Kyndryl, Inc.

United States of America

Back to Profile

1-21 of 21 for Kyndryl, Inc. Sort by
Query
Patent
World - WIPO
Aggregations Reset Report
Date
2023 5
2022 16
IPC Class
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU] 5
G06F 9/48 - Program initiating; Program switching, e.g. by interrupt 3
G06F 11/00 - Error detection; Error correction; Monitoring 2
G06F 3/06 - Digital input from, or digital output to, record carriers 2
G06F 8/60 - Software deployment 2
See more
Found results for  patents

1.

PRE-DEPLOYMENT VALIDATION OF INFRASTRUCTURE TOPOLOGY

      
Application Number EP2023051888
Publication Number 2023/202806
Status In Force
Filing Date 2023-01-26
Publication Date 2023-10-26
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Tripathi, Sushant
  • Vanapalli, Bala Srinivas
  • K V, Shankaramurthy
  • Laxmikant, Siddesh
  • Mahamuni, Amol

Abstract

Systems and methods enable optimized infrastructure deployment planning and validation. In embodiments, a method includes: training, by a computing device, a machine learning (ML) predictive model with historic infrastructure deployment data of a plurality of resource providers in a network environment, including resource dependencies; generating, by the computing device, a deployment topology for requested resources of an information technology (IT) deployment request of a user; generating, by the computing device using the ML predictive model, a confidence score regarding a likelihood of successful implementation of the deployment request based on dependencies of the deployment topology; and dynamically implementing, by the computing device, deployment of the IT deployment request to provision the requested resources from multiple providers in the network environment based on the confidence score.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

2.

RAPID DATA REPLICATION AND DATA STORAGE

      
Application Number EP2023050376
Publication Number 2023/169719
Status In Force
Filing Date 2023-01-10
Publication Date 2023-09-14
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Aradhya, Aradhya
  • Raghunathan, Ravi
  • Panjani, Venkat
  • Kande, Raja
  • Shivanna, Manu

Abstract

Aspects of the present disclosure relate generally to data storage and data replication. For example, a computer-implemented method includes creating, by a computing device, a mapping that associates a plurality of block identifiers with a plurality of binary combinations of data for a block size; generating from the mapping that associates the plurality of block identifiers with the plurality of binary combinations of data for the block size, by the computing device, a list of block identifiers representing a list of data blocks in a storage; sending, by the computing device, the list of block identifiers to a backup storage to replicate the list of data blocks in the storage; and storing on a computer readable storage media the mapping that associates the plurality of block identifiers with the plurality of binary combinations of data for the block size and the list of block identifiers in the storage.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 3/06 - Digital input from, or digital output to, record carriers

3.

ENFORCING MULTI-OWNERSHIP OF DATA ON STORAGE

      
Application Number EP2022079194
Publication Number 2023/094080
Status In Force
Filing Date 2022-10-20
Publication Date 2023-06-01
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Dwarkanath, Rao
  • Bacher, Utz

Abstract

A computer-implemented method for providing a secure data access service that encrypts data is disclosed. The method includes: wrapping a data encryption key by at least two customer root keys, wherein the at least two customer root keys are assigned to different user identifiers, and wherein the at least two customer root keys are stored in different hardware security modules, and wherein a wrapping structure for the at least two customer root keys is applied according to an access policy that defines which of the assigned user identifiers must concur to enable a data access to the encrypted data by the secure data access service; and encrypting the data by the secure data access service using the unwrapped data encryption key.

IPC Classes  ?

4.

WORKLOAD MIGRATION

      
Application Number EP2022070737
Publication Number 2023/072443
Status In Force
Filing Date 2022-07-25
Publication Date 2023-05-04
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Kinnaird, Douglas
  • Zolotow, Clea
  • Habiba, Mansura
  • Göçülü, Hasibe
  • Toussaint, Neil
  • Bezerra Maimoni, Ana Maria

Abstract

Embodiments of the present invention provide concepts for identifying an edge computing environment location as a target for workload migration. For example, embodiments may provide for a machine-learning algorithm to be trained to predict or suggest the most appropriate edge location for migrating a workload. Using a description of a workload, the machine-learning algorithm may predict/ suggest one or more edge locations.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

5.

REUSABLE APPLICATIONS DEPLOYMENT PLAN

      
Application Number EP2022067893
Publication Number 2023/006326
Status In Force
Filing Date 2022-06-29
Publication Date 2023-02-02
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Tripathi, Dinesh
  • Thayyilsubramanian, Sarin Kumar
  • Kurian, John
  • Palakodeti, Ramesh

Abstract

Methods, computer program products, and systems can include obtaining a first computing environment specific application deployment software code instance associated to a first computing environment, the first computing environment specific application deployment software code instance for deployment of a certain application on the first computing environment; parsing the first computing environment specific application deployment software code instance, wherein the parsing includes determining attributes of the first computing environment specific application deployment software code instance and generating, using the determined attributes of the first computing environment specific application deployment software code instance, a computing environment agnostic semantic tree data structure that expresses a workflow pattern for deployment of the certain application; and composing, with use of the computing environment agnostic semantic tree data structure, a second computing environment specific application deployment software code instance associated to a second computing environment for deployment of the certain application on the second computing environment.

IPC Classes  ?

  • G06F 8/35 - Creation or generation of source code model driven
  • G06F 8/76 - Adapting program code to run in a different environment; Porting
  • G06F 8/60 - Software deployment

6.

OPERATING A STORAGE SERVER WITH A STORAGE VOLUME

      
Application Number EP2022062740
Publication Number 2022/258287
Status In Force
Filing Date 2022-05-11
Publication Date 2022-12-15
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Fritsch, Armin
  • Wittmann, Holger
  • Roskosch, Marcus
  • Funk, Rene
  • Bacher, Utz

Abstract

A method, computer system, and a computer program product for operating at least one storage server. The present invention may include receiving an access request for at least one storage volume of at least one storage server. The present invention may include collecting data for the at least one storage volume, wherein the at least one storage volume has a corresponding unique volume identifier. The present invention may include storing at least the data for the at least one storage volume and the unique volume identifier in a database, the data being comprised of metadata and subset data, wherein the metadata is comprised of configuration and status information for the at least one storage volume, and wherein the subset data is a set of predefined selection criteria based on a respective computer server.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 16/182 - Distributed file systems
  • G06F 16/17 - File systems; File servers - Details of further file system functions

7.

ADAPTIVE SNAPSHOT CONTROLLER

      
Application Number EP2022053472
Publication Number 2022/199937
Status In Force
Filing Date 2022-02-14
Publication Date 2022-09-29
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Venkiteswaran, Sreekrishnan
  • Gupta, Manish

Abstract

A method and related apparatus adaptively control snapshot replication of a plurality of server snapshots in a multi-tenant public cloud using snapshot service. A plurality of snapshot requests are received from a plurality of clients in the multi-tenant public cloud and are each associated with a service level agreement (SLA). The SLA includes a corresponding completion deadline and a slippage penalty. A probabilistic model calculates, for active snapshot flows, a completion time for each of the snapshot requests. If any of the predicted completion times exceed their corresponding completion deadlines, a possible MISS event is produced for an associated first snapshot. The snapshot controller component, in response to producing the possible MISS event, minimizes a probability of breaching fulfilment times for the multi-tenant cloud. The slippage penalty is calculated for each of the plurality of snapshot requests. A second snapshot is identified from among the plurality of snapshot requests.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

8.

SELECTIVELY GOVERNING INTERNET OF THINGS DEVICES VIA DIGITAL TWIN-BASED SIMULATION

      
Application Number CN2021114931
Publication Number 2022/110941
Status In Force
Filing Date 2021-08-27
Publication Date 2022-06-02
Owner KYNDRYL, INC. (USA)
Inventor
  • Marzorati, Mauro
  • Whitman, Todd Russell
  • Bender, Michael
  • Fox, Jeremy R.
  • Rakshit, Sarbajit K.

Abstract

A method and system are provided for utilizing digital twin-based simulation to selectively govern capabilities of surrounding IoT devices to improve a user experience.

IPC Classes  ?

9.

ADAPTIVE SECURITY FOR RESOURCE CONSTRAINT DEVICES

      
Application Number IB2021059206
Publication Number 2022/090840
Status In Force
Filing Date 2021-10-07
Publication Date 2022-05-05
Owner
  • KYNDRYL, INC. (USA)
  • IBM (CHINA) INVESTMENT COMPANY LTD. (China)
Inventor
  • Scheideler, Tim
  • Seul, Matthias
  • Udupi Raghavendra, Arjun
  • Giovannini, Andrea

Abstract

A method for providing protection of a computing resource constrained device against cyberattacks may include collecting threat intelligence data in form of indicators of compromise (IoC). The indicators may include cyberattack chain related data. The method may also include determining a relevance of the cyberattack chain for the device, measuring a utilization of security measures in terms of their detection of the respective IoCs and their respective responses to the IoCs, measuring a resource consumption of the security measures, and determining a benefit value for at least one the security measure expressed by its utilization and a relevance value of the IoCs detected with it.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

10.

ULTRASOUND SPLIT KEY TRANSMISSION FOR ENHANCED SECURITY

      
Application Number CN2021114238
Publication Number 2022/078073
Status In Force
Filing Date 2021-08-24
Publication Date 2022-04-21
Owner KYNDRYL, INC. (USA)
Inventor
  • Cannon, Gray Franklin
  • Kwatra, Shikhar
  • Ekambaram, Vijay
  • Szkatulski, Jennifer L.
  • Sadacharam, Saravanan
  • Ananthapur Bache, Vijay Kumar

Abstract

The exemplary embodiments disclose a system and method, a computer program product, and a computer system for encryption. The exemplary embodiments may include receiving an encryption request from a first smart device, preparing a response to the encryption request and generating a key, encrypting the prepared response with the generated key, sending the encrypted response to the first smart device, splitting the key into two or more pieces, sending the two or more key pieces to a second smart device, sending the two or more key pieces from the second smart device to the first smart device, assembling the two or more key pieces into the key on the first smart device, and decrypting the encrypted response on the first smart device using the assembled key.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

11.

MALWARE DETECTION BY DISTRIBUTED TELEMETRY DATA ANALYSIS

      
Application Number CN2021120874
Publication Number 2022/078196
Status In Force
Filing Date 2021-09-27
Publication Date 2022-04-21
Owner KYNDRYL, INC. (USA)
Inventor
  • Udupi Raghavendra, Arjun
  • Scheideler, Tim Uwe
  • Seul, Matthias
  • Giovannini, Andrea

Abstract

A method, computer program product, and system for detecting a malicious process by a selected instance of an anti-malware system are provided. The method includes one or more processors examining a process for indicators of compromise to the process. The method further includes one or more processors determining a categorization of the process based upon a result of the examination. In response to determining that the categorization of the process does not correspond to a known benevolent process and a known malicious process, the method further includes one or more processors executing the process in a secure enclave. The method further includes one or more processors collecting telemetry data from executing the process in the secure enclave. The method further includes one or more processors passing the collected telemetry data to a locally trained neural network system.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

12.

PREVENTING DEPLOYMENT FAILURES OF INFORMATION TECHNOLOGY WORKLOADS

      
Application Number CN2021120227
Publication Number 2022/068688
Status In Force
Filing Date 2021-09-24
Publication Date 2022-04-07
Owner KYNDRYL, INC. (USA)
Inventor
  • Venkitachalam, Hariharan N.
  • Bhatt, Harish
  • Merchant, Amit
  • Pareek, Prashant

Abstract

A method for orchestrating a provisioning of a computer workload includes determining characteristics of a computing pattern, determining health data of a computing environment based on the characteristics of the computing pattern, determining a confidence score based on the health data, and determining whether to proceed with provisioning the computer workload based on the confidence score.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

13.

UNRESTRICTED CURSOR POSITIONING IN MULTI-DISPLAY ENVIRONMENT

      
Application Number EP2021072370
Publication Number 2022/069102
Status In Force
Filing Date 2021-08-11
Publication Date 2022-04-07
Owner KYNDRYL, INC. (USA)
Inventor
  • Groezinger, Frank
  • Frank, Joachim

Abstract

A method for controlling a mouse pointer on at least two displays is provided. A virtual display layout defines a mutual relative positioning of display areas relating to the at least two displays. The method comprises creating the virtual display area and tracking a position of the mouse pointer within it. Upon the mouse pointer being positioned within an area of any of the display areas, the mouse pointer is displayed. Upon the mouse pointer being positioned outside the area of any of the display areas, but within the virtual display area, a first marker is displayed on a side border of the display in a direction the mouse pointer is positioned within the virtual display area, and a second marker is displayed on at least one other side border of another display in a direction the mouse pointer is positioned within the virtual display area.

IPC Classes  ?

  • G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
  • G06F 1/16 - Constructional details or arrangements

14.

IDENTIFYING A DISTRIBUTED THREAT IN A SECURITY ZONE

      
Application Number CN2021116234
Publication Number 2022/062872
Status In Force
Filing Date 2021-09-02
Publication Date 2022-03-31
Owner KYNDRYL, INC. (USA)
Inventor
  • Krishnan, Venkatesh
  • Parvatina, Rambabu
  • Hassan, Ahmed
  • Jung, Changwoo

Abstract

A method for identification of a distributed prohibited item across various dimensions as well as spatial and/or temporal spaces is provided. The method includes one or more processors assigning an identifier to each container of a plurality of containers entering a defined area. The method further includes determining one or more subcomponents of the plurality of containers entering the defined area that correspond to one or more prohibited items. The method further includes generating a set of subcomponents corresponding to a first prohibited item of the one or more prohibited items based at least in part on the plurality of containers. The method further includes determining whether the set of subcomponents corresponding to the first prohibited item exceeds a prohibited item threshold of the defined area based on a weighted sum of the set of subcomponents, which is a score related to the set of subcomponents.

IPC Classes  ?

  • G06T 7/70 - Determining position or orientation of objects or cameras

15.

PREPAID DIGITAL DELIVERY PACKAGE

      
Application Number CN2021116222
Publication Number 2022/057635
Status In Force
Filing Date 2021-09-02
Publication Date 2022-03-24
Owner KYNDRYL, INC. (USA)
Inventor
  • Gan, Seng Chai
  • Kwatra, Shikhar
  • Ekambaram, Vijay
  • Trim, Craig, M.

Abstract

Methods, computer program products, and systems are provided. In response to receiving a request associated with a data transfer, the method dynamically determines a first device to facilitate the data transfer. The method automatically creates a link between the first device that contains data to be transferred and a second device that is an intended recipient for the data.

IPC Classes  ?

16.

WEARABLE WATERMARKS

      
Application Number CN2021114085
Publication Number 2022/042487
Status In Force
Filing Date 2021-08-23
Publication Date 2022-03-03
Owner KYNDRYL, INC. (USA)
Inventor
  • Kronstadt, Andrew S.
  • Reyes, Joseph
  • Klingenberg, Bernhard Julius
  • Formato, Marci Devorah

Abstract

A user can wear a device which emits a visual and/or audible output. The output changes over time. A system is capable of predicting the output. Thus, the system can analyze a video and determine, based on observed output of the device, whether the video has been modified. The output can be particularly difficult for humans to modify, detect, understand, or recreate, further impeding attempts to disguise edits to the video.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06N 20/00 - Machine learning
  • G06F 9/44 - Arrangements for executing specific programs

17.

INTELLIGENT BACKUP AND RESTORATION OF CONTAINERIZED ENVIRONMENT

      
Application Number CN2021102418
Publication Number 2022/041996
Status In Force
Filing Date 2021-06-25
Publication Date 2022-03-03
Owner KYNDRYL, INC (USA)
Inventor
  • Rane, Girish, Vilas
  • Khor, Pei Wen
  • Wong, Kim, Poh

Abstract

A system for determining the optimal backup and restore location for lightweight applications is provided. A computer device identifies a set of training data, wherein the training data identifies a lightweight container, a corresponding backup lightweight container, and an optimization score for the lightweight container and the corresponding backup lightweight container. The computing device trains a machine learning model utilizing the identified training data. The computing device identifies a new lightweight container for backup. The computing device determines an optimal backup lightweight container for the new lightweight container utilizing the trained machine learning model.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

18.

MICROSERVICE PLACEMENT IN HYBRID MULTI-CLOUD USING GRAPH MATCHING

      
Application Number CN2021101266
Publication Number 2022/037238
Status In Force
Filing Date 2021-06-21
Publication Date 2022-02-24
Owner KYNDRYL, INC. (USA)
Inventor
  • Vadayadiyil Raveendran, Pramod
  • Dey, Kuntal
  • Nagar, Seema
  • Mukherjea, Sougata

Abstract

An embodiment of the invention may include a method, computer program product and system for deployment of microservices within a shared pool of configurable computing resources. An embodiment may include creating a dependency map for a plurality of microservices of an application deployed on the shared pool of configurable computing resources. An embodiment may include identifying attributes, with associated values, for each microservice of the plurality of microservices and identifying eligible deployment locations within the shared pool of configurable computing resources. An embodiment may include creating a bipartite graph based on the plurality of microservices and the identified eligible deployment locations. An embodiment may include applying bipartite matching to the shared pool of configurable computing resources based on the created bipartite graph. An embodiment may include, based on the applied bipartite matching, relocating one or more microservices within the shared pool of configurable computing resources.

IPC Classes  ?

19.

BLOCK-BASED ANOMALY DETECTION

      
Application Number CN2021099067
Publication Number 2022/007574
Status In Force
Filing Date 2021-06-09
Publication Date 2022-01-13
Owner KYNDRYL, INC. (USA)
Inventor
  • Lakkundi, Abdul Kareem
  • Aradhya, Siddalinga
  • Kulkarni, Santosh

Abstract

A plurality of blocks of a first storage device are monitored. The first storage device is related to a computer system. A subset of blocks of the plurality a compared to a first storage signature of the first storage device. Based on the comparing of the subset of blocks to the first storage signature, a security anomaly is determined on the computer system. In response to the security anomaly, a security action is performed. The security action is related to the computer system.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring

20.

DEEP LEARNING NETWORK INTRUSION DETECTION

      
Application Number CN2021099266
Publication Number 2022/007581
Status In Force
Filing Date 2021-06-10
Publication Date 2022-01-13
Owner KYNDRYL, INC. (USA)
Inventor Vasu, Karthick

Abstract

One or more computer processors intercept one or more network inputs entering or existing an internal network; synthesize one or more network input images from a random noise vector sampled from a normal distribution of textually embedded network inputs utilizing a trained generative adversarial network; classify one or more synthesized network input images by identifying contained objects utilizing a trained convolutional neural network with rectified linear units, wherein the objects include patterns, sequences, trends, and signatures; predict a security profile of the one or more classified network input images and associated one or more network inputs, wherein the security profiles includes a set of rules and associated mitigation actions, analogous historical network traffic, a probability of infection, a probability of signature match with historical malicious network inputs, and a harm factor; apply one or more mitigation actions based on the predicted security profile.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

21.

SYMPHONIZING SERVERLESS FUNCTIONS OF HYBRID SERVICES

      
Application Number CN2021099264
Publication Number 2022/007580
Status In Force
Filing Date 2021-06-10
Publication Date 2022-01-13
Owner KYNDRYL, INC. (USA)
Inventor Sai Sampath, Kuricheti Venkata Lakshmi

Abstract

In an approach to defining and symphonizing serverless functions ofhybrid multi-cloud services, a mapping table that contains quality of service (QoS) attributes for applications and service providers is created. Responsive to receiving a request from a runtime application to access specific serverless functions, specific QoS attributes for the runtime application are determined. Supporting service providers that provide the specific serverless functions and the specific QoS attributes for the runtime application are determined. A supporting service provider is selected from the supporting service providers. The specific serverless functions for the runtime application are bound to the supporting service provider.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure