Patents by Inventor Augusto Rodriguez

Augusto Rodriguez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250238557
    Abstract: Embodiments receive confidential data on a first device; modify the confidential data on the first device by using a randomization pattern; and send the modified confidential data to a second device by wireless communication.
    Type: Application
    Filed: January 19, 2024
    Publication date: July 24, 2025
    Inventors: Cesar Augusto Rodriguez Bravo, Kim A. Eckert
  • Publication number: 20250220013
    Abstract: In an first aspect of the disclosure, there is a computer-implemented method which includes: obtaining, by a computing device, a password entered by an account user, placing, by the computing device, the password in memory of a device; generating, by the computing device, a fake password by randomly injecting characters into the password; storing, by the computing device, the fake password in a secure database; and deleting the password from the memory.
    Type: Application
    Filed: December 29, 2023
    Publication date: July 3, 2025
    Inventors: Cesar Augusto Rodriguez Bravo, Kim A. Eckert
  • Publication number: 20250211613
    Abstract: Computer-implemented methods for an impersonation attack detection and prevention system. Aspects include receiving a communication from a user of a communication environment. Aspects further include generating a similarity score using metadata of the communication from the user and a digital persona associated with the user in the communication environment. Aspects also include determining that the communication is a potential impersonation attack threat by determining that the similarity score is below a threshold value. Aspects include performing a security action to protect the communication environment from the potential impersonation attack threat.
    Type: Application
    Filed: December 22, 2023
    Publication date: June 26, 2025
    Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Kim Poh Wong
  • Publication number: 20250200156
    Abstract: Embodiments relate to a computer implemented method for identifying, validating and authenticating a user using biological patterns and numbers. The method includes prompting a user to enter a password into an authentication software, where the password is responsive to selected user fingers, selected user fingerprints and a selected entry pattern of the user fingers and user fingerprints. A biometric sensing device is operated to obtain biometric data responsive to sensed user fingers, sensed user fingerprints and a sensed entry pattern. The biometric data is processed to determine characteristic features of at least one of the sensed user fingers, the sensed user fingerprints and the sensed entry pattern and the characteristic features is compared with the user data to determine if the characteristic features match the user data. The user is allowed or denied entry into a computer system responsive to whether the characteristic features match the user data.
    Type: Application
    Filed: December 19, 2023
    Publication date: June 19, 2025
    Inventors: Vinay Kumar Gajanana Hegde, Omar Odibat, Cesar Augusto Rodriguez Bravo
  • Publication number: 20250184320
    Abstract: In an aspect of the disclosure, a method includes: obtaining, by a computing device, a user request to access at least one system resource; obtaining, by the computing device, a digital certificate of the user requesting access to the at least one system resource; obtaining, by the computing device, a validation result associated with the digital certificate from a blockchain ledger network; determining, by the computing device, whether the validation result authorizes access to an authorization service; and sending the authorization to the authorization service to deny or permit the user access to the at least one system resource based on the validation result.
    Type: Application
    Filed: November 30, 2023
    Publication date: June 5, 2025
    Inventors: Sachio Iwamoto, Nadeem Malik, Balaji Narasimhan, Kishor Grandhe, Cesar Augusto Rodriguez Bravo, Rajeev Puri
  • Patent number: 12299164
    Abstract: Embodiments of the present invention provides methods, computer program products, and a system for maintain application compliance. Embodiments of the present invention identify locations of potentially sensitive data. Embodiments of the present invention identify a set of individuals associated with the potentially sensitive data and determine whether an application can be installed based on content of potentially sensitive data and on elections of respective individuals associated with the potentially sensitive data.
    Type: Grant
    Filed: June 13, 2019
    Date of Patent: May 13, 2025
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Michael Bender, Craig M. Trim, Cesar Augusto Rodriguez Bravo
  • Publication number: 20250148075
    Abstract: This disclosure presents an approach for identifying obfuscation patterns within system log files to enhance cybersecurity. The method involves two key stages: first, detecting tampering in a primary set of log entries; and second, monitoring a secondary set of log files for the presence of these tampering patterns. By comparing the identified obfuscation patterns in the primary log entries with those detected in the secondary set, the system can effectively identify potential system intrusions. This innovative approach provides an advanced and proactive means of bolstering system security by uncovering and responding to malicious activities that attempt to obscure their tracks within log files, ultimately enhancing the defense against cyber threats.
    Type: Application
    Filed: November 8, 2023
    Publication date: May 8, 2025
    Inventors: Cesar Augusto Rodriguez Bravo, Daniel S. Riley
  • Publication number: 20250124662
    Abstract: An approach is provided that displays avatars locating in a first virtual area to a first set of users with each user controlling one of the avatars. A request is received from one of the users to escape a situation. In response to the request, the system clones the user's first avatar thus creating a second avatar. The second avatar is visible to the user; however it is invisible to one or more of the set of users. The user controls the second avatar and the first avatar is automatically controlled using artificial intelligence (AI), with the user no longer controlling the first avatar.
    Type: Application
    Filed: October 17, 2023
    Publication date: April 17, 2025
    Inventor: Cesar Augusto Rodriguez Bravo
  • Patent number: 12267433
    Abstract: A universal serial bus device, including: a main body; a connection portion attached to the main body; a processor; a storage portion storing a hash function executable by the processor, the hash function producing a hash value; a non-changing visual code on the main body, the visual code being readable by an optical scanner and corresponding to the hash function; and an electronic display configured to display the hash value.
    Type: Grant
    Filed: October 22, 2021
    Date of Patent: April 1, 2025
    Assignee: Kyndryl, Inc.
    Inventors: Cesar Augusto Rodriguez Bravo, Carolina Garcia Delgado, Desilda Toska, Mauro Marzorati
  • Patent number: 12257785
    Abstract: Aspects of the present disclosure relate generally to three-dimensional (3D) printing and, more particularly, to robotic support for 3D prints. For example, a computer-implemented method includes identifying, by the computing device, at least one structure in the 3D object source file requiring support for printing the at least one structure by a 3D printer; adding, by the computing device, to a 3D print file an instruction to request deployment of a support structure at a particular location to support the at least one structure by the 3D printer; and providing to the 3D printer, by the computing device, the 3D print file with the instruction to request deployment of the support structure at a particular location to support the at least one structure by the 3D printer.
    Type: Grant
    Filed: January 28, 2022
    Date of Patent: March 25, 2025
    Assignee: Kyndryl, Inc.
    Inventors: Cesar Augusto Rodriguez Bravo, Franz Friedrich Liebinger Portela, David Alonso Campos Batista, Sarbajit K. Rakshit
  • Publication number: 20250085979
    Abstract: An approach is disclosed that determines that a change is needed to a remote system that is managed by a change management system that manages changes to many remote systems. A change management time window when the change is scheduled to be performed at the selected remote system is identified and a monitoring request is sent to the remote system. The monitoring request causes the remote system to run a monitoring process. The change management system receives an activity notification that was identified by the monitoring process. In response to the activity notification matching the change needed, the change scheduled at the selected remote system is canceled by the change management system.
    Type: Application
    Filed: September 12, 2023
    Publication date: March 13, 2025
    Inventors: Cesar Augusto Rodriguez Bravo, Kim A. Eckert, David Alonso Campos Batista
  • Publication number: 20250080646
    Abstract: Embodiments relate to preventing deep fake voicemail scams. In response to receiving a voice message, an intent of the voice message is determined. The intent is determined to relate to a persuasion technique. A warning is provided about the voice message.
    Type: Application
    Filed: August 30, 2023
    Publication date: March 6, 2025
    Inventors: Cesar Augusto Rodriguez Bravo, Lorie Goins
  • Patent number: 12242594
    Abstract: A random password policy for a specific user associated with an entity is generated based on a global password requirement. A new password created by the specific user based on the generated random password policy is identified. That the new password complies with a set of requirements specified by the generated random password policy is confirmed.
    Type: Grant
    Filed: January 12, 2024
    Date of Patent: March 4, 2025
    Assignee: Kyndryl, Inc.
    Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, John Richard Feezell, Faraz Ahmad, Anto Ajay Raj John
  • Publication number: 20250068714
    Abstract: A computer-implemented method includes presenting one or more categories of movement patterns. The computer-implemented method includes recording a movement pattern of a user, where the movement pattern is associated with the one or more categories of movement patterns. The computer-implemented method includes authenticating the recorded movement pattern is correct. The computer-implemented method includes associating the authenticated recorded movement pattern with at least one of a device, application, and web-based service.
    Type: Application
    Filed: August 22, 2023
    Publication date: February 27, 2025
    Inventor: Cesar Augusto RODRIGUEZ BRAVO
  • Patent number: 12229236
    Abstract: A voice signal in a headphone is detected. The voice signal includes a person speaking an audible command. Based on detecting the voice signal a first biometric signature of a user is retrieved. The first biometric signature is compared to one or more biometric features of the person. Based on comparing the first biometric signature to the one or more biometric features an authentication of the user is determined. An authentication action is performed based on the detected voice signal. The authentication action is performed in response to verifying the authentication.
    Type: Grant
    Filed: September 25, 2023
    Date of Patent: February 18, 2025
    Assignee: Kyndryl, Inc.
    Inventors: Cesar Augusto Rodriguez Bravo, Sarbajit K. Rakshit
  • Publication number: 20250053692
    Abstract: One or more embodiments relate to protecting data stored by a non-volatile memory of a memory device installed in a computing device. A technique includes in response to a power-up of the memory device, incrementing a memory power cycle count, and receiving a host power cycle count indicating a number of power-ups of the computing device. The technique includes, if the memory power cycle count is not equal to the host power cycle count, applying a security reaction to the memory, the security reaction being adapted for preventing a readout of the data.
    Type: Application
    Filed: January 30, 2024
    Publication date: February 13, 2025
    Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Thomas Brackhahn
  • Publication number: 20250053671
    Abstract: An approach is provided for protecting data stored by a non-volatile solid-state memory from an unauthorized access. In response to a trigger event indicating an increased probability of the unauthorized access, the memory is destroyed by directing through the memory an electric current exceeding a rated current of the memory, and testing an operability of the memory, where the destruction is completed when the test indicates lacking operability of the memory.
    Type: Application
    Filed: February 8, 2024
    Publication date: February 13, 2025
    Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Thomas Brackhahn
  • Publication number: 20250047141
    Abstract: Control system for facilitating wireless charging of an electronic device is provided, which identifies presence of multiple electronic devices within an environment, with the multiple electronic devices including a self-propelled power relay device with wireless charging capability. Control system processing determines that an electronic device of the multiple electronic devices requires wireless charging, and based on the determining, deploys the self-propelled power relay device to move to an area of the environment within a charging range of the electronic device to facilitate wireless charging of the electronic device via the self-propelled power relay device.
    Type: Application
    Filed: October 23, 2024
    Publication date: February 6, 2025
    Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Sarbajit K. Rakshit
  • Patent number: 12217253
    Abstract: In an approach for enabling communication between offline devices to perform secure transaction, a processor sends information in an optically recognizable first code including a response type, an identity of the first device and a type of optical reader associated with the first device. A processor receives encoded information in an optically recognizable second code. A processor extracts a user identifier and the one-time password associated with the registered second device. A processor determines that a user certificate associated with the user identifier exists in a local repository. A processor validates the one-time password associated with the registered second device with the user certificate using a public certificate associated with the first device, the one-time password associated with the registered second device and the one-time password seed. A processor authenticates the user.
    Type: Grant
    Filed: May 6, 2021
    Date of Patent: February 4, 2025
    Assignee: International Business Machines Corporation
    Inventors: Mohamed Zouhaier Ramadhane, Cesar Augusto Rodriguez Bravo, Susanna Ting, Juan Manuel Avalos Vega, Daniela Ofelia Rojas Barrientos
  • Publication number: 20250038972
    Abstract: Embodiments relate to removing interactions from a virtual environment thereby executing the right to be forgotten in the virtual environment. In response to receiving a request to remove interactions from a virtual environment, a search is performed in the virtual environment for cryptographic keys embedded with a user identification corresponding to the request. The cryptographic keys embedded with the user identification are deleted in the virtual environment, where the interactions have been signed with the cryptographic keys embedded with the user identification in the virtual environment. In response to deleting the cryptographic keys embedded with the user identification in the virtual environment, there is a modification to a presentation of the interactions in the virtual environment.
    Type: Application
    Filed: July 24, 2023
    Publication date: January 30, 2025
    Inventor: Cesar Augusto Rodriguez Bravo