-
公开(公告)号:US11562096B2
公开(公告)日:2023-01-24
申请号:US16361517
申请日:2019-03-22
Applicant: International Business Machines Corporation
Inventor: Francesco Maria Carteri , Antonio Perrone , Leonardo Rosati
IPC: G06F21/62 , G06F16/901 , G06F16/908
Abstract: Embodiments of the present disclosure describe selective discovery, management, and deletion of personal data. The method accesses a set of data on a networked resource. The data is formed of a plurality of data elements which are arranged in at least one data table. The method identifies one or more sensitive data elements within the set of data related to one or more individuals. The method determines a sensitivity level of the one or more sensitive data elements and generates a catalogue including at least one new data element representative of the one or more sensitive data elements and based on the sensitivity level of the one or more sensitive data elements. The method tags the one or more sensitive data elements within the catalogue based on the sensitivity level of the one or more sensitive data elements corresponding to the new data element.
-
公开(公告)号:US10412561B2
公开(公告)日:2019-09-10
申请号:US16025093
申请日:2018-07-02
Applicant: International Business Machines Corporation
Inventor: Fabio Cerri , Alice Guidotti , Leonardo Rosati , Elia Tufarolo
Abstract: A method and system for controlling operation of a computing device. One or more applicable settings among settings of one or more features of the computing device are determined. The settings are indicated by policies provided by two or more providers according to priorities of corresponding providers for application of corresponding policies of the providers. The policies include an indication of corresponding settings of the one or more features of the computing device. The providers are validated with at least one authority. The at least one authority certified the priorities of the providers and permissions of the providers to set the features of the policies. The computing device is configured to operate according to the applicable settings of the features.
-
公开(公告)号:US20190102696A1
公开(公告)日:2019-04-04
申请号:US15722044
申请日:2017-10-02
Applicant: International Business Machines Corporation
Inventor: Alice Guidotti , Leonardo Rosati , Fabio Cerri , Bernardo Pastorelli
Abstract: A cognitive system collects online behaviors of a user and an affinity group of users who are related (e.g. by relationship, or behavioral similarities) to the user. A knowledge base of behavior and sentiment patterns is produced and maintained. If real-time data for the user shifts in behavior and/or sentiment and significantly deviates from established patterns, the system looks for a similar behavior and/or sentiment pattern shift among members of the affinity group. If the affinity group patterns shift in a manner similar to the first user's pattern shift, the cognitive system, in response, updates the knowledge base with information related to the shift, thereby adding knowledge to the long-term patterns. If the cognitive system finds that the user's behavior and/or sentiment pattern shift differs significantly from the affinity group, the system generates an empathy fostering alert message and sends it to one or more recipients.
-
公开(公告)号:US11157831B2
公开(公告)日:2021-10-26
申请号:US15722044
申请日:2017-10-02
Applicant: International Business Machines Corporation
Inventor: Alice Guidotti , Leonardo Rosati , Fabio Cerri , Bernardo Pastorelli
IPC: G06F40/30 , G06N20/00 , G06F40/103 , G06F40/279 , G06F40/284
Abstract: A cognitive system collects online behaviors of a user and an affinity group of users who are related (e.g. by relationship, or behavioral similarities) to the user. A knowledge base of behavior and sentiment patterns is produced and maintained. If real-time data for the user shifts in behavior and/or sentiment and significantly deviates from established patterns, the system looks for a similar behavior and/or sentiment pattern shift among members of the affinity group. If the affinity group patterns shift in a manner similar to the first user's pattern shift, the cognitive system, in response, updates the knowledge base with information related to the shift, thereby adding knowledge to the long-term patterns. If the cognitive system finds that the user's behavior and/or sentiment pattern shift differs significantly from the affinity group, the system generates an empathy fostering alert message and sends it to one or more recipients.
-
公开(公告)号:US11151316B2
公开(公告)日:2021-10-19
申请号:US16452677
申请日:2019-06-26
Applicant: International Business Machines Corporation
Inventor: Leonardo Rosati , Andrea Di Maio , Andrea Durastante , Cristina Bonanni
IPC: G06F40/197 , G06F40/143 , G06F40/134
Abstract: A webpage notification control system is provided. A computing device monitors a plurality of website content stored on a database. A computing device identifies one or more anchor contents associated with the plurality of website content stored on a database. A computing device detects changes made to one or more data contents associated with the plurality of website content stored on a database. A computing device generates an alert based, at least in part, on the detection of a change made to one or more data contents associated with the plurality of website content.
-
公开(公告)号:US20190124492A1
公开(公告)日:2019-04-25
申请号:US16025093
申请日:2018-07-02
Applicant: International Business Machines Corporation
Inventor: Fabio Cerri , Alice Guidotti , Leonardo Rosati , Elia Tufarolo
CPC classification number: H04W4/50 , G06F9/44505 , H04L41/28 , H04L63/0823 , H04W12/06 , H04W64/00
Abstract: A method and system for controlling operation of a computing device. One or more applicable settings among settings of one or more features of the computing device are determined. The settings are indicated by policies provided by two or more providers according to priorities of corresponding providers for application of corresponding policies of the providers. The policies include an indication of corresponding settings of the one or more features of the computing device. The providers are validated with at least one authority. The at least one authority certified the priorities of the providers and permissions of the providers to set the features of the policies. The computing device is configured to operate according to the applicable settings of the features.
-
公开(公告)号:US20180173861A1
公开(公告)日:2018-06-21
申请号:US15382282
申请日:2016-12-16
Applicant: International Business Machines Corporation
Inventor: Alice Guidotti , Bernardo Pastorelli , Leonardo Rosati , Elia Tufarolo
Abstract: In one implementation, the present invention is directed to a method for controlling access to a software application using one or more processors configured by code, the method comprising repeating a usage verification cycle continually during a usage session of the software application, wherein each repetition of the usage verification cycle includes receiving a digital image of an access area used to access the software application, identifying a representation of one or more persons in the digital image, estimating an age of each one of the persons within the digital image, and comparing the estimated age of each one of the persons within the digital image to a predetermined age value provided in a usage policy dataset associated with at least of one of the persons within the digital image. The method further comprises interrupting the usage of the software application in response to the age of at least one of the persons within the digital image exceeding the predetermined age value provided in a usage policy dataset.
-
公开(公告)号:US11954007B2
公开(公告)日:2024-04-09
申请号:US17659883
申请日:2022-04-20
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Leonardo Rosati , Francesco Maria Carteri
CPC classification number: G06F11/3438 , G06F8/36 , H04L9/3247 , G06F2201/865
Abstract: Tracking software usage through the following operations: calculating current digests of common libraries used by software programs and obtaining digital signatures of tracking information of the software programs comprising identifiers of their common libraries and the corresponding current digests; responses are returned to calls for the software programs in association with the corresponding tracking information and digital signatures. A corresponding method under the control of a client comprises receiving a response to a call for a software program in association with the corresponding tracking information and digital signature. The common libraries of the software program are tracked according to a verification of the digital signature and of the current digests against corresponding reference digests. Computer programs and computer program products for performing the methods are proposed. Moreover, corresponding server computing system, client computing system and computing infrastructure are proposed.
-
公开(公告)号:US11379080B2
公开(公告)日:2022-07-05
申请号:US16894616
申请日:2020-06-05
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Leonardo Rosati , Roberto Raffo , Alice Guidotti , Fabio Cerri
IPC: G06F3/041
Abstract: Provided are techniques for automatically correcting touchscreen errors. A first location input is received from a user touching a global touchscreen of a global device, where the first location input is a location relative to a display surface of the global touchscreen. It is determined that movement of the global device is different from movement of a local device. Motion information of the local device is retrieved. The first location input is corrected to a second location input based on the motion information. In response to the second location input, an operation is performed.
-
公开(公告)号:US10747525B2
公开(公告)日:2020-08-18
申请号:US15917564
申请日:2018-03-09
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Rosario Gangemi , Francesco Lupini , Bernardo Pastorelli , Leonardo Rosati
Abstract: The invention relates to a method for distributing a software upgrade to client computing devices, the software upgrade being assigned to a software program, the client computing devices being communicatively coupled via a network, a target client of the client computing devices being adapted for executing the software program, the software program being adapted, when executed by the target client, for causing the target client to send via the network a signature specific to the software program, the method comprising intercepting network traffic from the client computing devices. The method comprises of detecting the signature in the intercepted traffic. The method comprises of collecting a network footprint from the intercepted traffic, the footprint being associated with the detected signature, the footprint comprising an identifier of the target client, the detected signature having been received from the target client. The method comprises of using the footprint for distributing the upgrade.
-
-
-
-
-
-
-
-
-