Country
Full text data for US and EP
Status
Type
Filing Date
Publication Date
Inventor
Assignee
Click to expand
IPC
No.
Publication Number
Title
Publication/Patent Number Publication/Patent Number
Publication date Publication date
Application number Application number
Filing date Filing date
Inventor Inventor
Assignee Assignee
IPC IPC
1
US2019077353A1
Publication/Patent Number: US2019077353A1
Publication date: 2019-03-14
Application number: 15/703,858
Filing date: 2017-09-13
Abstract: An apparatus, method, program product, and system are disclosed for cognitive-based vehicular incident assistance. A sensor module samples, on a continuous basis at periodic intervals, motion data from one or more sensors of a vehicle while the vehicle is in motion. An incident module detects that the vehicle is involved in a traffic incident based on the one or more sensors. An aggregation module scrapes, at the time of the traffic incident, external data sources available over one or more data networks for data related to the traffic incident, and supplements the sampled motion data with the scraped data related. A recommendation module generates and makes available, in real-time, one or more recommendations for responding to the traffic incident using cognitive computing processes based on the supplemented motion data. The one or more recommendations include information specific to a role of one or more individuals at the traffic incident. An apparatus, method, program product, and system are disclosed for cognitive-based vehicular incident assistance. A sensor module samples, on a continuous basis at periodic intervals, motion data from one or more sensors of a vehicle while the vehicle is in motion. An incident ...more ...less
2
US10169563B2
Publication/Patent Number: US10169563B2
Publication date: 2019-01-01
Application number: 15/418,203
Filing date: 2017-01-27
Abstract: Embodiments of the present invention disclose a method, computer program product, and device for accessing encrypted data. A communication link may be established between an authorization dongle and a secure device having encrypted data stored thereon. A communication link may also be established between the authorization dongle and a secure server. An encryption key associated with the encrypted data may be received from the secure server. The encryption key may be stored in volatile memory on the authorization dongle. An indication that a user is attempting to access the encrypted data may be received. The encryption key may be transmitted from the authorization dongle to the secure device in response to the user attempting to access the encrypted data. Embodiments of the present invention disclose a method, computer program product, and device for accessing encrypted data. A communication link may be established between an authorization dongle and a secure device having encrypted data stored thereon. A communication link may ...more ...less
3
US2019044789A1
Publication/Patent Number: US2019044789A1
Publication date: 2019-02-07
Application number: 15/667,286
Filing date: 2017-08-02
Abstract: Systems and computer program products to perform an operation comprising receiving an indication of a type and a target of a fault to inject in a network, the network comprising a plurality of devices and a plurality of network elements, generating at least a first predicted network map depicting a predicted configuration of the plurality of devices and network elements subsequent to injecting the fault in the network, injecting the fault at the target in the network, generating an actual network map depicting an actual configuration of the plurality of devices and network elements, identifying, based on a comparison of the first predicted network map and the actual network map, at least one difference in the predicted and actual configurations, and outputting for display an indication of the identified at least one difference. Systems and computer program products to perform an operation comprising receiving an indication of a type and a target of a fault to inject in a network, the network comprising a plurality of devices and a plurality of network elements, generating at least a first predicted ...more ...less
4
US2019044790A1
Publication/Patent Number: US2019044790A1
Publication date: 2019-02-07
Application number: 15/807,107
Filing date: 2017-11-08
Abstract: Methods to perform an operation comprising receiving an indication of a type and a target of a fault to inject in a network, the network comprising a plurality of devices and a plurality of network elements, generating at least a first predicted network map depicting a predicted configuration of the plurality of devices and network elements subsequent to injecting the fault in the network, injecting the fault at the target in the network, generating an actual network map depicting an actual configuration of the plurality of devices and network elements, identifying, based on a comparison of the first predicted network map and the actual network map, at least one difference in the predicted and actual configurations, and outputting for display an indication of the identified at least one difference. Methods to perform an operation comprising receiving an indication of a type and a target of a fault to inject in a network, the network comprising a plurality of devices and a plurality of network elements, generating at least a first predicted network map depicting a predicted ...more ...less
5
US2019272745A1
Publication/Patent Number: US2019272745A1
Publication date: 2019-09-05
Application number: 15/910,968
Filing date: 2018-03-02
Abstract: A method for cognitive-based traffic incident snapshot triggering comprises acquiring data, via a first agent, from each of a plurality of local sensors. The first agent is configured to acquire the data from each of the plurality of local sensors in windows having a first window size. The method also comprises acquiring data, via a second agent, from each of a subset of the plurality of local sensors in windows having a second window size; detecting a pattern in the data acquired via the second agent, the pattern indicating a traffic incident; and in response to detecting a pattern indicating the traffic incident, aggregating all data acquired via the first agent from a time when the pattern was detected until motion of the vehicle stops with the pre-determined number of windows of data stored at the time when the pattern was detected. A method for cognitive-based traffic incident snapshot triggering comprises acquiring data, via a first agent, from each of a plurality of local sensors. The first agent is configured to acquire the data from each of the plurality of local sensors in windows having a first ...more ...less
6
US10229230B2
Publication/Patent Number: US10229230B2
Publication date: 2019-03-12
Application number: 14/590,478
Filing date: 2015-01-06
Abstract: A SAN testing application may be provided to restrict the utilization of one or more SAN device resources. The restricted, or throttled, resource(s) enables a smaller load to stress a SAN switch to effectively emulate a larger load. Resource throttling may, for example, result in the rapid filling of switch buffers and corresponding computational stress. The emulated load allows for all ports of a SAN switch to be simultaneously tested without the need or expense of a large number computing devices stressing the SAN. The SAN device with throttled resource(s) may be located within a testing environment or may be located in a functioning SAN to determine SAN bottlenecks prior to critical loading. A SAN testing application may be provided to restrict the utilization of one or more SAN device resources. The restricted, or throttled, resource(s) enables a smaller load to stress a SAN switch to effectively emulate a larger load. Resource throttling may, for example, result ...more ...less
7
US2019088114A1
Publication/Patent Number: US2019088114A1
Publication date: 2019-03-21
Application number: 15/707,712
Filing date: 2017-09-18
Abstract: An apparatus, method, program product, and system are disclosed for cognitive-based incident response. A sensor module captures baseline environment data related to a traffic incident using one or more sensors at a location of the traffic incident. A recommendation module generates and makes available, in real-time, one or more recommendations for responding to the traffic incident using cognitive computing processes based on the baseline environment data, the one or more recommendations comprising precautionary information for managing one or more emergency situations at the traffic incident. An update module continuously captures new environment data for the traffic incident using the one or more sensors, supplements the baseline environment data with the new environment data, and generates and makes available, in real-time, one or more updated recommendations based on the supplemented environment data using the supplemented environment data and the cognitive computing processes. An apparatus, method, program product, and system are disclosed for cognitive-based incident response. A sensor module captures baseline environment data related to a traffic incident using one or more sensors at a location of the traffic incident. A recommendation module ...more ...less
8
US2019207982A1
Publication/Patent Number: US2019207982A1
Publication date: 2019-07-04
Application number: 16/290,821
Filing date: 2019-03-01
Abstract: An apparatus for managing network security includes an inventory module, a survey module, an observation module, and a security module. The inventory module identifies each node of a network. The survey module gathers information for each node of the network. The security module generates notifications to one or more users in response to the observation module detecting one or more irregularities. An apparatus for managing network security includes an inventory module, a survey module, an observation module, and a security module. The inventory module identifies each node of a network. The survey module gathers information for each node of the network. The security module ...more ...less
9
US10243996B2
Publication/Patent Number: US10243996B2
Publication date: 2019-03-26
Application number: 14/988,466
Filing date: 2016-01-05
Abstract: An apparatus for managing network security includes an inventory module, a survey module, an observation module, and a security module. The inventory module identifies each node of a network. The survey module gathers information for each node of the network. The security module generates notifications to one or more users in response to the observation module detecting one or more irregularities. An apparatus for managing network security includes an inventory module, a survey module, an observation module, and a security module. The inventory module identifies each node of a network. The survey module gathers information for each node of the network. The security module ...more ...less
10
US2019059724A1
Publication/Patent Number: US2019059724A1
Publication date: 2019-02-28
Application number: 15/688,915
Filing date: 2017-08-29
Abstract: Methods, systems and computer program products for detecting contagious diseases in a wildlife population using a drone are provided. Aspects include monitoring, by a drone, a geographic area and capture images of the geographic area and analyzing the captured images to identify a deceased wildlife in a region of the geographic area. Aspects also include performing increased monitoring of the region and capture supplemental images of the region using the drone and analyzing the supplemental images to identify a number of deceased wildlife in the region. Based on a determination that number of deceased wildlife in the region, greater than a threshold number, a corrective action is taken. Methods, systems and computer program products for detecting contagious diseases in a wildlife population using a drone are provided. Aspects include monitoring, by a drone, a geographic area and capture images of the geographic area and analyzing the captured images to identify ...more ...less
11
US10291709B2
Publication/Patent Number: US10291709B2
Publication date: 2019-05-14
Application number: 15/969,160
Filing date: 2018-05-02
Abstract: A manager node provides discovery, translation, and mapping services for supported Ethernet protocol layers. The manager node discovers other nodes within the cloud environment and issues commands to each of the discovered nodes to obtain storage device specific information associated to storage devices communicatively connected to the discovered nodes. The storage device information obtained may include such things as device function (initiator or target), device model number, device capacity, and available storage (free), etc. When the manager node has gathered the storage device specific information it may create a list of all feasible storage devices that could be utilized within the cloud environment. The manager node may determine which of the discovered storage devices will be enabled. Subsequently, the manager node map may serve as an address translator and/or a gateway between protocols. A manager node provides discovery, translation, and mapping services for supported Ethernet protocol layers. The manager node discovers other nodes within the cloud environment and issues commands to each of the discovered nodes to obtain storage device specific information ...more ...less
12
US2019089728A1
Publication/Patent Number: US2019089728A1
Publication date: 2019-03-21
Application number: 16/196,354
Filing date: 2018-11-20
Abstract: A computer-implemented method according to one embodiment includes identifying a storage environment, establishing a baseline associated with input and output requests within the storage environment, monitoring activity associated with the storage environment, comparing the activity to the baseline, and performing one or more actions, based on the comparing. A computer-implemented method according to one embodiment includes identifying a storage environment, establishing a baseline associated with input and output requests within the storage environment, monitoring activity associated with the storage environment, comparing the ...more ...less
13
US10424172B2
Publication/Patent Number: US10424172B2
Publication date: 2019-09-24
Application number: 15/652,404
Filing date: 2017-07-18
Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device. Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a ...more ...less
14
US2019026996A1
Publication/Patent Number: US2019026996A1
Publication date: 2019-01-24
Application number: 15/652,404
Filing date: 2017-07-18
Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device. Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a ...more ...less
15
US2019026997A1
Publication/Patent Number: US2019026997A1
Publication date: 2019-01-24
Application number: 15/800,183
Filing date: 2017-11-01
Abstract: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device. Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a ...more ...less
16
US2019198155A1
Publication/Patent Number: US2019198155A1
Publication date: 2019-06-27
Application number: 16/287,692
Filing date: 2019-02-27
Abstract: A system, method and computer program product for archiving image, audio, and text data with metadata encapsulation in a client-server storage library is described. The server receives and holds the images, audio, or text to be archived in an image, audio or text logical partition which includes a directory of the images, audio, or text. The information is encapsulated in a metadata wrapper and stored in the library as a closed image, audio, or text file along with a closed copy of the directory. The closed image, audio, or text directory is also stored in the client. The images may be encapsulated in MXF, DICOM, Tape Archive (TAR) or GZIP formats. The storage library may have magnetic tapes, magnetic disks or optical disks as storage media. A system, method and computer program product for archiving image, audio, and text data with metadata encapsulation in a client-server storage library is described. The server receives and holds the images, audio, or text to be archived in an image, audio or text logical ...more ...less