-
公开(公告)号:US11741379B2
公开(公告)日:2023-08-29
申请号:US17897923
申请日:2022-08-29
Applicant: Kyndryl, Inc.
Inventor: Craig M. Trim , Mary E. Rudden , Mauro Marzorati , Jeremy R. Fox
IPC: G06N5/02 , G06N5/022 , G06N5/04 , G06F18/231 , G06F18/2115 , G06F18/21
CPC classification number: G06N5/022 , G06F18/2115 , G06F18/2185 , G06F18/231 , G06N5/04
Abstract: Systems and methods for automated resolution of over-specification and under-specification in a knowledge graph are disclosed. In embodiments, a method includes: determining, by a computing device, that a size of an object cluster of a knowledge graph meets a threshold value indicating under-specification of a knowledge base of the knowledge graph; determining, by the computing device, sub-classes for objects of the knowledge graph; re-initializing, by the computing device, the knowledge graph based on the sub-classes to generate a refined knowledge graph, wherein the size of the object cluster is reduced in the refined knowledge graph; and generating, by the computing device, an output based on information determined from the refined knowledge graph.
-
公开(公告)号:US11552955B2
公开(公告)日:2023-01-10
申请号:US17210951
申请日:2021-03-24
Applicant: KYNDRYL, INC.
Inventor: Mary E. Rudden , Karen Cheng , Thanh Lam , Daniel S. Riley , Craig M. Trim
Abstract: Data security across data residency restriction boundaries is provided by obtaining and profiling a dataset on which a desired analysis is to be performed, with some results of the desired analysis to be transferred from one location to another, the dataset subject to data residency restrictions that restrict transfer of the dataset across a boundary to the another location, and the profiling identifying a profile level for the dataset, then automatically generating a container image based on the profile level and the data residency restrictions that restrict the transfer of the dataset across the boundary, the container image configured for instantiation and execution to process the dataset into a reformatted dataset not restricted by the data residency restrictions for transfer across the boundary, and storing the container image to a container registry.
-
公开(公告)号:US11321638B2
公开(公告)日:2022-05-03
申请号:US16819445
申请日:2020-03-16
Applicant: KYNDRYL, INC.
Inventor: Mary Rudden , Craig M. Trim , Shikhar Kwatra , Stacey Heeley Ronaghan , William G. Dusch
Abstract: A machine learning model can be depicted as a graph. After identifying a familiarity level of a user, the graph of the machine learning model can be customized. The customization is based on the familiarity level of the user. The customized graph of the machine learning model is displayed to the user.
-
公开(公告)号:US20220086628A1
公开(公告)日:2022-03-17
申请号:US17023489
申请日:2020-09-17
Applicant: Kyndryl, Inc.
Inventor: Seng Chai Gan , Shikhar Kwatra , Vijay Ekambaram , Craig M. Trim
Abstract: Embodiments of the present invention provide methods, computer program products, and systems. In response to receiving a request associated with a data transfer, embodiments of the present invention dynamically determine a first device to facilitate the data transfer. Embodiments of the present invention automatically create a link between the first device that contains data to be transferred and a second device that is an intended recipient for the data.
-
公开(公告)号:US11719547B2
公开(公告)日:2023-08-08
申请号:US16830560
申请日:2020-03-26
Applicant: KYNDRYL, INC.
Inventor: Michael Treadway , Craig M. Trim , Chen Liang , Shikhar Kwatra , Jeremy R. Fox , Joseph Blee
CPC classification number: G01C21/3469 , B60L53/12 , B60L58/10 , G06N20/00 , G01S19/42
Abstract: A computer-implemented method for determining whether an electric vehicle (EV) requires a current charge. The method analyzes a set of EV data, wherein the set of EV data comprises a battery level, a destination, a current position, and a predicted arrival time to the destination. The method further constructs a charging regulation model for the EV, based on the analyzed set of EV data. The method further computes a risk score pertaining to charging the EV, based on the constructed charging regulation model for the EV, and determines whether the EV requires a current charge based on the computed risk score. The method further engages one or more wireless charging points on a roadway, if the computed risk score is below a threshold value.
-
公开(公告)号:US11681798B2
公开(公告)日:2023-06-20
申请号:US16669581
申请日:2019-10-31
Applicant: KYNDRYL, INC.
Inventor: Cesar Augusto Rodriguez Bravo , Rhonda L. Childress , Craig M. Trim
CPC classification number: G06F21/554 , G06F21/83 , G06F2221/034
Abstract: Universal serial bus (USB) devices are evaluated for access according to characteristics including descriptors and ROM information. Descriptors are cross-references to historic descriptors known to be associated with malicious or approved USB devices. ROM information is analyzed to determine congruity of data. Device drivers and configuration files on the USB device are reviewed for indicators of compromise or threat and assigned a corresponding security score. Security actions are taken according to a security score assigned according to matching descriptors and analyzed ROM information.
-
公开(公告)号:US11477171B2
公开(公告)日:2022-10-18
申请号:US16699112
申请日:2019-11-29
Applicant: Kyndryl, Inc.
Abstract: Techniques are described with regard to client authentication management. An associated method includes constructing an authentication resolution model specific to a client based upon error patterns respectively included in a plurality of erroneous authentication submissions inconsistent with a proper authentication submission. The method further includes receiving, via an authentication interface, a new erroneous authentication submission inconsistent with the proper authentication submission. Responsive to determining that the new erroneous authentication submission corresponds to an authentication exception defined in the authentication resolution model, the method further includes completing authentication. Responsive to determining that the new erroneous authentication submission corresponds to an authentication warning defined in the authentication resolution model, the method further includes performing at least one client account warning protection activity. Responsive to determining that the new erroneous authentication submission corresponds to an authentication attack defined in the authentication resolution model, performing at least one client account attack protection activity.
-
公开(公告)号:US11427094B2
公开(公告)日:2022-08-30
申请号:US16830596
申请日:2020-03-26
Applicant: Kyndryl, Inc.
Inventor: Michael Treadway , Craig M. Trim , Chen Liang , Shikhar Kwatra , Jeremy R. Fox , Joseph Blee
Abstract: A computer-implemented method for prioritizing one or more electric vehicles that need a battery charge while driving. The method receives a wireless communication between one or more electric vehicles on a section of the roadway. The method further communicates a risk score between the one or more electric vehicles, based on a charging regulation model. The method further prioritizes a need for a battery charge, for the one or more electric vehicles on the section of the roadway, based on the communicated risk score. The method further engages one or more wireless charging points on the section of the roadway, with the one or more electric vehicles, based on the prioritized need for a battery charge.
-
公开(公告)号:US11379112B2
公开(公告)日:2022-07-05
申请号:US16394008
申请日:2019-04-25
Applicant: KYNDRYL, INC.
Inventor: James E. Bostick , John M. Ganci, Jr. , Sarbajit K. Rakshit , Craig M. Trim
IPC: G06F3/0488 , G06F3/0481 , G06F3/0484 , G06F3/04845 , G06F9/44
Abstract: Approaches are provided for managing content displayed on a touch screen enabled device. An approach includes collecting data regarding contents of an electronic document that is opened on a device. The approach further includes separating the contents into individual layers and determining a position of each of the contents within the electronic document. The approach further includes detecting a manipulation of a first piece of content of the contents on the device, and determining the manipulation of the first piece of content has created an obstruction of readability or viewability of at least a portion of a second piece of content of the contents. The approach further includes adjusting the second piece of content such that the readability or viewability of the portion of the second piece of content is not obstructed by the first piece of content.
-
-
-
-
-
-
-
-