IBM Patent Applications

IDENTIFICATION AND PREVENTION OF SENSITIVE INFORMATION EXPOSURE IN TELEPHONIC CONVERSATIONS

Granted: January 23, 2025
Application Number: 20250030795
An embodiment converts, by a voice-to-text converter, voice data to text data. The embodiment extracts, by an extractor, an intent and an entity from the text data. The embodiment predicts, by a predictor, based on the intent and the entity, a sensitive information. The embodiment compares, by an intersector, the text data to the predicted sensitive information. The embodiment determines, by the intersector, responsive to the comparing, whether the text data includes the predicted…

PRODUCT DESIGN GENERATOR

Granted: January 23, 2025
Application Number: 20250029160
An embodiment establishes a product design database based at least in part on product design data received from a product image repository, wherein the product design data is representative of a plurality of product designs. The embodiment ranks each product design based on a ranking metric derived from market data corresponding to existing retail products. The embodiment constructs a product design ranking based on a relative ranking between each of the product designs that have been…

FINE-TUNED MODEL TO SOURCE FOUNDATION MODEL ATTRIBUTION

Granted: January 23, 2025
Application Number: 20250028992
An embodiment causes generating, by a trained model, a training prompt response to a training prompt in a set of training prompts. An embodiment trains, using the training prompt and the training prompt response, an attribution model, the training resulting in a trained attribution model. An embodiment attributes, using the trained attribution model and a first prompt response generated by a fine-tuned model in response to a prompt, the fine-tuned model to a foundation model.

SOFTWARE USER EXPERIENCE TRANSITION ASSISTANCE

Granted: January 23, 2025
Application Number: 20250028541
Optimizing a user experience during transition to an updated user interface includes using a computer processor to capture a user experience of a user's interaction with a program based on migration of the user interface from a current version of a page layout associated with the user to a new version of the page layout associated with the user. Disparity events experienced by the user while transitioning from the current version of the page layout to the new version of the page layout…

MULTIPLE DISPLAY CONFIGURATION TECHNIQUE

Granted: January 23, 2025
Application Number: 20250028494
A method for configuring multiple displays connected to a common computing system is disclosed. In one embodiment, a computing system detects multiple displays connected thereto. The computing system causes at least one of the displays to emit a lighting pattern. This lighting pattern may include, for example, sequentially displaying a selected background color and/or pattern on each of the displays. The computing system detects the lighting pattern using one or more cameras connected to…

RANSOMWARE SAFE FILESYSTEM (RSFS)

Granted: January 16, 2025
Application Number: 20250021686
A method for preventing unauthorized access to a filesystem begins by configuring a data table in association with the filesystem. The table comprises a set of metadata for each application registered to access the filesystem. A filesystem driver uses information in the table to manage access to the filesystem. In particular, and in response to receipt of a filesystem access initiated by a requesting application, the driver first verifies the integrity of the data table. If table…

SCALABLE DATA OBFUSCATION FOR DIFFERENT IDENTIFIER TYPES

Granted: January 16, 2025
Application Number: 20250021678
A computer-implemented method, according to one embodiment, includes: receiving a request to mask an input value, and in response to receiving the request, determining a domain size of the input value. A rank score of the input value is also determined. The domain size and the rank score are used to generate a unique value correlated with the input value. Moreover, the unique value is unranked by converting characters of the unique value to create a masked string value. The input value…

DYNAMIC MIGRATION OF VIRTUAL MACHINE SNAPSHOTS TO CONTAINER PLATFORMS

Granted: January 9, 2025
Application Number: 20250013481
A method for migrating virtual machine snapshots to application container platforms is disclosed. In one embodiment, such a method includes migrating, from a virtual machine platform to a volume on a container platform, a base disk file associated with a virtual machine. The base disk file has one or more delta disk files associated therewith, where each delta disk file records changes made to the virtual machine after a snapshot was taken. After migrating the base disk file, the method…

DYNAMIC MIGRATION OF VIRTUAL MACHINE SNAPSHOTS TO CONTAINER PLATFORMS

Granted: January 9, 2025
Application Number: 20250013480
A method for migrating virtual machine snapshots to application container platforms is disclosed. In one embodiment, such a method includes migrating, from a virtual machine platform to a volume on a container platform, a base disk file associated with a virtual machine. The base disk file has one or more delta disk files associated therewith, where each delta disk file records changes made to the virtual machine after a snapshot was taken. After migrating the base disk file, the method…

OPTIMIZATION OF LIVE STREAM PRODUCTIONS

Granted: January 2, 2025
Application Number: 20250008166
An embodiment optimizes a live stream event by annotating a script with markers for a live stream event. The embodiment defines an element within the live stream event. The embodiment defines a performance milestone within the element. The embodiment associates a first action with the performance milestone. The embodiment constructs a trigger within the script. The embodiment associates the trigger with a corresponding second action. The embodiment monitors the live stream event for the…

CONTINUOUS STRATEGIC ALIGNMENT IN CLOUD-BASED ENVIRONMENTS

Granted: January 2, 2025
Application Number: 20250004803
An embodiment predicts a plurality of strategies associated with a cloud workload. The embodiment presents the predicted plurality of strategies to a user for selection of a strategy. The embodiment predicts a first technology for the cloud workload having a first technology strategic potential value based on the selected strategy. The embodiment predicts a first deployment for the cloud workload having a first deployment strategic potential value based on the selected strategy. The…

GLOBAL CONTROL ACCESS PLATFORM

Granted: January 2, 2025
Application Number: 20250007920
A method for providing controlled access to resources in an enterprise begins by defining a “mesh” that associates a workplace team to a set of one or more workplace resources. The team has a role that, with respect to the resources, has a set of access permissions. An individual that is not then associated with the workplace team, e.g., in the given role, is assigned a physical or virtual token that represents the individual in the workplace environment. In response to detecting…

CLIENT-SERVER RESPONSE TIME BASED COMPUTER SYSTEM GEOLOCATION

Granted: January 2, 2025
Application Number: 20250007730
An embodiment sends, at a first time, from a boundary server to a client system in response to a challenge request, a challenge specifying a computational problem to be solved by the client system, the boundary server specified in a challenge list sent to the client system. An embodiment receives, at a second time, at the boundary server, a challenge response from the client system, the challenge response comprising a solution to the computational problem. An embodiment generates, at the…

DOMAIN ADAPTATION-BASED DISGUISING OF PROMPTS FOR DATA PRIVACY IN FOUNDATION MODELS

Granted: January 2, 2025
Application Number: 20250005182
A privacy-preserving method of accessing a model as a service (e.g., a language model) receives an input prompt authored in a first domain having data intended to be maintained private. In response, and using a conversion model, the input prompt authored in the first domain is converted to a second domain to create a converted input prompt. The converted input prompt preserves a semantic context of the input prompt. The converted input prompt is then delivered to the model as a service,…

CONTEXT-AWARE CRYPTOGRAPHIC INVENTORY

Granted: January 2, 2025
Application Number: 20250005163
An embodiment constructs a knowledge graph based on data received from a system wherein the knowledge graph comprises a plurality of entities and relationships among the plurality of entities which represent a context information of the knowledge graph. The embodiment assigns a unique identifier to a designated entity. The embodiment expresses in natural language the unique identifier, an associated label, an associated property name, an associated property value, an associated…

ADAPTIVE AUTONOMOUS ROAD SIGN CLASSIFICATION WITH FORERUNNER VEHICLE UTILIZATION

Granted: January 2, 2025
Application Number: 20250005139
A method for countering adversarial attacks on deep neural networks is disclosed. In one embodiment, such a method includes observing, by a first system, actual traffic behavior within a transportation network. The method classifies, by a deep neural network of a second system, a traffic sign for regulating traffic within the transportation network. The method determines whether a conflict exists between the actual traffic behavior and expected traffic behavior based on the traffic sign.…

ROBUST GRAPH REPRESENTATION OF CAUSAL RELATIONSHIPS EXPRESSED IN A NATURAL LANGUAGE DOCUMENT

Granted: January 2, 2025
Application Number: 20250005106
An embodiment extracts, from a natural language document, using a first language model, a set of cause-effect pairs, each cause-effect pair comprising a pair of phrases, each phrase comprising a portion of the natural language document. An embodiment constructs a first graph representing the set of cause-effect pairs, each node in the first graph representing a phrase in the set of phrases, each edge in the first graph representing a cause-effect relationship between nodes connected by…

ADAPTIVE OUTLIER DETECTION AND CORRECTION

Granted: January 2, 2025
Application Number: 20250005001
An embodiment detects, by an outlier detector, a first potential outlier in a data structure. The embodiment determines, by the outlier detector, whether the first potential outlier is a first outlier based on a first threshold. The embodiment applies, by an outlier corrector, responsive to determining the first potential outlier is a first outlier, a data quality rule to the first outlier. The embodiment detects, by the outlier detector, a second potential outlier in the data structure.…

DETECTION OF ANOMALOUS SYSTEM BEHAVIOR

Granted: January 2, 2025
Application Number: 20250004868
An embodiment establishes a system behavior database based at least in part on behavior data received from a system, wherein the system behavior database comprises a set of historical observations of behavior of the system. The embodiment samples current behavior data from the system. The embodiment generates a current observation based on the current behavior data that was sampled. The embodiment compares the current observation to each historical observation of the set of historical…

OPTIMIZATION OF CLOUD EGRESS TASKS

Granted: January 2, 2025
Application Number: 20250004860
An embodiment includes computing a computational cost of a job, using a first machine learning algorithm. The job may include an original amount of an egress of data from a cloud computing environment. The embodiment includes determining, using a second machine learning algorithm, the amount of the egress of data corresponding to the job has a computer business criticality that exceeds a threshold level of business criticality. The embodiment includes analyzing a current egress plan used…