Patents by Inventor Scott Nielsen
Scott Nielsen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11888986Abstract: Aspects of the disclosure relate to information masking. A computing platform may receive, from a user computing device, a request to access information that includes personal identifiable information (PII). The computing platform may retrieve source data comprising the PII and mask, within the source data and based on a data management policy, the PII. The computing platform may send the masked information in response to the request to access the information. The computing platform may receive a request to unmask the masked information and unmask the PII. The computing platform may log the request to unmask the masked information in an unmasking event log and send the unmasked PII in response to the request to unmask the masked information. The computing platform may apply a machine learning model to the unmasking event log to identify malicious events and trigger remediation actions based on identification of the malicious events.Type: GrantFiled: September 13, 2022Date of Patent: January 30, 2024Assignee: Bank of America CorporationInventors: Allison Zimmer, Brian H. Corr, Charlene L. Ramsue, Scott Nielsen, Thomas G. Frost, Youshika C. Scott
-
Publication number: 20230360741Abstract: In a method of molecular scaffold hopping an interface of a scheduler computer sends instructions, prepared by the scheduler computer, to a job runner computer to perform a plurality of separate computational tasks. Each of the separate computational tasks includes calculating one or more chemical properties for a query molecule or molecules in a library of molecules. One or more of the plurality of separate computational tasks performed on the job runner computer are preemptible computing instances. Status indicators sent from the job runner computer are received by the interface for each of the plurality of separate computational tasks. The indicators are one of: incomplete, completed, or failed computing instances. The interface resends the instructions to the job runner computer that correspond to the separate computational tasks having the failed computing instance indicator to increase fault-tolerance against the separate computational tasks not attaining the completed computing instance indicator.Type: ApplicationFiled: July 14, 2023Publication date: November 9, 2023Applicant: Recursion Pharmaceuticals, Inc.Inventors: Mason L. VICTORS, Nathan C. WILKINSON, Scott NIELSEN, Jorge AGUILERA-IPARRAGUIRRE
-
Patent number: 11705223Abstract: In a method of molecular scaffold hopping an interface of a scheduler computer sends instructions, prepared by the scheduler computer, to a job runner computer to perform a plurality of separate computational tasks. Each of the separate computational tasks includes calculating one or more chemical properties for a query molecule or molecules in a library of molecules. One or more of the plurality of separate computational tasks performed on the job runner computer are preemptible computing instances. Status indicators sent from the job runner computer are received by the interface for each of the plurality of separate computational tasks. The indicators are one of: incomplete, completed, or failed computing instances. The interface resends the instructions to the job runner computer that correspond to the separate computational tasks having the failed computing instance indicator to increase fault-tolerance against the separate computational tasks not attaining the completed computing instance indicator.Type: GrantFiled: November 11, 2022Date of Patent: July 18, 2023Assignee: Recursion Pharmaceuticals, Inc.Inventors: Mason L. Victors, Nathan C. Wilkinson, Scott Nielsen, Jorge Aguilera-Iparraguirre
-
Publication number: 20230077085Abstract: In a method of molecular scaffold hopping an interface of a scheduler computer sends instructions, prepared by the scheduler computer, to a job runner computer to perform a plurality of separate computational tasks. Each of the separate computational tasks includes calculating one or more chemical properties for a query molecule or molecules in a library of molecules. One or more of the plurality of separate computational tasks performed on the job runner computer are preemptible computing instances. Status indicators sent from the job runner computer are received by the interface for each of the plurality of separate computational tasks. The indicators are one of: incomplete, completed, or failed computing instances. The interface resends the instructions to the job runner computer that correspond to the separate computational tasks having the failed computing instance indicator to increase fault-tolerance against the separate computational tasks not attaining the completed computing instance indicator.Type: ApplicationFiled: November 11, 2022Publication date: March 9, 2023Applicant: Recursion Pharmaceuticals, Inc.Inventors: Mason L. Victors, Nathan C. Wilkinson, Scott Nielsen, Jorge Aguilera-Iparraguirre
-
Publication number: 20230040441Abstract: Aspects of the disclosure relate to information masking. A computing platform may receive, from a user computing device, a request to access information that includes personal identifiable information (PII). The computing platform may retrieve source data comprising the PII and mask, within the source data and based on a data management policy, the PII. The computing platform may send the masked information in response to the request to access the information. The computing platform may receive a request to unmask the masked information and unmask the PII. The computing platform may log the request to unmask the masked information in an unmasking event log and send the unmasked PII in response to the request to unmask the masked information. The computing platform may apply a machine learning model to the unmasking event log to identify malicious events and trigger remediation actions based on identification of the malicious events.Type: ApplicationFiled: September 13, 2022Publication date: February 9, 2023Inventors: Allison Zimmer, Brian H. Corr, Charlene L. Ramsue, Scott Nielsen, Thomas G. Frost, Youshika C. Scott
-
Publication number: 20230016130Abstract: Aspects of the disclosure relate to voiceprint tracking and anomaly detection. A computing platform may detect voice information from a call management system. The computing platform may establish voiceprints for employees and clients of an enterprise. The computing platform may detect a call between an employee and a caller attempting to access a client account. The computing platform may identify a first voiceprint corresponding to the employee and a second voiceprint corresponding to the caller. The computing platform may compare the second voiceprint to a known voiceprint corresponding to the client. Based on the comparison of the second voiceprint to the known voiceprint, the computing platform may determine that the second voiceprint does not match the known voiceprint. The computing platform may identify that the second voiceprint corresponds to another employee of the enterprise, and may send a security notification indicating potential unauthorized account access to an enterprise computing device.Type: ApplicationFiled: September 28, 2022Publication date: January 19, 2023Inventors: George Albero, Youshika C. Scott, Brian H. Corr, Thomas G. Frost, Scott Nielsen, Charlene L. Ramsue
-
Patent number: 11522994Abstract: Aspects of the disclosure relate to voiceprint tracking and anomaly detection. A computing platform may detect voice information from a call management system. The computing platform may establish voiceprints for employees and clients of an enterprise. The computing platform may detect a call between an employee and a caller attempting to access a client account. The computing platform may identify a first voiceprint corresponding to the employee and a second voiceprint corresponding to the caller. The computing platform may compare the second voiceprint to a known voiceprint corresponding to the client. Based on the comparison of the second voiceprint to the known voiceprint, the computing platform may determine that the second voiceprint does not match the known voiceprint. The computing platform may identify that the second voiceprint corresponds to another employee of the enterprise, and may send a security notification indicating potential unauthorized account access to an enterprise computing device.Type: GrantFiled: November 23, 2020Date of Patent: December 6, 2022Assignee: Bank of America CorporationInventors: Charlene L. Ramsue, Thomas G. Frost, Youshika C. Scott, George Albero, Brian H. Corr, Scott Nielsen
-
Patent number: 11522697Abstract: Aspects of the disclosure relate to information masking. A computing platform may receive, from a user computing device, a request to access information that includes personal identifiable information (PII). The computing platform may retrieve source data comprising the PII and mask, within the source data and based on a data management policy, the PII. The computing platform may send the masked information in response to the request to access the information. The computing platform may receive a request to unmask the masked information and unmask the PII. The computing platform may log the request to unmask the masked information in an unmasking event log and send the unmasked PII in response to the request to unmask the masked information. The computing platform may apply a machine learning model to the unmasking event log to identify malicious events and trigger remediation actions based on identification of the malicious events.Type: GrantFiled: April 16, 2021Date of Patent: December 6, 2022Assignee: Bank of America CorporationInventors: Allison Zimmer, Brian H. Corr, Charlene L. Ramsue, Scott Nielsen, Thomas G. Frost, Youshika C. Scott
-
Patent number: 11501853Abstract: In a method of molecular scaffold hopping an interface of a scheduler computer sends instructions, prepared by the scheduler computer, to a job runner computer to perform a plurality of separate computational tasks. Each of the separate computational tasks includes calculating one or more chemical properties for a query molecule or molecules in a library of molecules. One or more of the plurality of separate computational tasks performed on the job runner computer are preemptible computing instances. Status indicators sent from the job runner computer are received by the interface for each of the plurality of separate computational tasks. The indicators are one of: incomplete, completed, or failed computing instances. The interface resends the instructions to the job runner computer that correspond to the separate computational tasks having the failed computing instance indicator to increase fault-tolerance against the separate computational tasks not attaining the completed computing instance indicator.Type: GrantFiled: July 20, 2020Date of Patent: November 15, 2022Assignee: Recursion Pharmaceuticals, Inc.Inventors: Mason Victors, Nathan Wilkinson, Scott Nielsen, Jorge Aguilera-Iparraguirre
-
Publication number: 20220335155Abstract: Aspects of the disclosure relate to information masking. A user device may receive a request to access information that includes personal identifiable information (PII) and retrieve source data comprising the PII. The user device may mask, within the source data and based on a data management policy, the PII, resulting in masked information. The user device may display the masked information. The user device may receive a request to unmask the masked information and unmask the PII, resulting in unmasked PII. The user device may display the unmasked PII and send unmasking event information to a PII footprint modeling platform, which may cause the PII footprint modeling platform to: log the request to unmask the masked information in an unmasking event log, 2) apply a machine learning model to the unmasking event log to identify malicious events, and 3) trigger remediation actions based on identification of the malicious events.Type: ApplicationFiled: April 16, 2021Publication date: October 20, 2022Inventors: Allison Zimmer, Brian H. Corr, Charlene L. Ramsue, Scott Nielsen, Thomas G. Frost, Youshika C. Scott
-
Publication number: 20220337412Abstract: Aspects of the disclosure relate to information masking. A computing platform may receive, from a user computing device, a request to access information that includes personal identifiable information (PII). The computing platform may retrieve source data comprising the PII and mask, within the source data and based on a data management policy, the PII. The computing platform may send the masked information in response to the request to access the information. The computing platform may receive a request to unmask the masked information and unmask the PII. The computing platform may log the request to unmask the masked information in an unmasking event log and send the unmasked PII in response to the request to unmask the masked information. The computing platform may apply a machine learning model to the unmasking event log to identify malicious events and trigger remediation actions based on identification of the malicious events.Type: ApplicationFiled: April 16, 2021Publication date: October 20, 2022Inventors: Allison Zimmer, Brian H. Corr, Charlene L. Ramsue, Scott Nielsen, Thomas G. Frost, Youshika C. Scott
-
Publication number: 20220166872Abstract: Aspects of the disclosure relate to voiceprint tracking and anomaly detection. A computing platform may detect voice information from a call management system. The computing platform may establish voiceprints for employees and clients of an enterprise. The computing platform may detect a call between an employee and a caller attempting to access a client account. The computing platform may identify a first voiceprint corresponding to the employee and a second voiceprint corresponding to the caller. The computing platform may compare the second voiceprint to a known voiceprint corresponding to the client. Based on the comparison of the second voiceprint to the known voiceprint, the computing platform may determine that the second voiceprint does not match the known voiceprint. The computing platform may identify that the second voiceprint corresponds to another employee of the enterprise, and may send a security notification indicating potential unauthorized account access to an enterprise computing device.Type: ApplicationFiled: November 23, 2020Publication date: May 26, 2022Inventors: Charlene L. Ramsue, Thomas G. Frost, Youshika C. Scott, George Albero, Brian H. Corr, Scott Nielsen
-
Publication number: 20220020453Abstract: Method and apparatus for molecular scaffold hopping. Sending instructions, from an interface of a scheduler computer to a job runner computer, the instructions prepared by a processor of the scheduler computer, to perform a plurality of separate computational tasks, wherein each of the separate computational tasks includes calculating one or more chemical properties for a query molecule or for molecules in a library of molecules, wherein one or more of the plurality of separate computational tasks performed on the job runner computer are preemptible computing instances. Receiving status indicators, by the interface, the status indicators sent from the job runner computer, for each of the plurality of separate computational tasks, the indicators are one of: incomplete, completed or failed computing instances.Type: ApplicationFiled: July 20, 2020Publication date: January 20, 2022Inventors: Mason Victors, Nathan Wilkinson, Scott Nielsen, Jorge Aguilera-Iparraguirre
-
Publication number: 20200004798Abstract: Embodiments as disclosed provide improved RPA systems and methods that utilize a set of reusable modules. These modules may include an associated set of configurable parameters and be associated with instructions for a browser automation platform. An RPA application to accomplish a task at a target website is built using these modules. The RPA application may be executed at the RPA system using an instance of a browser. The RPA application can be executed by evaluating an identified module of the RPA application based on the configuration parameters to determine instructions for a browser automation platform for the identified module. These browser automation platform instructions can then be provided to the browser automation platform to execute against the browser instance.Type: ApplicationFiled: June 26, 2019Publication date: January 2, 2020Inventors: Scott Nielsen Weinert, JR., Sean Michael Hill, Kris Golez Doromal
-
Patent number: 10124822Abstract: A trailer dolly can include various features to be adjustable between a manual configuration and a vehicular towing configuration. In the manual configuration, a user can manually maneuver the trailer dolly to position the trailer, such as by using one or more retractable handles. Where the user desires to maneuver the trailer with a vehicle, the trailer dolly can be adjusted to the vehicle towing configuration. In an example, the trailer dolly can be coupled to the vehicle with a second hitch attached to the trailer dolly, the second hitch located distally along the tow bar with respect to the trailer hitch supporting the trailer load. Accordingly, the trailer dolly can be used for both manual and vehicular applications and the user can transition between the manual and vehicular configurations while the trailer is hitched to the trailer dolly.Type: GrantFiled: March 20, 2017Date of Patent: November 13, 2018Assignee: Shanghai Cartec Industrial and Trading Co., Ltd.Inventors: Scott Nielsen, Yonghua Xie
-
Publication number: 20170267299Abstract: A trailer dolly can include various features to be adjustable between a manual configuration and a vehicular towing configuration. In the manual configuration, a user can manually maneuver the trailer dolly to position the trailer, such as by using one or more retractable handles. Where the user desires to maneuver the trailer with a vehicle, the trailer dolly can be adjusted to the vehicle towing configuration. In an example, the trailer dolly can be coupled to the vehicle with a second hitch attached to the trailer dolly, the second hitch located distally along the tow bar with respect to the trailer hitch supporting the trailer load. Accordingly, the trailer dolly can be used for both manual and vehicular applications and the user can transition between the manual and vehicular configurations while the trailer is hitched to the trailer dolly.Type: ApplicationFiled: March 20, 2017Publication date: September 21, 2017Inventors: Scott Nielsen, Yonghua Xie
-
Publication number: 20170036119Abstract: Virtual card play based interactive gaming experiences are described herein. Some methods include selecting one or more skills for each of the pair of virtual cards, conducting a virtual card battle using the pair of virtual cards that includes a comparative analysis of the pair or virtual cards using the one or more skills for each of the pair of virtual cards to establish a differential value, and creating a virtual activity having a selected difficulty level, using the differential value. The virtual activity is an interactive version of the virtual card battle.Type: ApplicationFiled: July 29, 2016Publication date: February 9, 2017Inventors: Scott Nielsen, Jamie Ip, Mike Inglehart
-
Patent number: 9047392Abstract: A system and method for performing real-time conversion of data which is present in the form of messages on JMS-compliant or other messaging systems into database transactions; which can then subsequently be applied to multiple heterogeneous databases or other systems. In accordance with an embodiment, the invention provides a means by which data can be read from messages in a messaging system, and converted to a set of database operations that are then stored as a persistent trail file. The operations can then be routed via a network and applied to target systems as required, for example to maintain a replicated set of information at one or more different or heterogeneous systems. The data in the message can be formatted in a variety of ways, for example, as fixed width, delimited, or XML data, and the system can be configured to convert this data as appropriate.Type: GrantFiled: December 5, 2013Date of Patent: June 2, 2015Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Stephen Wilkes, Michael Scott Nielsen, Codin Pora
-
Publication number: 20140172886Abstract: A system and method for performing real-time conversion of data which is present in the form of messages on JMS-compliant or other messaging systems into database transactions; which can then subsequently be applied to multiple heterogeneous databases or other systems. In accordance with an embodiment, the invention provides a means by which data can be read from messages in a messaging system, and converted to a set of database operations that are then stored as a persistent trail file. The operations can then be routed via a network and applied to target systems as required, for example to maintain a replicated set of information at one or more different or heterogeneous systems. The data in the message can be formatted in a variety of ways, for example, as fixed width, delimited, or XML data, and the system can be configured to convert this data as appropriate.Type: ApplicationFiled: December 5, 2013Publication date: June 19, 2014Applicant: Oracle International CorporationInventors: Stephen Wilkes, Michael Scott Nielsen, Codin Pora
-
Patent number: 8626778Abstract: A system and method for performing real-time conversion of data which is present in the form of messages on JMS-compliant or other messaging systems into database transactions, which can then subsequently be applied to multiple heterogeneous databases or other systems. In accordance with an embodiment, the invention provides a means by which data can be read from messages, and converted to a set of database operations that are then stored as a persistent trail file (for example, as an Oracle GoldenGate trail file). The operations, as recorded in the trail file, can then be routed via a network and applied to target systems as required. In accordance with an embodiment, the data can be read in real-time from the messaging system, and written out as quickly as it can be consumed to the persistent trail files.Type: GrantFiled: March 30, 2011Date of Patent: January 7, 2014Assignee: Oracle International CorporationInventors: Stephen Wilkes, Michael Scott Nielsen, Codin Pora