-
公开(公告)号:US11930023B2
公开(公告)日:2024-03-12
申请号:US16409212
申请日:2019-05-10
IPC分类号: G06F16/901 , G06N3/08 , H04L9/40
CPC分类号: H04L63/1425 , G06F16/9024 , G06N3/08
摘要: A deep-learning based method evaluates similarities of entities in decentralized identity graphs. One or more processors represent a first identity profile as a first identity graph and a second identity profile as a second identity graph. The processor(s) compare the first identity graph to the second identity graph, which are decentralized identity graphs from different identity networks, in order to determine a similarity score between the first identity profile and the second identity profile. The processor(s) then implement a security action based on the similarity score.
-
2.
公开(公告)号:US11372997B2
公开(公告)日:2022-06-28
申请号:US16814478
申请日:2020-03-10
发明人: Suresh N. Chari , Ted A. Habeck , Ashish Kundu , Ian M. Molloy
摘要: Automatically generating audit logs is provided. Audit log statement insertion points are identified in components of an application based on a static code analysis identifying start and end operations on sensitive data in the components of the application. The application is instrumented with audit log statements at the audit log statement insertion points in the components of the application. Audit logs of monitored sensitive data activity events in the application are generated using the audit log statements at the audit log statement insertion points in the components of the application.
-
公开(公告)号:US20220180068A1
公开(公告)日:2022-06-09
申请号:US17113137
申请日:2020-12-07
IPC分类号: G06F40/30 , G06F40/166
摘要: A method, computer system, and a computer program product for text bias identification and correction are provided. A first text corpus may be received. A designation of a second text corpus may be received. Words of the first text corpus may be embedded as a first word embedding in an embedding model. The first word embedding may be compared to a second word embedding in the embedding model to identify a first biased text in the first text corpus. The second word embedding may be from the second text corpus. A first replacement text portion may be generated as a substitute for the first biased text. The first replacement text portion may include a first unbiased text. The first biased text and the first replacement text portion may be presented.
-
公开(公告)号:US20210350275A1
公开(公告)日:2021-11-11
申请号:US16870202
申请日:2020-05-08
发明人: Sreekrishnan Venkateswaran , Debasisha Padhi , Shubhi Asthana , Anuradha Bhamidipaty , Ashish Kundu
摘要: An explainable artificially intelligent (XAI) application contains an ordered sequence of artificially intelligent software modules. When an input dataset is submitted to the application, each module generates an output dataset and an explanation that represents, as a set of Boolean expressions, reasoning by which each output element was chosen. If any pair of explanations are determined to be semantically inconsistent, and if this determination is confirmed by further determining that an apparent inconsistency was not a correct response to an unexpected characteristic of the input dataset, nonzero inconsistency scores are assigned to inconsistent elements of the pair of explanations. If the application's overall inconsistency score exceeds a threshold value, the system forwards information about the explanation, the offending modules, and the input dataset to a downstream machine-learning component that uses this information to train the application to better respond to future input that shares certain characteristics with the current input.
-
公开(公告)号:US10833861B2
公开(公告)日:2020-11-10
申请号:US15824405
申请日:2017-11-28
发明人: Suresh Chari , Hasini Gunasinghe , Hugo M. Krawczyk , Ashish Kundu , Kapil Kumar Singh , Dong Su
摘要: A processor-implemented method improves security in a blockchain network of devices by protecting security, privacy and ownership assurance of identity assets, where the blockchain network of devices supports a blockchain. An identity asset provider device establishes co-ownership of an identity asset for an identity asset provider and an entity. The identity asset provider device directs a first member of the blockchain network of devices to associate identities of the identity asset provider and the entity based on their co-ownership of the identity asset by using commitments between the identity asset provider and the entity and based on collaborative proof of ownership of the identity asset using zero knowledge proofs in the blockchain network of devices.
-
公开(公告)号:US20200349194A1
公开(公告)日:2020-11-05
申请号:US16401277
申请日:2019-05-02
发明人: Ashish Kundu , Mukesh K. Mohania , Hoang Tam Vo , Zehra N. Sura
IPC分类号: G06F16/901 , H04L9/06 , G06F16/903
摘要: An example operation may include one or more of generating a proposal to perform a ledger operation at a first node, informing one or more second nodes of the proposal, receiving a decision on consensus among the first node and the one or more second nodes for the proposal, and performing the ledger operation at the first node when there is consensus, wherein the ledger operation changes a state database of a ledger of the first node and wherein the state database corresponds to a blockchain stored in the ledger.
-
公开(公告)号:US10772295B2
公开(公告)日:2020-09-15
申请号:US15243133
申请日:2016-08-22
摘要: An unmanned aerial vehicle for determining geolocation foraging zones for animals, the unmanned aerial vehicle comprising a processor-based monitoring device to monitor a plurality of geolocations, an identification device to identify an animal and to track a position of the animal in relation to the plurality of geolocations, a risk analysis device to evaluate a level of risk associated with each of the plurality of geolocations, and a mapping device coupled to the monitoring device to select a geolocation foraging zone when the level of risk associated with the geolocation foraging zone is below a predetermined threshold value.
-
公开(公告)号:US10549602B2
公开(公告)日:2020-02-04
申请号:US15396931
申请日:2017-01-03
IPC分类号: A61L9/00 , B60H3/00 , B01D53/02 , B60H1/00 , A61L9/20 , A61L9/16 , B60H3/06 , B01D46/44 , B01D46/46
摘要: A computer-implemented air quality amelioration method, computer program product, and system for a self-driving vehicle, the method including detecting a value of an air quality within a cabin of the self-driving vehicle and performing an amelioration action to improve the value of the air quality based on the detection of the value of the air quality being less than a predetermined value.
-
公开(公告)号:US10543844B2
公开(公告)日:2020-01-28
申请号:US15838500
申请日:2017-12-12
IPC分类号: B60W30/182 , G05D1/02 , B60W40/04 , B60W30/095 , B60W50/00
摘要: A method controls an operational mode of a self-driving vehicle (SDV). One or more physical detectors detect an erratically driven vehicle (EDV) that is being operated in an unsafe manner within a predetermined distance of an SDV that is initially being operated in an evasive autonomous mode. One or more processors retrieve traffic pattern data for other SDVs, and examine the traffic pattern data to 1) determine a first traffic flow of the other SDVs while operating in the evasive autonomous mode, and 2) determine a second traffic flow of the other SDVs while operating in a manual mode. In response to determining that the first traffic flow has a higher accident rate than the second traffic flow, an operational mode device changes the operational mode of the SDV from the evasive autonomous mode to the manual mode.
-
公开(公告)号:US10482265B2
公开(公告)日:2019-11-19
申请号:US14983873
申请日:2015-12-30
发明人: Suresh N. Chari , Ted Habeck , Ashish Kundu , Ian M. Molloy , Dimitrios Pendarakis , Josyula R. Rao , Marc P. Stoecklin
摘要: Log(s) of IT events are accessed in a distributed system that includes a distributed application. The distributed system includes multiple data objects. The distributed application uses, processes, or otherwise accesses one or more of data objects. The IT events concern the distributed application and concern accesses by the distributed application to the data object(s). The IT events are correlated with a selected set of the data objects. Risks are estimated to the selected set of data objects based on the information technology events. Estimating risks uses at least ranks of compliance rules as these rules apply to the data objects in the system, and vulnerability scores of systems corresponding to the set of data objects and information technology events. Information is output that allows a user to determine the estimated risks for the selected set of data objects. Techniques for determining ranks of compliance rules are also disclosed.
-
-
-
-
-
-
-
-
-