-
公开(公告)号:US10810510B2
公开(公告)日:2020-10-20
申请号:US15436357
申请日:2017-02-17
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Nathalie Baracaldo Angel , Pawan R. Chowdhary , Heiko H. Ludwig , Robert J. Moore , Hovey Raymond Strong, Jr.
Abstract: One embodiment provides a method comprising intercepting a voice communication, collecting multi-sensory inputs associated with the voice communication, and determining an overall risk assessment metric for the voice communication based on the multi-sensory inputs and learned signatures. The multi-sensory inputs are indicative of content of the voice communication and one or more contextual factors associated with a target of the voice communication. The overall risk assessment metric indicates a likelihood the voice communication is a scam.
-
公开(公告)号:US11188878B2
公开(公告)日:2021-11-30
申请号:US14861959
申请日:2015-09-22
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jeanette L. Blomberg , Anca A. Chandra , Pawan R. Chowdhary , Susanne M. Glissmann-Hochstein , Sunhwan Lee , Hovey Raymond Strong, Jr.
IPC: G06Q10/10
Abstract: Embodiments of the present invention provide a method comprising maintaining historical meeting information, receiving an event data stream corresponding to a meeting, and delaying confirmation of an assignment of a meeting room for the meeting for a period of delay defined by a confirmation condition to predict a number of in-person attendees at the meeting based on the event data stream and the historical meeting information. The meeting room is tentatively assigned to the meeting based on the predicted number of in-person attendees. The method further comprises sending confirmation of the assignment of the meeting room for the meeting to at least one invitee only after the period of delay has elapsed.
-
公开(公告)号:US09940472B2
公开(公告)日:2018-04-10
申请号:US14592456
申请日:2015-01-08
Applicant: International Business Machines Corporation
Inventor: Rama Kalyani T. Akkiraju , Debdoot Mukherjee , Taiga Nakamura , Mu Qiao , Hovey Raymond Strong, Jr.
CPC classification number: G06F21/6218 , G06F17/30958 , G06F21/6227
Abstract: Methods and arrangements for managing user access to a graph database. Nodes are represented in a graph, along with edges which interconnect the nodes. One or more facts are associated with each of the edges, and an access control list is provided with respect to one or more facts associated with one or more of the edges. There is restricted user access to one or more facts associated with the one or more of the edges, based on the access control list. Other variants and embodiments are broadly contemplated herein.
-
-