IBM Patent Applications

PRODUCT DESIGN GENERATOR

Granted: January 23, 2025
Application Number: 20250029160
An embodiment establishes a product design database based at least in part on product design data received from a product image repository, wherein the product design data is representative of a plurality of product designs. The embodiment ranks each product design based on a ranking metric derived from market data corresponding to existing retail products. The embodiment constructs a product design ranking based on a relative ranking between each of the product designs that have been…

FINE-TUNED MODEL TO SOURCE FOUNDATION MODEL ATTRIBUTION

Granted: January 23, 2025
Application Number: 20250028992
An embodiment causes generating, by a trained model, a training prompt response to a training prompt in a set of training prompts. An embodiment trains, using the training prompt and the training prompt response, an attribution model, the training resulting in a trained attribution model. An embodiment attributes, using the trained attribution model and a first prompt response generated by a fine-tuned model in response to a prompt, the fine-tuned model to a foundation model.

MULTIPLE DISPLAY CONFIGURATION TECHNIQUE

Granted: January 23, 2025
Application Number: 20250028494
A method for configuring multiple displays connected to a common computing system is disclosed. In one embodiment, a computing system detects multiple displays connected thereto. The computing system causes at least one of the displays to emit a lighting pattern. This lighting pattern may include, for example, sequentially displaying a selected background color and/or pattern on each of the displays. The computing system detects the lighting pattern using one or more cameras connected to…

RANSOMWARE SAFE FILESYSTEM (RSFS)

Granted: January 16, 2025
Application Number: 20250021686
A method for preventing unauthorized access to a filesystem begins by configuring a data table in association with the filesystem. The table comprises a set of metadata for each application registered to access the filesystem. A filesystem driver uses information in the table to manage access to the filesystem. In particular, and in response to receipt of a filesystem access initiated by a requesting application, the driver first verifies the integrity of the data table. If table…

SCALABLE DATA OBFUSCATION FOR DIFFERENT IDENTIFIER TYPES

Granted: January 16, 2025
Application Number: 20250021678
A computer-implemented method, according to one embodiment, includes: receiving a request to mask an input value, and in response to receiving the request, determining a domain size of the input value. A rank score of the input value is also determined. The domain size and the rank score are used to generate a unique value correlated with the input value. Moreover, the unique value is unranked by converting characters of the unique value to create a masked string value. The input value…

DYNAMIC MIGRATION OF VIRTUAL MACHINE SNAPSHOTS TO CONTAINER PLATFORMS

Granted: January 9, 2025
Application Number: 20250013481
A method for migrating virtual machine snapshots to application container platforms is disclosed. In one embodiment, such a method includes migrating, from a virtual machine platform to a volume on a container platform, a base disk file associated with a virtual machine. The base disk file has one or more delta disk files associated therewith, where each delta disk file records changes made to the virtual machine after a snapshot was taken. After migrating the base disk file, the method…

DYNAMIC MIGRATION OF VIRTUAL MACHINE SNAPSHOTS TO CONTAINER PLATFORMS

Granted: January 9, 2025
Application Number: 20250013480
A method for migrating virtual machine snapshots to application container platforms is disclosed. In one embodiment, such a method includes migrating, from a virtual machine platform to a volume on a container platform, a base disk file associated with a virtual machine. The base disk file has one or more delta disk files associated therewith, where each delta disk file records changes made to the virtual machine after a snapshot was taken. After migrating the base disk file, the method…

GLOBAL CONTROL ACCESS PLATFORM

Granted: January 2, 2025
Application Number: 20250007920
A method for providing controlled access to resources in an enterprise begins by defining a “mesh” that associates a workplace team to a set of one or more workplace resources. The team has a role that, with respect to the resources, has a set of access permissions. An individual that is not then associated with the workplace team, e.g., in the given role, is assigned a physical or virtual token that represents the individual in the workplace environment. In response to detecting…

AUTOMATED VIDEO CLIP SELECTION FOR INCLUSION IN TARGETED COMMUNICATIONS

Granted: January 2, 2025
Application Number: 20250008196
A method for identifying video clips for inclusion in a targeted communication is disclosed. In one embodiment, such a method includes receiving video footage comprising multiple clips. The method receives multiple information streams that are associated with the video footage and synchronizes the information streams with the video footage. The method applies weights to the information streams, aggregates the weighted information streams, and identifies peaks therein. Clips are then…

OPTIMIZATION OF LIVE STREAM PRODUCTIONS

Granted: January 2, 2025
Application Number: 20250008166
An embodiment optimizes a live stream event by annotating a script with markers for a live stream event. The embodiment defines an element within the live stream event. The embodiment defines a performance milestone within the element. The embodiment associates a first action with the performance milestone. The embodiment constructs a trigger within the script. The embodiment associates the trigger with a corresponding second action. The embodiment monitors the live stream event for the…

TECHNIQUE TO HANDLE INSUFFICIENT ON-CHIP MEMORY CAPACITY IN DECOMPRESSORS

Granted: January 2, 2025
Application Number: 20250004638
A method to handle insufficient on-chip memory capacity in decompressors is disclosed. In one embodiment, such a method includes executing, by a decompressor configured to decompress data, an instruction configured to copy data from a source position within a data stream to a destination position within the data stream. The method determines whether the source position currently resides within an on-chip buffer of the decompressor. In the event the source position does not currently…

CLIENT-SERVER RESPONSE TIME BASED COMPUTER SYSTEM GEOLOCATION

Granted: January 2, 2025
Application Number: 20250007730
An embodiment sends, at a first time, from a boundary server to a client system in response to a challenge request, a challenge specifying a computational problem to be solved by the client system, the boundary server specified in a challenge list sent to the client system. An embodiment receives, at a second time, at the boundary server, a challenge response from the client system, the challenge response comprising a solution to the computational problem. An embodiment generates, at the…

CHIPLET ARCHITECTURE FOR INFERENCE, FINE-TUNING TRAINING, AND TRANSFER LEARNING

Granted: January 2, 2025
Application Number: 20250005371
A method for training and fine-tuning an artificial intelligence model is disclosed. In one embodiment, such a method distributes, across multiple chiplets of a package, functionality associated with a deep neural network. The method implements, within a first set of chiplets, frozen layers of the deep neural network. By contrast, the method implements, within a second set of chiplets, trainable layers of the deep neural network. The number of chiplets in the second set may be smaller…

CONTEXT-AWARE CRYPTOGRAPHIC INVENTORY

Granted: January 2, 2025
Application Number: 20250005163
An embodiment constructs a knowledge graph based on data received from a system wherein the knowledge graph comprises a plurality of entities and relationships among the plurality of entities which represent a context information of the knowledge graph. The embodiment assigns a unique identifier to a designated entity. The embodiment expresses in natural language the unique identifier, an associated label, an associated property name, an associated property value, an associated…

ADAPTIVE AUTONOMOUS ROAD SIGN CLASSIFICATION WITH FORERUNNER VEHICLE UTILIZATION

Granted: January 2, 2025
Application Number: 20250005139
A method for countering adversarial attacks on deep neural networks is disclosed. In one embodiment, such a method includes observing, by a first system, actual traffic behavior within a transportation network. The method classifies, by a deep neural network of a second system, a traffic sign for regulating traffic within the transportation network. The method determines whether a conflict exists between the actual traffic behavior and expected traffic behavior based on the traffic sign.…

PREVENTING ACCIDENTAL PASSWORD DISCLOSURE

Granted: January 2, 2025
Application Number: 20250005119
A computer-implemented method, according to one embodiment, includes: receiving a preliminary password key from a user, and in response to receiving the preliminary password, determining whether a cursor of a graphical user interface is located in a password entry field. In response to determining that the cursor of the graphical user interface is not located in the password entry field, a warning is issued to the user. Additionally, any inputs that are received from the user are…

ADAPTIVE OUTLIER DETECTION AND CORRECTION

Granted: January 2, 2025
Application Number: 20250005001
An embodiment detects, by an outlier detector, a first potential outlier in a data structure. The embodiment determines, by the outlier detector, whether the first potential outlier is a first outlier based on a first threshold. The embodiment applies, by an outlier corrector, responsive to determining the first potential outlier is a first outlier, a data quality rule to the first outlier. The embodiment detects, by the outlier detector, a second potential outlier in the data structure.…

DETECTION OF ANOMALOUS SYSTEM BEHAVIOR

Granted: January 2, 2025
Application Number: 20250004868
An embodiment establishes a system behavior database based at least in part on behavior data received from a system, wherein the system behavior database comprises a set of historical observations of behavior of the system. The embodiment samples current behavior data from the system. The embodiment generates a current observation based on the current behavior data that was sampled. The embodiment compares the current observation to each historical observation of the set of historical…

OPTIMIZATION OF CLOUD EGRESS TASKS

Granted: January 2, 2025
Application Number: 20250004860
An embodiment includes computing a computational cost of a job, using a first machine learning algorithm. The job may include an original amount of an egress of data from a cloud computing environment. The embodiment includes determining, using a second machine learning algorithm, the amount of the egress of data corresponding to the job has a computer business criticality that exceeds a threshold level of business criticality. The embodiment includes analyzing a current egress plan used…

CONTINUOUS STRATEGIC ALIGNMENT IN CLOUD-BASED ENVIRONMENTS

Granted: January 2, 2025
Application Number: 20250004803
An embodiment predicts a plurality of strategies associated with a cloud workload. The embodiment presents the predicted plurality of strategies to a user for selection of a strategy. The embodiment predicts a first technology for the cloud workload having a first technology strategic potential value based on the selected strategy. The embodiment predicts a first deployment for the cloud workload having a first deployment strategic potential value based on the selected strategy. The…