Patents by Inventor SAMANEH BAYAT

SAMANEH BAYAT has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220337911
    Abstract: A computer-implemented method is disclosed. The method includes: receiving video data for a live video stream; identifying a product that is displayed in a video frame of the live video stream; obtaining identifying information for a viewer of the live video stream; determining a product variant preference for the viewer; obtaining a graphical representation of the product variant; and providing modified video data of the live video stream based on presenting the graphical representation of the product variant as overlay content for the live video stream. Related apparatuses and computer-readable media are also disclosed.
    Type: Application
    Filed: April 15, 2021
    Publication date: October 20, 2022
    Applicant: Shopify Inc.
    Inventors: Samaneh BAYAT, John Jong-Suk LEE
  • Publication number: 20220198036
    Abstract: Disclosed are systems and methods for facilitating gift purchases by a buyer on an e-commerce platform when the buyer does not know a recipient's destination address without revealing the recipient's destination address to the buyer. A computer receives information for a recipient of an online order associated with a merchant for delivery to the recipient. The computer queries a database using the recipient information to obtain the recipient's destination address. The computer generates a token corresponding to the destination address, where the token includes an obfuscated representation of the destination address. The computer transmits the token to a client device for submission of the online order for delivery to the recipient, where the token is adapted to satisfy a requirement to provide the destination address for the online order. When the computer receives the token from a merchant device, the computer presents the destination address to the merchant device.
    Type: Application
    Filed: December 21, 2020
    Publication date: June 23, 2022
    Inventor: Samaneh BAYAT
  • Patent number: 11238104
    Abstract: A computer-implemented method identifies strings of data from a database. One or more processors receive data as an input string. The processor(s) generate a first binary code using a binary locality sensitive hashing of k-grams in the input string, where the binary locality sensitive hashing on the k-grams in the input string is derived from a first set of bi-grams in the input string, a second set of bi-grams in the input string, and a quantity of intersecting bi-grams from the first set of bi-grams and the second set of bi-grams. In response to receiving a search request for a particular string, the processor(s) generate a second binary code using a binary locality sensitive hashing on the particular string, and search a database in a query process. The processor(s) then rank and return a set of similar strings found in the database.
    Type: Grant
    Filed: October 21, 2019
    Date of Patent: February 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Mohammadreza Barouni Ebrahimi, Samaneh Bayat, Obidul Islam
  • Patent number: 11030322
    Abstract: Mechanisms are provided for accessing security vulnerability issue information. The mechanisms monitor security analyst interactions with security vulnerability issues via the security management system to generate analyst interaction log data, and generate one or more security analyst models corresponding to one or more security analysts by performing a machine learning operation on the analyst interaction log data. The mechanisms generate an analyst-issue model based on the one or more security vulnerability issue models and the one or more security analyst models, and generate an issue recommendation for a security analyst based on the analyst-issue model.
    Type: Grant
    Filed: October 24, 2018
    Date of Patent: June 8, 2021
    Assignee: International Business Machines Corporation
    Inventors: Ebrahim Bagheri, Mohammadreza Barouni Ebrahimi, Samaneh Bayat, Zeinab Noorian
  • Patent number: 10831900
    Abstract: A method prevents source code from using an unsecure application program interface (API) due to a change to the source code. One or more processors and/or a user identify changes in source code. The processor(s) and/or user associate the changed code with affected APIs that are used by the changed code, and identify which commands are utilized by the changed code. The processor(s) and/or user determine that at least one command utilized by the changed code causes the source code to use an unsecure API. In response to determining that the at least one command utilized by the changed code causes the source code to use the unsecure API, the processor(s) and/or user modify the changed code to prevent the source code from using the unsecure API.
    Type: Grant
    Filed: October 10, 2019
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Mohammadreza Barouni Ebrahimi, Samaneh Bayat, Obidul Islam, Vishwanath Ramaswamy
  • Patent number: 10834118
    Abstract: A method for ambiguity resolution in retrieving security information. A unified representation model utilizing the security information mined from a group of sources is generated by a computer system, wherein the unified representation model represents terms in the security information using vectors that describe locations in space for the terms. Distances between the terms indicate correlations between the terms, and the terms are for security concepts in the security information. The computer system represents the security concepts utilizing a group of weighted graphs that identifies semantic-relatedness between the terms utilizing the vectors in the unified representation model, wherein the group of weighted graphs enables interpreting queries with reduced ambiguity. The computer system interprets a seed query utilizing the group of weighted graphs. The computer system retrieves a portion of the security information utilizing the seed query interpreted utilizing the group of weighted graphs.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ebrahim Bagheri, Mohammadreza Barouni Ebrahimi, Samaneh Bayat, Zeinab Noorian
  • Publication number: 20200134188
    Abstract: Mechanisms are provided for accessing security vulnerability issue information. The mechanisms monitor security analyst interactions with security vulnerability issues via the security management system to generate analyst interaction log data, and generate one or more security analyst models corresponding to one or more security analysts by performing a machine learning operation on the analyst interaction log data. The mechanisms generate an analyst-issue model based on the one or more security vulnerability issue models and the one or more security analyst models, and generate an issue recommendation for a security analyst based on the analyst-issue model.
    Type: Application
    Filed: October 24, 2018
    Publication date: April 30, 2020
    Inventors: Ebrahim Bagheri, Mohammadreza Barouni Ebrahimi, Samaneh Bayat, Zeinab Noorian
  • Publication number: 20200050639
    Abstract: A computer-implemented method identifies strings of data from a database. One or more processors receive data as an input string. The processor(s) generate a first binary code using a binary locality sensitive hashing of k-grams in the input string, where the binary locality sensitive hashing on the k-grams in the input string is derived from a first set of bi-grams in the input string, a second set of bi-grams in the input string, and a quantity of intersecting bi-grams from the first set of bi-grams and the second set of bi-grams. In response to receiving a search request for a particular string, the processor(s) generate a second binary code using a binary locality sensitive hashing on the particular string, and search a database in a query process. The processor(s) then rank and return a set of similar strings found in the database.
    Type: Application
    Filed: October 21, 2019
    Publication date: February 13, 2020
    Inventors: MOHAMMADREZA BAROUNI EBRAHIMI, SAMANEH BAYAT, OBIDUL ISLAM
  • Publication number: 20200042718
    Abstract: A method selectively disables commands that are utilized by changed code. One or more processors and/or a user identify changes in a source code that result in changed code in the source code. The processor(s) and/or user associate the changed code with affected application program interfaces (APIs) that are used by the changed code. The processor(s) and/or user identify which commands are utilized by the changed code, and selectively disable the commands that are utilized by the changed code while leaving all other commands enabled in the affected APIs.
    Type: Application
    Filed: October 10, 2019
    Publication date: February 6, 2020
    Inventors: MOHAMMADREZA BAROUNI EBRAHIMI, SAMANEH BAYAT, OBIDUL ISLAM, VISHWANATH RAMASWAMY
  • Patent number: 10496706
    Abstract: A computer-implemented method searches a database for a particular string. One or more processors receive data as an input string, and then identify multiple k-grams in, unique characters in, and a length of the input string. The one or more processors perform binary locality sensitive hashing on the k-grams, the unique characters, and the length for the input string, and then sum the binary locality sensitive hashings to create a first addition vector, which is used to generate a first binary vector. The same process is performed on a particular string being requested to generate a second binary vector. The one or more processors then search the database for the particular string that was requested using the second binary vector in a large scale hamming distance query process that determines a hamming distance between the first binary code and the second binary code.
    Type: Grant
    Filed: April 17, 2017
    Date of Patent: December 3, 2019
    Assignee: International Business Machines Corporation
    Inventors: Mohammadreza Barouni Ebrahimi, Samaneh Bayat, Obidul Islam
  • Patent number: 10482261
    Abstract: A computer-implemented method improves the security of a system. One or more processors identify changes in source code, resulting in changed code in the source code. The one or more processors associate the changed code with affected application program interfaces (APIs) that are used by the changed code, and then manipulate parameters within the affected APIs based on the changes in the source code. The one or more processors execute a dynamic security scan on only the affected APIs using the manipulated parameters, in order to identify security vulnerabilities in only the affected APIs. The one or more processors then modify the source code to remove the security vulnerabilities in only the affected APIs, thus improving the security of the system on which the source code is running.
    Type: Grant
    Filed: April 11, 2017
    Date of Patent: November 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Mohammadreza Barouni Ebrahimi, Samaneh Bayat, Obidul Islam, Vishwanath Ramaswamy
  • Publication number: 20190182285
    Abstract: A method for ambiguity resolution in retrieving security information. A unified representation model utilizing the security information mined from a group of sources is generated by a computer system, wherein the unified representation model represents terms in the security information using vectors that describe locations in space for the terms. Distances between the terms indicate correlations between the terms, and the terms are for security concepts in the security information. The computer system represents the security concepts utilizing a group of weighted graphs that identifies semantic-relatedness between the terms utilizing the vectors in the unified representation model, wherein the group of weighted graphs enables interpreting queries with reduced ambiguity. The computer system interprets a seed query utilizing the group of weighted graphs. The computer system retrieves a portion of the security information utilizing the seed query interpreted utilizing the group of weighted graphs.
    Type: Application
    Filed: December 11, 2017
    Publication date: June 13, 2019
    Inventors: Ebrahim Bagheri, Mohammadreza Barouni Ebrahimi, Samaneh Bayat, Zeinab Noorian
  • Publication number: 20180300429
    Abstract: A computer-implemented method searches a database for a particular string. One or more processors receive data as an input string, and then identify multiple k-grams in, unique characters in, and a length of the input string. The one or more processors perform binary locality sensitive hashing on the k-grams, the unique characters, and the length for the input string, and then sum the binary locality sensitive hashings to create a first addition vector, which is used to generate a first binary vector. The same process is performed on a particular string being requested to generate a second binary vector. The one or more processors then search the database for the particular string that was requested using the second binary vector in a large scale hamming distance query process that determines a hamming distance between the first binary code and the second binary code.
    Type: Application
    Filed: April 17, 2017
    Publication date: October 18, 2018
    Inventors: MOHAMMADREZA BAROUNI EBRAHIMI, SAMANEH BAYAT, OBIDUL ISLAM
  • Publication number: 20180293386
    Abstract: A computer-implemented method improves the security of a system. One or more processors identify changes in source code, resulting in changed code in the source code. The one or more processors associate the changed code with affected application program interfaces (APIs) that are used by the changed code, and then manipulate parameters within the affected APIs based on the changes in the source code. The one or more processors execute a dynamic security scan on only the affected APIs using the manipulated parameters, in order to identify security vulnerabilities in only the affected APIs. The one or more processors then modify the source code to remove the security vulnerabilities in only the affected APIs, thus improving the security of the system on which the source code is running.
    Type: Application
    Filed: April 11, 2017
    Publication date: October 11, 2018
    Inventors: MOHAMMADREZA BAROUNI EBRAHIMI, SAMANEH BAYAT, OBIDUL ISLAM, VISHWANATH RAMASWAMY