-
公开(公告)号:US11496503B2
公开(公告)日:2022-11-08
申请号:US16415000
申请日:2019-05-17
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Cheranellore Vasudevan , Swaminathan Balasubramanian , Sibasis Das , Priyansh Jaiswal , Peeyush Jaiswal
Abstract: A method for event data fencing includes initializing a media monitoring algorithm, wherein the media monitoring algorithm scans for one or more words relating to a data breach in publicly available reports. Responsive to identifying a report from the publicly available reports relating to a vulnerability associated with the data breach, the method determines whether the vulnerability is associated with event data utilized for an authentication process. Responsive to determining the vulnerability is associated with a portion of the event data utilized for the authentication process, the method fences the portion of event data associated with the vulnerability, wherein fencing prevents the portion of event data from being utilized in the authentication process.
-
公开(公告)号:US20220141229A1
公开(公告)日:2022-05-05
申请号:US17087977
申请日:2020-11-03
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Swaminathan Balasubramanian , Peeyush Jaiswal , CHERANELLORE VASUDEVAN , Priyansh Jaiswal , SIBASIS DAS
IPC: H04L29/06
Abstract: A method for a story fill authentication process includes, responsive to receiving a first authentication request to authenticate a user, displaying a first generated story with one or more obfuscated portions, where the first generated story is based on event data associated with a first previously captured event and additional data utilized to enrich the event data for the first previously captured event. The method also includes, responsive to determining text provided for the one or more obfuscated portions of the first generated story at least meets a comparison threshold level to a first complete generated story based on a semantic comparison, granting the user access to a resource associated with the first authentication request.
-
公开(公告)号:US11228578B2
公开(公告)日:2022-01-18
申请号:US16414987
申请日:2019-05-17
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Cheranellore Vasudevan , Swaminathan Balasubramanian , Sibasis Das , Priyansh Jaiswal , Peeyush Jaiswal
Abstract: A method for a two-factor authentication process includes, responsive to determining a first user authentication was prompted in a first application on a first device associated with a user, identifying a second application on a second device based on a user profile associated with the user. The method identifies a first event from a plurality of events that previously occurred in the second application in a select time frame, wherein the first event relates to a first action performed by the user in the second application. The method generates an authentication question based on the first event, wherein the authentication question is a second user authentication. Responsive to determining an answer provided by the user to the authentication question is correct, the method grants access to the first user authentication prompt.
-
34.
公开(公告)号:US20220006812A1
公开(公告)日:2022-01-06
申请号:US16918176
申请日:2020-07-01
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Cesar Augusto Rodriguez Bravo , David Jaramillo , Peeyush Jaiswal , Priyansh Jaiswal
Abstract: According to one embodiment, a method, computer system, and computer program product for managing access to one or more protected web resources based on the location of an approver is provided. The present invention may include granting the requestor access to the protected web resource based on one or more access requirements being met, wherein at least one access requirement comprises a location of one or more authorization devices corresponding with one or more approvers being within a threshold distance of a computing device of a requestor requesting a protected web resource.
-
公开(公告)号:US20210233525A1
公开(公告)日:2021-07-29
申请号:US16751219
申请日:2020-01-24
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Priyansh Jaiswal , Peeyush Jaiswal
Abstract: A method for managing electronic communication notifications includes responsive to receiving a communication from a first user, identifying one or more keywords in the communication based on a plurality of keywords associated with a plurality of queries previously presented by a second user. Determining whether the communication includes a reply to a first open query, wherein the first open query represents a question previously presented by the second user directed to the first user. Responsive to determining the communication from the first user includes the reply to the first open query, notifying the second user utilizing a first alert type for the communication from the first user that includes the reply for the first open query, wherein the first alert type is different from a second alert type for notifying the second user regarding a communication that does not include the reply for the first open query.
-
公开(公告)号:US20200076777A1
公开(公告)日:2020-03-05
申请号:US16116583
申请日:2018-08-29
Applicant: International Business Machines Corporation
Inventor: Slobodan Sipcic , Peeyush Jaiswal , Priyansh Jaiswal , Austin Michael Delamar , Naeem Ahmed , Rahul Ragunathan
Abstract: A producer system may insert an encrypted value in a field in a message, where the message is associated with a schema that specifies a public key used to encrypt the encrypted value of the field and further specifies a type of an unencrypted form of the encrypted value, insert one or more unencrypted values in one or more fields in the message, and send the message to an external computing system. A consumer system may receive the message, determine, based at least in part on the public key specified by the schema, a private key associated with the public key, and decrypt, using the private key, the encrypted value of the field into the unencrypted form of the encrypted value.
-
公开(公告)号:US20200073735A1
公开(公告)日:2020-03-05
申请号:US16116614
申请日:2018-08-29
Applicant: International Business Machines Corporation
Inventor: Slobodan Sipcic , Peeyush Jaiswal , Priyansh Jaiswal , Naeem Ahmed , Rahul Ragunathan , Austin Michael Delamar
IPC: G06F9/54
Abstract: A computing system may receive a message that includes message data and a schema. The message data may include values associated with fields. The message may include a plurality of rules. Each of the plurality of rules may specify a respective one or more fields from a plurality of fields associated with the message and a respective action from a plurality of actions to perform on the values associated with the respective one or more fields. One or more of the plurality of rules may specify one or more output values that are associated with one or more output values resulting from performing one or more actions from the plurality of actions. In response to receiving the message, the computing system may perform the plurality of rules to generate the one or more output values associated with the one or more output fields.
-
公开(公告)号:US20180101577A1
公开(公告)日:2018-04-12
申请号:US15291104
申请日:2016-10-12
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Peeyush Jaiswal , Priyansh Jaiswal , David Jaramillo , Paul Llamas Virgen , Annita Tomko
CPC classification number: G06F9/451
Abstract: A method for modifying an application behavior based on a plurality of user specific data is provided. The method may include receiving a plurality of user specific data. The method may also include storing the received plurality of user specific data in a database. The method may further include determining a user mood based on the stored plurality of user specific data. The method may also include transmitting an action to an application corresponding to the determined user mood.
-
公开(公告)号:US12113924B2
公开(公告)日:2024-10-08
申请号:US17409896
申请日:2021-08-24
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Peeyush Jaiswal , Priyansh Jaiswal
CPC classification number: H04M1/573 , H04M1/575 , H04M3/42042 , H04M3/436 , G10L25/63 , H04M2203/551
Abstract: A method, computer system, and a computer program product for enhanced caller identification (ID) is provided. The present invention may include, receiving, by a receiving party device, a call from a calling party device. The present invention may also include, retrieving, by the receiving party device, a previous interaction information corresponding to a previous interaction between a receiving party associated with the receiving party device and a calling party associated with the calling party device. The present invention may further include, in response to the received call from the calling party device, displaying, on the receiving party device, the retrieved previous interaction information corresponding to the previous interaction between the receiving party and the calling party.
-
公开(公告)号:US20240305678A1
公开(公告)日:2024-09-12
申请号:US18179702
申请日:2023-03-07
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Paul Llamas Virgen , Peeyush Jaiswal , Priyansh Jaiswal
IPC: H04L65/401 , H04L65/403
CPC classification number: H04L65/4015 , H04L65/403
Abstract: A method, a structure, and a computer system for a conference operator. The exemplary embodiments may include extracting features from a conference of participants and determining whether a statement made by a first participant is directed to a second participant based on the features. The exemplary embodiments may further include, based on determining that the statement made by the first participant is directed to the second participant, determining whether the statement made by the first participant is part of a subconference and, based on determining that the statement made by the first participant is part of the subconference, emphasizing media corresponding to the subconference while deemphasizing media corresponding to the conference.
-
-
-
-
-
-
-
-
-