-
公开(公告)号:US20200211095A1
公开(公告)日:2020-07-02
申请号:US16812128
申请日:2020-03-06
Applicant: International Business Machines Corporation
Inventor: MICHAEL S. GORDON , JAMES R. KOZLOSKI , ASHISH KUNDU , PETER K. MALKIN , CLIFFORD A. PICKOVER
Abstract: A method, system, and/or computer program product controls a self-driving vehicle (SDV) based on a purchase transaction at a point of sale (POS) device. One or more processors detects a purchase transaction at a device for a product. In response to detecting the purchase transaction at the POS device, the processors(s) transmits instructions to the SDV to transport a passenger associated with the purchase transaction from a location of the POS device to a predetermined location.
-
公开(公告)号:US20200099698A1
公开(公告)日:2020-03-26
申请号:US16137630
申请日:2018-09-21
Applicant: International Business Machines Corporation
Inventor: ASHISH KUNDU , ABHISHEK MALVANKAR , SURESH N. CHARI
Abstract: A method contains malware within a network resource. A blockchain system establishes a smart contract, on the blockchain system, for a network resource in a computer environment. The smart contract is for an action to be performed on the network resource if a malware is detected on the network resource. In response to malware being detected in the network resource, the blockchain system determines whether a consensus is reached by a plurality of computers on the blockchain system to implement the action to contain the malware based on the smart contract. In response to the consensus being reached by the plurality of computers, the blockchain system transmits, to the network resource, directions to implement the action on the network resource as specified by the smart contract.
-
公开(公告)号:US20180224849A1
公开(公告)日:2018-08-09
申请号:US15425051
申请日:2017-02-06
Applicant: International Business Machines Corporation
Inventor: MICHAEL S. GORDON , ASHISH KUNDU , CLIFFORD A. PICKOVER
CPC classification number: G06K9/6201 , G06K9/00832 , G06K9/00845 , G06Q10/06 , G08B1/08 , G08B21/24 , G08B25/08
Abstract: A method manages a possession of a passenger of a self-driving vehicle (SDV). One or more processors identify a passenger type of the passenger and a possession type of the possession. One or more processors adjust a possession monitoring system in the SDV based on the passenger type and the possession type, such that adjusting the possession monitoring system modifies an SDV vigilance level V of the possession monitoring system in the SDV to create an adjusted possession monitoring system. One or more processors receive an evaluation of the possession from the adjusted possession monitoring system, and then determine a problem with the possession based on the evaluation of the possession from the adjusted possession monitoring system. One or more processors then adjust an operation of the SDV based on the determined problem with the possession of the passenger of the SDV.
-
公开(公告)号:US20180191733A1
公开(公告)日:2018-07-05
申请号:US15396914
申请日:2017-01-03
Applicant: International Business Machines Corporation
Inventor: ASHISH KUNDU , DIMITRIOS PENDARAKIS , DAVID R. SAFFORD
IPC: H04L29/06
Abstract: A processor-implemented method alters a computer resource based on its new geolocation. One or more processors receive a message that a computer resource has moved from a first geolocation to a new geolocation. The processor(s) receive an identifier of the new geolocation for the computer resource. In response to receiving the identifier of the new geolocation for the computer resource, the processor(s) request and receive encrypted data from the new geolocation. The processor(s) apply decryption information to the encrypted data from the new geolocation, where the decryption information is specifically for decrypting encrypted data from the new geolocation. In response to the decryption information failing to decrypt the encrypted data from the new geolocation, the processor(s) determine that the identifier of the new geolocation is false and apply a geolocation based resource policy to alter the computer resource at the new geolocation.
-
公开(公告)号:US20180189308A1
公开(公告)日:2018-07-05
申请号:US15396938
申请日:2017-01-03
Applicant: International Business Machines Corporation
Inventor: ASHISH KUNDU , DIMITRIOS PENDARAKIS , DAVID R. SAFFORD
IPC: G06F17/30
Abstract: A method, system, and/or computer program product modify a computer resource that has been moved to a new geolocation. One or more processors detect that a geolocation of a software resource has changed to a new geolocation. In response to detecting that the geolocation of the software resource has changed to the new geolocation, the processor(s) apply a geolocation based resource policy to alter the software resource.
-
公开(公告)号:US20170235308A1
公开(公告)日:2017-08-17
申请号:US15041313
申请日:2016-02-11
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: MICHAEL S. GORDON , JAMES R. KOZLOSKI , ASHISH KUNDU , PETER K. MALKIN , CLIFFORD A. PICKOVER
CPC classification number: G05D1/0088 , B64C39/024 , B64C2201/127 , B64C2201/141 , B64C2201/146 , G05D1/0016 , G05D1/0027 , G05D1/0094
Abstract: A method, system, and/or computer program product controls movement and adjusts operations of an aerial drone. A drone camera observes an aerial maneuver physical gesture by a user. The aerial drone then performs an aerial maneuver that correlates to the aerial maneuver physical gesture. The drone camera observes the user performing a physical action. One or more processors associate the physical action with a particular type of activity. A drone on-board computer adjusts an operation of an aerial drone based on the particular type of activity.
-
公开(公告)号:US20200036515A1
公开(公告)日:2020-01-30
申请号:US16048420
申请日:2018-07-30
Applicant: International Business Machines Corporation
Inventor: SURESH N. CHARI , ASHISH KUNDU , SRIDHAR MUPPIDI
Abstract: A processor-implemented method provides a calculated identity confidence score for an identity. The processor(s) in each of a plurality of decentralized identity providers calculate an identity confidence score of an entity. The processor(s) store the calculated identity confidence score in a blockchain. The processor(s) retrieve the calculated identity confidence score from the blockchain. The processor(s) provide the calculated identity confidence score to a requestor, which is a computer-based system that performs an action based on the provided calculated identity score.
-
28.
公开(公告)号:US20190342404A1
公开(公告)日:2019-11-07
申请号:US16514286
申请日:2019-07-17
Applicant: International Business Machines Corporation
Inventor: ASHISH KUNDU , DIMITRIOS PENDARAKIS
IPC: H04L29/08 , G06F16/9537 , G06F16/215 , G06F9/50 , H04W4/021 , H04W28/02
Abstract: A method alters a computer resource while in a particular geolocation. One or more processors detect that a geolocation of a computer resource has changed from an initial geolocation to a new geolocation, where the computer resource is a virtual machine (VM). In response to detecting that the geolocation of the VM has changed from the initial geolocation to the new geolocation, the processor(s) reduce a functionality of the VM by reducing a quantity of processors and storage space available to the VM at the new geolocation as compared to the initial geolocation.
-
公开(公告)号:US20190286814A1
公开(公告)日:2019-09-19
申请号:US16430931
申请日:2019-06-04
Applicant: International Business Machines Corporation
Inventor: ARUN K. IYENGAR , ASHISH KUNDU , GONG SU , QI ZHANG
IPC: G06F21/52
Abstract: A computer-implemented method protects stack memory by moving contents of stack memory to an accumulation general purpose register. One or more processors identify an authorized function and a malicious function in a computer program, in which the malicious function is able to execute a call that provides the malicious function with access to stack memory that is used by the authorized function. The processor(s) move data from the stack memory to a protected kernel register before the call is executed, and store results of execution of the authorized function in a first register that is accessible only to the authorized function. The processor(s) then clear the stack memory, and move the results of execution of the authorized function from the first register to an accumulation general purpose register that is also accessible only to the authorized function.
-
30.
公开(公告)号:US20190260726A1
公开(公告)日:2019-08-22
申请号:US16399276
申请日:2019-04-30
Applicant: International Business Machines Corporation
Inventor: ASHISH KUNDU , NALINI K. RATHA
Abstract: A method establishes a session between a network service and a user device used by the user having a particular sociometric identity. One or more processors identify an interaction between a user and one or more provider entities. The processor(s) identify profiles for the one or more provider entities, where each profild of the one or more provider entities describes a type of service provided by a respective provider entity of the one or more provider entities, and compute a sociometric identity of the user based on the profiles of the one or more provider entities with which the user has had an interaction. One or more processors transmit the sociometric identity to a network service in order to establish a session between the network service and a user device used by the user having the sociometric identity.
-
-
-
-
-
-
-
-
-