IBM Patent Applications

REMOTE AUTHENTICATION PROCESSING FOR A LOCAL USER DEVICE

Granted: March 9, 2023
Application Number: 20230072072
An embodiment intercepts an authentication request being sent from a secure web service to a user device associated with a user. The embodiment transmits, responsive to the authentication request, a credential request to a credential storage, wherein the credential request includes a request for a credential associated with the user and the secure web service. The embodiment receives, responsive to the credential request, the credential associated with the user and the secure web…

SECURITY AND TASK PERFORMANCE VALIDATION FOR A COOPERATIVE DEVICE NETWORK

Granted: March 9, 2023
Application Number: 20230069938
A core set of nodes of a graph representing a network of devices is identified, a node of the graph representing a device in the network of devices, an edge of the graph representing an ability to transmit data between two devices represented by corresponding nodes of the graph. A device represented by a node more than one hop from any node in the core set of nodes of the graph is removed from the network of devices, the removing resulting in a validated network of devices. Using a…

COMBINED CLASSICAL/QUANTUM PREDICTOR EVALUATION WITH MODEL ACCURACY ADJUSTMENT

Granted: March 2, 2023
Application Number: 20230065684
Using a model executing on a classical processor, a set of classical features is scored. The scored set of classical features is divided into a set of feature groups, a number of classical features in a group determined according to a qubit capability of a quantum processor. Using a model executing on the quantum processor and a group of the scored set of classical features, a set of quantum features is scored. The score of a quantum feature is adjusted according to an accuracy of the…

DYNAMIC ALLOCATION OF EDGE NETWORK RESOURCES

Granted: March 2, 2023
Application Number: 20230062334
An embodiment includes determining, based on historical data associated with a specific task, a baseline bandwidth recommendation for completing the specific task. The embodiment assigns, for a first time period, the specific task to a first computing device on a network. The embodiment allocates, for the first time period based on the baseline bandwidth recommendation, a first baseline bandwidth to the first computing device. The embodiment allocates, for the first time period, a…

DISTRIBUTED MACHINE LEARNING USING SHARED CONFIDENCE VALUES

Granted: March 2, 2023
Application Number: 20230061268
An embodiment includes generating, by a first edge computing device having a sensor, a dataset based on sensor data from the sensor. The embodiment generates, by an analytics engine hosted by the first edge computing device, a classification dataset comprising a classification for the dataset and a confidence value associated with the classification. The embodiment calculates a confidence difference between the confidence value and a reference confidence value received with a reference…

AUTOMATED DOCUMENT ADAPTATION BASED ON TOPIC CLASSIFICATION

Granted: February 23, 2023
Application Number: 20230056003
Using a logistic regression classification model executing on a processor, a topic is classified into an interaction type in a set of predefined interaction types. A set of documents corresponding to the topic is extracted from a document repository. Using a generative adversarial model executing on a processor, a sentiment corresponding to a reaction to a previous presentation is scored, the scoring resulting in a scored sentiment. Using a trained attention layer model, the interaction…

AUTOMATED SYNTHESIS OF REFERENCE POLICIES FOR RUNTIME MICROSERVICE PROTECTION

Granted: February 16, 2023
Application Number: 20230052827
A method, apparatus and computer program product for automated security policy synthesis and use in a container environment. In this approach, a binary analysis of a program associated with a container image is carried out within a binary analysis platform. During the binary analysis, the program is micro-executed directly inside the analysis platform to generate a graph that summarizes the program's expected interactions within the run-time container environment. The expected…

AUTOMATED SYNTHESIS OF REFERENCE POLICIES FOR RUNTIME MICROSERVICE PROTECTION

Granted: February 16, 2023
Application Number: 20230052827
A method, apparatus and computer program product for automated security policy synthesis and use in a container environment. In this approach, a binary analysis of a program associated with a container image is carried out within a binary analysis platform. During the binary analysis, the program is micro-executed directly inside the analysis platform to generate a graph that summarizes the program's expected interactions within the run-time container environment. The expected…

INTERNAL KEY MANAGEMENT FOR A STORAGE SUBSYSTEM ENCRYPTING DATA IN THE CLOUD

Granted: February 16, 2023
Application Number: 20230052663
A method for sharing data encryption keys among a plurality of storage systems is disclosed. The method generates, by a first storage system, a data encryption key for encrypting data sent from the first storage system to cloud storage. The method stores the encrypted data in the cloud storage in the form of an encrypted data object. In certain embodiments, the first storage system stores an Internet Protocol (IP) address of a second storage system belonging to a same key sharing network…

SUMMARIZING CONVERSATIONS IN A MESSAGING APPLICATION WITH INTERNAL SOCIAL NETWORK DISCOVERY

Granted: February 16, 2023
Application Number: 20230049085
An embodiment includes parsing conversation data to extract a message dataset and a user dataset. The embodiment classifies the message dataset into a category using machine learning processing and identifies the category as a top category based at least in part on an amount of the conversation data associated with the category. The embodiment generates impact data associated with the user dataset based on actions in the conversation data by the user. The embodiment generates role data…

METHODS AND SYSTEMS FOR LEVERAGING COMPUTER-AIDED DESIGN VARIABILITY IN SYNTHESIS TUNING

Granted: February 16, 2023
Application Number: 20230046893
Embodiments for tuning parameters to a synthesis program are provided. At least one set of parameter settings for the synthesis program is selected. A plurality of identical synthesis jobs for the at least one set of parameter settings is run in an iteration of the synthesis program. Results of the iteration of the synthesis program are analyzed utilizing a tuning optimization cost function. Combinations of the parameter settings are created based on the analysis. At least one synthesis…

METHODS AND SYSTEMS FOR LEVERAGING COMPUTER-AIDED DESIGN VARIABILITY IN SYNTHESIS TUNING

Granted: February 16, 2023
Application Number: 20230046893
Embodiments for tuning parameters to a synthesis program are provided. At least one set of parameter settings for the synthesis program is selected. A plurality of identical synthesis jobs for the at least one set of parameter settings is run in an iteration of the synthesis program. Results of the iteration of the synthesis program are analyzed utilizing a tuning optimization cost function. Combinations of the parameter settings are created based on the analysis. At least one synthesis…

QUEUE BYPASSING INTERRUPT HANDLING

Granted: February 16, 2023
Application Number: 20230052672
Within an interrupt routing structure, an interrupt handler is registered, the registering comprising storing a pointer to the interrupt handler in the interrupt routing structure. Responsive to determining that a received interrupt comprises a queuing bypass flag in a set state, the interrupt handler is executed, the executing bypassing an interrupt queueing mechanism.

INTERNAL KEY MANAGEMENT FOR A STORAGE SUBSYSTEM ENCRYPTING DATA IN THE CLOUD

Granted: February 16, 2023
Application Number: 20230052663
A method for sharing data encryption keys among a plurality of storage systems is disclosed. The method generates, by a first storage system, a data encryption key for encrypting data sent from the first storage system to cloud storage. The method stores the encrypted data in the cloud storage in the form of an encrypted data object. In certain embodiments, the first storage system stores an Internet Protocol (IP) address of a second storage system belonging to a same key sharing network…

SUMMARIZING CONVERSATIONS IN A MESSAGING APPLICATION WITH INTERNAL SOCIAL NETWORK DISCOVERY

Granted: February 16, 2023
Application Number: 20230049085
An embodiment includes parsing conversation data to extract a message dataset and a user dataset. The embodiment classifies the message dataset into a category using machine learning processing and identifies the category as a top category based at least in part on an amount of the conversation data associated with the category. The embodiment generates impact data associated with the user dataset based on actions in the conversation data by the user. The embodiment generates role data…

METHODS AND SYSTEMS FOR LEVERAGING COMPUTER-AIDED DESIGN VARIABILITY IN SYNTHESIS TUNING

Granted: February 16, 2023
Application Number: 20230046893
Embodiments for tuning parameters to a synthesis program are provided. At least one set of parameter settings for the synthesis program is selected. A plurality of identical synthesis jobs for the at least one set of parameter settings is run in an iteration of the synthesis program. Results of the iteration of the synthesis program are analyzed utilizing a tuning optimization cost function. Combinations of the parameter settings are created based on the analysis. At least one synthesis…

AUTOMATED SYNTHESIS OF REFERENCE POLICIES FOR RUNTIME MICROSERVICE PROTECTION

Granted: February 16, 2023
Application Number: 20230052827
A method, apparatus and computer program product for automated security policy synthesis and use in a container environment. In this approach, a binary analysis of a program associated with a container image is carried out within a binary analysis platform. During the binary analysis, the program is micro-executed directly inside the analysis platform to generate a graph that summarizes the program's expected interactions within the run-time container environment. The expected…

QUEUE BYPASSING INTERRUPT HANDLING

Granted: February 16, 2023
Application Number: 20230052672
Within an interrupt routing structure, an interrupt handler is registered, the registering comprising storing a pointer to the interrupt handler in the interrupt routing structure. Responsive to determining that a received interrupt comprises a queuing bypass flag in a set state, the interrupt handler is executed, the executing bypassing an interrupt queueing mechanism.

INTERNAL KEY MANAGEMENT FOR A STORAGE SUBSYSTEM ENCRYPTING DATA IN THE CLOUD

Granted: February 16, 2023
Application Number: 20230052663
A method for sharing data encryption keys among a plurality of storage systems is disclosed. The method generates, by a first storage system, a data encryption key for encrypting data sent from the first storage system to cloud storage. The method stores the encrypted data in the cloud storage in the form of an encrypted data object. In certain embodiments, the first storage system stores an Internet Protocol (IP) address of a second storage system belonging to a same key sharing network…

SUMMARIZING CONVERSATIONS IN A MESSAGING APPLICATION WITH INTERNAL SOCIAL NETWORK DISCOVERY

Granted: February 16, 2023
Application Number: 20230049085
An embodiment includes parsing conversation data to extract a message dataset and a user dataset. The embodiment classifies the message dataset into a category using machine learning processing and identifies the category as a top category based at least in part on an amount of the conversation data associated with the category. The embodiment generates impact data associated with the user dataset based on actions in the conversation data by the user. The embodiment generates role data…