Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 106. Отображено 87.
30-03-2017 дата публикации

EVENT CONFLICT DETECTION IN A COMMUNICATION

Номер: US20170091715A1
Принадлежит:

A method for detecting a conflict may include detecting a reference to a date and time in a communication. The method may also include determining a participation of the user in a prospective event associated with the date and time based on the context of the communication. The method may additionally include comparing the date and time associated with the prospective event to a date and time of previously scheduled events in a calendar system to detect any conflict. The method may also include detecting a conflict between the prospective event and a previously scheduled event in response to the date and time associated with the prospective event at least partially corresponding to the date and time of the previously scheduled event. The method may further include automatically presenting an indication of the conflict in response to detecting the conflict. 1. A computer implemented method for detecting a conflict with an event in a communication , comprising:detecting, by a processor, a reference to a date or a date and time in a communication associated with a user;determining, by the processor, a context in which the date or date and time is used in the communication in response to detecting the reference to the date or the date and time in the communication;determining, by the processor, a participation of the user in a prospective event associated with the date or the date and time based on the context of the communication;comparing, by the processor, the date or the date and time associated with the prospective event to a date or a date and time of each of a plurality of scheduled events previously scheduled in a calendar system of the user to detect any conflict in response to the participation of the user in the prospective event;detecting, by the processor, a conflict between the date or the date and time associated with the prospective event and the date or the date and time of a previously scheduled event of the plurality of previously scheduled events in ...

Подробнее
21-03-2017 дата публикации

Context-based data storage management between devices and cloud platforms

Номер: US0009602950B1

A system, method and program product that provides context-based data storage management between a cloud platform and a mobile device. A system is disclosed that includes: a system for assigning context to user files stored in a cloud platform; a system for periodically analyzing schedule information and location information associated with a user to determine a current user context; a system for matching the current user context with user files stored in the cloud platform to identify a set of context matching files; and a system for periodically downloading context matching files from the cloud platform to a mobile device associated with the user.

Подробнее
25-04-2017 дата публикации

Polling parameter adjustment

Номер: US0009632850B1

An approach, executed by a computer, includes receiving at least an initial polling quantity and an initial polling frequency and polling an endpoint application using the initial polling quantity and the initial polling frequency. The approach includes determining a first number of events not consumed in a queue of a listening application and a second number of events generated at the endpoint application and remaining in a queue at the endpoint application and comparing the number of events in each queue. The approach includes adjusting at least one of the initial polling quantity and the initial polling frequency based, at least in part, on the comparison of the first number of events not consumed in the queue of the listening application and the second number of events generated at the endpoint application and remaining in the queue at the endpoint application.

Подробнее
26-07-2016 дата публикации

Delegating control of a vehicle

Номер: US0009399445B2

An identification of a vehicle is received. An identification of a first user to receive delegation of control of the vehicle is received. Authentication information for the first user for the vehicle is determined. A request to authenticate the first user for delegation of control of the vehicle to the first user is received. The request to authenticate includes at least the authentication information for the first user is determined. Responsive to the determination, control of the vehicle is delegated to the first user.

Подробнее
05-01-2017 дата публикации

ASSOCIATING CONTEXTUAL INFORMATION WITH ELECTRONIC COMMUNICATIONS

Номер: US20170006094A1
Принадлежит:

A method for associating contextual information with an electronic communication. The method includes a computer processor monitoring one or more activities of a user of a computing device, and determining contextual information respectively associated with the one or more monitored activities of the user, wherein contextual information includes information describing the one or more monitored activities. The method further includes identifying the user initiating an electronic communication and a time that the user of the computing device initiates the electronic communication. The method further includes determining at least one of the one or more monitored activities that occur within a window of time, relative to the time that the user of the computing device initiates the electronic communication, and storing the contextual information respectively associated with the at least one of the one or more monitored activities that occurred within the window of time in association with the electronic communication. 1. A method for associating contextual information with an electronic communication , the method comprising:monitoring, by one or more computer processors, one or more activities of a user of a computing device;determining, by one or more computer processors, contextual information respectively associated with the one or more monitored activities of the user, wherein contextual information includes information describing the one or more monitored activities;identifying, by one or more computer processors, the user of the computing device initiating an electronic communication and a time that the user of the computing device initiates the electronic communication;determining, by one or more processors, at least one of the one or more monitored activities that occur within a window of time, relative to the time that the user of the computing device initiates the electronic communication; andstoring, by one or more computer processors, the contextual ...

Подробнее
10-04-2018 дата публикации

Authentication for blocking shoulder surfing attacks

Номер: US0009942221B2

An approach to authenticating a user for resource access. The approach displays independently bi-directionally rotating concentric layers wherein each of the concentric layers are divided into segments and each segment contains a symbol. The approach then allows the user to independently rotate each of the concentric layers until a desired symbol is positioned in a predetermined user specified validation section, i.e., an alignment of segments across the totality of the concentric layers. The approach then generates a password based on concatenating the symbols associated with the segments aligned in the validation section in an order predetermined by the user. The approach then submits the generated password for validation against a user predetermined password locally on a client computer or remotely on a server computer.

Подробнее
05-10-2017 дата публикации

RESOURCE SCHEDULE OPTIMIZATION

Номер: US20170286175A1
Принадлежит: International Business Machines Corp

Embodiments of the present invention provide methods, computer program products, and systems for evaluating expressions. Embodiments of the present invention can be used to receive a set of program instructions to be evaluated in a virtualized environment and determine an evaluation strategy based, at least in part, on an availability of CPU resources. The CPU resource include resources impacted by use of virtual machines and hypervisors. Embodiments of the present invention can, responsive to determining that there are sufficient CPU resources available, evaluate the set of program instructions according to the evaluation strategy using the CPU resources.

Подробнее
13-04-2017 дата публикации

CONTEXT-BASED DATA STORAGE MANAGEMENT BETWEEN DEVICES AND CLOUD PLATFORMS

Номер: US20170105087A1
Принадлежит: International Business Machines Corp

A system, method and program product that provides context-based data storage management between a cloud platform and a mobile device. A system is disclosed that includes: a system for assigning context to user files stored in a cloud platform; a system for periodically analyzing schedule information and location information associated with a user to determine a current user context; a system for matching the current user context with user files stored in the cloud platform to identify a set of context matching files; and a system for periodically downloading context matching files from the cloud platform to a mobile device associated with the user.

Подробнее
27-03-2018 дата публикации

Intelligent detection of changed user parameters in a system

Номер: US9928512B2

A system for intelligently determining changes to a service provider user's parameters in the service provider system. The system generally includes a service provider's computer system which contains a computer and a user database stored thereon; a user carried service provider tool, such as an ATM card, a cell phone, and the like; and a remote device whose use by the user is monitored by the service provider, such as an ATM machine (e.g., if the service provider is a bank and the service provider tool is an ATM card) or a phone or cell tower (e.g., if the service provider is a telecommunications service provider and the tool is a cell phone). Activity amongst the computer system, user carried service provider tool, and remote device is wirelessly monitored by the service provider (or an agent of the service provider) in an electronic communications network.

Подробнее
25-05-2017 дата публикации

Intelligent Detection of Changed User Parameters in a System

Номер: US20170148031A1

A system for intelligently determining changes to a service provider user's parameters in the service provider system. The system generally includes a service provider's computer system which contains a computer and a user database stored thereon; a user carried service provider tool, such as an ATM card, a cell phone, and the like; and a remote device whose use by the user is monitored by the service provider, such as an ATM machine (e.g., if the service provider is a bank and the service provider tool is an ATM card) or a phone or cell tower (e.g., if the service provider is a telecommunications service provider and the tool is a cell phone). Activity amongst the computer system, user carried service provider tool, and remote device is wirelessly monitored by the service provider (or an agent of the service provider) in an electronic communications network.

Подробнее
31-08-2017 дата публикации

USER INTERFACE FEATURE RECOMMENDATION

Номер: US20170249067A1
Принадлежит:

A computer-implemented method includes receiving a usage pattern. The usage pattern is associated with a mobile device. The method includes identifying one or more user interface features. The one or more user interface features are for the mobile device. The one or more user interface features are at most included below a threshold extent in the usage pattern. The method includes analyzing the usage pattern to yield potential user interface features. The method includes comparing the usage pattern user interface features to the one or more user interface features. The method is responsive to at least one of the one or more user interface features corresponding to any of the potential user interface features. The method includes indicating at least one of the one or more user interface features. 1. A computer-implemented method comprising:receiving a usage pattern, said usage pattern being associated with a mobile device;identifying one or more user interface features, said one or more user interface features being for said mobile device, said one or more user interface features being at most included below a threshold extent in said usage pattern;analyzing said usage pattern to yield potential user interface features;comparing said usage pattern user interface features to said one or more user interface features; andresponsive to at least one of said one or more user interface features corresponding to any of said potential user interface features, indicating said at least one of said one or more user interface features.2. The computer-implemented method of wherein said one or more user interface features comprises at least one device selected from a group consisting of:(a) a touchscreen;(b) a non-touch sensitive display;(c) one or more mechanical buttons;(d) one or more capacitive buttons;(e) a physical keyboard;(f) a soft keyboard;(g) handwriting interface;(h) an external human interface device;(i) a global positioning system receiver;(j) an accelerometer;(k) a ...

Подробнее
11-08-2016 дата публикации

DELEGATING CONTROL OF A VEHICLE

Номер: US20160229376A1
Принадлежит:

An identification of a vehicle is received. An identification of a first user to receive delegation of control of the vehicle is received. Authentication information for the first user for the vehicle is determined. A request to authenticate the first user for delegation of control of the vehicle to the first user is received. The request to authenticate includes at least the authentication information for the first user is determined. Responsive to the determination, control of the vehicle is delegated to the first user. 1. A method for delegating control of a vehicle , the method comprising the steps of:receiving, by one or more computer processors, an identification of a vehicle;receiving, by one or more computer processors, an identification of a first user to receive delegation of control of the vehicle;determining, by one or more computer processors, an authentication information for the first user for the vehicle;receiving, by one or more computer processors, a request to authenticate the first user for delegation of control of the vehicle to the first user;determining, by one or more computer processors, the request to authenticate includes at least the authentication information for the first user; andresponsive to determining the request to authenticate includes at least the authentication information for the first user, delegating, by one or more computer processors, control of the vehicle to the first user.2. The method of claim 1 , further comprising:receiving, by one or more computer processors, an identification of an access type for the first user of the vehicle;providing, by one or more computer processors, a notification to the first user of the access type; andproviding, by one or more computer processors, a notification to the vehicle of the access type for the first user.3. The method of claim 2 , further comprising:monitoring, by one or more computer processors, information about the vehicle, wherein the information includes at least one of, a ...

Подробнее
06-02-2018 дата публикации

Delegating control of a vehicle

Номер: US0009884611B2

An identification of a vehicle is received. An identification of a first user to receive delegation of control of the vehicle is received. Authentication information for the first user for the vehicle is determined. A request to authenticate the first user for delegation of control of the vehicle to the first user is received. The request to authenticate includes at least the authentication information for the first user is determined. Responsive to the determination, control of the vehicle is delegated to the first user.

Подробнее
22-11-2016 дата публикации

Avoiding file content reading using machine information

Номер: US0009501658B1

A method, system and computer program product for protecting access to a computer file are disclosed. In embodiments, the method comprises a user, employing a user computer, selecting a file, and creating a reference file to protect access to this selected file. When a requester uses a computer device to request access to the protected file, the reference file initiates a procedure to determine if the computing device is entitled to access the protected file by validating a series of computer components that uniquely identify the computing device. In embodiments, a set of specified computer configuration data is stored in a specified storage location; and the series of computer components that uniquely identify the computing device are validated by comparing this set of computer configuration data with the series of computer components that uniquely identify the computing device.

Подробнее
26-09-2017 дата публикации

Authentication for blocking shoulder surfing attacks

Номер: US0009773104B1

An approach to authenticating a user for resource access. The approach displays independently bi-directionally rotating concentric layers wherein each of the concentric layers are divided into segments and each segment contains a symbol. The approach then allows the user to independently rotate each of the concentric layers until a desired symbol is positioned in a predetermined user specified validation section, i.e., an alignment of segments across the totality of the concentric layers. The approach then generates a password based on concatenating the symbols associated with the segments aligned in the validation section in an order predetermined by the user. The approach then submits the generated password for validation against a user predetermined password locally on a client computer or remotely on a server computer.

Подробнее
07-01-2021 дата публикации

Cryptographic key management

Номер: US20210006401A1
Принадлежит: International Business Machines Corp

Cryptographic key provisioning by determining future cryptographic key demand according to historic key demand and key access requirements, determining cryptographic key provisioning resources for the future cryptographic key demand, and providing cryptographic keys, prior to the determined future cryptographic key demand using the cryptographic key provisioning resources.

Подробнее
14-01-2021 дата публикации

PREDICTIVE NAVIGATION SYSTEM

Номер: US20210010821A1
Принадлежит:

A method, computer system, and a computer program product for providing a personalized anxiety-reducing navigation system for a user utilizing augmented reality (AR) and virtual reality (VR) is provided. The present invention may include detecting a current location of the user. The present invention may then include, in response to detecting the current location of the user is beyond a comfort boundary threshold, determining a stress state of the user. The present invention may also activate an AR system. The present invention may further, in response to determining the determined stress state of the user is high, activate a VR system. 1. A method for providing a personalized anxiety-reducing navigation system for a user utilizing augmented reality (AR) and virtual reality (VR) , the method comprising:detecting a current location of the user;in response to detecting the current location of the user is beyond a comfort boundary threshold, determining a stress state of the user;activating an AR system; andin response to determining that the stress state of the user is high, obtaining a three-dimensional historical representation of the detected current location of the user and superimposing the obtained three-dimensional historical representation of the detected current location onto a visual field associated with the user by utilizing VR.2. The method of claim 1 , wherein detecting the current location of the user claim 1 , further comprises:obtaining a piece of feedback data from at least one biometric device and at least one Internet of Things (IoT) sensor.3. The method of claim 1 , further comprising:determining the comfort boundary threshold based on a history of interactions and a plurality of workflow experiments between the user and a caregiver associated with user.4. The method of claim 1 , wherein activating the AR system claim 1 , further comprises:alerting a caregiver associated with the user;superimposing a plurality of historical images on a visual ...

Подробнее
18-01-2018 дата публикации

Authentication for blocking shoulder surfing attacks

Номер: US20180019992A1
Автор: Vinod A. Valecha
Принадлежит: International Business Machines Corp

An approach to authenticating a user for resource access. The approach displays independently bi-directionally rotating concentric layers wherein each of the concentric layers are divided into segments and each segment contains a symbol. The approach then allows the user to independently rotate each of the concentric layers until a desired symbol is positioned in a predetermined user specified validation section, i.e., an alignment of segments across the totality of the concentric layers. The approach then generates a password based on concatenating the symbols associated with the segments aligned in the validation section in an order predetermined by the user. The approach then submits the generated password for validation against a user predetermined password locally on a client computer or remotely on a server computer.

Подробнее
21-01-2021 дата публикации

Access delegation using offline token

Номер: US20210021601A1
Принадлежит: International Business Machines Corp

Described herein are techniques for delegating access using an offline token. The techniques including a method comprising receiving, at a server and from a delegate user device, a delegate login package comprising an offline token and delegate credentials. The offline token is generated at an offline user device and transmitted to the delegate user device for enabling the delegate user device to access access-controlled content associated with the offline user device. The techniques further include validating, by the server, the delegate login package by comparing the delegate credentials with delegate information stored in the offline token. The techniques further including establishing a delegated session between the delegate user device and the access-controlled content stored on the server in response to validating the delegate login package. Furthermore, the delegated session is established according to an access policy, delegation rights, and an expiration parameter stored in the offline token.

Подробнее
17-02-2022 дата публикации

Prioritizing Requested Network Resource Delivery

Номер: US20220053504A1
Принадлежит: International Business Machines Corp

A system for prioritizing network resource dispatch may include receiving a request for a network resource from a mobile device associated with a user, the request comprising mobile device and user characteristics, and location information. A request priority may be determined based on some combination of a mobile device score and user score. The request priority is assigned to the request. A highest ranked mobile device request priority is determined, and the network resource is dispatched to a location corresponding to the highest ranked request priority. A heatmap may be generated to illustrate a geographical representation of each mobile device data usage rate at each mobile device respective location. The request priorities may change based on any combination of the mobile device characteristics, user characteristics, location information and the usage characteristics. Therefore, the priority of dispatching the network resource may be determined dynamically and updated as the inputs change.

Подробнее
13-02-2020 дата публикации

Custom blockchain for iot devices

Номер: US20200051081A1
Принадлежит: International Business Machines Corp

A computer-implemented method for verifying a transaction in a blockchain network may be provided. The blockchain network comprises nodes participating in performing the transaction. The method comprises grouping the nodes of the blockchain network into a plurality of clusters of nodes. For each cluster, the method comprises determining for each node of the cluster performance parameter values, calculating a weighted sum of the determined performance parameter values, designating the node with the highest weighted sum as cluster leader, designating a number of nodes of the cluster whose weighted sum is next to the highest weighted sum, as sub-cluster leader, the number being at least half of the total number of nodes within said cluster, and verifying the transaction for the cluster by the cluster leader and the sub-cluster leaders.

Подробнее
17-03-2022 дата публикации

Metering computing power in memory subsystems

Номер: US20220083242A1
Принадлежит: International Business Machines Corp

A scanner is used to generate a set of processing power consumption metrics for a memory subsystem. From the set of processing power consumption metrics, a number of in-memory computations is determined. From the number of in-memory computations, a total computing score is determined. A user is notified of the total computing score.

Подробнее
08-03-2018 дата публикации

NAVIGATION PERSONALIZATION THROUGH ANALYSIS OF PRESENT AND HISTORICAL USER DATA

Номер: US20180066952A1
Принадлежит:

Embodiments of the present invention provide systems and methods for personalizing a navigation route. The method includes receiving a request from a user for a navigation route between two or more points. The method further includes accessing navigation data and services, creating a generic navigation route, accessing route history and related data for the user, creating a personalized navigation route for the user, and displaying the personalized navigation route. 1. A method for personalizing a navigation route , the method comprising:receiving, by one or more processors, a request from a user for a navigation route between two or more points;accessing, by one or more processors, navigation data and services;creating, by one or more processors, a generic navigation route based, at least in part, on the request from the user and the navigation data and services;accessing, by one or more processors, route history and related data for the user;creating, by one or more processors, a personalized navigation route for the user based, at least in part, on the generic navigation route and the route history and related data for the user; anddisplaying, by one or more processors, the personalized navigation route for the user.2. The method of claim 1 , further comprising:creating, by one or more processors, a set of directions based on the personalized navigation route for the user.3. The method of claim 2 , further comprising:comparing, by one or more processors, the set of directions with the accessed related data for the user;creating, by one or more processors, a set of personalized directions based on the comparison of the directions and accessed related data for the user, and including in the set of personalized directions at least part of the accessed related data for the user.4. The method of claim 3 , further comprising:creating, by one or more processors, a personalized interactive navigation map based, at least in part, on the personalized navigation route, ...

Подробнее
17-03-2022 дата публикации

PREVENTING AUDIO DROPOUT

Номер: US20220086209A1
Принадлежит:

Embodiments of the present invention provide methods, computer program products, and systems. Embodiments of the present invention detect an audio stream comprising one or more voice packets from a first computing system. Embodiments of the present invention can, in response to detecting an audio stream, dynamically prevent audio drop out on a second computing system using circular buffers based on network consistency. 1. A computer-implemented method comprising:detecting an audio stream comprising one or more voice packets from a first computing system; andin response to detecting an audio stream, dynamically preventing audio drop out on a second computing system using circular buffers based on network consistency.2. The computer-implemented method of claim 1 , wherein dynamically preventing audio drop out on a second computing system comprises:replicating a copy of the audio stream;generating a textual representation of the replicated copy of the audio stream and storing the generated textual representation into a first circular buffer, wherein the generated textual representation comprises each spoken word and an associated sequence number assigned to each spoken word;determining a frequency to transmit the textual representation and replicated copy of the audio stream; andtransmitting the textual representation and the audio stream at the determined frequency to a receiving system.3. The computer-implemented method of claim 2 , further comprising:storing the transmitted textual representation from replicated copy of the audio stream into a second circular buffer on the receiving system; andgenerating a textual representation of the audio stream and storing the generated textual representation into a third circular buffer on the receiving system.4. The computer-implemented method of claim 3 , further comprising:determining whether there are missing audio segments from the audio stream; andreproducing missing audio segments from the audio stream using the second ...

Подробнее
28-02-2019 дата публикации

Cognitive Security for Workflows

Номер: US20190068630A1
Принадлежит: International Business Machines Corp

A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a cognitive security system. The cognitive security system generates a violation array. Each entry of the violation array represents identification of a workflow activity that violates a security policy. Responsive to a new workflow orchestration being created by a user, the cognitive security system compares each activity of the new workflow orchestration to the violation array. Responsive to determining a given activity of the new workflow orchestration exists in the violation array, the cognitive security system recommends to the user to remove the given activity from the new workflow orchestration.

Подробнее
27-02-2020 дата публикации

CUSTOMIZABLE AUTHENTICATION SYSTEM

Номер: US20200067902A1
Принадлежит:

An online authentication system allows a user to define their own logic for multistage authentication, which is provided to an online authentication center and stored as encrypted bytecode based on each user's password. Implementation logic can use third party information sources to provide additional authentication options. 1. A network-based authentication system , comprising:a server having a processor; anda memory coupled to the server, configured to store user-customized logic at the direction of the server, receiving user-customized logic for each of a plurality of users from the authentication system over a network;', 'storing the user-customized logic for each user in the memory in an encrypted form based on a password of each user,', 'receiving the password of a user,', 'decrypting the user-customized logic for the user,', 'receiving additional credentials from the user,', 'verifying the additional credentials by executing the user-customized logic, and', 'granting the user access to a network resources responsive to the step of verifying., 'wherein the server is configured to perform steps of2. The network-based authentication system of claim 1 , wherein the server is further configured to compile the user-customized logic into bytecode prior to storing the logic as bytecode in the memory.3. The network-based authentication system of claim 1 , wherein the step of receiving user-customized logic performed by the server comprises receiving the logic as bytecode from each user.4. The network-based authentication system of claim 1 , wherein the server is further configured to provide an API to each user that facilitates user-creation of the user-customized logic.5. The network-based authentication system of claim 1 , wherein the server is further configured to request information from a third-party service across the network as part of the step of verifying the additional credentials.6. The network-based authentication system of claim 5 , wherein the third- ...

Подробнее
05-05-2022 дата публикации

PROBLEM SOLVING USING SELECTED DATASETS OF INTERNET-OF-THINGS SYSTEM

Номер: US20220138597A1
Принадлежит:

A method, computer system, and a computer program product for problem solving using selected datasets from an internet-of-things system are provided. A trigger device in an internet-of-things system may be designated. The internet-of-things system may include the trigger device and internet-of-things devices. A trigger message may be received from the trigger device. A problem may be determined based on the trigger message. Data transmissions may be requested from the internet-of-things devices. Data may be received via the data transmission. The data transmission may be ended. A problem contributor may be identified by inputting the received data and the determined problem into a machine learning model. A problem response for responding to the problem may be generated. The generating may include inputting the problem contributor to the machine learning model. The problem response may be performed.

Подробнее
01-04-2021 дата публикации

QUANTUM PLATFORM ROUTING OF A QUANTUM APPLICATION COMPONENT

Номер: US20210097419A1
Принадлежит:

Systems, computer-implemented methods, and computer program products to facilitate quantum platform routing of a quantum application component are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a dissection component that identifies one or more components of a quantum application. The computer executable components can further comprise a determination component that selects at least one quantum platform to execute the one or more components of the quantum application based on a defined run criterion. 1. A system , comprising:a memory that stores computer executable components; and a dissection component that identifies one or more components of a quantum application; and', 'a determination component that selects at least one quantum platform to execute the one or more components of the quantum application based on a defined run criterion., 'a processor that executes the computer executable components stored in the memory, wherein the computer executable components comprise2. The system of claim 1 , wherein the defined run criterion comprises one or more defined run criteria of at least one of the one or more components or the at least one quantum platform claim 1 , thereby facilitating defined execution results of the one or more components.3. The system of claim 1 , wherein the computer executable components further comprise:an evaluation component that evaluates one or more defined run criteria of at least one of the one or more components or the at least one quantum platform.4. The system of claim 1 , wherein the computer executable components further comprise:a control component that manages at least one of execution of the one or more components by the at least one quantum platform or execution data obtained from the at least one quantum platform.5. The system of ...

Подробнее
12-04-2018 дата публикации

Delegating control of a vehicle

Номер: US20180099644A1
Принадлежит: International Business Machines Corp

An identification of a vehicle is received. An identification of a first user to receive delegation of control of the vehicle is received. Authentication information for the first user for the vehicle is determined. A request to authenticate the first user for delegation of control of the vehicle to the first user is received. The request to authenticate includes at least the authentication information for the first user is determined. Responsive to the determination, control of the vehicle is delegated to the first user.

Подробнее
08-04-2021 дата публикации

Digital person and digital persona verification

Номер: US20210105577A1
Принадлежит: International Business Machines Corp

Disclosed is a computer implemented method to validate a physical person matches a digital persona. The method includes receiving a first location of a first user based on a global positioning system (GPS) location of a first device, and a second location of a second user based on a GPS location of a second device. The method also includes generating one or more ephemeral keys. The method further includes, determining, based on the GPS location of the first device and the GPS location of the second device, the first user and the second user are in close proximity. The method includes, establishing a short-range communication channel between the first device and the second device. The method includes, validating, based on the one or more ephemeral keys provided over the short-range communication channel, a first person is the first user and a second person is the second user.

Подробнее
19-04-2018 дата публикации

SYSTEM AND METHOD FOR DETECTING AND ALERTING UNEXPECTED BEHAVIOR OF SOFTWARE APPLICATIONS

Номер: US20180107584A1
Принадлежит:

A method finding the root cause of errors and/or unexpected behavior of a monitored software application, the method comprising: providing a decision tree corresponding to an error and/or unexpected behavior of a software application, wherein the decision tree comprising multiple nodes, wherein the decision tree further comprising one or more leaf nodes, wherein the leaf nodes indicates at least one reason and one or more possible solutions for the error and/or unexpected behavior; scanning one or more log-files of a software application; determining, based on the decision tree and the scanned log files which step has been not performed by the software application, wherein the non-performed step being indicative for an error and/or unexpected behavior of the software application; determining a leaf node based on the determined non-performed step; extracting information from the leaf node; and providing a reason and/or a solution of the error and/or unexpected behavior. 1. A computer-implemented method finding the root cause of errors and/or unexpected behavior of a monitored software application , the method comprising:providing a decision tree corresponding to an error and/or unexpected behavior of a software application, wherein the decision tree comprising multiple nodes and the nodes are coupled by branches, wherein the decision tree further comprising one or more leaf nodes, wherein the leaf nodes indicates at least one reason and one or more possible solutions for the error and/or unexpected behavior;scanning one or more log-files of a software application and running through the decision tree based on the steps included in the scanned log files;determining, based on the decision tree and the scanned log files which step has been not performed by the software application, wherein the non-performed step being indicative for an error and/or unexpected behavior of the software application;determining a leaf node based on the determined non-performed step; ...

Подробнее
03-06-2021 дата публикации

DYNAMICALLY CONFIGURING A WEB SERVER TIMEOUT

Номер: US20210168211A1

A method, system and computer program product for dynamically adjusting a timeout parameter associated with a connection between a client device and a server. Information is associated with at least one of a characteristic of a content to be rendered by a server, a characteristic of traffic of a connection to the server, and a characteristic of a user of the server is received from the client device and transmitted to the server. Based on the transmitted information, an amount of time in a previously stored timeout parameter associated with a client device is adjusted automatically with a new timeout parameter to enable communication between the client device and the server. The new timeout parameter is stored in place of the previously stored timeout parameter. Responsive to the amount of time to wait for a response from the client device satisfying the new timeout parameter, the communication between the client device and the server is terminated. 1. A computer-implemented method comprising:receiving, at a server system, a data transmission from a client device, the data comprising a characteristic of a content to be rendered by a server;adjusting automatically using a machine-learning heuristic model, based on the received information, an amount of time in a previously stored timeout parameter associated with a client device with a new timeout parameter to enable communication between the client device and the server;storing in a memory the new timeout parameter in place of the previously stored timeout parameterresponsive to the amount of time to wait for a response from the client device satisfying the new timeout parameter, terminating the communication between the client device and the server.2. The computer-implemented method of claim 1 , further comprising:receiving, at the server system, a data transmission from the client device, the data comprising: at least one of a characteristic of traffic of a connection to the server, and a characteristic of a user ...

Подробнее
30-04-2020 дата публикации

Protecting visible content

Номер: US20200134201A1
Принадлежит: International Business Machines Corp

The method, computer system, and computer program product for using a key management server to protect visible content. The method, computer program product, and computer system may include a key management server which may receive, from an encryption device, an identification of one or more portions of clear information visible on a physical document. The key management server may receive, from the encryption device, one or more permission parameters. The permission parameters may include a time duration parameter, a location parameter, a start and end time parameter, or a device identification parameter. Further, the key management server may receive, from a decryption device, a request to access a portion of the clear information. The key management server may transmit, to the decryption device, information permitting access to the portion of clear information.

Подробнее
16-05-2019 дата публикации

DIGITAL CERTIFICATE CONTAINING MULTIMEDIA CONTENT

Номер: US20190147150A1
Принадлежит:

Utilizing multimedia content in a digital signature to facilitate authentication. A message requester public key is received from a message requester. A digital certificate is generated containing the message requester public key. Multimedia content identifying the message requester is retrieved. Multimedia content is inserted into the digital certificate. A message digest is generated from the digital certificate including the multimedia content. The message digest and included multimedia content is encrypted with a certificate authority private key to generate a digital signature. A certificate authority public key is retrieved. The digital certificate including the digital signature and certificate authority public key is transmitted to a message owner. 1. A method utilizing multimedia content in a digital signature to facilitate authenticate , the method comprising:receiving a message requester public key from a message requester;generating a digital certificate containing the message requester public key;retrieving multimedia content identifying the message requester;inserting the multimedia content into the digital certificate;generating a message digest from the digital certificate including the multimedia content;encrypting the message digest and included multimedia content with a certificate authority private key to generate a digital signature;retrieving a certificate authority public key; andtransmitting the digital certificate including the digital signature and certificate authority public key to a message owner.2. The method of claim 1 , wherein the multimedia content contains audio content or video content.3. The method of claim 1 , wherein the multimedia content is a digital image claim 1 , the digital image selectively one of the following: a handwritten signature claim 1 , a bar code claim 1 , a company logo claim 1 , and a photo.4. The method of claim 1 , further comprising after utilizing the certificate authority public key to encrypt the ...

Подробнее
29-09-2022 дата публикации

Automatic Identification of Improved Machine Learning Models

Номер: US20220309379A1
Принадлежит: International Business Machines Corp

Identifying new machine learning models with improved metrics is provided. A new machine learning model is searched for that is relevant to a current machine learning model running within a client device and has improved metrics over current metrics of the current machine learning model. It is determined whether a relevant new machine learning model having improved metrics over the current metrics of the current machine learning model was found in the search. In response to determining that a relevant new machine learning model having improved metrics was found in the search, it is determined whether the relevant new machine learning model is compatible with the current machine learning model. In response to determining that the relevant new machine learning model is compatible with the current machine learning model, the relevant new machine learning model is automatically implemented in the client device.

Подробнее
29-09-2022 дата публикации

PROACTIVE TRAINING VIA VIRTUAL REALITY SIMULATION

Номер: US20220309943A1
Принадлежит:

A processor may receive data associated with a user. The processor may determine, using an artificial intelligence model, a contextual situation the user is likely to encounter. The processor may identify, using the artificial intelligence model, a task that the user is likely to perform in the contextual situation. The processor may determine, using the artificial intelligence model, a criticality of the task the user is likely to perform in the contextual situation. The processor may generate a simulation of the task in a virtual reality simulation. The processor may prompt the user to utilize the task simulation to learn how to perform the task. 1. A computer-implemented method , the method comprising:receiving, by a processor, user data associated with a user, wherein the user data includes data associated with a prior experience of the user;identifying, using an artificial intelligence model, a contextual situation the user is likely to encounter;identifying, using the artificial intelligence model, a task that the user is likely to perform in the contextual situation;determining, using the artificial intelligence model, a criticality of the task the user is likely to perform in the contextual situation;generating a simulation of the task in a virtual reality simulation; andprompting the user to utilize the task simulation to learn how to perform the task.2. The method of claim 1 , wherein prompting the user to utilize the task simulation includes an assessment of a timeframe for the user to perform the task in the contextual situation.3. The method of claim 1 , wherein determining the criticality of the task includes:determining a criticality score for the task; anddetermining that the criticality score exceeds a criticality threshold.4. The method of claim 1 , wherein determining the criticality of the task includes:predicting the prior experience of the user with the task;assigning a skill score to the prior experience of the user; anddetermining that the ...

Подробнее
08-07-2021 дата публикации

Blockchain Network to Protect Identity Data Attributes Using Data Owner-Defined Policies

Номер: US20210209246A1
Принадлежит:

Applying data owner-defined data protection policies for identity data security within a blockchain environment is provided. A data sharing request for an identity data attribute corresponding to a data owner is received from a data consumer. A data protection policy defined by the data owner that corresponds to the identity data attribute requested by the data consumer is retrieved from a blockchain. The data protection policy is applied to the identity data attribute requested by the data consumer to determine amount of data sharing with the data consumer. 1. A computer-implemented method for applying data owner-defined data protection policies for identity data security within a blockchain environment , the computer-implemented method comprising:receiving, by a computer, a data sharing request for an identity data attribute corresponding to a data owner from a data consumer;retrieving, by the computer, a data protection policy defined by the data owner that corresponds to the identity data attribute requested by the data consumer from a blockchain; andapplying, by the computer, the data protection policy to the identity data attribute requested by the data consumer to determine amount of data sharing with the data consumer.2. The computer-implemented method of further comprising:determining, by the computer, whether the amount of data sharing is null based on the data protection policy defined by the data owner; andresponsive to the computer determining that the amount of data sharing is null based on the data protection policy defined by the data owner, denying, by the computer, data sharing of the identity data attribute with the data consumer.3. The computer-implemented method of further comprising:determining, by the computer, whether the amount of data sharing is all based on the data protection policy defined by the data owner; andresponsive to the computer determining that the amount of data sharing is all based on the data protection policy defined by the ...

Подробнее
15-07-2021 дата публикации

DISTRIBUTING UNMANNED VEHICLES USING MULTI-HOP TRANSPORT

Номер: US20210216929A1
Принадлежит:

Distributing and rebalancing crewless vehicles (CV) by receiving a CV demand—availability gap, identifying candidate CV to relocate to close the CV demand—availability gap, identifying a candidate transport to relocate the CV to close the CV demand—availability gap, generating a candidate CV relocation plan, optimizing an overall CV relocation plan, and executing the overall CV relocation plan. 1. A computer implemented method for distributing crewless vehicles (CV) , the method comprising:receiving, by one or more computer processors, a CV demand—availability gap;identifying, by the one or more computer processors, a candidate CV to relocate to close the CV demand—availability gap;identifying, by the one or more computer processors, a candidate transport to relocate the CV to close the CV demand—availability gap;generating, by the one or more computer processors, a plurality of candidate CV relocation plans;optimizing, by the one or more computer processors, an overall CV relocation plan comprising a candidate CV relation plan; andexecuting, by the one or more computer processors, the overall CV relocation plan.2. The computer implemented method according to wherein the CV demand—availability gap considers factors selected from the group consisting of: a number of CV required claim 1 , capabilities of the CV required claim 1 , and times and location at which CV are required.3. The computer implemented method according to wherein a candidate CV relocation plan includes an element selected from the group consisting of: a CV moving under its own power from a first location to a location of a transport claim 1 , the CV boarding the transport claim 1 , transporting the CV to a drop-off location claim 1 , and the CV moving under its own power from the drop-off location to a final location.4. The computer implemented method according to claim 1 , wherein the CV relocation plan is generated according to CV fuel level and maximum range.5. The computer implemented method ...

Подробнее
19-08-2021 дата публикации

ROBOTIC TOXICODENDRON WEEDING

Номер: US20210256398A1
Принадлежит:

A system includes a memory having instructions therein and at least one processor in communication with the memory. The at least one processor is configured to execute the instructions to acquire phytomorphological field data via a sensor component of a mobile robot, generate, based on the phytomorphological field data and via a machine learning agent, a predicted likelihood of whether a hypothetical action by the mobile robot against a found plant would be directed against a true plant, conduct a non-phytomorphological assessment of the found plant via the mobile robot and based on the predicted likelihood being below a first threshold and above a second threshold, and, via the mobile robot and based on the non-phytomorphological assessment, attack the found plant, mark a site of the found plant, and/or document a context of the site. 1. A method , comprising:acquiring phytomorphological field data using a sensor component of a mobile robot;{'i': 'Toxicodendron', 'generating, based on the phytomorphological field data and using a machine learning agent, a predicted likelihood of whether a hypothetical action by the mobile robot against a found plant would be directed against a true plant;'}conducting a non-phytomorphological assessment of the found plant using the mobile robot and based on the predicted likelihood being below a first threshold and above a second threshold; andtaking at least one actual action selected from the group consisting of attacking the found plant, marking a site of the found plant, and documenting a context of the site,wherein the action is taken using the mobile robot and based on the non-phytomorphological assessment.2. The method of claim 1 , further comprising:training the machine learning agent using phytomorphological training data; andautomatically initiating retraining of the machine learning agent based on the non-phytomorphological assessment,wherein the phytomorphological training data excludes the phytomorphological field data ...

Подробнее
09-09-2021 дата публикации

Synchronous multi-tenant single sign-on configuration

Номер: US20210281559A1
Принадлежит: International Business Machines Corp

A computer implemented method for synchronizing multi-tenant single sign-on configuration. Utilizing a combination layer that is configured a single time to interact with a trust application at an identity provider. The combination layer is also configured to interact with the service provider and manages the security token and authentication state of the user. The identity provider can create a single long-lived trust application that is only responsible for redirecting to the combination layer, rather than a creating plurality of short-lived applications that redirect to a service provider every time a user login request is received. Thus, resulting in improved utilization of computing resources at the identity provider.

Подробнее
22-08-2019 дата публикации

System and method for detecting and alerting unexpected behavior of software applications

Номер: US20190258563A1
Принадлежит: International Business Machines Corp

A method for finding the cause of an error or unexpected behavior of a software application includes providing a list of steps to be executed in order to achieve a certain behavior of the application in a usage scenario and providing a decision tree corresponding with the usage scenario. The decision tree comprises decision nodes that correspond with the steps in the sequence of steps to be executed and leaf nodes indicating one or more possible solutions. The method includes scanning log files to determine whether a step in the list of steps to be executed has not been executed and traversing the decision tree when a step in the list of steps has not been executed. A leaf node of the decision tree that corresponds to a non-executed step is determined and a solution is extracted from the determined leaf node.

Подробнее
04-11-2021 дата публикации

Augmented reality field of view based on sensed user data

Номер: US20210343085A1
Принадлежит: International Business Machines Corp

User-specific augmentation of a real word field of view viewable through an augmented reality (AR) device is facilitated by a processor(s) receiving image data representative of a real world field of view viewable by a user through the AR device, and receiving sensor data indicative of the user's stress level, which is related, at least in part, to the user's real world field of view viewable through the AR device. The processor(s) processes the image data, based on the user's stress level, to identify one or more stress-inducing elements to be hidden in the real world field of view viewable through the AR device. Further, the processor(s) provides an augmented real world field of view for display to the user through the AR device, where the one or more stress-inducing elements are hidden from the user in the augmented real world field of view.

Подробнее
25-11-2021 дата публикации

RESTRICTING SECURITY KEY TRANSFER FROM A KEY MANAGEMENT SERVER IN AN ENTERPRISE

Номер: US20210367768A1

An enterprise key management server operates in association with a location service that maintains information defining at least one physical boundary of the enterprise. Upon receipt at the key management server of a request that requires release of key material, an additional security check is performed. When the request is received from a GPS-enabled storage device, the key management server queries the location service to determine whether that device is within the boundary. If so, the key material is released. If the requesting device does not provide its location, or if the location service determines that the device is not within the boundary, the key management server fails the request so that the key material is not released. In this manner, the disclosure of the key material to a device that is no longer within the confines of the enterprise, e.g., because it has been stolen, is averted. 1. A method to protect key material in an enterprise , the enterprise having a physical environment , comprising:maintaining first information that defines at least one physical boundary of the physical environment;responsive to receipt of a request associated with a device, determining whether the request is associated with second information that identifies a physical location of the device;upon a determination that the request is associated with the second information, comparing the second information with the first information to determine whether the device is within the physical environment; andupon a determination that the device is within the physical environment, releasing the key material for use in association with the device.2. The method as described in wherein the physical boundary is one of: a geographic region claim 1 , a geographic location within the geographic region claim 1 , a physical facility with the geographic location claim 1 , and a physical space associated with the physical facility.3. The method as described in wherein the second information is ...

Подробнее
04-10-2018 дата публикации

WORKFLOW HANDLING IN A MULTI-TENANT CLOUD ENVIRONMENT

Номер: US20180285146A1
Автор: Valecha Vinod A.
Принадлежит:

Provided herewith are embodiments related to a system, computer program product and a method for workflow handling, for example, in a cloud computing environment. Recommendations are provided to tenants regarding a replacement or improvement of activities or tasks in an orchestration workflow determined to have sub-optimal activities or tasks. The recommendation is based on a comparison of activities or tasks of a plurality of orchestrations that are deemed similar. The orchestrations deemed similar are grouped and ranked based on performance. Tenants implementing orchestrations that are ranked below the top ranked orchestration (sub-optimal) are provided with recommendations. The recommendations can be used to improve performance of the lower ranked orchestrations based on the performance of the top ranked orchestration. 1. A computer-implemented method for workflow handling , the method comprising:comparing an operation for each of a plurality of orchestrations operating within a cloud environment;grouping orchestrations based on a similarity of operations within each orchestration;determining performance criteria for each orchestration with a group;ranking each orchestration within the group based on the performance criteria;determining differences in operation between a highest ranked orchestration and each lower ranked orchestration in the group; andnotifying a tenant of each lower ranked orchestration about the determined difference between the operation of the highest ranked orchestration and the operation of a lower ranked orchestration specific to the tenant.2. The computer-implemented method of claim 1 , wherein the operation is related to one or more tasks or activities associated with an orchestration.3. The computer-implemented method of claim 1 , wherein the performance is based on at least one of: memory usage claim 1 , CPU consumption claim 1 , and a time required for completion of an orchestration.4. The computer-implemented method of further ...

Подробнее
04-10-2018 дата публикации

POLLING PARAMETER ADJUSTMENT

Номер: US20180287923A1
Принадлежит:

An approach, executed by a computer, includes receiving at least an initial polling quantity and an initial polling frequency and polling an endpoint application using the initial polling quantity and the initial polling frequency. The approach includes determining a first number of events not consumed in a queue of a listening application and a second number of events generated at the endpoint application and remaining in a queue at the endpoint application and comparing the number of events in each queue. The approach includes adjusting at least one of the initial polling quantity and the initial polling frequency based, at least in part, on the comparison of the first number of events not consumed in the queue of the listening application and the second number of events generated at the endpoint application and remaining in the queue at the endpoint application. 1. A method for adjusting polling parameters , comprising:polling, by one or more processors, an endpoint application using an initial polling quantity and an initial polling frequency;determining, by one or more processors, a first number of events not consumed in a queue of a listening application and a second number of events in a queue at the endpoint application at an end of a polling cycle; andcomparing, by one or more processors, the first number of events not consumed in the queue of the listening application and the second number of events in the queue at the endpoint application at the end of the polling cycle.2. The method of claim 1 , further comprising:adjusting, by one or more processors, at least one of the initial polling quantity and the initial polling frequency based, at least in part, on the comparison of the first number of events not consumed in the queue of the listening application and the second number of events in the queue at the endpoint application at the end of the polling cycle, wherein adjusting includes one of reducing at least one of the initial polling quantity and the ...

Подробнее
17-09-2020 дата публикации

MANAGING ACCESS BY THIRD PARTIES TO DATA IN A NETWORK

Номер: US20200293514A1
Принадлежит:

Systems and methods for managing access to data in a network are provided. In embodiments, a method includes: receiving, by a computer device, a search request regarding data of a participant, the search request including participant parameters associated with the participant; generating, by the computer device, a record of data associated with the participant based on the search request; sending, by the computer device, a request for data to third party nodes of a blockchain system based on the search request and the record; receiving, by the computer device, results from the blockchain system, the results including at least one set of data from a first node of the third party nodes; and determining, by the computer device, that the set of data requires updating based on the results.

Подробнее
17-09-2020 дата публикации

Detection and protection of data in api calls

Номер: US20200295922A1
Принадлежит: International Business Machines Corp

Aspects of the present disclosure relate to detecting and protecting a class of data in an API call including determining a plurality of field names and identifying a field name to search for in the data. The technique further includes generating, in response to the identifying the field name, an encryption key and an expiration, wherein the encryption key is configured to encrypt the data. The technique also comprises encrypting the data, sending the API call to an application server, wherein the application server is configured to process the API call. The technique also includes receiving, from the application server, a request for the encryption key and validating that the encryption key has not expired. The technique also includes, sending, in response to being valid, the encryption key to the application server, and storing, in a database, a set of usage data associated with the encryption key.

Подробнее
17-09-2020 дата публикации

DETECTION AND PROTECTION OF DATA IN API CALLS

Номер: US20200295923A1
Принадлежит:

Aspects of the present disclosure relate to detecting and protecting a class of data in an API call including determining a plurality of field names and identifying a field name to search for in the data. The technique further includes generating, in response to the identifying the field name, an encryption key and an expiration, wherein the encryption key is configured to encrypt the data. The technique also comprises encrypting the data, sending the API call to an application server, wherein the application server is configured to process the API call. The technique also includes receiving, from the application server, a request for the encryption key and validating that the encryption key has not expired. The technique also includes, sending, in response to being valid, the encryption key to the application server, and storing, in a database, a set of usage data associated with the encryption key.

Подробнее
12-11-2015 дата публикации

DELEGATING CONTROL OF A VEHICLE

Номер: US20150321641A1

An identification of a vehicle is received. An identification of a first user to receive delegation of control of the vehicle is received. Authentication information for the first user for the vehicle is determined. A request to authenticate the first user for delegation of control of the vehicle to the first user is received. The request to authenticate includes at least the authentication information for the first user is determined. Responsive to the determination, control of the vehicle is delegated to the first user. 1. A method for delegating control of a vehicle , the method comprising the steps of:receiving, by one or more computer processors, an identification of a vehicle;receiving, by one or more computer processors, an identification of a first user to receive delegation of control of the vehicle;determining, by one or more computer processors, an authentication information for the first user for the vehicle;receiving, by one or more computer processors, a request to authenticate the first user for delegation of control of the vehicle to the first user;determining, by one or more computer processors, the request to authenticate includes at least the authentication information for the first user; andresponsive to determining the request to authenticate includes at least the authentication information for the first user, delegating, by one or more computer processors, control of the vehicle to the first user.2. The method of claim 1 , further comprising:receiving, by one or more computer processors, an identification of an access type for the first user of the vehicle;providing, by one or more computer processors, a notification to the first user of the access type; andproviding, by one or more computer processors, a notification to the vehicle of the access type for the first user.3. The method of claim 2 , further comprising:monitoring, by one or more computer processors, information about the vehicle, wherein the information includes at least one of, a ...

Подробнее
09-11-2017 дата публикации

POLLING PARAMETER ADJUSTMENT

Номер: US20170324637A1
Принадлежит:

An approach, executed by a computer, for adjusting polling parameters. The approach includes one or more processors polling an endpoint application using an initial polling quantity and an initial polling frequency. The approach includes determining a first number of events not consumed in a queue of a listening application and a second number of events in a queue at the endpoint application at an end of a polling cycle. Furthermore, the approach includes adjusting at least one of the initial polling quantity and the initial polling frequency based, at least in part, on a comparison of the first number of events not consumed in the queue of the listening application and the second number of events in the queue at the endpoint application at the end of the polling cycle. 1. A method for adjusting polling parameters , comprising:polling, by one or more processors, an endpoint application using an initial polling quantity and an initial polling frequency;determining, by one or more processors, a first number of events not consumed in a queue of a listening application and a second number of events in a queue at the endpoint application at an end of a polling cycle; andadjusting, by one or more processors, at least one of the initial polling quantity and the initial polling frequency based, at least in part, on a comparison of the first number of events not consumed in the queue of the listening application and the second number of events in the queue at the endpoint application at the end of the polling cycle.2. The method of claim 1 , wherein adjusting at least one of the initial polling quantity and the initial polling further comprises:determining, by one or more processors, whether the first number of events not consumed in the queue of the listening application is greater than the second number of events in the queue at the endpoint application at the end of the polling cycle; andresponsive to determining that the first number of events not consumed in the queue ...

Подробнее
31-10-2019 дата публикации

Resource schedule optimization

Номер: US20190332442A1
Принадлежит: International Business Machines Corp

Embodiments of the present invention provide methods, computer program products, and systems for evaluating expressions. Embodiments of the present invention can be used to receive a set of program instructions to be evaluated in a virtualized environment and determine an evaluation strategy based, at least in part, on an availability of CPU resources. The CPU resource include resources impacted by use of virtual machines and hypervisors. Embodiments of the present invention can, responsive to determining that there are sufficient CPU resources available, evaluate the set of program instructions according to the evaluation strategy using the CPU resources.

Подробнее
22-10-2020 дата публикации

QUANTUM STATE VISUALIZATION DEVICE

Номер: US20200335011A1
Принадлежит:

A quantum state visualization device comprising at least a portion of a spherical shell and a support structure affixed to the spherical shell. A portion of the support structure can intersect a center of the spherical shell. The quantum state visualization device further comprising a indicator pivotally attached to the support structure at the portion of the support structure intersecting the center of the spherical shell. The indicator is representative of a quantum state based on its position relative to the spherical shell. 1. A quantum state visualization device comprising:at least a portion of a spherical shell;a support structure affixed to the spherical shell, a portion of the support structure intersecting a center of the spherical shell; andan indicator pivotally attached to the support structure at the portion of the support structure intersecting the center of the spherical shell, wherein the indicator is representative of a quantum state based on its position relative to the spherical shell.2. The quantum state visualization device of claim 1 , wherein the spherical shell comprises a plastic material selected from a group consisting of: a thermoplastic claim 1 , a thermoplastic elastomer claim 1 , and a thermoset plastic.3. The quantum state visualization device of claim 1 , wherein the portion of the spherical shell is selected from a group consisting of: a whole spherical shell claim 1 , a half spherical shell claim 1 , and a three-quarter spherical shell.4. The quantum state visualization device of claim 1 , wherein the support structure is attached to the spherical shell at one and only one point claim 1 , wherein an end of the support structure intersects the center of the spherical shell claim 1 , and wherein the indicator is pivotally attached to the end of the support structure.5. The quantum state visualization device of claim 1 , wherein the support structure is attached to the spherical shell at two antipodal points of the spherical shell.6. ...

Подробнее
28-12-2017 дата публикации

SYSTEM AND METHOD FOR DETECTING AND ALERTING UNEXPECTED BEHAVIOR OF SOFTWARE APPLICATIONS

Номер: US20170371768A1
Принадлежит:

A method finding the root cause of errors and/or unexpected behavior of a monitored software application, the method comprising: providing a decision tree corresponding to an error and/or unexpected behavior of a software application, wherein the decision tree comprising multiple nodes, wherein the decision tree further comprising one or more leaf nodes, wherein the leaf nodes indicates at least one reason and one or more possible solutions for the error and/or unexpected behavior; scanning one or more log-files of a software application; determining, based on the decision tree and the scanned log files which step has been not performed by the software application, wherein the non-performed step being indicative for an error and/or unexpected behavior of the software application; determining a leaf node based on the determined non-performed step; extracting information from the leaf node; and providing a reason and/or a solution of the error and/or unexpected behavior. 1. A computer-implemented method finding the root cause of errors and/or unexpected behavior of a monitored software application , the method comprising:providing a decision tree corresponding to an error and/or unexpected behavior of a software application, wherein the decision tree comprising multiple nodes and the nodes are coupled by branches, wherein the decision tree further comprising one or more leaf nodes, wherein the leaf nodes indicates at least one reason and one or more possible solutions for the error and/or unexpected behavior;scanning one or more log-files of a software application and running through the decision tree based on the steps included in the scanned log files;determining, based on the decision tree and the scanned log files which step has been not performed by the software application, wherein the non-performed step being indicative for an error and/or unexpected behavior of the software application;determining a leaf node based on the determined non-performed step; ...

Подробнее
28-11-2019 дата публикации

Navigation personalization through analysis of present and historical user data

Номер: US20190360836A1
Принадлежит: International Business Machines Corp

Embodiments of the present invention provide systems and methods for personalizing a navigation route. The method includes receiving a request from a user for a navigation route between two or more points. The method further includes accessing navigation data and services, creating a generic navigation route, accessing route history and related data for the user, creating a personalized navigation route for the user, and displaying the personalized navigation route.

Подробнее
19-12-2019 дата публикации

GENERATING CUSTOMIZATION DATA CONFIGURED TO CUSTOMIZE DEMONSTRATION OF A PRODUCT TO A TARGET AUDIENCE

Номер: US20190385195A1
Принадлежит:

Context data pertaining to a target audience to which a product is to be demonstrated can be determined. The target audience can be classified based on the context data. Classifying the target audience can include selecting an audience type out of a predefined plurality of audience types. Customization data can be generated based on the selected audience type. The customization data can be configured to customize demonstration of the product to the target audience. 1. A method , comprising:determining context data pertaining to a target audience to which a product is to be demonstrated;classifying, using a processor, the target audience based on the context data, the classifying the target audience comprising selecting an audience type out of a predefined plurality of audience types; andgenerating customization data based on the selected audience type, the customization data configured to customize demonstration of the product to the target audience.2. The method of claim 1 , wherein:the product is a computer program; andthe customization data comprise at least one piece of demonstration data to be processed by the computer program when demonstrating the computer program.3. The method of claim 1 , wherein:the product is a computer program; andthe customization data comprise configuration data for configuring the computer program.4. The method of claim 1 , wherein:the product is a computer program; andthe customization data comprise a specification of features or functions of the computer program to be activated when demonstrating the computer program.5. The method of claim 1 , wherein the determining the context data comprises analyzing content of web pages related to the target audience.6. The method of claim 1 , wherein the determining the context data comprises analyzing social media content related to the target audience.7. The method of claim 1 , wherein determining the context data comprises analyzing content of messages exchanged with the target audience.8. A ...

Подробнее
24-12-2020 дата публикации

Constructing physical keys by way of digital keys

Номер: US20200399928A1
Принадлежит: International Business Machines Corp

A digital key management system for physical keys is provided. A processor registers a physical lock. A processor generates a digital key based on a physical key structure to be used with the physical lock. A processor configures the physical lock to decode an inserted physical key. A processor verifies the inserted physical key, in response to a digital key for the decoded physical key matching the generated digital key.

Подробнее
14-04-2020 дата публикации

Digital certificate containing multimedia content

Номер: US10621319B2
Принадлежит: International Business Machines Corp

Utilizing multimedia content in a digital signature to facilitate authentication. A message requester public key is received from a message requester. A digital certificate is generated containing the message requester public key. Multimedia content identifying the message requester is retrieved. Multimedia content is inserted into the digital certificate. A message digest is generated from the digital certificate including the multimedia content. The message digest and included multimedia content is encrypted with a certificate authority private key to generate a digital signature. A certificate authority public key is retrieved. The digital certificate including the digital signature and certificate authority public key is transmitted to a message owner.

Подробнее
04-04-2023 дата публикации

Semantic correction of messages for groups

Номер: US11620437B2
Принадлежит: International Business Machines Corp

A method, text correction system, and computer program product, one embodiment of which may comprise receiving an original first message from a first participant of a group correspondence, receiving a second message from a second participant of the group correspondence, determining, by semantically analyzing the original first message and the second message, that the second message contains a desired modification of the original first message, and in response to the determining, automatically modifying the original first message with the desired modification to produce a modified first message. The second message may be received after the original first message. Optionally, some embodiments may further comprise presenting the modified first message to the first participant of the group correspondence for approval, and in response to an approval by the first participant of the group correspondence, presenting the modified first message to one or more other participants of the group correspondence.

Подробнее
28-06-2022 дата публикации

Dynamically configuring a web server timeout

Номер: US11375023B2
Принадлежит: International Business Machines Corp

A method, system and computer program product for dynamically adjusting a timeout parameter associated with a connection between a client device and a server. Information is associated with at least one of a characteristic of a content to be rendered by a server, a characteristic of traffic of a connection to the server, and a characteristic of a user of the server is received from the client device and transmitted to the server. Based on the transmitted information, an amount of time in a previously stored timeout parameter associated with a client device is adjusted automatically with a new timeout parameter to enable communication between the client device and the server. The new timeout parameter is stored in place of the previously stored timeout parameter. Responsive to the amount of time to wait for a response from the client device satisfying the new timeout parameter, the communication between the client device and the server is terminated.

Подробнее
07-02-2023 дата публикации

Quantum state visualization device

Номер: US11574560B2
Принадлежит: International Business Machines Corp

A quantum state visualization device comprising at least a portion of a spherical shell and a support structure affixed to the spherical shell. A portion of the support structure can intersect a center of the spherical shell. The quantum state visualization device further comprising a indicator pivotally attached to the support structure at the portion of the support structure intersecting the center of the spherical shell. The indicator is representative of a quantum state based on its position relative to the spherical shell.

Подробнее
30-03-2023 дата публикации

Digital twin based binaural audio echolocation

Номер: US20230099791A1
Принадлежит: International Business Machines Corp

A processor may receive an information dataset. The information dataset may include object information and environment information. A processor may generate a digital twin of a physical environment. The digital twin of the physical environment may be based, at least in part, on the information dataset. A processor may simulate one or more factors on the digital twin of the physical environment. A processor may determine, responsive to simulating the one or more factors, one or more pathways to a destination. The destination may be in the physical environment.

Подробнее
15-06-2023 дата публикации

Virtual reality object tag presentation

Номер: US20230186660A1
Принадлежит: International Business Machines Corp

The present specification describes a computer-implemented method. According to the method, user-specific tags are generated for a virtual reality (VR) object displayed within a VR environment. The user-specific tags are generated based on an interaction of a first user with the VR object. Role-based access rights are assigned to the user-specific tags. A role of a second user accessing the VR environment is determined and the user-specific tags are presented to the second user, alongside the VR object, based on a comparison of the role of the second user and the role-based access rights.

Подробнее
27-06-2023 дата публикации

Problem solving using selected datasets of internet-of-things system

Номер: US11687806B2
Принадлежит: International Business Machines Corp

A method, computer system, and a computer program product for problem solving using selected datasets from an internet-of-things system are provided. A trigger device in an internet-of-things system may be designated. The internet-of-things system may include the trigger device and internet-of-things devices. A trigger message may be received from the trigger device. A problem may be determined based on the trigger message. Data transmissions may be requested from the internet-of-things devices. Data may be received via the data transmission. The data transmission may be ended. A problem contributor may be identified by inputting the received data and the determined problem into a machine learning model. A problem response for responding to the problem may be generated. The generating may include inputting the problem contributor to the machine learning model. The problem response may be performed.

Подробнее
10-10-2023 дата публикации

Robotic Toxicodendron weeding

Номер: US11783207B2
Принадлежит: International Business Machines Corp

A system includes a memory having instructions therein and at least one processor in communication with the memory. The at least one processor is configured to execute the instructions to acquire phytomorphological field data via a sensor component of a mobile robot, generate, based on the phytomorphological field data and via a machine learning agent, a predicted likelihood of whether a hypothetical action by the mobile robot against a found plant would be directed against a true Toxicodendron plant, conduct a non-phytomorphological assessment of the found plant via the mobile robot and based on the predicted likelihood being below a first threshold and above a second threshold, and, via the mobile robot and based on the non-phytomorphological assessment, attack the found plant, mark a site of the found plant, and/or document a context of the site.

Подробнее
26-12-2023 дата публикации

Ranking action sets comprised of actions for an event to optimize action set selection

Номер: US11853910B2
Принадлежит: International Business Machines Corp

Provided are a computer program product, system, and method for ranking action sets comprised of actions for an event to optimize action set selection. Information is maintained on actions for a plurality of events. Each action indicates an action value of the action to the user and event weights of the action with respect to a plurality of the events. A determination is made of actions sets having at least one action to perform for the event. For each determined action set, a rank of the action set is calculated as a function of the action value for each action in the action set and an event weight of the action with respect to the event. At least one action set is presented to the user for consideration. In response to receiving user feedback, an adjusted rank is set for at least one of the presented action sets.

Подробнее
08-02-2024 дата публикации

Internet-of-things device security optimization

Номер: WO2024027622A1

A processor may identify that content is generated for a communication between IoT devices. The processor may identify a source device and a target device of the IoT devices. The processor may analyze the content. The processor may determine a sensitivity of the content. The processor may assign, based on the determining, a security level to either of the source device or the target device.

Подробнее
07-05-2024 дата публикации

Data virtualization in natural language

Номер: US11977540B2
Принадлежит: International Business Machines Corp

A method includes: creating, by a computing device, a virtual consolidation layer; replicating, by the computing device, snippets that are results of a query; copying, by the computing device, the replicated snippets to the virtual consolidation layer; performing, by the computing device and by a machine learning model, matching of particular ones of the snippets in the virtual consolidation layer; and producing, by the computing device, a search result comprising the matched snippets.

Подробнее
07-05-2024 дата публикации

Customizable authentication system

Номер: US11979393B2
Принадлежит: Green Market Square Ltd

An online authentication system allows a user to define their own logic for multistage authentication, which is provided to an online authentication center and stored as encrypted bytecode based on each user's password. Implementation logic can use third party information sources to provide additional authentication options.

Подробнее
14-12-2023 дата публикации

Leasing digital assets

Номер: US20230401593A1
Принадлежит: International Business Machines Corp

A price for use of a digital asset in a set of digital assets is determined. The set of digital assets stored in a digital asset repository. A time slot during which the digital asset is available for use is determined. The digital asset is leased out at the price and during the time slot, the leasing allowing use of the digital asset during the time slot in return for payment of the price. the leased digital asset is integrated with a set of base characteristics of a virtualized user. The integrated leased digital asset is presented in a virtual environment during the time slot.

Подробнее
05-12-2023 дата публикации

Usage restrictions for digital certificates

Номер: US11838427B2
Принадлежит: International Business Machines Corp

A method, a computer program product, and a system for usage restrictions on digital certificates. The method includes selecting a digital certificate relating to a user and determining a usage restriction policy for the digital certificate based on the user. The method also includes populating an extension field of the digital certificate with the usage restriction policy. The method further includes providing the digital certificate including the usage restriction policy to the user. The method also includes gathering parameters relating to the digital certificate, determining usage patterns based on the parameters, inputting the usage patterns into a machine learning model, outputting a risk assessment, and updating the usage restriction policy based on the risk assessment.

Подробнее
30-05-2024 дата публикации

Virtual-reality-based software development

Номер: US20240176596A1
Принадлежит: International Business Machines Corp

According to one embodiment, a method, computer system, and computer program product for collaborative software development in mixed reality is provided. The present invention may include rendering a three-dimensional integrated development environment (3D IDE) within a mixed-reality environment; responsive to confirming credentials of a plurality of developers, admitting the plurality of developers to the mixed-reality environment; monitoring interactions between the plurality of developers and the 3D IDE within the mixed-reality environment; and responsive to the interactions, updating and displaying changes to the 3D IDE within the mixed-reality environment.

Подробнее
01-02-2024 дата публикации

Internet-of-things device security optimization

Номер: US20240039962A1
Принадлежит: International Business Machines Corp

A processor may identify that content is generated for a communication between IoT devices. The processor may identify a source device and a target device of the IoT devices. The processor may analyze the content. The processor may determine a sensitivity of the content. The processor may assign, based on the determining, a security level to either of the source device or the target device.

Подробнее
16-05-2024 дата публикации

Hybrid working mode on industrial floor

Номер: US20240160197A1
Принадлежит: International Business Machines Corp

A method, computer system, and a computer program product for evaluating remote commands is provided. The present invention may include receiving data for a physical ecosystem. The present invention may include generating a digital twin of the physical ecosystem based on the data received. The present invention may include identifying one or more correlated activities using the digital twin. The present invention may include receiving a remote command. The present invention may include determining whether to execute the remote command by simulating the remote command using the digital twin and the one or more correlated activities.

Подробнее
20-05-2021 дата публикации

Smart data protection

Номер: US20210150038A1
Принадлежит: International Business Machines Corp

When a system receives sensitive data, it can request an encryption key from an encryption/decryption unit. A central processing unit (CPU) of the system can encrypt the sensitive data using the encryption key before writing the sensitive data to memory. Thus, the sensitive data is encrypted when written to memory.

Подробнее
22-04-2021 дата публикации

Ranking action sets comprised of actions for an event to optimize action set selection

Номер: US20210117821A1
Принадлежит: International Business Machines Corp

Provided are a computer program product, system, and method for ranking action sets comprised of actions for an event to optimize action set selection. Information is maintained on actions for a plurality of events. Each action indicates an action value of the action to the user and event weights of the action with respect to a plurality of the events. A determination is made of actions sets having at least one action to perform for the event. For each determined action set, a rank of the action set is calculated as a function of the action value for each action in the action set and an event weight of the action with respect to the event. At least one action set is presented to the user for consideration. In response to receiving user feedback, an adjusted rank is set for at least one of the presented action sets.

Подробнее
18-04-2024 дата публикации

Illusion-based increase of vehicle size

Номер: US20240129444A1
Принадлежит: International Business Machines Corp

A computer-implemented method, in accordance with one aspect of the present invention includes, during movement of a vehicle, monitoring for a predetermined condition corresponding to potential presence of an animal on a roadway. In response to detecting the predetermined condition, a representation of at least a portion of the moving vehicle is projected for virtually increasing a visual size of the vehicle. The projected representation (also referred to as a projection) has a dimension that is greater than the portion of the moving vehicle corresponding to the representation.

Подробнее
27-06-2024 дата публикации

Continuous 3d printing with conveyor belt

Номер: US20240208154A1
Принадлежит: International Business Machines Corp

A disclosed system and methods provide enhanced, continuous 3D printing to manufacture 3D objects utilizing stabilizers supporting a 3D object being printed in components along a conveyor belt, enabling enhanced, efficient and effective manufacturing of 3D objects. A selected 3D object is printed from a primary material on supporting stabilizers, and the stabilizers are printed from a secondary material. The system coordinates movement of the printer head along the printing plane and the conveyor belt, creating an elongated printing surface along the conveyor belt for continuous 3D printing. Upon completion, the 3D object with the supporting stabilizers exits the conveyor belt and the 3D object is removed from the stabilizers.

Подробнее
22-02-2024 дата публикации

Hyper-personalized feature morphing in metaverse

Номер: US20240062328A1
Принадлежит: International Business Machines Corp

Aspects of the invention include systems and methods configured for hyper-personalized feature morphing of an avatar within a metaverse. A non-limiting example computer-implemented method includes predicting a next interaction for the avatar and comparing one or more current features of the avatar to one or more feature requirements for the predicted next interaction. The method further includes determining, based on the comparison, that one or more current features of the avatar do not match one or more feature requirements for the predicted next interaction. Responsive to the determination, features of the avatar are altered to satisfy the one or more feature requirements for the predicted next interaction.

Подробнее
23-05-2024 дата публикации

Continuous 3d printing

Номер: US20240165877A1
Принадлежит: International Business Machines Corp

Aspects of the present disclosure include a method of 3D printing, a 3D printing system, and a vertical conveyor. One embodiment of the method of 3D printing comprises positioning a build plate at a top of a printing chamber in a folded-down position, and moving the folded-down build plate to a printing level. The method may further comprise, at the printing level, unfolding the build plate to provide a substantially horizontal surface for supporting an item to be printed, and 3D printing an object on the unfolded build plate.

Подробнее
16-05-2024 дата публикации

Collaborative enhancement of volumetric video with a device having multiple cameras

Номер: US20240161784A1
Принадлежит: International Business Machines Corp

Provided are techniques for collaborative enhancement of volumetric video with a device having multiple cameras. A volumetric video is displayed as a holographic projection. In response to identifying one or more user actions of a user at the device with the holographic projection of the volumetric video, the volumetric video is updated and an updated holographic projection that indicates the one or more user actions of the user is displayed. Additional content is received for the updated volumetric video from a plurality of other devices, where the additional content comprises one or more user actions of other users at the plurality of other devices. The additional content is aggregated to generate an aggregated volumetric video that indicates the one or more user actions of the user and the one or more user actions of the other users. A further updated holographic projection based on the aggregated volumetric video is displayed.

Подробнее
15-06-2023 дата публикации

Electric vehicle charging reservation timeslot reallocation

Номер: US20230182608A1
Принадлежит: Kyndryl Inc

Electric vehicle charging reservation timeslot reallocation includes determining, in connection with an electric vehicle (EV) traveling to a destination, arrival parameters of the EV to arrive at the destination and a charging requirement of the EV to reach the destination within the arrival parameters, identifying reserved charging reservation timeslot(s) at EV charging station(s) along a route to the destination that satisfy the arrival parameters and charging requirement of the EV, determining, using an AI model configured to determine reallocations of charging reservations at electric vehicle charging stations, a proposed reallocation of a reserved charging reservation timeslot of the reserved charging reservation timeslot(s), the reserved charging reservation timeslot owned by an entity, and the proposed reallocation comprising a proposal for the entity to give up at least a portion of the reserved charging reservation timeslot to charge the EV, and electronically offering the proposed reallocation to the entity.

Подробнее
22-06-2023 дата публикации

Physical representation of quantum entanglement

Номер: US20230196160A1
Принадлежит: International Business Machines Corp

Apparatuses, system, and computer-implemented methods to facilitate physical representation of quantum entanglement are provided. According to an embodiment, an apparatus can comprise two or more qubit representation devices that interact with one another in a defined manner, and a display component operatively coupled to at least one of the two or more qubit representation devices, wherein the display component outputs a visual indicator of quantum entanglement between the two or more qubit representation devices.

Подробнее
22-08-2024 дата публикации

Augmentation of volumetric video with non-visual information in a virtual reality environment

Номер: US20240282057A1
Принадлежит: International Business Machines Corp

A computational device of a virtual reality system receives a volumetric video that captures visual information of a physical environment. The computational device of the virtual reality system receives non-visual information of the physical environment. The volumetric video is integrated with the non-visual information to generate a volumetric video augmented with non-visual information in which navigation is performed in the virtual reality system.

Подробнее
13-07-2023 дата публикации

Authentication card degradation security

Номер: US20230222501A1
Принадлежит: International Business Machines Corp

A first access attempt to perform a secure transaction is received, from a first user. The secure transaction is related to an authentication card that has a physical exterior. An authentication card profile related to the authentication card of the first user is retrieved based on the first access attempt. The authentication card profile describes a set of one or more degradation characteristics, each degradation characteristic of the set of degradation characteristics describes a degradation of the physical exterior of the authentication card. A validation status of the authentication card is determined. The determination is based on the first access attempt and on the set of degradation characteristics. A security response related to the first access attempt is performed in response to the validation status.

Подробнее
05-09-2024 дата публикации

Cascading navigational parameter from parent to child volumetric video

Номер: US20240297978A1
Принадлежит: International Business Machines Corp

A volumetric video analysis method, system, and computer program product that includes analyzing a plurality of volumetric videos to create a hierarchical relationship between the plurality of volumetric videos and navigating between a first volumetric video and a second volumetric video of the plurality of volumetric videos based on the hierarchical relationship.

Подробнее
07-11-2024 дата публикации

Optimizing input/output operations per section of remote persistent storage

Номер: US20240370171A1
Принадлежит: International Business Machines Corp

A computer-implemented method for optimizing input/output (I/O) operations per second (IOPS) of remote storage. The computer-implemented method includes receiving requests for read operations and write operations from users of an application, dynamically creating batches into which the requests can be aggregated, aggregating the requests into the batches and asynchronously passing each completed batch to the remote storage.

Подробнее
23-07-2024 дата публикации

Context-based simulation of content

Номер: US12047412B2
Принадлежит: International Business Machines Corp

Embodiments of the present invention provide methods, computer program products, and systems. Embodiments of the present invention can in response to receiving content, dynamically determining validity of received content. Embodiments of the present invention can then, in response to an determining the validity of received content, altering the received content prior to transmitting the received content to a user.

Подробнее