-
公开(公告)号:US20180218125A1
公开(公告)日:2018-08-02
申请号:US15422801
申请日:2017-02-02
Applicant: International Business Machines Corporation
Inventor: William K. Bodin , Indiver N. Dwivedi , David Jaramillo
Abstract: Embodiments are directed to a computer implemented method that includes receiving, by a recipient device, an instruction to move the recipient device from a current position to a target position. The instruction is received from a director device. The method also includes generating a haptic response based on the received instruction. The haptic response is generated based upon the relative positioning between the current position and the target position.
-
公开(公告)号:US20160371283A1
公开(公告)日:2016-12-22
申请号:US15250708
申请日:2016-08-29
Applicant: International Business Machines Corporation
Inventor: Ananth Chakravarthy , Indiver N. Dwivedi
CPC classification number: G06F16/355 , G06F16/2365 , G06F16/951 , G06F17/218 , G06F17/2705 , G06F17/2735 , G06F17/2795
Abstract: The integrity of an existing tag set associated with a web module is protected by reviewing user-generated proposed additions to the tag set to determine whether the proposed addition is appropriate. An initial test is made to determine whether a proposed addition is trivial; e.g., includes strings of the same character. If the proposed addition is not found to be trivial, it is assessed to determine its relatedness to the existing tag set. The proposed addition is made a part of the tag set only if it is found to be sufficiently related to the existing tag set.
Abstract translation: 与web模块相关联的现有标签集的完整性通过检查用户生成的对标签集的建议添加来确定是否适合所提出的添加来保护。 进行初步测试以确定拟议的加法是否微不足道; 例如包括相同字符的字符串。 如果没有发现提出的添加是微不足道的,则评估其确定与现有标签集的相关性。 只有当发现与现有标签集有足够的关联时,才将该提出的添加部分作为标签集的一部分。
-
公开(公告)号:US10678332B2
公开(公告)日:2020-06-09
申请号:US15422801
申请日:2017-02-02
Applicant: International Business Machines Corporation
Inventor: William K. Bodin , Indiver N. Dwivedi , David Jaramillo
Abstract: Embodiments are directed to a computer implemented method that includes receiving, by a recipient device, an instruction to move the recipient device from a current position to a target position. The instruction is received from a director device. The method also includes generating a haptic response based on the received instruction. The haptic response is generated based upon the relative positioning between the current position and the target position.
-
公开(公告)号:US10540382B2
公开(公告)日:2020-01-21
申请号:US15250708
申请日:2016-08-29
Applicant: International Business Machines Corporation
Inventor: Ananth Chakravarthy , Indiver N. Dwivedi
Abstract: The integrity of an existing tag set associated with a web module is protected by reviewing user-generated proposed additions to the tag set to determine whether the proposed addition is appropriate. An initial test is made to determine whether a proposed addition is trivial; e.g., includes strings of the same character. If the proposed addition is not found to be trivial, it is assessed to determine its relatedness to the existing tag set. The proposed addition is made a part of the tag set only if it is found to be sufficiently related to the existing tag set.
-
公开(公告)号:US10552616B2
公开(公告)日:2020-02-04
申请号:US15440643
申请日:2017-02-23
Applicant: International Business Machines Corporation
Inventor: William K. Bodin , Indiver N. Dwivedi , David Jaramillo
Abstract: A method includes retrieving application files of an enterprise application store. Each application file corresponds to an application provided by the enterprise application store. The method also includes scanning each retrieved application file. The scanning includes identifying vulnerable application program interfaces that are used by each retrieved application file. The method also includes assigning a vulnerability index to each application, based on the scanning of each application's corresponding application file.
-
公开(公告)号:US20180239903A1
公开(公告)日:2018-08-23
申请号:US15440643
申请日:2017-02-23
Applicant: International Business Machines Corporation
Inventor: William K. Bodin , Indiver N. Dwivedi , David Jaramillo
CPC classification number: G06F21/577
Abstract: A method includes retrieving application files of an enterprise application store. Each application file corresponds to an application provided by the enterprise application store. The method also includes scanning each retrieved application file. The scanning includes identifying vulnerable application program interfaces that are used by each retrieved application file. The method also includes assigning a vulnerability index to each application, based on the scanning of each application's corresponding application file.
-
-
-
-
-