Patents by Inventor VICTORIA LEE

VICTORIA LEE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230419279
    Abstract: A method for real-time billpay using credit-based products may include a billpay computer program: receiving an electronic file identifying approved merchant billpay participants from a payment processor computer program; receiving an invoice from one of the approved billpay merchant participants, the invoice comprising an embedded statement and a merchant name, an amount due, and a due date; receiving access to the invoice via a first customer user interface, wherein the first customer user interface is configured to access the embedded statement in a second customer interface, wherein the embedded statement is inaccessible to the first customer interface; presenting, in the first customer interface, the merchant name, the amount due, and the due date; receiving, from the first customer interface, approval to pay the invoice; determining that the approved billpay merchant participant is identified in the electronic file; and executing payment for the invoice via the payment processor computer program.
    Type: Application
    Filed: May 31, 2023
    Publication date: December 28, 2023
    Inventors: Andrea COUTU, Riti SINGHAL, Michael HORGAN, Othman ELGOUMHI, Rimoun GHALY, Baxter P CAMPBELL, Matthew D ROSE, Ken GUTIERREZ, Elmahdi ERRAJI, Brendan CROTTY, Bill SMART, Jeffrey LIN, O'Brian SANTOS, Abdallah Mancour BILLAH, Rachel WULF, Nicholas R APOSTOLU, Krishnan NAIR, Victoria LEE, Mark S WEBER
  • Patent number: 11405293
    Abstract: A method of information technology (IT) asset management includes using a mesh network to report IT asset management data and receiving the IT asset management data from the mesh network at a collection server.
    Type: Grant
    Filed: September 21, 2018
    Date of Patent: August 2, 2022
    Assignee: KYNDRYL, INC.
    Inventors: Denise Ann Bennett, Jose Rizaldy Dela Pena Coronel, Victoria Lee Guerra, Clifford Vernon Harris, Victor Rafael Herrero
  • Patent number: 11214672
    Abstract: Hybrid polymer-inorganic nanocolloids and methods of making them are described.
    Type: Grant
    Filed: January 14, 2019
    Date of Patent: January 4, 2022
    Assignee: THE TRUSTEES OF PRINCETON UNIVERSITY
    Inventors: Rodney D. Priestley, Robert K. Prud'homme, Victoria Lee
  • Patent number: 11170127
    Abstract: The present disclosure relates to a system, method, computer program and electronic device for managing end user data takeout. A data takeout message is communicated to one or more target subscriber entities to instruct the one or more target subscriber entities to enact a data takeout request relating to an end user. User data relating to the end user is then uploaded to a data collection database from at least some of the one or more target subscriber entities, which is then aggregated and made available for download by the end user.
    Type: Grant
    Filed: April 25, 2019
    Date of Patent: November 9, 2021
    Assignee: Schibsted Products & Technology AS
    Inventors: Narasimha Raghavan Veeraragavan, Karen Victoria Lees, Sverre Sundsdal
  • Patent number: 11157649
    Abstract: The present disclosure relates to systems, methods and computer programs for managing end user data deletion by communicating a prepare for deletion message to one or more two-step deletion subscriber entities to instruct them to prepare to enact a data deletion request, and communicate a deletion message to the one or more two-step target subscriber entities only after a ready for deletion message is received from each of the one or more two-step deletion subscriber entities.
    Type: Grant
    Filed: April 25, 2019
    Date of Patent: October 26, 2021
    Assignee: Schibsted Products & Technology AS
    Inventors: Narasimha Raghavan Veeraragavan, Karen Victoria Lees, Sverre Sundsdal
  • Patent number: 11086711
    Abstract: A cognitive automation engine receives notice that an unexpected event has occurred in a computing environment. The engine tries to address any resulting problems by running a previously generated automation script, customizing the script as required through cognitive means. If this fails, the engine forwards the script to a human expert for customization. In either case, the engine records any customization activities, extracts parameters from the recording that identify each customization step, cognitively assigns a level of risk to each step based on historical precedent, and determines whether running the customized script presents an unacceptable risk of adverse results. The system adds the revisions, other script-related information, and any results of running the revised script Loin a training corpus. The corpus is then incorporated into a machine-learning procedure that teaches the automation engine how to more intelligently customize a script the next time a similar event occurs.
    Type: Grant
    Filed: September 24, 2018
    Date of Patent: August 10, 2021
    Assignee: International Business Machines Corporation
    Inventors: Larisa Shwartz, Victor R. Herrero, Victoria Lee Guerra, Jose Rizaldy Coronel
  • Patent number: 11048807
    Abstract: Systems, computer-implemented methods and/or computer program products that facilitate protecting data security through hierarchical authorization analysis are provided. In one embodiment, a computer-implemented method comprises generating, by a system operatively coupled to a processor, a model by extracting properties of data transmitted from executing an application to learn repeated patterns; and performing, by the system, a fine-grained authorization audit by comparing the data with the model.
    Type: Grant
    Filed: September 12, 2018
    Date of Patent: June 29, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jinho Hwang, Larisa Shwartz, Victoria Lee Guerra
  • Patent number: 10970068
    Abstract: A technique relates to computer artifacts in a computer system. The technique includes creating a list of insights from artifacts, determining a similarity level between the insights of the artifacts and a predefined area of capability, comparing similarity level of insights for each of the artifacts to a threshold metric, removing artifacts having the similarity level below threshold metric such that artifacts remaining meet the threshold metric, and performing a pair-wise similarity comparison on the artifacts remaining which compares insights of the artifacts to each other to determine which ones are least common. The technique includes creating feature vectors for artifacts that are least common, determining a feature vector having a most variation in feature vectors, an artifact associated with the feature vector being determined to comprise a unique insight, and generating a unique message using the artifact associated with the feature vector being the unique insight.
    Type: Grant
    Filed: March 15, 2019
    Date of Patent: April 6, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Larisa Shwartz, John Davis, Victoria Lee Guerra, Amitkumar Paradkar
  • Patent number: 10902207
    Abstract: Embodiments are directed to computer-implemented methods of operating a monitoring host of a performance management infrastructure. The method includes receiving, using natural language processing (NLP) algorithms, training data that includes operational data and functionality data. The operational data represents natural language descriptions of performance problems identified for an application computer program running a computing system. The functionality data represents natural language descriptions of functional capabilities of the application computer program. The NLP algorithms and a classifier are used to extract features of the training data. The extracted features are used to build a semantic correlation model that includes correlated data sets, wherein each of the correlated data sets includes functionality data and operational data having a semantic correlation to functionality data.
    Type: Grant
    Filed: September 13, 2018
    Date of Patent: January 26, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Victoria Lee Guerra, Larisa Shwartz, John R. Davis, Jinho Hwang
  • Patent number: 10831930
    Abstract: The present disclosure relates to the management of end user privacy controls using a privacy broker system, method, computer program and electronic device for managing end user privacy controls of a plurality of end users across a plurality of end user services. The system is configured to receive from a publisher entity a privacy event relating to an end user of the plurality of end users, determine one or more target subscriber entities and communicate the privacy event to the one or more target subscriber entities.
    Type: Grant
    Filed: April 26, 2018
    Date of Patent: November 10, 2020
    Assignee: Schibsted Products & Technology AS
    Inventors: Narasimha Raghavan Veeraragavan, Sverre Sundsdal, Karen Victoria Lees
  • Publication number: 20200293312
    Abstract: A technique relates to computer artifacts in a computer system. The technique includes creating a list of insights from artifacts, determining a similarity level between the insights of the artifacts and a predefined area of capability, comparing similarity level of insights for each of the artifacts to a threshold metric, removing artifacts having the similarity level below threshold metric such that artifacts remaining meet the threshold metric, and performing a pair-wise similarity comparison on the artifacts remaining which compares insights of the artifacts to each other to determine which ones are least common. The technique includes creating feature vectors for artifacts that are least common, determining a feature vector having a most variation in feature vectors, an artifact associated with the feature vector being determined to comprise a unique insight, and generating a unique message using the artifact associated with the feature vector being the unique insight.
    Type: Application
    Filed: March 15, 2019
    Publication date: September 17, 2020
    Inventors: Larisa Shwartz, John Davis, Victoria Lee Guerra, Amitkumar Paradkar
  • Publication number: 20200097357
    Abstract: A cognitive automation engine receives notice that an unexpected event has occurred in a computing environment. The engine tries to address any resulting problems by running a previously generated automation script, customizing the script as required through cognitive means. If this fails, the engine forwards the script to a human expert for customization. In either case, the engine records any customization activities, extracts parameters from the recording that identify each customization step, cognitively assigns a level of risk to each step based on historical precedent, and determines whether running the customized script presents an unacceptable risk of adverse results. The system adds the revisions, other script-related information, and any results of running the revised script in a training corpus. The corpus is then incorporated into a machine-learning procedure that teaches the automation engine how to more intelligently customize a script the next time a similar event occurs.
    Type: Application
    Filed: September 24, 2018
    Publication date: March 26, 2020
    Inventors: Larisa Shwartz, Victor R. Herrero, Victoria Lee Guerra, Jose Rizaldy Coronel
  • Publication number: 20200099602
    Abstract: A method of information technology (IT) asset management includes using a mesh network to report IT asset management data and receiving the IT asset management data from the mesh network at a collection server.
    Type: Application
    Filed: September 21, 2018
    Publication date: March 26, 2020
    Inventors: Denise Ann BENNETT, Jose Rizaldy Dela Pena CORONEL, Victoria Lee GUERRA, Clifford Vernon HARRIS, Victor Rafael HERRERO
  • Publication number: 20200089761
    Abstract: Embodiments are directed to computer-implemented methods of operating a monitoring host of a performance management infrastructure. The method includes receiving, using natural language processing (NLP) algorithms, training data that includes operational data and functionality data. The operational data represents natural language descriptions of performance problems identified for an application computer program running a computing system. The functionality data represents natural language descriptions of functional capabilities of the application computer program. The NLP algorithms and a classifier are used to extract features of the training data. The extracted features are used to build a semantic correlation model that includes correlated data sets, wherein each of the correlated data sets includes functionality data and operational data having a semantic correlation to functionality data.
    Type: Application
    Filed: September 13, 2018
    Publication date: March 19, 2020
    Inventors: Victoria Lee Guerra, Larisa Shwartz, John R. Davis, Jinho Hwang
  • Publication number: 20200082104
    Abstract: Systems, computer-implemented methods and/or computer program products that facilitate protecting data security through hierarchical authorization analysis are provided. In one embodiment, a computer-implemented method comprises generating, by a system operatively coupled to a processor, a model by extracting properties of data transmitted from executing an application to learn repeated patterns; and performing, by the system, a fine-grained authorization audit by comparing the data with the model.
    Type: Application
    Filed: September 12, 2018
    Publication date: March 12, 2020
    Inventors: Jinho Hwang, Larisa Shwartz, Victoria Lee Guerra
  • Publication number: 20190332801
    Abstract: The present disclosure relates to a system, method, computer program and electronic device for managing end user data takeout. A data takeout message is communicated to one or more target subscriber entities to instruct the one or more target subscriber entities to enact a data takeout request relating to an end user. User data relating to the end user is then uploaded to a data collection database from at least some of the one or more target subscriber entities, which is then aggregated and made available for download by the end user.
    Type: Application
    Filed: April 25, 2019
    Publication date: October 31, 2019
    Inventors: Narasimha Raghavan Veeraragavan, Karen Victoria Lees, Sverre Sundsdal
  • Publication number: 20190332800
    Abstract: The present disclosure relates to systems, methods and computer programs for managing end user data deletion by communicating a prepare for deletion message to one or more two-step deletion subscriber entities to instruct them to prepare to enact a data deletion request, and communicate a deletion message to the one or more two-step target subscriber entities only after a ready for deletion message is received from each of the one or more two-step deletion subscriber entities.
    Type: Application
    Filed: April 25, 2019
    Publication date: October 31, 2019
    Inventors: Narasimha Raghavan Veeraragavan, Karen Victoria Lees, Sverre Sundsdal
  • Publication number: 20190225787
    Abstract: Hybrid polymer-inorganic nanocolloids and methods of making them are described.
    Type: Application
    Filed: January 14, 2019
    Publication date: July 25, 2019
    Applicant: The Trustees of Princeton University
    Inventors: Rodney D. Priestley, Robert K. Prud'homme, Victoria Lee
  • Patent number: 10359412
    Abstract: A method and system for detecting mercury in a hydrocarbon-containing fluid stores a sample of the hydrocarbon-containing fluid in a first reservoir. A liquid phase reagent solution is stored in a second reservoir. The liquid phase reagent solution includes nanoparticles with an affinity to mercury, wherein the nanoparticles are suspended as a colloid in the liquid phase reagent solution. The sample of the hydrocarbon-containing fluid is delivered from the first reservoir into a first port of a fluidic device while the liquid phase reagent solution is delivered from the second reservoir into a second port of the fluidic device such that the fluidic device produces slug flow. The slug flow is subject to optical analysis that determines concentration of mercury in the sample of the hydrocarbon-containing fluid.
    Type: Grant
    Filed: September 1, 2016
    Date of Patent: July 23, 2019
    Assignee: SCHLUMBERGER TECHNOLOGY CORPORATION
    Inventors: Ronald E. G. van Hal, Vincent Sieben, Cedric Floquet, Victoria Lee
  • Publication number: 20180314855
    Abstract: The present disclosure relates to the management of end user privacy controls using a privacy broker system, method, computer program and electronic device for managing end user privacy controls of a plurality of end users across a plurality of end user services. The system is configured to receive from a publisher entity a privacy event relating to an end user of the plurality of end users, determine one or more target subscriber entities and communicate the privacy event to the one or more target subscriber entities.
    Type: Application
    Filed: April 26, 2018
    Publication date: November 1, 2018
    Inventors: Narasimha Raghavan Veeraragavan, Sverre Sundsdal, Karen Victoria Lees