-
公开(公告)号:US20200042916A1
公开(公告)日:2020-02-06
申请号:US16050344
申请日:2018-07-31
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Peeyush Jaiswal , PRIYANSH JAISWAL , David Jaramillo , PAUL LLAMAS VIRGEN , Annita Tomko
IPC: G06Q10/06 , G06Q10/10 , G06F17/28 , G10L15/183
Abstract: Embodiments provide an automated participation evaluator, wherein processors are configured to evaluate participation of meeting attendees with respect to performance criteria including participation criteria and deliverable contribution criteria; populate object fields associated to ones of the performance criteria and attendees with values representing a quality of performance of the associated attendees relative to the associated performance criteria; notify the attendees of the populated object field values in response to determining that time for evaluating participation of the attendees with respect to performance criteria has not elapsed; update the populated object field values via reevaluating participation of the attendees in response to the notifying of the attendees of the populated values; and reward the attendees with reward values selected as a function of the updated, populated values, in response to determining time for evaluating the participation of the attendees with respect to each of the performance criteria has elapsed.
-
公开(公告)号:US20240406182A1
公开(公告)日:2024-12-05
申请号:US18329185
申请日:2023-06-05
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: PAUL LLAMAS VIRGEN , JONATHAN OROZCO CERVANTES , ANDRES ALEJANDRE JIMENEZ , ALAN VERDUGO MUÑOZ
Abstract: A computer system includes: a processor; a memory in communication with the processor; multiple user input devices; and a security tool to capture data defining usage patterns of an authorized user operating the multiple user input devices to prepare an authorized user profile and to implement security measures when usage patterns of a current user differ from the usage patterns of the authorized user from the profile. The security tool calls a Machine Learning Model (MLM) that is trained on the usage patterns of the authorized user from the profile, the MLM predicting for the security tool whether usage patterns of the current user indicate that the current user is not the authorized user based on the training of the MLM.
-
公开(公告)号:US20230054649A1
公开(公告)日:2023-02-23
申请号:US17406317
申请日:2021-08-19
Applicant: International Business Machines Corporation
Inventor: John E. Moore, JR. , HUMBERTO OROZCO CERVANTES , PAUL LLAMAS VIRGEN , LUISA ALEJANDRA RIZO LAMEIRAS
Abstract: An approach for the unlocking a vehicle is disclosed. The approach determines a plurality of devices of one or more users and one or more unlocking protocols associated with one or more vehicles, requests a user unlock action command by at least one of the plurality of devices. The approach receives a user unlock action complete command from at least one of the plurality of devices and validates the user unlock action complete command against the one or more unlocking protocols. Finally, after successful authentication, the approach unlocks the one or more vehicles.
-
公开(公告)号:US20210279324A1
公开(公告)日:2021-09-09
申请号:US16809615
申请日:2020-03-05
Applicant: International Business Machines Corporation
Inventor: HUMBERTO OROZCO CERVANTES , CAROLINA GARCIA DELGADO , PAUL LLAMAS VIRGEN , VLADIMIR GARCIA SAAVEDRA
Abstract: A method, system, and computer program product for dynamic password generation and authentication based on morphological groupings is provided. The method receives a set of morphological groups defining a plurality of character maps. The method receives selection of a subset of morphological groups by a user from the set of morphological groups. A set of characters input from the user are identified, with the set of characters forming a user selected password. The method generates a morphological password using the set of characters and the subset of morphological groups selected by the user. The method stores the morphological password in a password repository.
-
公开(公告)号:US20220121289A1
公开(公告)日:2022-04-21
申请号:US17075741
申请日:2020-10-21
Applicant: International Business Machines Corporation
Inventor: PAUL LLAMAS VIRGEN , Emmanuel Barajas Gonzalez
IPC: G06F3/01 , G06F16/9035 , H04L29/08
Abstract: Described are techniques for sensor agnostic gesture detection. The techniques include recording a gesture using sensor output from a first user device to a first user profile associated with a ubiquitous gesture agent. The techniques further include associating the gesture with a triggering threshold indicating the gesture and based on the sensor output, and a processor-executable action that is executable by one of a plurality of user devices associated with the user profile. The techniques further include transforming the triggering threshold into a corresponding triggering threshold for a different type of sensor. The techniques further include identifying the gesture using data from the different type of sensor that satisfies the corresponding triggering threshold. The techniques further include implementing, by the one of the plurality of user devices, the processor-executable action associated with the gesture.
-
公开(公告)号:US20210126952A1
公开(公告)日:2021-04-29
申请号:US16665215
申请日:2019-10-28
Applicant: International Business Machines Corporation
IPC: H04L29/06
Abstract: A processor may identify a new application on a device. The processor may receive, from the device, user data. The user data may include user profile information and user activity information. The processor may evaluate the user data. The evaluating of the user data may include designating a security level to the user data. The processor may determine, from evaluating the user data, that a default security configuration for the new application is not secure. The processor may automatically generate a customized security configuration for the new application. The processor may apply the customized security configuration to the new application.
-
7.
公开(公告)号:US20200151621A1
公开(公告)日:2020-05-14
申请号:US16186630
申请日:2018-11-12
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: CAROLINA GARCIA DELGADO , HUMBERTO OROZCO CERVANTES , Jorge Adrian Meneses Barragan , PAUL LLAMAS VIRGEN
Abstract: An embodiment of the invention may include a method, computer program product and system for computing device management. An embodiment may include preparing, by an estimated arrival time of a user at a location, at least one computing device needed by the user to perform a computing task at the location.
-
公开(公告)号:US20230065847A1
公开(公告)日:2023-03-02
申请号:US17446528
申请日:2021-08-31
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Slobodan Sipcic , Peeyush Jaiswal , Priyansh Jaiswal , PAUL LLAMAS VIRGEN , Victor Povar
Abstract: According to one embodiment, a method, computer system, and computer program product for network bandwidth conservation is provided. The embodiment may include monitoring eye focus of a user. The embodiment may include monitoring voice input of the user. In response to determining the eye focus of the user is on a video feed of another user for more than a threshold amount of focus time, the embodiment may include receiving the video feed of the another user. In response to determining the eye focus of the user is on a screen of a video conference and determining, based on the voice input, the user is speaking towards the screen of the video conference, the embodiment may include enabling a camera of the user and transmitting a video feed of the user.
-
公开(公告)号:US20220382922A1
公开(公告)日:2022-12-01
申请号:US17303234
申请日:2021-05-25
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Slobodan Sipcic , Peeyush Jaiswal , Priyansh Jaiswal , PAUL LLAMAS VIRGEN , CAROLINA GARCIA DELGADO
Abstract: According to one embodiment, a method, computer system, and computer program product for determining packaging compatibility is provided. The embodiment may include creating a digital twin representation of a manufacturing object based on received data of the manufacturing object. The embodiment may include identifying a position of the digital twin representation within a hierarchy of associated digital twin representations. The embodiment may include monitoring for a change to the digital twin representation. The embodiment may include determining a compatibility of a changed digital twin representation within the hierarchy. In response to determining that the changed digital twin representation is incompatible within the hierarchy, the embodiment may include sending an incompatible change alert.
-
公开(公告)号:US20210136066A1
公开(公告)日:2021-05-06
申请号:US16670298
申请日:2019-10-31
Applicant: International Business Machines Corporation
IPC: H04L29/06
Abstract: Described are techniques for collaboration-based authentication including a method comprising storing a user profile comprising information related to a user account, a plurality of user devices, and a user calendar. The method further comprises detecting an authentication attempt associated with the user account and retrieving device information associated with a first device initiating the authentication attempt, a first location of the first device, a second location of a second device of the plurality of user devices, and a scheduled location based on the user calendar. The method further comprises determining that the authentication attempt comprises a security risk based on the device information associated with the first device, the first location of the first device, the second location of the second device, and the scheduled location. The method further comprises performing a mitigation action in response to determining that the authentication attempt comprises the security risk.
-
-
-
-
-
-
-
-
-