-
公开(公告)号:US20200042739A1
公开(公告)日:2020-02-06
申请号:US16599677
申请日:2019-10-11
Applicant: International Business Machines Corporation
Inventor: Ching-Wei Cheng , Tzu-Ching Kuo , June-Ray Lin , Yi-Chun Tsai
Abstract: A masking system and method for automatically masking sensitive user information on a webpage is provided. The method includes the steps of identifying a location of the first user data of the first type of sensitive user information on the webpage, updating an initial path to the first user data to account for changes to the initial path detected in response to repeated visits to the webpage, wherein the updated initial path to the first user data is stored as a stable path, locating a second user data associated with a second type of sensitive user information on the webpage, by accessing a central database containing path information to a location of the second user data on the webpage, and masking the first user data and the second user data on the webpage, using the stable path and the path information obtained from the central database.
-
公开(公告)号:US12229262B2
公开(公告)日:2025-02-18
申请号:US17934640
申请日:2022-09-23
Applicant: International Business Machines Corporation
Inventor: June-Ray Lin , Narayana Aditya Madineni
Abstract: One or more systems, devices, computer program products and/or computer-implemented methods of use provided herein relate to generating a security threat prediction. A system can comprise a memory that stores computer executable components, and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a prediction component that analyzes a public data graph model to generate a primary security threat determination, wherein the prediction component can further generate a secondary security threat prediction based on the primary security threat determination and on a proprietary data graph model, wherein the proprietary data graph model comprises proprietary security threat data from a source, and wherein the proprietary security threat data has been scrubbed of source-identifiers. An obtaining component can obtain an agreement from the source to share the proprietary security threat data with another source that has access to the proprietary data graph model.
-
公开(公告)号:US20240242421A1
公开(公告)日:2024-07-18
申请号:US18155782
申请日:2023-01-18
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Ye Chuan Wang , Ju Ling Liu , Nan Chen , June-Ray Lin , Li Na Wang
CPC classification number: G06T15/20 , G06T7/60 , G06T7/70 , G06T2207/30196 , G06T2207/30244 , G06T2210/21
Abstract: Embodiments of present invention provide a method of taking photo in a virtual reality environment. The method includes defining a group that includes multiple entities; detecting multiple directions that the multiple entities are facing based upon orientations of the multiple entities; identifying multiple extension lines that start from the multiple entities in the group and extend in the multiple directions; identifying one or more intersections associated with the multiple directions; identifying one or more connection lines that connect a center of the group to the one or more intersections; defining a camera line based on the one or more connection lines; determining a camera location along the camera line; taking an image of virtual view of the multiple entities by a virtual camera; and providing the image as a photo to the multiple entities in the group. A non-transitory storage medium and a computing environment are also provided.
-
公开(公告)号:US20240176880A1
公开(公告)日:2024-05-30
申请号:US18536736
申请日:2023-12-12
Applicant: International Business Machines Corporation
Inventor: Yu-Siang Chen , Ci-Hao Wu , Ying-Chen Yu , Pao-Chuan Liao , June-Ray Lin
CPC classification number: G06F21/561 , G06F21/568 , G06N5/02 , G06N5/04
Abstract: A malware family identification engine constructs a graph data structure of direct relationships between malware instances and malware families, direct relationships between malware instances and detected tags, and indirect relationships between detected tags and malware families. The engine builds a dictionary data structure comprising detected tag entries linking each detected tag to one or more malware family nodes based on the graph data structure. The engine identifies significant indirect entities (SIEs) within the detected tag entries of the dictionary data structure and selects a SIE with a highest number of out-going links (OGLs) as a root node in a family tree data structure, recursively connects SIEs with a number of OGLs less than the highest number of OGLs to the root node in the family tree data structure, and converts each SIE name in the family tree data structure to a chained family entity name in the family tree data structure.
-
公开(公告)号:US11899791B2
公开(公告)日:2024-02-13
申请号:US17489725
申请日:2021-09-29
Applicant: International Business Machines Corporation
Inventor: Yu-Siang Chen , Ci-Hao Wu , Ying-Chen Yu , Pao-Chuan Liao , June-Ray Lin
CPC classification number: G06F21/561 , G06F21/568 , G06N5/02 , G06N5/04
Abstract: A malware family identification engine constructs a graph data structure of direct relationships between malware instances and malware families, direct relationships between malware instances and detected tags, and indirect relationships between detected tags and malware families. The engine builds a dictionary data structure comprising detected tag entries linking each detected tag to one or more malware family nodes based on the graph data structure. The engine identifies significant indirect entities (SIEs) within the detected tag entries of the dictionary data structure and selects a SIE with a highest number of out-going links (OGLs) as a root node in a family tree data structure, recursively connects SIEs with a number of OGLs less than the highest number of OGLs to the root node in the family tree data structure, and converts each SIE name in the family tree data structure to a chained family entity name in the family tree data structure.
-
公开(公告)号:US11563557B2
公开(公告)日:2023-01-24
申请号:US15960662
申请日:2018-04-24
Applicant: International Business Machines Corporation
Inventor: Chih-Hsiung Liu , Joey H. Y. Tseng , Chih-Wen Su , June-Ray Lin , Gary P. Noble
Abstract: An example operation may include one or more of configuring a blockchain network comprising first and second blockchain nodes, providing, by the first blockchain node, a data reference to the second blockchain node, accessing a document, by the second blockchain node, from the first blockchain node, and providing by the second blockchain node, a proof of receipt for the document to a shared blockchain ledger.
-
公开(公告)号:US20230012202A1
公开(公告)日:2023-01-12
申请号:US17368627
申请日:2021-07-06
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Ci-Hao Wu , June-Ray Lin , Cheng-Ta Lee
IPC: G06N5/04 , G06N7/00 , G06F16/901 , G06F21/56
Abstract: Graph computing over micro and macro views includes expanding, with a processor at run-time, a set of nodes to include a node generated in response to received data corresponding to an event query. A first inference of an inference ensemble is determined by traversing a base graph whose nodes are associated with a discriminant power that exceeds a predetermined entity threshold. A second inference of the inference ensemble is determined by traversing a micro-view graph whose nodes are selected based on a number of references that exceeds a predetermined reference threshold. A third inference of the inference ensemble is determined by traversing a macro-view graph having one or more committee nodes and computing for each committee node a macro-node vote and generating a response to the event query based on the inference ensemble.
-
公开(公告)号:US20180219883A1
公开(公告)日:2018-08-02
申请号:US15418050
申请日:2017-01-27
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Guo Qiang Li , June-Ray Lin , Ronald Williams
IPC: H04L29/06
CPC classification number: H04L63/1425 , H04L63/1441
Abstract: A method, computer system, and a computer program product for a monitor security process is provided. The present invention may include configuring monitors in a chain configuration where sensors communicate with the monitors. The present invention may include receiving a first set of information from the sensor to a primary and backup monitor based on an event. The present invention may include broadcasting the information from the primary and backup monitor to a plurality of monitors and logging the information. The present invention may include receiving a second set of information from within the chain of monitors. The present invention may include determining that the sets of information conflict. The present invention may include marking at least one temporary log within the plurality of temporary logs as conflicting. The present invention may include determining that a conflicting threshold has been exceeded and then generate an audit and recovery plan.
-
公开(公告)号:US20180191864A1
公开(公告)日:2018-07-05
申请号:US15398860
申请日:2017-01-05
Applicant: International Business Machines Corporation
Inventor: Nan Dong , Wen Hui Fan , June-Ray Lin , Jin Zhang , Li Bo Zhang
IPC: H04L29/08 , H04L12/927 , H04L12/58
Abstract: Automatically reserving a requested resource in real-time is provided. In response to posting a resource request message that includes a set of resource request criteria on a network, a set of resource availability options is received from a set of resource service providers via the network using a negotiation communication channel. The set of resource availability options received from the set of resource service providers is ranked based on an amount of matching between constraints of each respective resource availability option and the set of resource request criteria. The set of resource availability options is displayed by rank from a greatest amount to a least amount of matching in a resource negotiation table.
-
公开(公告)号:US20180121929A1
公开(公告)日:2018-05-03
申请号:US15338666
申请日:2016-10-31
Applicant: International Business Machines Corporation
Inventor: Ching-Wei Cheng , Tzuching Kuo , June-Ray Lin , Yi Chun Tsai
CPC classification number: G06Q30/016
Abstract: Generating a solution keyword tag cloud is provided. Keywords are identified in a question asking how to resolve an issue experienced by a user with a product. The keywords identified in the question are matched with keyword tags included in a set of condition-solution trees corresponding to the product. The solution keyword tag cloud for the product is generated based on the matching of the keywords identified in the question with the keyword tags included in the set of condition-solution trees corresponding to the product. The solution keyword tag cloud is presented in a graphical user interface display on a client device corresponding to the user.
-
-
-
-
-
-
-
-
-