-
公开(公告)号:US11488181B2
公开(公告)日:2022-11-01
申请号:US15340114
申请日:2016-11-01
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Hari H. Madduri , Maharaj Mukherjee , Joanna W. Ng
IPC: G06Q30/02 , H04W4/70 , H04L67/306
Abstract: Embodiments for using a mixed internet of things (IoT) device network to improve user satisfaction by a processor. A collaboration of data associated with a user captured from a plurality of types of IoT devices in the IoT network may be gathered. The collaboration of data may be used to determine a level of satisfaction of the user according to a knowledge domain describing a plurality of satisfaction factors and levels in the service based industry such that the collaboration of data is associated with one or more of the plurality of satisfaction factors and levels.
-
公开(公告)号:US11276032B2
公开(公告)日:2022-03-15
申请号:US16158685
申请日:2018-10-12
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Maharaj Mukherjee , Faried Abrahams , Gandhi Sivakumar , Amol Dhondse , Anand Pikle
IPC: G06Q10/08
Abstract: A system and method for intelligent classification for product pedigree identification are presented. A transactional block may be dynamically created for recording both pedigree information for one or more supply ingredients at a time of origin and one or more parameters relating to the one or more supply ingredients at each temporal event. One or more transactional blocks may be linked via a shared ledger according to the one or more supply ingredients and the one or more parameters.
-
公开(公告)号:US11252117B2
公开(公告)日:2022-02-15
申请号:US16101136
申请日:2018-08-10
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Maharaj Mukherjee , Jonathan Lenchner
Abstract: Embodiments for implementing an electronic communication coaching service by a processor are disclosed. An appropriateness of a communication may be interpreted prior to a user sending the communication to another party according a plurality of identified contextual factors. The user may be alerted to a possible negative impact of sending the communication to the another party if the interpreted appropriateness is less than a predetermined threshold. A delay in sending the communication may be suggested for a selected period of time to implement one or more suggestive corrective actions to the communication.
-
公开(公告)号:US11200973B2
公开(公告)日:2021-12-14
申请号:US15401874
申请日:2017-01-09
Applicant: International Business Machines Corporation
Inventor: Maharaj Mukherjee , Monimala Mukherjee
Abstract: A food intake control method, system, and computer program product, includes detecting types of food available to a user, categorizing a list of the types of food available to the user based on a harm of a type of food to the user, and administering a nudge to the user to assist the user in avoiding a type of food having the harm.
-
公开(公告)号:US11080487B2
公开(公告)日:2021-08-03
申请号:US16193575
申请日:2018-11-16
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Maharaj Mukherjee , Jonathan Lechner , Lisa Seacat Deluca
Abstract: Embodiments are provided for intelligent communication message completion in a computing system by a processor. A plurality of contextual factors associated with a communication dialog may be determined and learned. A communication message may be automatically completed according to the plurality of contextual factors associated with the communication dialog.
-
公开(公告)号:US10686765B2
公开(公告)日:2020-06-16
申请号:US15490972
申请日:2017-04-19
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: David B. Kumhyr , Arnaud A. Mathieu , Maharaj Mukherjee , Michael P. Robertson
Abstract: A method, computer system, and a computer program product for securing and accessing a plurality of data levels is provided. The present invention may include gathering, by a network device, data. The present invention may also include encrypting, by a network device, a first section of data within the gathered data with a level 1 encryption key. The present invention may then include encrypting, by a network device, a second section of data within the gathered data with a level 2 encryption key. The present invention may further include transmitting, by a network device, the data to a recipient device. The present invention may also include decrypting, by the recipient device, the second section of data with the level 2 encryption key. The present invention may then include decrypting, by the recipient device, the first section of data with the level 1 encryption key.
-
公开(公告)号:US10609438B2
公开(公告)日:2020-03-31
申请号:US14825649
申请日:2015-08-13
Applicant: International Business Machines Corporation
Inventor: Joel W. Branch , Shang Qing Guo , Jonathan Lenchner , Maharaj Mukherjee
IPC: H04N21/422 , H04N21/414 , H04N21/4223 , H04N21/81 , H04W4/70 , H04W84/18
Abstract: A method (and structure) includes forming a wireless ad hoc network with a plurality of sensors at a first location, the ad hoc network being a localized, decentralized network wherein each participating sensor has an equal status on the network for performing network functions and is free to associate with any other ad hoc network device in a link range of a vicinity of the first location. Data is transmitted from the plurality of sensors via the ad hoc network, for consumption by an at-home user located at a second location different from said first location. Each sensor indicates a location and a directivity of sensing in the vicinity of the first location, so that the plurality of sensors thereby can provide data sufficient for the at-home user to be immersed in an experience at the first location.
-
公开(公告)号:US20200053069A1
公开(公告)日:2020-02-13
申请号:US16657687
申请日:2019-10-18
Applicant: International Business Machines Corporation
Inventor: Rhonda L. Childress , Rahul Gupta , Hari H. Madduri , Maharaj Mukherjee , Joanna W. NG
IPC: H04L29/06
Abstract: Provided are techniques for authenticating a device. Accepted communication patterns representing accepted modes of communication between devices in an internet of things network are stored. In response to receiving a new communication from a requesting device of the devices, it is determined whether the new communication matches at least one of the accepted communication patterns. In response to determining that the new communication matches, there is a response to the new communication. In response to determining that the new communication does not match, flagging the new communication as an anomaly and determining how to process the new communication based on the flagging.
-
公开(公告)号:US20200019971A1
公开(公告)日:2020-01-16
申请号:US16033337
申请日:2018-07-12
Applicant: International Business Machines Corporation
Inventor: Ali Y. Duale , Maharaj Mukherjee , Richard B. Finch , Oswald J. Mantilla , Syed F. Hossain , Jacob Porter , Bohdan Demczar
IPC: G06Q30/00
Abstract: Aspects of the invention include receiving system status information about a plurality of computer systems from a plurality of customers. The system status information includes a plurality of types of system status information and each of the plurality of customers provides at least a subset of the plurality of types of system status information. Customer identifiers are removed from the received system status information. For each of the customers it is determined whether a type of the plurality of types of system status information was received from the customer. Based at least in part on determining that the type of system status information was received from the customer, a trend in the type of system status information is determined. The trend is based at least in part on system status information received from at least one other of the plurality of customers. The trend is provided to the customer.
-
公开(公告)号:US10356075B2
公开(公告)日:2019-07-16
申请号:US15459669
申请日:2017-03-15
Applicant: International Business Machines Corporation
Inventor: Rahul Gupta , David B. Kumhyr , Hari H. Madduri , Maharaj Mukherjee
Abstract: A method, a computing system and a computer program product are provided. A computing device identifies a credential of a first entity and determines one or more second entities, each electronically verifying the credential of the first entity. The computing device determines one or more third entities, each electronically verifying one or more from a group of second entities and other ones of the third entities, wherein the second and third entities form a set of chains of verification from the first entity. The computing device analyzes the set of chains of verification to detect one or more loops within the set of chains among the second and third entities. A verification of the credential is generated by the computing device based on detection of a trusted entity within one of the set of chains and not detecting a loop within the one of the set of chains.
-
-
-
-
-
-
-
-
-