Comparing utility and warranty of services

    公开(公告)号:US10713606B2

    公开(公告)日:2020-07-14

    申请号:US16459674

    申请日:2019-07-02

    Abstract: An invention for comparing utility and warranty of services in an information (IT) stack is provided. Embodiments of this invention are directed to comparing utility and warranty of services in an information technology (IT) stack comprising a plurality of layers, at least one of the plurality of layers having a set of services. In these embodiments, a utility and warranty tool provides this capability. Specifically, the utility and warranty tool comprises a determination component configured to determine, at each layer of the IT stack, a required utility and warranty (RUW) value for each of the set of services, wherein the RUW value represents a desired solution for implementing a business process; and determine, at each layer of the IT stack, an available utility and warranty (AUW) value for each of the set of services, wherein the AUW value is a measure of an ability of each of the set of services to satisfy the RUW at each layer of the IT stack. The utility and warranty tool further comprises a comparison component configured to compare the RUW value against the AUW value at each layer of the IT stack to determine whether each of the set of services satisfies the desired solution for implementing the business process.

    Multiple-point cognitive identity challenge system

    公开(公告)号:US10210317B2

    公开(公告)日:2019-02-19

    申请号:US15236796

    申请日:2016-08-15

    Abstract: A mechanism is provided for verifying an identity of a user using dynamically generated questions based on transactions conducted by the user. Responsive to receiving a request to verify the identity of the user, one or more transaction based sources associated with the user are scanned for a set of transactions conducted by the user within a first predetermined time frame of a current time. A subset of transactions from the set of transactions are randomly selected as the basis for forming a set of questions to be used to verify the identity of the user. The set of questions are generated such that the user is required to identify one or more details about the subset of transactions in order to verify the user's identity. Responsive to the user correctly answering the one or more details about the subset of transactions, the user is authenticated.

    Installing virtual machines within different communication pathways to access protected resources
    3.
    发明授权
    Installing virtual machines within different communication pathways to access protected resources 有权
    在不同的通信路径中安装虚拟机以访问受保护的资源

    公开(公告)号:US09553877B2

    公开(公告)日:2017-01-24

    申请号:US15204087

    申请日:2016-07-07

    Abstract: One or more processors fractionate a computer application into disparate components, and assign two or more of the disparate components to different communication pathways, where the different communication pathways lead to requisite resources needed to execute the disparate components. The processor(s) create a virtual machine that controls access to a particular requisite resource by a particular disparate component, and install the virtual machine within at least one of the different communication pathways to control access to the particular requisite resource by the particular disparate component. The processor(s) transmit a resource retrieval instruction to retrieve the particular requisite resource via the virtual machine and at least one of the different communication pathways, and adjust a quantity of virtual machines between the computer application and the particular requisite resource according to a threat level for the particular disparate component.

    Abstract translation: 一个或多个处理器将计算机应用程序分解成不同的组件,并将两个或多个不同的组件分配给不同的通信路径,其中不同的通信路径导致执行不同组件所需的必需资源。 处理器创建一个虚拟机,其控制特定不同组件对特定必需资源的访问,并且将虚拟机安装在不同通信路径中的至少一个中,以控制特定不同组件对特定必需资源的访问 。 处理器传送资源检索指令以经由虚拟机和不同通信路径中的至少一个来检索特定必需资源,并根据威胁调整计算机应用程序与特定必需资源之间的虚拟机数量 对于特定的不同组件的级别。

    Multiple-Point Cognitive Identity Challenge System Using Voice Analysis

    公开(公告)号:US20180047025A1

    公开(公告)日:2018-02-15

    申请号:US15236821

    申请日:2016-08-15

    CPC classification number: G06Q20/4016 G06Q20/388 G06Q20/40145

    Abstract: A mechanism is provided for verifying an identity of a user using dynamically generated questions based on transactions conducted by the user. One or more transaction based sources associated with the user are scanned for a set of transactions conducted by the user. A subset of transactions from the set of transactions are randomly selected as the basis for forming a set of questions to be used to verify the identity of the user. The set of questions are generated such that the user is required to identify one or more details about the subset of transactions in order to verify the user's identity. Responsive to the user correctly answering the one or more details about each of the subset of transactions vocally and voice analysis of the answers to the set of questions failing to indicate any discrepancy, the user is authenticated.

    SECURITY MAXIMIZATION FOR A COMPUTER RELATED DEVICE BASED ON REAL-TIME REACTION
    5.
    发明申请
    SECURITY MAXIMIZATION FOR A COMPUTER RELATED DEVICE BASED ON REAL-TIME REACTION 审中-公开
    基于实时反应的计算机相关设备的安全最大化

    公开(公告)号:US20170063785A1

    公开(公告)日:2017-03-02

    申请号:US14752230

    申请日:2015-06-26

    CPC classification number: H04L63/0421 H04L63/0428

    Abstract: Methods and a system are provided that, in turn, are for providing security between a user device and a computer related device. A method includes providing a distributed registry service that specifies a plurality of services available to support communications between the user device and the computer related device. The method further includes at least one of dynamically constructing and altering one or more multi-node transient processing pathways between the user device and the computer related device based on respective selected ones of the plurality of services. For at least one node in each of the one or more transient processing pathways, an address thereof and a time period the at least one node is active and capable of being used is set or changed, based on at least one of an application programming interface type and a data request type implicated by a received packet.

    Abstract translation: 提供了方法和系统,其依次用于在用户设备和计算机相关设备之间提供安全性。 一种方法包括提供分配的注册表服务,其指定可用于支持用户设备和计算机相关设备之间的通信的多个服务。 该方法还包括基于多个服务中的相应选择的一个,动态构建和改变用户设备与计算机相关设备之间的一个或多个多节点瞬态处理路径中的至少一个。 对于一个或多个瞬态处理路径中的每一个中的至少一个节点,基于应用编程接口中的至少一个来设置或改变其地址和至少一个节点有效并且能够被使用的时间段 类型和接收到的数据包涉及的数据请求类型。

    Installing virtual machines within different communication pathways to access protected resources
    6.
    发明授权
    Installing virtual machines within different communication pathways to access protected resources 有权
    在不同的通信路径中安装虚拟机以访问受保护的资源

    公开(公告)号:US09459912B1

    公开(公告)日:2016-10-04

    申请号:US14749116

    申请日:2015-06-24

    Abstract: A computer-implemented method, system, and/or computer program product controls access to computer resources used by a computer application. One or more processors fractionate a computer application into disparate components. Two or more of the disparate components are assigned to different communication pathways, where the different communication pathways lead to requisite resources needed to execute the disparate components. One or more processors create and install a virtual machine within at least one of the different communication pathways, such that the virtual machine controls access to a particular requisite resource by a particular disparate component. One or more processors then issue a resource retrieval instruction to retrieve the particular requisite resource via the virtual machine and at least one of the different communication pathways.

    Abstract translation: 计算机实现的方法,系统和/或计算机程序产品控制对计算机应用程序使用的计算机资源的访问。 一个或多个处理器将计算机应用程序分解成不同的组件。 两个或多个不同的组件被分配到不同的通信路径,其中不同的通信路径导致执行不同组件所需的必需资源。 一个或多个处理器在至少一个不同的通信路径之间创建并安装虚拟机,使得虚拟机通过特定的不同组件控制对特定必需资源的访问。 然后,一个或多个处理器发出资源检索指令以经由虚拟机和不同通信路径中的至少一个来检索特定的必需资源。

    Security maximization for a computer related device based on real-time reaction

    公开(公告)号:US10135793B2

    公开(公告)日:2018-11-20

    申请号:US14752230

    申请日:2015-06-26

    Abstract: Methods and a system are provided that, in turn, are for providing security between a user device and a computer related device. A method includes providing a distributed registry service that specifies a plurality of services available to support communications between the user device and the computer related device. The method further includes at least one of dynamically constructing and altering one or more multi-node transient processing pathways between the user device and the computer related device based on respective selected ones of the plurality of services. For at least one node in each of the one or more transient processing pathways, an address thereof and a time period the at least one node is active and capable of being used is set or changed, based on at least one of an application programming interface type and a data request type implicated by a received packet.

    COMPARING UTILITY AND WARRANTY OF SERVICES
    8.
    发明申请
    COMPARING UTILITY AND WARRANTY OF SERVICES 审中-公开
    比较实用程序和服务保证

    公开(公告)号:US20160371621A1

    公开(公告)日:2016-12-22

    申请号:US15256825

    申请日:2016-09-06

    Abstract: An invention for comparing utility and warranty of services in an information (IT) stack is provided. Embodiments of this invention are directed to comparing utility and warranty of services in an information technology (IT) stack comprising a plurality of layers, at least one of the plurality of layers having a set of services. In these embodiments, a utility and warranty tool provides this capability. Specifically, the utility and warranty tool comprises a determination component configured to determine, at each layer of the IT stack, a required utility and warranty (RUW) value for each of the set of services, wherein the RUW value represents a desired solution for implementing a business process; and determine, at each layer of the IT stack, an available utility and warranty (AUW) value for each of the set of services, wherein the AUW value is a measure of an ability of each of the set of services to satisfy the RUW at each layer of the IT stack. The utility and warranty tool further comprises a comparison component configured to compare the RUW value against the AUW value at each layer of the IT stack to determine whether each of the set of services satisfies the desired solution for implementing the business process.

    Abstract translation: 提供了一种用于比较信息(IT)堆栈中的服务的实用程序和保修的发明。 本发明的实施例涉及比较包括多个层的信息技术(IT)堆栈中的服务的效用和保证,所述多个层中的至少一个层具有一组服务。 在这些实施例中,公用事业和保修工具提供这种能力。 具体地,效用和保修工具包括确定组件,其被配置为在IT层的每一层确定所述一组服务中的每一个所需的实用程序和保修(RUW)值,其中,所述R​​UW值表示用于实现的所需解决方案 业务流程 并且在所述IT堆栈的每一层确定所述一组服务中的每个服务的可用效用和保证(AUW)值,其中所述AUW值是所述一组服务中的每一个以满足所述RUW的能力的量度 IT层的每一层。 实用程序和保修工具还包括比较组件,其被配置为在IT堆栈的每一层比较RUW值与AUW值,以确定该组服务中的每一个是否满足用于实现业务过程的期望解决方案。

Patent Agency Ranking