-
公开(公告)号:US12106663B2
公开(公告)日:2024-10-01
申请号:US17008685
申请日:2020-09-01
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Cesar Augusto Rodriguez Bravo , Shikhar Kwatra , Sarbajit K. Rakshit , Jeremy R. Fox , John D. Wilson
IPC: G08G1/01 , G06N20/00 , G08G1/00 , G08G1/09 , G08G1/0967
CPC classification number: G08G1/0145 , G06N20/00 , G08G1/0112 , G08G1/096791 , G08G1/22
Abstract: A method, computer system, and a computer program product for vehicle collaboration is provided. The present invention may include receiving data about a detection in a road. The present invention may include gathering additional data based on the received data. The present invention may include determining a comparative priority of at least one available vehicle. The present invention may include forming a protective layer using the at least one available vehicle. The present invention may include determining a structured movement path. The present invention may include retraining a machine learning model.
-
公开(公告)号:US11989202B2
公开(公告)日:2024-05-21
申请号:US17456005
申请日:2021-11-22
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Veronica Gutierrez Magallanes , Guillermo Balandran Tellez , Carolina Garcia Delgado , Cesar Augusto Rodriguez Bravo
IPC: G06F16/26 , G06F3/0481 , G06F3/16
CPC classification number: G06F16/26 , G06F3/0481 , G06F3/167
Abstract: A method, a computer program product, and a computer system generate a realtime viewer of content in a user interface for cloud storage environments. The method includes receiving an input selecting a data unit stored with a cloud storage service. The method includes transmitting a sensory representation to a user device. The sensory representation is shown on the user interface of the user device. The sensory representation is generated prior to the input is received. The sensory representation is output to a user utilizing the user device such that the user is capable of ascertaining a content of the data unit without the user requesting the data unit.
-
公开(公告)号:US20230186323A1
公开(公告)日:2023-06-15
申请号:US17547012
申请日:2021-12-09
Applicant: International Business Machines Corporation
Inventor: EDGAR ROBERTO CUEVAS LOPEZ , JAZMIN RODRIGUEZ AGUILERA , JONATHAN OSWALDO LARA DOMINGUEZ , RAFAEL ISLAS TORRES , Cesar Augusto Rodriguez Bravo
CPC classification number: G06Q30/0185 , G06V30/1448
Abstract: In an approach for product compliance and certification validation, a processor, in response to receiving a product at a validation point, inspects the product using a plurality of sensors, including an image recognition system, to identify at least one certification label associated with the product. A processor correlates information received from the plurality of sensors, including image data, against information in a certification database to create correlation data. A processor validates the correlation data against destination information for the product. A processor, in response to receiving a negative validation, sends an indication of invalid to ship status to a predetermined destination. A processor reroutes the product as a rejected item to a predetermined position for inspection.
-
公开(公告)号:US11553026B2
公开(公告)日:2023-01-10
申请号:US16423106
申请日:2019-05-27
Applicant: International Business Machines Corporation
IPC: H04N21/8358 , H04L65/75 , H04N21/8352 , H04N21/234 , G06N20/00 , G06V20/40 , G06V20/52
Abstract: Techniques are described with respect to management of streaming content. An associated computer-implemented method includes registering an event with a streaming platform and detecting from a client system of a streaming contributor unsanctioned streaming content captured from the event. The computer-implemented method further includes determining whether a selected portion of the unsanctioned streaming content includes a token associated with the event. Responsive to determining that the selected portion of the unsanctioned streaming content includes the token, the computer-implemented method further includes regulating the unsanctioned streaming content according to a media infringement policy implemented by the streaming platform. According to an embodiment, the token is a barcode or a visual representation included on at least one artifact placed at a site of the event.
-
公开(公告)号:US11301594B2
公开(公告)日:2022-04-12
申请号:US16544988
申请日:2019-08-20
Applicant: International Business Machines Corporation
Inventor: Craig M. Trim , Cesar Augusto Rodriguez Bravo , Yered Andres Cespedes Corrales , Roxana Monge Nunez
Abstract: A computing device controls a physical locking device. The computing device determines that an authorized user has requested an unlocking of a physical security device included in a first computing device. The computing device sends a signal to a mobile computing device of the user that is in communication with the first computing device. The computing device unlocks the physical security device included in the first computing device via the mobile computing device based on the signal.
-
公开(公告)号:US11194401B2
公开(公告)日:2021-12-07
申请号:US16740525
申请日:2020-01-13
Applicant: International Business Machines Corporation
Inventor: Roxana Monge Nunez , Cesar Augusto Rodriguez Bravo
Abstract: A set of gesture commands are learned. Each gesture in the set of gesture commands controls a function of one or more computing devices. A first gesture received from a user is identified. A determination is made whether at least one computing device associated with the identified gesture is active. In response to determining that at least one computing device associated with the identified gesture is active, a determination is made whether the user associated with the identified gesture is recognized. In response to determining that the user associated with the identified gesture is recognized, an action to perform on at least one computing device associated with the identified gesture is determined. The determined action is implemented.
-
公开(公告)号:US20210258792A1
公开(公告)日:2021-08-19
申请号:US16792530
申请日:2020-02-17
Applicant: International Business Machines Corporation
Inventor: Cesar Augusto Rodriguez Bravo , David Alonso Campos Batista , Craig M. Trim , Shikhar Kwatra
Abstract: Aspects of the present invention disclose a method for identifying indications of an attack on a cellular network. The method includes one or more processors scanning a geographic area of a cellular network, wherein the geographic area includes a plurality of transceivers of the cellular network. The method further includes identifying a symptom that impacts a transceiver of the cellular network based at least in part on connectivity between a computing device and the plurality transceivers of the cellular network. The method further includes performing one or more assessments on the transceiver of the cellular network impacted by the symptom. The method further includes determining whether the symptom of the cellular network is associated with an attack on the cellular network based at least in part on the one or more assessments.
-
公开(公告)号:US20210211868A1
公开(公告)日:2021-07-08
申请号:US16735817
申请日:2020-01-07
Applicant: International Business Machines Corporation
Inventor: Cesar Augusto Rodriguez Bravo , Kevin Jimenez Mendez , Faraz Ahmad , Dino Quintero
Abstract: A security system for a computing device is provided. A computing device receives one or more policy decisions from a primary user. A computing device monitors activity associated with one or more applications by a secondary user on a computing device. A computing device detects unauthorized activity by the secondary user on the computing device. In response to a computing device detecting unauthorized activity by the secondary user on the computing device, a computing device activates protected mode on the computing device.
-
公开(公告)号:US11049389B2
公开(公告)日:2021-06-29
申请号:US15811765
申请日:2017-11-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Hari H. Madduri , Cesar Augusto Rodriguez Bravo , Michael Starkey
IPC: G08G1/01
Abstract: Aspects provide a roadway management device having a processor configured to collect roadway attribute data associated with accidents within accident data and assign positive correlation values to roadway attributes that match the accident data. Aspects cluster subsets of the accidents that share common values of subset of the roadway attributes assigned positive correlation values; select a corrective action to obviate a one of the clustered roadway attributes; determine whether implementation of the selected corrective action has reduced occurrences of accidents matching common accident data of the clustered accidents on a relevant roadway; and increase a selection weighting value of the selected corrective action in response to determining that implementation has reduced accident occurrences. The selection weighting value is used to bias selection for implementation to obviate a roadway attributes with respect to other clustered accidents.
-
公开(公告)号:US20210168123A1
公开(公告)日:2021-06-03
申请号:US16699112
申请日:2019-11-29
Applicant: International Business Machines Corporation
Abstract: Techniques are described with regard to client authentication management. An associated method includes constructing an authentication resolution model specific to a client based upon error patterns respectively included in a plurality of erroneous authentication submissions inconsistent with a proper authentication submission. The method further includes receiving, via an authentication interface, a new erroneous authentication submission inconsistent with the proper authentication submission. Responsive to determining that the new erroneous authentication submission corresponds to an authentication exception defined in the authentication resolution model, the method further includes completing authentication. Responsive to determining that the new erroneous authentication submission corresponds to an authentication warning defined in the authentication resolution model, the method further includes performing at least one client account warning protection activity. Responsive to determining that the new erroneous authentication submission corresponds to an authentication attack defined in the authentication resolution model, performing at least one client account attack protection activity.
-
-
-
-
-
-
-
-
-