-
公开(公告)号:US11411739B2
公开(公告)日:2022-08-09
申请号:US16270145
申请日:2019-02-07
摘要: A processor-implemented method imposes trust at the edge of a blockchain. A hardware interrogator in a terminal interrogates an Internet of Things Smart Device (IoTSD). The IoTSD is an off-line device that is associated with a physical product. The IoTSD includes a cryptographic processor and one or more state sensors that monitor a state of the physical product. The hardware interrogator detects an event that is described by an encrypted entry in the IoTSD. The terminal transmits, to a blockchain, a transaction that describes the event that is detected by the hardware interrogator, such that the blockchain adds the transaction to a blockchain that is dedicated to the physical product, and the blockchain establishes a state of the physical product.
-
公开(公告)号:US11374958B2
公开(公告)日:2022-06-28
申请号:US16176785
申请日:2018-10-31
摘要: A method provides an intermediate mitigation of a vulnerability in a particular computer system. One or more processors receive a description of a vulnerability of a computer system to a malicious attack. The processor(s) perform an NLP analysis of the description of the vulnerability in order to extract risk information related to the vulnerability, where the risk information includes an identity of a type of vulnerable computer system resource in the computer system. The processor(s) match the vulnerable computer system resource to a computer system resource in a particular computer system, and perform an intermediate mitigation action that reduces a functionality of the computer system resource in the particular computer system until a solution is implemented that both restores the functionality of the computer system resource in the particular computer system and mitigates the vulnerability of the particular computer system to the malicious attack.
-
公开(公告)号:US11366683B2
公开(公告)日:2022-06-21
申请号:US16734279
申请日:2020-01-03
发明人: Yuan Yuan Wang , Qi Feng Huo , Da Li Liu , Cdl Lei Li , Yan Song Liu , Tian Xiaoyi , Shu Chao Wan
IPC分类号: G06F9/46 , G06F9/455 , G06N3/04 , G06F16/955
摘要: A process deployment controller creates an updated image for an intermediary engine in order to execute one or more applications on a host infrastructure. The process deployment controller generates a partial image by executing source code from a template repository. The partial image provides a structure used to create an intermediary engine used with a container, which includes an application, as well as binaries and libraries required to execute the application in an infrastructure via the intermediary engine. The process deployment controller transmits an identifier of the infrastructure to a component registry; receives a component description of the infrastructure from the component registry; and uses the component description to create an updated image of the partial image. The process deployment controller, upon receiving a request for the application to run on the infrastructure, utilizes the updated image and intermediary engine to execute the application on the infrastructure.
-
公开(公告)号:US11268809B2
公开(公告)日:2022-03-08
申请号:US16182719
申请日:2018-11-07
发明人: Jennifer Bennett , James D. Bielick , David J. Braun , Timothy P. Younger , Theron L. Lewis , Stephen M. Hugo , John R. Dangler , Timothy A. Bartsch
IPC分类号: G01B21/30
摘要: A method adjusts a mechanical process on a material in order to improve bonding characteristics of the material. A system collects surface micro-roughness measurements of a material, and places discrete sampling regions on the material. The system analyzes the surface micro-roughness measurements for each of the discrete sampling regions on the material, and identifies a lowest micro-roughness measurement in a discrete sampling region from a plurality of discrete sampling regions on the material. The system compares the lowest micro-roughness measurement to a threshold micro-roughness measurement in order to determine that the lowest micro-roughness measurement is less than the threshold micro-roughness measurement. In response to determining that the lowest micro-roughness measurement is less than the threshold micro-roughness measurement, the system adjusts a mechanical process on the material until micro-roughness measurements for each of the discrete sampling regions are greater than the threshold micro-roughness measurement.
-
公开(公告)号:US11206453B2
公开(公告)日:2021-12-21
申请号:US16848354
申请日:2020-04-14
IPC分类号: H04N21/466 , G06Q30/02 , G06N20/00 , H04N21/845 , H04N21/45 , H04N21/439 , H04N21/44 , H04N21/2187
摘要: A method utilizes Artificial Intelligence (AI) system to broadcast a real-time event to a particular broadcast audience. The AI system receives a profile of a particular broadcast audience for a real-time event, and concurrent real-time Audio/Video (/V) streams for a particular portion of the real-time event. The AI system ranks the concurrent real-time A/V streams for the particular portion of the real-time event based on the types of event activities depicted in each of the concurrent real-time A/V streams and the profile of the particular broadcast audience for the real-time event; selects a particular real-time A/V stream, from the concurrent real-time A/V streams, for the particular broadcast audience based on the ranking; and directs a performance of a broadcast action related to the selected particular real-time A/V stream.
-
公开(公告)号:US11151154B2
公开(公告)日:2021-10-19
申请号:US16055267
申请日:2018-08-06
发明人: Samuel S. Adams , Robert R. Friedlander , John K. Gerken, III , James R. Kraemer , Philip R. Varker
摘要: A computer-implemented method, system, and/or computer program product generates and utilizes synthetic context-based objects. One or more processors define a context object, where the context object provides a context that identifies a specific subject-matter, from multiple subject-matters, of a non-contextual data object. The processor(s) associate the non-contextual data object with the context object to define a synthetic context-based object and the synthetic context-based object with at least one specific data store. A request is received from a requester for data from said at least one specific data store that is associated with the synthetic context-based object, where said at least one specific data store is within a database of multiple data stores. Data is returned to the requester from said at least one specific data store that is associated with the synthetic context-based object.
-
公开(公告)号:US11003834B2
公开(公告)日:2021-05-11
申请号:US15841474
申请日:2017-12-14
发明人: Ali A. S. A. Elgamal
IPC分类号: G06F16/23 , G06F16/24 , G06F40/14 , G06F40/221
摘要: A computer-implemented method returns a third child data element from a structured tree. One or more processors traverse through a structured tree using a single direction iteration order until a first child data element and second child data element are reached. In response to reaching the second child data element, the processor(s) remove from memory any description of the structured tree that was used to reach the first child data element and the second child data element other than an element level counter that describes the level of the structured tree at which the first sibling data element and the second sibling data element are located. The processor(s) utilize a content of the element level counter to reconstruct the structured tree in order locate and return a third child data element in the reconstructed structured tree to a requester.
-
公开(公告)号:US10979452B2
公开(公告)日:2021-04-13
申请号:US16137630
申请日:2018-09-21
摘要: A method contains malware within a network resource. A blockchain system establishes a smart contract, on the blockchain system, for a network resource in a computer environment. The smart contract is for an action to be performed on the network resource if a malware is detected on the network resource. In response to malware being detected in the network resource, the blockchain system determines whether a consensus is reached by a plurality of computers on the blockchain system to implement the action to contain the malware based on the smart contract. In response to the consensus being reached by the plurality of computers, the blockchain system transmits, to the network resource, directions to implement the action on the network resource as specified by the smart contract.
-
公开(公告)号:US10944560B2
公开(公告)日:2021-03-09
申请号:US16053189
申请日:2018-08-02
发明人: Suresh N. Chari , Hasini Gunasinghe , Ashish Kundu , Kapil Kumar Singh , Dong Su
摘要: A processor-implemented method facilitates identity exchange in a decentralized setting. A first system performs a pseudonymous handshake with a second system that has created an identity asset that identifies an entity. The second system has transmitted the identity asset to a third system, which is a set of peer computers that support a blockchain that securely maintains a ledger of the identity asset. The first system transmits a set of pseudonyms to the third system, where the set of pseudonyms comprises a first pseudonym that identifies the first system, a second pseudonym that identifies a user of the second system, and a third pseudonym that identifies the third system. The first system receives the identity asset from the third system, which securely ensures a validity of the identity asset as identified by the first pseudonym, the second pseudonym, and the third pseudonym.
-
公开(公告)号:US10901936B2
公开(公告)日:2021-01-26
申请号:US15215636
申请日:2016-07-21
摘要: A method, system, and/or computer program product controls transitions from a first bandwidth to a second bandwidth in a bus within a multi-processor computer. A bus controller predicts a bandwidth transition requirement for a bus in a multi-processor computer, and transitions the bus from a first bandwidth to a second bandwidth based on the predicted bandwidth transition requirement. The bus controller checks an actual transitioning requirement of the bus in the computer, such that the bus controller checks the actual transitioning requirement for the bus at each occurrence of a predefined stage of operation of one or more processor processors in the computer. In response to the actual transitioning requirement matching the predicted bandwidth transition requirement, the bus controller directions a continuation of the transitioning of the bus from the first bandwidth to the second bandwidth.
-
-
-
-
-
-
-
-
-