-
公开(公告)号:US11301820B2
公开(公告)日:2022-04-12
申请号:US16399192
申请日:2019-04-30
Applicant: International Business Machines Corporation
Inventor: Michael S. Gordon , James Robert Kozloski , Ashish Kundu , Peter Kenneth Malkin , Clifford A. Pickover
Abstract: A method, system, and non-transitory compute readable medium for a fraud detection including a calendar reading device configured to read calendar data of a calendar for a user, a purchase detection device configured to detect an attempted purchase using a credit-card of the user, and a risk detection device configured to detect fraud by calculating a risk based on the calendar data and data related to the attempted purchase.
-
公开(公告)号:US11178151B2
公开(公告)日:2021-11-16
申请号:US16226336
申请日:2018-12-19
Applicant: International Business Machines Corporation
Inventor: Kapil Kumar Singh , Suresh N. Chari , Ashish Kundu , Sridhar Muppidi , Dong Su
Abstract: An example operation may include one or more of receiving, by a blockchain node or peer of a blockchain network, attribute data for a user profile, creating blockchain transactions to store attribute hashes and metadata to a shared ledger, receiving a user profile query from an identity consumer, creating blockchain transactions to retrieve attribute hashes and metadata corresponding to the query, reconstructing the user profile from the metadata, responding to the query by providing attribute data to the identity consumer, and creating and storing hashes of the attribute data and metadata to the shared ledger.
-
公开(公告)号:US10979452B2
公开(公告)日:2021-04-13
申请号:US16137630
申请日:2018-09-21
Applicant: International Business Machines Corporation
Inventor: Ashish Kundu , Abhishek Malvankar , Suresh N. Chari
Abstract: A method contains malware within a network resource. A blockchain system establishes a smart contract, on the blockchain system, for a network resource in a computer environment. The smart contract is for an action to be performed on the network resource if a malware is detected on the network resource. In response to malware being detected in the network resource, the blockchain system determines whether a consensus is reached by a plurality of computers on the blockchain system to implement the action to contain the malware based on the smart contract. In response to the consensus being reached by the plurality of computers, the blockchain system transmits, to the network resource, directions to implement the action on the network resource as specified by the smart contract.
-
公开(公告)号:US10944560B2
公开(公告)日:2021-03-09
申请号:US16053189
申请日:2018-08-02
Applicant: International Business Machines Corporation
Inventor: Suresh N. Chari , Hasini Gunasinghe , Ashish Kundu , Kapil Kumar Singh , Dong Su
Abstract: A processor-implemented method facilitates identity exchange in a decentralized setting. A first system performs a pseudonymous handshake with a second system that has created an identity asset that identifies an entity. The second system has transmitted the identity asset to a third system, which is a set of peer computers that support a blockchain that securely maintains a ledger of the identity asset. The first system transmits a set of pseudonyms to the third system, where the set of pseudonyms comprises a first pseudonym that identifies the first system, a second pseudonym that identifies a user of the second system, and a third pseudonym that identifies the third system. The first system receives the identity asset from the third system, which securely ensures a validity of the identity asset as identified by the first pseudonym, the second pseudonym, and the third pseudonym.
-
5.
公开(公告)号:US10902121B2
公开(公告)日:2021-01-26
申请号:US15788473
申请日:2017-10-19
Applicant: International Business Machines Corporation
Inventor: Suresh Chari , Ashish Kundu , Ian Michael Molloy , Dimitrios Pendarakis
Abstract: Anomalous control and data flow paths in a program are determined by machine learning the program's normal control flow paths and data flow paths. A subset of those paths also may be determined to involve sensitive data and/or computation. Learning involves collecting events as the program executes, and associating those event with metadata related to the flows. This information is used to train the system about normal paths versus anomalous paths, and sensitive paths versus non-sensitive paths. Training leads to development of a baseline “provenance” graph, which is evaluated to determine “sensitive” control or data flows in the “normal” operation. This process is enhanced by analyzing log data collected during runtime execution of the program against a policy to assign confidence values to the control and data flows. Using these confidence values, anomalous edges and/or paths with respect to the policy are identified to generate a “program execution” provenance graph associated with the policy.
-
公开(公告)号:US10885080B2
公开(公告)日:2021-01-05
申请号:US15888164
申请日:2018-02-05
Applicant: International Business Machines Corporation
Inventor: Maryam Ashoori , Ashish Kundu , Amit A. Nanavati
IPC: G06F16/33 , G06F16/901 , G06F16/36
Abstract: Mechanisms are provided for implementing a conversation monitoring system. The conversation monitoring system monitors a conversation between at least two participants and extracting, by the conversation monitoring system, key terms present in communications between the at least two participants. The conversation monitoring system generates a provenance graph data structure based on the extraction of the key terms where the provenance graph data structure has speaker nodes representing the at least two participants, term nodes representing the key terms present in the communications, and edges connecting nodes in the provenance graph. The conversation monitoring system analyzes the provenance graph data structure to identify a relative ranking of the key terms within the conversation and generates an output representing content of the conversation based on the relative ranking of the key terms.
-
公开(公告)号:US10812254B2
公开(公告)日:2020-10-20
申请号:US16048420
申请日:2018-07-30
Applicant: International Business Machines Corporation
Inventor: Suresh N. Chari , Ashish Kundu , Sridhar Muppidi
Abstract: A processor-implemented method provides a calculated identity confidence score for an identity. The processor(s) in each of a plurality of decentralized identity providers calculate an identity confidence score of an entity. The processor(s) store the calculated identity confidence score in a blockchain. The processor(s) retrieve the calculated identity confidence score from the blockchain. The processor(s) provide the calculated identity confidence score to a requestor, which is a computer-based system that performs an action based on the provided calculated identity score.
-
公开(公告)号:US10792462B2
公开(公告)日:2020-10-06
申请号:US15613947
申请日:2017-06-05
Applicant: International Business Machines Corporation
Inventor: Michael S. Gordon , James R. Kozloski , Ashish Kundu , Clifford A. Pickover
Abstract: A context-sensitive soundscape is generated by receiving a first identifier for identifying a target cognitive state for a user, and a second identifier for identifying a user cohort for the user. A present context is determined for the user. A machine-learning procedure is performed to map the target cognitive state to a set of audio output characteristics based upon the identified user cohort and the determined present context. An audio output is generated to create the context-sensitive soundscape that includes the set of audio output characteristics.
-
公开(公告)号:US10740445B2
公开(公告)日:2020-08-11
申请号:US15652944
申请日:2017-07-18
Applicant: International Business Machines Corporation
Inventor: Anuradha Bhamidipaty , Ashish Kundu , Debasisha Padhi , Sreekrishnan Venkateswaran
Abstract: A system, method and program product for providing cognitive behavior security control (CBSC). A system is disclosed that includes: a repository having a plurality of challenges each including an interactive graphical task; a user interface for graphically presenting challenges to users; an enrollment system for assigning challenges to users and determining an authentic response for each user; an authentication system that collects an observed response from a user presented with an assigned challenge and determines a security control result based on a closeness of the observed response with the authentic response of the user.
-
公开(公告)号:US10607293B2
公开(公告)日:2020-03-31
申请号:US14927647
申请日:2015-10-30
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Michael S. Gordon , James R. Kozloski , Ashish Kundu , Peter K. Malkin , Clifford A. Pickover
Abstract: A method and/or computer program product automatically toggles insurance policy provisions for a self-driving vehicle (SDV) based on an operational mode of the SDV. One or more processor(s) receive an electronic signal indicating an operational mode of an SDV in real-time, where operational mode is either an autonomous mode or a manual mode. A first insurance policy provision provides coverage while the SDV is operating in the autonomous mode, and a second insurance policy provision provides coverage while the SDV is operating in the manual mode. The processor(s) monitor the SDV for a change in real-time to the operational mode of the SDV. In response to detecting a change in real-time to the operational mode of the SDV, the processor(s) dynamically toggle activation of the first and second insurance policy provisions consistent with the change in real-time to the operational mode of the SDV.
-
-
-
-
-
-
-
-
-