The present disclosure relates generally to cybersecurity and, more particularly, to a system and method to detect and prevent login attacks. A computer-implemented method includes: gathering, by a computing device, a login window from a display of a user device; determining, by the computing device, that the login window is invalid; flagging, by the computing device, the login window as an attack on the user device upon determining that the login window is invalid; and executing, by the computing device, a security action on the user device.
A computer-implemented method may include determining, by a computing device, a verve of a feature; determining, by a computing device, a first release intensity score (RIS) of the feature; stabilizing, by a computing device, a release train based on the verve and the RIS of the feature; and modifying, by a computing device, an engagement schedule based on the stabilized release train.
A computer implemented method and system for supporting self-assessed upgrades using dynamic benchmarking of combinations of main and sub libraries for carrying out Library Developer Operations (LibOps) includes identifying a software library module being used in a software application, identifying dependencies and upgrades for the software library module, identifying a latest software library module version, identifying a change.log module for the latest software library module version, wherein the change.log module includes a record of all changes to the software library module, categorizing breaking changes and deprecated features for the latest software library module version and generating an upgrade score and suggesting recommendations responsive to the upgrade score.
Embodiments receive ticket input data, determine an estimated resolution time using at least one machine learning (ML) model based on the received ticket input data, determine a ticket mis-assignment data based on the received ticket input data, and send a ticket output data based on the estimated resolution time and the ticket mis-assignment data.
G06Q 10/0631 - Planification, affectation, distribution ou ordonnancement de ressources d’entreprises ou d’organisations
G06F 18/2413 - Techniques de classification relatives au modèle de classification, p. ex. approches paramétriques ou non paramétriques basées sur les distances des motifs d'entraînement ou de référence
5.
BUSINESS SERVICE HEALTH SCORE VALIDATION FRAMEWORK
Embodiments receive metric and log data from an external system; generate a first set of health scores for metric data of the metric and log data using a plurality of artificial intelligence (AI) models; generate a second set of health scores for log data of the metric and log data using a log data analysis; determine a similarity score based on the first set of health scores and the second set of health scores; and perform a validation by comparing the similarity score to a predetermined threshold value.
Embodiments relate to automatically providing multi-cloud generative artificial intelligence (AI) arbitrage, orchestration, and accuracy validation. An aspect includes inputting a user prompt to artificial intelligence (AI) models to obtain results and in response to receiving the results from the AI models, determining that at least one incongruent result is found in the results. An aspect includes resolving an issue of the at least one incongruent result in the results, in response to resolving the issue, merging the results to obtain a final result, and presenting the final result.
Computer-implemented methods for a Kubernetes root cause analysis system. Aspects include receiving a keyword from a preprocessor of a Kubernetes root cause analysis system. Aspects further include determining a degree of similarity for the keyword. Aspects also include determining a membership approximation for the keyword in a labeled gravid fuzzy rough set of a multifaceted knowledge corpus based on the degree of similarity for the keyword. Aspects include receiving a determination associated with the membership approximation for the keyword from a subject matter expert. Aspects further include performing a membership action using the keyword on the labeled gravid fuzzy rough set.
An approach is provided that identifies a sensitive data in a request to an artificial intelligence (AI) engine. In one embodiment, the identifying further includes: translating the request from one natural language to other natural languages, thus creating translated requests, comparing fields in the first natural language to fields in the other natural languages with the comparing resulting in some untranslated fields that are treated as the sensitive data. The approach further includes creating an obfuscated request by obfuscating the sensitive data identified in the request before the obfuscated request is transmitted to the AI engine.
Embodiments relate to a technique for providing automated single-to-grouped cloud computing optimizations. The technique includes generating, by a first machine learning model, a single notification for a computing environment, and in response to receiving user responses to a string of the single notification and other single notifications for the computing environment, determining to switch from a single mode to a group mode. The technique includes, based on the user responses to the string of the single notification and the other single notifications for the computing environment, generating, by a second machine learning model, a group of notifications for the computing environment. The technique includes causing at least one modification to the computing environment in accordance with at least one affirmative user response to the group of notifications.
Computer-implemented methods for a Kubernetes root cause analysis system. Aspects include receiving a keyword from a preprocessor of a Kubernetes root cause analysis system. Aspects further include determining a degree of similarity for the keyword. Aspects also include determining a membership approximation for the keyword in a labeled gravid fuzzy rough set of a multifaceted knowledge corpus based on the degree of similarity for the keyword. Aspects include receiving a determination associated with the membership approximation for the keyword from a subject matter expert. Aspects further include performing a membership action using the keyword on the labeled gravid fuzzy rough set.
Embodiments receive confidential data on a first device; modify the confidential data on the first device by using a randomization pattern; and send the modified confidential data to a second device by wireless communication.
G06F 21/75 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par inhibition de l’analyse de circuit ou du fonctionnement, p. ex. pour empêcher l'ingénierie inverse
Embodiments determine a set of writing patterns of at least one data communication; determine a narrative style on the set of writing patterns of the at least one data communication; provide a writing profile model by training on the narrative style and the set of writing patterns; compare a new data communication to the trained writing profile model; and flag the new data communication based on the comparison being over a threshold level.
A method may include obtaining, by a computing device, an information technology (IT) incident report; obtaining, by the computing device, a set of system details of a system experiencing an IT incident, the IT incident being described by the IT incident report; identifying, by the computing device, a plurality of potential IT incident resolutions; scoring, by the computing device, the plurality of potential IT incident resolutions using a machine learning model, the machine learning model configured to determine a success of the plurality of potential IT incident resolutions; and generating and transmitting, by the computing device and according to the scoring, the plurality of potential IT incident resolutions.
Computer-implemented methods for a user-friendly and self-managed CAPTCHA system. Aspects include storing a copy of an image selected from a set of images as a source image. Aspects further include generating a reference image by applying an image obfuscation technique to the image and a challenge image by applying a different image obfuscation technique to the image. Aspects include dividing the challenge image into partitions and placing the partitions randomly on a virtual canvas. Aspects include displaying the reference image and the virtual canvas on a user device requesting to access a protected resource. Aspects include receiving a solution image comprising the partitions of the challenge image arranged by a user from the user device. Aspects also include generating a similarity score by comparing the source image and the solution image. Aspects further include determining that the similarity score is below a threshold value and performing a security action.
Embodiments relate to the identification and mitigation of spoofing attacks on autonomous vehicles. A technique includes detecting using a sensor of the vehicle that an object appears in a path of the vehicle and preventing the vehicle from motion in response to detecting the object. The technique includes determining that the object is associated with a deception of the sensor of the vehicle and performing security actions in response to determining that the object is associated with the deception of the sensor of the vehicle.
In an first aspect of the disclosure, there is a computer-implemented method which includes: obtaining, by a computing device, a password entered by an account user, placing, by the computing device, the password in memory of a device; generating, by the computing device, a fake password by randomly injecting characters into the password; storing, by the computing device, the fake password in a secure database; and deleting the password from the memory.
Computer-implemented methods for an impersonation attack detection and prevention system. Aspects include receiving a communication from a user of a communication environment. Aspects further include generating a similarity score using metadata of the communication from the user and a digital persona associated with the user in the communication environment. Aspects also include determining that the communication is a potential impersonation attack threat by determining that the similarity score is below a threshold value. Aspects include performing a security action to protect the communication environment from the potential impersonation attack threat.
Embodiments relate to a computer implemented method for identifying, validating and authenticating a user using biological patterns and numbers. The method includes prompting a user to enter a password into an authentication software, where the password is responsive to selected user fingers, selected user fingerprints and a selected entry pattern of the user fingers and user fingerprints. A biometric sensing device is operated to obtain biometric data responsive to sensed user fingers, sensed user fingerprints and a sensed entry pattern. The biometric data is processed to determine characteristic features of at least one of the sensed user fingers, the sensed user fingerprints and the sensed entry pattern and the characteristic features is compared with the user data to determine if the characteristic features match the user data. The user is allowed or denied entry into a computer system responsive to whether the characteristic features match the user data.
Embodiments input a plurality of data and a weightage reallocation to a dynamic ranking priority system, calculate a plurality of sentiment scores and a plurality of penalty scores based on the plurality of data, eliminate a sentiment score of the plurality of sentiment scores in response to a corresponding penalty score of the plurality of penalty scores being greater than a predetermined threshold, dynamically re-rank a plurality of tickets with a same priority using a machine learning (ML) model based on a type of the plurality of data which is most similar to historical data, dynamically change a pre-allocated weightage using a learn on the job (LOTJ) model based on a ticket resolution to perform based on the plurality of data, and adjust the weight reallocation based on the dynamically changed pre-allocated weightage.
In an aspect of the disclosure, a method includes: obtaining, by a computing device, a user request to access at least one system resource; obtaining, by the computing device, a digital certificate of the user requesting access to the at least one system resource; obtaining, by the computing device, a validation result associated with the digital certificate from a blockchain ledger network; determining, by the computing device, whether the validation result authorizes access to an authorization service; and sending the authorization to the authorization service to deny or permit the user access to the at least one system resource based on the validation result.
In an aspect of the disclosure, there is a computer-implemented method including: obtaining, by a computing device, a request from an endpoint device to access at least one system resource; obtaining, by the computing device, a digital certificate from a shared digital wallet; obtaining, by the computing device, a validation result associated with the digital certificate from a blockchain ledger network; determining, by the computing device, whether the validation result authorizes access to the at least one system resource by the endpoint device; and sending authorization to the endpoint to deny or permit the endpoint device access to the at least one system resource based on the validation result.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
A computer-implemented method, including: receiving, by a computing device, an information technology (IT) operations request; collecting, by the computing device, information associated with the IT operation request from a knowledge bank; determining, by the computing device, a resolution resource for completing the IT operation request; and assigning, by the computing device, the resolution resource based on the information from the knowledge bank and IT operation request.
Embodiments relate to enhancing a virtual storage mechanism to optimize fetch performance of named objects in enterprise systems. A technique includes receiving from a requester a request to retrieve an object and determining that the object is available for retrieval in a virtual data space, where a machine learning model is configured to cause the object to be placed in the virtual data space, the machine learning model being trained on fetch data for objects. The technique includes retrieving the object from the virtual data space instead of a storage system and providing the object to the requester for execution.
G06F 12/123 - Commande de remplacement utilisant des algorithmes de remplacement avec listes d’âge, p. ex. file d’attente, liste du type le plus récemment utilisé [MRU] ou liste du type le moins récemment utilisé [LRU]
This disclosure presents an approach for identifying obfuscation patterns within system log files to enhance cybersecurity. The method involves two key stages: first, detecting tampering in a primary set of log entries; and second, monitoring a secondary set of log files for the presence of these tampering patterns. By comparing the identified obfuscation patterns in the primary log entries with those detected in the secondary set, the system can effectively identify potential system intrusions. This innovative approach provides an advanced and proactive means of bolstering system security by uncovering and responding to malicious activities that attempt to obscure their tracks within log files, ultimately enhancing the defense against cyber threats.
An approach is provided that displays avatars locating in a first virtual area to a first set of users with each user controlling one of the avatars. A request is received from one of the users to escape a situation. In response to the request, the system clones the user's first avatar thus creating a second avatar. The second avatar is visible to the user; however it is invisible to one or more of the set of users. The user controls the second avatar and the first avatar is automatically controlled using artificial intelligence (AI), with the user no longer controlling the first avatar.
G06T 19/00 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
A computer-implemented method including: obtaining, by a computing device, a plurality of risk events; mapping, by the computing device, treatment actions to each of the plurality of the risk events; determining, by the computing device, an impact of the treatment actions on each of the plurality of the risk events; determining, by the computing device, a probability of implementation of the treatment actions; calculating, by the computing device, how the treatment actions affect other risk factors based on the determining steps; and providing, by the computing device, a recommendation of optimal risk mitigation based on how the first treatment actions affect the other risk events.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
27.
MACHINE LEARNING MODEL FOR GENERATING CODE SNIPPETS AND TEMPLATES
Embodiments relate to a machine learning model for generating code snippets and templates. A team feature set for a team is provided to a machine learning model, the team including at least two members. The machine learning model determines a recommendation for the team, the recommendation being related to computer execution to perform a task. In response to determining the recommendation for the team, the recommendation is rendered to the team.
An approach is disclosed that determines that a change is needed to a remote system that is managed by a change management system that manages changes to many remote systems. A change management time window when the change is scheduled to be performed at the selected remote system is identified and a monitoring request is sent to the remote system. The monitoring request causes the remote system to run a monitoring process. The change management system receives an activity notification that was identified by the monitoring process. In response to the activity notification matching the change needed, the change scheduled at the selected remote system is canceled by the change management system.
Embodiments relate to preventing deep fake voicemail scams. In response to receiving a voice message, an intent of the voice message is determined. The intent is determined to relate to a persuasion technique. A warning is provided about the voice message.
A computer-implemented method includes presenting one or more categories of movement patterns. The computer-implemented method includes recording a movement pattern of a user, where the movement pattern is associated with the one or more categories of movement patterns. The computer-implemented method includes authenticating the recorded movement pattern is correct. The computer-implemented method includes associating the authenticated recorded movement pattern with at least one of a device, application, and web-based service.
An approach is disclosed that creates a network graph that identifies computing resources as nodes. Each of the computing resources is weighted based upon the corresponding resource's attributes and usage. The approach connects a first set of nodes as directly connected and a second set of nodes as indirectly connected. Node longevity values are calculated for each node in the network graph with each of the node longevity values corresponding to one of the nodes in the network graph. The calculations are based on the direct and indirect connections between each of the nodes. The computing resources are managed based on the corresponding node longevity values.
Embodiments relate to providing automated text summarization techniques for capturing and conveying information technology (IT) records with numerical data. A technique is executed by one or more processors and includes receiving an IT record comprising text and numerical data, normalizing the numerical data into normalized numerical data, transforming the normalized numerical data into comparative and superlative adjectival terms and rewriting the text to include the comparative and superlative adjectival terms for output as a rewritten IT record.
Embodiments relate to early detection of information technology (IT) failures in a computing system. A technique is executed by one or more processors and includes receiving multiple IT records including past and recent historical data, extracting first and second time series sections from the past and recent historical data, respectively, training a failure detection model to correlate metric patterns in the first time series sections with at least one of other metric patterns and previous IT failures and, in response to the training, using the failure detection model to predict at least one of upcoming metric patterns and upcoming IT failures from metric patterns in the second time series sections.
One or more embodiments relate to protecting data stored by a non-volatile memory of a memory device installed in a computing device. A technique includes in response to a power-up of the memory device, incrementing a memory power cycle count, and receiving a host power cycle count indicating a number of power-ups of the computing device. The technique includes, if the memory power cycle count is not equal to the host power cycle count, applying a security reaction to the memory, the security reaction being adapted for preventing a readout of the data.
G06F 21/75 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par inhibition de l’analyse de circuit ou du fonctionnement, p. ex. pour empêcher l'ingénierie inverse
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
35.
PROTECTING A NON-VOLATILE SOLID-STATE MEMORY FROM AN UNAUTHORIZED ACCESS
An approach is provided for protecting data stored by a non-volatile solid-state memory from an unauthorized access. In response to a trigger event indicating an increased probability of the unauthorized access, the memory is destroyed by directing through the memory an electric current exceeding a rated current of the memory, and testing an operability of the memory, where the destruction is completed when the test indicates lacking operability of the memory.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 21/79 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données dans les supports de stockage à semi-conducteurs, p. ex. les mémoires adressables directement
36.
ABSTRACTIVE SUMMARIZATION OF INFORMATION TECHNOLOGY ISSUES USING A METHOD OF GENERATING COMPARATIVES
Embodiments relate to providing automated text summarization techniques for capturing and conveying information technology (IT) records with numerical data. A technique is executed by one or more processors and includes receiving an IT record comprising text and numerical data, normalizing the numerical data into normalized numerical data, transforming the normalized numerical data into comparative and superlative adjectival terms and rewriting the text to include the comparative and superlative adjectival terms for output as a rewritten IT record.
A computer-implemented method, including: receiving, by a computing device, a data pipeline job request; generating, by the computing device, a complexity score for the data pipeline job request; determining, by the computing device, a predicted execution time for the data pipeline job request; generating, by the computing device, a priority score for the data pipeline job request based on the predicted execution time and the generated complexity score; and comparing, by the computing device, the priority score for the data pipeline job request to another priority score to determine a schedule for the data pipeline job request.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer programming; software as a service (SaaS) services
featuring software for data management; software as a
service (SaaS) services featuring software for cloud
computing; software as a service (SaaS) services featuring
software for artificial intelligence; software as a service
(SaaS) services featuring software for cognitive computing;
Software as a Service (SaaS) services featuring software for
blockchain technology; software as a service (SaaS) services
featuring software for quantum computing and quantum
programming; software as a service (SaaS) services featuring
software for constructing, analyzing and running quantum
programs and quantum algorithms; software as a service
(SaaS) services featuring software for developing and
testing quantum algorithms; computer programming and
computer consulting services for artificial intelligence;
computer programming and computer consulting services for
cognitive computing; computer programming and computer
consulting services for information management; computer
programming and computer consulting services for data
management; computer programming and computer consulting
services for cloud computing; computer programming and
computer advisory services for blockchain technology;
computer programming and computer consulting services for
quantum computing; computer programming and computer
consulting services for software as a service (SaaS);
design, installation, updating and maintenance of software;
computer software and hardware design for third parties and
consultation services in the field of computers; computer
services, namely, design, creation and maintenance of
websites for third parties; computer systems analysis,
database and network integration, computer programming for
third parties, all for use in commercial interactions over
global computer networks; technical support services,
namely, troubleshooting of computer program and software
problems; design of systems for interconnection of computers
and software, namely, electronic connection of computers and
software to each other; computer software and hardware
testing services (quality and technical controls); technical
project studies in the field of computer hardware and
software; consultancy services in the field of computer
hardware, namely consultancy regarding computing research
and development; computer advice and assistance concerning
Internet use; rental of computers and software; scientific
and industrial research, namely research and development of
new products, biological research, bacteriological research,
chemical research, cosmetic research, mechanical research,
geological research, technical research, pharmaceutical
research, scientific research for medical purposes;
information technology services; computer system integration
services; consulting services in the field of design,
selection, implementation and use of computer hardware and
software systems for third parties; technical support
services, namely, diagnosing computer hardware and computer
software problems; computer system design services for third
parties; design of systems for interconnection of computers
and computer programs, namely, integration of computer
systems and computer networks; computer program and computer
hardware testing services, namely testing of software,
computers and servers to ensure proper functioning thereof;
cloud computing services, namely, network-integrated
computer hardware and software services for dynamic
provisioning, virtualization and consumption metering of
computer resources; providing virtual computer systems and
virtual computer environments through cloud computing;
design and development of software for cloud storage of
data; cloud computing hosting provider services; electronic
data storage and data recovery services; data security
service.
39.
SYSTEM TO FACILITATE WIRELESS CHARGING OF ELECTRONIC DEVICE(S)
Control system for facilitating wireless charging of an electronic device is provided, which identifies presence of multiple electronic devices within an environment, with the multiple electronic devices including a self-propelled power relay device with wireless charging capability. Control system processing determines that an electronic device of the multiple electronic devices requires wireless charging, and based on the determining, deploys the self-propelled power relay device to move to an area of the environment within a charging range of the electronic device to facilitate wireless charging of the electronic device via the self-propelled power relay device.
H02J 50/50 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique utilisant des répéteurs d’énergie supplémentaires entre les dispositifs de transmission et les dispositifs de réception
H02J 50/10 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique utilisant un couplage inductif
H02J 50/80 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique mettant en œuvre l’échange de données, concernant l’alimentation ou la distribution d’énergie électrique, entre les dispositifs de transmission et les dispositifs de réception
H02J 50/90 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique mettant en œuvre la détection ou l'optimisation de la position, p. ex. de l'alignement
41 - Éducation, divertissements, activités sportives et culturelles
Produits et services
Business consulting services for companies in the field of
selection, implementation, administration and use of
computer hardware and software systems; business consulting
services for companies in the field of selection,
implementation, administration and use of computer hardware
and software systems in the fields of enterprise software,
technology and infrastructure, cybersecurity, resiliency,
data analytics, digital transformation, and artificial
intelligence; co-creation services in the nature of business
assistance services, namely, assisting customers in the
selection, implementation, administration and use of
computer hardware and software systems; co-creation services
in the nature of business assistance services, namely,
assisting customers in the selection, implementation,
administration and use of computer hardware and software
systems in the fields of enterprise software, technology and
infrastructure, cybersecurity, resiliency, data analytics,
digital transformation, and artificial intelligence;
arranging and conducting trade show exhibitions in the field
of computers, information technology and electronic business
transactions; arranging and conducting trade show
exhibitions in the field of computers, information
technology and electronic business transactions via a global
computer network; arranging and conducting trade show
exhibitions in the fields of enterprise software, technology
and infrastructure, cybersecurity, resiliency, data
analytics, digital transformation, and artificial
intelligence; analysis of market statistic and data studies;
analyzing and compiling business data; arranging and
conducting of customer co-creation sessions (business
consultancy) in the field of computer products and services;
arranging and conducting of online customer co-creation
sessions (business consultancy) in a virtual environment;
arranging and conducting of online customer co-creation
sessions (business consultancy) in the field of information
technology (IT) and computer products and services in a
virtual environment; none of these services providing a
health insurance system compulsory or supplementary, or
providing products or services for accessing health care, or
providing products or services for the identification of
persons accessing a health care system or a health care
insurance system. Educational services, namely, conferences, exhibitions,
symposiums, presentations, technical demonstrations and
training seminars, all in the field of information
technology and computer products and services; Arranging and
conducting of conferences; arranging and conducting of
exhibitions; arranging and conducting of workshops;
arranging and conducting of seminars; arranging and
conducting of conferences and seminars in the field of
information technology and computer products and services;
arranging and conducting of software user training;
arranging and conducting of computer hardware user training;
arranging and conducting of information technology courses;
training in computer operations and information technology;
arranging and conducting of customer co-creation sessions in
the field of information technology (IT) training; arranging
and conducting of customer co-creation sessions [training]
in the field of computer products and services; educational
services, namely, conferences, exhibitions, symposiums,
presentations, technical demonstrations and training
seminars taking place online in a virtual environment, all
in the field of information technology and computer products
and services; arranging and conducting of online conferences
in a virtual environment; arranging and conducting of online
exhibitions in a virtual environment; arranging and
conducting of online workshops in a virtual environment;
arranging and conducting of online seminars in a virtual
environment; arranging and conducting of online conferences
and seminars in the field of information technology and
computer products and services in a virtual environment;
arranging and conducting of online software user training in
a virtual environment; arranging and conducting of online
computer hardware user training in a virtual environment;
arranging and conducting of online information technology
courses in a virtual environment; online training in
computer operations and information technology in a virtual
environment; arranging and conducting of online customer
co-creation sessions [training] in a virtual environment;
arranging and conducting of online customer co-creation
sessions [training] in the field of information technology
[IT] and computer products and services in a virtual
environment; none of these services providing a health
insurance system compulsory or supplementary, or providing
products or services for accessing health care or providing
products or services for the identification of persons
accessing a health care system or a health care insurance
system.
Embodiments relate to removing interactions from a virtual environment thereby executing the right to be forgotten in the virtual environment. In response to receiving a request to remove interactions from a virtual environment, a search is performed in the virtual environment for cryptographic keys embedded with a user identification corresponding to the request. The cryptographic keys embedded with the user identification are deleted in the virtual environment, where the interactions have been signed with the cryptographic keys embedded with the user identification in the virtual environment. In response to deleting the cryptographic keys embedded with the user identification in the virtual environment, there is a modification to a presentation of the interactions in the virtual environment.
H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
42.
PREVENTING ACCESS OF REMOVED USERS TO MESSAGES SHARED IN A GROUP CHAT
Embodiments relate to preventing access of removed users to messages shared in a group chat with an end-to-end encryption. An aspect includes, responsive to creation of a group having members for communicating using encryption keys, receiving a request to remove a given member of the members from the group, the given member being associated with a computer system, at least one message of the group being accessible to the given member. An aspect includes identifying the encryption keys associated with the given member and causing a deletion on the computer system of the encryption keys associated with the given member in response to the request. An aspect includes confirming the deletion of the encryption keys on the computer system associated with the given member. The deletion of the encryption keys on the computer system prevents access of the computer system to at least one message of the group.
An approach is disclosed that receives a user activity from a user that is using a datastore visualization display. The display displays a first visualization pertaining to one or more datastores with the datastore visualization display provided at least in part by a context driven lateral artificial intelligence (CDLAI) engine. The received user activity is provided as input to the CDLAI to generate a second visualization that is displayed to the user at the datastore visualization display that is displayed to the user. Artificial intelligence (AI) models that are used by the CDLAI are then trained based on the received user activity. The training results in updates to the visualizations.
Embodiments relate to automatically preventing scams in real time in an interactive communication environment. A machine learning model determines that at least one communication from a first user to a second user in an interactive communication environment includes a potential threat, the interactive communication environment providing real time communications between the first user of a first computer system to the second user of a second computer system. The potential threat of the at least one communication is determined to above a threshold. An overlay is displayed to the second user on the second computer system in which the overlay displays metadata about the first user and informs the second user to avoid providing any sensitive information in the interactive communication environment.
Embodiments relate to preventing fraud on smart devices. In response to receiving a communication, a correlation of the communication to a security threat is determined, and device data of a device is obtained. A determination is made that a combination of the correlation and the device data meets a predefined threshold for the security threat. An alert is audibly output on the device, the audio alert being a warning of the security threat presented by the communication.
A system includes a container cluster including plural hosts that communicate with one another via a network. Each of the plural hosts includes a computing node that includes an operating system and a container runtime configured to run containers. Each of the plural hosts stores a respective member list that defines capabilities of the plural hosts in the container cluster. Each of the plural hosts is configured to identify another one of the plural hosts for running a container based on comparing tags of the container to the capabilities of the plural hosts defined in the respective member list. Each respective one of the plural hosts is configured to perform the identifying the another one of the plural hosts for running the container in response to determining the respective one of the plural hosts is resource-constrained from running the container.
Some embodiments of the present disclosure are directed to systems, computer-readable media, and computer-implemented methods for multi-node failure processing in computer networks. In particular, some embodiments are directed to generating and displaying an impact area graph for a respective node from a plurality of nodes in a network, wherein the impact area graph depicts the relative predicted impact to each other node in the network from a failure of the respective node. Other embodiments may be disclosed or claimed.
H04L 43/026 - Capture des données de surveillance en utilisant l’identification du flux
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
09 - Appareils et instruments scientifiques et électriques
21 - Ustensiles, récipients, matériaux pour le ménage; verre; porcelaine; faience
25 - Vêtements; chaussures; chapellerie
35 - Publicité; Affaires commerciales
37 - Services de construction; extraction minière; installation et réparation
38 - Services de télécommunications
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computers; quantum computers; computer hardware and
software; computer hardware and software for information
technology analysis and for data management; computer
hardware and software for applications development; computer
hardware and software for cloud computing; computer hardware
and software for cognitive computing; computer hardware and
software for artificial intelligence; computer hardware and
software for blockchain technology; computer hardware and
software for cognitive computing and quantum programming;
computer hardware, namely, magnetic tape units (data
processing equipment), magnetic tapes, printed circuits,
integrated circuits, computer keyboards, compact disks
(audio-video), optical disks, computing couplers, floppy
discs, magnetic data media; computer hardware, namely, video
screens, scanners, printers, computer interfaces (data
processing equipment), readers (data processing equipment),
software (recorded programs), microprocessors, modems,
computers, computer memories, computer peripheral devices;
adapters for computers; components for computers; data
processing apparatus for the management of data and
information; semiconductors; machine-readable electronic
data media; magnetic disks; floppy disk drives; tape
recorders; calculating machines; facsimile machines; video
recorders; video cassettes; computer chips; printed circuit
boards; computer hardware, namely, computer communications
servers; bags adapted for holding laptops; computer
interface boards; cables for computers and components for
cables for computers; computer fax modem cards; computer
accessories, namely, computer screen filters, mouse pads,
radio pagers, computer game joysticks; electric converters,
namely, digital-to-analog converters, analog-to-digital
converters and step voltage switches; computer mice;
integrated circuit cards [smart cards]; adapters for
integrated circuit cards [smart cards]; readers for
integrated circuit cards [smart cards]; microcomputers;
uninterruptible electrical power sources; projectors; remote
controls for computers; surge protectors and uninterruptible
electrical power supplies; point-of-sale computer terminals;
computer servers; data storage devices, namely, high-speed
storage subsystems for the storage and backup of electronic
data either locally or via a telecommunications network;
recorded and downloadable computer programs and software;
video game software; computer operating system software and
programs; computer software used to access a global computer
network; computer software used in database management;
computer software used in locating, retrieving and receiving
text, electronic documents, graphics and audiovisual
information on internal company computer networks and on
local and wide-area computer networks; software used for
developing software and creating websites and user manuals
in electronic format sold with those goods; computer
software for use in controlling the operation and running of
computer systems, programs and networks; computer software
for use in connecting disparate computer networks and
systems, computer servers and storage devices; computer
software for linking together computers and for enabling
their linkage to a globally accessible network; computer
software for managing computer hardware, software and
processes that exist within an information technology
environment; computer systems combining hardware and
software for use in managing and analyzing data and digital
instruction manuals sold with those goods; cloud computing
system, namely network integrating computer hardware and
software for dynamic provisioning, virtualization and
consumption metering of computer resources; software
recorded or downloadable from cloud computing, for deploying
and managing virtual machines to a cloud computing platform;
computer systems, namely, computer hardware and computer
software for developing and integrating artificial
intelligence, namely, machine learning, deep learning, and
natural language processing, which are capable of
collecting, organizing and analyzing data; computer systems,
namely, computer hardware and computer software for
integrating automatic natural language processing,
computational linguistics, information retrieval, and
machine learning, which are capable of understanding general
human queries and formulating responses; computer systems
for developing, building and operating blockchain
applications; computer hardware and computer software for
developing and testing quantum algorithms; documentation and
instruction manuals recorded on machine-readable electronic
media and concerning computers or computer programs;
downloadable electronic publications; electronic
publications recorded on computer media, namely, user
manuals, guide books, brochures, information sheets, written
presentations and educational material, in the fields of
computing, computer networks, computer storage, computer
operating systems, information technologies, database
management, cloud computing, artificial intelligence,
blockchain technology and quantum computing. Glasses [receptacles]; cups; beer mugs; plastic water
bottles sold empty; insulated containers and bottles for
food and beverages; glasses, namely goblets; back
scratchers; shoe horns; non-electric portable coolers;
serving bowls of crystal; vases; coasters (tableware) and
coasters of leather; coasters, other than of paper or
textile materials. Clothing; clothing, namely, tops for babies, children,
adults, women, and men; clothing, namely tee-shirts, shirts,
button-down shirts, sweatshirts, pullovers, jackets, aprons,
vests, bottoms [clothing]; headwear articles [headwear,
clothing]; headwear, namely hats, baseball caps and hats,
caps. stocking caps; shoes. Advertising; sales promotion for others; advisory services
for commercial management and management; business
information; distribution of prospectuses; distribution of
samples; arranging newspaper subscriptions for third
parties; accounting; document reproduction; centralized data
processing management; organization of exhibitions for
commercial or advertising purposes; advisory and commercial
business management services and business advisory services;
business development services; analysis of market study
statistics and data; data processing services; data
processing services in the field of artificial intelligence;
data processing services in the field of cognitive
computing; data processing services in the field of cloud
computing; data processing services in the field of
blockchain technology; data processing services in the field
of information management; data processing services in the
field of quantum computing and quantum programming;
organizing and conducting trade shows in the field of
computers, computer services, information technology,
artificial intelligence, cloud computing, blockchain
technology, quantum computing, database management,
telecommunications and electronic commercial transactions
via a global computer network; business advisory services in
the field of artificial intelligence; business advisory
services in the field of computer systems which integrate
natural language processing, computational linguistics,
information retrieval, machine learning, which are capable
of understanding general human queries and formulating
responses; business advisory services for cloud computing;
business advisory services for blockchain technology;
business advisory services in the field of quantum
computing, quantum programming and for developing and
testing quantum algorithms; business advisory services for
information technology; compiling and analyzing business
data; systematization of information in computer databases. Construction services; computer hardware repair and
installation services; computer hardware maintenance;
installation and maintenance of computer hardware for
computer networks; technical support services, namely,
troubleshooting of computer hardware problems. Telecommunication services; services for the delivery of
messages by electronic means; communications by computer
terminals; transmission of emails; news and information
agencies; telecommunications and electronic messaging
services via a global data teleprocessing network;
computer-aided transmission of information;
telecommunication services for commercial interaction in the
field of global computer networks; providing multiple access
to goods and services via a global network and wireless
communication apparatus; electronic transmission of data and
documents via computer terminals; teleconferencing and Web
conferencing services; providing multiple-user access to
global computer information networks for transferring and
disseminating a wide range of information; providing online
forums for transmitting messages among computer users;
providing private and secure electronic communications in
real time, via a computer network. Education; entertainment; training; organizing and
conducting conferences, seminars and congresses; exhibition
services for cultural or educational purposes; production of
radio and television programs; sporting and cultural
activities; education services, namely, conducting classes,
seminars, conferences, online seminars (webinars) and
workshops in the fields of computers, computer services,
information technology, artificial intelligence, cloud
computing, blockchain technology, quantum computing,
database management, image and sound processing technology,
telecommunications and global computer networks; training in
the fields of computing, computer services, information
technology, artificial intelligence, cloud computing,
blockchain technology, quantum computing, database
management, image and sound processing technology,
telecommunications and global computer networks; conducting
entertainment exhibitions in the nature of information
technology demonstrations; entertainment services, namely,
making available online computer games; conducting
entertainment exhibitions, namely, real-time sporting
competitions via a global computer network; conducting
entertainment exhibitions, namely, providing demonstrations
on Internet sites concerning museum exhibitions, sporting
events, art gallery exhibitions, concerts and musical
recordings; editing of books and journals; show and film
production; facilitation of exhibitions for cultural or
educational purposes; booking of seats for shows. Computer programming; software as a service (SaaS) services
featuring software for data management; software as a
service (SaaS) services featuring software for cloud
computing; software as a service (SaaS) services featuring
software for artificial intelligence; software as a service
(SaaS) services featuring software for cognitive computing;
software as a service (SaaS) services featuring software for
blockchain technology; software as a service (SaaS) services
featuring software for quantum computing and quantum
programming; software as a service (SaaS) services featuring
software for constructing, analyzing and running quantum
programs and quantum algorithms; software as a service
(SaaS) services featuring software for developing and
testing quantum algorithms; computer programming services
and computer consultation services on artificial
intelligence; computer programming services and consultation
services on cognitive computing; computer programming
services and computer consultation services on information
management; computer programming services and computer
consultation services on data management; computer
programming services and advisory services on cloud
computing; computer programming services and advisory
services on blockchain technology; computer programming
services and computer consulttion services on quantum
computing; computer programming services and computer
advisory services on software as a service (SaaS); design,
installation, updating and maintenance of computer software;
designing software and hardware for third parties and
advisory services with respect to computers; computer
services, namely, creating and maintaining websites for
third parties; computer systems analysis, integration of
databases and networks, computer programming for third
parties, all for use in commercial interactions via global
computer networks; technical support services, namely,
troubleshooting in the field of computer programs and
software problems; designing computer hardware and software
interconnection systems, namely, electronic connection of
computers and software; computer hardware and software
testing services (quality and technical control); technical
project studies in the field of computer hardware and
software; consultation services in the field of computer
hardware, namely, consultation with respect to computer
research and development; advisory and support services
connected with the use of the Internet; rental of computers
and software; scientific and industrial research, namely,
research and development of new products, biological
research, bacteriological research, chemical research,
research in esthetics, mechanical research, geological
research, technical research, pharmaceutical research,
scientific research for medical use; information technology
consulting services; computer system integration services;
consultation services in the fields of design, selection,
implementation and use of computer hardware and software
systems for third parties; technical support services,
namely, troubleshooting in the nature of diagnosis of
computer hardware and software problems; computer system
design services for third parties; interconnecting computer
hardware and software, namely, integrating computer systems
and networks; services for testing software and hardware,
namely, testing software, computers and servers to ensure
the proper functioning thereof; cloud computing services,
namely, computer hardware and embedded software services for
dynamic provisioning, virtualization, and consumption
metering of computer resources; providing virtual computer
systems and virtual computer environments through cloud
computing; design and development of software for cloud
storage of data; cloud computing hosting provider services;
electronic data storage and retrieval services; data
security service; computer support provided by programmers;
design of computer hardware for computer networks.
Systems and methods provide dynamic adjustment of content displayed on image-enabled clothing articles to address obstructed visibility of the content. In embodiments a method includes determining, by a computing device, movement of at least a portion of an image-enabled clothing article based on real-time sensor data from sensors of the image-enabled clothing article; determining, by the computing device, that a view of at least a portion of image content displayed on the image-enabled clothing article is obstructed based on the determined movement, parameters of the image-enabled clothing article and image display information of the image-enabled clothing article; and generating, by the computing device, image instructions that cause the display of the image content on the image-enabled clothing article to move from a first area of the image-enabled clothing article to a second area of the image-enabled clothing article.
G09G 3/32 - Dispositions ou circuits de commande présentant un intérêt uniquement pour l'affichage utilisant des moyens de visualisation autres que les tubes à rayons cathodiques pour la présentation d'un ensemble de plusieurs caractères, p. ex. d'une page, en composant l'ensemble par combinaison d'éléments individuels disposés en matrice utilisant des sources lumineuses commandées utilisant des panneaux électroluminescents semi-conducteurs, p. ex. utilisant des diodes électroluminescentes [LED]
Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining target application container configuration data to identify one or more target container base image referenced in the target application container configuration: subjecting script data associated to the one or more target container base image to text based processing for evaluation of security risk associated to the one or more container base image, the script data obtained from at least one candidate hosting computing environment; and selecting a hosting computing environment from the at least one computing environment for hosting the target application container, the selecting in dependence on the text based processing.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
51.
Advanced deterrence for bots in an interactive communication environment
Embodiments relate to providing an advanced deterrence system for bots in an interactive communication environment. In response to identifying that an automated program for a user terminal is accessing an interactive communication environment hosted by a host computer system, a selection of an assignment for the automated program is triggered, where the automated program is designed to replicate a human behavior in the interactive communication environment. In response to triggering the selection, a task is selected as the assignment for the automated program designed to replicate the human behavior, the task being selected from a plurality of tasks that are queued to be executed by the host computer system. The task is caused to be executed by the automated program on the user terminal, the task causing a consumption of user computer resources on the user terminal.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
Embodiments relate to providing self-learning automated information technology change risk prediction. A processor inputs a change request to a first machine learning model, the first machine learning model determining at least one word pair in the change request, the change request being a modification in an IT environment. The processor classifies the at least one word pair into a change category for the IT environment using a second machine learning model, the change category identifying a type of the modification to be executed in the IT environment. The processor determines a likelihood of causing a problem in the IT environment as a result of executing the modification. The processor automatically performs an action to prevent the modification of the change request in the IT environment.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p. ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
Embodiments relate to providing self-learning automated information technology change risk prediction. A processor inputs a change request to a first machine learning model, the first machine learning model determining at least one word pair in the change request, the change request being a modification in an IT environment. The processor classifies the at least one word pair into a change category for the IT environment using a second machine learning model, the change category identifying a type of the modification to be executed in the IT environment. The processor determines a likelihood of causing a problem in the IT environment as a result of executing the modification. The processor automatically performs an action to prevent the modification of the change request in the IT environment.
Embodiments relate to dynamic creating a temporary isolated environment in an interactive communication environment for potential bots. In response to identifying that an avatar accessing the interactive communication environment is being controlled by a non-human entity, the avatar is dynamically placed in an isolated virtual environment. Permission of the avatar are disabled in the isolated virtual environment. An authentication inquiry is presented to the avatar identified as being controlled by the non-human entity. A location is transferred for the avatar identified as being controlled by the non-human entity, based on a user response to the authentication inquiry.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
A method for protecting individual data elements within an unstructured dataset includes identifying a data element within the unstructured dataset requiring access control, encrypting the data element within the unstructured dataset, storing a decryption key and access control information corresponding to the dataset at an access controller, and cryptographically binding the encrypted data element to metadata that identifies the access controller. The method may additionally include detecting an access attempt to the dataset, and determining whether the access attempt is acceptable according to the access control information. If the access attempt is acceptable, the method may further include allowing the access attempt. If the access attempt is not acceptable, the method may further include denying the access attempt.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 16/38 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Provision of sales areas for buyers and sellers of products
and services in the field of information technology services
(commercial intermediation services); provision of online
sales areas for buyers and sellers of products and services
in the field of information technology (commercial
intermediation services). Information technology support services, namely, remote and
on-site infrastructure management services for the
monitoring, optimization, administration and management of
computer systems; computer system integration services;
integration of computer systems and networks; platforms as a
service (PaaS) comprising a software platform for
orchestrating the design, selection, implementation,
delivery, management and use of products and services in the
field of information technology; infrastructure as a service
(IaaS) featuring a software platform for orchestrating the
design, selection, implementation, delivery, management and
use of products and services in the field of information
technology; providing non-downloadable software of a
software platform for orchestrating the design, selection,
implementation, delivery, management and use of products and
services in the field of information technology.
Disclosed embodiments provide computer-implemented techniques for aggregating of data involving multiple domains in the format of a news bulletin or “newsletter” format. For various situations, this format can provide a quicker and more comprehensive understanding than is achievable with a visual dashboard. In disclosed embodiments, multiple domains are specified, where each domain can include a subject or category. One category is selected as a major domain. Other categories, referred to as satellite domains are also specified. A user provides scores that indicate the semantic importance of each satellite domain. A mathematical distance between each satellite domain and the major domain is computed based on the scores. Based on the mathematical distances, percentages of articles pertaining to each domain are computed, and used in assembling customized data that is output in a news bulletin format.
A method includes: detecting, by a computing device, connection of a universal serial bus device to a computer; determining, by the computing device, that the computer is in a locked mode; detecting, by the computer device, input to the computer within a predetermined time of detecting the connection; determining, by the computing device as a result of the computer being locked and detecting the input, that the input is a threat to the computer; creating, by the computing device, a temporary virtual environment; receiving, by the computing device, the input into the temporary virtual environment; processing, by the computing device, the input in the temporary virtual environment; and recording, by the computing device, information related to the input.
G06F 21/82 - Protection des dispositifs de saisie, d’affichage de données ou d’interconnexion
G06F 13/38 - Transfert d'informations, p. ex. sur un bus
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
59.
Social media representation and collaboration platform for enterprise it
A system and associated methods that enable social media representation and collaboration platform of enterprise information technology (IT) components that enables human-to-human, human-to-machine and machine-to-machine communications to help easily understand the set of enterprise IT components, its configuration(s), its intra/inter relationship(s), better navigation and visibility across various related components, and augmenting system troubleshooting.
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
G06F 16/9536 - Personnalisation de la recherche basée sur le filtrage social ou collaboratif
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06Q 10/087 - Gestion d’inventaires ou de stocks, p. ex. exécution des commandes, approvisionnement ou régularisation par rapport aux commandes
G06Q 10/101 - Création collaborative, p. ex. développement conjoint de produits ou de services
G06Q 10/20 - Administration de la réparation ou de la maintenance des produits
A processor may receive authentication data related to inputs of a user to predetermined authentication prompts. The processor may select devices from a set of registered devices to use for providing a first password prompt to the user. The processor may identify one or more output formats for each of the selected devices. The processor may generate a first password prompt having two or more password prompt components, where each password prompt component has an output format. The processor may send the two or more password prompt components to respective selected devices.
A computer-implemented method, in accordance with one embodiment, includes collecting attributes of a subject. Cause-effect-decision relationships of the attributes of the subject are determined. Custom attributes are derived based on the cause-effect-decision relationships of the attributes of the subject. Custom attribute relationships and labels for the derived custom attributes of the subject are identified based on the cause-effect-decision relationships of the attributes of the subject, the custom attribute relationships including at least one belongs-to relationship and at least one decision relationship. A hierarchy of the custom attributes is generated using a finite state automaton. A hierarchical multi-label classifier is created (e.g., trained) based on the generated hierarchy. The classifier is used to generate class label decisions associated with labels of the classifier to objects of the subject. The decisions are output.
A computer-implemented method, according to one embodiment, includes mapping hosts in communication with a storage system to compartment constructs that are logical partitions of the storage system, analyzing interoperability of the hosts and the compartment constructs and defining, based on the analysis, risk profiles for applications run on the hosts. Ownership of storage objects to the compartment constructs is assigned based on the risk profiles, where each of the storage objects define a logical partition of one of the hosts and a logical partition of a storage volume of the storage system.
A computer-implemented method, according to one embodiment, includes gathering sharing policies associated with a first user sharing a live resource in a metaverse, and determining characteristics of a second user in the metaverse. The method further includes determining, based on the sharing policies and the characteristics of the second user, whether the second user is authorized to view the live resource shared by the first user. In response to a determination that the second user is not authorized to view the live resource, a first predetermined obfuscation condition is caused to be applied to the second user's view of the live resource for protecting the first user's privacy. Furthermore, in response to a determination that the second user is authorized to view the live resource, the second user is allowed to view the live resource.
Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes inputting, by a processor, records to a machine learning model, the records being associated with an information technology (IT) domain. The technique includes classifying, by the processor, the records with labels using the machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of the IT domain.
Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes inputting, by a processor, records to a machine learning model, the records being associated with an information technology (IT) domain. The technique includes classifying, by the processor, the records with labels using the machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of the IT domain.
Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes classifying, by a processor, a record with a label using a machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of an information technology (IT) domain. The processor generates an explanation of a decision by the machine learning model to classify the record with the label and displays the explanation in a human readable form.
A method includes: receiving, by a computer device and from an automated teller machine, a personal identification number that is associated with an account; determining, by the computer device, that the personal identification number is a disablement personal identification number that is associated with the account, the account having an activation personal identification number, the disablement personal identification number and the activation personal identification number being different; determining, by the computer device and as a result of receiving the disablement personal identification number, at least one disablement action to be performed by a device other than the automated teller machine; and transmitting, by the computer device, a command to perform the disablement action.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
Aspects of the present disclosure include: detecting, by a computing device, an avatar is chatting within a virtual environment; detecting, by the computing device, the avatar is idle for a predetermined amount of time; providing, by the computer device, a challenge to the idled avatar, determining, by the computer device, that the challenge has not been executed; and executing, by the computer device, a security action associated with the idled avatar.
Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes classifying, by a processor, a record with a label using a machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of an information technology (IT) domain. The processor generates an explanation of a decision by the machine learning model to classify the record with the label and displays the explanation in a human readable form.
A computer-implemented method, according to one embodiment, includes receiving, from a user device, a request for determining a final confidence score for an account, and determining a plurality of confidence parameter scores using information associated with the account. A first of the confidence parameter scores is determined based on an analysis of a structure of the account, a second of the confidence parameter scores is determined based on a character analysis of at least the account, and a third of the confidence parameter scores is determined based on an exposure of the account. The method further includes using the determined confidence parameter scores to determine the final confidence score for the account. The determined final confidence score is applied to mitigate fraud.
A method of mitigating risks in a service level agreement (SLA), including: identifying relationships between an infrastructure and an application associated with the SLA; identifying changes to a technological environment of the SLA based on collected data associated with the SLA and the identified relationships, the collected data including the infrastructure and the application; establishing a baseline for a service level objective (SLO) of the SLA by analyzing the collected data of the infrastructure and the application; determining risk impact to the SLA based on an assessment of requirements to the SLO and the changes to the technological environment of the SLA; generating a solution option for the SLA by applying an explainable artificial intelligence (XAI) model based on processing the risk impact with the baseline in the XAI model; and updating the SLA based on the solution option.
H04L 41/5006 - Création ou négociation de contrats, de garanties ou de pénalités au niveau du service [SLA]
H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p. ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
72.
AI DRIVEN IMPACT ESTIMATION OF NEW PRODUCT FEATURES
A method for product release estimates a ROI of a new product feature of a product. The method identifies a product component which undergoes change with weightage responsive to epic details and non-functional requirements. The method classifies a component action to provide an action classification. The method calculates an effort to create the new feature responsive to the action and a complexity classification determined from at least the weightage. The method calculates an interval of effort to produce the new product feature responsive to the effort and similar epic matches relating to the new product feature. The method calculates an estimated public release time of the new feature responsive to the similar epic matches relating to the new feature. The method generates and follows a schedule responsive to the effort, the interval of effort, the estimated public release time, and the ROI to make the product having the new feature.
G06Q 10/0637 - Gestion ou analyse stratégiques, p. ex. définition d’un objectif ou d’une cible pour une organisationPlanification des actions en fonction des objectifsAnalyse ou évaluation de l’efficacité des objectifs
73.
Computation, prediction, and use of vandalism scores
A computer-implemented method, in accordance with one embodiment, includes collecting data from a plurality of predefined functional areas in a particular geographical area in which a plurality of physical objects are located, at least some of the data relating to vandalism. Wrangling is performed on the data to correlate the data from the functional areas with respective ones of the physical objects. The wrangled data corresponding to each of the physical objects is transformed into features corresponding to a the functional areas. For each of the physical objects, the features are processed according to predefined rules for generating a rank for each of the functional areas. Dynamic weights are computed for at least some of the features to account for data drift by comparing historical data with latest data. The ranks and dynamic weights are transformed into a vandalism score for each of the physical objects, which is output.
An example operation may include one or more of storing a hash of a service set identifier (SSID) of a wireless network via an apparatus, receiving a probe request message transmitted from a network device, wherein the probe request message comprises a hash value, determining that the hash value within the probe request is a valid SSID based on the hash of the SSID of the wireless network stored in the storage device, and controlling the network interface to transmit a probe response with a plain text name of the SSID to the network device in response to the determination.
H04W 48/14 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p. ex. distribution de données d'exploration utilisant une requête de l’utilisateur
H04W 48/16 - ExplorationTraitement d'informations sur les restrictions d'accès ou les accès
A method for detecting a fake keypad includes: monitoring outputs of plural magnetic field sensors connected to a keypad; detecting the output of at least one of the magnetic field sensors indicates the presence of a magnetic field; starting, in response to the detecting, a timer; determining the first timer reaches a first threshold while the output of the at least one of the magnetic field sensors still indicates the presence of a magnetic field; in response to the timer reaching the first threshold, determining a number of the magnetic field sensors whose output indicates the presence of a magnetic field equals or exceeds a second threshold; in response to the number of the magnetic field sensors equaling or exceeding the second threshold, determining a security action; and initiating the security action.
Methods, computer program products, and systems are presented. The Methods, computer program products, and systems can include, for example: examining hardware device transmitted data received through an I/O interface port of a computer system; determining in dependence on the examining whether the hardware device transmitted data received through the I/O interface port of the computer system satisfies a criterion; and in response to determining that the hardware device transmitted data received through the I/O interface port of the computer system satisfies the criterion, initiating a security process for protecting the computer system.
G06F 21/85 - Protection des dispositifs de saisie, d’affichage de données ou d’interconnexion dispositifs d’interconnexion, p. ex. les dispositifs connectés à un bus ou les dispositifs en ligne
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures
G06F 21/81 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur en agissant sur l’alimentation, p. ex. en branchant ou en débranchant l’alimentation, les fonctions de mise en veille ou de reprise
The exemplary embodiments disclose a method, a computer system, and a computer program product for detecting malware. The exemplary embodiments may include aggregating known malware patterns by storing malware patterns and related malware categories of the malware patterns. The exemplary embodiments may additionally include training a first machine-learning system, comprising a generator portion and a discriminator portion, by using the known malware patterns and the related malware categories as training data. The exemplary embodiments may also include generating additional synthetic code patterns by feeding random code samples to the trained first machine-learning system. The exemplary embodiments may further include training a second machine-learning system by using benevolent code patterns and the generated additional synthetic code patterns as training data. The exemplary embodiments may include determining a statistical distribution of predicted malicious code patterns and related categories, and determining a quality value of the training of the second machine-learning system.
Embodiments relate to providing automatic curation of chats in virtual reality. A technique includes determining, using a machine learning model, that consecutive segmented messages combine to form a complete message, the consecutive segmented messages being from a virtual environment. The technique includes determining that the complete message violates a security rule and performing a security action that affects a display of the consecutive segmented messages forming the complete message.
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p. ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p. ex. des réponses automatiques ou des messages générés par un agent conversationnel
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
A computer-implemented method, according to one embodiment, includes causing a trained artificial intelligence (AI) model to derive data access privilege grants before data is stored in a predetermined database, and segmenting the data according to the data access privilege grants during storage of the data in the predetermined database. Metadata that defines the data access privilege grants is stored with the segments of data. The method further includes receiving, from a first user device, a query requesting data stored in the predetermined database. At least some of the metadata is read to identify a segment of the data associated with a data access privilege grant associated with the query. The method further includes allowing the first user device to access the identified segment of data for fulfilling the query.
Methods, computer program products, and systems can include obtaining a first computing environment specific application deployment software code instance associated to a first computing environment, the first computing environment specific application deployment software code instance for deployment of a certain application on the first computing environment; parsing the first computing environment specific application deployment software code instance, wherein the parsing includes determining attributes of the first computing environment specific application deployment software code instance and generating, using the determined attributes of the first computing environment specific application deployment software code instance, a computing environment agnostic semantic tree data structure that expresses a workflow pattern for deployment of the certain application; and composing, with use of the computing environment agnostic semantic tree data structure, a second computing environment specific application deployment software code instance associated to a second computing environment for deployment of the certain application on the second computing environment.
A computer-implemented method, in accordance with one aspect of the present invention, includes collecting data existing in a development system that relates to the code change request, in response to receiving a code change request to merge new code with existing code. Factors from the collected data are computed for assessing a risk of promoting the new code, the factors including at least: a developer information factor, a developer availability factor, and an environment health analysis factor. The factors are processed to compute a confidence score for the code change request. If the confidence score is in a first predefined range, the new code corresponding to the code change request is promoted for merging with the existing code, without human intervention. If the confidence score is in a second predefined range, an indication that human intervention is needed before promoting the code is output.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
Disclosed embodiments provide bot detection in a virtual environment that is based on avatar motion. The motion of an avatar within a virtual environment such as a metaverse is tracked. The tracked motion is separated into multiple movement segments. The movement segments are compared to a collection of movement patterns in a movement pattern database that are indicative of bots. A similarity metric is determined between the tracked motion and the database of bot motions. In response to the similarity metric exceeding a predetermined threshold, a list of at least one mitigation action is obtained, and the at least one mitigation action in the list is executed, thereby mitigating the adverse effects of bots in a virtual digital environment.
Aspects of the present disclosure relate generally to reminder systems and, more particularly, to a contextual item discovery and pattern inculcated reminder mechanism and methods of use. A computer-implemented method includes: determining, by a computing device, an event in which a user will participate; associating, by the computing device, one or more items with the event; determining a location of the one or more items associated with the event including that the user does not possess any combination of the one or more items; and providing an alert to the user that the any of the one or more items associated with the event is not in the possession of the user.
Systems and methods synchronize content of a virtual environment with a state of a physical environment. In aspects, a method includes obtaining sensor data from a network of remote sensors measuring a physical state of a location at a time; generating context specific parameter data based on the sensor data; obtaining context data from a remote virtual reality (VR) system, wherein the context data reflects a current state of virtual content in a virtual environment displayed by the remote VR system; selecting virtual content to be displayed in the virtual environment by the remote VR system based on the context specific parameter data, the context data, and rules; and sending the virtual content to the remote VR system to be displayed to a user, wherein the virtual content reflects a state of the physical location at the time.
A computer-implemented method, in accordance with one embodiment, includes collecting touch data from one or more touch sensors coupled to a first product, the one or more touch sensors being configured to indicate when a human touches the one or more touch sensors and/or first product. Product vector information about the first product is received. Classification on the touch data and product vector information is performed using a hierarchical multilabel classification system for assigning the touch data to predefined patterns for each level of a classifier used by the hierarchical multilabel classification system. Features of a second product, e.g., a touch vector and a touch pattern, are transformed into a second feature vector. A featurewise difference detection is performed on the feature vectors to calculate a difference in distribution for features of the products to generate and output a caption indicative of the differences between the products.
A computer-implemented method includes: generating, by the computing device, a plurality of data blocks for a received block size; sharing, by the computing device, a time based universally unique identifier (UUID) for a first data block of the data blocks and an incremental time interval between each data block of the data blocks; finding, by the computing device, a time based UUID which corresponds with the requested data block; and sending, by the computing device, the time based UUID to a cloud site, the time based UUID corresponding with the requested data block.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
G06F 16/29 - Bases de données d’informations géographiques
A computer-implemented method includes: receiving, by a computing device, a data restore request; determining, by the computing device, at least one object in response to the data restore request; and querying, by the computing device, a client population to determine at least one client which has resources and network cardinality to assist the data restore request. The at least one client creates a distributed and crowd sourced cache of objects for the data restore request.
G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
H04L 43/0876 - Utilisation du réseau, p. ex. volume de charge ou niveau de congestion
88.
RECRUITMENT AUGMENTATION WITH DIGITAL FOOTPRINT UTILIZATION
A method including: identify candidate pool resources by analyzing a job description; posting the job description at the candidate pool resources; identifying candidates from the candidate pool resources; determining a candidate score of each of the candidates based on an identified candidate information source; and selecting a set of the candidates based on the candidate score.
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
89.
SYSTEM AND METHOD FOR HANDLING COMPRESSED CRITICAL FILES
A computer-implemented method includes: monitoring, by a computing device, a data set format of all files in a computing system to determine a list of data sets in a first format which are accessed greater than a predetermined number of times; gathering, by the computing device, the list of data sets in the first format within the computing system; and converting, by the computing device, the list of data sets in the first format within the computing system to a second format which is different from the first format.
In one general embodiment, a computer-implemented method includes collecting information relating at least to market trends and problem ticketing. The collected information is stored in a knowledge repository. At least some of the collected information is processed to compute weightage scores for requirements specified in a policy configuration. A list comprising at least some of the requirements and indications of the weightage scores corresponding thereto is generated and output.
G06Q 10/0637 - Gestion ou analyse stratégiques, p. ex. définition d’un objectif ou d’une cible pour une organisationPlanification des actions en fonction des objectifsAnalyse ou évaluation de l’efficacité des objectifs
G06Q 30/0202 - Prédictions ou prévisions du marché pour les activités commerciales
A computer-implemented method, in accordance with one embodiment, includes receiving a taxonomy specifying entities of a business service and levels of said entities. Time series data about the entities is collected and stored. Impactor propagation paths between entities is identified. A territory of a health impact of each entity is also identified. A health score for each of the entities, considering impacts on a health of the entity by at least one other entity, is computed based on the data, the propagation paths, and the territories of the entities. At least one of the health scores is output.
H04L 43/0817 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant le fonctionnement
Aspects of the present disclosure relate generally to machine inspection of part production and, more particularly, to systems and methods of automated Al inspection of customized part production. For example, a computer-implemented method includes receiving, by a processor, design information for a custom part; extracting, by the processor, feature information of the custom part from the design information; receiving, by the processor, images of the custom part in production from a recording in near real time; and verifying, by the processor, using machine learning that features in the images of the custom part in production are in compliance with the feature information of the custom part.
G05B 19/418 - Commande totale d'usine, c.-à-d. commande centralisée de plusieurs machines, p. ex. commande numérique directe ou distribuée [DNC], systèmes d'ateliers flexibles [FMS], systèmes de fabrication intégrés [IMS], productique [CIM]
G05B 13/02 - Systèmes de commande adaptatifs, c.-à-d. systèmes se réglant eux-mêmes automatiquement pour obtenir un rendement optimal suivant un critère prédéterminé électriques
93.
ORCHESTRATION OF A PATTERN-BASED CONFIGURABLE PROCESS SEQUENCE
A computer-implemented method, according to one approach, includes causing a predetermined tracker component to create a template tracker file based on a pattern-based configurable process sequence and causing a predetermined logger component to create a log of the pattern-based configurable process sequence. A playbook is generated based on the pattern-based configurable process sequence. The method further includes storing the template tracker file, a file including the log, and the playbook in storage for enabling auditing of the pattern-based configurable process sequence. A computer program product, according to another approach, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computer to cause the computer to perform the foregoing method.
In one aspect, a computer-implemented method includes detecting, by one or more processing devices, custom goals of a specified machine learning application; determining, by the one or more processing devices, relative importance of a plurality of performance categories for the specified machine learning application, based on the custom goals of the specified machine learning application; generating, by the one or more processing devices, automated machine learning model tests based on the determined relative importance of the plurality of performance categories for the specified machine learning application; and performing, by the one or more processing devices, validation testing of the machine learning model based on the automated machine learning model tests.
A computer-implemented method includes: monitoring, by a computing device, a data set format of all files in a computing system to determine a list of data sets in a first format which are accessed greater than a predetermined number of times; gathering, by the computing device, the list of data sets in the first format within the computing system; and converting, by the computing device, the list of data sets in the first format within the computing system to a second format which is different from the first format.
A computer implemented system, method, and computer program product are disclosed for managing a machine learning model operation (MLOps) for cost forecasting models. The MLOps receives a request for a subscription machine learning (ML) model by a tenant having a corresponding tenant configuration profile and automatically selects a subscription ML model in a model registry based on the tenant configuration profile. The MLOps deploys the selected subscription ML model to the tenant and monitors usage by the tenant of the currently operating ML model at a pre-determined refresh frequency. The MLOps determines whether the currently operating ML model exceeds a pre-determined accuracy threshold, and automatically deploys a second subscription ML model from the model registry to the tenant in place of the currently operating ML model in response to the pre-determined accuracy threshold being exceeded.
The exemplary embodiments disclose a method, a computer program product, and a computer system for managing user commands. The exemplary embodiments may include a user giving one or more commands to one or more devices, collecting data of the one or more commands, extracting one or more features from the collected data, and determining which one or more of the commands should be executed on which one or more of the devices based on the extracted one or more features and one or more models.
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
G10L 15/22 - Procédures utilisées pendant le processus de reconnaissance de la parole, p. ex. dialogue homme-machine
G10L 15/30 - Reconnaissance distribuée, p. ex. dans les systèmes client-serveur, pour les applications en téléphonie mobile ou réseaux
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
G10L 15/02 - Extraction de caractéristiques pour la reconnaissance de la paroleSélection d'unités de reconnaissance
G10L 15/16 - Classement ou recherche de la parole utilisant des réseaux neuronaux artificiels
G10L 25/30 - Techniques d'analyse de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par la technique d’analyse utilisant des réseaux neuronaux
A computer-implemented method for model building with explainability is provided. The method includes receiving, by a hardware processor, a first metric and a second metric of minimum model performance. The first metric relates to data modeling quality and the second metric relates to model to business rule correlations. The method further includes performing, by the hardware processor, auto Artificial Intelligence model generation responsive to training data and a combination of the first and the second metrics of minimum model performance to obtain a model that is trained and meets model prediction accuracy and model prediction explainability requirements represented by the combination of the first and the second metrics of minimum model performance.
An approach for restoring system functionality when a primary maintenance interface is unavailable is provided. In an embodiment, a computer maintenance application that is configured to use a Virtual Telecommunications Access Method (VTAM) interface to connect to a mainframe system is retrieved. A mainframe system is accessed with the computer maintenance application using the VTAM interface. During the access, a maintenance activity is performed on the mainframe system using the computer maintenance application.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 41/0654 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau
A computer-implemented method includes: advertising, by a computing device, at least one service including information from a learned knowledge base by a service provider vehicle within an autonomous vehicle ecosystem; connecting, by the computing device, the service provider vehicle to a service consumer vehicle within the autonomous vehicle ecosystem through a communication network; and sharing, by the computing device, the at least one service including the information from the learned knowledge base through a connection between the service provider vehicle and the service consumer vehicle using the communication network.
B60W 60/00 - Systèmes d’aide à la conduite spécialement adaptés aux véhicules routiers autonomes
B60W 40/06 - Calcul ou estimation des paramètres de fonctionnement pour les systèmes d'aide à la conduite de véhicules routiers qui ne sont pas liés à la commande d'un sous-ensemble particulier liés aux conditions ambiantes liés à l'état de la route
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p. ex. communication véhicule-piétons