IBM Patent Applications

DETECTION OF ANOMALOUS SYSTEM BEHAVIOR

Granted: January 2, 2025
Application Number: 20250004868
An embodiment establishes a system behavior database based at least in part on behavior data received from a system, wherein the system behavior database comprises a set of historical observations of behavior of the system. The embodiment samples current behavior data from the system. The embodiment generates a current observation based on the current behavior data that was sampled. The embodiment compares the current observation to each historical observation of the set of historical…

OPTIMIZATION OF LIVE STREAM PRODUCTIONS

Granted: January 2, 2025
Application Number: 20250008166
An embodiment optimizes a live stream event by annotating a script with markers for a live stream event. The embodiment defines an element within the live stream event. The embodiment defines a performance milestone within the element. The embodiment associates a first action with the performance milestone. The embodiment constructs a trigger within the script. The embodiment associates the trigger with a corresponding second action. The embodiment monitors the live stream event for the…

GLOBAL CONTROL ACCESS PLATFORM

Granted: January 2, 2025
Application Number: 20250007920
A method for providing controlled access to resources in an enterprise begins by defining a “mesh” that associates a workplace team to a set of one or more workplace resources. The team has a role that, with respect to the resources, has a set of access permissions. An individual that is not then associated with the workplace team, e.g., in the given role, is assigned a physical or virtual token that represents the individual in the workplace environment. In response to detecting…

CHIPLET ARCHITECTURE FOR INFERENCE, FINE-TUNING TRAINING, AND TRANSFER LEARNING

Granted: January 2, 2025
Application Number: 20250005371
A method for training and fine-tuning an artificial intelligence model is disclosed. In one embodiment, such a method distributes, across multiple chiplets of a package, functionality associated with a deep neural network. The method implements, within a first set of chiplets, frozen layers of the deep neural network. By contrast, the method implements, within a second set of chiplets, trainable layers of the deep neural network. The number of chiplets in the second set may be smaller…

DOMAIN ADAPTATION-BASED DISGUISING OF PROMPTS FOR DATA PRIVACY IN FOUNDATION MODELS

Granted: January 2, 2025
Application Number: 20250005182
A privacy-preserving method of accessing a model as a service (e.g., a language model) receives an input prompt authored in a first domain having data intended to be maintained private. In response, and using a conversion model, the input prompt authored in the first domain is converted to a second domain to create a converted input prompt. The converted input prompt preserves a semantic context of the input prompt. The converted input prompt is then delivered to the model as a service,…

RANSOMWARE MITIGATION USING VERSIONING AND ENTROPY DELTA-BASED RECOVERY

Granted: January 2, 2025
Application Number: 20250005146
A mitigation system protects data in a data store that is not yet encrypted by a successful ransomware attack against encryption. Data is stored in the data store as a set of versions identified in a data tree, and a version can only be updated by writing a new version to the tree. Access controls to prevent modification of the tree are also in place. Following an attack, a restore function is executed to attempt recovery. This function computes an entropy delta that compares an entropy…

ADAPTIVE AUTONOMOUS ROAD SIGN CLASSIFICATION WITH FORERUNNER VEHICLE UTILIZATION

Granted: January 2, 2025
Application Number: 20250005139
A method for countering adversarial attacks on deep neural networks is disclosed. In one embodiment, such a method includes observing, by a first system, actual traffic behavior within a transportation network. The method classifies, by a deep neural network of a second system, a traffic sign for regulating traffic within the transportation network. The method determines whether a conflict exists between the actual traffic behavior and expected traffic behavior based on the traffic sign.…

PREVENTING ACCIDENTAL PASSWORD DISCLOSURE

Granted: January 2, 2025
Application Number: 20250005119
A computer-implemented method, according to one embodiment, includes: receiving a preliminary password key from a user, and in response to receiving the preliminary password, determining whether a cursor of a graphical user interface is located in a password entry field. In response to determining that the cursor of the graphical user interface is not located in the password entry field, a warning is issued to the user. Additionally, any inputs that are received from the user are…

ROBUST GRAPH REPRESENTATION OF CAUSAL RELATIONSHIPS EXPRESSED IN A NATURAL LANGUAGE DOCUMENT

Granted: January 2, 2025
Application Number: 20250005106
An embodiment extracts, from a natural language document, using a first language model, a set of cause-effect pairs, each cause-effect pair comprising a pair of phrases, each phrase comprising a portion of the natural language document. An embodiment constructs a first graph representing the set of cause-effect pairs, each node in the first graph representing a phrase in the set of phrases, each edge in the first graph representing a cause-effect relationship between nodes connected by…

ADAPTIVE OUTLIER DETECTION AND CORRECTION

Granted: January 2, 2025
Application Number: 20250005001
An embodiment detects, by an outlier detector, a first potential outlier in a data structure. The embodiment determines, by the outlier detector, whether the first potential outlier is a first outlier based on a first threshold. The embodiment applies, by an outlier corrector, responsive to determining the first potential outlier is a first outlier, a data quality rule to the first outlier. The embodiment detects, by the outlier detector, a second potential outlier in the data structure.…

CONTINUOUS STRATEGIC ALIGNMENT IN CLOUD-BASED ENVIRONMENTS

Granted: January 2, 2025
Application Number: 20250004803
An embodiment predicts a plurality of strategies associated with a cloud workload. The embodiment presents the predicted plurality of strategies to a user for selection of a strategy. The embodiment predicts a first technology for the cloud workload having a first technology strategic potential value based on the selected strategy. The embodiment predicts a first deployment for the cloud workload having a first deployment strategic potential value based on the selected strategy. The…

TECHNIQUE TO HANDLE INSUFFICIENT ON-CHIP MEMORY CAPACITY IN DECOMPRESSORS

Granted: January 2, 2025
Application Number: 20250004638
A method to handle insufficient on-chip memory capacity in decompressors is disclosed. In one embodiment, such a method includes executing, by a decompressor configured to decompress data, an instruction configured to copy data from a source position within a data stream to a destination position within the data stream. The method determines whether the source position currently resides within an on-chip buffer of the decompressor. In the event the source position does not currently…

HOST RESOURCE INTERACTION IN VIRTUAL CONFERENCE ENVIRONMENTS

Granted: January 2, 2025
Application Number: 20250004626
An embodiment parses, by a host plugin, a host content view into a plurality of host resources. The embodiment identifies, by an attendee plugin, an attendee interaction with a host resource in the plurality of host resources. The embodiment transmits, by the attendee plugin, based on the attendee interaction, a resource request for the host resource. The embodiment transmits, by the host plugin, based on the resource request, a host resource content associated with the host resource.…

DYNAMIC AND AUTOMATIC PLAYBOOK GENERATION USING CONTEXTUAL NETWORK RESPONSES

Granted: December 26, 2024
Application Number: 20240430295
An approach is provided for dynamically and automatically generating a playbook. A new incident and the tactics, techniques, and procedures (TTP) specifying the new incident are identified. The TTP are mapped to actions included in a TTP-based response matrix, which associates actions that address security incidents with respective TTPs that specify the security incidents. The actions are mapped to technologies in a defense capabilities matrix, which associates technologies deployed by…

CONTEXT BASED TRANSLATION AND ORDERING OF WEBPAGE TEXT ELEMENTS

Granted: December 26, 2024
Application Number: 20240427834
A computer-implemented method, according to one embodiment, includes determining a domain and category information from metadata associated with a first webpage. The method further includes determining component types, hierarchies and grouping relationships for a plurality of text elements on the first webpage and constructing context information for the text elements. Word vectors are calculated based on the grouping relationships and the context information, and text feature types of…

OVERFLOW OF ON-PREMISES HOST WORKLOADS ONTO SECURE CLOUD

Granted: December 26, 2024
Application Number: 20240427640
An embodiment provisions overflow from on-premises cloud workload onto a secure infrastructure provider. The embodiment senses a performance metric of an on-premises cloud. The embodiment deciding, responsive to the sensed performance metric, to scale up, senses a property of an infrastructure provider, responsive to the sensed property, selects the infrastructure provider. The embodiment generates credentials, creates a secure environment, establishes secure communications, and…

MULTI-TIERED HYBRID MULTI-CLOUD SERVICE MANAGEMENT ARCHITECTURE

Granted: December 26, 2024
Application Number: 20240427639
An embodiment detects an inter-cloud service negotiation between a plurality of cloud environments, the inter-cloud service negotiation indicating an interaction between the plurality of cloud environments. The embodiment identifies a plurality of local controllers in the plurality of cloud environments, a local controller in the plurality of local controllers being a computer control node configured to manage resources associated a cloud environment in the plurality of cloud…

CONTROLLER-RESOURCE OBJECT TOPOLOGY ANALYSIS FOR CLUSTER CONFIGURATION MANAGEMENT

Granted: December 26, 2024
Application Number: 20240427574
An embodiment causes inserting, into kernel code of an operating system, during execution of the operating system, a traffic monitoring code module. An embodiment extracs, using the traffic monitoring code module, from a plurality of messages between components of a cluster management system managing a first cluster of systems, a first message relating to a resource object, the resource object representing a resource within the first cluster of systems, the traffic monitoring code module…

COLLABORATIVE ASSISTANCE PLATFORM

Granted: December 19, 2024
Application Number: 20240419697
A computer-implemented method comprises generating an event from a task demonstration within a digital channel, forming a collaboration context based on the event, defining a collaboration by associating an assistive action with the collaboration context, transforming the collaboration context into a conversational model, evaluating an interaction session within the digital channel for an interaction that matches the collaboration context, and upon detection of the interaction that…

SIGNATURE DISCOURSE TRANSFORMATION

Granted: December 19, 2024
Application Number: 20240419890
The illustrative embodiments provide for signature discourse transformation. An embodiment includes detecting a signature discourse of a user by analyzing the user's discourse using corpus linguistics. The embodiment also includes generating computing a collection of words distinct to the user. The embodiment also includes sensing, using tone analysis and a natural language process model, a tone of the collection of words distinct to the user in the signature discourse utterance. The…