Kyndryl, Inc.

États‑Unis d’Amérique

Retour au propriétaire

1-100 de 3 223 pour Kyndryl, Inc. Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 3 170
        Marque 53
Juridiction
        États-Unis 3 143
        International 45
        Canada 30
        Europe 5
Date
Nouveautés (dernières 4 semaines) 7
2025 septembre (MACJ) 5
2025 août 5
2025 juillet 6
2025 juin 5
Voir plus
Classe IPC
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 372
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison 372
H04L 12/24 - Dispositions pour la maintenance ou la gestion 241
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet 218
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation 191
Voir plus
Classe NICE
42 - Services scientifiques, technologiques et industriels, recherche et conception 40
35 - Publicité; Affaires commerciales 31
41 - Éducation, divertissements, activités sportives et culturelles 24
09 - Appareils et instruments scientifiques et électriques 19
37 - Services de construction; extraction minière; installation et réparation 19
Voir plus
Statut
En Instance 168
Enregistré / En vigueur 3 055
  1     2     3     ...     33        Prochaine page

1.

DETECTION AND PREVENTION OF LOGIN ATTACKS

      
Numéro d'application 18604001
Statut En instance
Date de dépôt 2024-03-13
Date de la première publication 2025-09-18
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Eckert, Kim A.

Abrégé

The present disclosure relates generally to cybersecurity and, more particularly, to a system and method to detect and prevent login attacks. A computer-implemented method includes: gathering, by a computing device, a login window from a display of a user device; determining, by the computing device, that the login window is invalid; flagging, by the computing device, the login window as an attack on the user device upon determining that the login window is invalid; and executing, by the computing device, a security action on the user device.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur

2.

CODE AGILITY AND VISIBILITY VIA AUGMENTED DECISION-MAKING ALGORITHM

      
Numéro d'application 18602617
Statut En instance
Date de dépôt 2024-03-12
Date de la première publication 2025-09-18
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Sharma, Kalpesh
  • Kunjappa P, Reeth
  • M, Nalini
  • Bushetti, Veeresh

Abrégé

A computer-implemented method may include determining, by a computing device, a verve of a feature; determining, by a computing device, a first release intensity score (RIS) of the feature; stabilizing, by a computing device, a release train based on the verve and the RIS of the feature; and modifying, by a computing device, an engagement schedule based on the stabilized release train.

Classes IPC  ?

3.

Dynamic Benchmarking of Combinations of Main and Sub Libraries for Library Developer Operations (LIBOPS)

      
Numéro d'application 18597989
Statut En instance
Date de dépôt 2024-03-07
Date de la première publication 2025-09-11
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Kunjappa, Reeth
  • Bushetti, Veeresh
  • M, Nalini
  • Sharma, Kalpesh

Abrégé

A computer implemented method and system for supporting self-assessed upgrades using dynamic benchmarking of combinations of main and sub libraries for carrying out Library Developer Operations (LibOps) includes identifying a software library module being used in a software application, identifying dependencies and upgrades for the software library module, identifying a latest software library module version, identifying a change.log module for the latest software library module version, wherein the change.log module includes a record of all changes to the software library module, categorizing breaking changes and deprecated features for the latest software library module version and generating an upgrade score and suggesting recommendations responsive to the upgrade score.

Classes IPC  ?

4.

REAL-TIME TICKET MANAGEMENT

      
Numéro d'application 18591762
Statut En instance
Date de dépôt 2024-02-29
Date de la première publication 2025-09-04
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Chintakunta, Mouleswara Reddy
  • Wheatley, Keri
  • Rashid, Shahid

Abrégé

Embodiments receive ticket input data, determine an estimated resolution time using at least one machine learning (ML) model based on the received ticket input data, determine a ticket mis-assignment data based on the received ticket input data, and send a ticket output data based on the estimated resolution time and the ticket mis-assignment data.

Classes IPC  ?

  • G06Q 10/0631 - Planification, affectation, distribution ou ordonnancement de ressources d’entreprises ou d’organisations
  • G06F 18/2413 - Techniques de classification relatives au modèle de classification, p. ex. approches paramétriques ou non paramétriques basées sur les distances des motifs d'entraînement ou de référence

5.

BUSINESS SERVICE HEALTH SCORE VALIDATION FRAMEWORK

      
Numéro d'application 18592950
Statut En instance
Date de dépôt 2024-03-01
Date de la première publication 2025-09-04
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Chintakunta, Mouleswara Reddy
  • Boppanna, Anil Babu
  • Mitchell, Reagan

Abrégé

Embodiments receive metric and log data from an external system; generate a first set of health scores for metric data of the metric and log data using a plurality of artificial intelligence (AI) models; generate a second set of health scores for log data of the metric and log data using a log data analysis; determine a similarity score based on the first set of health scores and the second set of health scores; and perform a validation by comparing the similarity score to a predetermined threshold value.

Classes IPC  ?

6.

MULTI-CLOUD GENERATIVE ARTIFICIAL INTELLIGENCE ARBITRAGE, ORCHESTRATION, AND ACCURACY VALIDATION

      
Numéro d'application 18582724
Statut En instance
Date de dépôt 2024-02-21
Date de la première publication 2025-08-21
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Iyoob, Ilyas
  • Madhira, Venkatapurna Parthasarathy
  • Rodriguez Bravo, Cesar Augusto

Abrégé

Embodiments relate to automatically providing multi-cloud generative artificial intelligence (AI) arbitrage, orchestration, and accuracy validation. An aspect includes inputting a user prompt to artificial intelligence (AI) models to obtain results and in response to receiving the results from the AI models, determining that at least one incongruent result is found in the results. An aspect includes resolving an issue of the at least one incongruent result in the results, in response to resolving the issue, merging the results to obtain a final result, and presenting the final result.

Classes IPC  ?

7.

KUBERNETES ROOT CAUSE ANALYSIS SYSTEM

      
Numéro d'application EP2024063914
Numéro de publication 2025/171885
Statut Délivré - en vigueur
Date de dépôt 2024-05-21
Date de publication 2025-08-21
Propriétaire
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Allemagne)
Inventeur(s)
  • Jacob, Glincy
  • Odibat, Omar

Abrégé

Computer-implemented methods for a Kubernetes root cause analysis system. Aspects include receiving a keyword from a preprocessor of a Kubernetes root cause analysis system. Aspects further include determining a degree of similarity for the keyword. Aspects also include determining a membership approximation for the keyword in a labeled gravid fuzzy rough set of a multifaceted knowledge corpus based on the degree of similarity for the keyword. Aspects include receiving a determination associated with the membership approximation for the keyword from a subject matter expert. Aspects further include performing a membership action using the keyword on the labeled gravid fuzzy rough set.

Classes IPC  ?

  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
  • G06N 5/048 - Inférence floue
  • G06N 5/022 - Ingénierie de la connaissanceAcquisition de la connaissance

8.

IDENTIFY AND OBFUSCATE SENSITIVE DATA BEFORE INGESTING TO GENERATIVE AI ENGINES

      
Numéro d'application 18438073
Statut En instance
Date de dépôt 2024-02-09
Date de la première publication 2025-08-14
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Iyoob, Ilyas
  • Madhira, Venkatapurna Parthasarathy
  • Kurlowecz, C. Steven

Abrégé

An approach is provided that identifies a sensitive data in a request to an artificial intelligence (AI) engine. In one embodiment, the identifying further includes: translating the request from one natural language to other natural languages, thus creating translated requests, comparing fields in the first natural language to fields in the other natural languages with the comparing resulting in some untranslated fields that are treated as the sensitive data. The approach further includes creating an obfuscated request by obfuscating the sensitive data identified in the request before the obfuscated request is transmitted to the AI engine.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

9.

AUTOMATED SINGLE-TO-GROUPED CLOUD COMPUTING OPTIMIZATION

      
Numéro d'application 18436070
Statut En instance
Date de dépôt 2024-02-08
Date de la première publication 2025-08-14
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Wheatley, Keri
  • Guerrero, Gail Camille
  • Odibat, Omar
  • Mohamed Iyoob Umar, Umar

Abrégé

Embodiments relate to a technique for providing automated single-to-grouped cloud computing optimizations. The technique includes generating, by a first machine learning model, a single notification for a computing environment, and in response to receiving user responses to a string of the single notification and other single notifications for the computing environment, determining to switch from a single mode to a group mode. The technique includes, based on the user responses to the string of the single notification and the other single notifications for the computing environment, generating, by a second machine learning model, a group of notifications for the computing environment. The technique includes causing at least one modification to the computing environment in accordance with at least one affirmative user response to the group of notifications.

Classes IPC  ?

  • G06N 3/092 - Apprentissage par renforcement
  • G06N 7/01 - Modèles graphiques probabilistes, p. ex. réseaux probabilistes

10.

KUBERNETES ROOT CAUSE ANALYSIS SYSTEM

      
Numéro d'application 18441015
Statut En instance
Date de dépôt 2024-02-14
Date de la première publication 2025-08-14
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Jacob, Glincy Mary
  • Odibat, Omar

Abrégé

Computer-implemented methods for a Kubernetes root cause analysis system. Aspects include receiving a keyword from a preprocessor of a Kubernetes root cause analysis system. Aspects further include determining a degree of similarity for the keyword. Aspects also include determining a membership approximation for the keyword in a labeled gravid fuzzy rough set of a multifaceted knowledge corpus based on the degree of similarity for the keyword. Aspects include receiving a determination associated with the membership approximation for the keyword from a subject matter expert. Aspects further include performing a membership action using the keyword on the labeled gravid fuzzy rough set.

Classes IPC  ?

  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts

11.

PREVENTING KEYSNIFFER ATTACKS

      
Numéro d'application 18417386
Statut En instance
Date de dépôt 2024-01-19
Date de la première publication 2025-07-24
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Eckert, Kim A.

Abrégé

Embodiments receive confidential data on a first device; modify the confidential data on the first device by using a randomization pattern; and send the modified confidential data to a second device by wireless communication.

Classes IPC  ?

  • G06F 21/75 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par inhibition de l’analyse de circuit ou du fonctionnement, p. ex. pour empêcher l'ingénierie inverse

12.

DETECTING IMPERSONATION ATTACKS

      
Numéro d'application 18421531
Statut En instance
Date de dépôt 2024-01-24
Date de la première publication 2025-07-24
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Riley, Daniel S.
  • Wong, Kim Poh

Abrégé

Embodiments determine a set of writing patterns of at least one data communication; determine a narrative style on the set of writing patterns of the at least one data communication; provide a writing profile model by training on the narrative style and the set of writing patterns; compare a new data communication to the trained writing profile model; and flag the new data communication based on the comparison being over a threshold level.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

13.

BEST HEDGING, UTILIZATION AND VALIDATION OF INFORMATION (BHUVI) MACHINE LEARNING MODEL

      
Numéro d'application 18411161
Statut En instance
Date de dépôt 2024-01-12
Date de la première publication 2025-07-17
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Hegde, Vinay Kumar Gajanana
  • Satav, Gaurav Shrikisan
  • Odibat, Omar

Abrégé

A method may include obtaining, by a computing device, an information technology (IT) incident report; obtaining, by the computing device, a set of system details of a system experiencing an IT incident, the IT incident being described by the IT incident report; identifying, by the computing device, a plurality of potential IT incident resolutions; scoring, by the computing device, the plurality of potential IT incident resolutions using a machine learning model, the machine learning model configured to determine a success of the plurality of potential IT incident resolutions; and generating and transmitting, by the computing device and according to the scoring, the plurality of potential IT incident resolutions.

Classes IPC  ?

  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts

14.

USER-FRIENDLY AND SELF-MANAGED CHALLENGE-RESPONSE AUTHENTICATION

      
Numéro d'application 18406286
Statut En instance
Date de dépôt 2024-01-08
Date de la première publication 2025-07-10
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Feezell, John Richard
  • Eckert, Kim A.
  • Campos Batista, David Alonso

Abrégé

Computer-implemented methods for a user-friendly and self-managed CAPTCHA system. Aspects include storing a copy of an image selected from a set of images as a source image. Aspects further include generating a reference image by applying an image obfuscation technique to the image and a challenge image by applying a different image obfuscation technique to the image. Aspects include dividing the challenge image into partitions and placing the partitions randomly on a virtual canvas. Aspects include displaying the reference image and the virtual canvas on a user device requesting to access a protected resource. Aspects include receiving a solution image comprising the partitions of the challenge image arranged by a user from the user device. Aspects also include generating a similarity score by comparing the source image and the solution image. Aspects further include determining that the similarity score is below a threshold value and performing a security action.

Classes IPC  ?

  • G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
  • G06T 11/60 - Édition de figures et de texteCombinaison de figures ou de texte

15.

IDENTIFICATION AND MITIGATION OF SPOOFING ATTACKS ON AUTONOMOUS VEHICLES

      
Numéro d'application 18407542
Statut En instance
Date de dépôt 2024-01-09
Date de la première publication 2025-07-10
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Rodriguez Bravo, Cesar Augusto

Abrégé

Embodiments relate to the identification and mitigation of spoofing attacks on autonomous vehicles. A technique includes detecting using a sensor of the vehicle that an object appears in a path of the vehicle and preventing the vehicle from motion in response to detecting the object. The technique includes determining that the object is associated with a deception of the sensor of the vehicle and performing security actions in response to determining that the object is associated with the deception of the sensor of the vehicle.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • B60W 60/00 - Systèmes d’aide à la conduite spécialement adaptés aux véhicules routiers autonomes

16.

SYSTEM AND METHOD TO DETECT AND PREVENT KEYLOGGING ATTACKS

      
Numéro d'application 18400092
Statut En instance
Date de dépôt 2023-12-29
Date de la première publication 2025-07-03
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Eckert, Kim A.

Abrégé

In an first aspect of the disclosure, there is a computer-implemented method which includes: obtaining, by a computing device, a password entered by an account user, placing, by the computing device, the password in memory of a device; generating, by the computing device, a fake password by randomly injecting characters into the password; storing, by the computing device, the fake password in a secure database; and deleting the password from the memory.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

17.

IMPERSONATION ATTACK DETECTION AND PREVENTION SYSTEM

      
Numéro d'application 18393774
Statut En instance
Date de dépôt 2023-12-22
Date de la première publication 2025-06-26
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Wong, Kim Poh

Abrégé

Computer-implemented methods for an impersonation attack detection and prevention system. Aspects include receiving a communication from a user of a communication environment. Aspects further include generating a similarity score using metadata of the communication from the user and a digital persona associated with the user in the communication environment. Aspects also include determining that the communication is a potential impersonation attack threat by determining that the similarity score is below a threshold value. Aspects include performing a security action to protect the communication environment from the potential impersonation attack threat.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

18.

IDENTIFICATION, VALIDATION AND AUTHENTICATION USING BIOLOGICAL PATTERNS AND NUMBERS

      
Numéro d'application 18545154
Statut En instance
Date de dépôt 2023-12-19
Date de la première publication 2025-06-19
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Hegde, Vinay Kumar Gajanana
  • Odibat, Omar
  • Rodriguez Bravo, Cesar Augusto

Abrégé

Embodiments relate to a computer implemented method for identifying, validating and authenticating a user using biological patterns and numbers. The method includes prompting a user to enter a password into an authentication software, where the password is responsive to selected user fingers, selected user fingerprints and a selected entry pattern of the user fingers and user fingerprints. A biometric sensing device is operated to obtain biometric data responsive to sensed user fingers, sensed user fingerprints and a sensed entry pattern. The biometric data is processed to determine characteristic features of at least one of the sensed user fingers, the sensed user fingerprints and the sensed entry pattern and the characteristic features is compared with the user data to determine if the characteristic features match the user data. The user is allowed or denied entry into a computer system responsive to whether the characteristic features match the user data.

Classes IPC  ?

  • G06F 21/32 - Authentification de l’utilisateur par données biométriques, p. ex. empreintes digitales, balayages de l’iris ou empreintes vocales

19.

INTELLIGENT SENTIMENT-BASED TICKET ALLOCATION/PROCESSING

      
Numéro d'application 18533688
Statut En instance
Date de dépôt 2023-12-08
Date de la première publication 2025-06-12
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Hegde, Vinay Kumar Gajanana
  • Odibat, Omar
  • Iyer, Balamukundan G.

Abrégé

Embodiments input a plurality of data and a weightage reallocation to a dynamic ranking priority system, calculate a plurality of sentiment scores and a plurality of penalty scores based on the plurality of data, eliminate a sentiment score of the plurality of sentiment scores in response to a corresponding penalty score of the plurality of penalty scores being greater than a predetermined threshold, dynamically re-rank a plurality of tickets with a same priority using a machine learning (ML) model based on a type of the plurality of data which is most similar to historical data, dynamically change a pre-allocated weightage using a learn on the job (LOTJ) model based on a ticket resolution to perform based on the plurality of data, and adjust the weight reallocation based on the dynamically changed pre-allocated weightage.

Classes IPC  ?

  • G06Q 10/0631 - Planification, affectation, distribution ou ordonnancement de ressources d’entreprises ou d’organisations

20.

CONSORTIUM-BASED INFRASTRUCTURE AND PLATFORM FOR USER AUTHENTICATION

      
Numéro d'application 18524145
Statut En instance
Date de dépôt 2023-11-30
Date de la première publication 2025-06-05
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Iwamoto, Sachio
  • Malik, Nadeem
  • Narasimhan, Balaji
  • Grandhe, Kishor
  • Rodriguez Bravo, Cesar Augusto
  • Puri, Rajeev

Abrégé

In an aspect of the disclosure, a method includes: obtaining, by a computing device, a user request to access at least one system resource; obtaining, by the computing device, a digital certificate of the user requesting access to the at least one system resource; obtaining, by the computing device, a validation result associated with the digital certificate from a blockchain ledger network; determining, by the computing device, whether the validation result authorizes access to an authorization service; and sending the authorization to the authorization service to deny or permit the user access to the at least one system resource based on the validation result.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité

21.

CONSORTIUM-BASED APPLICATION AUTHENTICATION

      
Numéro d'application 18524243
Statut En instance
Date de dépôt 2023-11-30
Date de la première publication 2025-06-05
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Iwamoto, Sachio
  • Malik, Nadeem
  • Narasimhan, Balaji
  • Grandhe, Kishor
  • Rodriguez Bravo, Cesar Augusto
  • Puri, Rajeev

Abrégé

In an aspect of the disclosure, there is a computer-implemented method including: obtaining, by a computing device, a request from an endpoint device to access at least one system resource; obtaining, by the computing device, a digital certificate from a shared digital wallet; obtaining, by the computing device, a validation result associated with the digital certificate from a blockchain ledger network; determining, by the computing device, whether the validation result authorizes access to the at least one system resource by the endpoint device; and sending authorization to the endpoint to deny or permit the endpoint device access to the at least one system resource based on the validation result.

Classes IPC  ?

  • G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques

22.

EXPEDITED OPERATIONS RESOLUTION

      
Numéro d'application 18388579
Statut En instance
Date de dépôt 2023-11-10
Date de la première publication 2025-05-15
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Sharma, Kalpesh
  • Bushetti, Veeresh
  • M, Nalini

Abrégé

A computer-implemented method, including: receiving, by a computing device, an information technology (IT) operations request; collecting, by the computing device, information associated with the IT operation request from a knowledge bank; determining, by the computing device, a resolution resource for completing the IT operation request; and assigning, by the computing device, the resolution resource based on the information from the knowledge bank and IT operation request.

Classes IPC  ?

  • G06Q 10/0631 - Planification, affectation, distribution ou ordonnancement de ressources d’entreprises ou d’organisations

23.

VIRTUAL STORAGE MECHANISM TO OPTIMIZE FETCH PERFORMANCE OF NAMED OBJECTS IN ENTERPRISE SYSTEMS

      
Numéro d'application 18502433
Statut En instance
Date de dépôt 2023-11-06
Date de la première publication 2025-05-08
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Akula, Ravinder
  • Adige, Srikanth Rao
  • Murugesan, Jeevabharathy
  • Kella, Neelakanta

Abrégé

Embodiments relate to enhancing a virtual storage mechanism to optimize fetch performance of named objects in enterprise systems. A technique includes receiving from a requester a request to retrieve an object and determining that the object is available for retrieval in a virtual data space, where a machine learning model is configured to cause the object to be placed in the virtual data space, the machine learning model being trained on fetch data for objects. The technique includes retrieving the object from the virtual data space instead of a storage system and providing the object to the requester for execution.

Classes IPC  ?

  • G06F 12/123 - Commande de remplacement utilisant des algorithmes de remplacement avec listes d’âge, p. ex. file d’attente, liste du type le plus récemment utilisé [MRU] ou liste du type le moins récemment utilisé [LRU]
  • G06N 3/09 - Apprentissage supervisé

24.

IDENTIFY POTENTIAL PATTERNS OF COMPROMISE ON LOG FILES

      
Numéro d'application 18504732
Statut En instance
Date de dépôt 2023-11-08
Date de la première publication 2025-05-08
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Riley, Daniel S.

Abrégé

This disclosure presents an approach for identifying obfuscation patterns within system log files to enhance cybersecurity. The method involves two key stages: first, detecting tampering in a primary set of log entries; and second, monitoring a secondary set of log files for the presence of these tampering patterns. By comparing the identified obfuscation patterns in the primary log entries with those detected in the secondary set, the system can effectively identify potential system intrusions. This innovative approach provides an advanced and proactive means of bolstering system security by uncovering and responding to malicious activities that attempt to obscure their tracks within log files, ultimately enhancing the defense against cyber threats.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

25.

PREVENTING HARASSMENT ON METAVERSE ENVIRONMENTS

      
Numéro d'application 18488319
Statut En instance
Date de dépôt 2023-10-17
Date de la première publication 2025-04-17
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Rodriguez Bravo, Cesar Augusto

Abrégé

An approach is provided that displays avatars locating in a first virtual area to a first set of users with each user controlling one of the avatars. A request is received from one of the users to escape a situation. In response to the request, the system clones the user's first avatar thus creating a second avatar. The second avatar is visible to the user; however it is invisible to one or more of the set of users. The user controls the second avatar and the first avatar is automatically controlled using artificial intelligence (AI), with the user no longer controlling the first avatar.

Classes IPC  ?

  • G06T 19/00 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie
  • G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
  • H04L 9/40 - Protocoles réseaux de sécurité

26.

SYSTEMS AND METHODS FOR RESIDUAL RISK ASSESSMENT IN INFORMATION TECHNOLOGY MANAGEMENT

      
Numéro d'application 18378240
Statut En instance
Date de dépôt 2023-10-10
Date de la première publication 2025-04-10
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Jasionowski, Pawel
  • Riley, Dan S.
  • Biegel, Jeffrey
  • Chahal, Priya
  • Melancon, Melissa
  • Chidester, John
  • Hickman, Jalen

Abrégé

A computer-implemented method including: obtaining, by a computing device, a plurality of risk events; mapping, by the computing device, treatment actions to each of the plurality of the risk events; determining, by the computing device, an impact of the treatment actions on each of the plurality of the risk events; determining, by the computing device, a probability of implementation of the treatment actions; calculating, by the computing device, how the treatment actions affect other risk factors based on the determining steps; and providing, by the computing device, a recommendation of optimal risk mitigation based on how the first treatment actions affect the other risk events.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations

27.

MACHINE LEARNING MODEL FOR GENERATING CODE SNIPPETS AND TEMPLATES

      
Numéro d'application 18477668
Statut En instance
Date de dépôt 2023-09-29
Date de la première publication 2025-04-03
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Odibat, Omar
  • Paul, Chakkalamattam Jos

Abrégé

Embodiments relate to a machine learning model for generating code snippets and templates. A team feature set for a team is provided to a machine learning model, the team including at least two members. The machine learning model determines a recommendation for the team, the recommendation being related to computer execution to perform a task. In response to determining the recommendation for the team, the recommendation is rendered to the team.

Classes IPC  ?

  • G06F 8/35 - Création ou génération de code source fondée sur un modèle

28.

AUTOMATIC IDENTIFICATION OF CHANGES ON SERVERS WITH SCHEDULED MAINTENANCE

      
Numéro d'application 18465410
Statut En instance
Date de dépôt 2023-09-12
Date de la première publication 2025-03-13
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Eckert, Kim A.
  • Campos Batista, David Alonso

Abrégé

An approach is disclosed that determines that a change is needed to a remote system that is managed by a change management system that manages changes to many remote systems. A change management time window when the change is scheduled to be performed at the selected remote system is identified and a monitoring request is sent to the remote system. The monitoring request causes the remote system to run a monitoring process. The change management system receives an activity notification that was identified by the monitoring process. In response to the activity notification matching the change needed, the change scheduled at the selected remote system is canceled by the change management system.

Classes IPC  ?

29.

PREVENTING DEEP FAKE VOICEMAIL SCAMS

      
Numéro d'application 18458276
Statut En instance
Date de dépôt 2023-08-30
Date de la première publication 2025-03-06
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Goins, Lorie

Abrégé

Embodiments relate to preventing deep fake voicemail scams. In response to receiving a voice message, an intent of the voice message is determined. The intent is determined to relate to a persuasion technique. A warning is provided about the voice message.

Classes IPC  ?

  • H04M 3/22 - Dispositions de supervision, de contrôle ou de test
  • H04M 3/533 - Systèmes de messagerie vocale

30.

AUTHENTICATION METHOD

      
Numéro d'application 18236779
Statut En instance
Date de dépôt 2023-08-22
Date de la première publication 2025-02-27
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Rodriguez Bravo, Cesar Augusto

Abrégé

A computer-implemented method includes presenting one or more categories of movement patterns. The computer-implemented method includes recording a movement pattern of a user, where the movement pattern is associated with the one or more categories of movement patterns. The computer-implemented method includes authenticating the recorded movement pattern is correct. The computer-implemented method includes associating the authenticated recorded movement pattern with at least one of a device, application, and web-based service.

Classes IPC  ?

  • G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique

31.

System to Infer Longevity of Cloud Computing Resource Usage and Rank in Order of Importance

      
Numéro d'application 18455435
Statut En instance
Date de dépôt 2023-08-24
Date de la première publication 2025-02-27
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Wheatley, Keri
  • Chintakunta, Mouleswara Reddy
  • Odibat, Omar

Abrégé

An approach is disclosed that creates a network graph that identifies computing resources as nodes. Each of the computing resources is weighted based upon the corresponding resource's attributes and usage. The approach connects a first set of nodes as directly connected and a second set of nodes as indirectly connected. Node longevity values are calculated for each node in the network graph with each of the node longevity values corresponding to one of the nodes in the network graph. The calculations are based on the direct and indirect connections between each of the nodes. The computing resources are managed based on the corresponding node longevity values.

Classes IPC  ?

  • G06Q 10/0631 - Planification, affectation, distribution ou ordonnancement de ressources d’entreprises ou d’organisations

32.

ABSTRACTIVE SUMMARIZATION OF INFORMATION TECHNOLOGY ISSUES USING A METHOD OF GENERATING COMPARATIVES

      
Numéro d'application 18447506
Statut En instance
Date de dépôt 2023-08-10
Date de la première publication 2025-02-13
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Ayachitula, Naga A.
  • Khandekar, Rohit
  • Sharma, Upendra

Abrégé

Embodiments relate to providing automated text summarization techniques for capturing and conveying information technology (IT) records with numerical data. A technique is executed by one or more processors and includes receiving an IT record comprising text and numerical data, normalizing the numerical data into normalized numerical data, transforming the normalized numerical data into comparative and superlative adjectival terms and rewriting the text to include the comparative and superlative adjectival terms for output as a rewritten IT record.

Classes IPC  ?

  • G06F 40/40 - Traitement ou traduction du langage naturel
  • G06F 40/289 - Analyse syntagmatique, p. ex. techniques d’états finis ou regroupement

33.

Early detection of information technology (IT) failures using multimodal correlation and prediction

      
Numéro d'application 18447512
Numéro de brevet 12393476
Statut Délivré - en vigueur
Date de dépôt 2023-08-10
Date de la première publication 2025-02-13
Date d'octroi 2025-08-19
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Ayachitula, Naga A.
  • Khandekar, Rohit
  • Sharma, Upendra

Abrégé

Embodiments relate to early detection of information technology (IT) failures in a computing system. A technique is executed by one or more processors and includes receiving multiple IT records including past and recent historical data, extracting first and second time series sections from the past and recent historical data, respectively, training a failure detection model to correlate metric patterns in the first time series sections with at least one of other metric patterns and previous IT failures and, in response to the training, using the failure detection model to predict at least one of upcoming metric patterns and upcoming IT failures from metric patterns in the second time series sections.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06N 5/022 - Ingénierie de la connaissanceAcquisition de la connaissance

34.

PROTECTING DATA STORED BY A NON-VOLATILE MEMORY

      
Numéro d'application 18426441
Statut En instance
Date de dépôt 2024-01-30
Date de la première publication 2025-02-13
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Brackhahn, Thomas

Abrégé

One or more embodiments relate to protecting data stored by a non-volatile memory of a memory device installed in a computing device. A technique includes in response to a power-up of the memory device, incrementing a memory power cycle count, and receiving a host power cycle count indicating a number of power-ups of the computing device. The technique includes, if the memory power cycle count is not equal to the host power cycle count, applying a security reaction to the memory, the security reaction being adapted for preventing a readout of the data.

Classes IPC  ?

  • G06F 21/75 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par inhibition de l’analyse de circuit ou du fonctionnement, p. ex. pour empêcher l'ingénierie inverse
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

35.

PROTECTING A NON-VOLATILE SOLID-STATE MEMORY FROM AN UNAUTHORIZED ACCESS

      
Numéro d'application 18436899
Statut En instance
Date de dépôt 2024-02-08
Date de la première publication 2025-02-13
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Brackhahn, Thomas

Abrégé

An approach is provided for protecting data stored by a non-volatile solid-state memory from an unauthorized access. In response to a trigger event indicating an increased probability of the unauthorized access, the memory is destroyed by directing through the memory an electric current exceeding a rated current of the memory, and testing an operability of the memory, where the destruction is completed when the test indicates lacking operability of the memory.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 21/79 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données dans les supports de stockage à semi-conducteurs, p. ex. les mémoires adressables directement

36.

ABSTRACTIVE SUMMARIZATION OF INFORMATION TECHNOLOGY ISSUES USING A METHOD OF GENERATING COMPARATIVES

      
Numéro d'application EP2023079771
Numéro de publication 2025/031606
Statut Délivré - en vigueur
Date de dépôt 2023-10-25
Date de publication 2025-02-13
Propriétaire
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Allemagne)
Inventeur(s)
  • Ayachitula, Naga
  • Khandekar, Rohit
  • Sharma, Upendra

Abrégé

Embodiments relate to providing automated text summarization techniques for capturing and conveying information technology (IT) records with numerical data. A technique is executed by one or more processors and includes receiving an IT record comprising text and numerical data, normalizing the numerical data into normalized numerical data, transforming the normalized numerical data into comparative and superlative adjectival terms and rewriting the text to include the comparative and superlative adjectival terms for output as a rewritten IT record.

Classes IPC  ?

  • G06F 16/34 - NavigationVisualisation à cet effet

37.

HEURISTIC DATA PIPELINE SCHEDULING

      
Numéro d'application 18228401
Statut En instance
Date de dépôt 2023-07-31
Date de la première publication 2025-02-06
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Madhavan, Madhusoodanan K.
  • Boppanna, Anil Babu
  • Agarwal, Aman
  • Gad, Siddesh L.

Abrégé

A computer-implemented method, including: receiving, by a computing device, a data pipeline job request; generating, by the computing device, a complexity score for the data pipeline job request; determining, by the computing device, a predicted execution time for the data pipeline job request; generating, by the computing device, a priority score for the data pipeline job request based on the predicted execution time and the generated complexity score; and comparing, by the computing device, the priority score for the data pipeline job request to another priority score to determine a schedule for the data pipeline job request.

Classes IPC  ?

  • G06F 9/448 - Paradigmes d’exécution, p. ex. implémentation de paradigmes de programmation

38.

KYNDRYL. FLAT, FAST AND FOCUSED

      
Numéro d'application 1837358
Statut Enregistrée
Date de dépôt 2024-11-28
Date d'enregistrement 2024-11-28
Propriétaire Kyndryl, Inc. (USA)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer programming; software as a service (SaaS) services featuring software for data management; software as a service (SaaS) services featuring software for cloud computing; software as a service (SaaS) services featuring software for artificial intelligence; software as a service (SaaS) services featuring software for cognitive computing; Software as a Service (SaaS) services featuring software for blockchain technology; software as a service (SaaS) services featuring software for quantum computing and quantum programming; software as a service (SaaS) services featuring software for constructing, analyzing and running quantum programs and quantum algorithms; software as a service (SaaS) services featuring software for developing and testing quantum algorithms; computer programming and computer consulting services for artificial intelligence; computer programming and computer consulting services for cognitive computing; computer programming and computer consulting services for information management; computer programming and computer consulting services for data management; computer programming and computer consulting services for cloud computing; computer programming and computer advisory services for blockchain technology; computer programming and computer consulting services for quantum computing; computer programming and computer consulting services for software as a service (SaaS); design, installation, updating and maintenance of software; computer software and hardware design for third parties and consultation services in the field of computers; computer services, namely, design, creation and maintenance of websites for third parties; computer systems analysis, database and network integration, computer programming for third parties, all for use in commercial interactions over global computer networks; technical support services, namely, troubleshooting of computer program and software problems; design of systems for interconnection of computers and software, namely, electronic connection of computers and software to each other; computer software and hardware testing services (quality and technical controls); technical project studies in the field of computer hardware and software; consultancy services in the field of computer hardware, namely consultancy regarding computing research and development; computer advice and assistance concerning Internet use; rental of computers and software; scientific and industrial research, namely research and development of new products, biological research, bacteriological research, chemical research, cosmetic research, mechanical research, geological research, technical research, pharmaceutical research, scientific research for medical purposes; information technology services; computer system integration services; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for third parties; technical support services, namely, diagnosing computer hardware and computer software problems; computer system design services for third parties; design of systems for interconnection of computers and computer programs, namely, integration of computer systems and computer networks; computer program and computer hardware testing services, namely testing of software, computers and servers to ensure proper functioning thereof; cloud computing services, namely, network-integrated computer hardware and software services for dynamic provisioning, virtualization and consumption metering of computer resources; providing virtual computer systems and virtual computer environments through cloud computing; design and development of software for cloud storage of data; cloud computing hosting provider services; electronic data storage and data recovery services; data security service.

39.

SYSTEM TO FACILITATE WIRELESS CHARGING OF ELECTRONIC DEVICE(S)

      
Numéro d'application 18924676
Statut En instance
Date de dépôt 2024-10-23
Date de la première publication 2025-02-06
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Rakshit, Sarbajit K.

Abrégé

Control system for facilitating wireless charging of an electronic device is provided, which identifies presence of multiple electronic devices within an environment, with the multiple electronic devices including a self-propelled power relay device with wireless charging capability. Control system processing determines that an electronic device of the multiple electronic devices requires wireless charging, and based on the determining, deploys the self-propelled power relay device to move to an area of the environment within a charging range of the electronic device to facilitate wireless charging of the electronic device via the self-propelled power relay device.

Classes IPC  ?

  • H02J 50/50 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique utilisant des répéteurs d’énergie supplémentaires entre les dispositifs de transmission et les dispositifs de réception
  • H02J 50/10 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique utilisant un couplage inductif
  • H02J 50/80 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique mettant en œuvre l’échange de données, concernant l’alimentation ou la distribution d’énergie électrique, entre les dispositifs de transmission et les dispositifs de réception
  • H02J 50/90 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique mettant en œuvre la détection ou l'optimisation de la position, p. ex. de l'alignement

40.

kyndryl vital

      
Numéro d'application 1836024
Statut Enregistrée
Date de dépôt 2024-11-04
Date d'enregistrement 2024-11-04
Propriétaire Kyndryl, Inc. (USA)
Classes de Nice  ?
  • 35 - Publicité; Affaires commerciales
  • 41 - Éducation, divertissements, activités sportives et culturelles

Produits et services

Business consulting services for companies in the field of selection, implementation, administration and use of computer hardware and software systems; business consulting services for companies in the field of selection, implementation, administration and use of computer hardware and software systems in the fields of enterprise software, technology and infrastructure, cybersecurity, resiliency, data analytics, digital transformation, and artificial intelligence; co-creation services in the nature of business assistance services, namely, assisting customers in the selection, implementation, administration and use of computer hardware and software systems; co-creation services in the nature of business assistance services, namely, assisting customers in the selection, implementation, administration and use of computer hardware and software systems in the fields of enterprise software, technology and infrastructure, cybersecurity, resiliency, data analytics, digital transformation, and artificial intelligence; arranging and conducting trade show exhibitions in the field of computers, information technology and electronic business transactions; arranging and conducting trade show exhibitions in the field of computers, information technology and electronic business transactions via a global computer network; arranging and conducting trade show exhibitions in the fields of enterprise software, technology and infrastructure, cybersecurity, resiliency, data analytics, digital transformation, and artificial intelligence; analysis of market statistic and data studies; analyzing and compiling business data; arranging and conducting of customer co-creation sessions (business consultancy) in the field of computer products and services; arranging and conducting of online customer co-creation sessions (business consultancy) in a virtual environment; arranging and conducting of online customer co-creation sessions (business consultancy) in the field of information technology (IT) and computer products and services in a virtual environment; none of these services providing a health insurance system compulsory or supplementary, or providing products or services for accessing health care, or providing products or services for the identification of persons accessing a health care system or a health care insurance system. Educational services, namely, conferences, exhibitions, symposiums, presentations, technical demonstrations and training seminars, all in the field of information technology and computer products and services; Arranging and conducting of conferences; arranging and conducting of exhibitions; arranging and conducting of workshops; arranging and conducting of seminars; arranging and conducting of conferences and seminars in the field of information technology and computer products and services; arranging and conducting of software user training; arranging and conducting of computer hardware user training; arranging and conducting of information technology courses; training in computer operations and information technology; arranging and conducting of customer co-creation sessions in the field of information technology (IT) training; arranging and conducting of customer co-creation sessions [training] in the field of computer products and services; educational services, namely, conferences, exhibitions, symposiums, presentations, technical demonstrations and training seminars taking place online in a virtual environment, all in the field of information technology and computer products and services; arranging and conducting of online conferences in a virtual environment; arranging and conducting of online exhibitions in a virtual environment; arranging and conducting of online workshops in a virtual environment; arranging and conducting of online seminars in a virtual environment; arranging and conducting of online conferences and seminars in the field of information technology and computer products and services in a virtual environment; arranging and conducting of online software user training in a virtual environment; arranging and conducting of online computer hardware user training in a virtual environment; arranging and conducting of online information technology courses in a virtual environment; online training in computer operations and information technology in a virtual environment; arranging and conducting of online customer co-creation sessions [training] in a virtual environment; arranging and conducting of online customer co-creation sessions [training] in the field of information technology [IT] and computer products and services in a virtual environment; none of these services providing a health insurance system compulsory or supplementary, or providing products or services for accessing health care or providing products or services for the identification of persons accessing a health care system or a health care insurance system.

41.

Removing interactions from a virtual environment

      
Numéro d'application 18357194
Numéro de brevet 12401506
Statut Délivré - en vigueur
Date de dépôt 2023-07-24
Date de la première publication 2025-01-30
Date d'octroi 2025-08-26
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Rodriguez Bravo, Cesar Augusto

Abrégé

Embodiments relate to removing interactions from a virtual environment thereby executing the right to be forgotten in the virtual environment. In response to receiving a request to remove interactions from a virtual environment, a search is performed in the virtual environment for cryptographic keys embedded with a user identification corresponding to the request. The cryptographic keys embedded with the user identification are deleted in the virtual environment, where the interactions have been signed with the cryptographic keys embedded with the user identification in the virtual environment. In response to deleting the cryptographic keys embedded with the user identification in the virtual environment, there is a modification to a presentation of the interactions in the virtual environment.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
  • G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
  • H04L 9/08 - Répartition de clés
  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

42.

PREVENTING ACCESS OF REMOVED USERS TO MESSAGES SHARED IN A GROUP CHAT

      
Numéro d'application 18357196
Statut En instance
Date de dépôt 2023-07-24
Date de la première publication 2025-01-30
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso

Abrégé

Embodiments relate to preventing access of removed users to messages shared in a group chat with an end-to-end encryption. An aspect includes, responsive to creation of a group having members for communicating using encryption keys, receiving a request to remove a given member of the members from the group, the given member being associated with a computer system, at least one message of the group being accessible to the given member. An aspect includes identifying the encryption keys associated with the given member and causing a deletion on the computer system of the encryption keys associated with the given member in response to the request. An aspect includes confirming the deletion of the encryption keys on the computer system associated with the given member. The deletion of the encryption keys on the computer system prevents access of the computer system to at least one message of the group.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 9/40 - Protocoles réseaux de sécurité

43.

DATA INSIGHTS USING CONTEXT DRIVEN LATERAL AI

      
Numéro d'application 18361563
Statut En instance
Date de dépôt 2023-07-28
Date de la première publication 2025-01-30
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Sharma, Kalpesh
  • Perumal Thevar, Muniyandi
  • M, Nalini
  • Bushetti, Veeresh

Abrégé

An approach is disclosed that receives a user activity from a user that is using a datastore visualization display. The display displays a first visualization pertaining to one or more datastores with the datastore visualization display provided at least in part by a context driven lateral artificial intelligence (CDLAI) engine. The received user activity is provided as input to the CDLAI to generate a second visualization that is displayed to the user at the datastore visualization display that is displayed to the user. Artificial intelligence (AI) models that are used by the CDLAI are then trained based on the received user activity. The training results in updates to the visualizations.

Classes IPC  ?

  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage

44.

PREVENT SCAMS IN REAL TIME IN AN INTERACTIVE COMMUNICATION ENVIRONMENT

      
Numéro d'application 18354711
Statut En instance
Date de dépôt 2023-07-19
Date de la première publication 2025-01-23
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Rodriguez Bravo, Cesar Augusto

Abrégé

Embodiments relate to automatically preventing scams in real time in an interactive communication environment. A machine learning model determines that at least one communication from a first user to a second user in an interactive communication environment includes a potential threat, the interactive communication environment providing real time communications between the first user of a first computer system to the second user of a second computer system. The potential threat of the at least one communication is determined to above a threshold. An overlay is displayed to the second user on the second computer system in which the overlay displays metadata about the first user and informs the second user to avoid providing any sensitive information in the interactive communication environment.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 9/40 - Protocoles réseaux de sécurité

45.

Preventing fraud on smart devices

      
Numéro d'application 18354779
Numéro de brevet 12413616
Statut Délivré - en vigueur
Date de dépôt 2023-07-19
Date de la première publication 2025-01-23
Date d'octroi 2025-09-09
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Rodriguez Bravo, Cesar Augusto

Abrégé

Embodiments relate to preventing fraud on smart devices. In response to receiving a communication, a correlation of the communication to a security threat is determined, and device data of a device is obtained. A determination is made that a combination of the correlation and the device data meets a predefined threshold for the security threat. An alert is audibly output on the device, the audio alert being a warning of the security threat presented by the communication.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

46.

CONTAINER LOAD BALANCING AND AVAILABILITY

      
Numéro d'application 18892870
Statut En instance
Date de dépôt 2024-09-23
Date de la première publication 2025-01-09
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Foreman, Park

Abrégé

A system includes a container cluster including plural hosts that communicate with one another via a network. Each of the plural hosts includes a computing node that includes an operating system and a container runtime configured to run containers. Each of the plural hosts stores a respective member list that defines capabilities of the plural hosts in the container cluster. Each of the plural hosts is configured to identify another one of the plural hosts for running a container based on comparing tags of the container to the capabilities of the plural hosts defined in the respective member list. Each respective one of the plural hosts is configured to perform the identifying the another one of the plural hosts for running the container in response to determining the respective one of the plural hosts is resource-constrained from running the container.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

47.

Multi-node failure processing for computer networks

      
Numéro d'application 18343785
Numéro de brevet 12278744
Statut Délivré - en vigueur
Date de dépôt 2023-06-29
Date de la première publication 2025-01-02
Date d'octroi 2025-04-15
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Mahamuni, Amol Bhaskar
  • K, Kiran Kumar

Abrégé

Some embodiments of the present disclosure are directed to systems, computer-readable media, and computer-implemented methods for multi-node failure processing in computer networks. In particular, some embodiments are directed to generating and displaying an impact area graph for a respective node from a plurality of nodes in a network, wherein the impact area graph depicts the relative predicted impact to each other node in the network from a failure of the respective node. Other embodiments may be disclosed or claimed.

Classes IPC  ?

  • H04L 43/026 - Capture des données de surveillance en utilisant l’identification du flux
  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
  • H04L 41/14 - Analyse ou conception de réseau
  • H04L 41/147 - Analyse ou conception de réseau pour prédire le comportement du réseau
  • H04L 41/149 - Analyse ou conception de réseau pour la prédiction de la maintenance

48.

kyndryl

      
Numéro d'application 1831594
Statut Enregistrée
Date de dépôt 2024-08-26
Date d'enregistrement 2024-08-26
Propriétaire Kyndryl, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 21 - Ustensiles, récipients, matériaux pour le ménage; verre; porcelaine; faience
  • 25 - Vêtements; chaussures; chapellerie
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 41 - Éducation, divertissements, activités sportives et culturelles
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computers; quantum computers; computer hardware and software; computer hardware and software for information technology analysis and for data management; computer hardware and software for applications development; computer hardware and software for cloud computing; computer hardware and software for cognitive computing; computer hardware and software for artificial intelligence; computer hardware and software for blockchain technology; computer hardware and software for cognitive computing and quantum programming; computer hardware, namely, magnetic tape units (data processing equipment), magnetic tapes, printed circuits, integrated circuits, computer keyboards, compact disks (audio-video), optical disks, computing couplers, floppy discs, magnetic data media; computer hardware, namely, video screens, scanners, printers, computer interfaces (data processing equipment), readers (data processing equipment), software (recorded programs), microprocessors, modems, computers, computer memories, computer peripheral devices; adapters for computers; components for computers; data processing apparatus for the management of data and information; semiconductors; machine-readable electronic data media; magnetic disks; floppy disk drives; tape recorders; calculating machines; facsimile machines; video recorders; video cassettes; computer chips; printed circuit boards; computer hardware, namely, computer communications servers; bags adapted for holding laptops; computer interface boards; cables for computers and components for cables for computers; computer fax modem cards; computer accessories, namely, computer screen filters, mouse pads, radio pagers, computer game joysticks; electric converters, namely, digital-to-analog converters, analog-to-digital converters and step voltage switches; computer mice; integrated circuit cards [smart cards]; adapters for integrated circuit cards [smart cards]; readers for integrated circuit cards [smart cards]; microcomputers; uninterruptible electrical power sources; projectors; remote controls for computers; surge protectors and uninterruptible electrical power supplies; point-of-sale computer terminals; computer servers; data storage devices, namely, high-speed storage subsystems for the storage and backup of electronic data either locally or via a telecommunications network; recorded and downloadable computer programs and software; video game software; computer operating system software and programs; computer software used to access a global computer network; computer software used in database management; computer software used in locating, retrieving and receiving text, electronic documents, graphics and audiovisual information on internal company computer networks and on local and wide-area computer networks; software used for developing software and creating websites and user manuals in electronic format sold with those goods; computer software for use in controlling the operation and running of computer systems, programs and networks; computer software for use in connecting disparate computer networks and systems, computer servers and storage devices; computer software for linking together computers and for enabling their linkage to a globally accessible network; computer software for managing computer hardware, software and processes that exist within an information technology environment; computer systems combining hardware and software for use in managing and analyzing data and digital instruction manuals sold with those goods; cloud computing system, namely network integrating computer hardware and software for dynamic provisioning, virtualization and consumption metering of computer resources; software recorded or downloadable from cloud computing, for deploying and managing virtual machines to a cloud computing platform; computer systems, namely, computer hardware and computer software for developing and integrating artificial intelligence, namely, machine learning, deep learning, and natural language processing, which are capable of collecting, organizing and analyzing data; computer systems, namely, computer hardware and computer software for integrating automatic natural language processing, computational linguistics, information retrieval, and machine learning, which are capable of understanding general human queries and formulating responses; computer systems for developing, building and operating blockchain applications; computer hardware and computer software for developing and testing quantum algorithms; documentation and instruction manuals recorded on machine-readable electronic media and concerning computers or computer programs; downloadable electronic publications; electronic publications recorded on computer media, namely, user manuals, guide books, brochures, information sheets, written presentations and educational material, in the fields of computing, computer networks, computer storage, computer operating systems, information technologies, database management, cloud computing, artificial intelligence, blockchain technology and quantum computing. Glasses [receptacles]; cups; beer mugs; plastic water bottles sold empty; insulated containers and bottles for food and beverages; glasses, namely goblets; back scratchers; shoe horns; non-electric portable coolers; serving bowls of crystal; vases; coasters (tableware) and coasters of leather; coasters, other than of paper or textile materials. Clothing; clothing, namely, tops for babies, children, adults, women, and men; clothing, namely tee-shirts, shirts, button-down shirts, sweatshirts, pullovers, jackets, aprons, vests, bottoms [clothing]; headwear articles [headwear, clothing]; headwear, namely hats, baseball caps and hats, caps. stocking caps; shoes. Advertising; sales promotion for others; advisory services for commercial management and management; business information; distribution of prospectuses; distribution of samples; arranging newspaper subscriptions for third parties; accounting; document reproduction; centralized data processing management; organization of exhibitions for commercial or advertising purposes; advisory and commercial business management services and business advisory services; business development services; analysis of market study statistics and data; data processing services; data processing services in the field of artificial intelligence; data processing services in the field of cognitive computing; data processing services in the field of cloud computing; data processing services in the field of blockchain technology; data processing services in the field of information management; data processing services in the field of quantum computing and quantum programming; organizing and conducting trade shows in the field of computers, computer services, information technology, artificial intelligence, cloud computing, blockchain technology, quantum computing, database management, telecommunications and electronic commercial transactions via a global computer network; business advisory services in the field of artificial intelligence; business advisory services in the field of computer systems which integrate natural language processing, computational linguistics, information retrieval, machine learning, which are capable of understanding general human queries and formulating responses; business advisory services for cloud computing; business advisory services for blockchain technology; business advisory services in the field of quantum computing, quantum programming and for developing and testing quantum algorithms; business advisory services for information technology; compiling and analyzing business data; systematization of information in computer databases. Construction services; computer hardware repair and installation services; computer hardware maintenance; installation and maintenance of computer hardware for computer networks; technical support services, namely, troubleshooting of computer hardware problems. Telecommunication services; services for the delivery of messages by electronic means; communications by computer terminals; transmission of emails; news and information agencies; telecommunications and electronic messaging services via a global data teleprocessing network; computer-aided transmission of information; telecommunication services for commercial interaction in the field of global computer networks; providing multiple access to goods and services via a global network and wireless communication apparatus; electronic transmission of data and documents via computer terminals; teleconferencing and Web conferencing services; providing multiple-user access to global computer information networks for transferring and disseminating a wide range of information; providing online forums for transmitting messages among computer users; providing private and secure electronic communications in real time, via a computer network. Education; entertainment; training; organizing and conducting conferences, seminars and congresses; exhibition services for cultural or educational purposes; production of radio and television programs; sporting and cultural activities; education services, namely, conducting classes, seminars, conferences, online seminars (webinars) and workshops in the fields of computers, computer services, information technology, artificial intelligence, cloud computing, blockchain technology, quantum computing, database management, image and sound processing technology, telecommunications and global computer networks; training in the fields of computing, computer services, information technology, artificial intelligence, cloud computing, blockchain technology, quantum computing, database management, image and sound processing technology, telecommunications and global computer networks; conducting entertainment exhibitions in the nature of information technology demonstrations; entertainment services, namely, making available online computer games; conducting entertainment exhibitions, namely, real-time sporting competitions via a global computer network; conducting entertainment exhibitions, namely, providing demonstrations on Internet sites concerning museum exhibitions, sporting events, art gallery exhibitions, concerts and musical recordings; editing of books and journals; show and film production; facilitation of exhibitions for cultural or educational purposes; booking of seats for shows. Computer programming; software as a service (SaaS) services featuring software for data management; software as a service (SaaS) services featuring software for cloud computing; software as a service (SaaS) services featuring software for artificial intelligence; software as a service (SaaS) services featuring software for cognitive computing; software as a service (SaaS) services featuring software for blockchain technology; software as a service (SaaS) services featuring software for quantum computing and quantum programming; software as a service (SaaS) services featuring software for constructing, analyzing and running quantum programs and quantum algorithms; software as a service (SaaS) services featuring software for developing and testing quantum algorithms; computer programming services and computer consultation services on artificial intelligence; computer programming services and consultation services on cognitive computing; computer programming services and computer consultation services on information management; computer programming services and computer consultation services on data management; computer programming services and advisory services on cloud computing; computer programming services and advisory services on blockchain technology; computer programming services and computer consulttion services on quantum computing; computer programming services and computer advisory services on software as a service (SaaS); design, installation, updating and maintenance of computer software; designing software and hardware for third parties and advisory services with respect to computers; computer services, namely, creating and maintaining websites for third parties; computer systems analysis, integration of databases and networks, computer programming for third parties, all for use in commercial interactions via global computer networks; technical support services, namely, troubleshooting in the field of computer programs and software problems; designing computer hardware and software interconnection systems, namely, electronic connection of computers and software; computer hardware and software testing services (quality and technical control); technical project studies in the field of computer hardware and software; consultation services in the field of computer hardware, namely, consultation with respect to computer research and development; advisory and support services connected with the use of the Internet; rental of computers and software; scientific and industrial research, namely, research and development of new products, biological research, bacteriological research, chemical research, research in esthetics, mechanical research, geological research, technical research, pharmaceutical research, scientific research for medical use; information technology consulting services; computer system integration services; consultation services in the fields of design, selection, implementation and use of computer hardware and software systems for third parties; technical support services, namely, troubleshooting in the nature of diagnosis of computer hardware and software problems; computer system design services for third parties; interconnecting computer hardware and software, namely, integrating computer systems and networks; services for testing software and hardware, namely, testing software, computers and servers to ensure the proper functioning thereof; cloud computing services, namely, computer hardware and embedded software services for dynamic provisioning, virtualization, and consumption metering of computer resources; providing virtual computer systems and virtual computer environments through cloud computing; design and development of software for cloud storage of data; cloud computing hosting provider services; electronic data storage and retrieval services; data security service; computer support provided by programmers; design of computer hardware for computer networks.

49.

DYNAMIC DISPLAY FOR IMAGE-ENABLED CLOTHING

      
Numéro d'application 18821006
Statut En instance
Date de dépôt 2024-08-30
Date de la première publication 2024-12-19
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Childress, Rhonda L.
  • Daley, Stan Kevin
  • Fox, Jeremy R.
  • Bender, Michael

Abrégé

Systems and methods provide dynamic adjustment of content displayed on image-enabled clothing articles to address obstructed visibility of the content. In embodiments a method includes determining, by a computing device, movement of at least a portion of an image-enabled clothing article based on real-time sensor data from sensors of the image-enabled clothing article; determining, by the computing device, that a view of at least a portion of image content displayed on the image-enabled clothing article is obstructed based on the determined movement, parameters of the image-enabled clothing article and image display information of the image-enabled clothing article; and generating, by the computing device, image instructions that cause the display of the image content on the image-enabled clothing article to move from a first area of the image-enabled clothing article to a second area of the image-enabled clothing article.

Classes IPC  ?

  • G09G 3/32 - Dispositions ou circuits de commande présentant un intérêt uniquement pour l'affichage utilisant des moyens de visualisation autres que les tubes à rayons cathodiques pour la présentation d'un ensemble de plusieurs caractères, p. ex. d'une page, en composant l'ensemble par combinaison d'éléments individuels disposés en matrice utilisant des sources lumineuses commandées utilisant des panneaux électroluminescents semi-conducteurs, p. ex. utilisant des diodes électroluminescentes [LED]
  • A41D 27/08 - GarnituresOrnements

50.

SOFTWARE APPLICATION CONTAINER HOSTING

      
Numéro d'application 18820553
Statut En instance
Date de dépôt 2024-08-30
Date de la première publication 2024-12-19
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Monteiro Vieira, Igor
  • Mota Monhaes, Marcelo
  • Bianchi, Thiago
  • Da Silva, Suellen Caroline

Abrégé

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining target application container configuration data to identify one or more target container base image referenced in the target application container configuration: subjecting script data associated to the one or more target container base image to text based processing for evaluation of security risk associated to the one or more container base image, the script data obtained from at least one candidate hosting computing environment; and selecting a hosting computing environment from the at least one computing environment for hosting the target application container, the selecting in dependence on the text based processing.

Classes IPC  ?

  • G06F 8/61 - Installation
  • G06F 8/41 - Compilation
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 16/903 - Requêtes
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

51.

Advanced deterrence for bots in an interactive communication environment

      
Numéro d'application 18330627
Numéro de brevet 12373549
Statut Délivré - en vigueur
Date de dépôt 2023-06-07
Date de la première publication 2024-12-12
Date d'octroi 2025-07-29
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Bravo, Cesar
  • Bode, Christopher Collins

Abrégé

Embodiments relate to providing an advanced deterrence system for bots in an interactive communication environment. In response to identifying that an automated program for a user terminal is accessing an interactive communication environment hosted by a host computer system, a selection of an assignment for the automated program is triggered, where the automated program is designed to replicate a human behavior in the interactive communication environment. In response to triggering the selection, a task is selected as the assignment for the automated program designed to replicate the human behavior, the task being selected from a plurality of tasks that are queued to be executed by the host computer system. The task is caused to be executed by the automated program on the user terminal, the task causing a consumption of user computer resources on the user terminal.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
  • G06F 21/60 - Protection de données

52.

Self-learning automated information technology change risk prediction

      
Numéro d'application 18331361
Numéro de brevet 12294503
Statut Délivré - en vigueur
Date de dépôt 2023-06-08
Date de la première publication 2024-12-12
Date d'octroi 2025-05-06
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Ayachitula, Arun A.
  • Khandekar, Rohit
  • Sharma, Upendra

Abrégé

Embodiments relate to providing self-learning automated information technology change risk prediction. A processor inputs a change request to a first machine learning model, the first machine learning model determining at least one word pair in the change request, the change request being a modification in an IT environment. The processor classifies the at least one word pair into a change category for the IT environment using a second machine learning model, the change category identifying a type of the modification to be executed in the IT environment. The processor determines a likelihood of causing a problem in the IT environment as a result of executing the modification. The processor automatically performs an action to prevent the modification of the change request in the IT environment.

Classes IPC  ?

  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
  • H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p. ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
  • H04L 41/0866 - Vérification de la configuration

53.

SELF-LEARNING AUTOMATED INFORMATION TECHNOLOGY CHANGE RISK PREDICTION

      
Numéro d'application EP2023071905
Numéro de publication 2024/251381
Statut Délivré - en vigueur
Date de dépôt 2023-08-08
Date de publication 2024-12-12
Propriétaire
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Allemagne)
Inventeur(s)
  • Ayachitula, Naga
  • Khandekar, Rohit
  • Sharma, Upendra

Abrégé

Embodiments relate to providing self-learning automated information technology change risk prediction. A processor inputs a change request to a first machine learning model, the first machine learning model determining at least one word pair in the change request, the change request being a modification in an IT environment. The processor classifies the at least one word pair into a change category for the IT environment using a second machine learning model, the change category identifying a type of the modification to be executed in the IT environment. The processor determines a likelihood of causing a problem in the IT environment as a result of executing the modification. The processor automatically performs an action to prevent the modification of the change request in the IT environment.

Classes IPC  ?

  • G06N 20/00 - Apprentissage automatique
  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations

54.

Dynamic creation of temporary isolated environment in an interactive communication environment

      
Numéro d'application 18330620
Numéro de brevet 12277215
Statut Délivré - en vigueur
Date de dépôt 2023-06-07
Date de la première publication 2024-12-12
Date d'octroi 2025-04-15
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Bravo, Cesar
  • Bode, Christopher Collins

Abrégé

Embodiments relate to dynamic creating a temporary isolated environment in an interactive communication environment for potential bots. In response to identifying that an avatar accessing the interactive communication environment is being controlled by a non-human entity, the avatar is dynamically placed in an isolated virtual environment. Permission of the avatar are disabled in the isolated virtual environment. An authentication inquiry is presented to the avatar identified as being controlled by the non-human entity. A location is transferred for the avatar identified as being controlled by the non-human entity, based on a user response to the authentication inquiry.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
  • H04L 9/40 - Protocoles réseaux de sécurité

55.

UNSTRUCTURED DATA ACCESS CONTROL

      
Numéro d'application 18813799
Statut En instance
Date de dépôt 2024-08-23
Date de la première publication 2024-12-12
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rallapalli, Murthy
  • Denman, Jerry Michael
  • Attaluri, Prabhakar

Abrégé

A method for protecting individual data elements within an unstructured dataset includes identifying a data element within the unstructured dataset requiring access control, encrypting the data element within the unstructured dataset, storing a decryption key and access control information corresponding to the dataset at an access controller, and cryptographically binding the encrypted data element to metadata that identifies the access controller. The method may additionally include detecting an access attempt to the dataset, and determining whether the access attempt is acceptable according to the access control information. If the access attempt is acceptable, the method may further include allowing the access attempt. If the access attempt is not acceptable, the method may further include denying the access attempt.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 16/38 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 21/60 - Protection de données

56.

kyndryl bridge

      
Numéro d'application 1826117
Statut Enregistrée
Date de dépôt 2024-10-01
Date d'enregistrement 2024-10-01
Propriétaire Kyndryl, Inc. (USA)
Classes de Nice  ?
  • 35 - Publicité; Affaires commerciales
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Provision of sales areas for buyers and sellers of products and services in the field of information technology services (commercial intermediation services); provision of online sales areas for buyers and sellers of products and services in the field of information technology (commercial intermediation services). Information technology support services, namely, remote and on-site infrastructure management services for the monitoring, optimization, administration and management of computer systems; computer system integration services; integration of computer systems and networks; platforms as a service (PaaS) comprising a software platform for orchestrating the design, selection, implementation, delivery, management and use of products and services in the field of information technology; infrastructure as a service (IaaS) featuring a software platform for orchestrating the design, selection, implementation, delivery, management and use of products and services in the field of information technology; providing non-downloadable software of a software platform for orchestrating the design, selection, implementation, delivery, management and use of products and services in the field of information technology.

57.

Computerized data aggregation

      
Numéro d'application 18325327
Numéro de brevet 12412047
Statut Délivré - en vigueur
Date de dépôt 2023-05-30
Date de la première publication 2024-12-05
Date d'octroi 2025-09-09
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Iyer, Balamukundan G.
  • Hegde, Vinay Kumar Gajanana
  • Odibat, Omar

Abrégé

Disclosed embodiments provide computer-implemented techniques for aggregating of data involving multiple domains in the format of a news bulletin or “newsletter” format. For various situations, this format can provide a quicker and more comprehensive understanding than is achievable with a visual dashboard. In disclosed embodiments, multiple domains are specified, where each domain can include a subject or category. One category is selected as a major domain. Other categories, referred to as satellite domains are also specified. A user provides scores that indicate the semantic importance of each satellite domain. A mathematical distance between each satellite domain and the major domain is computed based on the scores. Based on the mathematical distances, percentages of articles pertaining to each domain are computed, and used in assembling customized data that is output in a news bulletin format.

Classes IPC  ?

  • G06F 40/40 - Traitement ou traduction du langage naturel
  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts

58.

GATHERING UNIVERSAL SERIAL BUS THREAT INTELLIGENCE

      
Numéro d'application 18784334
Statut En instance
Date de dépôt 2024-07-25
Date de la première publication 2024-11-14
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Rodriguez Bravo, Cesar Augusto

Abrégé

A method includes: detecting, by a computing device, connection of a universal serial bus device to a computer; determining, by the computing device, that the computer is in a locked mode; detecting, by the computer device, input to the computer within a predetermined time of detecting the connection; determining, by the computing device as a result of the computer being locked and detecting the input, that the input is a threat to the computer; creating, by the computing device, a temporary virtual environment; receiving, by the computing device, the input into the temporary virtual environment; processing, by the computing device, the input in the temporary virtual environment; and recording, by the computing device, information related to the input.

Classes IPC  ?

  • G06F 21/82 - Protection des dispositifs de saisie, d’affichage de données ou d’interconnexion
  • G06F 13/38 - Transfert d'informations, p. ex. sur un bus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

59.

Social media representation and collaboration platform for enterprise it

      
Numéro d'application 18669776
Numéro de brevet 12340428
Statut Délivré - en vigueur
Date de dépôt 2024-05-21
Date de la première publication 2024-11-14
Date d'octroi 2025-06-24
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • ., Rajmohan
  • Thayyil, Rajeev
  • Dey, Kuntal
  • Vadayadiyil Raveendran, Pramod

Abrégé

A system and associated methods that enable social media representation and collaboration platform of enterprise information technology (IT) components that enables human-to-human, human-to-machine and machine-to-machine communications to help easily understand the set of enterprise IT components, its configuration(s), its intra/inter relationship(s), better navigation and visibility across various related components, and augmenting system troubleshooting.

Classes IPC  ?

  • G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
  • G06F 16/9536 - Personnalisation de la recherche basée sur le filtrage social ou collaboratif
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06Q 10/087 - Gestion d’inventaires ou de stocks, p. ex. exécution des commandes, approvisionnement ou régularisation par rapport aux commandes
  • G06Q 10/101 - Création collaborative, p. ex. développement conjoint de produits ou de services
  • G06Q 10/20 - Administration de la réparation ou de la maintenance des produits
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/0806 - Réglages de configuration pour la configuration initiale ou l’approvisionnement, p. ex. prêt à l’emploi [plug-and-play]
  • H04L 41/14 - Analyse ou conception de réseau
  • G06V 10/40 - Extraction de caractéristiques d’images ou de vidéos
  • G06V 30/10 - Reconnaissance de caractères

60.

PERSONALIZED PASSWORD PROMPTING SYSTEM

      
Numéro d'application 18778103
Statut En instance
Date de dépôt 2024-07-19
Date de la première publication 2024-11-07
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Dixit, Archana
  • Mahamuni, Amol Bhaskar

Abrégé

A processor may receive authentication data related to inputs of a user to predetermined authentication prompts. The processor may select devices from a set of registered devices to use for providing a first password prompt to the user. The processor may identify one or more output formats for each of the selected devices. The processor may generate a first password prompt having two or more password prompt components, where each password prompt component has an output format. The processor may send the two or more password prompt components to respective selected devices.

Classes IPC  ?

  • G06F 21/45 - Structures ou outils d’administration de l’authentification
  • G06F 21/31 - Authentification de l’utilisateur

61.

COMPUTING A HIERARCHY OF CLASS LABELS FOR HIERARCHICAL MULTI-LABEL CLASSIFICATION

      
Numéro d'application 18138582
Statut En instance
Date de dépôt 2023-04-24
Date de la première publication 2024-10-24
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Jacob, Glincy Mary
  • Odibat, Omar

Abrégé

A computer-implemented method, in accordance with one embodiment, includes collecting attributes of a subject. Cause-effect-decision relationships of the attributes of the subject are determined. Custom attributes are derived based on the cause-effect-decision relationships of the attributes of the subject. Custom attribute relationships and labels for the derived custom attributes of the subject are identified based on the cause-effect-decision relationships of the attributes of the subject, the custom attribute relationships including at least one belongs-to relationship and at least one decision relationship. A hierarchy of the custom attributes is generated using a finite state automaton. A hierarchical multi-label classifier is created (e.g., trained) based on the generated hierarchy. The classifier is used to generate class label decisions associated with labels of the classifier to objects of the subject. The decisions are output.

Classes IPC  ?

62.

DYNAMICALLY ASSIGNING STORAGE OBJECTS TO COMPARTMENT CONSTRUCTS OF A STORAGE SYSTEM TO REDUCE APPLICATION RISK

      
Numéro d'application 18760950
Statut En instance
Date de dépôt 2024-07-01
Date de la première publication 2024-10-24
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Narigapalli, Anil Kumar
  • Nanduru, Laxmikantha Sai
  • Arora, Pritpal S.
  • Olson, James E.
  • Chitti, Mark Vincent

Abrégé

A computer-implemented method, according to one embodiment, includes mapping hosts in communication with a storage system to compartment constructs that are logical partitions of the storage system, analyzing interoperability of the hosts and the compartment constructs and defining, based on the analysis, risk profiles for applications run on the hosts. Ownership of storage objects to the compartment constructs is assigned based on the risk profiles, where each of the storage objects define a logical partition of one of the hosts and a logical partition of a storage volume of the storage system.

Classes IPC  ?

  • G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement

63.

SELECTIVE OBFUSCATION OF LIVE RESOURCES IN A METAVERSE ENVIRONMENT

      
Numéro d'application 18134157
Statut En instance
Date de dépôt 2023-04-13
Date de la première publication 2024-10-17
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Bravo, Cesar

Abrégé

A computer-implemented method, according to one embodiment, includes gathering sharing policies associated with a first user sharing a live resource in a metaverse, and determining characteristics of a second user in the metaverse. The method further includes determining, based on the sharing policies and the characteristics of the second user, whether the second user is authorized to view the live resource shared by the first user. In response to a determination that the second user is not authorized to view the live resource, a first predetermined obfuscation condition is caused to be applied to the second user's view of the live resource for protecting the first user's privacy. Furthermore, in response to a determination that the second user is authorized to view the live resource, the second user is allowed to view the live resource.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

64.

EXPLAINABLE CLASSIFICATIONS WITH ABSTENTION USING CLIENT AGNOSTIC MACHINE LEARNING MODELS

      
Numéro d'application 18300688
Statut En instance
Date de dépôt 2023-04-14
Date de la première publication 2024-10-17
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Ayachitula, Arun A.
  • Khandekar, Rohit
  • Sharma, Upendra

Abrégé

Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes inputting, by a processor, records to a machine learning model, the records being associated with an information technology (IT) domain. The technique includes classifying, by the processor, the records with labels using the machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of the IT domain.

Classes IPC  ?

  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
  • G06F 40/40 - Traitement ou traduction du langage naturel

65.

EXPLAINABLE CLASSIFICATIONS WITH ABSTENTION USING CLIENT AGNOSTIC MACHINE LEARNING MODELS

      
Numéro d'application EP2023063772
Numéro de publication 2024/213269
Statut Délivré - en vigueur
Date de dépôt 2023-05-23
Date de publication 2024-10-17
Propriétaire
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Allemagne)
Inventeur(s)
  • Ayachitula, Arun
  • Khandekar, Rohit
  • Sharma, Upendra

Abrégé

Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes inputting, by a processor, records to a machine learning model, the records being associated with an information technology (IT) domain. The technique includes classifying, by the processor, the records with labels using the machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of the IT domain.

Classes IPC  ?

  • G06N 5/045 - Explication d’inférenceIntelligence artificielle explicable [XAI]Intelligence artificielle interprétable
  • G06N 20/00 - Apprentissage automatique
  • G06N 3/04 - Architecture, p. ex. topologie d'interconnexion
  • G05B 23/02 - Test ou contrôle électrique
  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts

66.

EXPLAINABLE CLASSIFICATIONS WITH ABSTENTION USING CLIENT AGNOSTIC MACHINE LEARNING MODELS

      
Numéro d'application EP2023063778
Numéro de publication 2024/213270
Statut Délivré - en vigueur
Date de dépôt 2023-05-23
Date de publication 2024-10-17
Propriétaire
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Allemagne)
Inventeur(s)
  • Ayachitula, Arun
  • Rohit, Rohit
  • Sharma, Upendra

Abrégé

Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes classifying, by a processor, a record with a label using a machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of an information technology (IT) domain. The processor generates an explanation of a decision by the machine learning model to classify the record with the label and displays the explanation in a human readable form.

Classes IPC  ?

  • G06N 5/045 - Explication d’inférenceIntelligence artificielle explicable [XAI]Intelligence artificielle interprétable
  • G06N 20/00 - Apprentissage automatique
  • G06N 3/04 - Architecture, p. ex. topologie d'interconnexion
  • G05B 23/02 - Test ou contrôle électrique
  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
  • G06Q 10/20 - Administration de la réparation ou de la maintenance des produits

67.

SECURITY FOR CONNECTED DEVICES

      
Numéro d'application 18756072
Statut En instance
Date de dépôt 2024-06-27
Date de la première publication 2024-10-17
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Toska, Desilda
  • Flores, Romelia H.

Abrégé

A method includes: receiving, by a computer device and from an automated teller machine, a personal identification number that is associated with an account; determining, by the computer device, that the personal identification number is a disablement personal identification number that is associated with the account, the account having an activation personal identification number, the disablement personal identification number and the activation personal identification number being different; determining, by the computer device and as a result of receiving the disablement personal identification number, at least one disablement action to be performed by a device other than the automated teller machine; and transmitting, by the computer device, a command to perform the disablement action.

Classes IPC  ?

  • G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile

68.

BOT DETECTION SYSTEM

      
Numéro d'application 18298921
Statut En instance
Date de dépôt 2023-04-11
Date de la première publication 2024-10-17
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Bravo, Cesar

Abrégé

Aspects of the present disclosure include: detecting, by a computing device, an avatar is chatting within a virtual environment; detecting, by the computing device, the avatar is idle for a predetermined amount of time; providing, by the computer device, a challenge to the idled avatar, determining, by the computer device, that the challenge has not been executed; and executing, by the computer device, a security action associated with the idled avatar.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06T 19/00 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie

69.

EXPLAINABLE CLASSIFICATIONS WITH ABSTENTION USING CLIENT AGNOSTIC MACHINE LEARNING MODELS

      
Numéro d'application 18300699
Statut En instance
Date de dépôt 2023-04-14
Date de la première publication 2024-10-17
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Ayachitula, Arun A.
  • Khandekar, Rohit
  • Sharma, Upendra

Abrégé

Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes classifying, by a processor, a record with a label using a machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of an information technology (IT) domain. The processor generates an explanation of a decision by the machine learning model to classify the record with the label and displays the explanation in a human readable form.

Classes IPC  ?

  • G06N 3/04 - Architecture, p. ex. topologie d'interconnexion
  • G06N 3/09 - Apprentissage supervisé

70.

DETERMINATION AND APPLICATION OF CONFIDENCE SCORES TO MITIGATE FRAUDULENT ACCOUNTS

      
Numéro d'application 18133397
Statut En instance
Date de dépôt 2023-04-11
Date de la première publication 2024-10-17
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Bravo, Cesar
  • Odibat, Omar

Abrégé

A computer-implemented method, according to one embodiment, includes receiving, from a user device, a request for determining a final confidence score for an account, and determining a plurality of confidence parameter scores using information associated with the account. A first of the confidence parameter scores is determined based on an analysis of a structure of the account, a second of the confidence parameter scores is determined based on a character analysis of at least the account, and a third of the confidence parameter scores is determined based on an exposure of the account. The method further includes using the determined confidence parameter scores to determine the final confidence score for the account. The determined final confidence score is applied to mitigate fraud.

Classes IPC  ?

  • G06Q 30/018 - Certification d’entreprises ou de produits
  • G06Q 50/26 - Services gouvernementaux ou services publics

71.

Risk mitigation in service level agreements

      
Numéro d'application 18748183
Numéro de brevet 12341665
Statut Délivré - en vigueur
Date de dépôt 2024-06-20
Date de la première publication 2024-10-10
Date d'octroi 2025-06-24
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Nanduru, Laxmikantha Sai
  • Kapasi, Jigar
  • Arora, Pritpal S.
  • Duraisamy, Sathis Kumar

Abrégé

A method of mitigating risks in a service level agreement (SLA), including: identifying relationships between an infrastructure and an application associated with the SLA; identifying changes to a technological environment of the SLA based on collected data associated with the SLA and the identified relationships, the collected data including the infrastructure and the application; establishing a baseline for a service level objective (SLO) of the SLA by analyzing the collected data of the infrastructure and the application; determining risk impact to the SLA based on an assessment of requirements to the SLO and the changes to the technological environment of the SLA; generating a solution option for the SLA by applying an explainable artificial intelligence (XAI) model based on processing the risk impact with the baseline in the XAI model; and updating the SLA based on the solution option.

Classes IPC  ?

  • H04L 41/5006 - Création ou négociation de contrats, de garanties ou de pénalités au niveau du service [SLA]
  • H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p. ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]

72.

AI DRIVEN IMPACT ESTIMATION OF NEW PRODUCT FEATURES

      
Numéro d'application 18297127
Statut En instance
Date de dépôt 2023-04-07
Date de la première publication 2024-10-10
Propriétaire KYNDRYL, INC. (USA)
Inventeur(s)
  • Chintakunta, Mouleswara Reddy
  • Mitruka, Manish
  • Bandaru, Anand
  • Odibat, Omar

Abrégé

A method for product release estimates a ROI of a new product feature of a product. The method identifies a product component which undergoes change with weightage responsive to epic details and non-functional requirements. The method classifies a component action to provide an action classification. The method calculates an effort to create the new feature responsive to the action and a complexity classification determined from at least the weightage. The method calculates an interval of effort to produce the new product feature responsive to the effort and similar epic matches relating to the new product feature. The method calculates an estimated public release time of the new feature responsive to the similar epic matches relating to the new feature. The method generates and follows a schedule responsive to the effort, the interval of effort, the estimated public release time, and the ROI to make the product having the new feature.

Classes IPC  ?

  • G06Q 10/0637 - Gestion ou analyse stratégiques, p. ex. définition d’un objectif ou d’une cible pour une organisationPlanification des actions en fonction des objectifsAnalyse ou évaluation de l’efficacité des objectifs

73.

Computation, prediction, and use of vandalism scores

      
Numéro d'application 18127963
Numéro de brevet 12111855
Statut Délivré - en vigueur
Date de dépôt 2023-03-29
Date de la première publication 2024-10-03
Date d'octroi 2024-10-08
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Dixit, Archana
  • Mahamuni, Amol Bhaskar
  • K, Kiran Kumar
  • Sondkar, Mahesh

Abrégé

A computer-implemented method, in accordance with one embodiment, includes collecting data from a plurality of predefined functional areas in a particular geographical area in which a plurality of physical objects are located, at least some of the data relating to vandalism. Wrangling is performed on the data to correlate the data from the functional areas with respective ones of the physical objects. The wrangled data corresponding to each of the physical objects is transformed into features corresponding to a the functional areas. For each of the physical objects, the features are processed according to predefined rules for generating a rank for each of the functional areas. Dynamic weights are computed for at least some of the features to account for data drift by comparing historical data with latest data. The ranks and dynamic weights are transformed into a vandalism score for each of the physical objects, which is output.

Classes IPC  ?

  • G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
  • G06F 16/2457 - Traitement des requêtes avec adaptation aux besoins de l’utilisateur
  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
  • G06F 16/29 - Bases de données d’informations géographiques

74.

SECURE NETWORK IDENTIFICATION FOR ACTIVE SCANNING DEVICE

      
Numéro d'application 18130102
Statut En instance
Date de dépôt 2023-04-03
Date de la première publication 2024-10-03
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Bravo, Cesar
  • Campos Batista, David Alonso

Abrégé

An example operation may include one or more of storing a hash of a service set identifier (SSID) of a wireless network via an apparatus, receiving a probe request message transmitted from a network device, wherein the probe request message comprises a hash value, determining that the hash value within the probe request is a valid SSID based on the hash of the SSID of the wireless network stored in the storage device, and controlling the network interface to transmit a probe response with a plain text name of the SSID to the network device in response to the determination.

Classes IPC  ?

  • H04W 48/14 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p. ex. distribution de données d'exploration utilisant une requête de l’utilisateur
  • H04W 48/16 - ExplorationTraitement d'informations sur les restrictions d'accès ou les accès

75.

KEYPAD SECURITY

      
Numéro d'application 18736772
Statut En instance
Date de dépôt 2024-06-07
Date de la première publication 2024-10-03
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Garcia Delgado, Carolina
  • Campos Batista, David Alonso
  • Toska, Desilda

Abrégé

A method for detecting a fake keypad includes: monitoring outputs of plural magnetic field sensors connected to a keypad; detecting the output of at least one of the magnetic field sensors indicates the presence of a magnetic field; starting, in response to the detecting, a timer; determining the first timer reaches a first threshold while the output of the at least one of the magnetic field sensors still indicates the presence of a magnetic field; in response to the timer reaching the first threshold, determining a number of the magnetic field sensors whose output indicates the presence of a magnetic field equals or exceeds a second threshold; in response to the number of the magnetic field sensors equaling or exceeding the second threshold, determining a security action; and initiating the security action.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • H04N 7/18 - Systèmes de télévision en circuit fermé [CCTV], c.-à-d. systèmes dans lesquels le signal vidéo n'est pas diffusé

76.

INPUT/OUTPUT INTERFACE SECURITY

      
Numéro d'application 18678004
Statut En instance
Date de dépôt 2024-05-30
Date de la première publication 2024-09-26
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Rodriguez Bravo, Cesar Augusto

Abrégé

Methods, computer program products, and systems are presented. The Methods, computer program products, and systems can include, for example: examining hardware device transmitted data received through an I/O interface port of a computer system; determining in dependence on the examining whether the hardware device transmitted data received through the I/O interface port of the computer system satisfies a criterion; and in response to determining that the hardware device transmitted data received through the I/O interface port of the computer system satisfies the criterion, initiating a security process for protecting the computer system.

Classes IPC  ?

  • G06F 21/85 - Protection des dispositifs de saisie, d’affichage de données ou d’interconnexion dispositifs d’interconnexion, p. ex. les dispositifs connectés à un bus ou les dispositifs en ligne
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures
  • G06F 21/81 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur en agissant sur l’alimentation, p. ex. en branchant ou en débranchant l’alimentation, les fonctions de mise en veille ou de reprise

77.

SELF-LEARNING AND ADAPTING CYBER THREAT DEFENSE

      
Numéro d'application 18678415
Statut En instance
Date de dépôt 2024-05-30
Date de la première publication 2024-09-26
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Scheideler, Tim Uwe
  • Udupi Raghavendra, Arjun
  • Seul, Matthias
  • Giovannini, Andrea

Abrégé

The exemplary embodiments disclose a method, a computer system, and a computer program product for detecting malware. The exemplary embodiments may include aggregating known malware patterns by storing malware patterns and related malware categories of the malware patterns. The exemplary embodiments may additionally include training a first machine-learning system, comprising a generator portion and a discriminator portion, by using the known malware patterns and the related malware categories as training data. The exemplary embodiments may also include generating additional synthetic code patterns by feeding random code samples to the trained first machine-learning system. The exemplary embodiments may further include training a second machine-learning system by using benevolent code patterns and the generated additional synthetic code patterns as training data. The exemplary embodiments may include determining a statistical distribution of predicted malicious code patterns and related categories, and determining a quality value of the training of the second machine-learning system.

Classes IPC  ?

  • G06N 3/088 - Apprentissage non supervisé, p. ex. apprentissage compétitif
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06N 3/045 - Combinaisons de réseaux

78.

AUTOMATIC CURATION OF CHATS IN VIRTUAL REALITY

      
Numéro d'application 18186249
Statut En instance
Date de dépôt 2023-03-20
Date de la première publication 2024-09-26
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Bravo, Cesar

Abrégé

Embodiments relate to providing automatic curation of chats in virtual reality. A technique includes determining, using a machine learning model, that consecutive segmented messages combine to form a complete message, the consecutive segmented messages being from a virtual environment. The technique includes determining that the complete message violates a security rule and performing a security action that affects a display of the consecutive segmented messages forming the complete message.

Classes IPC  ?

  • H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p. ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p. ex. des réponses automatiques ou des messages générés par un agent conversationnel
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 40/20 - Analyse du langage naturel

79.

Segmenting data according to data access privilege grants during storage of the data in a database

      
Numéro d'application 18122036
Numéro de brevet 12406082
Statut Délivré - en vigueur
Date de dépôt 2023-03-15
Date de la première publication 2024-09-19
Date d'octroi 2025-09-02
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • M, Nalini
  • Krishnamurthy, Viswanatha
  • Perumal Thevar, Muniyandi
  • Bushetti, Veeresh

Abrégé

A computer-implemented method, according to one embodiment, includes causing a trained artificial intelligence (AI) model to derive data access privilege grants before data is stored in a predetermined database, and segmenting the data according to the data access privilege grants during storage of the data in the predetermined database. Metadata that defines the data access privilege grants is stored with the segments of data. The method further includes receiving, from a first user device, a query requesting data stored in the predetermined database. At least some of the metadata is read to identify a segment of the data associated with a data access privilege grant associated with the query. The method further includes allowing the first user device to access the identified segment of data for fulfilling the query.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 21/60 - Protection de données

80.

SOFTWARE APPLICATION DEPLOYMENT

      
Numéro d'application 18669934
Statut En instance
Date de dépôt 2024-05-21
Date de la première publication 2024-09-19
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Tripathi, Dinesh
  • Thayyilsubramanian, Sarin Kumar
  • Kurian, John
  • Palakodeti, Ramesh S.

Abrégé

Methods, computer program products, and systems can include obtaining a first computing environment specific application deployment software code instance associated to a first computing environment, the first computing environment specific application deployment software code instance for deployment of a certain application on the first computing environment; parsing the first computing environment specific application deployment software code instance, wherein the parsing includes determining attributes of the first computing environment specific application deployment software code instance and generating, using the determined attributes of the first computing environment specific application deployment software code instance, a computing environment agnostic semantic tree data structure that expresses a workflow pattern for deployment of the certain application; and composing, with use of the computing environment agnostic semantic tree data structure, a second computing environment specific application deployment software code instance associated to a second computing environment for deployment of the certain application on the second computing environment.

Classes IPC  ?

81.

Code change request management and human gate free deployment based on data collected from a development system

      
Numéro d'application 18122053
Numéro de brevet 12182567
Statut Délivré - en vigueur
Date de dépôt 2023-03-15
Date de la première publication 2024-09-19
Date d'octroi 2024-12-31
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • M, Nalini
  • Sharma, Kalpesh
  • Holla, Prasanna
  • Bushetti, Veeresh

Abrégé

A computer-implemented method, in accordance with one aspect of the present invention, includes collecting data existing in a development system that relates to the code change request, in response to receiving a code change request to merge new code with existing code. Factors from the collected data are computed for assessing a risk of promoting the new code, the factors including at least: a developer information factor, a developer availability factor, and an environment health analysis factor. The factors are processed to compute a confidence score for the code change request. If the confidence score is in a first predefined range, the new code corresponding to the code change request is promoted for merging with the existing code, without human intervention. If the confidence score is in a second predefined range, an indication that human intervention is needed before promoting the code is output.

Classes IPC  ?

  • G06F 8/77 - Métriques logicielles
  • G06F 8/72 - Refonte de code
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

82.

BOT DETECTION IN A VIRTUAL DIGITAL ENVIRONMENT

      
Numéro d'application 18180259
Statut En instance
Date de dépôt 2023-03-08
Date de la première publication 2024-09-12
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Rodriguez Bravo, Cesar

Abrégé

Disclosed embodiments provide bot detection in a virtual environment that is based on avatar motion. The motion of an avatar within a virtual environment such as a metaverse is tracked. The tracked motion is separated into multiple movement segments. The movement segments are compared to a collection of movement patterns in a movement pattern database that are indicative of bots. A similarity metric is determined between the tracked motion and the database of bot motions. In response to the similarity metric exceeding a predetermined threshold, a list of at least one mitigation action is obtained, and the at least one mitigation action in the list is executed, thereby mitigating the adverse effects of bots in a virtual digital environment.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

83.

CONTEXTUAL ITEM DISCOVERY AND PATTERN INCULCATED REMINDER MECHANISM

      
Numéro d'application 18663511
Statut En instance
Date de dépôt 2024-05-14
Date de la première publication 2024-09-12
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Patel, Pritesh
  • Kwatra, Shikhar
  • Kundu, Amitava
  • Perepa, Sujatha B.

Abrégé

Aspects of the present disclosure relate generally to reminder systems and, more particularly, to a contextual item discovery and pattern inculcated reminder mechanism and methods of use. A computer-implemented method includes: determining, by a computing device, an event in which a user will participate; associating, by the computing device, one or more items with the event; determining a location of the one or more items associated with the event including that the user does not possess any combination of the one or more items; and providing an alert to the user that the any of the one or more items associated with the event is not in the possession of the user.

Classes IPC  ?

  • G08B 21/24 - Alarmes aide-mémoire, p. ex. alarmes contre la perte
  • G06N 20/00 - Apprentissage automatique

84.

Physical and virtual environment synchronization

      
Numéro d'application 18663743
Numéro de brevet 12380663
Statut Délivré - en vigueur
Date de dépôt 2024-05-14
Date de la première publication 2024-09-12
Date d'octroi 2025-08-05
Propriétaire KYNDRYL, INC. (USA)
Inventeur(s)
  • Whitman, Todd Russell
  • Silverstein, Zachary A.
  • Fox, Jeremy R.
  • Rakshit, Sarbajit K.

Abrégé

Systems and methods synchronize content of a virtual environment with a state of a physical environment. In aspects, a method includes obtaining sensor data from a network of remote sensors measuring a physical state of a location at a time; generating context specific parameter data based on the sensor data; obtaining context data from a remote virtual reality (VR) system, wherein the context data reflects a current state of virtual content in a virtual environment displayed by the remote VR system; selecting virtual content to be displayed in the virtual environment by the remote VR system based on the context specific parameter data, the context data, and rules; and sending the virtual content to the remote VR system to be displayed to a user, wherein the virtual content reflects a state of the physical location at the time.

Classes IPC  ?

  • G06T 19/00 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie
  • G06V 20/20 - ScènesÉléments spécifiques à la scène dans les scènes de réalité augmentée
  • H04W 4/38 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour la collecte d’informations de capteurs

85.

TOUCH ANALYTICS-DRIVEN BUYING PATTERN DETECTION SYSTEM FOR BEHAVIORAL CAUSAL ANALYSIS

      
Numéro d'application 18117972
Statut En instance
Date de dépôt 2023-03-06
Date de la première publication 2024-09-12
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Arora, Pritpal S.
  • Chintakunta, Mouleswara Reddy

Abrégé

A computer-implemented method, in accordance with one embodiment, includes collecting touch data from one or more touch sensors coupled to a first product, the one or more touch sensors being configured to indicate when a human touches the one or more touch sensors and/or first product. Product vector information about the first product is received. Classification on the touch data and product vector information is performed using a hierarchical multilabel classification system for assigning the touch data to predefined patterns for each level of a classifier used by the hierarchical multilabel classification system. Features of a second product, e.g., a touch vector and a touch pattern, are transformed into a second feature vector. A featurewise difference detection is performed on the feature vectors to calculate a difference in distribution for features of the products to generate and output a caption indicative of the differences between the products.

Classes IPC  ?

86.

CLOUD DATA REPLICATION

      
Numéro d'application 18181930
Statut En instance
Date de dépôt 2023-03-10
Date de la première publication 2024-09-12
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Aradhya, Aradhya A.
  • Goyal, Sudiksha
  • Bansal, Geetika
  • Sriramula, Rajashekar
  • Panjani, Venkat K.
  • Kannan, Agilandeswari

Abrégé

A computer-implemented method includes: generating, by the computing device, a plurality of data blocks for a received block size; sharing, by the computing device, a time based universally unique identifier (UUID) for a first data block of the data blocks and an incremental time interval between each data block of the data blocks; finding, by the computing device, a time based UUID which corresponds with the requested data block; and sending, by the computing device, the time based UUID to a cloud site, the time based UUID corresponding with the requested data block.

Classes IPC  ?

  • G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
  • G06F 16/29 - Bases de données d’informations géographiques

87.

Crowd sourced data restores

      
Numéro d'application 18133815
Numéro de brevet 12072772
Statut Délivré - en vigueur
Date de dépôt 2023-04-12
Date de la première publication 2024-08-27
Date d'octroi 2024-08-27
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Bode, Christopher Collins
  • Formato, Marci Devorah
  • Bravo, Cesar

Abrégé

A computer-implemented method includes: receiving, by a computing device, a data restore request; determining, by the computing device, at least one object in response to the data restore request; and querying, by the computing device, a client population to determine at least one client which has resources and network cardinality to assist the data restore request. The at least one client creates a distributed and crowd sourced cache of objects for the data restore request.

Classes IPC  ?

  • G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
  • G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
  • H04L 43/0876 - Utilisation du réseau, p. ex. volume de charge ou niveau de congestion

88.

RECRUITMENT AUGMENTATION WITH DIGITAL FOOTPRINT UTILIZATION

      
Numéro d'application 18110492
Statut En instance
Date de dépôt 2023-02-16
Date de la première publication 2024-08-22
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Sahayaraj, Sanjana
  • Kesavan, Balakrishna Saravanan
  • Kumar S G, Khanij

Abrégé

A method including: identify candidate pool resources by analyzing a job description; posting the job description at the candidate pool resources; identifying candidates from the candidate pool resources; determining a candidate score of each of the candidates based on an identified candidate information source; and selecting a set of the candidates based on the candidate score.

Classes IPC  ?

  • G06Q 10/1053 - Emploi ou embauche
  • G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme

89.

SYSTEM AND METHOD FOR HANDLING COMPRESSED CRITICAL FILES

      
Numéro d'application EP2023063118
Numéro de publication 2024/170104
Statut Délivré - en vigueur
Date de dépôt 2023-05-16
Date de publication 2024-08-22
Propriétaire
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Allemagne)
Inventeur(s)
  • Akula, Ravinder
  • Murugesan, Jeevabharathy
  • Dhandapani, Karthikrajkumar
  • Zolotow, Clea

Abrégé

A computer-implemented method includes: monitoring, by a computing device, a data set format of all files in a computing system to determine a list of data sets in a first format which are accessed greater than a predetermined number of times; gathering, by the computing device, the list of data sets in the first format within the computing system; and converting, by the computing device, the list of data sets in the first format within the computing system to a second format which is different from the first format.

Classes IPC  ?

  • G06F 16/16 - Opérations sur les fichiers ou les dossiers, p. ex. détails des interfaces utilisateur spécialement adaptées aux systèmes de fichiers

90.

GENERATION OF REQUIREMENTS AND WEIGHTAGE SCORES BASED ON A POLICY CONFIGURATION

      
Numéro d'application 18111371
Statut En instance
Date de dépôt 2023-02-17
Date de la première publication 2024-08-22
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Chandra, Avinash
  • Bushetti, Veeresh
  • Venkitachalam, Hariharan N.
  • Sharma, Kalpesh

Abrégé

In one general embodiment, a computer-implemented method includes collecting information relating at least to market trends and problem ticketing. The collected information is stored in a knowledge repository. At least some of the collected information is processed to compute weightage scores for requirements specified in a policy configuration. A list comprising at least some of the requirements and indications of the weightage scores corresponding thereto is generated and output.

Classes IPC  ?

  • G06Q 10/0637 - Gestion ou analyse stratégiques, p. ex. définition d’un objectif ou d’une cible pour une organisationPlanification des actions en fonction des objectifsAnalyse ou évaluation de l’efficacité des objectifs
  • G06Q 30/0202 - Prédictions ou prévisions du marché pour les activités commerciales

91.

Service health assessment

      
Numéro d'application 18112416
Numéro de brevet 12395415
Statut Délivré - en vigueur
Date de dépôt 2023-02-21
Date de la première publication 2024-08-22
Date d'octroi 2025-08-19
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Sharma, Kalpesh
  • Perumal Thevar, Muniyandi
  • Tongia, Shaleen
  • M, Nalini

Abrégé

A computer-implemented method, in accordance with one embodiment, includes receiving a taxonomy specifying entities of a business service and levels of said entities. Time series data about the entities is collected and stored. Impactor propagation paths between entities is identified. A territory of a health impact of each entity is also identified. A health score for each of the entities, considering impacts on a health of the entity by at least one other entity, is computed based on the data, the propagation paths, and the territories of the entities. At least one of the health scores is output.

Classes IPC  ?

  • H04L 43/0817 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant le fonctionnement
  • H04L 43/02 - Capture des données de surveillance

92.

AUTOMATED ARTIFICIAL INTELLIGENCE (AI) INSPECTION OF CUSTOMIZED PART PRODUCTION

      
Numéro d'application 18112574
Statut En instance
Date de dépôt 2023-02-22
Date de la première publication 2024-08-22
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Siddappa, Sheela

Abrégé

Aspects of the present disclosure relate generally to machine inspection of part production and, more particularly, to systems and methods of automated Al inspection of customized part production. For example, a computer-implemented method includes receiving, by a processor, design information for a custom part; extracting, by the processor, feature information of the custom part from the design information; receiving, by the processor, images of the custom part in production from a recording in near real time; and verifying, by the processor, using machine learning that features in the images of the custom part in production are in compliance with the feature information of the custom part.

Classes IPC  ?

  • G05B 19/418 - Commande totale d'usine, c.-à-d. commande centralisée de plusieurs machines, p. ex. commande numérique directe ou distribuée [DNC], systèmes d'ateliers flexibles [FMS], systèmes de fabrication intégrés [IMS], productique [CIM]
  • G05B 13/02 - Systèmes de commande adaptatifs, c.-à-d. systèmes se réglant eux-mêmes automatiquement pour obtenir un rendement optimal suivant un critère prédéterminé électriques

93.

ORCHESTRATION OF A PATTERN-BASED CONFIGURABLE PROCESS SEQUENCE

      
Numéro d'application 18113000
Statut En instance
Date de dépôt 2023-02-22
Date de la première publication 2024-08-22
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s) Nalam, Kishore Vnts

Abrégé

A computer-implemented method, according to one approach, includes causing a predetermined tracker component to create a template tracker file based on a pattern-based configurable process sequence and causing a predetermined logger component to create a log of the pattern-based configurable process sequence. A playbook is generated based on the pattern-based configurable process sequence. The method further includes storing the template tracker file, a file including the log, and the playbook in storage for enabling auditing of the pattern-based configurable process sequence. A computer program product, according to another approach, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computer to cause the computer to perform the foregoing method.

Classes IPC  ?

  • G05B 19/418 - Commande totale d'usine, c.-à-d. commande centralisée de plusieurs machines, p. ex. commande numérique directe ou distribuée [DNC], systèmes d'ateliers flexibles [FMS], systèmes de fabrication intégrés [IMS], productique [CIM]

94.

AUTOMATED CUSTOMIZED MACHINE LEARNING MODEL VALIDATION FLOW

      
Numéro d'application 18108354
Statut En instance
Date de dépôt 2023-02-10
Date de la première publication 2024-08-15
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Devaraj, Divya
  • Sahayaraj, Sanjana
  • Rai, Aastha
  • Odibat, Omar

Abrégé

In one aspect, a computer-implemented method includes detecting, by one or more processing devices, custom goals of a specified machine learning application; determining, by the one or more processing devices, relative importance of a plurality of performance categories for the specified machine learning application, based on the custom goals of the specified machine learning application; generating, by the one or more processing devices, automated machine learning model tests based on the determined relative importance of the plurality of performance categories for the specified machine learning application; and performing, by the one or more processing devices, validation testing of the machine learning model based on the automated machine learning model tests.

Classes IPC  ?

95.

HANDLING COMPRESSED CRITICAL FILES

      
Numéro d'application 18110063
Statut En instance
Date de dépôt 2023-02-15
Date de la première publication 2024-08-15
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Akula, Ravinder
  • Murugesan, Jeevabharathy
  • Dhandapani, Karthikrajkumar
  • Zolotow, Clea

Abrégé

A computer-implemented method includes: monitoring, by a computing device, a data set format of all files in a computing system to determine a list of data sets in a first format which are accessed greater than a predetermined number of times; gathering, by the computing device, the list of data sets in the first format within the computing system; and converting, by the computing device, the list of data sets in the first format within the computing system to a second format which is different from the first format.

Classes IPC  ?

  • G06F 16/11 - Administration des systèmes de fichiers, p. ex. détails de l’archivage ou d’instantanés
  • G06F 16/174 - Élimination de redondances par le système de fichiers

96.

AI CUSTOMIZED MLOPS FRAMEWORK IN A MULTI-TENANT CLOUD ENVIRONMENT

      
Numéro d'application 18110074
Statut En instance
Date de dépôt 2023-02-15
Date de la première publication 2024-08-15
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Odibat, Omar
  • Mohamed Iyoob Umar, Umar
  • Chintakunta, Mouleswara Reddy
  • Mitruka, Manish
  • Guerrero, Gail Camille

Abrégé

A computer implemented system, method, and computer program product are disclosed for managing a machine learning model operation (MLOps) for cost forecasting models. The MLOps receives a request for a subscription machine learning (ML) model by a tenant having a corresponding tenant configuration profile and automatically selects a subscription ML model in a model registry based on the tenant configuration profile. The MLOps deploys the selected subscription ML model to the tenant and monitors usage by the tenant of the currently operating ML model at a pre-determined refresh frequency. The MLOps determines whether the currently operating ML model exceeds a pre-determined accuracy threshold, and automatically deploys a second subscription ML model from the model registry to the tenant in place of the currently operating ML model in response to the pre-determined accuracy threshold being exceeded.

Classes IPC  ?

97.

Augmented reality enabled command management

      
Numéro d'application 18637799
Numéro de brevet 12406670
Statut Délivré - en vigueur
Date de dépôt 2024-04-17
Date de la première publication 2024-08-08
Date d'octroi 2025-09-02
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Rakshit, Sarbajit K.

Abrégé

The exemplary embodiments disclose a method, a computer program product, and a computer system for managing user commands. The exemplary embodiments may include a user giving one or more commands to one or more devices, collecting data of the one or more commands, extracting one or more features from the collected data, and determining which one or more of the commands should be executed on which one or more of the devices based on the extracted one or more features and one or more models.

Classes IPC  ?

  • G10L 15/00 - Reconnaissance de la parole
  • G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • G10L 15/22 - Procédures utilisées pendant le processus de reconnaissance de la parole, p. ex. dialogue homme-machine
  • G10L 15/30 - Reconnaissance distribuée, p. ex. dans les systèmes client-serveur, pour les applications en téléphonie mobile ou réseaux
  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
  • G10L 15/02 - Extraction de caractéristiques pour la reconnaissance de la paroleSélection d'unités de reconnaissance
  • G10L 15/16 - Classement ou recherche de la parole utilisant des réseaux neuronaux artificiels
  • G10L 25/30 - Techniques d'analyse de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par la technique d’analyse utilisant des réseaux neuronaux

98.

CONTINUOUS MAINTENANCE OF MODEL EXPLAINABILITY

      
Numéro d'application 18161191
Statut En instance
Date de dépôt 2023-01-30
Date de la première publication 2024-08-01
Propriétaire KYNDRYL, INC. (USA)
Inventeur(s)
  • Wheatley, Keri
  • Sahayaraj, Sanjana
  • Odibat, Omar

Abrégé

A computer-implemented method for model building with explainability is provided. The method includes receiving, by a hardware processor, a first metric and a second metric of minimum model performance. The first metric relates to data modeling quality and the second metric relates to model to business rule correlations. The method further includes performing, by the hardware processor, auto Artificial Intelligence model generation responsive to training data and a combination of the first and the second metrics of minimum model performance to obtain a model that is trained and meets model prediction accuracy and model prediction explainability requirements represented by the combination of the first and the second metrics of minimum model performance.

Classes IPC  ?

  • G06N 5/022 - Ingénierie de la connaissanceAcquisition de la connaissance

99.

Restoring system functionality when primary maintenance interface is unavailable

      
Numéro d'application 18157358
Numéro de brevet 12088454
Statut Délivré - en vigueur
Date de dépôt 2023-01-20
Date de la première publication 2024-07-25
Date d'octroi 2024-09-10
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Moreira Martins, Allan Douglas
  • Ferreira, Robert Justiniano
  • Lara, Marcos
  • Rodrigues Bastos, Joab
  • Dias Generoso, Tiago

Abrégé

An approach for restoring system functionality when a primary maintenance interface is unavailable is provided. In an embodiment, a computer maintenance application that is configured to use a Virtual Telecommunications Access Method (VTAM) interface to connect to a mainframe system is retrieved. A mainframe system is accessed with the computer maintenance application using the VTAM interface. During the access, a maintenance activity is performed on the mainframe system using the computer maintenance application.

Classes IPC  ?

  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 41/0654 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau

100.

CONSUMER SERVICES IN AUTONOMOUS VEHICLES

      
Numéro d'application 18099641
Statut En instance
Date de dépôt 2023-01-20
Date de la première publication 2024-07-25
Propriétaire Kyndryl, Inc. (USA)
Inventeur(s)
  • Rakshit, Sarbajit K.
  • Nanduru, Laxmikantha Sai
  • Arora, Pritpal S.

Abrégé

A computer-implemented method includes: advertising, by a computing device, at least one service including information from a learned knowledge base by a service provider vehicle within an autonomous vehicle ecosystem; connecting, by the computing device, the service provider vehicle to a service consumer vehicle within the autonomous vehicle ecosystem through a communication network; and sharing, by the computing device, the at least one service including the information from the learned knowledge base through a connection between the service provider vehicle and the service consumer vehicle using the communication network.

Classes IPC  ?

  • B60W 60/00 - Systèmes d’aide à la conduite spécialement adaptés aux véhicules routiers autonomes
  • B60W 40/06 - Calcul ou estimation des paramètres de fonctionnement pour les systèmes d'aide à la conduite de véhicules routiers qui ne sont pas liés à la commande d'un sous-ensemble particulier liés aux conditions ambiantes liés à l'état de la route
  • H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p. ex. communication véhicule-piétons
  1     2     3     ...     33        Prochaine page