Patents by Inventor David Alonso Campos Batista
David Alonso Campos Batista has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11606696Abstract: Location-based validation of a wireless authentication device. A request is received by a security hardware computing device for an action requiring authentication in connection with security hardware. A security hardware location is received or accessed. A wireless authentication device location of a wireless authentication device in possession of a requester is received by security hardware computing device. The security hardware computing device receives a mobile device location for a mobile device in possession of the requester. The security hardware computing device determines whether the security hardware location, the mobile device location, and the wireless authentication device location are in a proximity. The security hardware computing device performs the action requiring authentication in connection with the security hardware.Type: GrantFiled: June 4, 2021Date of Patent: March 14, 2023Assignee: KYNDRYL, INC.Inventors: Cesar Augusto Rodriguez Bravo, Franz Friedrich Liebinger Portela, David Alonso Campos Batista
-
Patent number: 11599432Abstract: Distributed application orchestration management is provided. A first passive member of a set of passive members sends a notification message to other members indicating that the first passive member is initiating start of a distributed application in response to the first passive member validating that a self-restart by a leader member failed. The first passive member compares timestamps associated with an attempt to start the distributed application by other passive members in the set of passive members. The first passive member stops a particular attempt to start the distributed application in response to the first passive member determining that a timestamp associated with the particular attempt to start the distributed application by the first passive member is newer than another timestamp of another passive member. The first passive member designates the other passive member having an older timestamp as a new leader member to continue starting the distributed application.Type: GrantFiled: August 12, 2021Date of Patent: March 7, 2023Assignee: Kyndryl, Inc.Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Ruben Luengas De La Fuente, Mauro Marzorati
-
Patent number: 11599084Abstract: In an approach for early notification of degradation of 3D printed parts, a processor completes an initial scan of a 3D printed part using backscatter techniques when the 3D printed part is installed and idle in the unit. A processor completes a second scan of the 3D printed part using backscatter techniques when the unit is in operation. A processor determines a baseline delta between the initial scan and the second scan. A processor performs an additional scan after a preset time interval of the 3D printed part using backscatter techniques in operation within the unit. A processor determines whether the additional scan is within the baseline delta.Type: GrantFiled: June 18, 2021Date of Patent: March 7, 2023Assignee: Kyndryl, Inc.Inventors: Cesar Augusto Rodriguez Bravo, Franz Friedrich Liebinger Portela, David Alonso Campos Batista, Sarbajit K. Rakshit
-
Publication number: 20230065220Abstract: A random password policy for a specific user associated with an entity is generated based on a global password requirement. A new password created by the specific user based on the generated random password policy is identified. That the new password complies with a set of requirements specified by the generated random password policy is confirmed.Type: ApplicationFiled: August 25, 2021Publication date: March 2, 2023Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, John Richard Feezell, Faraz Ahmad, Anto Ajay Raj John
-
Publication number: 20230004971Abstract: A computer-implemented method for processing online banking transactions is disclosed. The computer-implemented method includes identifying a first transaction request utilizing an alternate PIN associated with an alternate account linked to a primary account. The computer-implemented method further includes determining that the first transaction request is invalid based on a PIN policy corresponding to the alternate PIN associated with the alternate account linked to the primary account. The computer-implemented method further includes responsive to determining that the first transaction request is invalid, dynamically altering an allowable transaction limit for the alternate account according to the PIN policy.Type: ApplicationFiled: June 30, 2021Publication date: January 5, 2023Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Desilda Toska, Romelia H. Flores
-
Publication number: 20220404795Abstract: In an approach for early notification of degradation of 3D printed parts, a processor completes an initial scan of a 3D printed part using backscatter techniques when the 3D printed part is installed and idle in the unit. A processor completes a second scan of the 3D printed part using backscatter techniques when the unit is in operation. A processor determines a baseline delta between the initial scan and the second scan. A processor performs an additional scan after a preset time interval of the 3D printed part using backscatter techniques in operation within the unit. A processor determines whether the additional scan is within the baseline delta.Type: ApplicationFiled: June 18, 2021Publication date: December 22, 2022Inventors: Cesar Augusto Rodriguez Bravo, Franz Friedrich Liebinger Portela, David Alonso Campos Batista, Sarbajit K. Rakshit
-
Publication number: 20220405042Abstract: A method can include identifying an audio output device having a first audio status. In the first audio status, the audio output device can be configured to receive first audio data of at least one software application of a set of software applications of a computing device. In the first audio status, the audio output device can be configured to emit, based on the first audio data, first audio content corresponding to the at least one software application. The method can include identifying a priority software application of the computing device. The method can include assigning, in response to the identifying the priority software application, a second audio status to the audio output device. The assigning can include preventing the audio output device from emitting the first audio content. The assigning can further include configuring the audio output device to emit second audio content of the priority software application.Type: ApplicationFiled: June 16, 2021Publication date: December 22, 2022Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, MOHAMED ZOUHAIER RAMADHANE, ADAN EDOARDO HERRERA HIDALGO
-
Publication number: 20220398173Abstract: Distributed application orchestration management is provided. A first passive member of a set of passive members sends a notification message to other members indicating that the first passive member is initiating start of a distributed application in response to the first passive member validating that a self-restart by a leader member failed. The first passive member compares timestamps associated with an attempt to start the distributed application by other passive members in the set of passive members. The first passive member stops a particular attempt to start the distributed application in response to the first passive member determining that a timestamp associated with the particular attempt to start the distributed application by the first passive member is newer than another timestamp of another passive member. The first passive member designates the other passive member having an older timestamp as a new leader member to continue starting the distributed application.Type: ApplicationFiled: August 12, 2021Publication date: December 15, 2022Inventors: Cesar Augusto Rodriguez Bravo, Ruben Luengas De La Fuente, Mauro Marzorati, David Alonso Campos Batista
-
Publication number: 20220398309Abstract: In an approach for multifactor authorization on hardware calls of resources, a processor receives a request for a hardware resource from a plurality of hardware resources being monitored. A processor calculates a risk level associated with the hardware resource of the request based on a respective risk level data repository. A processor, in response to a determination the risk level requires multifactor authorization, determines that a user associated with the request is logged in. A processor identifies a mechanism used by the user to log in. A processor determines whether a challenge associated with the multifactor authorization based on the mechanism is successful. A processor, in response to a determination the challenge associated with the multifactor authorization is successful, enables access to the hardware resource of the request.Type: ApplicationFiled: June 14, 2021Publication date: December 15, 2022Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista
-
Publication number: 20220394486Abstract: Location-based validation of a wireless authentication device. A request is received by a security hardware computing device for an action requiring authentication in connection with security hardware. A security hardware location is received or accessed. A wireless authentication device location of a wireless authentication device in possession of a requester is received by security hardware computing device. The security hardware computing device receives a mobile device location for a mobile device in possession of the requester. The security hardware computing device determines whether the security hardware location, the mobile device location, and the wireless authentication device location are in a proximity. The security hardware computing device performs the action requiring authentication in connection with the security hardware.Type: ApplicationFiled: June 4, 2021Publication date: December 8, 2022Inventors: Cesar Augusto Rodriguez Bravo, Franz Friedrich Liebinger Portela, David Alonso Campos Batista
-
Publication number: 20220392444Abstract: An indication associated with an AI mode enabled by an AI system is received from a user with an affirmative opt-in status. A first task request associated with the user is identified. One or more instructions associated with the first task request are contextually recognized. The first task request is completed based on the contextually recognized one or more instructions.Type: ApplicationFiled: June 2, 2021Publication date: December 8, 2022Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Romelia H. Flores, Sarbajit K. Rakshit
-
Patent number: 11272558Abstract: In an approach for a secondary mobile internet access, a processor receives a request from a mobile device for a connection to a secondary wireless access point. A processor authorizes the connection request. A processor determines bandwidth associated with the mobile device. A processor adjusts bandwidth associated with the secondary wireless access point to include at least a sum of original bandwidth of the secondary wireless access point and the bandwidth associated with the mobile device to accommodate usage by the mobile device. A processor assigns temporary bandwidth to the mobile device based on the bandwidth associated with the mobile device. A processor executes a timer to a session associated with the authorized connection for the mobile device. A processor restores the original bandwidth of the secondary wireless access point upon detecting an end of the session.Type: GrantFiled: May 13, 2020Date of Patent: March 8, 2022Assignee: KYNDRYL, INC.Inventors: Franz Friedrich Liebinger Portela, Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista
-
Publication number: 20220067744Abstract: Aspects of the present disclosure relate to transaction authorization. Image data of a user can be received while a transaction occurs. The image data can be analyzed to determine whether the user viewed a display indicating characteristics of the transaction. The transaction can be authorized in response to determining that the user viewed the display indicating the characteristics of the transaction.Type: ApplicationFiled: September 2, 2020Publication date: March 3, 2022Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Sarbajit K. Rakshit
-
Publication number: 20220051666Abstract: The exemplary embodiments disclose a method, a computer program product, and a computer system for managing user commands. The exemplary embodiments may include a user giving one or more commands to one or more devices, collecting data of the one or more commands, extracting one or more features from the collected data, and determining which one or more of the commands should be executed on which one or more of the devices based on the extracted one or more features and one or more models.Type: ApplicationFiled: August 12, 2020Publication date: February 17, 2022Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Sarbajit K. Rakshit
-
Publication number: 20210360718Abstract: In an approach for a secondary mobile internet access, a processor receives a request from a mobile device for a connection to a secondary wireless access point. A processor authorizes the connection request. A processor determines bandwidth associated with the mobile device. A processor adjusts bandwidth associated with the secondary wireless access point to include at least a sum of original bandwidth of the secondary wireless access point and the bandwidth associated with the mobile device to accommodate usage by the mobile device. A processor assigns temporary bandwidth to the mobile device based on the bandwidth associated with the mobile device. A processor executes a timer to a session associated with the authorized connection for the mobile device. A processor restores the original bandwidth of the secondary wireless access point upon detecting an end of the session.Type: ApplicationFiled: May 13, 2020Publication date: November 18, 2021Inventors: Franz Friedrich Liebinger Portela, Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista
-
Publication number: 20210258792Abstract: Aspects of the present invention disclose a method for identifying indications of an attack on a cellular network. The method includes one or more processors scanning a geographic area of a cellular network, wherein the geographic area includes a plurality of transceivers of the cellular network. The method further includes identifying a symptom that impacts a transceiver of the cellular network based at least in part on connectivity between a computing device and the plurality transceivers of the cellular network. The method further includes performing one or more assessments on the transceiver of the cellular network impacted by the symptom. The method further includes determining whether the symptom of the cellular network is associated with an attack on the cellular network based at least in part on the one or more assessments.Type: ApplicationFiled: February 17, 2020Publication date: August 19, 2021Inventors: Cesar Augusto Rodriguez Bravo, David Alonso Campos Batista, Craig M. Trim, Shikhar Kwatra