-
公开(公告)号:US20240346133A1
公开(公告)日:2024-10-17
申请号:US18298921
申请日:2023-04-11
Applicant: Kyndryl, Inc.
Inventor: Cesar Bravo
CPC classification number: G06F21/552 , G06T19/006
Abstract: Aspects of the present disclosure include: detecting, by a computing device, an avatar is chatting within a virtual environment; detecting, by the computing device, the avatar is idle for a predetermined amount of time; providing, by the computer device, a challenge to the idled avatar, determining, by the computer device, that the challenge has not been executed; and executing, by the computer device, a security action associated with the idled avatar.
-
公开(公告)号:US20240346174A1
公开(公告)日:2024-10-17
申请号:US18134157
申请日:2023-04-13
Applicant: Kyndryl, Inc.
Inventor: Cesar Bravo
IPC: G06F21/62
CPC classification number: G06F21/6245
Abstract: A computer-implemented method, according to one embodiment, includes gathering sharing policies associated with a first user sharing a live resource in a metaverse, and determining characteristics of a second user in the metaverse. The method further includes determining, based on the sharing policies and the characteristics of the second user, whether the second user is authorized to view the live resource shared by the first user. In response to a determination that the second user is not authorized to view the live resource, a first predetermined obfuscation condition is caused to be applied to the second user's view of the live resource for protecting the first user's privacy. Furthermore, in response to a determination that the second user is authorized to view the live resource, the second user is allowed to view the live resource.
-
3.
公开(公告)号:US11989359B1
公开(公告)日:2024-05-21
申请号:US18158486
申请日:2023-01-24
Applicant: Kyndryl, Inc.
Inventor: Cesar Bravo , Edgar Adolfo Zamora Duran , Desilda Toska , Sarbajit K. Rakshit
IPC: G06F3/0354 , G04G9/00 , G04G21/08 , G06F3/01 , G06F3/0362 , G06F3/038 , G06F3/14 , G06F3/0346
CPC classification number: G06F3/03545 , G04G9/007 , G04G21/08 , G06F3/017 , G06F3/0362 , G06F3/038 , G06F3/1454 , G06F3/0346
Abstract: Embodiments relate to virtualization of digital crown actions based on actions performed with an electronic pen. A technique includes communicatively coupling a smartwatch to an electronic pen, the smartwatch including a rotatable piece, where the rotatable piece controls a plurality of functionalities of the smartwatch. The technique includes receiving data from the electronic pen, and in response to receiving the data from the electronic pen, controlling at least one of the plurality of functionalities.
-
公开(公告)号:US20240411861A1
公开(公告)日:2024-12-12
申请号:US18330627
申请日:2023-06-07
Applicant: Kyndryl, Inc.
Inventor: Cesar Bravo , Christopher Collins Bode
Abstract: Embodiments relate to providing an advanced deterrence system for bots in an interactive communication environment. In response to identifying that an automated program for a user terminal is accessing an interactive communication environment hosted by a host computer system, a selection of an assignment for the automated program is triggered, where the automated program is designed to replicate a human behavior in the interactive communication environment. In response to triggering the selection, a task is selected as the assignment for the automated program designed to replicate the human behavior, the task being selected from a plurality of tasks that are queued to be executed by the host computer system. The task is caused to be executed by the automated program on the user terminal, the task causing a consumption of user computer resources on the user terminal.
-
公开(公告)号:US20240346525A1
公开(公告)日:2024-10-17
申请号:US18133397
申请日:2023-04-11
Applicant: Kyndryl, Inc.
Inventor: Cesar Bravo , Omar Odibat
IPC: G06Q30/018 , G06Q50/26
CPC classification number: G06Q30/0185 , G06Q50/265
Abstract: A computer-implemented method, according to one embodiment, includes receiving, from a user device, a request for determining a final confidence score for an account, and determining a plurality of confidence parameter scores using information associated with the account. A first of the confidence parameter scores is determined based on an analysis of a structure of the account, a second of the confidence parameter scores is determined based on a character analysis of at least the account, and a third of the confidence parameter scores is determined based on an exposure of the account. The method further includes using the determined confidence parameter scores to determine the final confidence score for the account. The determined final confidence score is applied to mitigate fraud.
-
6.
公开(公告)号:US12277215B2
公开(公告)日:2025-04-15
申请号:US18330620
申请日:2023-06-07
Applicant: Kyndryl, Inc.
Inventor: Cesar Bravo , Christopher Collins Bode
Abstract: Embodiments relate to dynamic creating a temporary isolated environment in an interactive communication environment for potential bots. In response to identifying that an avatar accessing the interactive communication environment is being controlled by a non-human entity, the avatar is dynamically placed in an isolated virtual environment. Permission of the avatar are disabled in the isolated virtual environment. An authentication inquiry is presented to the avatar identified as being controlled by the non-human entity. A location is transferred for the avatar identified as being controlled by the non-human entity, based on a user response to the authentication inquiry.
-
7.
公开(公告)号:US20240411860A1
公开(公告)日:2024-12-12
申请号:US18330620
申请日:2023-06-07
Applicant: Kyndryl, Inc.
Inventor: Cesar Bravo , Christopher Collins Bode
Abstract: Embodiments relate to dynamic creating a temporary isolated environment in an interactive communication environment for potential bots. In response to identifying that an avatar accessing the interactive communication environment is being controlled by a non-human entity, the avatar is dynamically placed in an isolated virtual environment. Permission of the avatar are disabled in the isolated virtual environment. An authentication inquiry is presented to the avatar identified as being controlled by the non-human entity. A location is transferred for the avatar identified as being controlled by the non-human entity, based on a user response to the authentication inquiry.
-
公开(公告)号:US20240334313A1
公开(公告)日:2024-10-03
申请号:US18130102
申请日:2023-04-03
Applicant: Kyndryl, Inc.
Inventor: Cesar Bravo , David Alonso Campos Batista
Abstract: An example operation may include one or more of storing a hash of a service set identifier (SSID) of a wireless network via an apparatus, receiving a probe request message transmitted from a network device, wherein the probe request message comprises a hash value, determining that the hash value within the probe request is a valid SSID based on the hash of the SSID of the wireless network stored in the storage device, and controlling the network interface to transmit a probe response with a plain text name of the SSID to the network device in response to the determination.
-
公开(公告)号:US20240323149A1
公开(公告)日:2024-09-26
申请号:US18186249
申请日:2023-03-20
Applicant: Kyndryl, Inc.
Inventor: Cesar Bravo
CPC classification number: H04L51/02 , G06F21/629 , G06F40/20
Abstract: Embodiments relate to providing automatic curation of chats in virtual reality. A technique includes determining, using a machine learning model, that consecutive segmented messages combine to form a complete message, the consecutive segmented messages being from a virtual environment. The technique includes determining that the complete message violates a security rule and performing a security action that affects a display of the consecutive segmented messages forming the complete message.
-
公开(公告)号:US12072772B1
公开(公告)日:2024-08-27
申请号:US18133815
申请日:2023-04-12
Applicant: Kyndryl, Inc.
Inventor: Christopher Collins Bode , Marci Devorah Formato , Cesar Bravo
IPC: G06F12/00 , G06F11/14 , H04L43/0876
CPC classification number: G06F11/1451 , G06F11/1464 , H04L43/0876
Abstract: A computer-implemented method includes: receiving, by a computing device, a data restore request; determining, by the computing device, at least one object in response to the data restore request; and querying, by the computing device, a client population to determine at least one client which has resources and network cardinality to assist the data restore request. The at least one client creates a distributed and crowd sourced cache of objects for the data restore request.
-
-
-
-
-
-
-
-
-