Patents by Inventor Issa Sylla
Issa Sylla has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230186307Abstract: A computer-implemented method for transaction authorization is disclosed. The computer-implemented method includes receiving a transaction request from a user to access a resource. The computer-implemented method further includes determining historical biometric data for the user. The computer-implemented method further includes determining current biometric data for the user at a time the transaction request is received. The computer-implemented method further includes determining whether the historical biometric data for the user matches the current biometric data for the user at the time the transaction request is received. The computer-implemented method further includes responsive to determining that the historical biometric data for the user matches the current biometric data for the user at the time the transaction request is received, authorizing the transaction request to access the resource.Type: ApplicationFiled: December 14, 2021Publication date: June 15, 2023Inventors: Yoonyoung Park, Issa Sylla, Viatcheslav Gurev, James R. Kozloski, Uri Kartoun
-
Patent number: 11663625Abstract: By intercepting a natural language communication of a protected party, the communication is monitored, wherein the protected party is a human being. Within the monitored communication using a natural language processing engine, a natural language interaction between the protected party and a second party is detected. To determine an interaction pattern, the natural language interaction is analyzed. The interaction pattern includes data derived from the monitored communication, metadata of the protected party, and metadata of the second party. Using the interaction pattern and an interaction behavior model, an adverse result of the natural language interaction is predicted, wherein the adverse result comprises an economic loss to the protected party. By notifying the protected party, the predicted adverse result is intercepted.Type: GrantFiled: February 24, 2022Date of Patent: May 30, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Daniel M. Gruen, Nicola Palmarini, Olivia Choudhury, Panagiotis Karampourniotis, Issa Sylla, Morgan Foreman
-
Patent number: 11431682Abstract: Systems, computer-implemented methods, and computer program products that can facilitate anonymizing a network based on factors including network attributes, node attributes, and edge attributes describing connections between nodes are described. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise an anonymizing component that can anonymize network information of the network based on a network attribute for a network and a node attribute of a first node of the network, resulting in an anonymized network.Type: GrantFiled: September 24, 2019Date of Patent: August 30, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Olivia Choudhury, Panagiotis Karampourniotis, Yoonyoung Park, Issa Sylla, Amarendra Das
-
Publication number: 20220270132Abstract: By intercepting a natural language communication of a protected party, the communication is monitored, wherein the protected party is a human being. Within the monitored communication using a natural language processing engine, a natural language interaction between the protected party and a second party is detected. To determine an interaction pattern, the natural language interaction is analyzed. The interaction pattern includes data derived from the monitored communication, metadata of the protected party, and metadata of the second party. Using the interaction pattern and an interaction behavior model, an adverse result of the natural language interaction is predicted, wherein the adverse result comprises an economic loss to the protected party. By notifying the protected party, the predicted adverse result is intercepted.Type: ApplicationFiled: February 24, 2022Publication date: August 25, 2022Applicant: International Business Machines CorporationInventors: Daniel M. Gruen, Nicola Palmarini, Olivia Choudhury, Panagiotis Karampourniotis, Issa Sylla, Morgan Foreman
-
Patent number: 11263663Abstract: By intercepting a natural language communication of a protected party, the communication is monitored, wherein the protected party is a human being. Within the monitored communication using a natural language processing engine, a natural language interaction between the protected party and a second party is detected. To determine an interaction pattern, the natural language interaction is analyzed. The interaction pattern includes data derived from the monitored communication, metadata of the protected party, and metadata of the second party. Using the interaction pattern and an interaction behavior model, an adverse result of the natural language interaction is predicted, wherein the adverse result comprises an economic loss to the protected party. By notifying the protected party, the predicted adverse result is intercepted.Type: GrantFiled: July 11, 2019Date of Patent: March 1, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Daniel M. Gruen, Nicola Palmarini, Olivia Choudhury, Panagiotis Karampourniotis, Issa Sylla, Morgan Foreman
-
Patent number: 11188791Abstract: A computer-implemented method for training a global federated learning model using an aggregator server includes training multiple local models at respective local nodes. Each local node selects a set of attributes from its training dataset for training its local model. Each local node generates an anonymized training dataset by using a syntactic anonymization method, and by selecting quasi-identifying attributes from training attributes, and generalizing the quasi-identifying attributes using a syntactic algorithm. Further, each local node computes a syntactic mapping based on equivalence classes produced in the anonymized training dataset. The aggregator server computes a union of mappings received from all the local nodes. Further, federated learning includes training the global federated learning model by iteratively sending, by the local nodes to the aggregator server, parameter updates computed over the local models.Type: GrantFiled: November 18, 2019Date of Patent: November 30, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Olivia Choudhury, Aris Gkoulalas-Divanis, Theodoros Salonidis, Issa Sylla
-
Publication number: 20210150269Abstract: A computer-implemented method for training a global federated learning model using an aggregator server includes training multiple local models at respective local nodes. Each local node selects a set of attributes from its training dataset for training its local model. Each local node generates an anonymized training dataset by using a syntactic anonymization method, and by selecting quasi-identifying attributes from training attributes, and generalizing the quasi-identifying attributes using a syntactic algorithm. Further, each local node computes a syntactic mapping based on equivalence classes produced in the anonymized training dataset. The aggregator server computes a union of mappings received from all the local nodes. Further, federated learning includes training the global federated learning model by iteratively sending, by the local nodes to the aggregator server, parameter updates computed over the local models.Type: ApplicationFiled: November 18, 2019Publication date: May 20, 2021Inventors: OLIVIA CHOUDHURY, ARIS GKOULALAS-DIVANIS, THEODOROS SALONIDIS, ISSA SYLLA
-
Publication number: 20210092100Abstract: Systems, computer-implemented methods, and computer program products that can facilitate anonymizing a network based on factors including network attributes, node attributes, and edge attributes describing connections between nodes are described. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise an anonymizing component that can anonymize network information of the network based on a network attribute for a network and a node attribute of a first node of the network, resulting in an anonymized network.Type: ApplicationFiled: September 24, 2019Publication date: March 25, 2021Inventors: Olivia Choudhury, Panagiotis Karampourniotis, Yoonyoung Park, Issa Sylla, Amarendra Das
-
Publication number: 20210081567Abstract: A computer-implemented method can include obtaining first website data that corresponds to content displayed on a first website. The method can further include obtaining a set of privacy policy rules that corresponds to the first website. The method can further include determining a first data-sharing relationship between the first website and a second website. The method can further include comparing the set of privacy policy rules to the first data-sharing relationship. The method can further include identifying a discrepancy between the set of privacy policy rules and the first data-sharing relationship. The method can further include generating a notification in response to identifying the discrepancy.Type: ApplicationFiled: September 16, 2019Publication date: March 18, 2021Inventors: Yoonyoung PARK, Issa Sylla, Panagiotis Karampourniotis, Olivia Choudhury, Daniel M. Gruen, Amarendra DAS
-
Publication number: 20210012374Abstract: By intercepting a natural language communication of a protected party, the communication is monitored, wherein the protected party is a human being. Within the monitored communication using a natural language processing engine, a natural language interaction between the protected party and a second party is detected. To determine an interaction pattern, the natural language interaction is analyzed. The interaction pattern includes data derived from the monitored communication, metadata of the protected party, and metadata of the second party. Using the interaction pattern and an interaction behavior model, an adverse result of the natural language interaction is predicted, wherein the adverse result comprises an economic loss to the protected party. By notifying the protected party, the predicted adverse result is intercepted.Type: ApplicationFiled: July 11, 2019Publication date: January 14, 2021Applicant: International Business Machines CorporationInventors: Daniel M. Gruen, Nicola Palmarini, Olivia Choudhury, Panagiotis Karampourniotis, Issa Sylla, Morgan Foreman