International Business Machines Corporation
Generating a custom blacklist for a listening device based on usage
Last updated:
Abstract:
Aspects of the present invention disclose a method, computer program product, and system for modifying a prohibited list. The method includes one or more processors determining a trend in usage of a command based on an analysis of aggregated usage information of the command from a plurality of listening devices, wherein the determined trend indicates an amount of usage of the command over a period of time. The method further includes determining whether the determined trend in usage of the command deviates from a usage threshold for the command. The method further includes in response to determining that the determined trend in usage of the command does deviate from the usage threshold for the command, modifying a prohibited list based on an amount of deviation from the usage threshold usage of the command.
Utility
29 Nov 2018
2 Nov 2021