596 patents
Page 7 of 30
Utility
Recommending and Performing Personalized Component Arrangements
29 Jun 23
From within a database, a first set of component arrangements corresponding to an input set of components are identified.
Mansura Habiba
Filed: 28 Dec 21
Utility
Controlling Autonomous Vehicle Functions
29 Jun 23
Controlling autonomous vehicle (AV) functions includes receiving occupant identification data from device(s) of an AV and identifying occupant(s) of the AV based on the received occupant identification data, determining a respective prioritization level for each occupant of the occupant(s), the prioritization level for each occupant dictating priority of the AV in performing commands provided to the AV by that occupant to control AV functions, receiving, from an occupant, input of a command for performance by the AV to control a function of the AV, determining whether to perform the command to control the function of the AV based on the prioritization level for the occupant, and performing processing based on the determining whether to perform the command.
Mauro MARZORATI, Cesar Augusto RODRIGUEZ BRAVO, Roxana MONGE NUNEZ, Raghuram SRINIVASAN
Filed: 23 Dec 21
Utility
Cognitive Selection of Composite Services
29 Jun 23
A method includes receiving training inputs related to technology use cases and associated services, training, by a cognitive integration engine a cognitive model from the received training inputs, receiving a demand for composite services from a customer including functional and/or non-functional requirements, determining, by the cognitive integration engine, a selection of composite services for the customer based on the cognitive model, and recommending the selection of composite services to the customer.
Shashidhar Sastry, Rahul Chenny
Filed: 28 Dec 21
Utility
Data backup optimization
27 Jun 23
At least one data file for backup can be received.
Ramesh Kumble, Pramod Belsare, Satish Lodam
Filed: 27 Sep 21
Utility
Dynamic traffic management system
27 Jun 23
Example techniques are described for determining a dynamic traffic-management plan based on factors such as predicted increases in traffic and known-structurally-deficient transportation infrastructure.
Benjamin Wisnewski, Thomas E. Reichart, Gregory Wisnewski, Daniel Grey Yates
Filed: 18 Apr 19
Utility
Facilitating password creation via a secure device
27 Jun 23
Techniques are described with respect to facilitating password creation via a secure device in a defined corporate environment.
Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Ramamohan Chennamsetty, Mauro Marzorati
Filed: 13 Mar 20
Utility
Datacenter relocation utilizing storage carriers and erasure coding
30 May 23
Computer implemented systems and methods for migrating datacenter data include providing a quantity of carriers having a data storage capacity, receiving, by the quantity of carriers, a quantity of data stored in a first data storage system having a first location and including erasure coded data blocks.
Clea A. Zolotow, Gavin C. O'Reilly, John V. Delaney, Anthony Hunt, Tedrick N. Northway
Filed: 24 Oct 18
Utility
Autonomous management of temporal updates and rollbacks
30 May 23
A processor may load one or more potential updates to a trusted source from an identified trusted source.
Rhonda L. Childress, Martin G. Keen, Jeremy R. Fox, Michael Bender
Filed: 18 May 21
Utility
Searching data repositories using pictograms and machine learning
30 May 23
A pictogram repository is created of pictograms including expressions that are mapped to at least a portion of source code that is stored in a separate source code repository.
Shashidhar Sastry, Rahul Chenny
Filed: 15 Jun 21
Utility
Online terms of use interpretation and summarization
30 May 23
In an approach to interpreting and summarizing online terms of use, a computer receives a terms of use agreement from a data source and a request for interpretation of the terms of use agreement from a user.
Sreeram Vasudevan, Lorinne Yoong, Monisha Oberoi
Filed: 17 Feb 21
Utility
Virtual three-dimensional holographic safety gate
30 May 23
A method includes: determining, by a computing device, an operating condition of a machine in an industrial environment; determining, by the computing device, a hazard based on the operating condition; determining, by the computing device, one or more safety precautions based on the hazard; generating, by the computing device, a virtual three-dimensional holographic safety gate around the machine based on the one or more safety precautions.
Mauro Marzorati, Jeremy R. Fox, James Edward Regan, Sarbajit K. Rakshit
Filed: 13 Dec 21
Utility
Secure resource access by amalgamated identities and distributed ledger
30 May 23
A server receives encrypted data from a protected-resource-requesting device that includes an encrypted combination of the device and user identification.
Suryanarayana Rao, Shiben Dutta, Clinton Vincen C, Vikas Lalwani
Filed: 22 Apr 20
Utility
Selecting user profiles on platforms based on optimal persona of a user in a given context
30 May 23
A system and method for selecting a user profile for use with a platform based on an optimal persona of the user includes inferring a context of a user based on data received from a plurality of data sources, determining a persona of the user according to the context of the user from a plurality of user personas, and selecting a user profile associated with a platform that corresponds to the persona, in response to detecting that the user is accessing the platform.
Gregory J. Boss, Charles Steven Lingafelt, John E. Moore, Jr., Andrew R. Jones
Filed: 11 Jul 19
Utility
Content modification based on element contextualization
30 May 23
Content of entertainment media that is being consumed by a user is analyzed.
Jorge Andres Moros Ortiz, Sree Harish Maathu, Suman Sedai, Turgay Tyler Kay
Filed: 2 Dec 20
Utility
Protecting Sensitive Data
25 May 23
An example operation may include one or more of capturing a current version of sensitive data by a data processor node, hashing, by the data processor node, the current version of the sensitive data, storing, by the data processor node, a hash of the current version of the sensitive data on a first blockchain, encrypting, by the data processor node, the current version of the sensitive data using a secret key, and storing the encrypted current version of the sensitive data on a second blockchain.
Vugranam C. Sreedhar, Sreekrishnan Venkateswaran, Charanjit Singh Jutla
Filed: 10 Jan 23
Utility
Proactive detection of invasive species
23 May 23
A system may include a memory and a processor in communication with the memory.
Alison Antonio Silva, Ariane Hernandes Amadeu, Douglas Cristiano Alves, Marcos Vinicius L. Paraiso
Filed: 29 Jun 21
Utility
Predictive batch job failure detection and remediation
23 May 23
Systems, methods, and computer programming products for predicting, preventing and remediating failures of batch jobs being executed and/or queued for processing at future scheduled time.
Amol Bhaskar Mahamuni, Sundaravelu Shanmugam, Joel Augustine George
Filed: 19 Jul 21
Utility
Cognitively rendered event timeline display
23 May 23
Embodiments of the present invention provide methods, computer program products, and systems.
Samit Baran Misra
Filed: 29 Oct 20
Utility
Object loss prevention using cognitive computing
23 May 23
Preventing the loss of physical objects using cognitive computing includes receiving, by a wearable device, information associated with a user of the wearable device.
Marco Aurelio Stelmar Netto, Roberto Guarda, Thamy Telles Do Nascimento, Marcio Rogerio Luccas, Christian Elias Tanajura Goulart
Filed: 30 Mar 20
Utility
System to prevent full ATM enclosure skimming attacks
23 May 23
A computer-implemented method includes: receiving by a skimming prevention system operatively coupled to a machine, a plurality of sound data from a plurality of corresponding sound sensors operatively coupled to the machine; identifying by the skimming prevention system, a type of user action input of the machine; retrieving by the skimming prevention system from a storage system operatively coupled to the machine, a baseline acoustic signature associated with the machine and corresponding to the type of user action input; comparing by the skimming prevention system, the received plurality of sound data to the baseline acoustic signature associated with the machine and corresponding to the type of user action input; and in response to a determination that the compared plurality of sound data and the baseline acoustic signature differ more than a predetermined threshold, triggering by the skimming prevention system, an execution/alert mode of the machine.
Cesar Augusto Rodriguez Bravo, Desilda Toska, David Alonso Campos Batista
Filed: 25 Feb 22