-
公开(公告)号:US10178004B2
公开(公告)日:2019-01-08
申请号:US15823803
申请日:2017-11-28
Applicant: International Business Machines Corporation
Inventor: Arup Acharya , Ashish Kundu
IPC: H04L29/06 , H04L12/26 , H04L29/08 , H04L12/721 , H04L12/725
Abstract: A computer-implemented method of obfuscating communication traffic patterns may include detecting, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol. At the first device, a first traffic pattern is accessed based on the data communication sessions over a first predefined time period. At the first communications device, a second traffic pattern is accessed based on the data communication sessions over a second predefined time period that occurs after the first predefined time period. At the first communications device, based on a randomization process, a dummy data communication pattern is generated for transmission to the second communication devices, whereby the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions.
-
公开(公告)号:US10057146B2
公开(公告)日:2018-08-21
申请号:US15484162
申请日:2017-04-11
Applicant: International Business Machines Corporation
Inventor: Arup Acharya , Ashish Kundu
CPC classification number: H04L43/08 , H04L43/00 , H04L45/306 , H04L45/70 , H04L63/0421 , H04L63/10 , H04L63/1408 , H04L63/1475 , H04L65/1006 , H04L65/1069 , H04L67/10 , H04L67/14 , H04L67/148
Abstract: A computer-implemented method of obfuscating communication traffic patterns may include detecting, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol. At the first device, a first traffic pattern is accessed based on the data communication sessions over a first predefined time period. At the first communications device, a second traffic pattern is accessed based on the data communication sessions over a second predefined time period that occurs after the first predefined time period. At the first communications device, based on a randomization process, a dummy data communication pattern is generated for transmission to the second communication devices, whereby the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions.
-
公开(公告)号:US20180215311A1
公开(公告)日:2018-08-02
申请号:US15830138
申请日:2017-12-04
Applicant: International Business Machines Corporation
Inventor: Kevin Wayne Brew , Michael S. Gordon , James Robert Kozloski , Ashish Kundu , Clifford A. Pickover
IPC: B60Q5/00
Abstract: A horn honking control method, system, and computer program product, include an advanced vehicle horn honking control according to a context of the vehicle where a differential horn honking action is performed based on the context.
-
64.
公开(公告)号:US20180208203A1
公开(公告)日:2018-07-26
申请号:US15416884
申请日:2017-01-26
Applicant: International Business Machines Corporation
Inventor: Michael S. Gordon , Stacy Fay Hobson , Ashish Kundu
IPC: B60W40/08 , B60W10/18 , B60W30/095
CPC classification number: B60W40/08 , B60W10/04 , B60W10/18 , B60W30/09 , B60W30/0956 , B60W50/14 , B60W2040/0818 , B60W2050/0025 , B60W2050/0089 , B60W2050/146 , B60W2540/22 , B60W2550/14 , B60W2550/22 , B60W2550/30 , B60W2550/40 , B60W2710/06 , B60W2710/18
Abstract: A vehicle control method, system, and computer program product, includes determining a cognitive state of a driver of a vehicle, detecting an upcoming traffic signal at an intersection and a status of the upcoming traffic signal, identifying intersection data relating to the intersection with the upcoming traffic signal, and performing a vehicle control action on the vehicle at the intersection based on the cognitive state of the driver, the status of the upcoming traffic signal, and the intersection data.
-
公开(公告)号:US20180200891A1
公开(公告)日:2018-07-19
申请号:US15409232
申请日:2017-01-18
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: THOMAS D. ERICKSON , Ashish Kundu , Clifford A. Pickover , Maja Vukovic
CPC classification number: B25J9/1697 , G05B2219/40117 , G05D1/0214 , G05D1/0297 , G05D2201/0216 , Y10S901/01
Abstract: A computer-implemented method includes monitoring a current location of a mobile robot in a physical space, which includes a first area separated from a second area by a selectively permeable virtual membrane, and a software requirement corresponding to the mobile robot with regard to the second area. The method further includes identifying a software state of the mobile robot that matches the software requirement, determining whether the software state of the mobile robot meets the software requirement, and allowing the mobile robot to move from the first area to the second area through the selectively permeable virtual membrane in response to determining whether the software state of the mobile robot meets the software requirement.
-
66.
公开(公告)号:US20180196958A1
公开(公告)日:2018-07-12
申请号:US15912637
申请日:2018-03-06
Applicant: International Business Machines Corporation
Inventor: Suresh N. Chari , Ted A. Habeck , Ashish Kundu , Ian M. Molloy
CPC classification number: G06F21/6218 , G06F8/427 , G06F8/433 , G06F21/577
Abstract: Automatically generating audit logs is provided. Audit log statement insertion points are identified in software components of an application based on a static code analysis identifying start and end operations on sensitive data in the software components of the application. The application is instrumented with audit log statements at the audit log statement insertion points in the software components of the application. Audit logs of monitored sensitive data activity events in the application are generated using the audit log statements at the audit log statement insertion points in the software components of the application. A dynamic code analysis is performed on the application during execution of the application to prevent executing source code of the application from recording in the audit logs the sensitive data processed by the application.
-
公开(公告)号:US09940761B2
公开(公告)日:2018-04-10
申请号:US15226217
申请日:2016-08-02
Applicant: International Business Machines Corporation
Inventor: Ashish Kundu , Amit A. Nanavati , Clifford A. Pickover , Komminist S. Weldemariam
CPC classification number: G07C5/008 , B64C39/024 , B64C2201/126 , B64C2201/146 , G05D1/0055 , G05D2201/0213 , G07C5/0808
Abstract: Methods, systems, and computer program products for self-driving vehicle sensor fault remediation are provided herein. A computer-implemented method includes detecting a fault in one or more sensors of a self-driving vehicle; determining a remedial action in response to the detected fault, wherein said determining comprises (i) comparing the fault to a database comprising (a) historical sensor fault information and (b) sensor fault remedy information, and (ii) analyzing one or more items of contextual information pertaining to the location of the self-driving vehicle; generating a signal comprising one or more instructions pertaining to carrying out the determined remedial action; and outputting the generated signal to one or more remote-controlled pilotless airborne devices configured to remotely carry out the determined remedial action on the self-driving vehicle.
-
公开(公告)号:US20180091400A1
公开(公告)日:2018-03-29
申请号:US15823827
申请日:2017-11-28
Applicant: International Business Machines Corporation
Inventor: Arup Acharya , Ashish Kundu
IPC: H04L12/26 , H04L29/08 , H04L12/721 , H04L29/06
CPC classification number: H04L43/08 , H04L43/00 , H04L45/306 , H04L45/70 , H04L63/0421 , H04L63/10 , H04L63/1408 , H04L63/1475 , H04L65/1006 , H04L65/1069 , H04L67/10 , H04L67/14 , H04L67/148
Abstract: A computer-implemented method of obfuscating communication traffic patterns may include detecting, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol. At the first device, a first traffic pattern is accessed based on the data communication sessions over a first predefined time period. At the first communications device, a second traffic pattern is accessed based on the data communication sessions over a second predefined time period that occurs after the first predefined time period. At the first communications device, based on a randomization process, a dummy data communication pattern is generated for transmission to the second communication devices, whereby the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions.
-
公开(公告)号:US09919560B1
公开(公告)日:2018-03-20
申请号:US15420638
申请日:2017-01-31
Applicant: International Business Machines Corporation
Inventor: Kevin Wayne Brew , Michael S. Gordon , James Robert Kozloski , Ashish Kundu , Clifford A. Pickover
CPC classification number: B60Q5/005
Abstract: A horn honking control method, system, and computer program product, include an advanced vehicle horn honking control according to a context of the vehicle where a differential horn honking action is performed based on the context.
-
70.
公开(公告)号:US20180065631A1
公开(公告)日:2018-03-08
申请号:US15807650
申请日:2017-11-09
Applicant: International Business Machines Corporation
Inventor: Michael S. Gordon , James R. Kozloski , Ashish Kundu , Peter K. Malkin , Clifford A. Pickover
CPC classification number: B60W30/16 , A61B5/165 , A61B5/18 , B60W2540/22 , B60W2750/308
Abstract: A computer-implemented method, system, and/or computer program product automatically provides spatial separation between a self-driving vehicle (SDV) operating in an autonomous mode and another vehicle on a roadway. One or more processors receive an emotional state descriptor for at least one occupant of the SDV and determine an emotional state of the occupant(s) of the SDV. A vehicle detector on the SDV detects another vehicle within a predefined proximity of the SDV. The processor(s) determine the braking abilities of the SDV and issue spatial separation instructions to a control mechanisms controller on the SDV to adjust a spacing between the SDV and the other vehicle based on the emotional state of the occupant(s) in the SDV.
-
-
-
-
-
-
-
-
-