Patents by Inventor Paul Llamas Virgen
Paul Llamas Virgen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220121289Abstract: Described are techniques for sensor agnostic gesture detection. The techniques include recording a gesture using sensor output from a first user device to a first user profile associated with a ubiquitous gesture agent. The techniques further include associating the gesture with a triggering threshold indicating the gesture and based on the sensor output, and a processor-executable action that is executable by one of a plurality of user devices associated with the user profile. The techniques further include transforming the triggering threshold into a corresponding triggering threshold for a different type of sensor. The techniques further include identifying the gesture using data from the different type of sensor that satisfies the corresponding triggering threshold. The techniques further include implementing, by the one of the plurality of user devices, the processor-executable action associated with the gesture.Type: ApplicationFiled: October 21, 2020Publication date: April 21, 2022Inventors: PAUL LLAMAS VIRGEN, Emmanuel Barajas Gonzalez
-
Publication number: 20220114281Abstract: Selectively presenting information by generating a dictionary including information categorized as sensitive according to a participant's characteristic, generating a display matrix including display rules according to the participant's characteristics, detecting sensitive data in a presentation stream, determining display coordinates for the sensitive data, determining a presentation status for the sensitive data according to the participant's characteristics, the dictionary, the decision tree and the display matrix, and masking the presentation of the sensitive information according to the presentation status and the display coordinates.Type: ApplicationFiled: October 13, 2020Publication date: April 14, 2022Inventors: Paul Llamas Virgen, Carolina Garcia Delgado, Vladimir Garcia Saavedra, Humberto Orozco Cervantes
-
Patent number: 11263552Abstract: An embodiment of the invention may include a method, computer program product and system for computing device management. An embodiment may include preparing, by an estimated arrival time of a user at a location, at least one computing device needed by the user to perform a computing task at the location.Type: GrantFiled: November 12, 2018Date of Patent: March 1, 2022Assignee: International Business Machines CorporationInventors: Carolina Garcia Delgado, Humberto Orozco Cervantes, Jorge Adrian Meneses Barragan, Paul Llamas Virgen
-
Patent number: 11244041Abstract: A method, system, and computer program product for dynamic password generation and authentication based on morphological groupings is provided. The method receives a set of morphological groups defining a plurality of character maps. The method receives selection of a subset of morphological groups by a user from the set of morphological groups. A set of characters input from the user are identified, with the set of characters forming a user selected password. The method generates a morphological password using the set of characters and the subset of morphological groups selected by the user. The method stores the morphological password in a password repository.Type: GrantFiled: March 5, 2020Date of Patent: February 8, 2022Assignee: International Business Machines CorporationInventors: Humberto Orozco Cervantes, Carolina Garcia Delgado, Paul Llamas Virgen, Vladimir Garcia Saavedra
-
Patent number: 11212129Abstract: An embodiment for profiling virtual conference attendees to enhance meeting interactions is provided. The embodiment may include receiving permission from one or more users to monitor one or more IoT devices for data associated with each user. The embodiment may also include selecting an initial weight for the IoT devices. The embodiment may further include analyzing the data for a trigger event. The embodiment may also include in response to determining at least one of the one or more users intends to participate, adding the at least one user to a dynamic participation queue. The embodiment may further include assigning a time interval for which each user who was added to the dynamic participation queue is able to participate. The embodiment may also include creating a dynamic profile for each user in attendance.Type: GrantFiled: April 27, 2021Date of Patent: December 28, 2021Assignee: International Business Machines CorporationInventors: Slobodan Sipcic, Priyansh Jaiswal, Peeyush Jaiswal, Paul Llamas Virgen
-
Patent number: 11134081Abstract: Described are techniques for collaboration-based authentication including a method comprising storing a user profile comprising information related to a user account, a plurality of user devices, and a user calendar. The method further comprises detecting an authentication attempt associated with the user account and retrieving device information associated with a first device initiating the authentication attempt, a first location of the first device, a second location of a second device of the plurality of user devices, and a scheduled location based on the user calendar. The method further comprises determining that the authentication attempt comprises a security risk based on the device information associated with the first device, the first location of the first device, the second location of the second device, and the scheduled location. The method further comprises performing a mitigation action in response to determining that the authentication attempt comprises the security risk.Type: GrantFiled: October 31, 2019Date of Patent: September 28, 2021Assignee: International Business Machines CorporationInventors: Paul Llamas Virgen, Carolina Garcia Delgado, Humberto Orozco Cervantes
-
Publication number: 20210279324Abstract: A method, system, and computer program product for dynamic password generation and authentication based on morphological groupings is provided. The method receives a set of morphological groups defining a plurality of character maps. The method receives selection of a subset of morphological groups by a user from the set of morphological groups. A set of characters input from the user are identified, with the set of characters forming a user selected password. The method generates a morphological password using the set of characters and the subset of morphological groups selected by the user. The method stores the morphological password in a password repository.Type: ApplicationFiled: March 5, 2020Publication date: September 9, 2021Inventors: HUMBERTO OROZCO CERVANTES, CAROLINA GARCIA DELGADO, PAUL LLAMAS VIRGEN, VLADIMIR GARCIA SAAVEDRA
-
Patent number: 11056231Abstract: Embodiments describe an approach to monitoring user health data. Determining if the user is having an emergency based on the user health data. Responsive to determining the user is having an emergency the user's location. Identifying one or more available parking spaces based on the user's location, and outputting locations of one or more available parking spaces to the user.Type: GrantFiled: November 13, 2017Date of Patent: July 6, 2021Assignee: International Business Machines CorporationInventors: Peeyush Jaiswal, Priyansh Jaiswal, Burt L. Vialpando, Paul Llamas Virgen, Annita Tomko, David Jaramillo
-
Publication number: 20210136066Abstract: Described are techniques for collaboration-based authentication including a method comprising storing a user profile comprising information related to a user account, a plurality of user devices, and a user calendar. The method further comprises detecting an authentication attempt associated with the user account and retrieving device information associated with a first device initiating the authentication attempt, a first location of the first device, a second location of a second device of the plurality of user devices, and a scheduled location based on the user calendar. The method further comprises determining that the authentication attempt comprises a security risk based on the device information associated with the first device, the first location of the first device, the second location of the second device, and the scheduled location. The method further comprises performing a mitigation action in response to determining that the authentication attempt comprises the security risk.Type: ApplicationFiled: October 31, 2019Publication date: May 6, 2021Inventors: PAUL LLAMAS VIRGEN, CAROLINA GARCIA DELGADO, HUMBERTO OROZCO CERVANTES
-
Publication number: 20210126952Abstract: A processor may identify a new application on a device. The processor may receive, from the device, user data. The user data may include user profile information and user activity information. The processor may evaluate the user data. The evaluating of the user data may include designating a security level to the user data. The processor may determine, from evaluating the user data, that a default security configuration for the new application is not secure. The processor may automatically generate a customized security configuration for the new application. The processor may apply the customized security configuration to the new application.Type: ApplicationFiled: October 28, 2019Publication date: April 29, 2021Inventors: PAUL LLAMAS VIRGEN, HUMBERTO OROZCO CERVANTES, CAROLINA GARCIA DELGADO
-
Patent number: 10949787Abstract: Embodiments provide an automated participation evaluator, wherein processors are configured to evaluate participation of meeting attendees with respect to performance criteria including participation criteria and deliverable contribution criteria; populate object fields associated to ones of the performance criteria and attendees with values representing a quality of performance of the associated attendees relative to the associated performance criteria; notify the attendees of the populated object field values in response to determining that time for evaluating participation of the attendees with respect to performance criteria has not elapsed; update the populated object field values via reevaluating participation of the attendees in response to the notifying of the attendees of the populated values; and reward the attendees with reward values selected as a function of the updated, populated values, in response to determining time for evaluating the participation of the attendees with respect to each of theType: GrantFiled: July 31, 2018Date of Patent: March 16, 2021Assignee: International Business Machines CorporationInventors: Peeyush Jaiswal, Priyansh Jaiswal, David Jaramillo, Paul Llamas Virgen, Annita Tomko
-
Publication number: 20200233925Abstract: A method, computer system, and a computer program product for summarizing a piece of information based on a personal learning style of a user is provided. The present invention may include summarizing to the piece of information associated with at least one information source, wherein an output is generated from the summarized piece of information. The present invention may then include generating a summary of the piece of information based on the personal learning style of the user and a plurality of data associated with the user, wherein the personal learning style of the user is determined by a personality test. The present invention may further include presenting the generated summary to the user.Type: ApplicationFiled: January 23, 2019Publication date: July 23, 2020Inventors: Perla Guadalupe Reyes Ramirez, Paul Llamas Virgen, Silvia Cristina Santa Ana Velasco, Carolina Garcia Delgado
-
Publication number: 20200151621Abstract: An embodiment of the invention may include a method, computer program product and system for computing device management. An embodiment may include preparing, by an estimated arrival time of a user at a location, at least one computing device needed by the user to perform a computing task at the location.Type: ApplicationFiled: November 12, 2018Publication date: May 14, 2020Inventors: CAROLINA GARCIA DELGADO, HUMBERTO OROZCO CERVANTES, Jorge Adrian Meneses Barragan, PAUL LLAMAS VIRGEN
-
Publication number: 20200042916Abstract: Embodiments provide an automated participation evaluator, wherein processors are configured to evaluate participation of meeting attendees with respect to performance criteria including participation criteria and deliverable contribution criteria; populate object fields associated to ones of the performance criteria and attendees with values representing a quality of performance of the associated attendees relative to the associated performance criteria; notify the attendees of the populated object field values in response to determining that time for evaluating participation of the attendees with respect to performance criteria has not elapsed; update the populated object field values via reevaluating participation of the attendees in response to the notifying of the attendees of the populated values; and reward the attendees with reward values selected as a function of the updated, populated values, in response to determining time for evaluating the participation of the attendees with respect to each of theType: ApplicationFiled: July 31, 2018Publication date: February 6, 2020Inventors: Peeyush Jaiswal, PRIYANSH JAISWAL, David Jaramillo, PAUL LLAMAS VIRGEN, Annita Tomko
-
Publication number: 20190147138Abstract: Embodiments describe an approach to monitoring user health data. Determining if the user is having an emergency based on the user health data. Responsive to determining the user is having an emergency the user's location. Identifying one or more available parking spaces based on the user's location, and outputting locations of one or more available parking spaces to the user.Type: ApplicationFiled: November 13, 2017Publication date: May 16, 2019Inventors: Peeyush Jaiswal, Priyansh Jaiswal, Burt L. Vialpando, Paul Llamas Virgen, Annita Tomko, David Jaramillo
-
Patent number: 10013570Abstract: Disclosed aspects relate to data management for a mass storage device. The mass storage device may be structured to include an encrypted file system to store a set of data and a token analyzer to manage access to the encrypted file system. A connection between the mass storage device and a computing device may be sensed. In response to sensing the connection, a token corresponding with the computing device may be detected. Based on the token, the token analyzer may determine to provide the computing device a set of selected permissions to the encrypted file system. The set of selected permissions to the encrypted file system may be provided by the mass storage device to the computing device.Type: GrantFiled: May 9, 2016Date of Patent: July 3, 2018Assignee: International Business Machines CorporationInventors: Guillermo Hernandez Gonzalez, Paul Llamas Virgen, Humberto Orozco Cervantes
-
Publication number: 20180101577Abstract: A method for modifying an application behavior based on a plurality of user specific data is provided. The method may include receiving a plurality of user specific data. The method may also include storing the received plurality of user specific data in a database. The method may further include determining a user mood based on the stored plurality of user specific data. The method may also include transmitting an action to an application corresponding to the determined user mood.Type: ApplicationFiled: October 12, 2016Publication date: April 12, 2018Inventors: Peeyush Jaiswal, Priyansh Jaiswal, David Jaramillo, Paul Llamas Virgen, Annita Tomko
-
Publication number: 20180101579Abstract: A method for modifying an application behavior based on a plurality of user specific data is provided. The method may include receiving a plurality of user specific data. The method may also include storing the received plurality of user specific data in a database. The method may further include determining a user mood based on the stored plurality of user specific data. The method may also include transmitting an action to an application corresponding to the determined user mood.Type: ApplicationFiled: December 20, 2017Publication date: April 12, 2018Inventors: Peeyush Jaiswal, Priyansh Jaiswal, David Jaramillo, Paul Llamas Virgen, Annita Tomko
-
Publication number: 20170323111Abstract: Disclosed aspects relate to data management for a mass storage device. The mass storage device may be structured to include an encrypted file system to store a set of data and a token analyzer to manage access to the encrypted file system. A connection between the mass storage device and a computing device may be sensed. In response to sensing the connection, a token corresponding with the computing device may be detected. Based on the token, the token analyzer may determine to provide the computing device a set of selected permissions to the encrypted file system. The set of selected permissions to the encrypted file system may be provided by the mass storage device to the computing device.Type: ApplicationFiled: May 9, 2016Publication date: November 9, 2017Inventors: Guillermo Hernandez Gonzalez, Paul Llamas Virgen, Humberto Orozco Cervantes
-
Publication number: 20170223116Abstract: A computer detects one or more portable computing devices in an environment. The computer receives information detailing one or more user preferences from the one or more portable computing devices. The computer determines whether to update one or more conditions of the environment based on comparing the received information to the one or more conditions of the environment. Based on determining to update the one or more conditions of the environment, the computer updates the one or more conditions of the environment.Type: ApplicationFiled: February 22, 2016Publication date: August 3, 2017Inventors: Alberto G. Herrera Chávez, Paul Llamas Virgen, Carlos A. Martínez Vázquez, Jose R. Mosqueda Mejia