-
公开(公告)号:US20240256361A1
公开(公告)日:2024-08-01
申请号:US18162772
申请日:2023-02-01
IPC分类号: G06F9/50
CPC分类号: G06F9/5077 , G06F9/5083
摘要: A system includes a computing infrastructure, a memory that stores a digital twin of the computing infrastructure, and at least one processor configured to generate simulated containers relating to a job flow, wherein each simulated container simulates a corresponding actual container relating to the job flow that is to run on the computing infrastructure. The digital twin is configured based on configuration parameters to mimic a particular state of the computing infrastructure. A simulation of the job flow is iteratively run on the configured digital twin to determine an allocation of the simulated containers to simulated hardware components that resulted in one or more performance parameters satisfying the respective thresholds.
-
公开(公告)号:US12014096B1
公开(公告)日:2024-06-18
申请号:US18467216
申请日:2023-09-14
IPC分类号: G06F3/12
CPC分类号: G06F3/1238 , G06F3/1222 , G06F3/1288
摘要: A system for remote authentication accesses a scanned copy of a first document, images, and signatures associated with a requesting user, converts the scanned copy to a digital document, determines a subject matter associated with the first document based on an analysis of the digital document by natural language processing and machine-learning models, selects a first authenticator from multiple authenticators based on the subject matter, a timestamp of the authentication session, and an authenticator profile of the first authenticator, establishes a video communication session between the first authenticator and the requesting user via a display screen via networks, and instructs a printer to generate a physical copy of an authenticated first document including a first authentication certificate of the first authenticator upon determining the first document is authenticated by the first authenticator.
-
公开(公告)号:US20240354729A1
公开(公告)日:2024-10-24
申请号:US18135834
申请日:2023-04-18
CPC分类号: G06Q20/18 , G06Q20/108
摘要: Arrangements for a universal self-service kiosk platform are provided. In some aspects, registration data may be received from a plurality of enterprise organizations and may include self-service kiosk configuration data for each enterprise organization. A request to associate a self-service kiosk with a first enterprise organization may be received and may include identification of the first enterprise organization and the self-service kiosk. In response, a self-service kiosk configuration associated with the first enterprise organization may be retrieved and an instruction causing the self-service kiosk to implement the self-service kiosk configuration associated with the first enterprise organization may be generated. The instruction may be transmitted to the self-service kiosk. Transmitting the instruction to the self-service kiosk may cause the self-service kiosk to modify a current configuration including, for instance, modifying a display, modifying functionality provided, and the like, based on the self-service kiosk configuration associated with the first enterprise organization.
-
公开(公告)号:US20240305660A1
公开(公告)日:2024-09-12
申请号:US18119109
申请日:2023-03-08
发明人: George Anthony Albero , Kristoffer Matthew Bertsch , Jinna Zevulun Kim , Maharaj Mukherjee , Timothy Scott Murphy
IPC分类号: H04L9/40
CPC分类号: H04L63/1433 , H04L63/1416
摘要: A system is provided for containerization-based countermeasures to cybersecurity vulnerabilities. In particular, the system may generate one or more containers (e.g., virtual environments), where each container may be configured to execute one or more tasks. At least a portion of the containers may be decoy containers that may be executing one or more decoy tasks. The system may then use a randomized process to change which containers are decoy and/or which tasks or jobs are executed within each container. Each container may be associated with a cryptographic key such that each container may be hashed by the system and compared against a reference hash associated with the container. If the hash has changed, the system may determine that the container has been modified and subsequently implement one or more intelligent remediation processes.
-
-
-