-
公开(公告)号:US20220391117A1
公开(公告)日:2022-12-08
申请号:US17303674
申请日:2021-06-04
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Saritha Arunkumar , Kuntal Dey , Seema Nagar , Kartik Srinivasan , Anjali Tibrewal
Abstract: A method, a computer program product, and a system of dynamically managing permissions of storage blocks. The method includes predicting at least one storage block that will be accessed by a user on a storage device and predicting a time window when the storage block will be accessed the user. The predictions can be performed by a machine learning model trained using the historical accesses and access times of the user. The method also includes granting the user an access to the storage block during the time window and monitoring whether the storage block is accessed by the user. The method also includes determining, based on the monitoring, that the user accessed the storage block, and revoking the access to the storage block granted to the user after a predetermined access time.
-
公开(公告)号:US11362826B2
公开(公告)日:2022-06-14
申请号:US16822274
申请日:2020-03-18
Applicant: International Business Machines Corporation
Inventor: Jeronimo Irazabal , Saritha Arunkumar
Abstract: An example operation may include one or more of receiving a storage request which comprises respective data sets generated by a plurality of endorser peers via simulation of a blockchain request, detecting that a key value of a data set generated by a first endorser peer is different than a respective key value of a data set generated by a second endorser peer, and committing the storage request to a data block of a blockchain in response to verifying that the detected different key values generated by the first and second endorser peers correspond to a multi-value key of the blockchain request.
-
公开(公告)号:US10740785B2
公开(公告)日:2020-08-11
申请号:US16357738
申请日:2019-03-19
Applicant: International Business Machines Corporation
Inventor: Saritha Arunkumar , Kuntal Dey , Nizar Lethif , Enara C. Vijil
Abstract: A split and merge advertisement method, system, and non-transitory computer readable medium, include splitting a first advertisement to be played on a second device when a moving user of a first group of users moves from a proximity of a first device to a proximity of the second device.
-
公开(公告)号:US10375083B2
公开(公告)日:2019-08-06
申请号:US15415318
申请日:2017-01-25
Applicant: International Business Machines Corporation
Inventor: Saritha Arunkumar , Kuntal Dey , Nizar Lethif , Enara C. Vijil
Abstract: A computer-implemented information verification method, system, and non-transitory computer readable medium, include acquiring a first measurement from a user device specific to a user device location, acquiring a second measurement from a second device specific to a second device location, comparing the first measurement with the second measurement, and verifying the user device is within a proximity of the second device to grant access for the user device to the second device, based on a result of the comparing.
-
公开(公告)号:US10368185B2
公开(公告)日:2019-07-30
申请号:US14940415
申请日:2015-11-13
Applicant: International Business Machines Corporation
Inventor: Saritha Arunkumar , Mudhakar Srivatsa
Abstract: A computer implemented method, a computer program product and a computer system are disclosed that verify the location specified by a mobile device, for example when trying to gain access to a location-restricted service hosted by a computer system. This may be achieved by identifying at least one reference mobile device in the vicinity of the identified location of the first mobile device of which an identified location is to be verified, requesting from the at least one reference mobile device a reference location report including further pairing information identifying mobile devices with which the reference mobile device is paired; receiving the reference location report from the at least one reference mobile device; and verifying the location identification in a first location report received from the first mobile device by identifying the first mobile device in the further pairing information in the received at least one reference location report.
-
公开(公告)号:US10360357B2
公开(公告)日:2019-07-23
申请号:US15402318
申请日:2017-01-10
Applicant: International Business Machines Corporation
Inventor: Saritha Arunkumar , Kuntal Dey , Nizar Lethif , Enara C. Vijil
Abstract: A method modifies a physical device for use by a particular person. One or more processors receive information from a sensor indicating a detection by the sensor of a sequence of actions performed by an unidentified person. The sequence of actions are physical actions performed in a particular order, and the physical actions are disparate types of physical movements performed by the unidentified person. One or more processors compare the sequence of actions performed by the unidentified person a known sequence of actions for a particular person. In response to the sequence of actions performed by the unidentified person matching the known sequence of actions for the particular person, one or more processors identify the unidentified person as the particular person and then modify a physical device for use by the particular person.
-
公开(公告)号:US10218713B2
公开(公告)日:2019-02-26
申请号:US16025124
申请日:2018-07-02
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Abstract: A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an authentication application utilizing location services executing on the computing device to obtain location data from the location services. The processor obtains the location data and creates and encodes a data structure in a secured area of a memory; the data structure is only accessible to the authentication application. The processor transmits to an authentication server, an authentication request that includes the encoded location data, requesting access to secure content. The processor obtains a request to query identifiers proximate to the computing device for additional location information and queries the identifiers and transmits this additional location information to the authentication server. The processor receives a notification and based on obtaining the notification, erases the secured area and turns off the location services on the computing device.
-
公开(公告)号:US09319876B2
公开(公告)日:2016-04-19
申请号:US14669020
申请日:2015-03-26
Applicant: International Business Machines Corporation
Inventor: Saritha Arunkumar , Stephen D. Pipes , Mudhakar Srivatsa
CPC classification number: H04W12/02 , H04L63/0421 , H04W4/02
Abstract: Anonymizing location information of a mobile device by an anonymization provider. The anonymization provider receives, from the mobile device, location information identifying the location of the mobile device and anonymity requirements. The anonymization provider determines whether the received location information satisfies the received anonymity requirements. Based on the received location information satisfying the received anonymity requirements, the anonymization provider generates an obfuscated location for the mobile device and sends the obfuscated location to the mobile device. Based on the received location information not satisfying the received anonymity requirements, the anonymization provider sends a request for new anonymity requirements to the mobile device.
Abstract translation: 匿名提供者对移动设备的位置信息进行匿名化。 匿名提供者从移动设备接收标识移动设备的位置的位置信息和匿名要求。 匿名提供者确定所接收的位置信息是否满足所接收的匿名要求。 基于接收到的满足接收到的匿名要求的位置信息,匿名提供者为移动设备生成模糊的位置,并将该混淆的位置发送到移动设备。 基于接收到的不满足接收到的匿名要求的位置信息,匿名提供者向移动设备发送新的匿名要求请求。
-
公开(公告)号:US20240220618A1
公开(公告)日:2024-07-04
申请号:US18149287
申请日:2023-01-03
Applicant: International Business Machines Corporation
Inventor: Su Liu , Luis Osvaldo Pizana , Boyi Tzen , Saritha Arunkumar
CPC classification number: G06F21/563 , G06F8/41 , G06F2221/033
Abstract: A computer implemented method compiles a source code. A computer system loads the source code into a first memory. The computer system loads a rendered source code into a second memory, wherein the rendered source code is a rendered version of the source code. The computer system determines whether a difference is present between the source code in the first memory and the rendered source code in the second memory. The computer system performs a set of actions in compiling the source code in response to determining that the difference between the source code and the rendered source code is present.
-
公开(公告)号:US10939228B2
公开(公告)日:2021-03-02
申请号:US16433681
申请日:2019-06-06
Applicant: International Business Machines Corporation
Inventor: Saritha Arunkumar , Mudhakar Srivatsa
Abstract: A computer implemented method, a computer program product and a computer system are disclosed that verify the location specified by a mobile device, for example when trying to gain access to a location-restricted service hosted by a computer system. This may be achieved by identifying at least one reference mobile device in the vicinity of the identified location of the first mobile device of which an identified location is to be verified, requesting from the at least one reference mobile device a reference location report including further pairing information identifying mobile devices with which the reference mobile device is paired; receiving the reference location report from the at least one reference mobile device; and verifying the location identification in a first location report received from the first mobile device by identifying the first mobile device in the further pairing information in the received at least one reference location report.
-
-
-
-
-
-
-
-
-