-
公开(公告)号:US10275579B2
公开(公告)日:2019-04-30
申请号:US15842157
申请日:2017-12-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Romelia H. Flores , Christian E. Loza , Olivia G. Loza , Tomyo G. Maeshiro
Abstract: Methods, computer program products, and systems are set forth herein and can include examining a video file using content of an authorship attribution database, the authorship attribution database including one or more authorship attribution video file record; and determining authorship attribution of the video file based on the examining. The authorship attribution database can include one or more authorship attribution video file record.
-
公开(公告)号:US10289815B2
公开(公告)日:2019-05-14
申请号:US15237353
申请日:2016-08-15
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Romelia H. Flores , Christian E. Loza , Olivia G. Loza , Tomyo G. Maeshiro
Abstract: Methods, computer program products, and systems are set forth herein and can include examining a video file using content of an authorship attribution database, the authorship attribution database including one or more authorship attribution video file record; and determining authorship attribution of the video file based on the examining. The authorship attribution database can include one or more authorship attribution video file record.
-
公开(公告)号:US20180278745A1
公开(公告)日:2018-09-27
申请号:US15469083
申请日:2017-03-24
Applicant: International Business Machines Corporation
Inventor: Romelia H. Flores , Christian E. Loza , Olivia G. Loza , Tomyo G. Maeshiro
Abstract: A communication device associated with a first party monitors a call between the first party and a second party. The communication device identifies a request for sensitive information from the second party during the call. The communication device determines whether the requested sensitive information matches sensitive information stored in an encrypted data store by determining whether a text representation of the requested sensitive information matches a text representation of the sensitive information stored in the encrypted data store. The communication device sends, responsive to determining that the requested for sensitive information matches the stored sensitive information, the requested sensitive information to the second party.
-
公开(公告)号:US20180095605A1
公开(公告)日:2018-04-05
申请号:US15283060
申请日:2016-09-30
Applicant: International Business Machines Corporation
Inventor: Romelia H. Flores , Christian E. Loza , Olivia G. Loza , Tomyo G. Maeshiro
IPC: G06F3/0482
Abstract: Invoking a function of a mixed reality interaction enabled object is provided. In response to determining that an input was received selecting the mixed reality interaction enabled object to perform an action, an interface is received showing a set of available application programming interfaces and functions corresponding to the mixed reality interaction enabled object. A selection of one of the set of available application programming interfaces and functions corresponding to the mixed reality interaction enabled object is received via the interface. The action corresponding to the selection of the one of the set of available application programming interfaces and functions is invoked on the mixed reality interaction enabled object.
-
公开(公告)号:US09836382B2
公开(公告)日:2017-12-05
申请号:US15046440
申请日:2016-02-17
Applicant: International Business Machines Corporation
Inventor: Mandeep Chana , William King , Tomyo G. Maeshiro , Mathews Thomas , Janki Y. Vora
CPC classification number: G06F17/30144 , G06F11/0748 , G06F11/079 , G06F11/0793 , H04L41/00
Abstract: A method for the cognitive debugging of a managed system includes first receiving an event in an event management system. Thereafter, a context for the event is extracted therefrom and the context is mapped to both one or more components of a managed computing system and also one or more corresponding debug mode commands for each of the components. Consequently, a debug mode is enabled in each of the components and the corresponding debug mode commands are issued for each of the components so as to provoke a generation of one or more log entries. The generated log entries then are matched to a pre-stored log entry amongst a multiplicity of pre-stored log entries and at least one problem resolution document stored in connection with the matched pre-stored log entry is transmitted to an operator of the event management system.
-
公开(公告)号:US10079935B1
公开(公告)日:2018-09-18
申请号:US15469083
申请日:2017-03-24
Applicant: International Business Machines Corporation
Inventor: Romelia H. Flores , Christian E. Loza , Olivia G. Loza , Tomyo G. Maeshiro
Abstract: A communication device associated with a first party monitors a call between the first party and a second party. The communication device identifies a request for sensitive information from the second party during the call. The communication device determines whether the requested sensitive information matches sensitive information stored in an encrypted data store by determining whether a text representation of the requested sensitive information matches a text representation of the sensitive information stored in the encrypted data store. The communication device sends, responsive to determining that the requested for sensitive information matches the stored sensitive information, the requested sensitive information to the second party.
-
公开(公告)号:US20170235660A1
公开(公告)日:2017-08-17
申请号:US15046440
申请日:2016-02-17
Applicant: International Business Machines Corporation
Inventor: Mandeep Chana , William King , Tomyo G. Maeshiro , Mathews Thomas , Janki Y. Vora
CPC classification number: G06F17/30144 , G06F11/0748 , G06F11/079 , G06F11/0793 , H04L41/00
Abstract: A method for the cognitive debugging of a managed system includes first receiving an event in an event management system. Thereafter, a context for the event is extracted therefrom and the context is mapped to both one or more components of a managed computing system and also one or more corresponding debug mode commands for each of the components. Consequently, a debug mode is enabled in each of the components and the corresponding debug mode commands are issued for each of the components so as to provoke a generation of one or more log entries. The generated log entries then are matched to a pre-stored log entry amongst a multiplicity of pre-stored log entries and at least one problem resolution document stored in connection with the matched pre-stored log entry is transmitted to an operator of the event management system.
-
-
-
-
-
-