Kyndryl, Inc.

United States of America

Back to Profile

1-100 of 3,072 for Kyndryl, Inc. Sort by
Query
Patent
United States - USPTO
Aggregations Reset Report
Date
New (last 4 weeks) 11
2023 September (MTD) 8
2023 August 9
2023 July 11
2023 June 15
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 379
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 378
H04L 12/24 - Arrangements for maintenance or administration 243
G06F 17/30 - Information retrieval; Database structures therefor 236
G06N 20/00 - Machine learning 180
See more
Status
Pending 213
Registered / In Force 2,859
Found results for  patents
  1     2     3     ...     31        Next Page

1.

PHYSICAL AND VIRTUAL ENVIRONMENT SYNCHRONIZATION

      
Application Number 17702823
Status Pending
Filing Date 2022-03-24
First Publication Date 2023-09-28
Owner Kyndryl, Inc. (USA)
Inventor
  • Whitman, Todd Russell
  • Silverstein, Zachary A.
  • Fox, Jeremy R.
  • Rakshit, Sarbajit K.

Abstract

Systems and methods synchronize content of a virtual environment with a state of a physical environment. In aspects, a method includes obtaining sensor data from a network of remote sensors measuring a physical state of a location at a time; generating context specific parameter data based on the sensor data; obtaining context data from a remote virtual reality (VR) system, wherein the context data reflects a current state of virtual content in a virtual environment displayed by the remote VR system; selecting virtual content to be displayed in the virtual environment by the remote VR system based on the context specific parameter data, the context data, and rules; and sending the virtual content to the remote VR system to be displayed to a user, wherein the virtual content reflects a state of the physical location at the time.

IPC Classes  ?

  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G06V 20/20 - Scenes; Scene-specific elements in augmented reality scenes
  • H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information

2.

CONTEXTUAL ITEM DISCOVERY AND PATTERN INCULCATED REMINDER MECHANISM

      
Application Number 17704703
Status Pending
Filing Date 2022-03-25
First Publication Date 2023-09-28
Owner Kyndryl, Inc. (USA)
Inventor
  • Patel, Pritesh
  • Kwatra, Shikhar
  • Kundu, Amitava
  • Perepa, Sujatha B.

Abstract

Aspects of the present disclosure relate generally to reminder systems and, more particularly, to a contextual item discovery and pattern inculcated reminder mechanism and methods of use. A computer-implemented method includes: determining, by a computing device, an event in which a user will participate; associating, by the computing device, one or more items with the event; determining a location of the one or more items associated with the event including that the user does not possess any combination of the one or more items; and providing an alert to the user that the any of the one or more items associated with the event is not in the possession of the user.

IPC Classes  ?

3.

COGNITIVE HOTSPOT PROVISIONING AND NETWORK PRIORITIZATION

      
Application Number 17588532
Status Pending
Filing Date 2022-01-31
First Publication Date 2023-09-21
Owner Kyndryl, Inc. (USA)
Inventor
  • Suto, Tiberiu
  • Kwatra, Shikhar
  • Sivaswamy, Hemant Kumar
  • Kochura, Nadiya

Abstract

A computer implemented method and system are disclosed for dynamically enabling a first user device operated by a first user to provide wireless hotspot capability for a wireless hotspot session to a second user device operated by a second user. The wireless hotspot session is accepted based at least on urgency and bandwidth requirement of the second user device. When the first user device accepts a connection to the second user device to provision a wireless hotspot for the wireless hotspot session, the first user restricts use of the second user device in the wireless hotspot session, based on bandwidth and context of use of the second user device. The first user device may refuse a connection by rejecting the wireless hotspot session request wireless hotspot session transactions information is provided as blockchain ledgers.

IPC Classes  ?

4.

VIDEO DATA SIZE REDUCTION

      
Application Number 17581698
Status Pending
Filing Date 2022-01-21
First Publication Date 2023-09-21
Owner KYNDRYL, INC. (USA)
Inventor
  • Marzorati, Mauro
  • Hatfield, Jennifer M.
  • Dhillon, Jill S.
  • Fox, Jeremy R.

Abstract

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: storing into a storage device a video data file; examining video file data defining the video data file, wherein the examining includes determining a relevancy of a section of the video data file; reducing a size of file data defining the section of the video data file in dependence on the determining the relevancy of the section of the video data file; storing a reduced-size version of the video data file into the storage device, the reduced-size version of the video data file having a reduced size relative to the video data file by performance of the reducing the size of file data defining the section of the video data file in dependence on the determining the relevancy of the section of the video data file.

IPC Classes  ?

  • G11B 27/031 - Electronic editing of digitised analogue information signals, e.g. audio or video signals
  • G06V 20/40 - Scenes; Scene-specific elements in video content
  • H04N 7/01 - Conversion of standards
  • G11B 27/00 - Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
  • H04N 5/91 - Television signal processing therefor
  • G10L 15/18 - Speech classification or search using natural language modelling
  • G10L 25/63 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for estimating an emotional state
  • G10L 25/57 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for processing of video signals

5.

COORDINATION AND EXECUTION OF ACTIONS ON A PLURALITY OF HETEROGENOUS AI SYSTEMS DURING A CONFERENCE CALL

      
Application Number 17691661
Status Pending
Filing Date 2022-03-10
First Publication Date 2023-09-14
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Flores, Romelia H.
  • Rakshit, Sarbajit K.

Abstract

A method includes: in response to identifying a primary user and corresponding Primary AI Assistant for a meeting, receiving by the Primary AI Assistant a confirmation to enroll at least one user personal digital assistant (PDA) of a respective one of at least one user; prompting the at least one user to provide descriptive information associated with the respective user PDA; connecting the at least one user PDA to the Primary AI Assistant internally by the Primary AI Assistant using the descriptive information for submitting requests; identifying by the Primary AI Assistant keywords and phrases received from the at least one user or primary user in the meeting; determining by the Primary AI Assistant a scheduling item based on the identified keywords and phrases; and automatically providing by the Primary AI Assistant the scheduling item to at least one user PDA corresponding to the scheduling item using the descriptive information.

IPC Classes  ?

  • G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
  • H04M 3/56 - Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
  • H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference

6.

RAPID DATA REPLICATION AND DATA STORAGE

      
Application Number 17691834
Status Pending
Filing Date 2022-03-10
First Publication Date 2023-09-14
Owner Kyndryl, Inc. (USA)
Inventor
  • Hs, Siddalinga A.
  • Raghunathan, Ravi K.
  • Panjani, Venkata Hari K.
  • Kande, Raja
  • Shivanna, Manu

Abstract

Aspects of the present disclosure relate generally to data storage and data replication. For example, a computer-implemented method includes creating, by a computing device, a mapping that associates a plurality of block identifiers with a plurality of binary combinations of data for a block size; generating from the mapping that associates the plurality of block identifiers with the plurality of binary combinations of data for the block size, by the computing device, a list of block identifiers representing a list of data blocks in a storage; sending, by the computing device, the list of block identifiers to a backup storage to replicate the list of data blocks in the storage; and storing on a computer readable storage media the mapping that associates the plurality of block identifiers with the plurality of binary combinations of data for the block size and the list of block identifiers in the storage.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

7.

RAPID DIAGNOSIS OF POTENTIAL TRAMATIC BRAIN INJURY OF USERS IN SITU

      
Application Number 17592045
Status Pending
Filing Date 2022-02-03
First Publication Date 2023-09-07
Owner Kyndryl, Inc. (USA)
Inventor
  • Cameron, Caroline K.
  • Allen, Corville O.

Abstract

Systems and method of the invention provide an in situ diagnostic system for traumatic brain injury (TBI). In implementations, a method includes: receiving, by a computing device, real-time user parameter data from one or more sensors of the user during a monitoring event; writing, by the computing device, the real-time user parameter data as time series data in a data store; determining, by the computing device, that at least one parameter of the real-time user parameter data meets or exceeds a predetermined parameter threshold value; calculating, by the computing device, a diagnostic score for the user based on the time series data, baseline parameter data of the user, and a determined protective equipment profile of the user; and automatically diagnosing a potential traumatic brain injury (TBI) of the user in situ based on the diagnostic score meeting or exceeding a diagnostic threshold.

IPC Classes  ?

  • A61B 5/00 - Measuring for diagnostic purposes ; Identification of persons
  • G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
  • A61B 5/369 - Electroencephalography [EEG]
  • A61B 5/0205 - Simultaneously evaluating both cardiovascular conditions and different types of body conditions, e.g. heart and respiratory condition

8.

PUSH NOTIFICATION PERSISTENCE MANAGEMENT

      
Application Number 17685597
Status Pending
Filing Date 2022-03-03
First Publication Date 2023-09-07
Owner Kyndryl, Inc. (USA)
Inventor
  • Silverstein, Michael Seth
  • Silverstein, Zachary A.
  • Krishnan, Jayanth
  • Sugavanam, Krishnan

Abstract

A computer-implemented method including: displaying, by a mobile device, a push notification from an application of the mobile device; determining, by the mobile device, an associated notification parameter for the push notification; receiving, by the mobile device, a user input by a user of the mobile device; determining, by the mobile device, the user input indicates interest in the push notification; and maintaining, by the mobile device, presence of the push notification on a display of the mobile device based on determining the user input indicates interest in the push notification and the associated notification parameter.

IPC Classes  ?

  • H04L 67/55 - Push-based network services
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06F 3/04886 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus

9.

AUTOMATED MAINFRAME DATABASE MAINTENANCE

      
Application Number 17680558
Status Pending
Filing Date 2022-02-25
First Publication Date 2023-08-31
Owner Kyndryl, Inc. (USA)
Inventor
  • Souza Vaz, Marcelo De
  • Eugenio Fernandes, Marcos
  • Bianchi, Thiago
  • Weingart, Adriana Melges Quintanilha

Abstract

Systems and methods for automated mainframe database maintenance are provided. In implementations, a method includes obtaining, by a computing device, real-time performance metrics of a mainframe database; automatically generating, by the computing device, a predicted maintenance task as an output of a trained database maintenance task classification machine learning (ML) model based on an input of the real-time performance metrics; automatically generating, by the computing device, a time to execute the predicted maintenance task as an output of a trained database maintenance triggering ML model based on an input of the predicted maintenance task and the real-time performance metrics; automatically generating, by the computing device, maintenance task instructions for the mainframe database based on the predicted maintenance task, the time to execute the predicted maintenance task, and a maintenance profile of the mainframe database; and automatically initiating, by the computing device, the execution of the maintenance task instructions.

IPC Classes  ?

  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/23 - Updating
  • G06F 16/22 - Indexing; Data structures therefor; Storage structures
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

10.

SCROLLABLE REAL-TIME PRESENTATION DOCUMENT TWIN

      
Application Number 17682260
Status Pending
Filing Date 2022-02-28
First Publication Date 2023-08-31
Owner Kyndryl, Inc. (USA)
Inventor
  • Silverstein, Michael Seth
  • Miles, Caleb
  • Silverstein, Zachary A.
  • Fox, Jeremy R.

Abstract

A method includes: hosting, by a computing device, a videoconference among plural users; receiving, by the computing device, input from a sharing user of the plural users, wherein the input initiates a screenshare in the videoconference; creating, by the computing device, document twins of a document shown in the screenshare; and providing, by the computing device and to other users of the plural users, access to respective ones of the document twins in an interface of the videoconference; wherein each of the other users may scroll within a respective one of the document twins independently of other ones of the other users and independently of the screenshare.

IPC Classes  ?

  • G06F 3/0485 - Scrolling or panning
  • H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
  • H04L 65/1096 - Supplementary features, e.g. call forwarding or call holding

11.

AUTOMATIC REMEDIATION OF NON-COMPLIANCE EVENTS

      
Application Number 18303799
Status Pending
Filing Date 2023-04-20
First Publication Date 2023-08-31
Owner KYNDRYL, INC. (USA)
Inventor
  • Kurian, John
  • Venkitachalam, Hariharan N.
  • Ngo, Huyanh Dinh
  • Tummalapenta, Srinivas Babu

Abstract

A system and method for automatic remediation of non-compliance events are provided. In embodiments, a computer-implemented method includes: accessing a compliance profile and a remediation profile, wherein the compliance profile includes compliance data regarding rules for an enterprise and the remediation profile includes remediation data regarding remediation actions to address non-compliance with one or more of the rules; generating mapped data by mapping compliance data in the compliance profile to remediation data in the remediation profile; receiving non-compliance event data from a workload node in a network; extracting information from the non-compliance event data including the workload node associated with the event and a cause of event; determining a remediation action for the event based on the information and the mapped data; and invoking automatic performance of the remediation action at the workload node based on the determined remediation action.

IPC Classes  ?

  • G06Q 30/018 - Certifying business or products
  • G06Q 10/10 - Office automation; Time management
  • G06Q 10/0639 - Performance analysis of employees; Performance analysis of enterprise or organisation operations
  • G06F 9/54 - Interprogram communication
  • G06F 16/23 - Updating

12.

BLOCKCHAIN-BASED APPOINTMENT MANAGEMENT

      
Application Number 17650789
Status Pending
Filing Date 2022-02-11
First Publication Date 2023-08-17
Owner KYNDRYL, INC. (USA)
Inventor
  • Suto, Tiberiu
  • Chamala, Shanthan
  • Kwatra, Shikhar
  • Valecha, Vinod A.

Abstract

Blockchain-based appointment management is provided by maintaining, in a blockchain network with which a provider and a collection of users engage, a schedule of appointments between the provider and individual users, and managing appointment scheduling (including changing existing appointments) between the provider and user(s) of the collection of users via recordation of blockchain transactions on a blockchain of the blockchain network. The managing includes monitoring travel of a user to a location at which a scheduled appointment between the provider and the user is to occur, the monitoring providing an estimated arrival time of the user to the appointment location, based on the estimated arrival time, an initial anticipated arrival time for the scheduled appointment, and the schedule of appointments, determining change(s) to make to the schedule of appointments, including a modification to the scheduled appointment, and recording the change(s) to the schedule of appointments as transaction(s) on the blockchain.

IPC Classes  ?

  • G06Q 10/10 - Office automation; Time management
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

13.

LOG TAMPERING PREVENTION FOR HIGH AVAILABILITY ENVIRONMENTS

      
Application Number 17672972
Status Pending
Filing Date 2022-02-16
First Publication Date 2023-08-17
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Tav, Doga
  • Flores, Romelia H.

Abstract

A computer-implemented method includes: monitoring an operating system of a server that serves content to client computing devices, wherein the server maintains log files; determining, based on the monitoring, whether commands received at the operating system are indicative of tampering with one or more of the log files; responsive to determining the commands are indicative of tampering with one or more of the log files, performing a predefined security action; and responsive to determining the commands of the user are not indicative of tampering with one or more of the log files, sending the commands to a kernel of the operating system for execution.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

14.

SECURE RESOURCE ACCESS BY AMALGAMATED IDENTITIES AND DISTRIBUTED LEDGER

      
Application Number 18305592
Status Pending
Filing Date 2023-04-24
First Publication Date 2023-08-17
Owner Kyndryl, Inc. (USA)
Inventor
  • Rao, Suryanarayana
  • Dutta, Shiben
  • Vincen C, Clinton
  • Lalwani, Vikas

Abstract

A server receives encrypted data from a protected-resource-requesting device that includes an encrypted combination of the device and user identification. The first server requests a most recent copy of data of a distributed ledger from a randomly selected logged-in workstation. The first server searches for a match of the encrypted data from the first device in the distributed ledger data received from the randomly selected workstation. In response to determining a match, the first server updates a table of a second server with a one-time-password (OTP) and a copy of the encrypted data received from the device. The first server sends the OTP and an instruction to the device to send the OTP and the encrypted data to the second server, which determines whether a match exists. In response to a confirmed match, the first server grants access to the device.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

15.

PERSONALIZED SENSORY FEEDBACK

      
Application Number 17650438
Status Pending
Filing Date 2022-02-09
First Publication Date 2023-08-10
Owner KYNDRYL, INC. (USA)
Inventor
  • Miles, Caleb
  • Kwatra, Shikhar
  • Szkatulski, Jennifer L.
  • Sanabria Echeverria, Elio Andres

Abstract

Personalizing sensory feedback based on user sensitivity analysis includes maintaining user-specific parameters for provision of sensory feedback to a user in extended reality. The user-specific parameters apply to specific contextual situations and dictate levels of sensory feedback to provide via stimulus device(s) in the specific contextual situations. Based on an ascertained contextual situation of the user interacting in a target extended reality environment, a set of sensory feedback level parameters is selected for provision of sensory feedback to the user in the target extended reality environment, and stimulus device(s) in the target extended reality environment is/are automatically controlled in the provision of the sensory feedback to the user based on one or more of the selected parameters. The automatically controlling includes electronically communicating with the stimulus device(s) to control at least one stimuli provided to the user by the stimulus device(s).

IPC Classes  ?

  • G16H 40/67 - ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
  • G06N 20/00 - Machine learning

16.

INTELLIGENT WORKFLOW FOR PROTECTING SERVERS FROM OUTSIDE THREATS

      
Application Number 17665114
Status Pending
Filing Date 2022-02-04
First Publication Date 2023-08-10
Owner Kyndryl, Inc. (USA)
Inventor
  • Childress, Rhonda L.
  • Fox, Jeremy R.
  • Bender, Michael

Abstract

A computer-implemented method includes: monitoring, by a computing device, network communications to a server; determining, by the computing device, a threat to the server based on the monitoring; determining, by the computing device, a risk level of the threat; selecting, by the computing device, a response to the threat based on the determined risk level, wherein the response is selected from a predefined set of responses; initiating, by the computing device, the selected response.

IPC Classes  ?

17.

PREDICTING RECOVERY POINT OBJECTIVE DRIFTS

      
Application Number 17592852
Status Pending
Filing Date 2022-02-04
First Publication Date 2023-08-10
Owner Kyndryl, Inc. (USA)
Inventor
  • Sidhu, Divgian
  • Raghunathan, Ravi Kumar
  • Aloysious, Goldy Mathew
  • Dixit, Archana

Abstract

A computer-implemented method includes: generating, by a computing device, a multidimensional hyperspace encompassing a plurality of features based on input data; generating, by the computing device, a plurality of sequential arrays of a fixed length based on the input data; generating, by the computing device, a final sequential array of a predetermined shape based on the plurality of sequential arrays of the fixed length; generating, by the computing device, a training data set for a deep learning model based on the final sequential array of the predetermined shape and the multidimensional hyperspace; and training, by the computing device, a deep learning model using the generated training data set.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

18.

ROBOTIC SUPPORT FOR THREE-DIMENSIONAL (3D) PRINTS

      
Application Number 17587393
Status Pending
Filing Date 2022-01-28
First Publication Date 2023-08-03
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Liebinger Portela, Franz Friedrich
  • Campos Batista, David Alonso
  • Rakshit, Sarbajit K.

Abstract

Aspects of the present disclosure relate generally to three-dimensional (3D) printing and, more particularly, to robotic support for 3D prints. For example, a computer-implemented method includes identifying, by the computing device, at least one structure in the 3D object source file requiring support for printing the at least one structure by a 3D printer; adding, by the computing device, to a 3D print file an instruction to request deployment of a support structure at a particular location to support the at least one structure by the 3D printer; and providing to the 3D printer, by the computing device, the 3D print file with the instruction to request deployment of the support structure at a particular location to support the at least one structure by the 3D printer.

IPC Classes  ?

  • B29C 64/40 - Structures for supporting 3D objects during manufacture and intended to be sacrificed after completion thereof
  • B29C 64/393 - Data acquisition or data processing for additive manufacturing for controlling or regulating additive manufacturing processes
  • B33Y 50/02 - Data acquisition or data processing for additive manufacturing for controlling or regulating additive manufacturing processes
  • B33Y 10/00 - Processes of additive manufacturing
  • B33Y 30/00 - ADDITIVE MANUFACTURING, i.e. MANUFACTURING OF THREE-DIMENSIONAL [3D] OBJECTS BY ADDITIVE DEPOSITION, ADDITIVE AGGLOMERATION OR ADDITIVE LAYERING, e.g. BY 3D PRINTING, STEREOLITHOGRAPHY OR SELECTIVE LASER SINTERING - Details thereof or accessories therefor

19.

MASKED OVERLAY FOR CUSTOM REPOSITIONING OF INTERACTIVE OBJECTS ON A TOUCHSCREEN OF A COMPUTING DEVICE

      
Application Number 17588814
Status Pending
Filing Date 2022-01-31
First Publication Date 2023-08-03
Owner Kyndryl, Inc. (USA)
Inventor
  • Marzorati, Mauro
  • Fox, Jeremy R.
  • Hewitt, Trudy L.
  • Compton, Christian

Abstract

A method includes: receiving, by a computing device, user input defining a first location of a touchscreen of the computing device, the touchscreen displaying a user interface (UI) of an application; receiving, by the computing device, user input defining a second location of the touchscreen of the computing device; identifying, by the computing device, an interactive object of the UI at the first location; creating, by the computing device, an overlay including a copy of the interactive object and a masking object, the copy of the interactive object being at the second location and the masking object being at the first location; and causing, by the computing device, the touchscreen to display an output including the overlay superimposed over the UI.

IPC Classes  ?

  • G06F 3/04886 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus

20.

AUGMENTED USER AUTHENTICATION

      
Application Number 17591315
Status Pending
Filing Date 2022-02-02
First Publication Date 2023-08-03
Owner Kyndryl, Inc. (USA)
Inventor
  • Marzorati, Mauro
  • Llamas Virgen, Paul
  • Jaiswal, Priyansh
  • Jaiswal, Peeyush

Abstract

A computer-implemented method includes: setting up, by a computing device, an identification profile by capturing a first image using a camera of the computing device; requesting, by the computing device, an authentication action by an authentication device; comparing, by the computing device, recognized elements of the first image and a second image, the recognized elements of the first image and the second image including at least one of ephemeral features and transient features; determining, by the computing device, whether a confidence level is above a predetermined threshold based on a comparison of the recognized elements of the first image and the second image; and completing, by the computing device, authentication of the computing device with the authentication device in response to a determination that the confidence level is above the predetermined threshold.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
  • G06V 10/75 - Image or video pattern matching; Proximity measures in feature spaces using context analysis; Selection of dictionaries
  • G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions

21.

COMPUTING ENVIRONMENT PREDICTIVE PROVISIONING

      
Application Number 17581726
Status Pending
Filing Date 2022-01-21
First Publication Date 2023-07-27
Owner KYNDRYL, INC. (USA)
Inventor
  • Marzorati, Mauro
  • Whitman, Todd Russell
  • Fox, Jeremy R.
  • Bender, Michael
  • Rakshit, Sarbajit K.

Abstract

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: iteratively obtaining utilization parameter values from first to Nth edge computing environments, training one or more predictive model by machine learning using parameter values of the utilization parameter values obtained by the iteratively obtaining, wherein the training includes training a first computing environment predictive model with use of parameter values of the utilization parameters obtained from the first computing environment by the iteratively obtaining.

IPC Classes  ?

  • G06F 9/46 - Multiprogramming arrangements
  • G06F 30/27 - Design optimisation, verification or simulation using machine learning, e.g. artificial intelligence, neural networks, support vector machines [SVM] or training a model

22.

SELECTING THREE-DIMENSIONAL (3D) PRINTING TECHNIQUE AND LOCATION OF 3D-PRINTED SENSORS

      
Application Number 17585088
Status Pending
Filing Date 2022-01-26
First Publication Date 2023-07-27
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Rakshit, Sarbajit K.

Abstract

Aspects of the present disclosure relate generally to selecting a 3D printing technique and location of a sensor as part of a 3D object. For example, a computer-implemented method includes: receiving, by a computing device, a 3D print file specifying a 3D object for printing on a 3D printer; identifying, by the computing device, a technique for printing a sensor as part of the 3D object from a plurality of techniques for printing the sensor as part of the 3D object; determining, by the computing device, a location for printing the sensor as part of the 3D object; adding, by the computing device, the technique and the location for printing the sensor as part of the 3D object to the 3D print file; and sending to the 3D printer the 3D print file with the technique and the location for printing the sensor as part of the 3D object.

IPC Classes  ?

  • B29C 64/393 - Data acquisition or data processing for additive manufacturing for controlling or regulating additive manufacturing processes
  • G05B 19/4099 - Surface or curve machining, making 3D objects, e.g. desktop manufacturing
  • B33Y 50/02 - Data acquisition or data processing for additive manufacturing for controlling or regulating additive manufacturing processes

23.

LEDGER-BASED IMAGE DISTRIBUTION PERMISSION AND OBFUSCATION

      
Application Number 18128546
Status Pending
Filing Date 2023-03-30
First Publication Date 2023-07-27
Owner Kyndryl, Inc. (USA)
Inventor
  • Verma, Pramond
  • Gunjal, Richard Daniel

Abstract

Using an image analysis model within an image intended for distribution online, an image portion depicting personally identifiable information is identified, the personally identifiable information comprising image data usable to identify a specific individual. Using an online profile, a person depicted in the image portion is identified. A transaction is posted in a publicly-accessible distributed encrypted ledger, the transaction comprising an encrypted request to allow the image to be distributed online. According to a response to the request, the image portion is obfuscated, the obfuscating comprising altering data of the image portion, the altering making the image portion unusable to identify the person.

IPC Classes  ?

  • G06Q 50/00 - Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/60 - Protecting data
  • G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
  • G06F 18/22 - Matching criteria, e.g. proximity measures

24.

USAGE DEPENDENT USER PROMPTING

      
Application Number 17583820
Status Pending
Filing Date 2022-01-25
First Publication Date 2023-07-27
Owner KYNDRYL, INC. (USA)
Inventor
  • Miles, Caleb
  • Kwatra, Shikhar
  • Sivaswamy, Hemant Kumar
  • Patwardhan, Sachin Suhas

Abstract

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining clothing article data stream data from one or more internet of things (IoT) device disposed in a computing environment, wherein the computing environment is collocated with a residence of a user, the clothing article data stream data representing one or more clothing article of the user; examining data of the clothing article data stream data to determine at least one clothing article parameter value of the one or more clothing article; in dependence at least one clothing article parameter value of the one or more clothing article, and providing user profile data that specifies predicted behavior of the user.

IPC Classes  ?

  • D06F 34/28 - Arrangements for program selection, e.g. control panels therefor; Arrangements for indicating program parameters, e.g. the selected program or its progress
  • G06N 20/00 - Machine learning
  • D06F 34/08 - Control circuits or arrangements thereof
  • G06V 20/60 - Type of objects

25.

FILE REORGANIZATION

      
Application Number 17579372
Status Pending
Filing Date 2022-01-19
First Publication Date 2023-07-20
Owner Kyndryl, Inc. (USA)
Inventor Powell, James D.

Abstract

A method includes executing, by a computing device, a reorganization command within an environment; monitoring, by the computing device, unprocessed replication transactions within the environment; determining, by the computing device, whether the unprocessed replication transactions exceed a threshold; and pausing, by the computing device, the executing the reorganization command in response to determining the unprocessed replication transactions exceed the threshold.

IPC Classes  ?

  • G06F 16/178 - Techniques for file synchronisation in file systems
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems

26.

WORKING MEMORY MANAGEMENT

      
Application Number 17574643
Status Pending
Filing Date 2022-01-13
First Publication Date 2023-07-13
Owner Kyndryl, Inc. (USA)
Inventor
  • O'Connell, Brian M.
  • Corrao, Ann
  • Nasser, Samir
  • Fox, Jeremy R.

Abstract

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: predicting, with use of one or more predictive model, subsequent future state data of a computing node having an associated working memory, wherein the subsequent future state data specifies that a certain transaction currently uninvoked will be invoked by the computing node; prior to the invoking of the certain transaction, proactively establishing one or more control parameter value for controlling the working memory in dependence on the future state data; invoking the certain transaction in response to receipt, by the computing node, of transaction invoking request data for invoking the certain transaction; and executing the certain transaction in dependence on at least one control parameter value of the one or more control parameter value for controlling the working memory.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06N 5/02 - Knowledge representation; Symbolic representation

27.

SELF-LEARNING ONTOLOGY-BASED COGNITIVE ASSIGNMENT ENGINE

      
Application Number 18184938
Status Pending
Filing Date 2023-03-16
First Publication Date 2023-07-13
Owner KYNDRYL, INC. (USA)
Inventor
  • Malhotra, Nikhil
  • Mandal, Atri
  • Sridhara, Giriprasad
  • Ekambaram, Vijay

Abstract

A cognitive assignment engine (CAE) system attempts to infer semantic meaning from textual content of an incoming message in order to use the inferred meaning to assign the message to an appropriate responder. If the message contains insufficient textual content, the system identifies ontological structures comprised by the message's graphical content and classifies each structure as a function of the structure's location within the graphical content or of an intrinsic characteristic of the structure. The system then generates a message identifier by performing a computation on these classifications and uses the identifier to retrieve a previously stored graphical template that comprises ontological structures similar to those of the incoming message. The system associates the incoming message with a semantic meaning previously associated with the template, enabling the system to classify the message and to assign the message to the correct responder.

IPC Classes  ?

28.

AUTONOMOUS WEBPAGE CONTENT SUMMATION

      
Application Number 17572855
Status Pending
Filing Date 2022-01-11
First Publication Date 2023-07-13
Owner Kyndryl, Inc. (USA)
Inventor
  • Silverstein, Michael Seth
  • Silverstein, Zachary A.
  • Krishnan, Jayanth
  • Sugavanam, Krishnan

Abstract

A computer-implemented method includes: receiving, by a computing device, text extracted from a webpage in a browser and a Uniform Resource Locator (URL) of a linked webpage associated with the text; generating, by the computing device, questions based on the text; retrieving, by the computing device, content of the linked webpage using the URL; generating, by the computing device, answers to the questions using the retrieved content; and returning, by the computing device, the questions and the answers to the browser such that the browser displays the questions and the answers in the webpage.

IPC Classes  ?

  • G06F 16/9032 - Query formulation
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • G06F 16/2457 - Query processing with adaptation to user needs
  • G06F 16/9538 - Presentation of query results
  • G06F 40/253 - Grammatical analysis; Style critique
  • G06F 40/289 - Phrasal analysis, e.g. finite state techniques or chunking

29.

ARTIFICIAL INTELLIGENCE FOR ALLOCATION OF SECURE SHARED SPACES

      
Application Number 17565786
Status Pending
Filing Date 2021-12-30
First Publication Date 2023-07-06
Owner Kyndryl, Inc. (USA)
Inventor
  • Monge Nunez, Roxana
  • Kwatra, Shikhar

Abstract

A system and method for managing secure shared office space is provided. In embodiments, a method includes: receiving, by a computing device, a workspace request from a user, the workspace request including scheduling requirements for an activity; determining, by the computing device, security requirements associated with the workspace request utilizing a trained convoluted neural network (CNN) based on participant data including information regarding security requirements of the user and shared workspace information for a pool of shared workspaces; determining, by the computing device, that one or more of the shared workspaces in the pool of shared workspaces meets the security requirements associated with the workspace request; determining, by the computing device, that the one or more of the shared workspaces meets the scheduling requirements of the request; and automatically generating and sending, by the computing device, a notification to the user including the one or more of the shared workspaces.

IPC Classes  ?

30.

METHOD AND SYSTEM FOR TAPE STORAGE UTILIZATION

      
Application Number 17568937
Status Pending
Filing Date 2022-01-05
First Publication Date 2023-07-06
Owner Kyndryl, Inc. (USA)
Inventor Srivastava, Sanjay

Abstract

A method includes detecting, by a computing device, a plurality of transactions on one or more data storage system. The method further includes sequentially recording, by the computing device, the plurality of transactions occurring on the one or more data storage system in sequentially linked and immutable blocks.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

31.

Intelligent user centric design platform

      
Application Number 17565802
Grant Number 11748063
Status In Force
Filing Date 2021-12-30
First Publication Date 2023-07-06
Grant Date 2023-09-05
Owner KYNDRYL, INC. (USA)
Inventor
  • Manivasagam, Balasubramanian
  • Perumal Thevar, Muniyandi
  • Lavania, Sarita
  • Muthusamy, Thangadurai
  • Sakthimurugan, Arumugam

Abstract

An intelligent user centric design platform is provided. In implementations, a method includes: receiving, by a computing device, software design input from a user, the software design input including software domain information; sending, by the computing device, questions to the user selected from a database of predetermined questions based on the domain information; receiving, by the computing device, answers to the questions from the user, the answers including text information regarding design requirements of the user; determining, by the computing device, a proposed user-centric design (UCD) diagram by matching the answers to a stored UCD diagram in a repository using a supervised machine learning model; and presenting, by the computing device, the proposed UCD diagram in a user interface, wherein the user interface enables acceptance of the proposed UCD diagram or rejection of the proposed UCD diagram.

IPC Classes  ?

  • G06F 8/10 - Requirements analysis; Specification techniques
  • G06N 3/02 - Neural networks
  • G06F 8/20 - Software design
  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks

32.

CONTROLLING AUTONOMOUS VEHICLE FUNCTIONS

      
Application Number 17645793
Status Pending
Filing Date 2021-12-23
First Publication Date 2023-06-29
Owner KYNDRYL, INC. (USA)
Inventor
  • Marzorati, Mauro
  • Rodriguez Bravo, Cesar Augusto
  • Monge Nunez, Roxana
  • Srinivasan, Raghuram

Abstract

Controlling autonomous vehicle (AV) functions includes receiving occupant identification data from device(s) of an AV and identifying occupant(s) of the AV based on the received occupant identification data, determining a respective prioritization level for each occupant of the occupant(s), the prioritization level for each occupant dictating priority of the AV in performing commands provided to the AV by that occupant to control AV functions, receiving, from an occupant, input of a command for performance by the AV to control a function of the AV, determining whether to perform the command to control the function of the AV based on the prioritization level for the occupant, and performing processing based on the determining whether to perform the command.

IPC Classes  ?

  • B60W 50/00 - CONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT - Details of control systems for road vehicle drive control not related to the control of a particular sub-unit
  • B60W 40/08 - Estimation or calculation of driving parameters for road vehicle drive control systems not related to the control of a particular sub-unit related to drivers or passengers
  • B60W 60/00 - Drive control systems specially adapted for autonomous road vehicles
  • G06N 20/00 - Machine learning

33.

COGNITIVE SELECTION OF COMPOSITE SERVICES

      
Application Number 17563113
Status Pending
Filing Date 2021-12-28
First Publication Date 2023-06-29
Owner KYNDRYL, INC. (USA)
Inventor
  • Sastry, Shashidhar
  • Chenny, Rahul

Abstract

A method includes receiving training inputs related to technology use cases and associated services, training, by a cognitive integration engine a cognitive model from the received training inputs, receiving a demand for composite services from a customer including functional and/or non-functional requirements, determining, by the cognitive integration engine, a selection of composite services for the customer based on the cognitive model, and recommending the selection of composite services to the customer.

IPC Classes  ?

34.

RECOMMENDING AND PERFORMING PERSONALIZED COMPONENT ARRANGEMENTS

      
Application Number 17563332
Status Pending
Filing Date 2021-12-28
First Publication Date 2023-06-29
Owner Kyndryl, Inc. (USA)
Inventor Habiba, Mansura

Abstract

From within a database, a first set of component arrangements corresponding to an input set of components are identified. Based on component usage data corresponding to the set of components, the first set of component arrangements is filtered, resulting in a second set of component arrangements. Component usage data is determined by classifying a component according to a usage classification. Based on context data corresponding to the set of components, the second set of component arrangements is filtered, resulting in a third set of component arrangements. Context data is determined by classifying a component according to a context classification. The third set of component arrangements is ranked according to a set of preferences output from a recommendation model. The set of components is arranged according to a ranked component arrangement in the ranked set of component arrangements.

IPC Classes  ?

  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 16/9035 - Filtering based on additional data, e.g. user or group profiles
  • G06N 20/00 - Machine learning
  • G06F 16/906 - Clustering; Classification

35.

DEBRIS SIGNATURE-BASED ROBOTIC CLEANING DEVICE NAVIGATION

      
Application Number 17645488
Status Pending
Filing Date 2021-12-22
First Publication Date 2023-06-22
Owner KYNDRYL, INC. (USA)
Inventor
  • Miles, Caleb
  • Kwatra, Shikhar
  • Ekambaram, Vijay
  • Seshadri, Padmanabha Venkatagiri

Abstract

Debris signature-based robotic cleaning device navigation includes operating the robotic cleaning device in a first mode as part of a vacuum cycle, the device including suction ports configurable for different suction power levels and each port having a suction path along which debris entering through the suction port is collected by the device. In the first operating mode the suction ports are operated at a first suction power level. The navigation also includes changing operation of the device to a second mode and in which the suction ports are operated at a greater suction power, measuring a respective amount of debris collected through each suction port, and selecting a direction in which to navigate the robotic cleaning device based on the debris measurements.

IPC Classes  ?

  • A47L 9/28 - Installation of the electric equipment, e.g. adaptation or attachment to the suction cleaner; Controlling suction cleaners by electric means
  • G05D 1/02 - Control of position or course in two dimensions

36.

AUGMENTED-REALITY OBJECT LOCATION-ASSIST SYSTEM

      
Application Number 17552459
Status Pending
Filing Date 2021-12-16
First Publication Date 2023-06-22
Owner Kyndryl, Inc. (USA)
Inventor
  • Wisnewski, Benjamin C.
  • Corette, Aaron Thomas
  • Litvinenko, Maxim Y.
  • Estep, Greg Reed

Abstract

Data-analysis-based processing facilitates providing augmented-reality object location assistance. The processing includes obtaining a user-request related to facilitating locating an object of interest, and identifying a target area containing the object. Further, the process includes providing augmentation data for rendering as an overlay on a user-device to assist in directing the user to the target area containing the object. The augmentation data being provided is dynamically changed as the user-device is moved in relation to the target area containing the object to assist the user in locating the object within the target area.

IPC Classes  ?

  • G06V 20/20 - Scenes; Scene-specific elements in augmented reality scenes
  • G06V 10/25 - Determination of region of interest [ROI] or a volume of interest [VOI]
  • G06N 20/00 - Machine learning
  • G06T 19/00 - Manipulating 3D models or images for computer graphics

37.

MACHINE PERFORMANCE IDENTIFICATION AND ISSUE WORKAROUND

      
Application Number 17553076
Status Pending
Filing Date 2021-12-16
First Publication Date 2023-06-22
Owner Kyndryl, Inc. (USA)
Inventor
  • Rakshit, Sarbajit K.
  • Nanduru, Laxmikantha Sai
  • Arora, Pritpal

Abstract

A method includes identifying, by a computing device, activities of a machine using a digital twin of a machine; running, by the computing device, simulations of the activities on the digital twin; determining, by the computing device, a performance issue in the machine using the simulations; and deploying, by the computing device, a capability to address the performance issue.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06N 20/00 - Machine learning
  • G06F 30/27 - Design optimisation, verification or simulation using machine learning, e.g. artificial intelligence, neural networks, support vector machines [SVM] or training a model

38.

MACHINE LEARNING MODEL-BASED, OVERHEAD LINE BREAKAGE PREDICTION SYSTEM

      
Application Number 17555780
Status Pending
Filing Date 2021-12-20
First Publication Date 2023-06-22
Owner Kyndryl, Inc. (USA)
Inventor
  • Suto, Tiberiu
  • Welch, Jessika Ann

Abstract

Data analysis-based line breakage prediction is provided, which includes providing a machine learning model trained to, at least in part, facilitate minimizing downtime within a network that includes an overhead line. Tensile-related data for the overhead line is obtained, and the machine learning model analyzes relevant data for the overhead line, including the tensile-related data for the overhead line, and generates a probability of breakage score for the overhead line based on the relevant data, including the tensile-related data. An action is initiated, using the machine learning model, to minimize downtime within the network based, at least in part, on the generated probability of breakage score for the overhead line.

IPC Classes  ?

  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

39.

ELECTRIC VEHICLE CHARGING RESERVATION TIMESLOT REALLOCATION

      
Application Number 17643671
Status Pending
Filing Date 2021-12-10
First Publication Date 2023-06-15
Owner KYNDRYL, INC. (USA)
Inventor
  • Suto, Tiberiu
  • Kwatra, Shikhar
  • Valecha, Vinod A.
  • Patwardhan, Sachin S.

Abstract

Electric vehicle charging reservation timeslot reallocation includes determining, in connection with an electric vehicle (EV) traveling to a destination, arrival parameters of the EV to arrive at the destination and a charging requirement of the EV to reach the destination within the arrival parameters, identifying reserved charging reservation timeslot(s) at EV charging station(s) along a route to the destination that satisfy the arrival parameters and charging requirement of the EV, determining, using an AI model configured to determine reallocations of charging reservations at electric vehicle charging stations, a proposed reallocation of a reserved charging reservation timeslot of the reserved charging reservation timeslot(s), the reserved charging reservation timeslot owned by an entity, and the proposed reallocation comprising a proposal for the entity to give up at least a portion of the reserved charging reservation timeslot to charge the EV, and electronically offering the proposed reallocation to the entity.

IPC Classes  ?

  • B60L 53/66 - Data transfer between charging stations and vehicles
  • G06Q 10/02 - Reservations, e.g. for tickets, services or events
  • G06Q 50/06 - Electricity, gas or water supply

40.

CARBON COST LOGISTICS SYSTEM

      
Application Number 17546301
Status Pending
Filing Date 2021-12-09
First Publication Date 2023-06-15
Owner Kyndryl, Inc. (USA)
Inventor
  • Kronstadt, Andrew S.
  • Reyes, Joseph
  • Formato, Marci Devorah
  • Klingenberg, Bernhard Julius
  • Szkatulski, Jennifer L.

Abstract

A carbon cost logistics system is provided which uses supply-chain-based data-analysis to determine, at least in part, a carbon logistics cost for each item of multiple items, and based on the determined carbon logistics costs, identifies a lowest carbon logistics cost item of the multiple items. The system further determines whether the lowest carbon logistics cost item of the multiple items meets one or more user-specified constraints, and based on the lowest carbon logistics cost item meeting the user-specified constraint(s), initiates an action to obtain the lowest carbon logistics cost item.

IPC Classes  ?

  • G06Q 10/08 - Logistics, e.g. warehousing, loading or distribution; Inventory or stock management

41.

PERSONAL-PUBLIC SERVICE SET IDENTIFIERS

      
Application Number 18106730
Status Pending
Filing Date 2023-02-07
First Publication Date 2023-06-15
Owner Kyndryl, Inc. (USA)
Inventor
  • Kwatra, Shikhar
  • Gan, Seng Chai
  • Flack, Charles Kenneth
  • Griffin, Adam Lee

Abstract

Embodiments are directed to techniques for secure network connectivity. The techniques including a system having a credential server storing a Personal-Public (PP) Service Set. Identifier (SSID) profile configured according to registration information provided from a personal computing device. The system further including a Wireless Access Point (WAP) communicatively coupled to the credential server and configured to implement a PP SSID connection using the PP SSID profile to create a single-device, single-use, password-protected, unadvertised, and encrypted networking channel between the personal computing device and the Internet.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
  • H04W 48/20 - Selecting an access point
  • H04W 76/11 - Allocation or use of connection identifiers
  • H04W 76/38 - Connection release triggered by timers

42.

DATA-ANALYSIS-BASED NAVIGATION SYSTEM ASSISTANCE

      
Application Number 17543853
Status Pending
Filing Date 2021-12-07
First Publication Date 2023-06-08
Owner KYNDRYL, INC. (USA)
Inventor
  • Patel, Vidula M.
  • Kwatra, Shikhar
  • Conley, Kristen
  • Black, Erick

Abstract

Data-analysis-based processing is provided to detect that a potential traffic event identified by a navigation system for a travel route is FALSE. The processing obtains movement data from multiple devices associated with one or more vehicles passing along the travel route in the vicinity of the potential traffic event, where the multiple devices are multiple electronic devices with Global Positioning System (GPS) capability, and obtains, based on the movement data, relative movement data between devices of the multiple devices associated with the one or more vehicles. Based at least in part on the relative movement data between devices of the multiple devices, the processing ascertains that the detected potential traffic event is FALSE, and initiates an action based on determining that the detected potential travel event is a FALSE traffic event.

IPC Classes  ?

43.

DYNAMIC DISPLAY FOR IMAGE-ENABLED CLOTHING

      
Application Number 17544020
Status Pending
Filing Date 2021-12-07
First Publication Date 2023-06-08
Owner Kyndryl, Inc. (USA)
Inventor
  • Childress, Rhonda L.
  • Daley, Stan Kevin
  • Fox, Jeremy R.
  • Bender, Michael

Abstract

Systems and methods provide dynamic adjustment of content displayed on image-enabled clothing articles to address obstructed visibility of the content. In embodiments a method includes determining, by a computing device, movement of at least a portion of an image-enabled clothing article based on real-time sensor data from sensors of the image-enabled clothing article; determining, by the computing device, that a view of at least a portion of image content displayed on the image-enabled clothing article is obstructed based on the determined movement, parameters of the image-enabled clothing article and image display information of the image-enabled clothing article; and generating, by the computing device, image instructions that cause the display of the image content on the image-enabled clothing article to move from a first area of the image-enabled clothing article to a second area of the image-enabled clothing article.

IPC Classes  ?

  • G09G 3/32 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes for presentation of an assembly of a number of characters, e.g. a page, by composing the assembly by combination of individual elements arranged in a matrix using controlled light sources using electroluminescent panels semiconductive, e.g. using light-emitting diodes [LED]
  • A41D 27/08 - Trimmings; Ornaments

44.

TRANSFORMATION OF A COMPUTING ENVIRONMENT FROM ONE TECHNOLOGICAL STATE TO ANOTHER TECHNOLOGICAL STATE

      
Application Number 17643012
Status Pending
Filing Date 2021-12-07
First Publication Date 2023-06-08
Owner KYNDRYL, INC. (USA)
Inventor
  • Nanduru, Laxmikantha Sai
  • Zolotow, Clea
  • Dagley, Robert
  • Drouet, Nick
  • Narigapalli, Anil Kumar
  • Mcconnell, Sam

Abstract

A computing environment is transformed from one technological state to another technological state. Data relating to the computing environment is obtained, and the data includes life-cycle information of one or more computing resources of the computing environment and one or more requests of an entity to use the computing environment. Based at least on the data that is obtained, a plurality of sets of transformation tasks to be used to transform a selected infrastructure of the computing environment from one technological state to another technological state is automatically derived. Based on at least one set of transformation tasks of the plurality of sets of transformation tasks, one or more actions is taken to transform the selected infrastructure from the one technological state to the other technological state.

IPC Classes  ?

45.

ENFORCING MULTI-OWNERSHIP OF DATA ON STORAGE

      
Application Number 17536943
Status Pending
Filing Date 2021-11-29
First Publication Date 2023-06-01
Owner Kyndryl, Inc. (USA)
Inventor
  • Rao, Dwarkanath P.
  • Bacher, Utz

Abstract

A computer-implemented method for providing a secure data access service that encrypts data is disclosed. The method includes: wrapping a data encryption key by at least two customer root keys, wherein the at least two customer root keys are assigned to different user identifiers, and wherein the at least two customer root keys are stored in different hardware security modules, and wherein a wrapping structure for the at least two customer root keys is applied according to an access policy that defines which of the assigned user identifiers must concur to enable a data access to the encrypted data by the secure data access service; and encrypting the data by the secure data access service using the unwrapped data encryption key.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

46.

APPLICATION SECURITY SCORING

      
Application Number 17538358
Status Pending
Filing Date 2021-11-30
First Publication Date 2023-06-01
Owner Kyndryl, Inc. (USA)
Inventor
  • Govindasamy, Duraimurugan
  • Kumar, Kavitha Suresh
  • Ramachandran, Puthukode G.

Abstract

A method includes receiving, by a computing device, metrics identifying vulnerabilities in an application; collecting, by the computing device, information related to the vulnerabilities; assigning, by the computing device, weights to the metrics using collected information; applying, by the computing device, a machine learning model on the weighted metrics; and generating, by the computing device, a predictive score for the vulnerabilities using the machine learning model.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 20/00 - Machine learning
  • G06F 9/54 - Interprogram communication

47.

Virtual three-dimensional holographic safety gate

      
Application Number 17548965
Grant Number 11663895
Status In Force
Filing Date 2021-12-13
First Publication Date 2023-05-30
Grant Date 2023-05-30
Owner Kyndryl, Inc. (USA)
Inventor
  • Marzorati, Mauro
  • Fox, Jeremy R.
  • Regan, James Edward
  • Rakshit, Sarbajit K.

Abstract

A method includes: determining, by a computing device, an operating condition of a machine in an industrial environment; determining, by the computing device, a hazard based on the operating condition; determining, by the computing device, one or more safety precautions based on the hazard; generating, by the computing device, a virtual three-dimensional holographic safety gate around the machine based on the one or more safety precautions.

IPC Classes  ?

  • G09G 3/00 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G08B 21/02 - Alarms for ensuring the safety of persons
  • G08B 5/22 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission

48.

Protecting Sensitive Data

      
Application Number 18095442
Status Pending
Filing Date 2023-01-10
First Publication Date 2023-05-25
Owner Kyndryl, Inc. (USA)
Inventor
  • Sreedhar, Vugranam C.
  • Venkateswaran, Sreekrishnan
  • Jutla, Charanjit Singh

Abstract

An example operation may include one or more of capturing a current version of sensitive data by a data processor node, hashing, by the data processor node, the current version of the sensitive data, storing, by the data processor node, a hash of the current version of the sensitive data on a first blockchain, encrypting, by the data processor node, the current version of the sensitive data using a secret key, and storing the encrypted current version of the sensitive data on a second blockchain.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/08 - Key distribution
  • G06F 16/23 - Updating
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

49.

System to prevent full ATM enclosure skimming attacks

      
Application Number 17681014
Grant Number 11657681
Status In Force
Filing Date 2022-02-25
First Publication Date 2023-05-23
Grant Date 2023-05-23
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Toska, Desilda
  • Campos Batista, David Alonso

Abstract

A computer-implemented method includes: receiving by a skimming prevention system operatively coupled to a machine, a plurality of sound data from a plurality of corresponding sound sensors operatively coupled to the machine; identifying by the skimming prevention system, a type of user action input of the machine; retrieving by the skimming prevention system from a storage system operatively coupled to the machine, a baseline acoustic signature associated with the machine and corresponding to the type of user action input; comparing by the skimming prevention system, the received plurality of sound data to the baseline acoustic signature associated with the machine and corresponding to the type of user action input; and in response to a determination that the compared plurality of sound data and the baseline acoustic signature differ more than a predetermined threshold, triggering by the skimming prevention system, an execution/alert mode of the machine.

IPC Classes  ?

  • G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
  • G01N 29/14 - Investigating or analysing materials by the use of ultrasonic, sonic or infrasonic waves; Visualisation of the interior of objects by transmitting ultrasonic or sonic waves through the object using acoustic emission techniques

50.

SOCIAL NETWORK ADAPTED RESPONSE

      
Application Number 17452895
Status Pending
Filing Date 2021-10-29
First Publication Date 2023-05-04
Owner KYNDRYL, INC. (USA)
Inventor
  • Patel, Pritesh
  • Kwatra, Shikhar
  • Silverstein, Zachary A.
  • Szkatulski, Jennifer L.

Abstract

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining social network data of a user, wherein the social network data specifies social network connections of the user; obtaining from the user voice data defining a vocal utterance request of the user; converting the voice data defining the vocal utterance request of the user into a text based message; subjecting the text based message to natural language processing; determining a response message to the vocal utterance request of the user, wherein the determining the response data to the vocal utterance request of the user is performed in dependence on the examining of the social network data of the user; and presenting the response message to the user.

IPC Classes  ?

  • G06F 40/35 - Discourse or dialogue representation
  • H04L 12/58 - Message switching systems
  • G06F 40/253 - Grammatical analysis; Style critique
  • G06F 40/117 - Tagging; Marking up ; Designating a block; Setting of attributes
  • G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
  • G10L 15/18 - Speech classification or search using natural language modelling
  • G06F 40/166 - Editing, e.g. inserting or deleting
  • G06F 40/279 - Recognition of textual entities

51.

CARBON FOOTPRINT-BASED CONTROL OF CLOUD RESOURCE CONSUMPTION

      
Application Number 17513992
Status Pending
Filing Date 2021-10-29
First Publication Date 2023-05-04
Owner KYNDRYL, INC. (USA)
Inventor
  • Wong, Kim Poh
  • Bouz, Firas
  • Nagar, Seema
  • Vadayadiyil Raveendran, Pramod

Abstract

An approach is provided for determining a carbon footprint-based consumption of cloud resources. Cloud resource requirements and a carbon footprint cap of a workload of a cloud consumer are received. The requirements and cap are based on a sustainability target, published by the cloud consumer, and subscribed by cloud service providers. A list of cloud resources that satisfy the requirements are sent. Carbon emission values of the cloud resources at different load levels of the workload are sent. Based on a service level agreement requirement, a criticality level, and a peak load duration of the workload, and previous success rates of satisfying cloud resource requirements by cloud service providers, an optimized configuration of cloud resource(s) and cloud service provider(s) is selected. The cloud resource(s) are selected from the list and have a carbon footprint that does not exceed the cap at a given load level.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06Q 30/00 - Commerce
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

52.

INPUT/OUTPUT INTERFACE SECURITY

      
Application Number 17515365
Status Pending
Filing Date 2021-10-29
First Publication Date 2023-05-04
Owner KYNDRYL, INC. (USA)
Inventor Rodriguez Bravo, Cesar Augusto

Abstract

Methods, computer program products, and systems are presented. The Methods, computer program products, and systems can include, for example: examining hardware device transmitted data received through an I/O interface port of a computer system; determining in dependence on the examining whether the hardware device transmitted data received through the I/O interface port of the computer system satisfies a criterion; and in response to determining that the hardware device transmitted data received through the I/O interface port of the computer system satisfies the criterion, initiating a security process for protecting the computer system.

IPC Classes  ?

  • G06F 21/85 - Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
  • G06F 21/81 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

53.

SERVICE SET IDENTIFIER ALIAS SECURITY AND TRACKING

      
Application Number 17513485
Status Pending
Filing Date 2021-10-28
First Publication Date 2023-05-04
Owner KYNDRYL, INC. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Ramadhane, Mohamed Zouhaier
  • Campos Batista, David Alonso
  • Toska, Desilda

Abstract

A method includes generating, by a computing device, SSID aliases; propagating, by the computing device, the SSID aliases to access points; receiving, by the computing device, data from an access point, the data including a selected SSID alias and a media access control (MAC) address of a user device; creating, by the computing device, a record containing the selected SSID alias and the MAC address of the user device; propagating, by the computing device, the selected SSID alias to remaining access points; and sending, by the computing device, a message to the access points to delete the selected SSID alias after a time period.

IPC Classes  ?

54.

INTELLIGENT LOCKING OF DISPLAY DEVICES FOR REMOTE USE

      
Application Number 17514119
Status Pending
Filing Date 2021-10-29
First Publication Date 2023-05-04
Owner Kyndryl, Inc. (USA)
Inventor
  • Devendran, Saravanan
  • Muthusamy, Thangadurai

Abstract

A method, computer program product, and system include a processor(s) that continuously obtains data from the one or more sensor devices, generating, from the data, frames comprising images, identifies, utilizing the frames, entities within a pre-defined vicinity of a visual display unit at a first time, determines, based on applying the classification model, if each identified entity of the identified entities within the pre-defined vicinity at the first time is objectionable. When the processor(s) determined that at least one identified entity is objectionable, the processor(s) initiates a security action on the visual display unit to prevents the objectionable identified entity from viewing the content on the visual display unit.

IPC Classes  ?

  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06T 7/70 - Determining position or orientation of objects or cameras
  • G09G 3/20 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes for presentation of an assembly of a number of characters, e.g. a page, by composing the assembly by combination of individual elements arranged in a matrix
  • G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors

55.

NON-GPS BASED NAVIGATION AND MAPPING BY AUTONOMOUS VEHICLES

      
Application Number 17507298
Status Pending
Filing Date 2021-10-21
First Publication Date 2023-04-27
Owner KYNDRYL, INC. (USA)
Inventor
  • Bajsarowicz, Malwina
  • Aldridge, Mary Kathryn
  • Luong, Thuy
  • Cleaver, James David
  • Mcguire, Michael James

Abstract

Systems and methods enable autonomous vehicles to navigate and generate maps in a GPS-free environment. In embodiments, a method includes: continuously obtaining real-time environment data from one or more sensing devices of the autonomous vehicle during a navigation event in an exploration area; identifying physical attributes of the exploration area based on the real-time environmental data; navigating within the exploration area during the navigation event using machine learning by: assigning scores to multiple possible paths based on a probability of success of one or more desired outcomes for each of the possible paths; selecting one of the possible paths based on the scores; and moving the autonomous vehicle according to the selected one of the possible paths; and building a navigation map of the exploration area based on the physical attributes.

IPC Classes  ?

  • G05D 1/02 - Control of position or course in two dimensions
  • B60W 60/00 - Drive control systems specially adapted for autonomous road vehicles
  • G01C 21/00 - Navigation; Navigational instruments not provided for in groups

56.

KEYPAD SECURITY

      
Application Number 17508023
Status Pending
Filing Date 2021-10-22
First Publication Date 2023-04-27
Owner KYNDRYL, INC. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Garcia Delgado, Carolina
  • Campos Batista, David Alonso
  • Toska, Desilda

Abstract

A method for detecting a fake keypad includes: monitoring outputs of plural magnetic field sensors connected to a keypad; detecting the output of at least one of the magnetic field sensors indicates the presence of a magnetic field; starting, in response to the detecting, a timer; determining the first timer reaches a first threshold while the output of the at least one of the magnetic field sensors still indicates the presence of a magnetic field; in response to the timer reaching the first threshold, determining a number of the magnetic field sensors whose output indicates the presence of a magnetic field equals or exceeds a second threshold; in response to the number of the magnetic field sensors equaling or exceeding the second threshold, determining a security action; and initiating the security action.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

57.

CARD SKIMMING DETECTION

      
Application Number 17508271
Status Pending
Filing Date 2021-10-22
First Publication Date 2023-04-27
Owner KYNDRYL, INC. (USA)
Inventor
  • Ramadhane, Mohamed Zouhaier
  • Rodriguez Bravo, Cesar Augusto
  • Toska, Desilda
  • Campos Batista, David Alonso

Abstract

A method includes: monitoring outputs of sensors in a machine that receives magnetic stripe cards; determining the outputs of sensors indicate normal usage of the machine or abnormal usage of the machine; in response to determining the outputs of the sensors indicate abnormal usage of the machine, initiating a security action; in response to determining the outputs of the sensors indicate normal usage of the machine, determining the machine is in use or not in use; in response to determining the machine is not in use, initiating the security action; in response to determining the machine is in use, determining whether the use ends within a predefined monitor time; in response to determining the use does not end within the predefined monitor time, initiating the security action; and in response to determining the use does end within the predefined monitor time, returning to monitoring the outputs of the sensors.

IPC Classes  ?

  • G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
  • G06Q 20/10 - Payment architectures specially adapted for home banking systems

58.

SECURITY FOR USB-BASED DEVICE CONFIGURATION

      
Application Number 17508490
Status Pending
Filing Date 2021-10-22
First Publication Date 2023-04-27
Owner KYNDRYL, INC. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Garcia Delgado, Carolina
  • Toska, Desilda
  • Marzorati, Mauro

Abstract

A universal serial bus device, including: a main body; a connection portion attached to the main body; a processor; a storage portion storing a hash function executable by the processor, the hash function producing a hash value; a non-changing visual code on the main body, the visual code being readable by an optical scanner and corresponding to the hash function; and an electronic display configured to display the hash value.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06F 13/38 - Information transfer, e.g. on bus
  • G06F 13/42 - Bus transfer protocol, e.g. handshake; Synchronisation
  • G06K 7/14 - Methods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light

59.

GATHERING UNIVERSAL SERIAL BUS THREAT INTELLIGENCE

      
Application Number 17509228
Status Pending
Filing Date 2021-10-25
First Publication Date 2023-04-27
Owner KYNDRYL, INC. (USA)
Inventor Rodriguez Bravo, Cesar Augusto

Abstract

A method includes: detecting, by a computing device, connection of a universal serial bus device to a computer; determining, by the computing device, that the computer is in a locked mode; detecting, by the computer device, input to the computer within a predetermined time of detecting the connection; determining, by the computing device as a result of the computer being locked and detecting the input, that the input is a threat to the computer; creating, by the computing device, a temporary virtual environment; receiving, by the computing device, the input into the temporary virtual environment; processing, by the computing device, the input in the temporary virtual environment; and recording, by the computing device, information related to the input.

IPC Classes  ?

  • G06F 21/82 - Protecting input, output or interconnection devices
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 13/38 - Information transfer, e.g. on bus

60.

VIDEO CONFERENCE VERBAL JUNCTION IDENTIFICATION VIA NLP

      
Application Number 17509992
Status Pending
Filing Date 2021-10-25
First Publication Date 2023-04-27
Owner KYNDRYL, INC. (USA)
Inventor
  • O'Connell, Brian M.
  • Silverstein, Zachary A.
  • Lyons, Michael John
  • Fox, Jeremy R.

Abstract

A computer-implemented system, method, and computer program product are described that predicts a time in which a participant of a group of participants may speak in a group meeting. The prediction is based in part on latency between each participant in the group of participants and learned voice patterns of each respective participant. Once a prediction is determined, a cue to speak or remain silent is provided as one of a visual or aural cue to the participant to speak during the group meeting. Predicting a time in which the participant of a group of participants may speak includes training a lingual processing model iteratively for each respective participant to learn voice patterns of participants.

IPC Classes  ?

  • G10L 17/06 - Decision making techniques; Pattern matching strategies
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G10L 17/22 - Interactive procedures; Man-machine interfaces

61.

DYNAMIC INPUT SYSTEM FOR SMART GLASSES BASED ON USER AVAILABILITY STATES

      
Application Number 17508005
Status Pending
Filing Date 2021-10-22
First Publication Date 2023-04-27
Owner KYNDRYL, INC. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Rakshit, Sarbajit K.
  • Flemming, Diane G.

Abstract

A dynamic user interface (UI) input system and method for smart glasses based on availability states of a user is provided. In embodiments, a method includes determining, by a computing device of smart glasses, an initial availability state of a user's hands for a user interface (UI) navigation event based on incoming image data; selecting, by the computing device, a UI configuration and a control profile for the UI navigation event from stored UI configurations and control profiles of the user based on the initial availability state of the user's hands; and initiating, by the computing device, the UI navigation event based on the selected UI configuration and the control profile, wherein content is displayed in a virtual UI of the smart glasses according to the UI configuration, and UI navigation by the user is controlled based on the control profile.

IPC Classes  ?

  • G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G02B 27/01 - Head-up displays
  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G06N 20/00 - Machine learning

62.

CARD SKIMMING DETECTION

      
Application Number 17508081
Status Pending
Filing Date 2021-10-22
First Publication Date 2023-04-27
Owner KYNDRYL, INC. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Ramadhane, Mohamed Zouhaier
  • Toska, Desilda

Abstract

A computer-implemented method includes: monitoring, by a computing device, outputs of sensors associated with a machine that receives magnetic stripe cards; in response to the monitoring, detecting, by the computing device, the output of at least one of the sensors indicates an event; in response to the detecting the event, determining, by the computing device, a number of the sensors whose output indicates a respective event during a predefined time period; selecting, by the computing device, a security action from a plurality of predefined security actions based on the determined number of the sensors whose output indicates a respective event during the predefined time period; and initiating, by the computing device, the security action.

IPC Classes  ?

  • G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
  • G06Q 20/10 - Payment architectures specially adapted for home banking systems

63.

GESTURE-BASED CONTROL OF PLURAL DEVICES IN AN ENVIRONMENT

      
Application Number 17509568
Status Pending
Filing Date 2021-10-25
First Publication Date 2023-04-27
Owner KYNDRYL, INC. (USA)
Inventor
  • Marzorati, Mauro
  • Whitman, Todd Russell
  • Fox, Jeremy R.
  • Rakshit, Sarbajit K.

Abstract

A computer-implemented method includes: predicting, by a computing device, devices for inclusion in an interface; generating, by the computing device, the interface including areas corresponding to the devices; detecting, by the computing device, a user selection of one of the areas of the interface; detecting, by the computing device, a hand gesture associated with the selected one of the areas; and transmitting, by the computing device, data defining the hand gesture to a respective one of the devices corresponding to the selected one of the areas, thereby causing the respective one of the devices to execute a command based on the hand gesture.

IPC Classes  ?

  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06F 9/451 - Execution arrangements for user interfaces

64.

WORKLOAD MIGRATION

      
Application Number 17509680
Status Pending
Filing Date 2021-10-25
First Publication Date 2023-04-27
Owner KYNDRYL, INC. (USA)
Inventor
  • Kinnaird, Douglas Gordon
  • Zolotow, Clea
  • Habiba, Mansura
  • Göçülü, Hasibe
  • Toussaint, Neil
  • Bezerra Maimoni, Ana Maria

Abstract

Embodiments of the present invention provide concepts for identifying an edge computing environment location as a target for workload migration. For example, embodiments may provide for a machine-learning algorithm to be trained to predict or suggest the most appropriate edge location for migrating a workload. Using a description of a workload, the machine-learning algorithm may predict/suggest one or more edge locations.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06N 20/00 - Machine learning

65.

DYNAMIC DEVICE CONFIGURATION

      
Application Number 17509804
Status Pending
Filing Date 2021-10-25
First Publication Date 2023-04-27
Owner KYNDRYL, INC. (USA)
Inventor
  • Plant, Laurence John
  • Moros Ortiz, Jorge Andres
  • Mirmomeni, Mahtab
  • Pervin, Shaila
  • Garnavi, Rahil

Abstract

A method includes receiving, by a computing device, device information for a user device and user environment devices; sending, by the computing device, image templates to the user device using the device information; adjusting, by the computing device, device settings on the user device and the user environment devices in response to a selection of an image template of the image templates; receiving, by the computing device, an image from the user device; comparing, by the computing device, the image to a target image; determining, by the computing device, the image is acceptable; and in response to determining the image is acceptable, sending, by the computing device, the acceptable image to a third party.

IPC Classes  ?

  • G06T 7/00 - Image analysis
  • G06N 5/04 - Inference or reasoning models
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]

66.

Deep packet analysis

      
Application Number 18084798
Grant Number 11757912
Status In Force
Filing Date 2022-12-20
First Publication Date 2023-04-20
Grant Date 2023-09-12
Owner KYNDRYL, INC. (USA)
Inventor
  • Udupi Raghavendra, Arjun
  • Scheideler, Tim Uwe
  • Seul, Matthias

Abstract

A computer-implemented method for protecting a processing environment from malicious incoming network traffic may be provided. The method comprises: in response to receiving incoming network traffic comprising a data packet, performing a packet and traffic analysis of the data packet to determine whether said data packet is non-malicious and malicious, and processing of the data packet in a sandbox environment. Furthermore, the method comprises: in response to detecting that the data packet is non-malicious based on the packet and traffic analysis, releasing the processed data packet from the sandbox environment for further processing in the processing environment, and in response to detecting that the data packet is malicious based on the packet and traffic analysis discarding the data packet.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • H04L 47/31 - Flow control; Congestion control by tagging of packets, e.g. using discard eligibility [DE] bits
  • H04L 47/32 - Flow control; Congestion control by discarding or delaying data units, e.g. packets or frames
  • H04L 49/9005 - Buffering arrangements using dynamic buffer space allocation
  • H04L 41/14 - Network analysis or design

67.

SECURITY FOR CONNECTED DEVICES

      
Application Number 17502240
Status Pending
Filing Date 2021-10-15
First Publication Date 2023-04-20
Owner KYNDRYL, INC. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Toska, Desilda
  • Flores, Romelia H.

Abstract

A method includes: receiving, by a computer device and from an automated teller machine, a personal identification number that is associated with an account; determining, by the computer device, that the personal identification number is a disablement personal identification number that is associated with the account, the account having an activation personal identification number, the disablement personal identification number and the activation personal identification number being different; determining, by the computer device and as a result of receiving the disablement personal identification number, at least one disablement action to be performed by a device other than the automated teller machine; and transmitting, by the computer device, a command to perform the disablement action.

IPC Classes  ?

  • G06Q 20/10 - Payment architectures specially adapted for home banking systems

68.

AUTOMATED WORKFLOW ANALYSIS AND SOLUTION IMPLEMENTATION

      
Application Number 17502679
Status Pending
Filing Date 2021-10-15
First Publication Date 2023-04-20
Owner KYNDRYL, INC. (USA)
Inventor
  • Porto Guedes, Gustavo
  • Machado De Campos, Larissa Lara
  • Domingos, Grasiele
  • Dias Generoso, Tiago

Abstract

Systems and methods enable automated workflow analysis implementations of solutions. In embodiments, a method includes: aggregating input data from an environment from multiple data sources; automatically identifying a problem in a workflow implemented in the environment by processing and analyzing the workflow based on the aggregated input data; automatically determining solutions to the problem in the workflow using at least one iteratively trained machine learning model to analyze the processed input data, including: identifying characteristics of the workflow; identifying one or more candidate solutions based on the characteristics; ranking the one or more candidate solutions; and determining the one or more solutions to the problem based on the ranking; and automatically implementing at least one of the one or more solutions to address the problem in the workflow, thereby creating an updated workflow in the environment.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06N 5/02 - Knowledge representation; Symbolic representation
  • G06N 20/00 - Machine learning

69.

STORAGE ALLOCATION BASED ON APPLICATION PRIORITY SPECIFIC TO A SELECT ENTITY

      
Application Number 17505002
Status Pending
Filing Date 2021-10-19
First Publication Date 2023-04-20
Owner KYNDRYL, INC. (USA)
Inventor
  • Ramos, Renato Lopes
  • Takeda, Paulo Tomiyoshi
  • Rodrigues Levy, Nathan
  • Varga, Sergio

Abstract

An application priority level of an application to be executed within a computing environment is determined. The application priority level is specific to a select entity. Using the application priority level of the application a storage resource of the computing environment to be allocated to one or more workloads of the select entity is selected. At least one workload of the one or more workloads includes the application. An action is taken, based on selecting the storage resource, to facilitate allocation of the storage resource.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

70.

NOTIFICATION CONTROL CONSIDERING REMOTE WORK CONCENTRATION OF OPERATOR

      
Application Number 17504679
Status Pending
Filing Date 2021-10-19
First Publication Date 2023-04-20
Owner KYNDRYL, INC. (USA)
Inventor
  • Maeda, Keisuke
  • Yanagisawa, Takashi

Abstract

A method, including: receiving, by a computing device, an electronic notification directed to a user of an electronic device; generating, by the computing device, an initial uninterruptibility score based on a current work mode of the user; generating, by the computing device, an initial necessity score based on current attributes of the notification; comparing, by the computing device, the initial uninterruptibility score and the initial necessity score; and preventing, by the computing device and as a result of the comparing, the notification from being presented to the user.

IPC Classes  ?

71.

Audio content validation via embedded inaudible sound signal

      
Application Number 17546100
Grant Number 11631416
Status In Force
Filing Date 2021-12-09
First Publication Date 2023-04-18
Grant Date 2023-04-18
Owner Kyndryl, Inc. (USA)
Inventor
  • Childress, Rhonda L.
  • Bender, Michael
  • Fox, Jeremy R.
  • Zeng, Yinghui

Abstract

Data-analysis-based processing is provided to validate audio content delivery via embedded inaudible sound signals. The processing obtains, by a validation system, an indication of detection of an inaudible sound signal embedded in an audio output of provided content initiated by a user on a user-device. The inaudible sound signal is inaudible to the user, and the audio output is from the user-device. Based on obtaining the indication of detection of the inaudible sound signal embedded in the audio output, the validation system validates that the audio output of the provided content is ON with respect to the user-device.

IPC Classes  ?

  • G10L 19/018 - Audio watermarking, i.e. embedding inaudible data in the audio signal
  • G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination

72.

SYSTEM TO FACILITATE WIRELESS CHARGING OF ELECTRONIC DEVICE(S)

      
Application Number 17499962
Status Pending
Filing Date 2021-10-13
First Publication Date 2023-04-13
Owner KYNDRYL, INC. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Rakshit, Sarbajit K.

Abstract

Control system for facilitating wireless charging of an electronic device is provided, which identifies presence of multiple electronic devices within an environment, with the multiple electronic devices including a self-propelled power relay device with wireless charging capability. Control system processing determines that an electronic device of the multiple electronic devices requires wireless charging, and based on the determining, deploys the self-propelled power relay device to move to an area of the environment within a charging range of the electronic device to facilitate wireless charging of the electronic device via the self-propelled power relay device.

IPC Classes  ?

  • H02J 50/50 - Circuit arrangements or systems for wireless supply or distribution of electric power using additional energy repeaters between transmitting devices and receiving devices
  • H02J 50/90 - Circuit arrangements or systems for wireless supply or distribution of electric power involving detection or optimisation of position, e.g. alignment
  • H02J 50/80 - Circuit arrangements or systems for wireless supply or distribution of electric power involving the exchange of data, concerning supply or distribution of electric power, between transmitting devices and receiving devices

73.

Three-dimensional printing employing movable blocks of a printer base

      
Application Number 17500041
Grant Number 11701835
Status In Force
Filing Date 2021-10-13
First Publication Date 2023-04-13
Grant Date 2023-07-18
Owner KYNDRYL, INC. (USA)
Inventor
  • Rakshit, Sarbajit K.
  • Trevisan, Daniela
  • Gomes Pereira, Edson
  • Varga, Sergio

Abstract

Three-dimensional printing of objects is facilitated. For an object to be printed in three-dimensions (3D), one or more contact points relating to the object are determined. A contact point is at least one location on a base of a 3D printer in which a portion of the object is to contact the base based on printing the portion of the object. A centralized location of the base at which one or more movable blocks of the base are to be moved to position the one or more contact points at the centralized location to facilitate printing of the one or more portions of the object is also determined. A print plan to be used to print the object in three-dimensions is created, in which the print plan includes one or more instructions to print at least the one or more portions of the object at the centralized location.

IPC Classes  ?

  • B29C 64/393 - Data acquisition or data processing for additive manufacturing for controlling or regulating additive manufacturing processes
  • B33Y 50/02 - Data acquisition or data processing for additive manufacturing for controlling or regulating additive manufacturing processes

74.

Automated workload monitoring by statistical analysis of logs

      
Application Number 17515539
Grant Number 11625309
Status In Force
Filing Date 2021-10-31
First Publication Date 2023-04-11
Grant Date 2023-04-11
Owner KYNDRYL, INC. (USA)
Inventor Chen, Hsiulan

Abstract

Methods, computer program products, and systems are presented. The methods include, for instance: A plurality of log messages generated while an application processes two or more workloads are collected. The application is microservice-based and each of the microservices generates respective log messages. A time domain analysis is performed to lay out respective iteration counts of the microservices of the application. Keyword patterns in the log messages are compiled and stored in a keywords database. A frequency domain analysis on the keyword patterns for respective numbers of appearances in the log messages and stored in a frequency domain analysis database. Logs generated from a new workload are automatically monitored for abnormality by comparing the logs by the new workload to the statistical pattern of keywords as established by previous workloads. For a deviation greater than a threshold, an alert is generated with issue location and delivered to preselected recipients.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 40/40 - Processing or translation of natural language
  • G06F 11/36 - Preventing errors by testing or debugging of software

75.

MULTI-TENANT AWARE DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) MECHANISM FOR CLOUD NETWORKING

      
Application Number 18073787
Status Pending
Filing Date 2022-12-02
First Publication Date 2023-04-06
Owner Kyndryl, Inc. (USA)
Inventor
  • Rong, Liang
  • Tang, Gang
  • Tao, Zi J.
  • Xian, Ming S.

Abstract

An approach includes providing support multi-tenancy support on a DHCP protocol. The approach includes receiving a dynamic host configuration protocol (DHCP) packet, inserting a tenant-specific option information within the DHCP packet, and transmitting the DHCP packet with the tenant-specific option information.

IPC Classes  ?

  • H04L 61/5014 - Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
  • H04L 12/46 - Interconnection of networks
  • H04L 61/5061 - Pools of addresses

76.

ARTIFICIAL INTELLIGENCE MODULE COMMUNICATION

      
Application Number 17449838
Status Pending
Filing Date 2021-10-04
First Publication Date 2023-04-06
Owner KYNDRYL, INC. (USA)
Inventor
  • Cleaver, James David
  • Mcguire Hindle, Dallas
  • Mcguire, Michael James
  • Vadayadiyil Raveendran, Pramod
  • Nagar, Seema

Abstract

A system, method, and computer program product for implementing artificial intelligence module communication is provided. The method includes generating models associated with communications between real-time artificial intelligence modules. Classifiers associated with the models are generated and a master real-time artificial intelligence module associated with the modules and classifiers is detected. Real-time artificial intelligence modules are detected and communications between the master real-time artificial intelligence module and the real-time artificial intelligence modules are initiated. Updated classifiers, updated models, and updated self learning software are generated. The updated self learning software is executed and a resulting query associated with a Web search is executed.

IPC Classes  ?

77.

AUTOMATED SYSTEM ALERT BASED ON LOGS SENTIMENT ANALYSIS

      
Application Number 17492040
Status Pending
Filing Date 2021-10-01
First Publication Date 2023-04-06
Owner KYNDRYL, INC. (USA)
Inventor
  • Yeddu, Dinesh Babu
  • Shanmugam, Sundaravelu
  • Karuppiah, Raju

Abstract

Methods, computer program products, and systems are presented. The methods include, for instance: creating a log data specific lexicon based on log data samples, each word in the log data specific lexicon corresponding to a weighted sentiment score with a binary polarity. A log message is obtained, and a sentiment value of the log message is assigned based on respective weighted sentiment scores of words appearing in the log message. The log message is classified for a class indicating an issue the log message addresses. An alert type for the log message is determined based on the sentiment value, the class, and a priority of the log message, and a system alert including a set of key performance indicators according to the alert type is produced to a user.

IPC Classes  ?

  • G06F 11/32 - Monitoring with visual indication of the functioning of the machine
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 40/237 - Lexical tools
  • G06F 40/30 - Semantic analysis

78.

Data backup optimization

      
Application Number 17486885
Grant Number 11687416
Status In Force
Filing Date 2021-09-27
First Publication Date 2023-03-30
Grant Date 2023-06-27
Owner Kyndryl, Inc. (USA)
Inventor
  • Kumble, Ramesh
  • Belsare, Pramod
  • Lodam, Satish

Abstract

At least one data file for backup can be received. The data file can be divided into a plurality of data blocks. A first portion of the plurality of data blocks can be allocated to a first data processing system for backup by the first data processing system. A second portion of the plurality of data blocks can be allocated to a second data processing system for backup by the second data processing system.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

79.

CONTROLLING ELECTRONIC DEVICE DATA CONNECTION CREDENTIALS

      
Application Number 17488834
Status Pending
Filing Date 2021-09-29
First Publication Date 2023-03-30
Owner KYNDRYL, INC. (USA)
Inventor
  • Hunter, James Clive
  • Jagadesan, Prabhu Baskar

Abstract

A method, computer program product, and computer system for controlling connection credentials for uninterrupted connection between a target data source and a data ingestor. The method includes providing at least two credential sets for access to resources of the target data source by the data ingestor, each credential set having a credential and a common expiry period and interleaved expiry times. The method allocates a credential set as a current credential set with the one or more other credential sets as one or more backup credential sets. The method automatically swaps the current credential set and a backup credential set before the expiry of the current credential set and updates a backup credential set that includes the common expiry period set and a new credential that replaces a previous credential.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

80.

ANALYZING PRODUCTS AND DETERMINING ALTERNATIVES USING ARTIFICIAL INTELLIGENCE

      
Application Number 17449644
Status Pending
Filing Date 2021-09-30
First Publication Date 2023-03-30
Owner KYNDRYL, INC. (USA)
Inventor
  • Whitman, Todd Russell
  • Perrino, John P.
  • Coon, Robert Eugene
  • Gavin, Robert Ryan
  • Osburn, Gary L.

Abstract

A product analyzing system and method may include receiving a scan of a product, retrieving a plurality of individual data of one or more individuals, determining how the product will affect the plurality of individual data of the one or more individuals and whether the product complies with the individual data of the one or more individuals, generating an alert corresponding to the product based on the determining, and sending the alert to a user device before purchase of the product.

IPC Classes  ?

  • G06Q 30/06 - Buying, selling or leasing transactions

81.

Managing bandwith in fibre channel over internet protocol communication channels

      
Application Number 17484028
Grant Number 11700203
Status In Force
Filing Date 2021-09-24
First Publication Date 2023-03-30
Grant Date 2023-07-11
Owner KYNDRYL, INC. (USA)
Inventor
  • Zolotow, Clea
  • Guendert, Stephen Robert
  • O'Reilly, Gavin Charles

Abstract

Methods and systems include managing bandwidth in Fibre Channel over Internet Protocol (FCIP) communication channels. A method includes monitoring traffic demand at an FCIP communication channel and, in response to an anticipated period of throughput demand on the FCIP communication channel, reallocating physical throughput bandwidth of the FCIP communication channel by configuring bandwidth of one or more tunnels of the FCIP communication channel.

IPC Classes  ?

  • H04L 47/12 - Avoiding congestion; Recovering from congestion
  • H04L 49/00 - Packet switching elements
  • H04L 47/70 - Admission control; Resource allocation
  • H04L 69/16 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]

82.

DATA SECURITY ACROSS DATA RESIDENCY RESTRICTION BOUNDARIES

      
Application Number 18060839
Status Pending
Filing Date 2022-12-01
First Publication Date 2023-03-30
Owner KYNDRYL, INC. (USA)
Inventor
  • Rudden, Mary E.
  • Cheng, Karen
  • Lam, Thanh
  • Riley, Daniel S.
  • Trim, Craig M.

Abstract

Data security across data residency restriction boundaries is provided by obtaining and profiling a dataset on which a desired analysis is to be performed, with some results of the desired analysis to be transferred from one location to another, the dataset subject to data residency restrictions that restrict transfer of the dataset across a boundary to the another location, and the profiling identifying a profile level for the dataset, then automatically generating a container image based on the profile level and the data residency restrictions that restrict the transfer of the dataset across the boundary, the container image configured for instantiation and execution to process the dataset into a reformatted dataset not restricted by the data residency restrictions for transfer across the boundary, and storing the container image to a container registry.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

83.

MACHINE LEARNING (ML) MODELING BY DNA COMPUTING

      
Application Number 18051308
Status Pending
Filing Date 2022-10-31
First Publication Date 2023-03-23
Owner KYNDRYL, INC. (USA)
Inventor
  • Diamanti, Gary F.
  • Baughman, Aaron K.
  • Marzorati, Mauro

Abstract

Methods, computer program products, and systems are presented. The methods include, for instance: building, by one or more DNA processor, a DNA strand corresponding to a conditional expectation. The methods include, for instance: obtaining, by one or more DNA processor, a conditional expectation having a regularization metric.

IPC Classes  ?

  • G06N 20/20 - Ensemble learning
  • G06N 3/12 - Computing arrangements based on biological models using genetic models
  • G06N 20/00 - Machine learning

84.

SECURE REMOTE SUPPORT OF SYSTEMS DEPLOYED IN A PRIVATE NETWORK

      
Application Number 17478165
Status Pending
Filing Date 2021-09-17
First Publication Date 2023-03-23
Owner KYNDRYL, INC. (USA)
Inventor
  • Szczepanik, Grzegorz Piotr
  • Suto, Tiberiu
  • Kochura, Nadiya
  • Sgobba, Nicolo'
  • Rueger, Erik

Abstract

A computer-implemented method includes: connecting, by a computing device, to a database using an outbound connection, wherein the computing device is an information technology (IT) product in a private network and the database is outside the private network; receiving, by the computing device, a response from the database, the response including a command; executing, by the computing device, the command; and sending, by the computing device, result data to the database, wherein the result data is data that results from executing the command on the computing device.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

85.

TESTING AND REMEDIATING COMPLIANCE CONTROLS

      
Application Number 18057072
Status Pending
Filing Date 2022-11-18
First Publication Date 2023-03-16
Owner KYNDRYL, INC. (USA)
Inventor
  • Adam, Constantin Mircea
  • Cohen, Richard Jay
  • Filepp, Robert
  • Hernandez, Milton H.
  • Peterson, Brian
  • Vukovic, Maja
  • Zeng, Sai
  • Zhang, Guan Qun
  • Agrawal, Bhavna

Abstract

Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

86.

SMART DATA PROTECTION

      
Application Number 17977495
Status Pending
Filing Date 2022-10-31
First Publication Date 2023-03-16
Owner Kyndryl, Inc. (USA)
Inventor
  • Valecha, Vinod A.
  • Rudek, Krzysztof
  • Szczepanik, Grzegorz Piotr
  • Palus, Lukasz Jakub

Abstract

When a system receives sensitive data, it can request an encryption key from an encryption/decryption unit. A central processing unit (CPU) of the system can encrypt the sensitive data using the encryption key before writing the sensitive data to memory. Thus, the sensitive data is encrypted when written to memory.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

87.

Methods and apparatus for feature generation using improved term frequency-inverse document frequency (TF-IDF) with deep learning for accurate cloud asset tagging

      
Application Number 17982976
Grant Number 11748621
Status In Force
Filing Date 2022-11-08
First Publication Date 2023-03-09
Grant Date 2023-09-05
Owner Kyndryl, Inc. (USA)
Inventor
  • Odibat, Omar
  • Yu, Jean Xu
  • Zarifoglu, Emrah
  • Iyoob, Ilyas Mohamed

Abstract

An embodiment includes generating an input document that includes a plurality of text fields of attribute data. The embodiment also includes extracting a set of candidate features from the attribute data using a feature extraction module that evaluates the attribute data using first and second machine learning models, where the first machine learning model scores terms in the input document and the second machine learning model includes a deep learning model. The embodiment also includes calculating feature-selection values for respective features of the set of candidate features and generating tag information for a remote computing asset using a machine learning classifier that predicts the tag information based on the feature-selection values.

IPC Classes  ?

  • G06N 3/08 - Learning methods
  • H04L 67/141 - Setup of application sessions
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • G06F 16/906 - Clustering; Classification
  • G06F 16/908 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
  • G06N 3/045 - Combinations of networks

88.

Virtual server geolocation detection

      
Application Number 17514097
Grant Number 11601337
Status In Force
Filing Date 2021-10-29
First Publication Date 2023-03-07
Grant Date 2023-03-07
Owner Kyndryl, Inc. (USA)
Inventor
  • Suto, Tiberiu
  • Kochura, Nadiya
  • Rueger, Erik
  • Sgobba, Nicolo'

Abstract

Geographic location of a virtual server is predicted by determining a baseline geographic location of a virtual server of a computing environment, where the determining uses triangulation processing and known locations of multiple reference servers of the computing environment. Further, network communication-related data for communications between the multiple reference servers across a network is obtained, and a machine learning model is generated to predict an actual geographic location of the virtual server using, at least in part, the baseline geographic location of the virtual server and the obtained network communication-related data. The machine learning model is used to predict a current geographic location of the virtual server based, at least in part, on current network communication-related data for communications between the virtual server and one or more of the reference servers.

IPC Classes  ?

  • H04L 41/12 - Discovery or management of network topologies
  • G06N 20/00 - Machine learning
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

89.

Email system with action required and follow-up features

      
Application Number 17571692
Grant Number 11601389
Status In Force
Filing Date 2022-01-10
First Publication Date 2023-03-07
Grant Date 2023-03-07
Owner KYNDRYL, INC. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Toska, Desilda

Abstract

A computer-implemented method includes: receiving, by a computing device, input from a sender of an email, the input defining the email as having a task associated with it; inserting, by the computing device, code into the email, the code defining a selectable object in the email; sending, by the computing device, the email to one or more recipients; receiving, by the computing device, input indicating a selection of the selectable object by one of the one or more recipients; assigning, by the computing device, the one of the one or more recipients as an owner of the task; and sending, by the computing device, a notification email to the sender and the one or more recipients, the notification email indicating the owner of the task.

IPC Classes  ?

90.

DIGITAL TWIN SIMULATION OF EQUILIBRIUM STATE

      
Application Number 17412649
Status Pending
Filing Date 2021-08-26
First Publication Date 2023-03-02
Owner KYNDRYL, INC. (USA)
Inventor
  • Rakshit, Sarbajit K.
  • Arora, Pritpal S.
  • Nanduru, Laxmikantha Sai

Abstract

A processor may receive object data associated with a position and an orientation of a first object in an environment from IoT sensors. The processor may generate a digital twin simulation of the first object. In some embodiments, the digital twin simulation may include data associated with the relative positions and orientations of one or more other objects to the first object. The processor may calculate forces acting on the first object. The processor may identify whether the first object is in a state of instability.

IPC Classes  ?

  • G06F 30/20 - Design optimisation, verification or simulation
  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G16Y 20/20 - Information sensed or collected by the things relating to the thing itself
  • G16Y 20/10 - Information sensed or collected by the things relating to location

91.

Virtual shopping assistant

      
Application Number 17462129
Grant Number 11651404
Status In Force
Filing Date 2021-08-31
First Publication Date 2023-03-02
Grant Date 2023-05-16
Owner KYNDRYL, INC. (USA)
Inventor
  • Gambon, Kenneth
  • Göçülü, Hasibe
  • Shanmugam, Saravanan

Abstract

In an approach to provide contact-less shopping assistance to a user, a computer implements a method for receiving customer authentication data from a user and associating the customer authentication data with a tagged wearable device and a tagged mobility device with the user. The method further includes receiving an indication the user is wearing the tagged mobility device, and that the user is entering a shopping facility using the tagged mobility device. The method further includes receiving a user instruction to capture an image causing the tagged wearable device to capture the image, identifying a bar code in the image, determining an item based on the bar code and transmitting an action instruction to the tagged mobility device to retrieve the item and secure the item. The method further includes receiving an indication that the user has completed the task and delivering the item to the user.

IPC Classes  ?

  • G06Q 30/06 - Buying, selling or leasing transactions
  • G06Q 30/0601 - Electronic shopping [e-shopping]
  • G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
  • G06Q 30/04 - Billing or invoicing
  • G06K 7/14 - Methods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06F 21/31 - User authentication

92.

INCOMPLETE PROBLEM DESCRIPTION DETERMINATION FOR VIRTUAL ASSISTANT USER INPUT HANDLING

      
Application Number 17463469
Status Pending
Filing Date 2021-08-31
First Publication Date 2023-03-02
Owner KYNDRYL, INC. (USA)
Inventor
  • Devendran, Saravanan
  • Burli, Aditya M.
  • Perpetua, Jr., Dennis Anthony

Abstract

User input handling by a virtual assistant includes receiving a sequence of natural language statements provided by a user to a virtual assistant, applying a cognitive model to the sequence of statements and determining whether the sequence of statements provides a complete problem description, by the user, to which the virtual assistant is to respond in assisting the user address a problem that the user experiences, prompting the user to provide an additional one or more statements to complete the problem description, based on completing the problem description, formulating and providing a response to the user based on a determined intent of the complete problem description, and monitoring input by the user based on providing the response, the input informing feedback for further training of the cognitive model to identify whether statement sequences provide complete or incomplete problem descriptions.

IPC Classes  ?

  • G06F 40/289 - Phrasal analysis, e.g. finite state techniques or chunking
  • G10L 15/18 - Speech classification or search using natural language modelling
  • G10L 15/06 - Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
  • G06N 20/00 - Machine learning
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

93.

Reducing toil in chat environments

      
Application Number 17411146
Grant Number 11621928
Status In Force
Filing Date 2021-08-25
First Publication Date 2023-03-02
Grant Date 2023-04-04
Owner Kyndryl, Inc. (USA)
Inventor
  • Marzorati, Mauro
  • Diamanti, Gary Francis
  • Srinivasan, Raghuram
  • Fox, Jeremy R.

Abstract

A computer-implemented method reduces toil in chat systems. The method includes receiving, from a sending account, a message to be sent in a chat environment, where the chat environment includes a plurality of accounts including the sending account. The method also includes determining, by a learning model, a category of the message. The method further includes generating, for each account of the plurality accounts in a channel of the chat environment, a score, where the score indicates a likelihood an associated account will respond to a post with relevant information. The method includes recommending, based on the score, one or more accounts of the plurality of accounts to an at message, where the at message is configured to cause a notification to the associated account. The method further includes posting the message in the channel of the chat environment while at-mentioning the one or more accounts.

IPC Classes  ?

  • H04L 51/00 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
  • G06N 5/04 - Inference or reasoning models
  • G06F 40/205 - Parsing
  • H04L 67/30 - Profiles
  • G06N 20/00 - Machine learning

94.

UNIQUE PASSWORD POLICY CREATION

      
Application Number 17411376
Status Pending
Filing Date 2021-08-25
First Publication Date 2023-03-02
Owner KYNDRYL, INC. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Feezell, John Richard
  • Ahmad, Faraz
  • John, Anto Ajay Raj

Abstract

A random password policy for a specific user associated with an entity is generated based on a global password requirement. A new password created by the specific user based on the generated random password policy is identified. That the new password complies with a set of requirements specified by the generated random password policy is confirmed.

IPC Classes  ?

  • G06F 21/46 - Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
  • G06F 21/31 - User authentication
  • G06F 21/60 - Protecting data

95.

COMPUTER ANALYSIS OF ROUTING DATA ENABLED FOR AUTONOMOUS OPERATION AND CONTROL

      
Application Number 17445852
Status Pending
Filing Date 2021-08-25
First Publication Date 2023-03-02
Owner KYNDRYL, INC. (USA)
Inventor
  • Dixit J, Prasanna Kumar
  • Tripathy, Sharat K.
  • Ali, Mohammed Amjed

Abstract

A system, method, and computer program product for implementing autonomous operation optimization and control is provided. The method includes defining nodes associated with facilities at differing geographical locations. A first node is assigned as a location of an entity and a second node is assigned as a location of a warehouse comprising products for delivery. A value for the first node and second node is determined based on a modification of a node route and clusters associated with geographical locations of the nodes are defined. Likewise, a network comprising routes extending between the nodes and facilities is defined. The nodes, results of assigning, the value, the clusters, and the network are analyzed. In response to the analysis, a recommendation for a facility and specified route is generated and operational functionality of an apparatus with respect to facility and the specified route is enabled in accordance with the recommendations.

IPC Classes  ?

  • H04L 12/707 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy
  • H04L 12/733 - Selecting a path with minimum length or minimum hop count
  • H04L 12/717 - Centralised routing
  • H04L 12/751 - Topology update or discovery
  • H04L 12/725 - Selecting a path with suitable quality of service [QoS]

96.

AUGMENTED REALITY PHYSICAL STORAGE VALIDATION

      
Application Number 17460371
Status Pending
Filing Date 2021-08-30
First Publication Date 2023-03-02
Owner KYNDRYL, INC. (USA)
Inventor
  • Ramireddy, Reshma Reddy
  • Trejo Martinez, Carlos Daniel
  • Silverstein, Zachary A.
  • Hatfield, Jennifer M.
  • Chakra, Al

Abstract

One or more computer processors detect a physical storage device within a visual proximity to a user within an augmented reality (AR) environment. The one or more computer processors capture one or more physical identifiers of the detected physical storage device. The one or more computer processors identify an indexed filesystem associated with the physical storage device utilizing the one or more captured physical identifiers, wherein the indexed filesystem contains metadata representing file content stored on the physical storage device. The one or more computer processors calculate a filesystem risk score associated with the physical storage device utilizing the identified physical identifiers. The one or more computer processors present generated graphics representing the indexed filesystem and the calculated filesystem risk score to the user within an AR viewport.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 16/13 - File access structures, e.g. distributed indices
  • G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
  • G06T 11/00 - 2D [Two Dimensional] image generation

97.

Data exhaust logging

      
Application Number 17461041
Grant Number 11630867
Status In Force
Filing Date 2021-08-30
First Publication Date 2023-03-02
Grant Date 2023-04-18
Owner KYNDRYL, INC. (USA)
Inventor
  • Silverstein, Michael Seth
  • Keen, Martin G.
  • Fox, Jeremy R.
  • Silverstein, Zachary A.

Abstract

A machine learning model repeatedly scans data exhaust for workstations (for which there are retention requirements regarding data exhaust) over a period of time. The machine learning model analyzes the respective data exhaust and the retention requirements to determine respective data exhaust logging parameters for each workstation. The machine learning model monitors respective data exhaust activity for each workstation over a subsequent period of time. An instance is identified in which logging activity of data exhaust for an identified workstation fails the retention requirements. An ameliorative action designed to satisfy the respective retention requirements for the identified workstation is executed.

IPC Classes  ?

  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 16/9035 - Filtering based on additional data, e.g. user or group profiles
  • G06N 20/00 - Machine learning
  • G06F 16/17 - File systems; File servers - Details of further file system functions
  • G06F 16/9038 - Presentation of query results
  • G06F 16/23 - Updating

98.

MACHINE LEARNING AND OPTIMIZATION TECHNIQUES FOR JOB SCHEDULING

      
Application Number 17408078
Status Pending
Filing Date 2021-08-20
First Publication Date 2023-02-23
Owner Kyndryl, Inc. (USA)
Inventor
  • Desaulniers, Robert Bradley
  • Zolotow, Clea Anne
  • Criveti, Mihai
  • Bezerra Maimoni, Ana Maria

Abstract

A method includes training a recurrent neural network by monitoring data in a memory of a first server as the first server executes jobs and by determining an amount of computing resources used by the first server while executing the jobs and applying the recurrent neural network to data in the memory to predict an amount of computing resources that the first server will use when executing a first future job. The method also includes, in response to determining that execution of the first future job did not meet a performance criterion, making a change to the first server. The method further includes further training the recurrent neural network using a reinforcement learning technique, applying the recurrent neural network to determine that the change should be made to a second server, and in response, making the change to the second server before the second server executes a second future job.

IPC Classes  ?

  • G06N 3/08 - Learning methods
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/30 - Monitoring

99.

Asset Error Remediation for Continuous Operations in a Heterogeneous Distributed Computing Environment

      
Application Number 17445206
Status Pending
Filing Date 2021-08-17
First Publication Date 2023-02-23
Owner Kyndryl, Inc. (USA)
Inventor
  • Dixit J, Prasanna Kumar
  • Tripathy, Sharat K.
  • Ali, Mohammed Amjed

Abstract

Asset error remediation is provided. Risk and classification of an asset error are analyzed to prioritize asset error remediation for an asset based on risk criticality, risk context, and vulnerability level corresponding to the asset by detecting suspicious behavior and risk exposure to the asset in a heterogeneous distributed computing environment using artificial intelligence. A priority of the asset error remediation is determined to fix the asset within the heterogeneous distributed computing environment based on the risk and the classification of the asset error. A set of action steps is performed to fix the asset within the heterogeneous distributed computing environment based on the priority of the asset error remediation.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 40/30 - Semantic analysis
  • G06K 9/46 - Extraction of features or characteristics of the image
  • G06K 9/34 - Segmentation of touching or overlapping patterns in the image field

100.

HARDWARE AND SOFTWARE CONFIGURATION MANAGEMENT AND DEPLOYMENT

      
Application Number 17445338
Status Pending
Filing Date 2021-08-18
First Publication Date 2023-02-23
Owner KYNDRYL, INC. (USA)
Inventor
  • Reyes, Joseph
  • Kronstadt, Andrew S.
  • Murugan, Rennad
  • Formato, Marci Devorah
  • Szkatulski, Jennifer L.
  • Klingenberg, Bernhard Julius

Abstract

A system, method, and computer program product for implementing configuration solution service management is provided. The method includes ingesting from managed hardware and software service components associated with a first entity, data and associated metadata associated with establishing baseline analysis code. The data and associated metadata are analyzed via execution of code associated with a recurrent neural network and long short-term memory configured to determine if a current managed hardware or software solution service design is associated with client requirements and industry trends. Recommendations, statistical analysis, predictions, a proposed new client profile, and sizing attributes of the additional managed hardware and software service components are generated. In response, additional managed hardware and software service components are configured with respect to operationally functionality for the first entity.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  1     2     3     ...     31        Next Page