-
公开(公告)号:US12190655B2
公开(公告)日:2025-01-07
申请号:US17652287
申请日:2022-02-24
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Akash U. Dhoot , Sarbajit K. Rakshit , Partho Ghosh
Abstract: A method for collaborative data sharing for data anomalies includes identifying an anomaly with data for a first system on a first vehicle. In response to determining the data associated with the anomaly is capturable by other vehicles, the method further includes identifying a second vehicle in the vicinity in the first vehicle, wherein the vicinity is defined by an operational distance of the first system on the first vehicle. The method further includes capturing, by a second system on the second vehicle, the data associated with the anomaly. In response to determining captured data by the second system on the second vehicle requires transformation to conform to the first vehicle, the method further includes transforming the captured data by the second system on the second vehicle to conform to the first vehicle.
-
公开(公告)号:US12041050B2
公开(公告)日:2024-07-16
申请号:US17651267
申请日:2022-02-16
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Akash U. Dhoot , Shailendra Moyal , Venkata Vara Prasad Karri , Sarbajit K Rakshit
IPC: H04L9/40
CPC classification number: H04L63/0876 , H04L63/083 , H04L63/0884
Abstract: A method for authenticating a device based on a wireless power transmission signal includes receiving, at an authenticating device, a wireless power transmission signal for authentication of a user device attempting to accessing a resource, where the wireless power transmission signal includes a unique identifier for the user device. The method further includes translating, at the authenticating device, the wireless power transmission signal, wherein the unique identifier for the user device is embedded in the wireless power transmission signal as a bit representation. In response to authenticating the user device based on a translated wireless power transmission signal, the method further includes granting, the user device, access to the resource.
-
公开(公告)号:US20240208062A1
公开(公告)日:2024-06-27
申请号:US18145964
申请日:2022-12-23
Applicant: International Business Machines Corporation
Inventor: Akash U. Dhoot , Sarbajit K. Rakshit , Saraswathi Sailaja Perumalla , Venkata Ratnam Alubelli
IPC: B25J9/16
CPC classification number: B25J9/1671 , B25J15/0066
Abstract: A processor may receive environment data associated with a robotic device in an environment. The processor may analyze the environment data to identify one or more activities the robotic device may perform in the environment. The processor may generate one or more simulations associated with the one or more activities and the robotic device. The processor may determine one or more limitations of the robotic device associated with the one or more activities. The processor may identify, responsive to determining one or more limitations, one or more apparatuses. The one or more apparatuses may be associated with the one or more limitations.
-
公开(公告)号:US20240089292A1
公开(公告)日:2024-03-14
申请号:US17932049
申请日:2022-09-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Partho Ghosh , Sarbajit K. Rakshit , Venkata Vara Prasad Karri , Akash U. Dhoot
CPC classification number: H04L63/20 , G06F21/602 , G06F21/6218 , H04L63/0428 , H04L63/105
Abstract: Systems, methods and/or computer program products for dynamically adjusting levels of data security, encryption enforcement, confidentiality, network policies and other parameters within a network and at processing nodes thereof, implementing heightened levels of security and encryption as needed, based on the type of datasets being processed. Enforcement and removal of data security, encryption requirements, confidentiality, network policies and other parameters at the nodes of the network is performed using headers and footers added to the source dataset. Headers prescribe the heightened level of security or encryption being enforced at each node of the network along the source dataset's flow trajectory, while footers follow the completed processing of the source dataset and indicates to the nodes along the data flow trajectory the conditions for removing the heightened level of security, encryption, confidentiality, network policies and other parameters prescribed by the headers.
-
公开(公告)号:US20240080756A1
公开(公告)日:2024-03-07
申请号:US17823978
申请日:2022-09-01
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Shailendra Moyal , Sarbajit K. Rakshit , Akash U. Dhoot , Shilpa Bhagwatprasad Mittal
Abstract: According to one embodiment, a method, computer system, and computer program product for eSIM configuration. The embodiment may include identifying contextual information of an internet-based activity being performed via a mobile device. The contextual information comprises one or more minimum performance requirements. The embodiment may include identifying a Wi-Fi network in use for performance of the internet-based activity. The embodiment may include evaluating the performance of the internet-based activity on the Wi-Fi network in use. In response to determining a deviation from the one or more minimum performance requirements, the embodiment may include reconfiguring an eSIM of the mobile device to compensate for the deviation.
-
公开(公告)号:US11924706B2
公开(公告)日:2024-03-05
申请号:US17447222
申请日:2021-09-09
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Akash U. Dhoot , Venkata Vara Prasad Karri , Sarbajit K. Rakshit , Shailendra Moyal
Abstract: A method, a computer program product, and a computer system manage notification settings on a user device within premises. The method includes determining a notification rule to be enforced on the premises for the notification settings to be set on the user device while within the premises. The method includes determining a location and a defined surrounding within the premises for managing the notification settings on the user device, the notification rule being based on the defined surrounding. The method includes determining a user device location of the user device within the premises. The method includes determining whether the user device location is within the defined surrounding. The method includes, as a result of the user device location being within the defined surrounding, transmitting instructions indicative of the notification rule to the user device to set the notification settings on the user device based on the notification rule.
-
公开(公告)号:US11902231B2
公开(公告)日:2024-02-13
申请号:US17650911
申请日:2022-02-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Venkata Vara Prasad Karri , Akash U. Dhoot , Sarbajit K. Rakshit , Nitika Sharma
Abstract: An embodiment for dynamically displaying images based on textual content is provided. The embodiment may include receiving real-time textual content from a sender and a recipient. The embodiment may also include deriving a topic of the real-time textual content and a context associated with the real-time textual content. The embodiment may further include identifying a medium in which the real-time textual content is entered. The embodiment may also include predicting a digital image to be displayed to the sender. The embodiment may further include in response to determining the digital image is available in a digital library, selecting the digital image from the digital library and displaying the selected digital image to the sender. The embodiment may also include validating the selected digital image and displaying the validated selected digital image to the recipient.
-
公开(公告)号:US11782797B2
公开(公告)日:2023-10-10
申请号:US17345611
申请日:2021-06-11
Applicant: International Business Machines Corporation
Inventor: Nitin S. Jadhav , Shailendra Moyal , Akash U. Dhoot
CPC classification number: G06F11/1464 , G06F9/45558 , G06F11/1451 , H04L67/535 , G06F2009/45562 , G06F2009/45591
Abstract: A method, system and computer program product for achieving activity centric computing. An activity (e.g., opening an application, opening an electronic communication, initiating a printing action, initiating a browsing session) performed by a user on a computing device is detected. In response to detecting the activity, the runtime environment is captured and the session workflow associated with the detected activity is recorded. The session workflow refers to the events performed by the user on the computing device in connection with performing an activity (e.g., application usage, web browsing) on the computing device. The captured runtime environment and the recorded session workflow associated with the detected activity are stored in a portable container. After receiving an indication to share the activity, an image of the container is created and stored in a repository to be shared among users to replay the session workflow associated with the activity.
-
公开(公告)号:US20230262058A1
公开(公告)日:2023-08-17
申请号:US17651267
申请日:2022-02-16
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Akash U. Dhoot , Shailendra Moyal , Venkata Vara Prasad Karri , Sarbajit K. Rakshit
IPC: H04L9/40
CPC classification number: H04L63/0876 , H04L63/083 , H04L63/0884
Abstract: A method for authenticating a device based on a wireless power transmission signal includes receiving, at an authenticating device, a wireless power transmission signal for authentication of a user device attempting to accessing a resource, where the wireless power transmission signal includes a unique identifier for the user device. The method further includes translating, at the authenticating device, the wireless power transmission signal, wherein the unique identifier for the user device is embedded in the wireless power transmission signal as a bit representation. In response to authenticating the user device based on a translated wireless power transmission signal, the method further includes granting, the user device, access to the resource.
-
公开(公告)号:US20230262014A1
公开(公告)日:2023-08-17
申请号:US17650911
申请日:2022-02-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Venkata Vara Prasad Karri , Akash U. Dhoot , Sarbajit K. Rakshit , Nitika Sharma
IPC: G06T11/00 , G06F40/30 , G06F3/01 , G06F40/169
CPC classification number: G06T11/00 , G06F40/30 , G06F3/017 , G06F40/169
Abstract: An embodiment for dynamically displaying images based on textual content is provided. The embodiment may include receiving real-time textual content from a sender and a recipient. The embodiment may also include deriving a topic of the real-time textual content and a context associated with the real-time textual content. The embodiment may further include identifying a medium in which the real-time textual content is entered. The embodiment may also include predicting a digital image to be displayed to the sender. The embodiment may further include in response to determining the digital image is available in a digital library, selecting the digital image from the digital library and displaying the selected digital image to the sender. The embodiment may also include validating the selected digital image and displaying the validated selected digital image to the recipient.
-
-
-
-
-
-
-
-
-