Patents by Inventor Youngja Park

Youngja Park has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160006730
    Abstract: A technique is provided for continuous user authentication through real-time fusion and correlation of multiple factors. Monitored data is continuously obtained from a computer. The monitored data is related to user actions on the computer of a user. A server analyzes the monitored data of the computer to execute a windowing system event sequences modality, a network footprint modality, an application specific user actions modality, and/or a forensic linguistic analysis modality for the user. The user is authenticated on the computer based on a combination of the windowing system event sequences modality, the network footprint modality, the application specific user actions modality, and/or the forensic linguistic analysis modality.
    Type: Application
    Filed: July 7, 2014
    Publication date: January 7, 2016
    Inventors: Suresh N. Chari, Pau-Chen Cheng, Lawrence Koved, Ian M. Molloy, Youngja Park
  • Publication number: 20150317309
    Abstract: A method and system for ranking query results on an electronic device includes the steps of obtaining a plurality of search results using a computer based on a query initiated by a user using a communications device. A ranking is determined of the search results based on a ranking technique using the computer. The ranking technique is based on a download tolerance factor and a predicted download time of data for viewing by the user for each of the search results. The search results are ranked and sent to the communications device for display to the user.
    Type: Application
    Filed: April 30, 2014
    Publication date: November 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Robert G. Farrell, Youngja Park
  • Publication number: 20150242486
    Abstract: Generating communities of users and discovering the expertise of those users are provided. Identifications of a plurality of users that accessed resources via a network, types of actions performed by the plurality of users on the resources, and names of the resources accessed by the plurality of users are extracted from retrieved resource access logs. The plurality of users are grouped into a plurality of different sets of users based on which resources were accessed and which type of actions were performed by each particular user within the plurality of users. The communities of users are generated based on each different set of users having a similarity with regard to the resources that were accessed and the types of actions that were performed by a particular set of users.
    Type: Application
    Filed: February 25, 2014
    Publication date: August 27, 2015
    Applicant: International Business Machines Corporation
    Inventors: Suresh N. Chari, Ian M. Molloy, Youngja Park
  • Patent number: 9014363
    Abstract: A system and method for providing an adaptive Interaction Logging functionality to help agents reduce the time spent documenting contact center interactions. In a preferred embodiment the system uses a pipeline comprising audio capture of a telephone conversation, automatic speech transcription, text normalization, transcript generation and candidate call log generation based on Real-time and Global Models. The contact center agent edits the candidate call log to create the final call log. The models are updated based on analysis of user feedback in the form of the editing of the candidate call log done by the contact center agents or supervisors. The pipeline yields a candidate call log which the agents can edit in less time than it would take them to generate a call log manually.
    Type: Grant
    Filed: December 26, 2013
    Date of Patent: April 21, 2015
    Assignee: Nuance Communications, Inc.
    Inventors: Roy Jefferson Byrd, Stephen C. Gates, Mary S. Neff, Youngja Park, Wilfried Teiken
  • Patent number: 8983877
    Abstract: Applications of machine learning techniques such as Latent Dirichlet Allocation (LDA) and author-topic models (ATM) to the problems of mining of user roles to specify access control policies from entitlement as well as logs which contain record of the usage of these entitlements are provided. In one aspect, a method for performing role mining given a plurality of users and a plurality of permissions is provided. The method includes the following steps. At least one generative machine learning technique, e.g., LDA, is used to obtain a probability distribution ? for user-to-role assignments and a probability distribution ? for role-to-permission assignments. The probability distribution ? for user-to-role assignments and the probability distribution ? for role-to-permission assignments are used to produce a final set of roles, including user-to-role assignments and role-to-permission assignments.
    Type: Grant
    Filed: March 2, 2012
    Date of Patent: March 17, 2015
    Assignee: International Business Machines Corporation
    Inventors: Suresh N. Chari, Ian Michael Molloy, Youngja Park
  • Publication number: 20150067835
    Abstract: An apparatus for detecting abnormal behavior of users is disclosed. The apparatus identifies from a log of user activity, a first number of actions performed by a user over a first time period that match a pattern of user activity for a task associated with one or more roles of the users. The apparatus also identifies from the log of user activity, a second number of actions performed by the user over a second time period that match the pattern of user activity. The apparatus calculates an amount of deviation between the first number of actions and the second number of actions. The deviation identifies a difference between amounts of time spent in the one or more roles. The apparatus then determines whether the amount of deviation between the first number of actions and the second number of actions exceeds a threshold for abnormal behavior.
    Type: Application
    Filed: September 20, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Suresh N. Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken
  • Publication number: 20150067845
    Abstract: A method for detecting abnormal behavior of users is disclosed. Processors identify from a log of user activity, a first number of actions performed by a user over a first time period that match a pattern of user activity for a task associated with one or more roles of the users. Processors also identify from the log of user activity, a second number of actions performed by the user over a second time period that match the pattern of user activity. Processors calculate an amount of deviation between the first number of actions and the second number of actions. The deviation identifies a difference between amounts of time spent in the one or more roles. Processors then determine whether the amount of deviation between the first number of actions and the second number of actions exceeds a threshold for abnormal behavior.
    Type: Application
    Filed: August 27, 2013
    Publication date: March 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Suresh N. Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken
  • Publication number: 20150058273
    Abstract: Detecting propensity profile for a person may comprise receiving artifacts associated with the person; detecting profile characteristics for the person based on the artifacts; receiving a plurality of predefined profiles comprising a plurality of characteristics and relationships between the characteristics over time, each of the plurality of predefined profiles specifying an indication of propensity; matching the profile characteristics for the person with one or more of the plurality of predefined profiles; and outputting one or more propensity indicators based on the matching, the propensity indicators comprising at least an expressed strength of a given propensity in the person at a given time.
    Type: Application
    Filed: August 20, 2013
    Publication date: February 26, 2015
    Applicant: International Business Machines Corporation
    Inventors: Anni R. Coden, Keith C. Houck, Ching-Yung Lin, Wanyi Lin, Peter K. Malkin, Shimei Pan, Youngja Park, Justin D. Weisz
  • Publication number: 20150039618
    Abstract: Automatically estimating content topics of inaccessible content in a computer system, in one aspect, may comprise gathering accessible content and analyzing the accessible content to estimate one or more topics of the inaccessible content.
    Type: Application
    Filed: September 26, 2013
    Publication date: February 5, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher Gates, Youngja Park
  • Publication number: 20150039617
    Abstract: Automatically estimating content topics of inaccessible content in a computer system, in one aspect, may comprise gathering accessible content and analyzing the accessible content to estimate one or more topics of the inaccessible content.
    Type: Application
    Filed: August 1, 2013
    Publication date: February 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Christopher Gates, Youngja Park
  • Publication number: 20140359692
    Abstract: In one aspect, a method for managing a security policy having multiple policy items includes the steps of: (a) mapping permissions to the policy items which apply to usage of the permissions so as to determine which of the permissions are granted to groups of users by each of the policy items; (b) identifying at least one of the policy items mapped in step (a) that is in violation of least privilege based on a comparison of an actual permission usage with the security policy; (c) identifying at least one of the policy items mapped in step (a) that increases operational risk; (d) verifying that policy constructs in the security policy are consistent with policy constructs inferred from the actual permission usage; and (e) identifying optimizations of the security policy based on output from one or more of steps (a)-(d).
    Type: Application
    Filed: May 29, 2013
    Publication date: December 4, 2014
    Inventors: Suresh N. Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken
  • Publication number: 20140359695
    Abstract: In one aspect, a method for managing a security policy having multiple policy items includes the steps of: (a) mapping permissions to the policy items which apply to usage of the permissions so as to determine which of the permissions are granted to groups of users by each of the policy items; (b) identifying at least one of the policy items mapped in step (a) that is in violation of least privilege based on a comparison of an actual permission usage with the security policy; (c) identifying at least one of the policy items mapped in step (a) that increases operational risk; (d) verifying that policy constructs in the security policy are consistent with policy constructs inferred from the actual permission usage; and (e) identifying optimizations of the security policy based on output from one or more of steps (a)-(d).
    Type: Application
    Filed: August 19, 2013
    Publication date: December 4, 2014
    Applicant: International Business Machines Corporation
    Inventors: Suresh N. Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken
  • Publication number: 20140304199
    Abstract: Automatically estimating a sensitivity level of an information technology (IT) asset in one aspect may obtain information about an asset. Characteristics of the asset assigned based on the information may be compared with stored characteristics of known sensitive assets. A sensitivity level of the asset may be determined based on the comparing.
    Type: Application
    Filed: August 9, 2013
    Publication date: October 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Suresh N. Chari, Christopher Gates, Stephen C. Gates, Youngja Park, Wilfried Teiken
  • Publication number: 20140304821
    Abstract: Automatically estimating a sensitivity level of an information technology (IT) asset in one aspect may obtain information about an asset. Characteristics of the asset assigned based on the information may be compared with stored characteristics of known sensitive assets. A sensitivity level of the asset may be determined based on the comparing.
    Type: Application
    Filed: July 11, 2013
    Publication date: October 9, 2014
    Inventors: Suresh N. Chari, Christopher Gates, Stephen C. Gates, Youngja Park, Wilfried Teiken
  • Patent number: 8750489
    Abstract: A system and method for automatic call segmentation including steps and means for automatically detecting boundaries between utterances in the call transcripts; automatically classifying utterances into target call sections; automatically partitioning the call transcript into call segments; and outputting a segmented call transcript. A training method and apparatus for training the system to perform automatic call segmentation includes steps and means for providing at least one training transcript with annotated call sections; normalizing the at least one training transcript; and performing statistical analysis on the at least one training transcript.
    Type: Grant
    Filed: October 23, 2008
    Date of Patent: June 10, 2014
    Assignee: International Business Machines Corporation
    Inventor: Youngja Park
  • Publication number: 20140153709
    Abstract: A system and method for providing an adaptive Interaction Logging functionality to help agents reduce the time spent documenting contact center interactions. In a preferred embodiment the system uses a pipeline comprising audio capture of a telephone conversation, automatic speech transcription, text normalization, transcript generation and candidate call log generation based on Real-time and Global Models. The contact center agent edits the candidate call log to create the final call log. The models are updated based on analysis of user feedback in the form of the editing of the candidate call log done by the contact center agents or supervisors. The pipeline yields a candidate call log which the agents can edit in less time than it would take them to generate a call log manually.
    Type: Application
    Filed: December 26, 2013
    Publication date: June 5, 2014
    Applicant: Nuance Communications, Inc.
    Inventors: Roy Jefferson Byrd, Stephen C. Gates, Mary S. Neff, Youngja Park, Wilfried Teiken
  • Patent number: 8644488
    Abstract: A system and method for providing an adaptive Interaction Logging functionality to help agents reduce the time spent documenting contact center interactions. In a preferred embodiment the system uses a pipeline comprising audio capture of a telephone conversation, automatic speech transcription, text normalization, transcript generation and candidate call log generation based on Real-time and Global Models. The contact center agent edits the candidate call log to create the final call log. The models are updated based on analysis of user feedback in the form of the editing of the candidate call log done by the contact center agents or supervisors. The pipeline yields a candidate call log which the agents can edit in less time than it would take them to generate a call log manually.
    Type: Grant
    Filed: April 23, 2009
    Date of Patent: February 4, 2014
    Assignee: Nuance Communications, Inc.
    Inventors: Roy J. Byrd, Stephen Carl Gates, Mary S. Neff, Youngja Park, Wilfried Teiken
  • Patent number: 8560722
    Abstract: Techniques for limiting the risk of loss of sensitive data from a mobile device are provided. In one aspect, a method for managing sensitive data on a mobile device is provided. The method includes the following steps. A sensitivity of a data item to be transferred to the mobile device is determined. It is determined whether an aggregate sensitivity of data items already present on the mobile device plus the data item to be transferred exceeds a current threshold sensitivity value for the mobile device. If the aggregate sensitivity exceeds the current threshold sensitivity value, measures are employed to ensure the aggregate sensitivity remains below the current threshold sensitivity value for the mobile device. Otherwise the data item is transferred to the mobile device.
    Type: Grant
    Filed: March 18, 2011
    Date of Patent: October 15, 2013
    Assignee: International Business Machines Corporation
    Inventors: Stephen Carl Gates, Youngja Park, Josyula R. Rao, Wilfried Teiken
  • Publication number: 20130097103
    Abstract: Techniques for creating training sets for predictive modeling are provided. In one aspect, a method for generating training data from an unlabeled data set is provided which includes the following steps. A small initial set of data is selected from the unlabeled data set. Labels are acquired for the initial set of data selected from the unlabeled data set resulting in labeled data. The data in the unlabeled data set is clustered using a semi-supervised clustering process along with the labeled data to produce data clusters. Data samples are chosen from each of the clusters to use as the training data. The selecting, presenting, clustering and choosing steps are repeated with one or more additional sets of data selected from the unlabeled data set until a desired amount of training data has been obtained, wherein at each iteration an amount of the labeled data is increased.
    Type: Application
    Filed: October 14, 2011
    Publication date: April 18, 2013
    Applicant: International Business Machines Corporation
    Inventors: Suresh N. Chari, Ian Michael Molloy, Youngja Park, Zijie Qi
  • Patent number: 8370155
    Abstract: A real-time method and system are described for automatically extracting text from the customer-agent interaction at a contact center, analyzing the extracted text to automatically identify one or more customer issues, and performing processing by contact-center agent buddies (CABs) to generate at least one response to the customer issues.
    Type: Grant
    Filed: April 23, 2009
    Date of Patent: February 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Roy J. Byrd, Keh-Shin Cheng, Stephen Carl Gates, Mary S. Neff, Youngja Park, Wilfried Teiken