Kyndryl, Inc.

United States of America

Back to Profile

1-100 of 3,230 for Kyndryl, Inc. Sort by
Query
Aggregations
IP Type
        Patent 3,177
        Trademark 53
Jurisdiction
        United States 3,151
        World 44
        Canada 30
        Europe 5
Date
New (last 4 weeks) 4
2025 June (MTD) 3
2025 May 3
2025 April 3
2025 March 2
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 379
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 375
H04L 12/24 - Arrangements for maintenance or administration 242
G06F 17/30 - Information retrieval; Database structures therefor 221
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines 191
See more
NICE Class
42 - Scientific, technological and industrial services, research and design 40
35 - Advertising and business services 31
41 - Education, entertainment, sporting and cultural services 24
09 - Scientific and electric apparatus and instruments 19
37 - Construction and mining; installation and repair services 19
See more
Status
Pending 173
Registered / In Force 3,057
  1     2     3     ...     33        Next Page

1.

INTELLIGENT SENTIMENT-BASED TICKET ALLOCATION/PROCESSING

      
Application Number 18533688
Status Pending
Filing Date 2023-12-08
First Publication Date 2025-06-12
Owner Kyndryl, Inc. (USA)
Inventor
  • Hegde, Vinay Kumar Gajanana
  • Odibat, Omar
  • Iyer, Balamukundan G.

Abstract

Embodiments input a plurality of data and a weightage reallocation to a dynamic ranking priority system, calculate a plurality of sentiment scores and a plurality of penalty scores based on the plurality of data, eliminate a sentiment score of the plurality of sentiment scores in response to a corresponding penalty score of the plurality of penalty scores being greater than a predetermined threshold, dynamically re-rank a plurality of tickets with a same priority using a machine learning (ML) model based on a type of the plurality of data which is most similar to historical data, dynamically change a pre-allocated weightage using a learn on the job (LOTJ) model based on a ticket resolution to perform based on the plurality of data, and adjust the weight reallocation based on the dynamically changed pre-allocated weightage.

IPC Classes  ?

  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations

2.

CONSORTIUM-BASED INFRASTRUCTURE AND PLATFORM FOR USER AUTHENTICATION

      
Application Number 18524145
Status Pending
Filing Date 2023-11-30
First Publication Date 2025-06-05
Owner Kyndryl, Inc. (USA)
Inventor
  • Iwamoto, Sachio
  • Malik, Nadeem
  • Narasimhan, Balaji
  • Grandhe, Kishor
  • Rodriguez Bravo, Cesar Augusto
  • Puri, Rajeev

Abstract

In an aspect of the disclosure, a method includes: obtaining, by a computing device, a user request to access at least one system resource; obtaining, by the computing device, a digital certificate of the user requesting access to the at least one system resource; obtaining, by the computing device, a validation result associated with the digital certificate from a blockchain ledger network; determining, by the computing device, whether the validation result authorizes access to an authorization service; and sending the authorization to the authorization service to deny or permit the user access to the at least one system resource based on the validation result.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

3.

CONSORTIUM-BASED APPLICATION AUTHENTICATION

      
Application Number 18524243
Status Pending
Filing Date 2023-11-30
First Publication Date 2025-06-05
Owner Kyndryl, Inc. (USA)
Inventor
  • Iwamoto, Sachio
  • Malik, Nadeem
  • Narasimhan, Balaji
  • Grandhe, Kishor
  • Rodriguez Bravo, Cesar Augusto
  • Puri, Rajeev

Abstract

In an aspect of the disclosure, there is a computer-implemented method including: obtaining, by a computing device, a request from an endpoint device to access at least one system resource; obtaining, by the computing device, a digital certificate from a shared digital wallet; obtaining, by the computing device, a validation result associated with the digital certificate from a blockchain ledger network; determining, by the computing device, whether the validation result authorizes access to the at least one system resource by the endpoint device; and sending authorization to the endpoint to deny or permit the endpoint device access to the at least one system resource based on the validation result.

IPC Classes  ?

  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes

4.

EXPEDITED OPERATIONS RESOLUTION

      
Application Number 18388579
Status Pending
Filing Date 2023-11-10
First Publication Date 2025-05-15
Owner Kyndryl, Inc. (USA)
Inventor
  • Sharma, Kalpesh
  • Bushetti, Veeresh
  • M, Nalini

Abstract

A computer-implemented method, including: receiving, by a computing device, an information technology (IT) operations request; collecting, by the computing device, information associated with the IT operation request from a knowledge bank; determining, by the computing device, a resolution resource for completing the IT operation request; and assigning, by the computing device, the resolution resource based on the information from the knowledge bank and IT operation request.

IPC Classes  ?

  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations

5.

VIRTUAL STORAGE MECHANISM TO OPTIMIZE FETCH PERFORMANCE OF NAMED OBJECTS IN ENTERPRISE SYSTEMS

      
Application Number 18502433
Status Pending
Filing Date 2023-11-06
First Publication Date 2025-05-08
Owner Kyndryl, Inc. (USA)
Inventor
  • Akula, Ravinder
  • Adige, Srikanth Rao
  • Murugesan, Jeevabharathy
  • Kella, Neelakanta

Abstract

Embodiments relate to enhancing a virtual storage mechanism to optimize fetch performance of named objects in enterprise systems. A technique includes receiving from a requester a request to retrieve an object and determining that the object is available for retrieval in a virtual data space, where a machine learning model is configured to cause the object to be placed in the virtual data space, the machine learning model being trained on fetch data for objects. The technique includes retrieving the object from the virtual data space instead of a storage system and providing the object to the requester for execution.

IPC Classes  ?

  • G06F 12/123 - Replacement control using replacement algorithms with age lists, e.g. queue, most recently used [MRU] list or least recently used [LRU] list
  • G06N 3/09 - Supervised learning

6.

IDENTIFY POTENTIAL PATTERNS OF COMPROMISE ON LOG FILES

      
Application Number 18504732
Status Pending
Filing Date 2023-11-08
First Publication Date 2025-05-08
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Riley, Daniel S.

Abstract

This disclosure presents an approach for identifying obfuscation patterns within system log files to enhance cybersecurity. The method involves two key stages: first, detecting tampering in a primary set of log entries; and second, monitoring a secondary set of log files for the presence of these tampering patterns. By comparing the identified obfuscation patterns in the primary log entries with those detected in the secondary set, the system can effectively identify potential system intrusions. This innovative approach provides an advanced and proactive means of bolstering system security by uncovering and responding to malicious activities that attempt to obscure their tracks within log files, ultimately enhancing the defense against cyber threats.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

7.

PREVENTING HARASSMENT ON METAVERSE ENVIRONMENTS

      
Application Number 18488319
Status Pending
Filing Date 2023-10-17
First Publication Date 2025-04-17
Owner Kyndryl, Inc. (USA)
Inventor Rodriguez Bravo, Cesar Augusto

Abstract

An approach is provided that displays avatars locating in a first virtual area to a first set of users with each user controlling one of the avatars. A request is received from one of the users to escape a situation. In response to the request, the system clones the user's first avatar thus creating a second avatar. The second avatar is visible to the user; however it is invisible to one or more of the set of users. The user controls the second avatar and the first avatar is automatically controlled using artificial intelligence (AI), with the user no longer controlling the first avatar.

IPC Classes  ?

  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
  • H04L 9/40 - Network security protocols

8.

SYSTEMS AND METHODS FOR RESIDUAL RISK ASSESSMENT IN INFORMATION TECHNOLOGY MANAGEMENT

      
Application Number 18378240
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner Kyndryl, Inc. (USA)
Inventor
  • Jasionowski, Pawel
  • Riley, Dan S.
  • Biegel, Jeffrey
  • Chahal, Priya
  • Melancon, Melissa
  • Chidester, John
  • Hickman, Jalen

Abstract

A computer-implemented method including: obtaining, by a computing device, a plurality of risk events; mapping, by the computing device, treatment actions to each of the plurality of the risk events; determining, by the computing device, an impact of the treatment actions on each of the plurality of the risk events; determining, by the computing device, a probability of implementation of the treatment actions; calculating, by the computing device, how the treatment actions affect other risk factors based on the determining steps; and providing, by the computing device, a recommendation of optimal risk mitigation based on how the first treatment actions affect the other risk events.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06Q 10/0635 - Risk analysis of enterprise or organisation activities

9.

MACHINE LEARNING MODEL FOR GENERATING CODE SNIPPETS AND TEMPLATES

      
Application Number 18477668
Status Pending
Filing Date 2023-09-29
First Publication Date 2025-04-03
Owner Kyndryl, Inc. (USA)
Inventor
  • Odibat, Omar
  • Paul, Chakkalamattam Jos

Abstract

Embodiments relate to a machine learning model for generating code snippets and templates. A team feature set for a team is provided to a machine learning model, the team including at least two members. The machine learning model determines a recommendation for the team, the recommendation being related to computer execution to perform a task. In response to determining the recommendation for the team, the recommendation is rendered to the team.

IPC Classes  ?

  • G06F 8/35 - Creation or generation of source code model driven

10.

AUTOMATIC IDENTIFICATION OF CHANGES ON SERVERS WITH SCHEDULED MAINTENANCE

      
Application Number 18465410
Status Pending
Filing Date 2023-09-12
First Publication Date 2025-03-13
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Eckert, Kim A.
  • Campos Batista, David Alonso

Abstract

An approach is disclosed that determines that a change is needed to a remote system that is managed by a change management system that manages changes to many remote systems. A change management time window when the change is scheduled to be performed at the selected remote system is identified and a monitoring request is sent to the remote system. The monitoring request causes the remote system to run a monitoring process. The change management system receives an activity notification that was identified by the monitoring process. In response to the activity notification matching the change needed, the change scheduled at the selected remote system is canceled by the change management system.

IPC Classes  ?

11.

PREVENTING DEEP FAKE VOICEMAIL SCAMS

      
Application Number 18458276
Status Pending
Filing Date 2023-08-30
First Publication Date 2025-03-06
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Goins, Lorie

Abstract

Embodiments relate to preventing deep fake voicemail scams. In response to receiving a voice message, an intent of the voice message is determined. The intent is determined to relate to a persuasion technique. A warning is provided about the voice message.

IPC Classes  ?

  • H04M 3/22 - Arrangements for supervision, monitoring or testing
  • H04M 3/533 - Voice mail systems

12.

AUTHENTICATION METHOD

      
Application Number 18236779
Status Pending
Filing Date 2023-08-22
First Publication Date 2025-02-27
Owner Kyndryl, Inc. (USA)
Inventor Rodriguez Bravo, Cesar Augusto

Abstract

A computer-implemented method includes presenting one or more categories of movement patterns. The computer-implemented method includes recording a movement pattern of a user, where the movement pattern is associated with the one or more categories of movement patterns. The computer-implemented method includes authenticating the recorded movement pattern is correct. The computer-implemented method includes associating the authenticated recorded movement pattern with at least one of a device, application, and web-based service.

IPC Classes  ?

  • G06F 21/36 - User authentication by graphic or iconic representation

13.

System to Infer Longevity of Cloud Computing Resource Usage and Rank in Order of Importance

      
Application Number 18455435
Status Pending
Filing Date 2023-08-24
First Publication Date 2025-02-27
Owner Kyndryl, Inc. (USA)
Inventor
  • Wheatley, Keri
  • Chintakunta, Mouleswara Reddy
  • Odibat, Omar

Abstract

An approach is disclosed that creates a network graph that identifies computing resources as nodes. Each of the computing resources is weighted based upon the corresponding resource's attributes and usage. The approach connects a first set of nodes as directly connected and a second set of nodes as indirectly connected. Node longevity values are calculated for each node in the network graph with each of the node longevity values corresponding to one of the nodes in the network graph. The calculations are based on the direct and indirect connections between each of the nodes. The computing resources are managed based on the corresponding node longevity values.

IPC Classes  ?

  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations

14.

ABSTRACTIVE SUMMARIZATION OF INFORMATION TECHNOLOGY ISSUES USING A METHOD OF GENERATING COMPARATIVES

      
Application Number 18447506
Status Pending
Filing Date 2023-08-10
First Publication Date 2025-02-13
Owner Kyndryl, Inc. (USA)
Inventor
  • Ayachitula, Naga A.
  • Khandekar, Rohit
  • Sharma, Upendra

Abstract

Embodiments relate to providing automated text summarization techniques for capturing and conveying information technology (IT) records with numerical data. A technique is executed by one or more processors and includes receiving an IT record comprising text and numerical data, normalizing the numerical data into normalized numerical data, transforming the normalized numerical data into comparative and superlative adjectival terms and rewriting the text to include the comparative and superlative adjectival terms for output as a rewritten IT record.

IPC Classes  ?

  • G06F 40/40 - Processing or translation of natural language
  • G06F 40/289 - Phrasal analysis, e.g. finite state techniques or chunking

15.

EARLY DETECTION OF INFORMATION TECHNOLOGY (IT) FAILURES USING MULTIMODAL CORRELATON AND PREDICTION

      
Application Number 18447512
Status Pending
Filing Date 2023-08-10
First Publication Date 2025-02-13
Owner Kyndryl, Inc. (USA)
Inventor
  • Ayachitula, Naga A.
  • Khandekar, Rohit
  • Sharma, Upendra

Abstract

Embodiments relate to early detection of information technology (IT) failures in a computing system. A technique is executed by one or more processors and includes receiving multiple IT records including past and recent historical data, extracting first and second time series sections from the past and recent historical data, respectively, training a failure detection model to correlate metric patterns in the first time series sections with at least one of other metric patterns and previous IT failures and, in response to the training, using the failure detection model to predict at least one of upcoming metric patterns and upcoming IT failures from metric patterns in the second time series sections.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition

16.

PROTECTING DATA STORED BY A NON-VOLATILE MEMORY

      
Application Number 18426441
Status Pending
Filing Date 2024-01-30
First Publication Date 2025-02-13
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Brackhahn, Thomas

Abstract

One or more embodiments relate to protecting data stored by a non-volatile memory of a memory device installed in a computing device. A technique includes in response to a power-up of the memory device, incrementing a memory power cycle count, and receiving a host power cycle count indicating a number of power-ups of the computing device. The technique includes, if the memory power cycle count is not equal to the host power cycle count, applying a security reaction to the memory, the security reaction being adapted for preventing a readout of the data.

IPC Classes  ?

  • G06F 21/75 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation, e.g. to counteract reverse engineering
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

17.

PROTECTING A NON-VOLATILE SOLID-STATE MEMORY FROM AN UNAUTHORIZED ACCESS

      
Application Number 18436899
Status Pending
Filing Date 2024-02-08
First Publication Date 2025-02-13
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Brackhahn, Thomas

Abstract

An approach is provided for protecting data stored by a non-volatile solid-state memory from an unauthorized access. In response to a trigger event indicating an increased probability of the unauthorized access, the memory is destroyed by directing through the memory an electric current exceeding a rated current of the memory, and testing an operability of the memory, where the destruction is completed when the test indicates lacking operability of the memory.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

18.

ABSTRACTIVE SUMMARIZATION OF INFORMATION TECHNOLOGY ISSUES USING A METHOD OF GENERATING COMPARATIVES

      
Application Number EP2023079771
Publication Number 2025/031606
Status In Force
Filing Date 2023-10-25
Publication Date 2025-02-13
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Ayachitula, Naga
  • Khandekar, Rohit
  • Sharma, Upendra

Abstract

Embodiments relate to providing automated text summarization techniques for capturing and conveying information technology (IT) records with numerical data. A technique is executed by one or more processors and includes receiving an IT record comprising text and numerical data, normalizing the numerical data into normalized numerical data, transforming the normalized numerical data into comparative and superlative adjectival terms and rewriting the text to include the comparative and superlative adjectival terms for output as a rewritten IT record.

IPC Classes  ?

19.

HEURISTIC DATA PIPELINE SCHEDULING

      
Application Number 18228401
Status Pending
Filing Date 2023-07-31
First Publication Date 2025-02-06
Owner Kyndryl, Inc. (USA)
Inventor
  • Madhavan, Madhusoodanan K.
  • Boppanna, Anil Babu
  • Agarwal, Aman
  • Gad, Siddesh L.

Abstract

A computer-implemented method, including: receiving, by a computing device, a data pipeline job request; generating, by the computing device, a complexity score for the data pipeline job request; determining, by the computing device, a predicted execution time for the data pipeline job request; generating, by the computing device, a priority score for the data pipeline job request based on the predicted execution time and the generated complexity score; and comparing, by the computing device, the priority score for the data pipeline job request to another priority score to determine a schedule for the data pipeline job request.

IPC Classes  ?

  • G06F 9/448 - Execution paradigms, e.g. implementations of programming paradigms

20.

KYNDRYL. FLAT, FAST AND FOCUSED

      
Application Number 1837358
Status Registered
Filing Date 2024-11-28
Registration Date 2024-11-28
Owner Kyndryl, Inc. (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer programming; software as a service (SaaS) services featuring software for data management; software as a service (SaaS) services featuring software for cloud computing; software as a service (SaaS) services featuring software for artificial intelligence; software as a service (SaaS) services featuring software for cognitive computing; Software as a Service (SaaS) services featuring software for blockchain technology; software as a service (SaaS) services featuring software for quantum computing and quantum programming; software as a service (SaaS) services featuring software for constructing, analyzing and running quantum programs and quantum algorithms; software as a service (SaaS) services featuring software for developing and testing quantum algorithms; computer programming and computer consulting services for artificial intelligence; computer programming and computer consulting services for cognitive computing; computer programming and computer consulting services for information management; computer programming and computer consulting services for data management; computer programming and computer consulting services for cloud computing; computer programming and computer advisory services for blockchain technology; computer programming and computer consulting services for quantum computing; computer programming and computer consulting services for software as a service (SaaS); design, installation, updating and maintenance of software; computer software and hardware design for third parties and consultation services in the field of computers; computer services, namely, design, creation and maintenance of websites for third parties; computer systems analysis, database and network integration, computer programming for third parties, all for use in commercial interactions over global computer networks; technical support services, namely, troubleshooting of computer program and software problems; design of systems for interconnection of computers and software, namely, electronic connection of computers and software to each other; computer software and hardware testing services (quality and technical controls); technical project studies in the field of computer hardware and software; consultancy services in the field of computer hardware, namely consultancy regarding computing research and development; computer advice and assistance concerning Internet use; rental of computers and software; scientific and industrial research, namely research and development of new products, biological research, bacteriological research, chemical research, cosmetic research, mechanical research, geological research, technical research, pharmaceutical research, scientific research for medical purposes; information technology services; computer system integration services; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for third parties; technical support services, namely, diagnosing computer hardware and computer software problems; computer system design services for third parties; design of systems for interconnection of computers and computer programs, namely, integration of computer systems and computer networks; computer program and computer hardware testing services, namely testing of software, computers and servers to ensure proper functioning thereof; cloud computing services, namely, network-integrated computer hardware and software services for dynamic provisioning, virtualization and consumption metering of computer resources; providing virtual computer systems and virtual computer environments through cloud computing; design and development of software for cloud storage of data; cloud computing hosting provider services; electronic data storage and data recovery services; data security service.

21.

SYSTEM TO FACILITATE WIRELESS CHARGING OF ELECTRONIC DEVICE(S)

      
Application Number 18924676
Status Pending
Filing Date 2024-10-23
First Publication Date 2025-02-06
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Rakshit, Sarbajit K.

Abstract

Control system for facilitating wireless charging of an electronic device is provided, which identifies presence of multiple electronic devices within an environment, with the multiple electronic devices including a self-propelled power relay device with wireless charging capability. Control system processing determines that an electronic device of the multiple electronic devices requires wireless charging, and based on the determining, deploys the self-propelled power relay device to move to an area of the environment within a charging range of the electronic device to facilitate wireless charging of the electronic device via the self-propelled power relay device.

IPC Classes  ?

  • H02J 50/50 - Circuit arrangements or systems for wireless supply or distribution of electric power using additional energy repeaters between transmitting devices and receiving devices
  • H02J 50/10 - Circuit arrangements or systems for wireless supply or distribution of electric power using inductive coupling
  • H02J 50/80 - Circuit arrangements or systems for wireless supply or distribution of electric power involving the exchange of data, concerning supply or distribution of electric power, between transmitting devices and receiving devices
  • H02J 50/90 - Circuit arrangements or systems for wireless supply or distribution of electric power involving detection or optimisation of position, e.g. alignment

22.

kyndryl vital

      
Application Number 1836024
Status Registered
Filing Date 2024-11-04
Registration Date 2024-11-04
Owner Kyndryl, Inc. (USA)
NICE Classes  ?
  • 35 - Advertising and business services
  • 41 - Education, entertainment, sporting and cultural services

Goods & Services

Business consulting services for companies in the field of selection, implementation, administration and use of computer hardware and software systems; business consulting services for companies in the field of selection, implementation, administration and use of computer hardware and software systems in the fields of enterprise software, technology and infrastructure, cybersecurity, resiliency, data analytics, digital transformation, and artificial intelligence; co-creation services in the nature of business assistance services, namely, assisting customers in the selection, implementation, administration and use of computer hardware and software systems; co-creation services in the nature of business assistance services, namely, assisting customers in the selection, implementation, administration and use of computer hardware and software systems in the fields of enterprise software, technology and infrastructure, cybersecurity, resiliency, data analytics, digital transformation, and artificial intelligence; arranging and conducting trade show exhibitions in the field of computers, information technology and electronic business transactions; arranging and conducting trade show exhibitions in the field of computers, information technology and electronic business transactions via a global computer network; arranging and conducting trade show exhibitions in the fields of enterprise software, technology and infrastructure, cybersecurity, resiliency, data analytics, digital transformation, and artificial intelligence; analysis of market statistic and data studies; analyzing and compiling business data; arranging and conducting of customer co-creation sessions (business consultancy) in the field of computer products and services; arranging and conducting of online customer co-creation sessions (business consultancy) in a virtual environment; arranging and conducting of online customer co-creation sessions (business consultancy) in the field of information technology (IT) and computer products and services in a virtual environment; none of these services providing a health insurance system compulsory or supplementary, or providing products or services for accessing health care, or providing products or services for the identification of persons accessing a health care system or a health care insurance system. Educational services, namely, conferences, exhibitions, symposiums, presentations, technical demonstrations and training seminars, all in the field of information technology and computer products and services; Arranging and conducting of conferences; arranging and conducting of exhibitions; arranging and conducting of workshops; arranging and conducting of seminars; arranging and conducting of conferences and seminars in the field of information technology and computer products and services; arranging and conducting of software user training; arranging and conducting of computer hardware user training; arranging and conducting of information technology courses; training in computer operations and information technology; arranging and conducting of customer co-creation sessions in the field of information technology (IT) training; arranging and conducting of customer co-creation sessions [training] in the field of computer products and services; educational services, namely, conferences, exhibitions, symposiums, presentations, technical demonstrations and training seminars taking place online in a virtual environment, all in the field of information technology and computer products and services; arranging and conducting of online conferences in a virtual environment; arranging and conducting of online exhibitions in a virtual environment; arranging and conducting of online workshops in a virtual environment; arranging and conducting of online seminars in a virtual environment; arranging and conducting of online conferences and seminars in the field of information technology and computer products and services in a virtual environment; arranging and conducting of online software user training in a virtual environment; arranging and conducting of online computer hardware user training in a virtual environment; arranging and conducting of online information technology courses in a virtual environment; online training in computer operations and information technology in a virtual environment; arranging and conducting of online customer co-creation sessions [training] in a virtual environment; arranging and conducting of online customer co-creation sessions [training] in the field of information technology [IT] and computer products and services in a virtual environment; none of these services providing a health insurance system compulsory or supplementary, or providing products or services for accessing health care or providing products or services for the identification of persons accessing a health care system or a health care insurance system.

23.

REMOVING INTERACTIONS FROM A VIRTUAL ENVIRONMENT

      
Application Number 18357194
Status Pending
Filing Date 2023-07-24
First Publication Date 2025-01-30
Owner Kyndryl, Inc. (USA)
Inventor Rodriguez Bravo, Cesar Augusto

Abstract

Embodiments relate to removing interactions from a virtual environment thereby executing the right to be forgotten in the virtual environment. In response to receiving a request to remove interactions from a virtual environment, a search is performed in the virtual environment for cryptographic keys embedded with a user identification corresponding to the request. The cryptographic keys embedded with the user identification are deleted in the virtual environment, where the interactions have been signed with the cryptographic keys embedded with the user identification in the virtual environment. In response to deleting the cryptographic keys embedded with the user identification in the virtual environment, there is a modification to a presentation of the interactions in the virtual environment.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

24.

PREVENTING ACCESS OF REMOVED USERS TO MESSAGES SHARED IN A GROUP CHAT

      
Application Number 18357196
Status Pending
Filing Date 2023-07-24
First Publication Date 2025-01-30
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso

Abstract

Embodiments relate to preventing access of removed users to messages shared in a group chat with an end-to-end encryption. An aspect includes, responsive to creation of a group having members for communicating using encryption keys, receiving a request to remove a given member of the members from the group, the given member being associated with a computer system, at least one message of the group being accessible to the given member. An aspect includes identifying the encryption keys associated with the given member and causing a deletion on the computer system of the encryption keys associated with the given member in response to the request. An aspect includes confirming the deletion of the encryption keys on the computer system associated with the given member. The deletion of the encryption keys on the computer system prevents access of the computer system to at least one message of the group.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/40 - Network security protocols

25.

DATA INSIGHTS USING CONTEXT DRIVEN LATERAL AI

      
Application Number 18361563
Status Pending
Filing Date 2023-07-28
First Publication Date 2025-01-30
Owner Kyndryl, Inc. (USA)
Inventor
  • Sharma, Kalpesh
  • Perumal Thevar, Muniyandi
  • M, Nalini
  • Bushetti, Veeresh

Abstract

An approach is disclosed that receives a user activity from a user that is using a datastore visualization display. The display displays a first visualization pertaining to one or more datastores with the datastore visualization display provided at least in part by a context driven lateral artificial intelligence (CDLAI) engine. The received user activity is provided as input to the CDLAI to generate a second visualization that is displayed to the user at the datastore visualization display that is displayed to the user. Artificial intelligence (AI) models that are used by the CDLAI are then trained based on the received user activity. The training results in updates to the visualizations.

IPC Classes  ?

  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/22 - IndexingData structures thereforStorage structures

26.

PREVENT SCAMS IN REAL TIME IN AN INTERACTIVE COMMUNICATION ENVIRONMENT

      
Application Number 18354711
Status Pending
Filing Date 2023-07-19
First Publication Date 2025-01-23
Owner Kyndryl, Inc. (USA)
Inventor Rodriguez Bravo, Cesar Augusto

Abstract

Embodiments relate to automatically preventing scams in real time in an interactive communication environment. A machine learning model determines that at least one communication from a first user to a second user in an interactive communication environment includes a potential threat, the interactive communication environment providing real time communications between the first user of a first computer system to the second user of a second computer system. The potential threat of the at least one communication is determined to above a threshold. An overlay is displayed to the second user on the second computer system in which the overlay displays metadata about the first user and informs the second user to avoid providing any sensitive information in the interactive communication environment.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/40 - Network security protocols

27.

PREVENTING FRAUD ON SMART DEVICES

      
Application Number 18354779
Status Pending
Filing Date 2023-07-19
First Publication Date 2025-01-23
Owner Kyndryl, Inc. (USA)
Inventor Rodriguez Bravo, Cesar Augusto

Abstract

Embodiments relate to preventing fraud on smart devices. In response to receiving a communication, a correlation of the communication to a security threat is determined, and device data of a device is obtained. A determination is made that a combination of the correlation and the device data meets a predefined threshold for the security threat. An alert is audibly output on the device, the audio alert being a warning of the security threat presented by the communication.

IPC Classes  ?

28.

CONTAINER LOAD BALANCING AND AVAILABILITY

      
Application Number 18892870
Status Pending
Filing Date 2024-09-23
First Publication Date 2025-01-09
Owner Kyndryl, Inc. (USA)
Inventor Foreman, Park

Abstract

A system includes a container cluster including plural hosts that communicate with one another via a network. Each of the plural hosts includes a computing node that includes an operating system and a container runtime configured to run containers. Each of the plural hosts stores a respective member list that defines capabilities of the plural hosts in the container cluster. Each of the plural hosts is configured to identify another one of the plural hosts for running a container based on comparing tags of the container to the capabilities of the plural hosts defined in the respective member list. Each respective one of the plural hosts is configured to perform the identifying the another one of the plural hosts for running the container in response to determining the respective one of the plural hosts is resource-constrained from running the container.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

29.

Multi-node failure processing for computer networks

      
Application Number 18343785
Grant Number 12278744
Status In Force
Filing Date 2023-06-29
First Publication Date 2025-01-02
Grant Date 2025-04-15
Owner Kyndryl, Inc. (USA)
Inventor
  • Mahamuni, Amol Bhaskar
  • K, Kiran Kumar

Abstract

Some embodiments of the present disclosure are directed to systems, computer-readable media, and computer-implemented methods for multi-node failure processing in computer networks. In particular, some embodiments are directed to generating and displaying an impact area graph for a respective node from a plurality of nodes in a network, wherein the impact area graph depicts the relative predicted impact to each other node in the network from a failure of the respective node. Other embodiments may be disclosed or claimed.

IPC Classes  ?

  • H04L 43/026 - Capturing of monitoring data using flow identification
  • H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
  • H04L 41/14 - Network analysis or design
  • H04L 41/147 - Network analysis or design for predicting network behaviour
  • H04L 41/149 - Network analysis or design for prediction of maintenance

30.

kyndryl

      
Application Number 1831594
Status Registered
Filing Date 2024-08-26
Registration Date 2024-08-26
Owner Kyndryl, Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 21 - HouseHold or kitchen utensils, containers and materials; glassware; porcelain; earthenware
  • 25 - Clothing; footwear; headgear
  • 35 - Advertising and business services
  • 37 - Construction and mining; installation and repair services
  • 38 - Telecommunications services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computers; quantum computers; computer hardware and software; computer hardware and software for information technology analysis and for data management; computer hardware and software for applications development; computer hardware and software for cloud computing; computer hardware and software for cognitive computing; computer hardware and software for artificial intelligence; computer hardware and software for blockchain technology; computer hardware and software for cognitive computing and quantum programming; computer hardware, namely, magnetic tape units (data processing equipment), magnetic tapes, printed circuits, integrated circuits, computer keyboards, compact disks (audio-video), optical disks, computing couplers, floppy discs, magnetic data media; computer hardware, namely, video screens, scanners, printers, computer interfaces (data processing equipment), readers (data processing equipment), software (recorded programs), microprocessors, modems, computers, computer memories, computer peripheral devices; adapters for computers; components for computers; data processing apparatus for the management of data and information; semiconductors; machine-readable electronic data media; magnetic disks; floppy disk drives; tape recorders; calculating machines; facsimile machines; video recorders; video cassettes; computer chips; printed circuit boards; computer hardware, namely, computer communications servers; bags adapted for holding laptops; computer interface boards; cables for computers and components for cables for computers; computer fax modem cards; computer accessories, namely, computer screen filters, mouse pads, radio pagers, computer game joysticks; electric converters, namely, digital-to-analog converters, analog-to-digital converters and step voltage switches; computer mice; integrated circuit cards [smart cards]; adapters for integrated circuit cards [smart cards]; readers for integrated circuit cards [smart cards]; microcomputers; uninterruptible electrical power sources; projectors; remote controls for computers; surge protectors and uninterruptible electrical power supplies; point-of-sale computer terminals; computer servers; data storage devices, namely, high-speed storage subsystems for the storage and backup of electronic data either locally or via a telecommunications network; recorded and downloadable computer programs and software; video game software; computer operating system software and programs; computer software used to access a global computer network; computer software used in database management; computer software used in locating, retrieving and receiving text, electronic documents, graphics and audiovisual information on internal company computer networks and on local and wide-area computer networks; software used for developing software and creating websites and user manuals in electronic format sold with those goods; computer software for use in controlling the operation and running of computer systems, programs and networks; computer software for use in connecting disparate computer networks and systems, computer servers and storage devices; computer software for linking together computers and for enabling their linkage to a globally accessible network; computer software for managing computer hardware, software and processes that exist within an information technology environment; computer systems combining hardware and software for use in managing and analyzing data and digital instruction manuals sold with those goods; cloud computing system, namely network integrating computer hardware and software for dynamic provisioning, virtualization and consumption metering of computer resources; software recorded or downloadable from cloud computing, for deploying and managing virtual machines to a cloud computing platform; computer systems, namely, computer hardware and computer software for developing and integrating artificial intelligence, namely, machine learning, deep learning, and natural language processing, which are capable of collecting, organizing and analyzing data; computer systems, namely, computer hardware and computer software for integrating automatic natural language processing, computational linguistics, information retrieval, and machine learning, which are capable of understanding general human queries and formulating responses; computer systems for developing, building and operating blockchain applications; computer hardware and computer software for developing and testing quantum algorithms; documentation and instruction manuals recorded on machine-readable electronic media and concerning computers or computer programs; downloadable electronic publications; electronic publications recorded on computer media, namely, user manuals, guide books, brochures, information sheets, written presentations and educational material, in the fields of computing, computer networks, computer storage, computer operating systems, information technologies, database management, cloud computing, artificial intelligence, blockchain technology and quantum computing. Glasses [receptacles]; cups; beer mugs; plastic water bottles sold empty; insulated containers and bottles for food and beverages; glasses, namely goblets; back scratchers; shoe horns; non-electric portable coolers; serving bowls of crystal; vases; coasters (tableware) and coasters of leather; coasters, other than of paper or textile materials. Clothing; clothing, namely, tops for babies, children, adults, women, and men; clothing, namely tee-shirts, shirts, button-down shirts, sweatshirts, pullovers, jackets, aprons, vests, bottoms [clothing]; headwear articles [headwear, clothing]; headwear, namely hats, baseball caps and hats, caps. stocking caps; shoes. Advertising; sales promotion for others; advisory services for commercial management and management; business information; distribution of prospectuses; distribution of samples; arranging newspaper subscriptions for third parties; accounting; document reproduction; centralized data processing management; organization of exhibitions for commercial or advertising purposes; advisory and commercial business management services and business advisory services; business development services; analysis of market study statistics and data; data processing services; data processing services in the field of artificial intelligence; data processing services in the field of cognitive computing; data processing services in the field of cloud computing; data processing services in the field of blockchain technology; data processing services in the field of information management; data processing services in the field of quantum computing and quantum programming; organizing and conducting trade shows in the field of computers, computer services, information technology, artificial intelligence, cloud computing, blockchain technology, quantum computing, database management, telecommunications and electronic commercial transactions via a global computer network; business advisory services in the field of artificial intelligence; business advisory services in the field of computer systems which integrate natural language processing, computational linguistics, information retrieval, machine learning, which are capable of understanding general human queries and formulating responses; business advisory services for cloud computing; business advisory services for blockchain technology; business advisory services in the field of quantum computing, quantum programming and for developing and testing quantum algorithms; business advisory services for information technology; compiling and analyzing business data; systematization of information in computer databases. Construction services; computer hardware repair and installation services; computer hardware maintenance; installation and maintenance of computer hardware for computer networks; technical support services, namely, troubleshooting of computer hardware problems. Telecommunication services; services for the delivery of messages by electronic means; communications by computer terminals; transmission of emails; news and information agencies; telecommunications and electronic messaging services via a global data teleprocessing network; computer-aided transmission of information; telecommunication services for commercial interaction in the field of global computer networks; providing multiple access to goods and services via a global network and wireless communication apparatus; electronic transmission of data and documents via computer terminals; teleconferencing and Web conferencing services; providing multiple-user access to global computer information networks for transferring and disseminating a wide range of information; providing online forums for transmitting messages among computer users; providing private and secure electronic communications in real time, via a computer network. Education; entertainment; training; organizing and conducting conferences, seminars and congresses; exhibition services for cultural or educational purposes; production of radio and television programs; sporting and cultural activities; education services, namely, conducting classes, seminars, conferences, online seminars (webinars) and workshops in the fields of computers, computer services, information technology, artificial intelligence, cloud computing, blockchain technology, quantum computing, database management, image and sound processing technology, telecommunications and global computer networks; training in the fields of computing, computer services, information technology, artificial intelligence, cloud computing, blockchain technology, quantum computing, database management, image and sound processing technology, telecommunications and global computer networks; conducting entertainment exhibitions in the nature of information technology demonstrations; entertainment services, namely, making available online computer games; conducting entertainment exhibitions, namely, real-time sporting competitions via a global computer network; conducting entertainment exhibitions, namely, providing demonstrations on Internet sites concerning museum exhibitions, sporting events, art gallery exhibitions, concerts and musical recordings; editing of books and journals; show and film production; facilitation of exhibitions for cultural or educational purposes; booking of seats for shows. Computer programming; software as a service (SaaS) services featuring software for data management; software as a service (SaaS) services featuring software for cloud computing; software as a service (SaaS) services featuring software for artificial intelligence; software as a service (SaaS) services featuring software for cognitive computing; software as a service (SaaS) services featuring software for blockchain technology; software as a service (SaaS) services featuring software for quantum computing and quantum programming; software as a service (SaaS) services featuring software for constructing, analyzing and running quantum programs and quantum algorithms; software as a service (SaaS) services featuring software for developing and testing quantum algorithms; computer programming services and computer consultation services on artificial intelligence; computer programming services and consultation services on cognitive computing; computer programming services and computer consultation services on information management; computer programming services and computer consultation services on data management; computer programming services and advisory services on cloud computing; computer programming services and advisory services on blockchain technology; computer programming services and computer consulttion services on quantum computing; computer programming services and computer advisory services on software as a service (SaaS); design, installation, updating and maintenance of computer software; designing software and hardware for third parties and advisory services with respect to computers; computer services, namely, creating and maintaining websites for third parties; computer systems analysis, integration of databases and networks, computer programming for third parties, all for use in commercial interactions via global computer networks; technical support services, namely, troubleshooting in the field of computer programs and software problems; designing computer hardware and software interconnection systems, namely, electronic connection of computers and software; computer hardware and software testing services (quality and technical control); technical project studies in the field of computer hardware and software; consultation services in the field of computer hardware, namely, consultation with respect to computer research and development; advisory and support services connected with the use of the Internet; rental of computers and software; scientific and industrial research, namely, research and development of new products, biological research, bacteriological research, chemical research, research in esthetics, mechanical research, geological research, technical research, pharmaceutical research, scientific research for medical use; information technology consulting services; computer system integration services; consultation services in the fields of design, selection, implementation and use of computer hardware and software systems for third parties; technical support services, namely, troubleshooting in the nature of diagnosis of computer hardware and software problems; computer system design services for third parties; interconnecting computer hardware and software, namely, integrating computer systems and networks; services for testing software and hardware, namely, testing software, computers and servers to ensure the proper functioning thereof; cloud computing services, namely, computer hardware and embedded software services for dynamic provisioning, virtualization, and consumption metering of computer resources; providing virtual computer systems and virtual computer environments through cloud computing; design and development of software for cloud storage of data; cloud computing hosting provider services; electronic data storage and retrieval services; data security service; computer support provided by programmers; design of computer hardware for computer networks.

31.

DYNAMIC DISPLAY FOR IMAGE-ENABLED CLOTHING

      
Application Number 18821006
Status Pending
Filing Date 2024-08-30
First Publication Date 2024-12-19
Owner Kyndryl, Inc. (USA)
Inventor
  • Childress, Rhonda L.
  • Daley, Stan Kevin
  • Fox, Jeremy R.
  • Bender, Michael

Abstract

Systems and methods provide dynamic adjustment of content displayed on image-enabled clothing articles to address obstructed visibility of the content. In embodiments a method includes determining, by a computing device, movement of at least a portion of an image-enabled clothing article based on real-time sensor data from sensors of the image-enabled clothing article; determining, by the computing device, that a view of at least a portion of image content displayed on the image-enabled clothing article is obstructed based on the determined movement, parameters of the image-enabled clothing article and image display information of the image-enabled clothing article; and generating, by the computing device, image instructions that cause the display of the image content on the image-enabled clothing article to move from a first area of the image-enabled clothing article to a second area of the image-enabled clothing article.

IPC Classes  ?

  • G09G 3/32 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes for presentation of an assembly of a number of characters, e.g. a page, by composing the assembly by combination of individual elements arranged in a matrix using controlled light sources using electroluminescent panels semiconductive, e.g. using light-emitting diodes [LED]
  • A41D 27/08 - TrimmingsOrnaments

32.

SOFTWARE APPLICATION CONTAINER HOSTING

      
Application Number 18820553
Status Pending
Filing Date 2024-08-30
First Publication Date 2024-12-19
Owner Kyndryl, Inc. (USA)
Inventor
  • Monteiro Vieira, Igor
  • Mota Monhaes, Marcelo
  • Bianchi, Thiago
  • Da Silva, Suellen Caroline

Abstract

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining target application container configuration data to identify one or more target container base image referenced in the target application container configuration: subjecting script data associated to the one or more target container base image to text based processing for evaluation of security risk associated to the one or more container base image, the script data obtained from at least one candidate hosting computing environment; and selecting a hosting computing environment from the at least one computing environment for hosting the target application container, the selecting in dependence on the text based processing.

IPC Classes  ?

  • G06F 8/61 - Installation
  • G06F 8/41 - Compilation
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 16/903 - Querying
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

33.

ADVANCED DETERRENCE FOR BOTS IN AN INTERACTIVE COMMUNICATION ENVIRONMENT

      
Application Number 18330627
Status Pending
Filing Date 2023-06-07
First Publication Date 2024-12-12
Owner Kyndryl, Inc. (USA)
Inventor
  • Bravo, Cesar
  • Bode, Christopher Collins

Abstract

Embodiments relate to providing an advanced deterrence system for bots in an interactive communication environment. In response to identifying that an automated program for a user terminal is accessing an interactive communication environment hosted by a host computer system, a selection of an assignment for the automated program is triggered, where the automated program is designed to replicate a human behavior in the interactive communication environment. In response to triggering the selection, a task is selected as the assignment for the automated program designed to replicate the human behavior, the task being selected from a plurality of tasks that are queued to be executed by the host computer system. The task is caused to be executed by the automated program on the user terminal, the task causing a consumption of user computer resources on the user terminal.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/31 - User authentication
  • G06F 21/60 - Protecting data

34.

Self-learning automated information technology change risk prediction

      
Application Number 18331361
Grant Number 12294503
Status In Force
Filing Date 2023-06-08
First Publication Date 2024-12-12
Grant Date 2025-05-06
Owner Kyndryl, Inc. (USA)
Inventor
  • Ayachitula, Arun A.
  • Khandekar, Rohit
  • Sharma, Upendra

Abstract

Embodiments relate to providing self-learning automated information technology change risk prediction. A processor inputs a change request to a first machine learning model, the first machine learning model determining at least one word pair in the change request, the change request being a modification in an IT environment. The processor classifies the at least one word pair into a change category for the IT environment using a second machine learning model, the change category identifying a type of the modification to be executed in the IT environment. The processor determines a likelihood of causing a problem in the IT environment as a result of executing the modification. The processor automatically performs an action to prevent the modification of the change request in the IT environment.

IPC Classes  ?

  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
  • H04L 41/0866 - Checking the configuration

35.

SELF-LEARNING AUTOMATED INFORMATION TECHNOLOGY CHANGE RISK PREDICTION

      
Application Number EP2023071905
Publication Number 2024/251381
Status In Force
Filing Date 2023-08-08
Publication Date 2024-12-12
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Ayachitula, Naga
  • Khandekar, Rohit
  • Sharma, Upendra

Abstract

Embodiments relate to providing self-learning automated information technology change risk prediction. A processor inputs a change request to a first machine learning model, the first machine learning model determining at least one word pair in the change request, the change request being a modification in an IT environment. The processor classifies the at least one word pair into a change category for the IT environment using a second machine learning model, the change category identifying a type of the modification to be executed in the IT environment. The processor determines a likelihood of causing a problem in the IT environment as a result of executing the modification. The processor automatically performs an action to prevent the modification of the change request in the IT environment.

IPC Classes  ?

36.

UNSTRUCTURED DATA ACCESS CONTROL

      
Application Number 18813799
Status Pending
Filing Date 2024-08-23
First Publication Date 2024-12-12
Owner Kyndryl, Inc. (USA)
Inventor
  • Rallapalli, Murthy
  • Denman, Jerry Michael
  • Attaluri, Prabhakar

Abstract

A method for protecting individual data elements within an unstructured dataset includes identifying a data element within the unstructured dataset requiring access control, encrypting the data element within the unstructured dataset, storing a decryption key and access control information corresponding to the dataset at an access controller, and cryptographically binding the encrypted data element to metadata that identifies the access controller. The method may additionally include detecting an access attempt to the dataset, and determining whether the access attempt is acceptable according to the access control information. If the access attempt is acceptable, the method may further include allowing the access attempt. If the access attempt is not acceptable, the method may further include denying the access attempt.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 16/38 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
  • G06F 21/31 - User authentication
  • G06F 21/60 - Protecting data

37.

Dynamic creation of temporary isolated environment in an interactive communication environment

      
Application Number 18330620
Grant Number 12277215
Status In Force
Filing Date 2023-06-07
First Publication Date 2024-12-12
Grant Date 2025-04-15
Owner Kyndryl, Inc. (USA)
Inventor
  • Bravo, Cesar
  • Bode, Christopher Collins

Abstract

Embodiments relate to dynamic creating a temporary isolated environment in an interactive communication environment for potential bots. In response to identifying that an avatar accessing the interactive communication environment is being controlled by a non-human entity, the avatar is dynamically placed in an isolated virtual environment. Permission of the avatar are disabled in the isolated virtual environment. An authentication inquiry is presented to the avatar identified as being controlled by the non-human entity. A location is transferred for the avatar identified as being controlled by the non-human entity, based on a user response to the authentication inquiry.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • H04L 9/40 - Network security protocols

38.

kyndryl bridge

      
Application Number 1826117
Status Registered
Filing Date 2024-10-01
Registration Date 2024-10-01
Owner Kyndryl, Inc. (USA)
NICE Classes  ?
  • 35 - Advertising and business services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Provision of sales areas for buyers and sellers of products and services in the field of information technology services (commercial intermediation services); provision of online sales areas for buyers and sellers of products and services in the field of information technology (commercial intermediation services). Information technology support services, namely, remote and on-site infrastructure management services for the monitoring, optimization, administration and management of computer systems; computer system integration services; integration of computer systems and networks; platforms as a service (PaaS) comprising a software platform for orchestrating the design, selection, implementation, delivery, management and use of products and services in the field of information technology; infrastructure as a service (IaaS) featuring a software platform for orchestrating the design, selection, implementation, delivery, management and use of products and services in the field of information technology; providing non-downloadable software of a software platform for orchestrating the design, selection, implementation, delivery, management and use of products and services in the field of information technology.

39.

COMPUTERIZED DATA AGGREGATION

      
Application Number 18325327
Status Pending
Filing Date 2023-05-30
First Publication Date 2024-12-05
Owner Kyndryl, Inc. (USA)
Inventor
  • Iyer, Balamukundan G.
  • Hegde, Vinay Kumar Gajanana
  • Odibat, Omar

Abstract

Disclosed embodiments provide computer-implemented techniques for aggregating of data involving multiple domains in the format of a news bulletin or “newsletter” format. For various situations, this format can provide a quicker and more comprehensive understanding than is achievable with a visual dashboard. In disclosed embodiments, multiple domains are specified, where each domain can include a subject or category. One category is selected as a major domain. Other categories, referred to as satellite domains are also specified. A user provides scores that indicate the semantic importance of each satellite domain. A mathematical distance between each satellite domain and the major domain is computed based on the scores. Based on the mathematical distances, percentages of articles pertaining to each domain are computed, and used in assembling customized data that is output in a news bulletin format.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 40/40 - Processing or translation of natural language

40.

GATHERING UNIVERSAL SERIAL BUS THREAT INTELLIGENCE

      
Application Number 18784334
Status Pending
Filing Date 2024-07-25
First Publication Date 2024-11-14
Owner Kyndryl, Inc. (USA)
Inventor Rodriguez Bravo, Cesar Augusto

Abstract

A method includes: detecting, by a computing device, connection of a universal serial bus device to a computer; determining, by the computing device, that the computer is in a locked mode; detecting, by the computer device, input to the computer within a predetermined time of detecting the connection; determining, by the computing device as a result of the computer being locked and detecting the input, that the input is a threat to the computer; creating, by the computing device, a temporary virtual environment; receiving, by the computing device, the input into the temporary virtual environment; processing, by the computing device, the input in the temporary virtual environment; and recording, by the computing device, information related to the input.

IPC Classes  ?

  • G06F 21/82 - Protecting input, output or interconnection devices
  • G06F 13/38 - Information transfer, e.g. on bus
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

41.

SOCIAL MEDIA REPRESENTATION AND COLLABORATION PLATFORM FOR ENTERPRISE IT

      
Application Number 18669776
Status Pending
Filing Date 2024-05-21
First Publication Date 2024-11-14
Owner Kyndryl, Inc. (USA)
Inventor
  • ., Rajmohan
  • Thayyil, Rajeev
  • Dey, Kuntal
  • Vadayadiyil Raveendran, Pramod

Abstract

A system and associated methods that enable social media representation and collaboration platform of enterprise information technology (IT) components that enables human-to-human, human-to-machine and machine-to-machine communications to help easily understand the set of enterprise IT components, its configuration(s), its intra/inter relationship(s), better navigation and visibility across various related components, and augmenting system troubleshooting.

IPC Classes  ?

  • G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
  • G06F 16/9536 - Search customisation based on social or collaborative filtering
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
  • G06Q 10/101 - Collaborative creation, e.g. joint development of products or services
  • G06Q 10/20 - Administration of product repair or maintenance
  • G06V 10/40 - Extraction of image or video features
  • G06V 30/10 - Character recognition
  • H04L 9/40 - Network security protocols
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/14 - Network analysis or design

42.

PERSONALIZED PASSWORD PROMPTING SYSTEM

      
Application Number 18778103
Status Pending
Filing Date 2024-07-19
First Publication Date 2024-11-07
Owner Kyndryl, Inc. (USA)
Inventor
  • Dixit, Archana
  • Mahamuni, Amol Bhaskar

Abstract

A processor may receive authentication data related to inputs of a user to predetermined authentication prompts. The processor may select devices from a set of registered devices to use for providing a first password prompt to the user. The processor may identify one or more output formats for each of the selected devices. The processor may generate a first password prompt having two or more password prompt components, where each password prompt component has an output format. The processor may send the two or more password prompt components to respective selected devices.

IPC Classes  ?

  • G06F 21/45 - Structures or tools for the administration of authentication
  • G06F 21/31 - User authentication

43.

DYNAMICALLY ASSIGNING STORAGE OBJECTS TO COMPARTMENT CONSTRUCTS OF A STORAGE SYSTEM TO REDUCE APPLICATION RISK

      
Application Number 18760950
Status Pending
Filing Date 2024-07-01
First Publication Date 2024-10-24
Owner Kyndryl, Inc. (USA)
Inventor
  • Narigapalli, Anil Kumar
  • Nanduru, Laxmikantha Sai
  • Arora, Pritpal S.
  • Olson, James E.
  • Chitti, Mark Vincent

Abstract

A computer-implemented method, according to one embodiment, includes mapping hosts in communication with a storage system to compartment constructs that are logical partitions of the storage system, analyzing interoperability of the hosts and the compartment constructs and defining, based on the analysis, risk profiles for applications run on the hosts. Ownership of storage objects to the compartment constructs is assigned based on the risk profiles, where each of the storage objects define a logical partition of one of the hosts and a logical partition of a storage volume of the storage system.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

44.

COMPUTING A HIERARCHY OF CLASS LABELS FOR HIERARCHICAL MULTI-LABEL CLASSIFICATION

      
Application Number 18138582
Status Pending
Filing Date 2023-04-24
First Publication Date 2024-10-24
Owner Kyndryl, Inc. (USA)
Inventor
  • Jacob, Glincy Mary
  • Odibat, Omar

Abstract

A computer-implemented method, in accordance with one embodiment, includes collecting attributes of a subject. Cause-effect-decision relationships of the attributes of the subject are determined. Custom attributes are derived based on the cause-effect-decision relationships of the attributes of the subject. Custom attribute relationships and labels for the derived custom attributes of the subject are identified based on the cause-effect-decision relationships of the attributes of the subject, the custom attribute relationships including at least one belongs-to relationship and at least one decision relationship. A hierarchy of the custom attributes is generated using a finite state automaton. A hierarchical multi-label classifier is created (e.g., trained) based on the generated hierarchy. The classifier is used to generate class label decisions associated with labels of the classifier to objects of the subject. The decisions are output.

IPC Classes  ?

45.

SELECTIVE OBFUSCATION OF LIVE RESOURCES IN A METAVERSE ENVIRONMENT

      
Application Number 18134157
Status Pending
Filing Date 2023-04-13
First Publication Date 2024-10-17
Owner Kyndryl, Inc. (USA)
Inventor Bravo, Cesar

Abstract

A computer-implemented method, according to one embodiment, includes gathering sharing policies associated with a first user sharing a live resource in a metaverse, and determining characteristics of a second user in the metaverse. The method further includes determining, based on the sharing policies and the characteristics of the second user, whether the second user is authorized to view the live resource shared by the first user. In response to a determination that the second user is not authorized to view the live resource, a first predetermined obfuscation condition is caused to be applied to the second user's view of the live resource for protecting the first user's privacy. Furthermore, in response to a determination that the second user is authorized to view the live resource, the second user is allowed to view the live resource.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

46.

EXPLAINABLE CLASSIFICATIONS WITH ABSTENTION USING CLIENT AGNOSTIC MACHINE LEARNING MODELS

      
Application Number 18300688
Status Pending
Filing Date 2023-04-14
First Publication Date 2024-10-17
Owner Kyndryl, Inc. (USA)
Inventor
  • Ayachitula, Arun A.
  • Khandekar, Rohit
  • Sharma, Upendra

Abstract

Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes inputting, by a processor, records to a machine learning model, the records being associated with an information technology (IT) domain. The technique includes classifying, by the processor, the records with labels using the machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of the IT domain.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 40/40 - Processing or translation of natural language

47.

EXPLAINABLE CLASSIFICATIONS WITH ABSTENTION USING CLIENT AGNOSTIC MACHINE LEARNING MODELS

      
Application Number EP2023063772
Publication Number 2024/213269
Status In Force
Filing Date 2023-05-23
Publication Date 2024-10-17
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Ayachitula, Arun
  • Khandekar, Rohit
  • Sharma, Upendra

Abstract

Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes inputting, by a processor, records to a machine learning model, the records being associated with an information technology (IT) domain. The technique includes classifying, by the processor, the records with labels using the machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of the IT domain.

IPC Classes  ?

  • G06N 5/045 - Explanation of inferenceExplainable artificial intelligence [XAI]Interpretable artificial intelligence
  • G06N 20/00 - Machine learning
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G05B 23/02 - Electric testing or monitoring
  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

48.

EXPLAINABLE CLASSIFICATIONS WITH ABSTENTION USING CLIENT AGNOSTIC MACHINE LEARNING MODELS

      
Application Number EP2023063778
Publication Number 2024/213270
Status In Force
Filing Date 2023-05-23
Publication Date 2024-10-17
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Ayachitula, Arun
  • Rohit, Rohit
  • Sharma, Upendra

Abstract

Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes classifying, by a processor, a record with a label using a machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of an information technology (IT) domain. The processor generates an explanation of a decision by the machine learning model to classify the record with the label and displays the explanation in a human readable form.

IPC Classes  ?

  • G06N 5/045 - Explanation of inferenceExplainable artificial intelligence [XAI]Interpretable artificial intelligence
  • G06N 20/00 - Machine learning
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G05B 23/02 - Electric testing or monitoring
  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06Q 10/20 - Administration of product repair or maintenance

49.

SECURITY FOR CONNECTED DEVICES

      
Application Number 18756072
Status Pending
Filing Date 2024-06-27
First Publication Date 2024-10-17
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Toska, Desilda
  • Flores, Romelia H.

Abstract

A method includes: receiving, by a computer device and from an automated teller machine, a personal identification number that is associated with an account; determining, by the computer device, that the personal identification number is a disablement personal identification number that is associated with the account, the account having an activation personal identification number, the disablement personal identification number and the activation personal identification number being different; determining, by the computer device and as a result of receiving the disablement personal identification number, at least one disablement action to be performed by a device other than the automated teller machine; and transmitting, by the computer device, a command to perform the disablement action.

IPC Classes  ?

  • G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems

50.

DETERMINATION AND APPLICATION OF CONFIDENCE SCORES TO MITIGATE FRAUDULENT ACCOUNTS

      
Application Number 18133397
Status Pending
Filing Date 2023-04-11
First Publication Date 2024-10-17
Owner Kyndryl, Inc. (USA)
Inventor
  • Bravo, Cesar
  • Odibat, Omar

Abstract

A computer-implemented method, according to one embodiment, includes receiving, from a user device, a request for determining a final confidence score for an account, and determining a plurality of confidence parameter scores using information associated with the account. A first of the confidence parameter scores is determined based on an analysis of a structure of the account, a second of the confidence parameter scores is determined based on a character analysis of at least the account, and a third of the confidence parameter scores is determined based on an exposure of the account. The method further includes using the determined confidence parameter scores to determine the final confidence score for the account. The determined final confidence score is applied to mitigate fraud.

IPC Classes  ?

51.

BOT DETECTION SYSTEM

      
Application Number 18298921
Status Pending
Filing Date 2023-04-11
First Publication Date 2024-10-17
Owner Kyndryl, Inc. (USA)
Inventor Bravo, Cesar

Abstract

Aspects of the present disclosure include: detecting, by a computing device, an avatar is chatting within a virtual environment; detecting, by the computing device, the avatar is idle for a predetermined amount of time; providing, by the computer device, a challenge to the idled avatar, determining, by the computer device, that the challenge has not been executed; and executing, by the computer device, a security action associated with the idled avatar.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06T 19/00 - Manipulating 3D models or images for computer graphics

52.

EXPLAINABLE CLASSIFICATIONS WITH ABSTENTION USING CLIENT AGNOSTIC MACHINE LEARNING MODELS

      
Application Number 18300699
Status Pending
Filing Date 2023-04-14
First Publication Date 2024-10-17
Owner Kyndryl, Inc. (USA)
Inventor
  • Ayachitula, Arun A.
  • Khandekar, Rohit
  • Sharma, Upendra

Abstract

Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes classifying, by a processor, a record with a label using a machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of an information technology (IT) domain. The processor generates an explanation of a decision by the machine learning model to classify the record with the label and displays the explanation in a human readable form.

IPC Classes  ?

53.

RISK MITIGATION IN SERVICE LEVEL AGREEMENTS

      
Application Number 18748183
Status Pending
Filing Date 2024-06-20
First Publication Date 2024-10-10
Owner Kyndryl, Inc. (USA)
Inventor
  • Nanduru, Laxmikantha Sai
  • Kapasi, Jigar
  • Arora, Pritpal S.
  • Duraisamy, Sathis Kumar

Abstract

A method of mitigating risks in a service level agreement (SLA), including: identifying relationships between an infrastructure and an application associated with the SLA; identifying changes to a technological environment of the SLA based on collected data associated with the SLA and the identified relationships, the collected data including the infrastructure and the application; establishing a baseline for a service level objective (SLO) of the SLA by analyzing the collected data of the infrastructure and the application; determining risk impact to the SLA based on an assessment of requirements to the SLO and the changes to the technological environment of the SLA; generating a solution option for the SLA by applying an explainable artificial intelligence (XAI) model based on processing the risk impact with the baseline in the XAI model; and updating the SLA based on the solution option.

IPC Classes  ?

  • H04L 41/5006 - Creating or negotiating SLA contracts, guarantees or penalties
  • H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]

54.

AI DRIVEN IMPACT ESTIMATION OF NEW PRODUCT FEATURES

      
Application Number 18297127
Status Pending
Filing Date 2023-04-07
First Publication Date 2024-10-10
Owner KYNDRYL, INC. (USA)
Inventor
  • Chintakunta, Mouleswara Reddy
  • Mitruka, Manish
  • Bandaru, Anand
  • Odibat, Omar

Abstract

A method for product release estimates a ROI of a new product feature of a product. The method identifies a product component which undergoes change with weightage responsive to epic details and non-functional requirements. The method classifies a component action to provide an action classification. The method calculates an effort to create the new feature responsive to the action and a complexity classification determined from at least the weightage. The method calculates an interval of effort to produce the new product feature responsive to the effort and similar epic matches relating to the new product feature. The method calculates an estimated public release time of the new feature responsive to the similar epic matches relating to the new feature. The method generates and follows a schedule responsive to the effort, the interval of effort, the estimated public release time, and the ROI to make the product having the new feature.

IPC Classes  ?

  • G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals

55.

KEYPAD SECURITY

      
Application Number 18736772
Status Pending
Filing Date 2024-06-07
First Publication Date 2024-10-03
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Garcia Delgado, Carolina
  • Campos Batista, David Alonso
  • Toska, Desilda

Abstract

A method for detecting a fake keypad includes: monitoring outputs of plural magnetic field sensors connected to a keypad; detecting the output of at least one of the magnetic field sensors indicates the presence of a magnetic field; starting, in response to the detecting, a timer; determining the first timer reaches a first threshold while the output of the at least one of the magnetic field sensors still indicates the presence of a magnetic field; in response to the timer reaching the first threshold, determining a number of the magnetic field sensors whose output indicates the presence of a magnetic field equals or exceeds a second threshold; in response to the number of the magnetic field sensors equaling or exceeding the second threshold, determining a security action; and initiating the security action.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

56.

Computation, prediction, and use of vandalism scores

      
Application Number 18127963
Grant Number 12111855
Status In Force
Filing Date 2023-03-29
First Publication Date 2024-10-03
Grant Date 2024-10-08
Owner Kyndryl, Inc. (USA)
Inventor
  • Dixit, Archana
  • Mahamuni, Amol Bhaskar
  • K, Kiran Kumar
  • Sondkar, Mahesh

Abstract

A computer-implemented method, in accordance with one embodiment, includes collecting data from a plurality of predefined functional areas in a particular geographical area in which a plurality of physical objects are located, at least some of the data relating to vandalism. Wrangling is performed on the data to correlate the data from the functional areas with respective ones of the physical objects. The wrangled data corresponding to each of the physical objects is transformed into features corresponding to a the functional areas. For each of the physical objects, the features are processed according to predefined rules for generating a rank for each of the functional areas. Dynamic weights are computed for at least some of the features to account for data drift by comparing historical data with latest data. The ranks and dynamic weights are transformed into a vandalism score for each of the physical objects, which is output.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/2457 - Query processing with adaptation to user needs
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/29 - Geographical information databases

57.

SECURE NETWORK IDENTIFICATION FOR ACTIVE SCANNING DEVICE

      
Application Number 18130102
Status Pending
Filing Date 2023-04-03
First Publication Date 2024-10-03
Owner Kyndryl, Inc. (USA)
Inventor
  • Bravo, Cesar
  • Campos Batista, David Alonso

Abstract

An example operation may include one or more of storing a hash of a service set identifier (SSID) of a wireless network via an apparatus, receiving a probe request message transmitted from a network device, wherein the probe request message comprises a hash value, determining that the hash value within the probe request is a valid SSID based on the hash of the SSID of the wireless network stored in the storage device, and controlling the network interface to transmit a probe response with a plain text name of the SSID to the network device in response to the determination.

IPC Classes  ?

  • H04W 48/14 - Access restriction or access information delivery, e.g. discovery data delivery using user query
  • H04W 48/16 - DiscoveringProcessing access restriction or access information

58.

INPUT/OUTPUT INTERFACE SECURITY

      
Application Number 18678004
Status Pending
Filing Date 2024-05-30
First Publication Date 2024-09-26
Owner Kyndryl, Inc. (USA)
Inventor Rodriguez Bravo, Cesar Augusto

Abstract

Methods, computer program products, and systems are presented. The Methods, computer program products, and systems can include, for example: examining hardware device transmitted data received through an I/O interface port of a computer system; determining in dependence on the examining whether the hardware device transmitted data received through the I/O interface port of the computer system satisfies a criterion; and in response to determining that the hardware device transmitted data received through the I/O interface port of the computer system satisfies the criterion, initiating a security process for protecting the computer system.

IPC Classes  ?

  • G06F 21/85 - Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/81 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations

59.

SELF-LEARNING AND ADAPTING CYBER THREAT DEFENSE

      
Application Number 18678415
Status Pending
Filing Date 2024-05-30
First Publication Date 2024-09-26
Owner Kyndryl, Inc. (USA)
Inventor
  • Scheideler, Tim Uwe
  • Udupi Raghavendra, Arjun
  • Seul, Matthias
  • Giovannini, Andrea

Abstract

The exemplary embodiments disclose a method, a computer system, and a computer program product for detecting malware. The exemplary embodiments may include aggregating known malware patterns by storing malware patterns and related malware categories of the malware patterns. The exemplary embodiments may additionally include training a first machine-learning system, comprising a generator portion and a discriminator portion, by using the known malware patterns and the related malware categories as training data. The exemplary embodiments may also include generating additional synthetic code patterns by feeding random code samples to the trained first machine-learning system. The exemplary embodiments may further include training a second machine-learning system by using benevolent code patterns and the generated additional synthetic code patterns as training data. The exemplary embodiments may include determining a statistical distribution of predicted malicious code patterns and related categories, and determining a quality value of the training of the second machine-learning system.

IPC Classes  ?

  • G06N 3/088 - Non-supervised learning, e.g. competitive learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/045 - Combinations of networks

60.

AUTOMATIC CURATION OF CHATS IN VIRTUAL REALITY

      
Application Number 18186249
Status Pending
Filing Date 2023-03-20
First Publication Date 2024-09-26
Owner Kyndryl, Inc. (USA)
Inventor Bravo, Cesar

Abstract

Embodiments relate to providing automatic curation of chats in virtual reality. A technique includes determining, using a machine learning model, that consecutive segmented messages combine to form a complete message, the consecutive segmented messages being from a virtual environment. The technique includes determining that the complete message violates a security rule and performing a security action that affects a display of the consecutive segmented messages forming the complete message.

IPC Classes  ?

  • H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 40/20 - Natural language analysis

61.

SEGMENTING DATA ACCORDING TO DATA ACCESS PRIVILEGE GRANTS DURING STORAGE OF THE DATA IN A DATABASE

      
Application Number 18122036
Status Pending
Filing Date 2023-03-15
First Publication Date 2024-09-19
Owner Kyndryl, Inc. (USA)
Inventor
  • M, Nalini
  • Krishnamurthy, Viswanatha
  • Perumal Thevar, Muniyandi
  • Bushetti, Veeresh

Abstract

A computer-implemented method, according to one embodiment, includes causing a trained artificial intelligence (AI) model to derive data access privilege grants before data is stored in a predetermined database, and segmenting the data according to the data access privilege grants during storage of the data in the predetermined database. Metadata that defines the data access privilege grants is stored with the segments of data. The method further includes receiving, from a first user device, a query requesting data stored in the predetermined database. At least some of the metadata is read to identify a segment of the data associated with a data access privilege grant associated with the query. The method further includes allowing the first user device to access the identified segment of data for fulfilling the query.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/60 - Protecting data

62.

SOFTWARE APPLICATION DEPLOYMENT

      
Application Number 18669934
Status Pending
Filing Date 2024-05-21
First Publication Date 2024-09-19
Owner Kyndryl, Inc. (USA)
Inventor
  • Tripathi, Dinesh
  • Thayyilsubramanian, Sarin Kumar
  • Kurian, John
  • Palakodeti, Ramesh S.

Abstract

Methods, computer program products, and systems can include obtaining a first computing environment specific application deployment software code instance associated to a first computing environment, the first computing environment specific application deployment software code instance for deployment of a certain application on the first computing environment; parsing the first computing environment specific application deployment software code instance, wherein the parsing includes determining attributes of the first computing environment specific application deployment software code instance and generating, using the determined attributes of the first computing environment specific application deployment software code instance, a computing environment agnostic semantic tree data structure that expresses a workflow pattern for deployment of the certain application; and composing, with use of the computing environment agnostic semantic tree data structure, a second computing environment specific application deployment software code instance associated to a second computing environment for deployment of the certain application on the second computing environment.

IPC Classes  ?

63.

Code change request management and human gate free deployment based on data collected from a development system

      
Application Number 18122053
Grant Number 12182567
Status In Force
Filing Date 2023-03-15
First Publication Date 2024-09-19
Grant Date 2024-12-31
Owner Kyndryl, Inc. (USA)
Inventor
  • M, Nalini
  • Sharma, Kalpesh
  • Holla, Prasanna
  • Bushetti, Veeresh

Abstract

A computer-implemented method, in accordance with one aspect of the present invention, includes collecting data existing in a development system that relates to the code change request, in response to receiving a code change request to merge new code with existing code. Factors from the collected data are computed for assessing a risk of promoting the new code, the factors including at least: a developer information factor, a developer availability factor, and an environment health analysis factor. The factors are processed to compute a confidence score for the code change request. If the confidence score is in a first predefined range, the new code corresponding to the code change request is promoted for merging with the existing code, without human intervention. If the confidence score is in a second predefined range, an indication that human intervention is needed before promoting the code is output.

IPC Classes  ?

  • G06F 8/77 - Software metrics
  • G06F 8/72 - Code refactoring
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

64.

BOT DETECTION IN A VIRTUAL DIGITAL ENVIRONMENT

      
Application Number 18180259
Status Pending
Filing Date 2023-03-08
First Publication Date 2024-09-12
Owner Kyndryl, Inc. (USA)
Inventor Rodriguez Bravo, Cesar

Abstract

Disclosed embodiments provide bot detection in a virtual environment that is based on avatar motion. The motion of an avatar within a virtual environment such as a metaverse is tracked. The tracked motion is separated into multiple movement segments. The movement segments are compared to a collection of movement patterns in a movement pattern database that are indicative of bots. A similarity metric is determined between the tracked motion and the database of bot motions. In response to the similarity metric exceeding a predetermined threshold, a list of at least one mitigation action is obtained, and the at least one mitigation action in the list is executed, thereby mitigating the adverse effects of bots in a virtual digital environment.

IPC Classes  ?

65.

TOUCH ANALYTICS-DRIVEN BUYING PATTERN DETECTION SYSTEM FOR BEHAVIORAL CAUSAL ANALYSIS

      
Application Number 18117972
Status Pending
Filing Date 2023-03-06
First Publication Date 2024-09-12
Owner Kyndryl, Inc. (USA)
Inventor
  • Arora, Pritpal S.
  • Chintakunta, Mouleswara Reddy

Abstract

A computer-implemented method, in accordance with one embodiment, includes collecting touch data from one or more touch sensors coupled to a first product, the one or more touch sensors being configured to indicate when a human touches the one or more touch sensors and/or first product. Product vector information about the first product is received. Classification on the touch data and product vector information is performed using a hierarchical multilabel classification system for assigning the touch data to predefined patterns for each level of a classifier used by the hierarchical multilabel classification system. Features of a second product, e.g., a touch vector and a touch pattern, are transformed into a second feature vector. A featurewise difference detection is performed on the feature vectors to calculate a difference in distribution for features of the products to generate and output a caption indicative of the differences between the products.

IPC Classes  ?

66.

CLOUD DATA REPLICATION

      
Application Number 18181930
Status Pending
Filing Date 2023-03-10
First Publication Date 2024-09-12
Owner Kyndryl, Inc. (USA)
Inventor
  • Aradhya, Aradhya A.
  • Goyal, Sudiksha
  • Bansal, Geetika
  • Sriramula, Rajashekar
  • Panjani, Venkat K.
  • Kannan, Agilandeswari

Abstract

A computer-implemented method includes: generating, by the computing device, a plurality of data blocks for a received block size; sharing, by the computing device, a time based universally unique identifier (UUID) for a first data block of the data blocks and an incremental time interval between each data block of the data blocks; finding, by the computing device, a time based UUID which corresponds with the requested data block; and sending, by the computing device, the time based UUID to a cloud site, the time based UUID corresponding with the requested data block.

IPC Classes  ?

  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
  • G06F 16/29 - Geographical information databases

67.

CONTEXTUAL ITEM DISCOVERY AND PATTERN INCULCATED REMINDER MECHANISM

      
Application Number 18663511
Status Pending
Filing Date 2024-05-14
First Publication Date 2024-09-12
Owner Kyndryl, Inc. (USA)
Inventor
  • Patel, Pritesh
  • Kwatra, Shikhar
  • Kundu, Amitava
  • Perepa, Sujatha B.

Abstract

Aspects of the present disclosure relate generally to reminder systems and, more particularly, to a contextual item discovery and pattern inculcated reminder mechanism and methods of use. A computer-implemented method includes: determining, by a computing device, an event in which a user will participate; associating, by the computing device, one or more items with the event; determining a location of the one or more items associated with the event including that the user does not possess any combination of the one or more items; and providing an alert to the user that the any of the one or more items associated with the event is not in the possession of the user.

IPC Classes  ?

68.

PHYSICAL AND VIRTUAL ENVIRONMENT SYNCHRONIZATION

      
Application Number 18663743
Status Pending
Filing Date 2024-05-14
First Publication Date 2024-09-12
Owner Kyndryl, Inc. (USA)
Inventor
  • Whitman, Todd Russell
  • Silverstein, Zachary A.
  • Fox, Jeremy R.
  • Rakshit, Sarbajit K.

Abstract

Systems and methods synchronize content of a virtual environment with a state of a physical environment. In aspects, a method includes obtaining sensor data from a network of remote sensors measuring a physical state of a location at a time; generating context specific parameter data based on the sensor data; obtaining context data from a remote virtual reality (VR) system, wherein the context data reflects a current state of virtual content in a virtual environment displayed by the remote VR system; selecting virtual content to be displayed in the virtual environment by the remote VR system based on the context specific parameter data, the context data, and rules; and sending the virtual content to the remote VR system to be displayed to a user, wherein the virtual content reflects a state of the physical location at the time.

IPC Classes  ?

  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G06V 20/20 - ScenesScene-specific elements in augmented reality scenes
  • H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information

69.

Crowd sourced data restores

      
Application Number 18133815
Grant Number 12072772
Status In Force
Filing Date 2023-04-12
First Publication Date 2024-08-27
Grant Date 2024-08-27
Owner Kyndryl, Inc. (USA)
Inventor
  • Bode, Christopher Collins
  • Formato, Marci Devorah
  • Bravo, Cesar

Abstract

A computer-implemented method includes: receiving, by a computing device, a data restore request; determining, by the computing device, at least one object in response to the data restore request; and querying, by the computing device, a client population to determine at least one client which has resources and network cardinality to assist the data restore request. The at least one client creates a distributed and crowd sourced cache of objects for the data restore request.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level

70.

RECRUITMENT AUGMENTATION WITH DIGITAL FOOTPRINT UTILIZATION

      
Application Number 18110492
Status Pending
Filing Date 2023-02-16
First Publication Date 2024-08-22
Owner Kyndryl, Inc. (USA)
Inventor
  • Sahayaraj, Sanjana
  • Kesavan, Balakrishna Saravanan
  • Kumar S G, Khanij

Abstract

A method including: identify candidate pool resources by analyzing a job description; posting the job description at the candidate pool resources; identifying candidates from the candidate pool resources; determining a candidate score of each of the candidates based on an identified candidate information source; and selecting a set of the candidates based on the candidate score.

IPC Classes  ?

  • G06Q 10/1053 - Employment or hiring
  • G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism

71.

SYSTEM AND METHOD FOR HANDLING COMPRESSED CRITICAL FILES

      
Application Number EP2023063118
Publication Number 2024/170104
Status In Force
Filing Date 2023-05-16
Publication Date 2024-08-22
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Akula, Ravinder
  • Murugesan, Jeevabharathy
  • Dhandapani, Karthikrajkumar
  • Zolotow, Clea

Abstract

A computer-implemented method includes: monitoring, by a computing device, a data set format of all files in a computing system to determine a list of data sets in a first format which are accessed greater than a predetermined number of times; gathering, by the computing device, the list of data sets in the first format within the computing system; and converting, by the computing device, the list of data sets in the first format within the computing system to a second format which is different from the first format.

IPC Classes  ?

  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems

72.

GENERATION OF REQUIREMENTS AND WEIGHTAGE SCORES BASED ON A POLICY CONFIGURATION

      
Application Number 18111371
Status Pending
Filing Date 2023-02-17
First Publication Date 2024-08-22
Owner Kyndryl, Inc. (USA)
Inventor
  • Chandra, Avinash
  • Bushetti, Veeresh
  • Venkitachalam, Hariharan N.
  • Sharma, Kalpesh

Abstract

In one general embodiment, a computer-implemented method includes collecting information relating at least to market trends and problem ticketing. The collected information is stored in a knowledge repository. At least some of the collected information is processed to compute weightage scores for requirements specified in a policy configuration. A list comprising at least some of the requirements and indications of the weightage scores corresponding thereto is generated and output.

IPC Classes  ?

  • G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
  • G06Q 30/0202 - Market predictions or forecasting for commercial activities

73.

SERVICE HEALTH ASSESSMENT

      
Application Number 18112416
Status Pending
Filing Date 2023-02-21
First Publication Date 2024-08-22
Owner Kyndryl, Inc. (USA)
Inventor
  • Sharma, Kalpesh
  • Perumal Thevar, Muniyandi
  • Tongia, Shaleen
  • M, Nalini

Abstract

A computer-implemented method, in accordance with one embodiment, includes receiving a taxonomy specifying entities of a business service and levels of said entities. Time series data about the entities is collected and stored. Impactor propagation paths between entities is identified. A territory of a health impact of each entity is also identified. A health score for each of the entities, considering impacts on a health of the entity by at least one other entity, is computed based on the data, the propagation paths, and the territories of the entities. At least one of the health scores is output.

IPC Classes  ?

  • H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
  • H04L 43/02 - Capturing of monitoring data

74.

AUTOMATED ARTIFICIAL INTELLIGENCE (AI) INSPECTION OF CUSTOMIZED PART PRODUCTION

      
Application Number 18112574
Status Pending
Filing Date 2023-02-22
First Publication Date 2024-08-22
Owner Kyndryl, Inc. (USA)
Inventor Siddappa, Sheela

Abstract

Aspects of the present disclosure relate generally to machine inspection of part production and, more particularly, to systems and methods of automated Al inspection of customized part production. For example, a computer-implemented method includes receiving, by a processor, design information for a custom part; extracting, by the processor, feature information of the custom part from the design information; receiving, by the processor, images of the custom part in production from a recording in near real time; and verifying, by the processor, using machine learning that features in the images of the custom part in production are in compliance with the feature information of the custom part.

IPC Classes  ?

  • G05B 19/418 - Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
  • G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric

75.

ORCHESTRATION OF A PATTERN-BASED CONFIGURABLE PROCESS SEQUENCE

      
Application Number 18113000
Status Pending
Filing Date 2023-02-22
First Publication Date 2024-08-22
Owner Kyndryl, Inc. (USA)
Inventor Nalam, Kishore Vnts

Abstract

A computer-implemented method, according to one approach, includes causing a predetermined tracker component to create a template tracker file based on a pattern-based configurable process sequence and causing a predetermined logger component to create a log of the pattern-based configurable process sequence. A playbook is generated based on the pattern-based configurable process sequence. The method further includes storing the template tracker file, a file including the log, and the playbook in storage for enabling auditing of the pattern-based configurable process sequence. A computer program product, according to another approach, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computer to cause the computer to perform the foregoing method.

IPC Classes  ?

  • G05B 19/418 - Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]

76.

AUTOMATED CUSTOMIZED MACHINE LEARNING MODEL VALIDATION FLOW

      
Application Number 18108354
Status Pending
Filing Date 2023-02-10
First Publication Date 2024-08-15
Owner Kyndryl, Inc. (USA)
Inventor
  • Devaraj, Divya
  • Sahayaraj, Sanjana
  • Rai, Aastha
  • Odibat, Omar

Abstract

In one aspect, a computer-implemented method includes detecting, by one or more processing devices, custom goals of a specified machine learning application; determining, by the one or more processing devices, relative importance of a plurality of performance categories for the specified machine learning application, based on the custom goals of the specified machine learning application; generating, by the one or more processing devices, automated machine learning model tests based on the determined relative importance of the plurality of performance categories for the specified machine learning application; and performing, by the one or more processing devices, validation testing of the machine learning model based on the automated machine learning model tests.

IPC Classes  ?

77.

HANDLING COMPRESSED CRITICAL FILES

      
Application Number 18110063
Status Pending
Filing Date 2023-02-15
First Publication Date 2024-08-15
Owner Kyndryl, Inc. (USA)
Inventor
  • Akula, Ravinder
  • Murugesan, Jeevabharathy
  • Dhandapani, Karthikrajkumar
  • Zolotow, Clea

Abstract

A computer-implemented method includes: monitoring, by a computing device, a data set format of all files in a computing system to determine a list of data sets in a first format which are accessed greater than a predetermined number of times; gathering, by the computing device, the list of data sets in the first format within the computing system; and converting, by the computing device, the list of data sets in the first format within the computing system to a second format which is different from the first format.

IPC Classes  ?

  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 16/174 - Redundancy elimination performed by the file system

78.

AI CUSTOMIZED MLOPS FRAMEWORK IN A MULTI-TENANT CLOUD ENVIRONMENT

      
Application Number 18110074
Status Pending
Filing Date 2023-02-15
First Publication Date 2024-08-15
Owner Kyndryl, Inc. (USA)
Inventor
  • Odibat, Omar
  • Mohamed Iyoob Umar, Umar
  • Chintakunta, Mouleswara Reddy
  • Mitruka, Manish
  • Guerrero, Gail Camille

Abstract

A computer implemented system, method, and computer program product are disclosed for managing a machine learning model operation (MLOps) for cost forecasting models. The MLOps receives a request for a subscription machine learning (ML) model by a tenant having a corresponding tenant configuration profile and automatically selects a subscription ML model in a model registry based on the tenant configuration profile. The MLOps deploys the selected subscription ML model to the tenant and monitors usage by the tenant of the currently operating ML model at a pre-determined refresh frequency. The MLOps determines whether the currently operating ML model exceeds a pre-determined accuracy threshold, and automatically deploys a second subscription ML model from the model registry to the tenant in place of the currently operating ML model in response to the pre-determined accuracy threshold being exceeded.

IPC Classes  ?

79.

AUGMENTED REALITY ENABLED COMMAND MANAGEMENT

      
Application Number 18637799
Status Pending
Filing Date 2024-04-17
First Publication Date 2024-08-08
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso
  • Rakshit, Sarbajit K.

Abstract

The exemplary embodiments disclose a method, a computer program product, and a computer system for managing user commands. The exemplary embodiments may include a user giving one or more commands to one or more devices, collecting data of the one or more commands, extracting one or more features from the collected data, and determining which one or more of the commands should be executed on which one or more of the devices based on the extracted one or more features and one or more models.

IPC Classes  ?

  • G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
  • G10L 15/02 - Feature extraction for speech recognitionSelection of recognition unit
  • G10L 15/16 - Speech classification or search using artificial neural networks
  • G10L 15/30 - Distributed recognition, e.g. in client-server systems, for mobile phones or network applications
  • G10L 25/30 - Speech or voice analysis techniques not restricted to a single one of groups characterised by the analysis technique using neural networks
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]

80.

CONTINUOUS MAINTENANCE OF MODEL EXPLAINABILITY

      
Application Number 18161191
Status Pending
Filing Date 2023-01-30
First Publication Date 2024-08-01
Owner KYNDRYL, INC. (USA)
Inventor
  • Wheatley, Keri
  • Sahayaraj, Sanjana
  • Odibat, Omar

Abstract

A computer-implemented method for model building with explainability is provided. The method includes receiving, by a hardware processor, a first metric and a second metric of minimum model performance. The first metric relates to data modeling quality and the second metric relates to model to business rule correlations. The method further includes performing, by the hardware processor, auto Artificial Intelligence model generation responsive to training data and a combination of the first and the second metrics of minimum model performance to obtain a model that is trained and meets model prediction accuracy and model prediction explainability requirements represented by the combination of the first and the second metrics of minimum model performance.

IPC Classes  ?

  • G06N 5/022 - Knowledge engineeringKnowledge acquisition

81.

Restoring system functionality when primary maintenance interface is unavailable

      
Application Number 18157358
Grant Number 12088454
Status In Force
Filing Date 2023-01-20
First Publication Date 2024-07-25
Grant Date 2024-09-10
Owner Kyndryl, Inc. (USA)
Inventor
  • Moreira Martins, Allan Douglas
  • Ferreira, Robert Justiniano
  • Lara, Marcos
  • Rodrigues Bastos, Joab
  • Dias Generoso, Tiago

Abstract

An approach for restoring system functionality when a primary maintenance interface is unavailable is provided. In an embodiment, a computer maintenance application that is configured to use a Virtual Telecommunications Access Method (VTAM) interface to connect to a mainframe system is retrieved. A mainframe system is accessed with the computer maintenance application using the VTAM interface. During the access, a maintenance activity is performed on the mainframe system using the computer maintenance application.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery

82.

COST FORECASTING AND MONITORING FOR CLOUD INFRASTRUCTURE

      
Application Number 18157376
Status Pending
Filing Date 2023-01-20
First Publication Date 2024-07-25
Owner Kyndryl, Inc. (USA)
Inventor
  • Odibat, Omar
  • Chintakunta, Mouleswara Reddy
  • Mitruka, Manish
  • Mitchell, Reagan
  • Mohamed Iyoob Umar, Umar
  • Bandaru, Anand
  • Guerrero, Gail Camille
  • Devaraj, Divya

Abstract

Disclosed embodiments provide a computer-implemented method for cloud computing infrastructure cost forecasting. Resource profiles are computed for one or more cloud resources. A scheduled pattern detection process is performed for each of the one or more cloud resources to check for periodic behaviors. A similar consumer detection process is performed for each of the one or more cloud resources to identify other entities that have a similar cloud computing resource usage pattern, which can serve as supervised learning data for neural networks of disclosed embodiments. Data is input to a neural network, where the input data includes the resource profile, an operational maturity score, and/or one or more similar consumer patterns, in order to obtain a cost forecast from the neural network, based on the input data.

IPC Classes  ?

  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"

83.

CONSUMER SERVICES IN AUTONOMOUS VEHICLES

      
Application Number 18099641
Status Pending
Filing Date 2023-01-20
First Publication Date 2024-07-25
Owner Kyndryl, Inc. (USA)
Inventor
  • Rakshit, Sarbajit K.
  • Nanduru, Laxmikantha Sai
  • Arora, Pritpal S.

Abstract

A computer-implemented method includes: advertising, by a computing device, at least one service including information from a learned knowledge base by a service provider vehicle within an autonomous vehicle ecosystem; connecting, by the computing device, the service provider vehicle to a service consumer vehicle within the autonomous vehicle ecosystem through a communication network; and sharing, by the computing device, the at least one service including the information from the learned knowledge base through a connection between the service provider vehicle and the service consumer vehicle using the communication network.

IPC Classes  ?

  • B60W 60/00 - Drive control systems specially adapted for autonomous road vehicles
  • B60W 40/06 - Road conditions
  • H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

84.

REMEDIATION OF REGULATORY NON-COMPLIANCE

      
Application Number 18621859
Status Pending
Filing Date 2024-03-29
First Publication Date 2024-07-18
Owner Kyndryl, Inc. (USA)
Inventor
  • Boone, Michael
  • Anderson, Evelyn R.
  • Brooks Powell, Natalie
  • Bender, Michael

Abstract

Hardware and software on a computing device is analyzed based on a regulatory profile for the computing device and regulatory compliance for an entity associated with the computing device. A determination is made whether at least one of the hardware and software on the computing device includes at least one regulatory non-compliance issue. In response to determining that at least one of the hardware and software on the computing device includes at least one regulatory non-compliance issue, one or more scripts are executed on the hardware and software on the computing device to cause the hardware and software to resolve the at least one regulatory non-compliance issue based on the regulatory profile for the computing device.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06Q 10/0635 - Risk analysis of enterprise or organisation activities
  • H04L 67/306 - User profiles

85.

Secure and contactless debit transactions

      
Application Number 17970796
Grant Number 12106273
Status In Force
Filing Date 2022-10-21
First Publication Date 2024-07-11
Grant Date 2024-10-01
Owner Kyndryl, Inc. (USA)
Inventor
  • Mahamuni, Amol Bhaskar
  • Padhi, Debasisha
  • Patel, Nidhi

Abstract

A method is provided that includes configuring a cellular phone to function as a mobile debit card by installing an application for contactless interfacing with ATMs. The method supplements the application with a neural network (NN) based biometric verification process configured to reduce an incorrect user error value over time to increasingly harden the application to undesired intrusion. The NN based biometric verification process comprises: performing an initial face recognition; greeting the user with one of a plurality of questions in a specific language of the user and evaluating a pre-defined answer provided from the user in the specific language; and detecting, in an acoustic utterance having dialogue in support of an ATM session, a voice and a prosody style indicative of the user in combination with lip and face movements made by the user corresponding to and in synchronization with the acoustic utterance.

IPC Classes  ?

  • G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
  • G10L 15/18 - Speech classification or search using natural language modelling

86.

Generation of data visualizations on a single visual representation

      
Application Number 17973281
Grant Number 12271981
Status In Force
Filing Date 2022-10-25
First Publication Date 2024-07-11
Grant Date 2025-04-08
Owner Kyndryl, Inc. (USA)
Inventor
  • Bushetti, Veeresh
  • M, Nalini
  • Sharma, Kalpesh

Abstract

A computer-implemented method, in accordance with one embodiment, includes collecting data relating to development of a software product, the collected data including a plurality of different types of data relating to the development of the software product. A portion of the collected data is selected based on a characteristic of an intended user, the portion of the collected data including a plurality of the types of data. The selected portion of the collected data is transformed into data visualizations representing the data, the different types of the data having different data visualizations relative to one another. The data visualizations are output in a single visual representation for display to the intended user.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 8/77 - Software metrics
  • G06F 9/445 - Program loading or initiating
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 16/26 - Visual data miningBrowsing structured data
  • G06T 11/00 - 2D [Two Dimensional] image generation
  • G06T 11/20 - Drawing from basic elements, e.g. lines or circles

87.

MULTI-TENANT AWARE DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) MECHANISM FOR CLOUD NETWORKING

      
Application Number 18583091
Status Pending
Filing Date 2024-02-21
First Publication Date 2024-07-11
Owner Kyndryl, Inc. (USA)
Inventor
  • Rong, Liang
  • Tang, Gang
  • Tao, Zi J.
  • Xian, Ming S.

Abstract

An approach within the embodiments of the present invention includes providing multi-tenancy support on a dynamic host configuration protocol (DHCP) protocol, and further includes receiving the dynamic host configuration protocol (DHCP) packet, inserting a tenant-specific option information within the DHCP packet, and transmitting the dynamic host configuration protocol (DHCP) packet with the tenant-specific option information.

IPC Classes  ?

  • H04L 61/5014 - Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
  • H04L 12/46 - Interconnection of networks
  • H04L 61/5061 - Pools of addresses

88.

Dynamically assigning storage objects to compartment constructs of a storage system to reduce application risk

      
Application Number 18093267
Grant Number 12056353
Status In Force
Filing Date 2023-01-04
First Publication Date 2024-07-04
Grant Date 2024-08-06
Owner Kyndryl, Inc. (USA)
Inventor
  • Narigapalli, Anil Kumar
  • Nanduru, Laxmikantha Sai
  • Arora, Pritpal S.
  • Olson, James E.
  • Chitti, Mark Vincent

Abstract

A computer-implemented method, according to one embodiment, includes logically partitioning a storage system into a plurality of compartment constructs, and mapping hosts in communication with the storage system to the compartment constructs, thereby enabling interoperability among the hosts and the compartment constructs. The interoperability of the hosts and the compartment constructs is analyzed, and the interoperability is based on storage software and/or firmware versions being run by the hosts. The method further includes defining, based on the analysis, risk profiles for applications run on the hosts, and determining, based on the risk profiles, recommendations for assignment and mapping of the hosts with the compartment constructs. Ownership of storage objects is assigned to the compartment constructs based on the recommendations. Each of the storage objects define a logical partition of one of the hosts and a logical partition of a storage volume of the storage system.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

89.

SKYTAP

      
Application Number 1797426
Status Registered
Filing Date 2024-04-02
Registration Date 2024-04-02
Owner Kyndryl, Inc. (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Information technology services; information technology management services; technical advice and research in the fields of software, computer hardware and computer networks; computer programming services; designing, developing, deploying, implementing, analyzing, integrating and managing computer software for third parties; installation, modification, maintenance and repair of computer software; customizing and configuring computer software and hardware; advisory services with respect to networking; information technology management services and operations for third parties, namely, managing virtual infrastructures, networking and storage services; hosting, management and administration of computer software for third parties; providing temporary use of non-downloadable computer software for managing, testing and using multiple operating systems; providing temporary use of non-downloadable computer software for virtual computing infrastructure management, networking and storage; providing temporary use of non-downloadable computer software for creating and maintaining scalable cloud computing applications; leasing and rental of computer software; technical support services, namely, troubleshooting computer software and hardware problems; advisory services with respect to virtual infrastructure.

90.

KYNDRYL

      
Application Number 1796497
Status Registered
Filing Date 2024-03-18
Registration Date 2024-03-18
Owner Kyndryl, Inc. (USA)
NICE Classes  ?
  • 21 - HouseHold or kitchen utensils, containers and materials; glassware; porcelain; earthenware
  • 25 - Clothing; footwear; headgear

Goods & Services

Glasses; cups; beer mugs; plastic water bottles sold empty; insulated containers and bottles for food and beverages; glasses, namely goblets; back scratchers; shoe horns; portable coolers; serving bowls of crystal; vases; coasters and coasters of leather; coasters, other than of paper or textile materials. Clothing; clothing, namely, tops for babies, children, adults, women, and men; clothing, namely tee-shirts, shirts, button-down shirts, sweatshirts, pullovers, jackets, aprons, vests, bottoms [clothing]; head coverings [headwear, clothing]; headwear, namely hats, baseball caps and hats, caps. stocking caps; shoes.

91.

SYNERGISTIC TEAM FORMATION

      
Application Number 18088159
Status Pending
Filing Date 2022-12-23
First Publication Date 2024-06-27
Owner Kyndryl, Inc. (USA)
Inventor
  • Iwamoto, Sachio
  • Ting, Susanna
  • Edgecombe, Janice
  • Delima, Neil
  • Burton, Peter Henry

Abstract

Aspects of the present disclosure relate generally to the formation of project teams and, more particularly, to systems and method of forming synergistic teams. For example, a computer-implemented method includes receiving, by a processor, a project profile including project skills; searching, by the processor, employee profiles for employee skills matching the project skills; selecting, by the processor, at least one group of team candidates having employee profiles with employee skills collectively matching the project skills; determining, by the processor, a synergy score for the at least one group of team candidates; and saving, by the processor, the synergy score and the group of team candidates in persistent storage.

IPC Classes  ?

  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
  • G06Q 10/0639 - Performance analysis of employeesPerformance analysis of enterprise or organisation operations
  • G06Q 10/101 - Collaborative creation, e.g. joint development of products or services

92.

CODE ADVISORY SYSTEM

      
Application Number 18085525
Status Pending
Filing Date 2022-12-20
First Publication Date 2024-06-20
Owner Kyndryl, Inc. (USA)
Inventor
  • Gomes Pereira, Edson
  • Rolfini, Adriano Augusto
  • De Almeida, Lucas Coelho
  • Bastos Torres, Maria Augusta

Abstract

An example operation may include one or more of storing code that adheres to predefined coding standards of one or more programming languages within a data store, reading source code from a code file, comparing the source code to the code stored within the data store to determine one or more recommended code changes to the source code, and displaying the one or more recommended code changes via a user interface.

IPC Classes  ?

  • G06F 8/33 - Intelligent editors
  • G06F 8/10 - Requirements analysisSpecification techniques

93.

Selectively exclude recipients from an end-to-end encryption enabled group chat

      
Application Number 18351554
Grant Number 12015581
Status In Force
Filing Date 2023-07-13
First Publication Date 2024-06-18
Grant Date 2024-06-18
Owner Kyndryl, Inc. (USA)
Inventor
  • Rodriguez Bravo, Cesar Augusto
  • Campos Batista, David Alonso

Abstract

Embodiments include receiving input of a new message for a group of members having end-to-end encryption in which first keys encrypt and second keys decrypt the new message, determining that a subset of the members in the group is excluded from receiving the new message, and selectively encrypting the new message for the members of the group by encrypting the new message by first keys corresponding to ones of the members of the group while choosing not to encrypt the new message with first keys corresponding to the subset of the members. An aspect includes transmitting the new message encrypted by the first keys to the members, and in response to choosing not to encrypt the new message with first keys corresponding to the subset, causing a system message to be transmitted to the subset excluded from receiving the new message, the system message affecting a presentation to the subset.

IPC Classes  ?

  • H04L 51/04 - Real-time or near real-time messaging, e.g. instant messaging [IM]
  • H04L 9/08 - Key distribution
  • H04L 51/063 - Content adaptation, e.g. replacement of unsuitable content

94.

BUILT-IN ANALYTICS FOR DATABASE MANAGEMENT

      
Application Number 18585465
Status Pending
Filing Date 2024-02-23
First Publication Date 2024-06-13
Owner Kyndryl, Inc. (USA)
Inventor
  • Kulkarni, Sudhanva
  • M, Nalini
  • Bhat, Gautam K.
  • Perumal Thevar, Muniyandi

Abstract

A computer-implemented method for receiving, at a database, an analytics request associated with a selected data line from a database and reading a set of additional bytes from the database corresponding to the selected data line. The method may further include parsing and formatting the set of additional bytes read from the database to generate, at the database, an analytics reply to the analytics request, where each of a plurality of data lines in the database represents a search query and where the analytics data comprises a number of search query requests on a subject matter and a number of search query requests for private data.

IPC Classes  ?

  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/2457 - Query processing with adaptation to user needs
  • G06F 16/248 - Presentation of query results
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

95.

Cloning database system on VSAM based dataset

      
Application Number 18064461
Grant Number 12182154
Status In Force
Filing Date 2022-12-12
First Publication Date 2024-06-13
Grant Date 2024-12-31
Owner Kyndryl, Inc. (USA)
Inventor
  • Ferraz Nogueira, Rodolfo
  • Candido, Juscelino
  • De Andrade Yaki, Samir
  • Senger, Jorge Augusto
  • Torres Das Candeias, Fabio

Abstract

A method for database cloning is provided. The method initiates an outage-free backup of a production database of a source database system using a point-in-time copy technology which copies both data and object structure. The method executes a cloning command to open a dialog panel menu receiving as input a subsystem name used to generate a set of database restore jobs. The method executes the set of database restore jobs to clone data into a transient area. The method uses a copy management service to activate replication of the data from the source database system created using the copy technology to a target database system. The method exports a file catalog associated with the source database system to the target database system. The method executes a script to rename files according to specifications of the target database system and the file catalog.

IPC Classes  ?

  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/23 - Updating
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor

96.

AUTOMATED INFORMATION TECHNOLOGY INFRASTRUCTURE MANAGEMENT

      
Application Number 18062207
Status Pending
Filing Date 2022-12-06
First Publication Date 2024-06-06
Owner KYNDRYL, INC. (USA)
Inventor
  • Jasionowski, Pawel
  • Stark, George E.
  • Bouz, Firas
  • Reech, Christopher Daniel

Abstract

A method, computer program product, and system include a processor(s) that obtains extracts, from a data source, atomic actions. The processor(s) traverses the atomic actions to identify one or more recommended actions. The processor(s) maps the recommended actions to the atomic actions by associating at least one atomic action with an expected improvement level from the data source. The processor(s) generates at least one directed graph based on the mapping. The processor(s) utilizes the matrix to filter the recommended actions, into a best plan nomination.

IPC Classes  ?

  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

97.

DETERMINING PROCESS DEVIATIONS THROUGH VIDEO ANALYSIS

      
Application Number 17993651
Status Pending
Filing Date 2022-11-23
First Publication Date 2024-05-23
Owner Kyndryl, Inc. (USA)
Inventor
  • Siddappa, Sheela
  • Kumar S G, Khanij

Abstract

A computer-implemented method, according to one embodiment, includes identifying, in a reference video of a production process of a product, a discrete and non-overlapping set of first tasks. The first tasks define at least a first sub-process. The method further includes analyzing a live video of the production process to identify frames of the live video that include second tasks that define a second sub-process, and analyzing the frames of the live video for determining whether a match exists between the first tasks and the second tasks. In response to a determination that the match does not exist, an alert that a deviation is present in the production process depicted in the live video is output.

IPC Classes  ?

  • G06T 7/00 - Image analysis
  • G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
  • G06V 20/40 - ScenesScene-specific elements in video content

98.

SECURITY POLICY SELECTION BASED ON CALCULATED UNCERTAINTY AND PREDICTED RESOURCE CONSUMPTION

      
Application Number EP2023054547
Publication Number 2024/104617
Status In Force
Filing Date 2023-02-23
Publication Date 2024-05-23
Owner
  • KYNDRYL, INC. (USA)
  • KYNDRYL DEUTSCHLAND GMBH (Germany)
Inventor
  • Pereira, Robson
  • Fida, Leandro Cesar
  • Montanhini, Edson Jose
  • Varga, Sergio
  • Marchiori, Daniele Jaqueline

Abstract

A computer-implemented method according to one embodiment includes receiving a request to perform a security policy implementation analysis for a first deployment associated with a first client in an IT environment. IT information associated with the first deployment is collected. The method further includes applying trained machine learning models to analyze the IT information of the first client to compute a security policy for the first deployment. The security policy is computed based on a calculated uncertainty of effects that applying the security policy to the first deployment is capable of causing, and a predicted amount of resources of the first deployment that applying the security policy to the first deployment would consume. An indication of the security policy is output for display in a dashboard on a display of a user device of the first client.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

99.

Security policy selection based on calculated uncertainty and predicted resource consumption

      
Application Number 17990511
Grant Number 12192243
Status In Force
Filing Date 2022-11-18
First Publication Date 2024-05-23
Grant Date 2025-01-07
Owner Kyndryl, Inc. (USA)
Inventor
  • Pereira, Robson
  • Fida, Leandro Cesar
  • Montanhini, Edson Jose
  • Varga, Sergio
  • Marchiori, Daniele Jaqueline

Abstract

A computer-implemented method according to one embodiment includes receiving a request to perform a security policy implementation analysis for a first deployment associated with a first client in an IT environment. IT information associated with the first deployment is collected. The method further includes applying trained machine learning models to analyze the IT information of the first client to compute a security policy for the first deployment. The security policy is computed based on a calculated uncertainty of effects that applying the security policy to the first deployment is capable of causing, and a predicted amount of resources of the first deployment that applying the security policy to the first deployment would consume. An indication of the security policy is output for display in a dashboard on a display of a user device of the first client.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

100.

Virtualization of digital crown actions based on actions performed with an electronic pen

      
Application Number 18158486
Grant Number 11989359
Status In Force
Filing Date 2023-01-24
First Publication Date 2024-05-21
Grant Date 2024-05-21
Owner Kyndryl, Inc. (USA)
Inventor
  • Bravo, Cesar
  • Zamora Duran, Edgar Adolfo
  • Toska, Desilda
  • Rakshit, Sarbajit K.

Abstract

Embodiments relate to virtualization of digital crown actions based on actions performed with an electronic pen. A technique includes communicatively coupling a smartwatch to an electronic pen, the smartwatch including a rotatable piece, where the rotatable piece controls a plurality of functionalities of the smartwatch. The technique includes receiving data from the electronic pen, and in response to receiving the data from the electronic pen, controlling at least one of the plurality of functionalities.

IPC Classes  ?

  • G06F 3/0354 - Pointing devices displaced or positioned by the userAccessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
  • G04G 9/00 - Visual time or date indication means
  • G04G 21/08 - Touch switches specially adapted for time-pieces
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06F 3/0362 - Pointing devices displaced or positioned by the userAccessories therefor with detection of 1D translations or rotations of an operating part of the device, e.g. scroll wheels, sliders, knobs, rollers or belts
  • G06F 3/038 - Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry
  • G06F 3/14 - Digital output to display device
  • G06F 3/0346 - Pointing devices displaced or positioned by the userAccessories therefor with detection of the device orientation or free movement in a 3D space, e.g. 3D mice, 6-DOF [six degrees of freedom] pointers using gyroscopes, accelerometers or tilt-sensors
  1     2     3     ...     33        Next Page