Patents by Inventor Paul Llamas Virgen
Paul Llamas Virgen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240106929Abstract: The invention discloses a computer-implemented method, computer program product, and computer system, for utilizing a hypervisor installed on a smartphone running separate virtual machines (VMs), one configured for personal use and another for work use, thereby allowing for separate operating environments on one piece of hardware. The method includes receiving one or more notifications, or calls, on the smartphone and determining whether the one or more notifications, or calls, are during work hours. The method selects, automatically, the work VM as default if the one or more notifications, or calls, are during work hours. If the one or more notifications, or calls, are not during work hours, the method automatically selects the personal VM as default. The method further notifies a user to switch VMs if the one or more notifications, or calls, occur during a time that is a non-default VM.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Inventors: Derek Brewer, Robert Wilhelm, Jon D Gullixson, Paul Llamas Virgen
-
Patent number: 11921889Abstract: Selectively presenting information by generating a dictionary including information categorized as sensitive according to a participant's characteristic, generating a display matrix including display rules according to the participant's characteristics, detecting sensitive data in a presentation stream, determining display coordinates for the sensitive data, determining a presentation status for the sensitive data according to the participant's characteristics, the dictionary, the decision tree and the display matrix, and masking the presentation of the sensitive information according to the presentation status and the display coordinates.Type: GrantFiled: October 13, 2020Date of Patent: March 5, 2024Assignee: International Business Machines CorporationInventors: Paul Llamas Virgen, Carolina Garcia Delgado, Vladimir Garcia Saavedra, Humberto Orozco Cervantes
-
Publication number: 20240070255Abstract: Provided are techniques for continuous authentication for a real time hologram. A request and a hologram are received, where the hologram is embedded with a first key phrase in accordance with a first sequence, and where the first sequence indicates which portions of the first key phrase are embedded in specific locations of the hologram. A first seed and a second seed are retrieved. A second key phrase is generated using the first seed. A second sequence is generated using the second seed. It is determined whether portions of the second key phrase are embedded in specific locations of the hologram in accordance with the second sequence. In response to determining that the portions of the second key phrase are embedded in specific locations of the hologram in accordance with the second sequence, the hologram is displayed, and the request is processed. Otherwise, the request is rejected.Type: ApplicationFiled: August 26, 2022Publication date: February 29, 2024Inventors: Paul LLAMAS VIRGEN, Priyansh JAISWAL, Peeyush JAISWAL
-
Patent number: 11854264Abstract: A computer that identifies the video. The computer annotates the video using a deep learning tool. The computer analyzes the annotated video to highlight a dangerous condition. The computer identifies a video from a repository with the dangerous condition. The computer analyzes the video and the video from the repository using a similarity analysis. The computer determines a score based on the annotated video and based on comparing the video to the video from the repository and based on determining the score is above a threshold value, the computer generates an action.Type: GrantFiled: June 18, 2021Date of Patent: December 26, 2023Assignee: KYNDRYL, INC.Inventors: Mauro Marzorati, Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
-
Patent number: 11833999Abstract: An approach for the unlocking a vehicle is disclosed. The approach determines a plurality of devices of one or more users and one or more unlocking protocols associated with one or more vehicles, requests a user unlock action command by at least one of the plurality of devices. The approach receives a user unlock action complete command from at least one of the plurality of devices and validates the user unlock action complete command against the one or more unlocking protocols. Finally, after successful authentication, the approach unlocks the one or more vehicles.Type: GrantFiled: August 19, 2021Date of Patent: December 5, 2023Assignee: International Business Machines CorporationInventors: John E. Moore, Jr., Humberto Orozco Cervantes, Paul Llamas Virgen, Luisa Alejandra Rizo Lameiras
-
Patent number: 11789542Abstract: Described are techniques for sensor agnostic gesture detection. The techniques include recording a gesture using sensor output from a first user device to a first user profile associated with a ubiquitous gesture agent. The techniques further include associating the gesture with a triggering threshold indicating the gesture and based on the sensor output, and a processor-executable action that is executable by one of a plurality of user devices associated with the user profile. The techniques further include transforming the triggering threshold into a corresponding triggering threshold for a different type of sensor. The techniques further include identifying the gesture using data from the different type of sensor that satisfies the corresponding triggering threshold. The techniques further include implementing, by the one of the plurality of user devices, the processor-executable action associated with the gesture.Type: GrantFiled: October 21, 2020Date of Patent: October 17, 2023Assignee: International Business Machines CorporationInventors: Paul Llamas Virgen, Emmanuel Barajas Gonzalez
-
Patent number: 11769504Abstract: A method, computer system, and a computer program product for digital remote presentation are provided. Presentation content is received that includes visual content, one or more speech triggers, and one or more presentation enhancements corresponding to the one or more speech triggers. A virtual meeting is presented by transmitting the presentation content to at least one receiver computer. A first audio file is received that includes recorded audio spoken by a presenter during the virtual meeting. From the first audio file the one or more speech triggers spoken by the presenter are identified. The respective presentation enhancement corresponding to the identified speech trigger is performed. The presentation enhancement is presented to the at least one receiver computer during the virtual meeting.Type: GrantFiled: June 23, 2021Date of Patent: September 26, 2023Assignee: International Business Machines CorporationInventors: Romelia H. Flores, Paul Llamas Virgen, Carolina Garcia Delgado, Silvia Cristina Santa Ana Velasco, Perla Guadalupe Reyes Ramirez
-
Patent number: 11748153Abstract: Technology for causing a computer system to: receive a migration plan for migration of computer data and/or computer software, generate containerized migration file(s) according to the migration plan; copy the containerized migration file(s) into a set of container(s) so that the migration plan can be implemented using a container from the set of containers; and migrate computer data and/or computer software between a source computer sub-system and a target computer sub-system using a container from the set of containers to implement the migration plan.Type: GrantFiled: November 25, 2020Date of Patent: September 5, 2023Assignee: International Business Machines CorporationInventors: Paul Llamas Virgen, Cassandra del Rocio Valadez Vital, Jorge Adrian Meneses Barragan, Francisco Pavel Reynoso Lomeli
-
Publication number: 20230245127Abstract: A computer-implemented method includes: setting up, by a computing device, an identification profile by capturing a first image using a camera of the computing device; requesting, by the computing device, an authentication action by an authentication device; comparing, by the computing device, recognized elements of the first image and a second image, the recognized elements of the first image and the second image including at least one of ephemeral features and transient features; determining, by the computing device, whether a confidence level is above a predetermined threshold based on a comparison of the recognized elements of the first image and the second image; and completing, by the computing device, authentication of the computing device with the authentication device in response to a determination that the confidence level is above the predetermined threshold.Type: ApplicationFiled: February 2, 2022Publication date: August 3, 2023Inventors: Mauro MARZORATI, Paul LLAMAS VIRGEN, Priyansh JAISWAL, Peeyush JAISWAL
-
Publication number: 20230138914Abstract: A computer receives a request to verify a location of a primary device. The computer receives an Indicated Primary Device Location “IPDL”. The computer shows within a display a dynamically located virtual representation of a predetermined Astronomical Reference Object “ARO”. The virtual representation indicates a real-time offset between a Display Reference Indicator “DRI” and the ARO. The computer receives primary device orientation metadata from sensors associated with the primary device and generates a Measured Primary Device Orientation “MPDO” when the device is in a location verification orientation. The computer calculates an Expected Device Orientation “EDO” for a reference device arranged in the PDVP while at the IPDL. The computer generates a Location Verification Value “LVV” based, at least in part, on comparing the MPDO and the EDO. When the computer determines the LVV exceeds a predetermined verification threshold, providing an indication that the indicated primary device location is verified.Type: ApplicationFiled: October 28, 2021Publication date: May 4, 2023Inventors: John E. Moore, JR., Humberto Orozco Cervantes, Vladimir Garcia Saavedra, Carolina Garcia Delgado, Paul Llamas Virgen
-
Publication number: 20230065847Abstract: According to one embodiment, a method, computer system, and computer program product for network bandwidth conservation is provided. The embodiment may include monitoring eye focus of a user. The embodiment may include monitoring voice input of the user. In response to determining the eye focus of the user is on a video feed of another user for more than a threshold amount of focus time, the embodiment may include receiving the video feed of the another user. In response to determining the eye focus of the user is on a screen of a video conference and determining, based on the voice input, the user is speaking towards the screen of the video conference, the embodiment may include enabling a camera of the user and transmitting a video feed of the user.Type: ApplicationFiled: August 31, 2021Publication date: March 2, 2023Inventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, PAUL LLAMAS VIRGEN, Victor Povar
-
Publication number: 20230054649Abstract: An approach for the unlocking a vehicle is disclosed. The approach determines a plurality of devices of one or more users and one or more unlocking protocols associated with one or more vehicles, requests a user unlock action command by at least one of the plurality of devices. The approach receives a user unlock action complete command from at least one of the plurality of devices and validates the user unlock action complete command against the one or more unlocking protocols. Finally, after successful authentication, the approach unlocks the one or more vehicles.Type: ApplicationFiled: August 19, 2021Publication date: February 23, 2023Inventors: John E. Moore, JR., HUMBERTO OROZCO CERVANTES, PAUL LLAMAS VIRGEN, LUISA ALEJANDRA RIZO LAMEIRAS
-
Patent number: 11575715Abstract: A processor may identify a new application on a device. The processor may receive, from the device, user data. The user data may include user profile information and user activity information. The processor may evaluate the user data. The evaluating of the user data may include designating a security level to the user data. The processor may determine, from evaluating the user data, that a default security configuration for the new application is not secure. The processor may automatically generate a customized security configuration for the new application. The processor may apply the customized security configuration to the new application.Type: GrantFiled: October 28, 2019Date of Patent: February 7, 2023Assignee: International Business Machines CorporationInventors: Paul Llamas Virgen, Humberto Orozco Cervantes, Carolina Garcia Delgado
-
Publication number: 20220415317Abstract: A method, computer system, and a computer program product for digital remote presentation are provided. Presentation content is received that includes visual content, one or more speech triggers, and one or more presentation enhancements corresponding to the one or more speech triggers. A virtual meeting is presented by transmitting the presentation content to at least one receiver computer. A first audio file is received that includes recorded audio spoken by a presenter during the virtual meeting. From the first audio file the one or more speech triggers spoken by the presenter are identified. The respective presentation enhancement corresponding to the identified speech trigger is performed. The presentation enhancement is presented to the at least one receiver computer during the virtual meeting.Type: ApplicationFiled: June 23, 2021Publication date: December 29, 2022Inventors: Romelia H. Flores, Paul Llamas Virgen, Carolina Garcia Delgado, SILVIA CRISTINA SANTA ANA VELASCO, Perla Guadalupe Reyes Ramirez
-
Patent number: 11539810Abstract: A method for managing data streams for similar content on multiple client devices includes receiving a new request for content from a server provider. In response to determining there is an existing request associated with an existing data stream for the content from the server provider, the method includes blocking the new request. The method also includes receiving the existing data stream from the service provider for the content via an external network and performing a stream computation for the existing data stream to provide a first data stream for the existing request for the content and a second data stream for the new request for the content. The method also includes sending the first data stream for the existing request for the content to a first client device and the second data stream for the new request for the content to a second client device, via a local network.Type: GrantFiled: May 16, 2022Date of Patent: December 27, 2022Assignee: International Business Machines CorporationInventors: Peeyush Jaiswal, Priyansh Jaiswal, Paul Llamas Virgen
-
Publication number: 20220405510Abstract: A computer that identifies the video. The computer annotates the video using a deep learning tool. The computer analyzes the annotated video to highlight a dangerous condition. The computer identifies a video from a repository with the dangerous condition. The computer analyzes the video and the video from the repository using a similarity analysis. The computer determines a score based on the annotated video and based on comparing the video to the video from the repository and based on determining the score is above a threshold value, the computer generates an action.Type: ApplicationFiled: June 18, 2021Publication date: December 22, 2022Inventors: Mauro Marzorati, PAUL LLAMAS VIRGEN, Priyansh Jaiswal, Peeyush Jaiswal
-
Publication number: 20220382922Abstract: According to one embodiment, a method, computer system, and computer program product for determining packaging compatibility is provided. The embodiment may include creating a digital twin representation of a manufacturing object based on received data of the manufacturing object. The embodiment may include identifying a position of the digital twin representation within a hierarchy of associated digital twin representations. The embodiment may include monitoring for a change to the digital twin representation. The embodiment may include determining a compatibility of a changed digital twin representation within the hierarchy. In response to determining that the changed digital twin representation is incompatible within the hierarchy, the embodiment may include sending an incompatible change alert.Type: ApplicationFiled: May 25, 2021Publication date: December 1, 2022Inventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, PAUL LLAMAS VIRGEN, CAROLINA GARCIA DELGADO
-
Patent number: 11468818Abstract: A computer-implemented method includes: computing, by a computing device, average pixel colors of a plurality of windows of a screen of a device; normalizing, by the computing device, the average pixel colors of the screen of the device; converting, by the computing device, the normalized average pixel colors of the screen of the device to average pixel gray scale colors; creating, by the computing device, at least one adaptive filter which corresponds to at least one of the average pixel gray scale colors; and overlaying, by the computing device, the at least one adaptive filter to at least one window of the windows of the screen of the device.Type: GrantFiled: February 10, 2022Date of Patent: October 11, 2022Assignee: KYNDRYL, INC.Inventors: Mauro Marzorati, Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
-
Publication number: 20220164223Abstract: Technology for causing a computer system to: receive a migration plan for migration of computer data and/or computer software, generate containerized migration file(s) according to the migration plan; copy the containerized migration file(s) into a set of container(s) so that the migration plan can be implemented using a container from the set of containers; and migrate computer data and/or computer software between a source computer sub-system and a target computer sub-system using a container from the set of containers to implement the migration plan.Type: ApplicationFiled: November 25, 2020Publication date: May 26, 2022Inventors: Paul Llamas Virgen, Cassandra del Rocio Valadez Vital, Jorge Adrian Meneses Barragan, Francisco Pavel Reynoso Lomeli
-
Publication number: 20220121289Abstract: Described are techniques for sensor agnostic gesture detection. The techniques include recording a gesture using sensor output from a first user device to a first user profile associated with a ubiquitous gesture agent. The techniques further include associating the gesture with a triggering threshold indicating the gesture and based on the sensor output, and a processor-executable action that is executable by one of a plurality of user devices associated with the user profile. The techniques further include transforming the triggering threshold into a corresponding triggering threshold for a different type of sensor. The techniques further include identifying the gesture using data from the different type of sensor that satisfies the corresponding triggering threshold. The techniques further include implementing, by the one of the plurality of user devices, the processor-executable action associated with the gesture.Type: ApplicationFiled: October 21, 2020Publication date: April 21, 2022Inventors: PAUL LLAMAS VIRGEN, Emmanuel Barajas Gonzalez