-
公开(公告)号:US11755981B2
公开(公告)日:2023-09-12
申请号:US17321567
申请日:2021-05-17
Applicant: International Business Machines Corporation
Inventor: Jeb R. Linton , David K. Wright , Michael Amisano , John Melchionne , John Behnken , Dennis Kramer
IPC: G06Q10/0639 , G07C13/00 , H04N21/475
CPC classification number: G06Q10/06398 , G07C13/00 , H04N21/4758 , H04N21/4756
Abstract: Technology for voting, or endorsing with votes, a set of subjects under review, such as a group of human individual peers or a set of products. Each voter in this system is provided with an amount of voting credits that may be allocated among and between at least some of the subjects under review. In some embodiments a discounting scheme is applied to the voting credit allocations so that multiple credits allocated to a single subject will typically count for fewer net “votes” for the subject as the number of credits allocated to that single subject increases. In some embodiments, the discounting scheme is polynomial voting.
-
公开(公告)号:US11611538B2
公开(公告)日:2023-03-21
申请号:US17521636
申请日:2021-11-08
Applicant: International Business Machines Corporation
Inventor: Jeb R. Linton , John Behnken , John Melchionne , Dennis Kramer , Michael Amisano , Michael T. Fiori
Abstract: A method, apparatus and computer program product to detect whether specific sensitive data of a client is present in a cloud computing infrastructure is implemented without requiring that data be shared with the cloud provider, or that the cloud provider provide the client access to all data in the cloud. Instead of requiring the client to share its database of sensitive information, preferably the client executes a tool that uses a cryptographic protocol, namely, Private Set Intersection (PSI), to enable the client to detect whether their sensitive information is present on the cloud. Any such information identified by the tool is then used to label a document or utterance, send an alert, and/or redact or tokenize the sensitive data.
-
公开(公告)号:US11178117B2
公开(公告)日:2021-11-16
申请号:US16223191
申请日:2018-12-18
Applicant: International Business Machines Corporation
Inventor: Jeb R. Linton , John Behnken , John Melchionne , Dennis Kramer , Michael Amisano , Michael T. Fiori
Abstract: A method, apparatus and computer program product to detect whether specific sensitive data of a client is present in a cloud computing infrastructure is implemented without requiring that data be shared with the cloud provider, or that the cloud provider provide the client access to all data in the cloud. Instead of requiring the client to share its database of sensitive information, preferably the client executes a tool that uses a cryptographic protocol, namely, Private Set Intersection (PSI), to enable the client to detect whether their sensitive information is present on the cloud. Any such information identified by the tool is then used to label a document or utterance, send an alert, and/or redact or tokenize the sensitive data.
-
公开(公告)号:US20210257088A1
公开(公告)日:2021-08-19
申请号:US16792708
申请日:2020-02-17
Applicant: International Business Machines Corporation
Inventor: John Melchionne , Michael Amisano , John Behnken , Jeb R. Linton , David K. Wright , Dennis Kramer
Abstract: A first patient intervention is identified. The first patient intervention regards a first patient record that includes one or more attributes related to a first patient. The first patient intervention is transmitted to a first program split of a secure multi-party computation. A conflict is detected in the first patient intervention and an existing medical situation regarding the first patient. The conflict is detected by the first program split of the secure multi-party computation and by a third program split of the secure multi-party computation. Based on the detected conflict, a notification is generated by the first program split. The notification is based on the detected conflict. The notification based on the detected conflict is provided to a first client.
-
公开(公告)号:US11917404B2
公开(公告)日:2024-02-27
申请号:US18118208
申请日:2023-03-07
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jeb R. Linton , Michael Amisano , John Melchionne , Dennis Kramer , David K. Wright , John Behnken
Abstract: Methods for cellular network authentication utilizing unlinkable anonymous credentials are disclosed. In embodiments, a method includes: contacting, by a computing device, a mobile device network with a request to connect to the mobile device network; conducting, by the computing device, an interactive credential issuance protocol with an Issuer of the mobile device network to generate an unlinkable anonymous credential; and connecting, by the computing device, to the mobile device network based on a Verifier of the mobile device network verifying the computing device based on the unlinkable anonymous credential.
-
公开(公告)号:US20220366349A1
公开(公告)日:2022-11-17
申请号:US17321567
申请日:2021-05-17
Applicant: International Business Machines Corporation
Inventor: Jeb R. Linton , David K. Wright , Michael Amisano , John Melchionne , John Behnken , Dennis Kramer
Abstract: Technology for voting, or endorsing with votes, a set of subjects under review, such as a group of human individual peers or a set of products. Each voter in this system is provided with an amount of voting credits that may be allocated among and between at least some of the subjects under review. In some embodiments a discounting scheme is applied to the voting credit allocations so that multiple credits allocated to a single subject will typically count for fewer net “votes” for the subject as the number of credits allocated to that single subject increases. In some embodiments, the discounting scheme is polynomial voting.
-
公开(公告)号:US11250159B2
公开(公告)日:2022-02-15
申请号:US16203830
申请日:2018-11-29
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Dennis Kramer , Jeb R. Linton , Michael Amisano , David K. Wright , John Melchionne , John Behnken
Abstract: Systems for secure data monitoring utilizing secure private set intersections are disclosed. In embodiments, program instructions are executable by a computing device to cause the computing device to: generate a garbled circuit program compiled into a first half and a second half; send the second half of the garbled circuit program to a client server of a client; receive social network data from a social network provider; index, utilizing the first half of the garbled circuit program in cooperation with the second half of the garbled circuit program at the client server, the social network data based on predetermined intent categories; and generate search results, utilizing the first half of the garbled circuit program in cooperation with the second half of the garbled circuit program at the client server, based on client data at the second half of the garbled circuit program.
-
公开(公告)号:US20210271963A1
公开(公告)日:2021-09-02
申请号:US16804076
申请日:2020-02-28
Applicant: International Business Machines Corporation
Inventor: Michael Amisano , John Behnken , Jeb R. Linton , John Melchionne , David K. Wright , Dennis Kramer
Abstract: Training a deep neural network model using a trusted execution environment is provided. A selection of two or more encrypted files owned by different entities within a plurality of encrypted files containing sensitive datasets is made by a user of a client device. The two or more encrypted files owned by the different entities are decrypted within the trusted execution environment to form decrypted sensitive datasets owned by the different entities. The decrypted sensitive datasets owned by the different entities are combined within the trusted execution environment to form combined sensitive data owned by the different entities. The deep neural network model is generated within the trusted execution environment based on the combined sensitive data owned by the different entities. The deep neural network model is trained within the trusted execution environment using the combined sensitive data owned by the different entities.
-
公开(公告)号:US11627459B2
公开(公告)日:2023-04-11
申请号:US16510020
申请日:2019-07-12
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jeb R. Linton , Michael Amisano , John Melchionne , Dennis Kramer , David K. Wright , John Behnken
Abstract: Methods for cellular network authentication utilizing unlinkable anonymous credentials are disclosed. In embodiments, a method includes: contacting, by a computing device, a mobile device network with a request to connect to the mobile device network; conducting, by the computing device, an interactive credential issuance protocol with an Issuer of the mobile device network to generate an unlinkable anonymous credential; and connecting, by the computing device, to the mobile device network based on a Verifier of the mobile device network verifying the computing device based on the unlinkable anonymous credential.
-
公开(公告)号:US11604986B2
公开(公告)日:2023-03-14
申请号:US16804076
申请日:2020-02-28
Applicant: International Business Machines Corporation
Inventor: Michael Amisano , John Behnken , Jeb R. Linton , John Melchionne , David K. Wright , Dennis Kramer
Abstract: Training a deep neural network model using a trusted execution environment is provided. A selection of two or more encrypted files owned by different entities within a plurality of encrypted files containing sensitive datasets is made by a user of a client device. The two or more encrypted files owned by the different entities are decrypted within the trusted execution environment to form decrypted sensitive datasets owned by the different entities. The decrypted sensitive datasets owned by the different entities are combined within the trusted execution environment to form combined sensitive data owned by the different entities. The deep neural network model is generated within the trusted execution environment based on the combined sensitive data owned by the different entities. The deep neural network model is trained within the trusted execution environment using the combined sensitive data owned by the different entities.
-
-
-
-
-
-
-
-
-