems for further analysis using a second communication channel.
    Type: Application
    Filed: March 11, 2016
    Publication date: July 7, 2016
    Applicant: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera
  • Patent number: 9384362
    Abstract: Secrets data representing one or more secrets required to access associated resources is provided along with secrets distribution policy data representing one or more secrets distribution factors used to control the distribution of the secrets. When a requesting virtual asset submits secrets request data, virtual asset profile data associated with the requesting virtual asset is obtained. The requesting virtual asset profile data is then analyzed using at least one of the secrets distribution factors to authenticate the requesting virtual asset. The requesting virtual asset profile data is then analyzed using one or more of secrets distribution factors to determine what secrets the requesting virtual asset legitimately needs. Authorized secrets data for the requesting virtual asset representing one or more authorized secrets is then generated. The requesting virtual asset is then provided access to the authorized secrets data.
    Type: Grant
    Filed: October 14, 2013
    Date of Patent: July 5, 2016
    Assignee: Intuit Inc.
    Inventors: Luis Felipe Cabrera, M. Shannon Lietz, James Armitage, Oleg Gryb, Elangovan Shanmugam, Sabu Kuruvila Philip, Brett Weaver, Thomas Bishop, Troy Otillio, Jinglei Whitehouse, Jeffrey M. Wolfe, Ankur Jain
  • Publication number: 20160180470
    Abstract: A method and system evaluates analytics modules to improve a personalization of tax questions delivered to a user in a tax return preparation system, according to one embodiment. The method and system retrieves historical tax return data and selects one or more interchangeable analytics modules for evaluation with the historical tax return data, according to one embodiment. The method and system applies the historical tax return data to the one or more analytics modules that are selected for evaluation, according to one embodiment. The method and system receives analytics outputs from the one or more analytics modules, in response to applying the historical tax return data, according to one embodiment. The method and system determines an effectiveness of each of the one or more analytics modules by correlating the analytics outputs with at least part of the historical tax return data, according to one embodiment.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Applicant: Intuit Inc.
    Inventors: Massimo Mascaro, Jonathan R. Goldman, Luis Felipe Cabrera, William T. Laaser
  • Publication number: 20160182527
    Abstract: Reference architecture pattern role data representing reference architecture pattern roles to be associated with entities taking part in the development, and/or deployment, and/or operation of an application is generated. Reference architecture pattern tier data representing reference architecture pattern tiers used to create, and/or deploy, and/or operate an application using the reference architecture pattern is generated. For each reference architecture pattern role at least one access and/or operational permission is associated with each reference architecture pattern tier. An entity is assigned one of the reference architecture pattern roles and for each reference architecture pattern tier, the entity is automatically provided the at least one access and/or operational permission associated with the reference architecture pattern role assigned to the entity.
    Type: Application
    Filed: March 2, 2016
    Publication date: June 23, 2016
    Applicant: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Christian Price, Michelle Nikulshin, Javier Godinez, Sabu Kuruvila Philip, Brad A. Rambur, Scott Cruickshanks Kennedy, Erik Thomas Naugle, William Q. Bonney
  • Publication number: 20160180062
    Abstract: Intelligent content delivery enables content to be delivered to different devices in formats appropriate for those devices based on the capabilities of those devices. A user might access the same piece of content on two different devices, and can automatically receive a higher quality format on a device capable of playing that higher quality format. The user can purchase rights to content in any format, such that as new formats emerge or the user upgrades to devices with enhanced capabilities, the user can receive the improved formats automatically without having to repurchase the content. Further, the user can pause and resume content between devices even when those devices utilize different formats, and can access content on devices not otherwise associated with the user, receiving content in formats that are appropriate for those unknown devices even if the user has not previously accessed content in those formats.
    Type: Application
    Filed: February 29, 2016
    Publication date: June 23, 2016
    Inventors: Ethan Z. Evans, Luis Felipe Cabrera, Hilliard Bruce Siegel, Peter N. DeSantis
  • Patent number: 9374389
    Abstract: Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment security compliance data for ensuring compliance with one or more application deployment security policies associated with the deployment of assets used to implement the application is generated. The asset security compliance data is then used to ensure each asset used to implement the application is created and used in compliance with asset security policies and the application deployment security compliance data is used to ensure that each asset used to implement the application is deployed in compliance with the application deployment security policies.
    Type: Grant
    Filed: April 25, 2014
    Date of Patent: June 21, 2016
    Assignee: Intuit Inc.
    Inventors: Thomas Bishop, Brett Weaver, Christian Price, Javier Godinez, Capen Brinkley, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20160173524
    Abstract: A virtual asset creation template associated with a class of virtual assets is identified and analyzed to identify and remedy vulnerabilities in the virtual asset creation template. If no vulnerability is identified in the virtual asset creation template, or once each vulnerability identified in the virtual asset creation template is remedied, each virtual asset of the virtual asset class generated using the virtual asset creation template is assigned an initial status of verified virtual asset. Instructions are generated for monitoring and detecting one or more trigger events in assets as well as instructions for implementing at least one responsive action associated with each of the one or more trigger events. Assets monitor and detect one or more trigger events and associated responsive actions are then performed upon the trigger event being detected.
    Type: Application
    Filed: February 24, 2016
    Publication date: June 16, 2016
    Applicant: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Barry J. Nisly, Ted R. Neher, III, Javier Godinez
  • Patent number: 9363145
    Abstract: Systems and methods are provided for programmatically simulating one or more system conditions for a network resource using one or more services. In one implementation, a server receives a request to initiate a treatment. The request identifies a treatment definition. The server determines, based on the treatment definition, the one or more services and deploys the one or more services to the network resource. The one or more services simulate the one or more system conditions.
    Type: Grant
    Filed: June 17, 2015
    Date of Patent: June 7, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Luis Felipe Cabrera, Peter N. De Santis
  • Publication number: 20160156671
    Abstract: A service provider computing environment includes a service provider computing device, which receives tenant secrets policies from tenants. The tenants are tenants of multi-tenant assets of a service provider. One or more data security zones in which the multi-tenant assets are located are identified. A service provider secrets policy includes data security jurisdiction zone secrets policy data for the one or more data security jurisdiction zones. The data security jurisdiction zone secrets policy data is analyzed to determine allowed secrets data with respect to each of the identified data security jurisdiction zones. The service provider computing environment determines of the tenant secrets policies satisfy the requirements of the service provider secrets policy. If the tenant secrets policies satisfy the requirements of the service provider secrets policy, the service provider computing environment allows the tenant secrets policies to be applied to tenant data or information in the multi-tenant assets.
    Type: Application
    Filed: February 3, 2016
    Publication date: June 2, 2016
    Applicant: Intuit Inc.
    Inventors: Luis Felipe Cabrera, M. Shannon Lietz
  • Publication number: 20160148322
    Abstract: A method and system selects one or more interchangeable analytics modules for use in a tax return preparation system to provide a customized electronic tax return preparation interview to a user, according to one embodiment. The method and system receive user data associated with a user, according to one embodiment. The method and system apply one of a number of selection techniques to determine which of one or more analytics modules to use within the tax return preparation system, according to one embodiment. The method and system apply the one or more analytics modules to the user data to determine the relevance of tax return preparation interview questions to the user, according to one embodiment. The method and system deliver tax return preparation interview questions to the user, based on the determined relevance of the number of tax return preparation interview questions to the user, according to one embodiment.
    Type: Application
    Filed: November 26, 2014
    Publication date: May 26, 2016
    Applicant: INTUIT INC.
    Inventors: Massimo Mascaro, Jonathan R. Goldman, Luis Felipe Cabrera, William T. Laaser
  • Patent number: 9342690
    Abstract: A method and system for providing a security threat scoring service to identify and prioritize potential security threats to an online service. The method and system include determining security threat patterns, comparing traffic to the online system with the security threat patterns, and identifying portions of the traffic as a potential security threat. The method and system include assigning a threat score to the potential security threat, and providing the threat score to the online service to enable the online service to secure against the potential security threat.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: May 17, 2016
    Assignee: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera
  • Patent number: 9330263
    Abstract: A method and system for automating threat model generation for an application includes identifying components of an application, receiving security information that identifies whether security measures were implemented within the application to secure the application against security threats, determining whether the security measures sufficiently address security risks associated with the security threats, and providing a threat model that includes a report that identifies components of the application that have been sufficiently (or insufficiently) secured from the security threats, according to one embodiment. In one embodiment, determining whether the security measures sufficiently address the security risks can include transmitting first queries, receiving responses to the first queries, and transmitting subsequent queries based at least in part on the responses to the first queries.
    Type: Grant
    Filed: May 27, 2014
    Date of Patent: May 3, 2016
    Assignee: Intuit Inc.
    Inventors: Luis Felipe Cabrera, M. Shannon Lietz, Javier Godinez