OPTIMAL TIMING OF DIGITAL CONTENT
    132.
    发明申请

    公开(公告)号:US20190158448A1

    公开(公告)日:2019-05-23

    申请号:US15819145

    申请日:2017-11-21

    Abstract: Systems and methods for selectively delaying delivery of high-impact digital communications are disclosed. In embodiments, a computer-implemented method comprises: receiving, by a computing device, notification of a digital communication from a sender to at least one recipient; determining an impact value of the digital communication by comparing data of the digital communication with user profile data of the at least one recipient; determining that the impact value meets a predetermined threshold value associated with the at least one recipient, indicating that communication handling procedures apply to selectively delay the delivery of the digital communication to the at least one recipient; determining whether special delivery procedures apply that override the communication handling procedures; and initiating delivery of the digital communication to the at least one recipient based on the determining whether special delivery procedures apply.

    Forecasting workload transaction response time

    公开(公告)号:US10296410B2

    公开(公告)日:2019-05-21

    申请号:US13893650

    申请日:2013-05-14

    Abstract: Reliability testing can include determining a transaction time for each of a plurality of transactions to a system under test during the reliability test, wherein the plurality of transactions are of a same type. Forecasts of transaction times can be calculated for the transaction type. The forecasts can be compared with a threshold time using a processor. A remedial action can be implemented responsive to at least one of the forecasts exceeding the threshold time.

    COGNITIVE COPY AND PASTE
    134.
    发明申请

    公开(公告)号:US20190129939A1

    公开(公告)日:2019-05-02

    申请号:US15800949

    申请日:2017-11-01

    Abstract: A system, method and computer program product for cognitive copy and paste. The method includes: receiving, at a hardware processor of a computer system, an input representing a selection of a content captured from a source application program, and receiving an input representing an identified target application program that will receive the selected content to be copied and rendered in the target application program. The selected content is analyzed to determine a context for the selected content; and a rendering of the selected content at a location within the destination application based on the determined context, the rendering achieving a best representation of the selected content on the destination application. The analyzing includes invoking a natural language processor to determine an intent, meaning, or an intended use of the selected content based on the determined context, and employs a support vector machine for determining a best format change when rendering.

    MULTI-STEP AUTHENTICATION USING OBJECTIVE AND SUBJECTIVE CREDENTIALS

    公开(公告)号:US20190124067A1

    公开(公告)日:2019-04-25

    申请号:US15792961

    申请日:2017-10-25

    Abstract: Multi-step user authentication combines steps of authenticating both objective and subjective credentials. A user selects objective credentials, such as a password, and enters subjective credentials, such as a subjective description of the user's emotional response to a subjective challenge, such as a musical recording or image. The system identifies other content likely to elicit a similar emotional response from the same user. When the user later attempts to log onto a secured system, the user must enter the objective credentials and then describe the user's emotional response to a second subjective challenge that is likely to elicit an emotional response similar to that invoked by the first subjective challenge. If the user enters the correct objective credentials and describes an emotional response consistent with the first subjective description, then the user is given access to the secured system.

    RESONANCE FREQUENCY DEVICE LOCKING
    136.
    发明申请

    公开(公告)号:US20190104414A1

    公开(公告)日:2019-04-04

    申请号:US16205958

    申请日:2018-11-30

    Abstract: Systems and methods for securing access to a mobile device are disclosed. A method includes: transmitting, by a computer device, a tone to a surface of an object; detecting, by the computer device, a frequency response from the object based on the transmitted tone; determining, by the computer device, that the detected frequency response from the surface of the object conforms to a stored frequency response; and unlocking, by the computer device, the computer device based on the determining.

    EXPECTED GROUP CHAT SEGMENT DURATION
    137.
    发明申请

    公开(公告)号:US20190103982A1

    公开(公告)日:2019-04-04

    申请号:US15720265

    申请日:2017-09-29

    Abstract: A method, computer system, and computer program product for calculating a group chat segment duration is provided. The embodiment may include capturing a plurality of group chat messages from a chat message repository. The embodiment may also include determining a probability distribution based on analyzing the captured group chat messages over a time vector. The embodiment may further include calculating a time parameter based on the determined probability distribution. The embodiment may also include calculating a content parameter based on one or more relevant chat topics. The embodiment may further include calculating an attendee parameter based on a plurality of attendees and one or more attendee associations. The embodiment may also include determining a chat duration prediction based on the calculated time parameter, the calculated content parameter, and the calculated attendee parameter.

    ASCERTAINING THE ENGAGEMENT ABILITY OF A USER IN AN ONLINE ENVIRONMENT

    公开(公告)号:US20190095844A1

    公开(公告)日:2019-03-28

    申请号:US15712139

    申请日:2017-09-22

    Abstract: The illustrative embodiments provide for a computer-implemented method of allocating, in real time, actions to individuals based on text monitored in chat channels executing on different computers in a computer network. A desired action mentioned in the chat session is detected. Action to vector modeling is then performed by assigning a corresponding coefficient for the action to ones of a plurality of different vectors for ones of a plurality of different users. A corresponding set of coefficients is combined for all users. A highest coefficient is selected, corresponding to a second user from among the ones of the plurality of different users. A message is sent to the second user requesting the second user to perform the action.

    Technology for confidentiality advising

    公开(公告)号:US10242207B2

    公开(公告)日:2019-03-26

    申请号:US15268551

    申请日:2016-09-17

    Abstract: For preventing unwanted information disclosure in a current electronic communication from a sender to a receiver of the current electronic communication, a risk score is assigned for the current electronic communication by a computer system applying an access control model based on historical electronic communications. The model generates the risk score responsive to identities of the sender and receiver and responsive to access control level and hierarchal position of at least one of the sender and receiver. The computer system blocks transmission of the current electronic communication from the sender to the receiver responsive to whether the risk score for the sender and receiver exceeds a predetermined threshold.

    ROOT CAUSE ANALYSIS
    140.
    发明申请
    ROOT CAUSE ANALYSIS 审中-公开

    公开(公告)号:US20190087255A1

    公开(公告)日:2019-03-21

    申请号:US16183911

    申请日:2018-11-08

    Abstract: A method and system for performing a root cause analysis. A CPU identifies events of interest as a function of a user's observable behavior, which includes the user's eye gaze, while viewing event data. The CPU calculates an interest score for each of the identified events of interest, wherein the interest score is a probability of each of the identified events of interest being a root cause of a defect. The CPU tags each of the events of interest with a tag as a function of each calculated interest score. The identifying of the one or more events of interest includes: correlating a focal point of the user's eye gaze to a viewing position of a display device displaying the file; and identifying, as a function of the viewing position, the event data being viewed and an amount of time that the event data is viewed by the user.

Patent Agency Ranking