Patents by Inventor VICTORIA LEE
VICTORIA LEE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230419279Abstract: A method for real-time billpay using credit-based products may include a billpay computer program: receiving an electronic file identifying approved merchant billpay participants from a payment processor computer program; receiving an invoice from one of the approved billpay merchant participants, the invoice comprising an embedded statement and a merchant name, an amount due, and a due date; receiving access to the invoice via a first customer user interface, wherein the first customer user interface is configured to access the embedded statement in a second customer interface, wherein the embedded statement is inaccessible to the first customer interface; presenting, in the first customer interface, the merchant name, the amount due, and the due date; receiving, from the first customer interface, approval to pay the invoice; determining that the approved billpay merchant participant is identified in the electronic file; and executing payment for the invoice via the payment processor computer program.Type: ApplicationFiled: May 31, 2023Publication date: December 28, 2023Inventors: Andrea COUTU, Riti SINGHAL, Michael HORGAN, Othman ELGOUMHI, Rimoun GHALY, Baxter P CAMPBELL, Matthew D ROSE, Ken GUTIERREZ, Elmahdi ERRAJI, Brendan CROTTY, Bill SMART, Jeffrey LIN, O'Brian SANTOS, Abdallah Mancour BILLAH, Rachel WULF, Nicholas R APOSTOLU, Krishnan NAIR, Victoria LEE, Mark S WEBER
-
Patent number: 11405293Abstract: A method of information technology (IT) asset management includes using a mesh network to report IT asset management data and receiving the IT asset management data from the mesh network at a collection server.Type: GrantFiled: September 21, 2018Date of Patent: August 2, 2022Assignee: KYNDRYL, INC.Inventors: Denise Ann Bennett, Jose Rizaldy Dela Pena Coronel, Victoria Lee Guerra, Clifford Vernon Harris, Victor Rafael Herrero
-
Patent number: 11214672Abstract: Hybrid polymer-inorganic nanocolloids and methods of making them are described.Type: GrantFiled: January 14, 2019Date of Patent: January 4, 2022Assignee: THE TRUSTEES OF PRINCETON UNIVERSITYInventors: Rodney D. Priestley, Robert K. Prud'homme, Victoria Lee
-
Patent number: 11170127Abstract: The present disclosure relates to a system, method, computer program and electronic device for managing end user data takeout. A data takeout message is communicated to one or more target subscriber entities to instruct the one or more target subscriber entities to enact a data takeout request relating to an end user. User data relating to the end user is then uploaded to a data collection database from at least some of the one or more target subscriber entities, which is then aggregated and made available for download by the end user.Type: GrantFiled: April 25, 2019Date of Patent: November 9, 2021Assignee: Schibsted Products & Technology ASInventors: Narasimha Raghavan Veeraragavan, Karen Victoria Lees, Sverre Sundsdal
-
Patent number: 11157649Abstract: The present disclosure relates to systems, methods and computer programs for managing end user data deletion by communicating a prepare for deletion message to one or more two-step deletion subscriber entities to instruct them to prepare to enact a data deletion request, and communicate a deletion message to the one or more two-step target subscriber entities only after a ready for deletion message is received from each of the one or more two-step deletion subscriber entities.Type: GrantFiled: April 25, 2019Date of Patent: October 26, 2021Assignee: Schibsted Products & Technology ASInventors: Narasimha Raghavan Veeraragavan, Karen Victoria Lees, Sverre Sundsdal
-
Patent number: 11086711Abstract: A cognitive automation engine receives notice that an unexpected event has occurred in a computing environment. The engine tries to address any resulting problems by running a previously generated automation script, customizing the script as required through cognitive means. If this fails, the engine forwards the script to a human expert for customization. In either case, the engine records any customization activities, extracts parameters from the recording that identify each customization step, cognitively assigns a level of risk to each step based on historical precedent, and determines whether running the customized script presents an unacceptable risk of adverse results. The system adds the revisions, other script-related information, and any results of running the revised script Loin a training corpus. The corpus is then incorporated into a machine-learning procedure that teaches the automation engine how to more intelligently customize a script the next time a similar event occurs.Type: GrantFiled: September 24, 2018Date of Patent: August 10, 2021Assignee: International Business Machines CorporationInventors: Larisa Shwartz, Victor R. Herrero, Victoria Lee Guerra, Jose Rizaldy Coronel
-
Patent number: 11048807Abstract: Systems, computer-implemented methods and/or computer program products that facilitate protecting data security through hierarchical authorization analysis are provided. In one embodiment, a computer-implemented method comprises generating, by a system operatively coupled to a processor, a model by extracting properties of data transmitted from executing an application to learn repeated patterns; and performing, by the system, a fine-grained authorization audit by comparing the data with the model.Type: GrantFiled: September 12, 2018Date of Patent: June 29, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jinho Hwang, Larisa Shwartz, Victoria Lee Guerra
-
Patent number: 10970068Abstract: A technique relates to computer artifacts in a computer system. The technique includes creating a list of insights from artifacts, determining a similarity level between the insights of the artifacts and a predefined area of capability, comparing similarity level of insights for each of the artifacts to a threshold metric, removing artifacts having the similarity level below threshold metric such that artifacts remaining meet the threshold metric, and performing a pair-wise similarity comparison on the artifacts remaining which compares insights of the artifacts to each other to determine which ones are least common. The technique includes creating feature vectors for artifacts that are least common, determining a feature vector having a most variation in feature vectors, an artifact associated with the feature vector being determined to comprise a unique insight, and generating a unique message using the artifact associated with the feature vector being the unique insight.Type: GrantFiled: March 15, 2019Date of Patent: April 6, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Larisa Shwartz, John Davis, Victoria Lee Guerra, Amitkumar Paradkar
-
Patent number: 10902207Abstract: Embodiments are directed to computer-implemented methods of operating a monitoring host of a performance management infrastructure. The method includes receiving, using natural language processing (NLP) algorithms, training data that includes operational data and functionality data. The operational data represents natural language descriptions of performance problems identified for an application computer program running a computing system. The functionality data represents natural language descriptions of functional capabilities of the application computer program. The NLP algorithms and a classifier are used to extract features of the training data. The extracted features are used to build a semantic correlation model that includes correlated data sets, wherein each of the correlated data sets includes functionality data and operational data having a semantic correlation to functionality data.Type: GrantFiled: September 13, 2018Date of Patent: January 26, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victoria Lee Guerra, Larisa Shwartz, John R. Davis, Jinho Hwang
-
Patent number: 10831930Abstract: The present disclosure relates to the management of end user privacy controls using a privacy broker system, method, computer program and electronic device for managing end user privacy controls of a plurality of end users across a plurality of end user services. The system is configured to receive from a publisher entity a privacy event relating to an end user of the plurality of end users, determine one or more target subscriber entities and communicate the privacy event to the one or more target subscriber entities.Type: GrantFiled: April 26, 2018Date of Patent: November 10, 2020Assignee: Schibsted Products & Technology ASInventors: Narasimha Raghavan Veeraragavan, Sverre Sundsdal, Karen Victoria Lees
-
Publication number: 20200293312Abstract: A technique relates to computer artifacts in a computer system. The technique includes creating a list of insights from artifacts, determining a similarity level between the insights of the artifacts and a predefined area of capability, comparing similarity level of insights for each of the artifacts to a threshold metric, removing artifacts having the similarity level below threshold metric such that artifacts remaining meet the threshold metric, and performing a pair-wise similarity comparison on the artifacts remaining which compares insights of the artifacts to each other to determine which ones are least common. The technique includes creating feature vectors for artifacts that are least common, determining a feature vector having a most variation in feature vectors, an artifact associated with the feature vector being determined to comprise a unique insight, and generating a unique message using the artifact associated with the feature vector being the unique insight.Type: ApplicationFiled: March 15, 2019Publication date: September 17, 2020Inventors: Larisa Shwartz, John Davis, Victoria Lee Guerra, Amitkumar Paradkar
-
Publication number: 20200097357Abstract: A cognitive automation engine receives notice that an unexpected event has occurred in a computing environment. The engine tries to address any resulting problems by running a previously generated automation script, customizing the script as required through cognitive means. If this fails, the engine forwards the script to a human expert for customization. In either case, the engine records any customization activities, extracts parameters from the recording that identify each customization step, cognitively assigns a level of risk to each step based on historical precedent, and determines whether running the customized script presents an unacceptable risk of adverse results. The system adds the revisions, other script-related information, and any results of running the revised script in a training corpus. The corpus is then incorporated into a machine-learning procedure that teaches the automation engine how to more intelligently customize a script the next time a similar event occurs.Type: ApplicationFiled: September 24, 2018Publication date: March 26, 2020Inventors: Larisa Shwartz, Victor R. Herrero, Victoria Lee Guerra, Jose Rizaldy Coronel
-
Publication number: 20200099602Abstract: A method of information technology (IT) asset management includes using a mesh network to report IT asset management data and receiving the IT asset management data from the mesh network at a collection server.Type: ApplicationFiled: September 21, 2018Publication date: March 26, 2020Inventors: Denise Ann BENNETT, Jose Rizaldy Dela Pena CORONEL, Victoria Lee GUERRA, Clifford Vernon HARRIS, Victor Rafael HERRERO
-
Publication number: 20200089761Abstract: Embodiments are directed to computer-implemented methods of operating a monitoring host of a performance management infrastructure. The method includes receiving, using natural language processing (NLP) algorithms, training data that includes operational data and functionality data. The operational data represents natural language descriptions of performance problems identified for an application computer program running a computing system. The functionality data represents natural language descriptions of functional capabilities of the application computer program. The NLP algorithms and a classifier are used to extract features of the training data. The extracted features are used to build a semantic correlation model that includes correlated data sets, wherein each of the correlated data sets includes functionality data and operational data having a semantic correlation to functionality data.Type: ApplicationFiled: September 13, 2018Publication date: March 19, 2020Inventors: Victoria Lee Guerra, Larisa Shwartz, John R. Davis, Jinho Hwang
-
Publication number: 20200082104Abstract: Systems, computer-implemented methods and/or computer program products that facilitate protecting data security through hierarchical authorization analysis are provided. In one embodiment, a computer-implemented method comprises generating, by a system operatively coupled to a processor, a model by extracting properties of data transmitted from executing an application to learn repeated patterns; and performing, by the system, a fine-grained authorization audit by comparing the data with the model.Type: ApplicationFiled: September 12, 2018Publication date: March 12, 2020Inventors: Jinho Hwang, Larisa Shwartz, Victoria Lee Guerra
-
Publication number: 20190332801Abstract: The present disclosure relates to a system, method, computer program and electronic device for managing end user data takeout. A data takeout message is communicated to one or more target subscriber entities to instruct the one or more target subscriber entities to enact a data takeout request relating to an end user. User data relating to the end user is then uploaded to a data collection database from at least some of the one or more target subscriber entities, which is then aggregated and made available for download by the end user.Type: ApplicationFiled: April 25, 2019Publication date: October 31, 2019Inventors: Narasimha Raghavan Veeraragavan, Karen Victoria Lees, Sverre Sundsdal
-
Publication number: 20190332800Abstract: The present disclosure relates to systems, methods and computer programs for managing end user data deletion by communicating a prepare for deletion message to one or more two-step deletion subscriber entities to instruct them to prepare to enact a data deletion request, and communicate a deletion message to the one or more two-step target subscriber entities only after a ready for deletion message is received from each of the one or more two-step deletion subscriber entities.Type: ApplicationFiled: April 25, 2019Publication date: October 31, 2019Inventors: Narasimha Raghavan Veeraragavan, Karen Victoria Lees, Sverre Sundsdal
-
Publication number: 20190225787Abstract: Hybrid polymer-inorganic nanocolloids and methods of making them are described.Type: ApplicationFiled: January 14, 2019Publication date: July 25, 2019Applicant: The Trustees of Princeton UniversityInventors: Rodney D. Priestley, Robert K. Prud'homme, Victoria Lee
-
Patent number: 10359412Abstract: A method and system for detecting mercury in a hydrocarbon-containing fluid stores a sample of the hydrocarbon-containing fluid in a first reservoir. A liquid phase reagent solution is stored in a second reservoir. The liquid phase reagent solution includes nanoparticles with an affinity to mercury, wherein the nanoparticles are suspended as a colloid in the liquid phase reagent solution. The sample of the hydrocarbon-containing fluid is delivered from the first reservoir into a first port of a fluidic device while the liquid phase reagent solution is delivered from the second reservoir into a second port of the fluidic device such that the fluidic device produces slug flow. The slug flow is subject to optical analysis that determines concentration of mercury in the sample of the hydrocarbon-containing fluid.Type: GrantFiled: September 1, 2016Date of Patent: July 23, 2019Assignee: SCHLUMBERGER TECHNOLOGY CORPORATIONInventors: Ronald E. G. van Hal, Vincent Sieben, Cedric Floquet, Victoria Lee
-
Publication number: 20180314855Abstract: The present disclosure relates to the management of end user privacy controls using a privacy broker system, method, computer program and electronic device for managing end user privacy controls of a plurality of end users across a plurality of end user services. The system is configured to receive from a publisher entity a privacy event relating to an end user of the plurality of end users, determine one or more target subscriber entities and communicate the privacy event to the one or more target subscriber entities.Type: ApplicationFiled: April 26, 2018Publication date: November 1, 2018Inventors: Narasimha Raghavan Veeraragavan, Sverre Sundsdal, Karen Victoria Lees