CONTEXT-BASED CONTENT AUTHORIZATION
Granted: August 22, 2024
Application Number:
20240283783
An embodiment includes extracting network layer information and application layer information from within a network packet. The embodiment determines a context of a network connection with a client device from which the network packet originated based at least in part on the network layer information and determines an identity of an end user with whom the network packet is associated based at least in part on the application layer information. The embodiment performs a sign-on process…
AUGMENTED CONFIGURATION INTERFACE FOR VISUALIZING AND OPTIMIZING BEAMFORMING
Granted: August 22, 2024
Application Number:
20240283495
A method for configuring beamforming for a network device is disclosed. In one embodiment, such a method includes creating a map of an area in which a network device that supports beamforming is placed. The method shows, on an interactive display device, the network device on the map. The method shows, on the interactive display device, one or more beams emanating from the network device on the map. The method enables a user to manipulate the beams on the interactive display device to…
OPTIMIZING ALLOCATION OF TRANSACTION ALERTS
Granted: August 22, 2024
Application Number:
20240281815
An embodiment includes assigning an entity to a risk category group based on transaction data of a transaction alert associated with the entity, where the transaction alert is concerning potentially suspicious financial activities. The embodiment also identifies a relationship between the entity and another entity based on the transaction data. The embodiment determines a capability of an anti-money laundering (“AML”) analyst, where the capability includes a skill level of the AML…
SECURE SYSTEM FOR HIDING REGISTRATION RULES FOR DYNAMIC CLIENT REGISTRATION
Granted: August 15, 2024
Application Number:
20240275819
A method to facilitate a permitted access to a protected resource associated with a service provider (SP). The method begins by the SP establishing a root of trust to a third party via an attribute-based encryption (ABE) master secret key, and a set of one or more public parameters. Once vetted by the entity, the SP receives a binary object from the third party that encodes the policy as a cryptographic payload. When a client application desires to enroll with and interoperate with the…
USING CATEGORIZATION TAGS FOR RULE GENERATION AND UPDATE IN A RULES-BASED SECURITY SYSTEM
Granted: August 15, 2024
Application Number:
20240275817
A technique for classifying and handling threat data in a rules-based security system. For each rule in the set, a set of one or more first tags are generated. The tags categorize the rule according to a hierarchical scheme. In response to receipt of a new threat, the system automatically determines whether the existing set of rules provide an acceptable coverage for the new threat. This determination is made by generating a set of one or more second tags that categorize the new threat,…
DIGITAL TWIN MODELLING USING TASK KEYWORD ANALYSIS
Granted: August 15, 2024
Application Number:
20240273434
A set of tasks is extracted from workflow data of a system. A set of keywords is extracted from a task in the set of tasks. The set of keywords is expanded into an expanded set of keywords, the expanded set of keywords comprising a new keyword with a semantic relationship to a keyword in the set of keywords. A new task is generated using the expanded set of keywords. Based on a result of execution of the new task, a model of the system is adjusted, the model comprising the workflow data,…
ACTIVITY-BASED SELECTION OF SHARABLE CONTENT IN A SCREEN-SHARING SESSION
Granted: August 8, 2024
Application Number:
20240264793
An embodiment includes determining a first activity value by comparing frames of a first sharable video stream received from a first device associated with a first participant of a screen sharing session. The embodiment also includes generating a first ranked list of activity values, the first ranked list including the first activity value. The embodiment also includes identifying the first activity value as a highest ranking activity value in the first ranked list of activity values.…
VALIDATION SERVER IN TAPE-BASED BACKUP AND ARCHIVE ENVIRONMENTS
Granted: August 1, 2024
Application Number:
20240256645
A method for preventing unauthorized access to tape data is disclosed. In one embodiment, such a method includes maintaining, by a validation server, a lock on a tape drive. The method detects loading, by a requesting server, a tape into the tape drive so that it can be written to. The method confirms, using the validation server, that the requesting server is authorized to write to the tape. The method releases, using the validation server, the lock in response to confirming the…
DATABASE VALUE PREDICTION
Granted: August 1, 2024
Application Number:
20240257164
Tokenized rows of a training portion of a database are selected, each of the selected tokenized rows having a first token value stored in a first column of the database. Training row vectors are grouped into clusters. From the clusters, prototypes are generated, each prototype comprising a numerical representation of a cluster. From input tokens, an input row vector is generated, the input row vector comprising a numerical representation of input tokens representing data in an input row…
NEURAL NETWORK INFERENCE UNDER HOMOMORPHIC ENCRYPTION
Granted: August 1, 2024
Application Number:
20240256850
A trained neural network is partitioned into a client-side portion and a server-side portion, the client-side portion comprising a first set of layers of the trained neural network, the server-side portion comprising a second set of layers of the trained neural network, the trained neural network trained using a first set of training data. From a homomorphically encrypted intermediate result input to the server-side portion, a homomorphically encrypted output of the trained neural…
NAMESPACE SCOPED DEFAULT STORAGE CLASSES
Granted: August 1, 2024
Application Number:
20240256245
An example operation may include one or more of receiving, via an application programming interface (API) of a cluster, a persistent volume claim (PVC) with a specification of a software application, identifying a namespace based on a namespace attribute of the PVC, identifying a storage class which is declared as a default storage class for the identified namespace based on the one or more attributes within the PVC and injecting storage criteria of the default storage class into the…
TAPE DRIVE ERROR RECOVERY PROCEDURE SELECTION BASED ON HUMIDITY
Granted: July 25, 2024
Application Number:
20240249750
In one general embodiment, an apparatus includes a magnetic head, and a controller coupled to the magnetic head, the controller being configured to perform a method that includes measuring humidity in a vicinity of the apparatus in response to detection of an error while performing a data operation on a magnetic recording tape. An error recovery procedure to remove debris on the tape is executed in response to detection of an error and the measured humidity exceeding a predefined upper…
VERIFYING REMOTE EXECUTION OF MACHINE LEARNING INFERENCE UNDER HOMOMORPHIC ENCRYPTION USING PERMUTATIONS
Granted: July 18, 2024
Application Number:
20240243898
A technique to remotely identify potential compromise of a service provider that performs homomorphic inferencing on a model. For a set of real data samples on which the inferencing is to take place, at least first and second permutations of a set of trigger samples are generated. Every set of samples (both trigger and real samples) are then sent for homomorphic inferencing on the model at least twice, and in a secret permutated way. To improve performance, a permutation is packaged with…
PROXIMITY-BASED DATA ACCESS CONTROL
Granted: July 18, 2024
Application Number:
20240241970
An embodiment determines that a current location is within a threshold proximity to a proximity device and extracts a unique user identifier (UUID) from data received from the proximity device via a first type of network. The embodiment transmits an information request that includes the UUID and a role-based information control (RBIC) identifier to a remote access control system via a second type of network. The embodiment locally stores UUID information received in response to the…
COGNITIVE SELECTION OF TRUSTED CONTACT USING INTERNET OF THINGS (IOT) DATA
Granted: July 11, 2024
Application Number:
20240236232
An embodiment includes generating, responsive to detecting a communication attempt made by a caller, first request data indicative of a first connection request from a caller communication terminal associated with the caller to a callee communication terminal associated with a callee. The embodiment appends caller context data to the first request data, where the caller context data is based on Internet of Things (IoT) data received from an IoT device associated with the caller. The…
BUILDING A TIME DIMENSION BASED ON A TIME DATA MODEL AND CREATING AN ASSOCIATION RELATIONSHIP BETWEEN THE TIME DIMENSION AND A SECOND DATA MODEL FOR ANALYZING DATA IN THE TIME DIMENSION
Granted: July 11, 2024
Application Number:
20240236127
A computer-implemented method according to one approach includes defining a time data model and building a time dimension based on the time data model. The method further includes defining a second data model. An association relationship is created between the time dimension and the second data model for thereafter analyzing data of the second data model in the time dimension. A computer program product according to another approach includes a computer readable storage medium having…
MONITORING TRANSFORMER CONDITIONS IN A POWER DISTRIBUTION SYSTEM
Granted: July 11, 2024
Application Number:
20240232748
An embodiment includes receiving, by a transformer monitoring system associated with a transformer, sensor data from one or more sensors during operation of the transformer. The embodiment also includes generating, by the transformer monitoring system, energy loss data representative of a predicted energy loss of the transformer based at least in part on the sensor data. The embodiment also includes training, by the transformer monitoring system, a failure rate prediction model using…
INTELLIGENT KNOWLEDGE GRAPH TO FACILITATE USER INPUT INTO GUI FORMS
Granted: July 4, 2024
Application Number:
20240220291
A method for facilitating user input into a form of a graphical user interface is disclosed. In one embodiment, such a method includes receiving a form implemented on a graphical user interface. The form has multiple fields. The method automatically scans the form to determine relationships such as dependencies between the fields and automatically generates a knowledge graph that describes the fields and their relationships. The fields may be represented as nodes in the knowledge graph.…
SPLITTER-COMBINER AND CASCADE CONNECTION CIRCUIT
Granted: July 4, 2024
Application Number:
20240222837
A splitter-combiner includes a first quarter-wave line, a second quarter-wave line, an absorption resistance, a combining terminal, and a line bending circuit. The line bending circuit includes a line parallel region and a line bending region. The line parallel region has the first quarter-wave line and the second quarter-wave line. The first quarter-wave line and the second quarter-wave line are parallel to each other in the line parallel region. The line bending region has the first…
HOLISTIC EVALUATION OF VULNERABILITIES IN A VULNERABILITY CHAIN
Granted: July 4, 2024
Application Number:
20240220628
An embodiment includes invoking a search of vulnerability chain data of a local database using a database query to obtain a search result, where the database query is based on a description string associated with a new vulnerability, and where the search result comprises a plurality of linked vulnerabilities that collectively form a vulnerability chain. The embodiment also includes identifying a vulnerability characteristic of a linked vulnerability of the plurality of linked…