Predictive load modeling using a digital twin of a computing infrastructure

    公开(公告)号:US20240256361A1

    公开(公告)日:2024-08-01

    申请号:US18162772

    申请日:2023-02-01

    IPC分类号: G06F9/50

    CPC分类号: G06F9/5077 G06F9/5083

    摘要: A system includes a computing infrastructure, a memory that stores a digital twin of the computing infrastructure, and at least one processor configured to generate simulated containers relating to a job flow, wherein each simulated container simulates a corresponding actual container relating to the job flow that is to run on the computing infrastructure. The digital twin is configured based on configuration parameters to mimic a particular state of the computing infrastructure. A simulation of the job flow is iteratively run on the configured digital twin to determine an allocation of the simulated containers to simulated hardware components that resulted in one or more performance parameters satisfying the respective thresholds.

    System and method for remote authentication based on computer-vision technologies

    公开(公告)号:US12014096B1

    公开(公告)日:2024-06-18

    申请号:US18467216

    申请日:2023-09-14

    IPC分类号: G06F3/12

    摘要: A system for remote authentication accesses a scanned copy of a first document, images, and signatures associated with a requesting user, converts the scanned copy to a digital document, determines a subject matter associated with the first document based on an analysis of the digital document by natural language processing and machine-learning models, selects a first authenticator from multiple authenticators based on the subject matter, a timestamp of the authentication session, and an authenticator profile of the first authenticator, establishes a video communication session between the first authenticator and the requesting user via a display screen via networks, and instructs a printer to generate a physical copy of an authenticated first document including a first authentication certificate of the first authenticator upon determining the first document is authenticated by the first authenticator.

    UNIVERSAL SELF-SERVICE KIOSK PLATFORM
    3.
    发明公开

    公开(公告)号:US20240354729A1

    公开(公告)日:2024-10-24

    申请号:US18135834

    申请日:2023-04-18

    IPC分类号: G06Q20/18 G06Q20/10

    CPC分类号: G06Q20/18 G06Q20/108

    摘要: Arrangements for a universal self-service kiosk platform are provided. In some aspects, registration data may be received from a plurality of enterprise organizations and may include self-service kiosk configuration data for each enterprise organization. A request to associate a self-service kiosk with a first enterprise organization may be received and may include identification of the first enterprise organization and the self-service kiosk. In response, a self-service kiosk configuration associated with the first enterprise organization may be retrieved and an instruction causing the self-service kiosk to implement the self-service kiosk configuration associated with the first enterprise organization may be generated. The instruction may be transmitted to the self-service kiosk. Transmitting the instruction to the self-service kiosk may cause the self-service kiosk to modify a current configuration including, for instance, modifying a display, modifying functionality provided, and the like, based on the self-service kiosk configuration associated with the first enterprise organization.

    SYSTEM FOR CONTAINERIZATION-BASED COUNTERMEASURES TO CYBERSECURITY VULNERABILITIES

    公开(公告)号:US20240305660A1

    公开(公告)日:2024-09-12

    申请号:US18119109

    申请日:2023-03-08

    IPC分类号: H04L9/40

    CPC分类号: H04L63/1433 H04L63/1416

    摘要: A system is provided for containerization-based countermeasures to cybersecurity vulnerabilities. In particular, the system may generate one or more containers (e.g., virtual environments), where each container may be configured to execute one or more tasks. At least a portion of the containers may be decoy containers that may be executing one or more decoy tasks. The system may then use a randomized process to change which containers are decoy and/or which tasks or jobs are executed within each container. Each container may be associated with a cryptographic key such that each container may be hashed by the system and compared against a reference hash associated with the container. If the hash has changed, the system may determine that the container has been modified and subsequently implement one or more intelligent remediation processes.