GENERATING AN AI CONVERSATION MODEL USING API TEST DATA
Granted: September 5, 2024
Application Number:
20240296292
An embodiment includes generating an intent representative of a verb identified in application programming interface (API) test data associated with an API test case. The embodiment also generates a first entity representative of a first noun identified in the API test data and a second entity representative of a second noun identified in the API test data. The embodiment identifies the intent as being associated with a relationship between the first and second entities in the API test…
CLIPBOARD BASED SEARCH TERM PREDICTION
Granted: September 5, 2024
Application Number:
20240296176
Using a probability distribution and a search result history, a probability of selecting a specified number of relevant samples and a specified number of irrelevant samples from a set of contents is computed, each content in the set of contents comprising a content copied to a first system clipboard of a first device. Using the probability distribution, each content in the set of contents is weighted. Using the weighted set of contents, a set of predicted searches is generated. The set…
MIGRATION PLANNING WITH AUTOMATED DISCOVERY OF SOURCE ASSETS
Granted: August 29, 2024
Application Number:
20240289308
An embodiment includes generating source inventory data representative of information technology assets associated with a source site, the source site comprising information technology infrastructure of an enterprise, the information technology assets comprising a source application database and a source peripheral entity associated with the source application database. The embodiment determines a target platform for migrating the source application database and determining a degree of…
OPTIMIZING MEMORY MANAGEMENT USING MEMORY ACCESS HEATMAPS
Granted: August 29, 2024
Application Number:
20240289021
Embodiments of the present disclosure provide an enhanced system and methods for optimizing data placement in a memory hierarchy. A disclosed non-limiting computer-implemented method configures a counter block comprising access frequency counters mapped into an application memory space, and configures a counter map, where each entry in the counter map associates an application-defined memory region with the access frequency counters of the counter block. A memory controller identifies a…
PLASMA GENERATION MODULE FOR UTERINE CERVIX
Granted: August 29, 2024
Application Number:
20240285329
Disclosed is a plasma generation module for a uterine cervix, comprising: a module body coupled to the front end of a probe part capable of entering the vagina of the human body; a dielectric coupled to the outer front of the module body and facing the uterine cervix, while maintaining a gap for a plasma generation space between the module body and the uterine cervix; and an electrode between the module body and the dielectric and having a shape corresponding to a shape of the…
CONTEXT-BASED CONTENT AUTHORIZATION
Granted: August 22, 2024
Application Number:
20240283783
An embodiment includes extracting network layer information and application layer information from within a network packet. The embodiment determines a context of a network connection with a client device from which the network packet originated based at least in part on the network layer information and determines an identity of an end user with whom the network packet is associated based at least in part on the application layer information. The embodiment performs a sign-on process…
AUGMENTED CONFIGURATION INTERFACE FOR VISUALIZING AND OPTIMIZING BEAMFORMING
Granted: August 22, 2024
Application Number:
20240283495
A method for configuring beamforming for a network device is disclosed. In one embodiment, such a method includes creating a map of an area in which a network device that supports beamforming is placed. The method shows, on an interactive display device, the network device on the map. The method shows, on the interactive display device, one or more beams emanating from the network device on the map. The method enables a user to manipulate the beams on the interactive display device to…
OPTIMIZING ALLOCATION OF TRANSACTION ALERTS
Granted: August 22, 2024
Application Number:
20240281815
An embodiment includes assigning an entity to a risk category group based on transaction data of a transaction alert associated with the entity, where the transaction alert is concerning potentially suspicious financial activities. The embodiment also identifies a relationship between the entity and another entity based on the transaction data. The embodiment determines a capability of an anti-money laundering (“AML”) analyst, where the capability includes a skill level of the AML…
ADAPTED MODEL FEATURE REGISTRY FOR FOUNDATION MODELS
Granted: August 22, 2024
Application Number:
20240281697
By analyzing a dataset usable to train a model to perform a task, metadata of the dataset is generated, the generating performed responsive to receiving the dataset. The dataset is classified into a domain using the metadata and a set of context definitions. Responsive to receiving a request from the model for use of the dataset, the model is caused to be trained using the dataset, the training enabling the model to perform the task.
SECURE SYSTEM FOR HIDING REGISTRATION RULES FOR DYNAMIC CLIENT REGISTRATION
Granted: August 15, 2024
Application Number:
20240275819
A method to facilitate a permitted access to a protected resource associated with a service provider (SP). The method begins by the SP establishing a root of trust to a third party via an attribute-based encryption (ABE) master secret key, and a set of one or more public parameters. Once vetted by the entity, the SP receives a binary object from the third party that encodes the policy as a cryptographic payload. When a client application desires to enroll with and interoperate with the…
USING CATEGORIZATION TAGS FOR RULE GENERATION AND UPDATE IN A RULES-BASED SECURITY SYSTEM
Granted: August 15, 2024
Application Number:
20240275817
A technique for classifying and handling threat data in a rules-based security system. For each rule in the set, a set of one or more first tags are generated. The tags categorize the rule according to a hierarchical scheme. In response to receipt of a new threat, the system automatically determines whether the existing set of rules provide an acceptable coverage for the new threat. This determination is made by generating a set of one or more second tags that categorize the new threat,…
DIGITAL TWIN MODELLING USING TASK KEYWORD ANALYSIS
Granted: August 15, 2024
Application Number:
20240273434
A set of tasks is extracted from workflow data of a system. A set of keywords is extracted from a task in the set of tasks. The set of keywords is expanded into an expanded set of keywords, the expanded set of keywords comprising a new keyword with a semantic relationship to a keyword in the set of keywords. A new task is generated using the expanded set of keywords. Based on a result of execution of the new task, a model of the system is adjusted, the model comprising the workflow data,…
ACTIVITY-BASED SELECTION OF SHARABLE CONTENT IN A SCREEN-SHARING SESSION
Granted: August 8, 2024
Application Number:
20240264793
An embodiment includes determining a first activity value by comparing frames of a first sharable video stream received from a first device associated with a first participant of a screen sharing session. The embodiment also includes generating a first ranked list of activity values, the first ranked list including the first activity value. The embodiment also includes identifying the first activity value as a highest ranking activity value in the first ranked list of activity values.…
DATABASE VALUE PREDICTION
Granted: August 1, 2024
Application Number:
20240257164
Tokenized rows of a training portion of a database are selected, each of the selected tokenized rows having a first token value stored in a first column of the database. Training row vectors are grouped into clusters. From the clusters, prototypes are generated, each prototype comprising a numerical representation of a cluster. From input tokens, an input row vector is generated, the input row vector comprising a numerical representation of input tokens representing data in an input row…
NEURAL NETWORK INFERENCE UNDER HOMOMORPHIC ENCRYPTION
Granted: August 1, 2024
Application Number:
20240256850
A trained neural network is partitioned into a client-side portion and a server-side portion, the client-side portion comprising a first set of layers of the trained neural network, the server-side portion comprising a second set of layers of the trained neural network, the trained neural network trained using a first set of training data. From a homomorphically encrypted intermediate result input to the server-side portion, a homomorphically encrypted output of the trained neural…
VALIDATION SERVER IN TAPE-BASED BACKUP AND ARCHIVE ENVIRONMENTS
Granted: August 1, 2024
Application Number:
20240256645
A method for preventing unauthorized access to tape data is disclosed. In one embodiment, such a method includes maintaining, by a validation server, a lock on a tape drive. The method detects loading, by a requesting server, a tape into the tape drive so that it can be written to. The method confirms, using the validation server, that the requesting server is authorized to write to the tape. The method releases, using the validation server, the lock in response to confirming the…
NAMESPACE SCOPED DEFAULT STORAGE CLASSES
Granted: August 1, 2024
Application Number:
20240256245
An example operation may include one or more of receiving, via an application programming interface (API) of a cluster, a persistent volume claim (PVC) with a specification of a software application, identifying a namespace based on a namespace attribute of the PVC, identifying a storage class which is declared as a default storage class for the identified namespace based on the one or more attributes within the PVC and injecting storage criteria of the default storage class into the…
TAPE DRIVE ERROR RECOVERY PROCEDURE SELECTION BASED ON HUMIDITY
Granted: July 25, 2024
Application Number:
20240249750
In one general embodiment, an apparatus includes a magnetic head, and a controller coupled to the magnetic head, the controller being configured to perform a method that includes measuring humidity in a vicinity of the apparatus in response to detection of an error while performing a data operation on a magnetic recording tape. An error recovery procedure to remove debris on the tape is executed in response to detection of an error and the measured humidity exceeding a predefined upper…
PROXIMITY-BASED DATA ACCESS CONTROL
Granted: July 18, 2024
Application Number:
20240241970
An embodiment determines that a current location is within a threshold proximity to a proximity device and extracts a unique user identifier (UUID) from data received from the proximity device via a first type of network. The embodiment transmits an information request that includes the UUID and a role-based information control (RBIC) identifier to a remote access control system via a second type of network. The embodiment locally stores UUID information received in response to the…
VERIFYING REMOTE EXECUTION OF MACHINE LEARNING INFERENCE UNDER HOMOMORPHIC ENCRYPTION USING PERMUTATIONS
Granted: July 18, 2024
Application Number:
20240243898
A technique to remotely identify potential compromise of a service provider that performs homomorphic inferencing on a model. For a set of real data samples on which the inferencing is to take place, at least first and second permutations of a set of trigger samples are generated. Every set of samples (both trigger and real samples) are then sent for homomorphic inferencing on the model at least twice, and in a secret permutated way. To improve performance, a permutation is packaged with…