CONTEXT-AWARE CRYPTOGRAPHIC INVENTORY
Granted: January 2, 2025
Application Number:
20250005163
An embodiment constructs a knowledge graph based on data received from a system wherein the knowledge graph comprises a plurality of entities and relationships among the plurality of entities which represent a context information of the knowledge graph. The embodiment assigns a unique identifier to a designated entity. The embodiment expresses in natural language the unique identifier, an associated label, an associated property name, an associated property value, an associated…
PREVENTING ACCIDENTAL PASSWORD DISCLOSURE
Granted: January 2, 2025
Application Number:
20250005119
A computer-implemented method, according to one embodiment, includes: receiving a preliminary password key from a user, and in response to receiving the preliminary password, determining whether a cursor of a graphical user interface is located in a password entry field. In response to determining that the cursor of the graphical user interface is not located in the password entry field, a warning is issued to the user. Additionally, any inputs that are received from the user are…
ROBUST GRAPH REPRESENTATION OF CAUSAL RELATIONSHIPS EXPRESSED IN A NATURAL LANGUAGE DOCUMENT
Granted: January 2, 2025
Application Number:
20250005106
An embodiment extracts, from a natural language document, using a first language model, a set of cause-effect pairs, each cause-effect pair comprising a pair of phrases, each phrase comprising a portion of the natural language document. An embodiment constructs a first graph representing the set of cause-effect pairs, each node in the first graph representing a phrase in the set of phrases, each edge in the first graph representing a cause-effect relationship between nodes connected by…
TECHNIQUE TO HANDLE INSUFFICIENT ON-CHIP MEMORY CAPACITY IN DECOMPRESSORS
Granted: January 2, 2025
Application Number:
20250004638
A method to handle insufficient on-chip memory capacity in decompressors is disclosed. In one embodiment, such a method includes executing, by a decompressor configured to decompress data, an instruction configured to copy data from a source position within a data stream to a destination position within the data stream. The method determines whether the source position currently resides within an on-chip buffer of the decompressor. In the event the source position does not currently…
DYNAMIC AND AUTOMATIC PLAYBOOK GENERATION USING CONTEXTUAL NETWORK RESPONSES
Granted: December 26, 2024
Application Number:
20240430295
An approach is provided for dynamically and automatically generating a playbook. A new incident and the tactics, techniques, and procedures (TTP) specifying the new incident are identified. The TTP are mapped to actions included in a TTP-based response matrix, which associates actions that address security incidents with respective TTPs that specify the security incidents. The actions are mapped to technologies in a defense capabilities matrix, which associates technologies deployed by…
CONTEXT BASED TRANSLATION AND ORDERING OF WEBPAGE TEXT ELEMENTS
Granted: December 26, 2024
Application Number:
20240427834
A computer-implemented method, according to one embodiment, includes determining a domain and category information from metadata associated with a first webpage. The method further includes determining component types, hierarchies and grouping relationships for a plurality of text elements on the first webpage and constructing context information for the text elements. Word vectors are calculated based on the grouping relationships and the context information, and text feature types of…
OVERFLOW OF ON-PREMISES HOST WORKLOADS ONTO SECURE CLOUD
Granted: December 26, 2024
Application Number:
20240427640
An embodiment provisions overflow from on-premises cloud workload onto a secure infrastructure provider. The embodiment senses a performance metric of an on-premises cloud. The embodiment deciding, responsive to the sensed performance metric, to scale up, senses a property of an infrastructure provider, responsive to the sensed property, selects the infrastructure provider. The embodiment generates credentials, creates a secure environment, establishes secure communications, and…
MULTI-TIERED HYBRID MULTI-CLOUD SERVICE MANAGEMENT ARCHITECTURE
Granted: December 26, 2024
Application Number:
20240427639
An embodiment detects an inter-cloud service negotiation between a plurality of cloud environments, the inter-cloud service negotiation indicating an interaction between the plurality of cloud environments. The embodiment identifies a plurality of local controllers in the plurality of cloud environments, a local controller in the plurality of local controllers being a computer control node configured to manage resources associated a cloud environment in the plurality of cloud…
CONTROLLER-RESOURCE OBJECT TOPOLOGY ANALYSIS FOR CLUSTER CONFIGURATION MANAGEMENT
Granted: December 26, 2024
Application Number:
20240427574
An embodiment causes inserting, into kernel code of an operating system, during execution of the operating system, a traffic monitoring code module. An embodiment extracs, using the traffic monitoring code module, from a plurality of messages between components of a cluster management system managing a first cluster of systems, a first message relating to a resource object, the resource object representing a resource within the first cluster of systems, the traffic monitoring code module…
SIGNATURE DISCOURSE TRANSFORMATION
Granted: December 19, 2024
Application Number:
20240419890
The illustrative embodiments provide for signature discourse transformation. An embodiment includes detecting a signature discourse of a user by analyzing the user's discourse using corpus linguistics. The embodiment also includes generating computing a collection of words distinct to the user. The embodiment also includes sensing, using tone analysis and a natural language process model, a tone of the collection of words distinct to the user in the signature discourse utterance. The…
COLLABORATIVE ASSISTANCE PLATFORM
Granted: December 19, 2024
Application Number:
20240419697
A computer-implemented method comprises generating an event from a task demonstration within a digital channel, forming a collaboration context based on the event, defining a collaboration by associating an assistive action with the collaboration context, transforming the collaboration context into a conversational model, evaluating an interaction session within the digital channel for an interaction that matches the collaboration context, and upon detection of the interaction that…
ARTIFICIAL INTELLIGENCE ACCELERATOR USING MANTISSA QUANTIZATION SCHEME
Granted: December 19, 2024
Application Number:
20240419401
Various embodiments are provided herein for performing a mathematical calculation in a computing environment. A quantization scheme is implemented, allowing at most one (1) non-zero-valued bit in the mantissa of a floating point number.
SOFTWARE ROBOT ORCHESTRATION ENGINE
Granted: December 19, 2024
Application Number:
20240419130
An embodiment configures a software robot to operate collaboratively with a plurality of platforms within a work environment. The embodiment decomposes, via the software robot, a request to perform a task received from one of the platforms, into at least one integration-action pair. An integration in this pair represents a configuration to operate on an execution platform within the plurality of platforms where a function is to be executed; an action in the pair represents the function…
NETWORK SECURITY ASSESSMENT BASED UPON IDENTIFICATION OF AN ADVERSARY
Granted: December 12, 2024
Application Number:
20240414184
A computer-implemented method comprises establishing a database based at least in part on network traffic data received from a network, detecting adversarial behavior within the network traffic data, identifying an adversary associated with the adversarial behavior, determining a plurality of specific indicators of compromise that are associated with the adversary that has been identified, constructing a query based on the plurality of specific indicators of compromise, submitting the…
NON-LINEAR APPROXIMATION ROBUST TO INPUT RANGE OF HOMOMORPHIC ENCRYPTION ANALYTICS
Granted: December 12, 2024
Application Number:
20240413966
A technique for privacy-preserving homomorphic inferencing using a neural network having an activation function, such as a non-linear high-degree polynomial. The network is trained to learn input features of an input feature vector together with their associated inverses. During inferencing, an encrypted data point is received at the network. The data point comprises an input feature vector that has been extended with a set of one or more additional feature values, the set of one or more…
INTERACTIVE DATASET EXPLORATION AND PREPROCESSING
Granted: December 12, 2024
Application Number:
20240411750
A functionality intent is extracted from a natural language input, the functionality intent comprising an operation on a dataset. A portion of source code implementing the functionality intent is generated. Using a result of executing an executable version of the portion of source code on the dataset, a next functionality intent is recommended, the next functionality intent expressed in natural language form.
DYNAMIC DATA CENTER EQUIPMENT ANALYSIS FOR SERVICE LEVEL AGREEMENT RECOMMENDATION
Granted: December 5, 2024
Application Number:
20240403152
Using a failure probability model, a probability of a failure in a first system within a specified time period is predicted. Using an impact model, an impact of the failure on a second system is predicted. Using a resilience model, an impact reduction of the failure is predicted. The probability, the impact, and the impact reduction are mapped into a recommended service level agreement category for the first system, the mapping performed using a classifier model.
ENVIRONMENTAL CONDITION-BASED WORKSPACE ASSIGNMENT
Granted: November 28, 2024
Application Number:
20240392994
A workspace is assigned according to a temperature preference, for a time period. The temperature preference and the time period are specified in a workspace booking request. Using a building management system, an ambient temperature of the workspace is adjusted during the time period. The adjusting results in the ambient temperature matching, within a threshold amount, the temperature preference.
WORKLOAD DISTRIBUTION TO FAILOVER SITES BASED ON LOCAL SITE PROPERTIES
Granted: November 28, 2024
Application Number:
20240396964
Provisioning workloads in a distributed computing environment includes receiving a workload by one or more processors maintained at a primary site located at a first geographical location, which is associated with first geographical characteristics. The workload is associated, based on the first geographical characteristics, with the primary site and the first geographical location using metadata of the workload. A secondary site for the workload, located at a second geographical…
USER-SPECIFIC NETWORK CONFIGURATION MANAGEMENT
Granted: November 28, 2024
Application Number:
20240396798
A network usage plan is constructed using a network usage prediction model. The network usage plan comprises a first time and a first desired network configuration to be implemented at the first time. A network is configured according to the first desired network configuration for use at the first time. Responsive to determining, during a time period in which the network is configured according to the first network configuration, that a usage requirement has changed more than a threshold…