47788 patents
Page 38 of 2390
Utility
AI governance using tamper proof model metrics
28 Nov 23
One example of a system comprises using a processor for identifying a model to be validated that is stored in a repository; automatically computing and recording one or more model metrics for the model to be validated in a tamper-proof manner; comparing the computed tamper-proof metrics with one or more encoded rules and policies to determine if the model to be validated complies with the one or more encoded rules and policies; and outputting a notification to a device indicating a validation status of the model to be validated based on the comparison of the computed tamper-proof metrics with the one or more encoded rules and policies.
Manish Anand Bhide, Ravi Chandra Chamarthy, Arunkumar Kalpathi Suryanarayanan
Filed: 20 Mar 23
Utility
Detecting security vulnerabilities in software containers
28 Nov 23
Approaches presented herein enable detection of security vulnerabilities in software containers.
Venkata Vara Prasad Karri, Sarbajit K. Rakshit, Shailendra Moyal, Pavan Kumar Penugonda
Filed: 5 Aug 21
Utility
d7bllx5o2523a4szfmwj e3gejlbva0bjuw4eanvl6zupsfwwmsb0jkz
28 Nov 23
A secure guest of a computing environment requests confidential data.
Jonathan D. Bradbury, Reinhard Theodor Buendgen, Janosch Andreas Frank, Marc Hartmayer, Viktor Mihajlovski
Filed: 5 Aug 21
Utility
b0pcmlxapxwinsomhgbj246bravprd36ud50cln0p1
28 Nov 23
One embodiment provides for a method for evaluation of an artificial intelligence (AI) service, the method includes partitioning, by a processor, data into in-domain data and out-of-domain data.
Prithviraj Sen, Rajasekar Krishnamurthy, Yunyao Li, Shivakumar Vaithyanathan, Hao Wang, Sang Don Han
Filed: 28 Jun 22
Utility
2oaaohnrs0n7ijum5p0r7xv8rvby6tsly0qzk80ehsun7bp
28 Nov 23
A computer system may modify the user interactions by receiving, by a computer system, a sequence of image frames in a time period, from a camera application on a mobile device, wherein the time period starts before and ends after a shutter is activated on the camera application; monitoring, by a computer system, movement of the mobile device within the time period; calculating a movement score for a user of the mobile device, by analyzing the sequence of image frames and the movement of the mobile device; and using the movement score to modify the user's interaction with the mobile device interface.
Christopher John Poole, Mark Andrew Woolley, Joseph Peter Kent, Thomas James Waterton
Filed: 27 Aug 21
Utility
2g381vjpi1lepaj9o28oi vrkengg11unqx8coppyvkbm4t
28 Nov 23
A computer-implemented method for graphical user interface element accessibility is disclosed.
Asako Ono, Tohru Hasegawa, Hiroaki Uetsuki, Shunsuke Ishikawa, Kenta Watanabe, Yasuyuki Tominaga, Issei Yoshida
Filed: 6 Apr 22
Utility
nh76s5 mhosy73zy02ywmacm
28 Nov 23
A secondary storage controller determines one or more tracks of one or more volumes in which data loss has occurred in the secondary storage controller.
Matthew D. Carson, Carol S. Mellgren, Karl A. Nielsen, Matthew Sanchez, Todd C. Sorenson
Filed: 4 Oct 22
Utility
2spekfd1fbs1ipgje6pu79iyk9nlr72ejig30wmsbl9i62awu
28 Nov 23
One embodiment provides a method, including: receiving, at a central system, a query requesting access to a dataset, wherein the central system communicates with a plurality of data storage locations, each having a governance policy for data stored at the data storage location, wherein different portions of the dataset are stored within different of the plurality of data storage locations; sending a sub-query formulated based upon the query; receiving a governance enforcement actions listing corresponding to the portion of the dataset stored within the corresponding data storage location; generating a meta-policy of enforcement actions for all of the plurality of data storage locations storing portions of the dataset, wherein the meta-policy identifies enforcement actions and an order of the enforcement actions to be applied to the dataset; and providing the meta-policy to each of the plurality of data storage locations.
Ramasuri Narayanam, Rishi Saket, Ety Khaitzin, Ritwik Chaudhuri, Rohith Dwarakanath Vallam
Filed: 28 Jul 21
Utility
autig20nhrtd36uov0u3mbpp2xmyt7vxw3g9v1nvy8k
28 Nov 23
Methods and systems of routing a design layout include setting an inner region and an outer region for modification of structures in an original design layout, in accordance with a minimum spacing that is based on a fabrication process.
Diwesh Pandey, Gustavo Enrique Tellez
Filed: 6 Aug 21
Utility
0103 a09rjdmu16b4oto6zyh8stc2bfe48a7q00is8ohniw7kgld7yvwj3
28 Nov 23
The present invention may be a method, a computer system, and a computer program product for suggesting an output candidate.
Emiko Takeuchi, Yoshinori Kabeya, Daisuke Takuma
Filed: 6 Sep 19
Utility
8m6st8vt8f8laoclacitazec3j rxyjrj94fafjk6vqdxpu99yjxtwl3z
28 Nov 23
Systems, computer-implemented methods, and computer program products to facilitate a dual learning bridge between text and a knowledge graph are provided.
Pierre L. Dognin, Igor Melnyk, Inkit Padhi, Payel Das
Filed: 25 Jan 21
Utility
0y9oppkvci mubg1y1izwsqsjsrp6ilmhgdl3
28 Nov 23
A block frequency of a block in an irreducible loop in computer code is statically determined.
Jeeva Paudel, Shimin Cui
Filed: 10 Dec 21
Utility
u2jkrju0krplliq2x90rc797xd o8pik9j2lgt6
28 Nov 23
A method, computer program product and computer system to generate a codebase for tenant microservices in a distributed computing environment is provided.
Slobodan Sipcic, Peeyush Jaiswal, Naeem Ahmed, Priyansh Jaiswal, Niyati Patel
Filed: 8 Mar 22
Utility
711u80w ygj3iw0qji6ag57
28 Nov 23
A mechanism is provided to orchestrates entitled execution of a set of analytics.
Corville O. Allen, Pratul Gupta
Filed: 31 Mar 21
Utility
ttg12ttv7wsj4tlj02 hj7vzzs9kkgkobhc76cok5
28 Nov 23
Systems and techniques that facilitate compliance enforcement via service discovery analytics are provided.
Constantin Mircea Adam, Shripad Nadgowda, James R. Doran, John Rofrano
Filed: 4 May 21
Utility
d1wp3nhnaeiu745b ge4u
28 Nov 23
A method manages microservices.
Kaihua Zhou, Kangda Zhang, Alexander Abrashkevich, Mengdie Chu, Sen Yang, Sriram Srinivasan, Simon Shi
Filed: 28 Oct 20
Utility
cykobwxb9pu61csw9u0x5dgca7lfmsd5cm2iis094ic6rlvc
28 Nov 23
A system may include a cluster and a module of the cluster.
Ning Ding, Yongjie Gong, Yao Zhou, Ke Zhao Li, Dan Dan Wang
Filed: 22 Sep 21
Utility
s9nklsizg5zvcflxxwwdjd1x492tno2rx 8duqga8u5g2v
28 Nov 23
When human users traverse physical space or traverse computer software, they take “navigational paths.” Some embodiments of the present invention are directed to machine logic for identifying a favorable navigation paths by monitoring physical or computer software navigation paths used by human users as they use a set of computer program(s).
Matheus Bitencourt Rangel Dantas, Marcos Vinicius de Oliveira Ribeiro, Claudio Santos de Souza Junior, Marco Aurelio Stelmar Netto
Filed: 3 Dec 21
Utility
uh1atq6ayhhrm94zqcaroxp 2y35o4up42wkj6m1gjh8ic
28 Nov 23
A processor receives an interrupt signal.
Christoph Raisch, Marco Kraemer, Donald William Schmidt, Bernd Nerz, Peter Dana Driever
Filed: 20 Oct 21
Utility
h9fk7oo0jiw186xgp26mvnjc0mroxldlxeh
28 Nov 23
A method, a structure, and a computer system for predicting pipeline training requirements.
Saket Sathe, Gregory Bramble, Long Vu, Theodoros Salonidis
Filed: 13 Oct 20