241 patents
Page 4 of 13
Utility
Protecting Sensitive Data
25 May 23
An example operation may include one or more of capturing a current version of sensitive data by a data processor node, hashing, by the data processor node, the current version of the sensitive data, storing, by the data processor node, a hash of the current version of the sensitive data on a first blockchain, encrypting, by the data processor node, the current version of the sensitive data using a secret key, and storing the encrypted current version of the sensitive data on a second blockchain.
Vugranam C. Sreedhar, Sreekrishnan Venkateswaran, Charanjit Singh Jutla
Filed: 10 Jan 23
Utility
Input/output Interface Security
4 May 23
Methods, computer program products, and systems are presented.
Cesar Augusto RODRIGUEZ BRAVO
Filed: 29 Oct 21
Utility
Intelligent Locking of Display Devices for Remote Use
4 May 23
A method, computer program product, and system include a processor(s) that continuously obtains data from the one or more sensor devices, generating, from the data, frames comprising images, identifies, utilizing the frames, entities within a pre-defined vicinity of a visual display unit at a first time, determines, based on applying the classification model, if each identified entity of the identified entities within the pre-defined vicinity at the first time is objectionable.
Saravanan Devendran, Thangadurai Muthusamy
Filed: 29 Oct 21
Utility
Automated Workload Monitoring by Statistical Analysis of Logs
4 May 23
Methods, computer program products, and systems are presented.
Hsiulan CHEN
Filed: 31 Oct 21
Utility
Carbon Footprint-based Control of Cloud Resource Consumption
4 May 23
An approach is provided for determining a carbon footprint-based consumption of cloud resources.
Kim Poh Wong, Firas Bouz, Seema Nagar, Pramod Vadayadiyil Raveendran
Filed: 29 Oct 21
Utility
Social Network Adapted Response
4 May 23
Methods, computer program products, and systems are presented.
Pritesh PATEL, Shikhar KWATRA, Zachary A. SILVERSTEIN, Jennifer L. SZKATULSKI
Filed: 29 Oct 21
Utility
Gesture-based Control of Plural Devices In an Environment
27 Apr 23
A computer-implemented method includes: predicting, by a computing device, devices for inclusion in an interface; generating, by the computing device, the interface including areas corresponding to the devices; detecting, by the computing device, a user selection of one of the areas of the interface; detecting, by the computing device, a hand gesture associated with the selected one of the areas; and transmitting, by the computing device, data defining the hand gesture to a respective one of the devices corresponding to the selected one of the areas, thereby causing the respective one of the devices to execute a command based on the hand gesture.
Mauro MARZORATI, Todd Russell WHITMAN, Jeremy R. FOX, Sarbajit K. RAKSHIT
Filed: 25 Oct 21
Utility
Deep Packet Analysis
20 Apr 23
A computer-implemented method for protecting a processing environment from malicious incoming network traffic may be provided.
Arjun Udupi Raghavendra, Tim Uwe Scheideler, Matthias Seul
Filed: 20 Dec 22
Utility
Storage Allocation Based on Application Priority Specific to a Select Entity
20 Apr 23
An application priority level of an application to be executed within a computing environment is determined.
Renato Lopes Ramos, Paulo Tomiyoshi Takeda, Nathan Rodrigues Levy, Sergio Varga
Filed: 19 Oct 21
Utility
System to Facilitate Wireless Charging of Electronic Device(s)
13 Apr 23
Control system for facilitating wireless charging of an electronic device is provided, which identifies presence of multiple electronic devices within an environment, with the multiple electronic devices including a self-propelled power relay device with wireless charging capability.
Cesar Augusto RODRIGUEZ BRAVO, David Alonso CAMPOS BATISTA, Sarbajit K. RAKSHIT
Filed: 13 Oct 21
Utility
Three-dimensional Printing Employing Movable Blocks of a Printer Base
13 Apr 23
Three-dimensional printing of objects is facilitated.
Sarbajit K. Rakshit, Daniela Trevisan, Edson Gomes Pereira, Sergio Varga
Filed: 13 Oct 21
Utility
Automated System Alert Based on Logs Sentiment Analysis
6 Apr 23
Methods, computer program products, and systems are presented.
Dinesh Babu Yeddu, Sundaravelu Shanmugam, Raju Karuppiah
Filed: 1 Oct 21
Utility
Artificial Intelligence Module Communication
6 Apr 23
A system, method, and computer program product for implementing artificial intelligence module communication is provided.
James David Cleaver, Dallas McGuire Hindle, Michael James McGuire, Pramod Vadayadiyil Raveendran, Seema Nagar
Filed: 4 Oct 21
Utility
Multi-tenant Aware Dynamic Host Configuration Protocol (DHCP) Mechanism for Cloud Networking
6 Apr 23
An approach includes providing support multi-tenancy support on a DHCP protocol.
Liang RONG, Gang TANG, Zi J. TAO, Ming S. XIAN
Filed: 2 Dec 22
Utility
Data Security Across Data Residency Restriction Boundaries
30 Mar 23
Data security across data residency restriction boundaries is provided by obtaining and profiling a dataset on which a desired analysis is to be performed, with some results of the desired analysis to be transferred from one location to another, the dataset subject to data residency restrictions that restrict transfer of the dataset across a boundary to the another location, and the profiling identifying a profile level for the dataset, then automatically generating a container image based on the profile level and the data residency restrictions that restrict the transfer of the dataset across the boundary, the container image configured for instantiation and execution to process the dataset into a reformatted dataset not restricted by the data residency restrictions for transfer across the boundary, and storing the container image to a container registry.
Mary E. RUDDEN, Karen CHENG, Thanh LAM, Daniel S. RILEY, Craig M. TRIM
Filed: 1 Dec 22
Utility
Managing Bandwith In Fibre Channel Over Internet Protocol Communication Channels
30 Mar 23
Methods and systems include managing bandwidth in Fibre Channel over Internet Protocol (FCIP) communication channels.
Clea Zolotow, Stephen Robert Guendert, Gavin Charles O'Reilly
Filed: 24 Sep 21
Utility
Controlling Electronic Device Data Connection Credentials
30 Mar 23
A method, computer program product, and computer system for controlling connection credentials for uninterrupted connection between a target data source and a data ingestor.
James Clive Hunter, Prabhu Baskar Jagadesan
Filed: 29 Sep 21
Utility
Data Backup Optimization
30 Mar 23
At least one data file for backup can be received.
Ramesh Kumble, Pramod Belsare, Satish Lodam
Filed: 27 Sep 21
Utility
Analyzing Products and Determining Alternatives Using Artificial Intelligence
30 Mar 23
A product analyzing system and method may include receiving a scan of a product, retrieving a plurality of individual data of one or more individuals, determining how the product will affect the plurality of individual data of the one or more individuals and whether the product complies with the individual data of the one or more individuals, generating an alert corresponding to the product based on the determining, and sending the alert to a user device before purchase of the product.
Todd Russell Whitman, John P. Perrino, Robert Eugene Coon, Robert Ryan Gavin, Gary L. Osburn
Filed: 30 Sep 21
Utility
Machine Learning (ML) Modeling by Dna Computing
23 Mar 23
Methods, computer program products, and systems are presented.
Gary F. DIAMANTI, Aaron K. BAUGHMAN, Mauro MARZORATI
Filed: 31 Oct 22