Patents by Inventor Shirley M. Han

Shirley M. Han has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11811585
    Abstract: A tool for automatically generating incident management process efficiency metrics utilizing real-time communication analysis. The tool retrieves real-time conversation data from one or more communication sources, wherein the real-time conversation data includes one or more messages having data related to an information technology (IT) incident. The tool performs conversation analysis on the one or more messages. The tool determines one or more timestamps of interest for the IT incident from the one or more messages. The tool generates one or more incident management process efficiency metrics for the IT incident utilizing the one or more timestamps of interest. The tool predicts based, at least in part, on historical conversation data, an outcome for the IT incident. The tool sends the one or more incident management process efficiency metrics and the outcome for the IT incident to a user in a notification.
    Type: Grant
    Filed: March 23, 2021
    Date of Patent: November 7, 2023
    Assignee: International Business Machines Corporation
    Inventors: Shirley M. Han, Rama Kalyani T. Akkiraju, Salil Ahuja, Anbang Xu
  • Patent number: 11770409
    Abstract: A computer-implemented method, computer system, and computer program product for threat management. A set of features used by a machine learning model is collected by the computer system to determine a threat type for an access attempt when the access attempt is detected. A cluster is determined, by the machine learning model in the computer system, for the access attempt using the set of features, wherein the machine learning model implements clustering to determine the cluster for the access attempt, and wherein the cluster for the access attempt corresponds to the threat type for the access attempt. A set of actions is performed by the machine learning model in the computer system based on the threat type determined for the access attempt.
    Type: Grant
    Filed: January 4, 2021
    Date of Patent: September 26, 2023
    Assignee: International Business Machines Corporation
    Inventors: William Wesley Beaver, Oner Sufri, Kevin Potter, Shirley M. Han, Zachary Ryan, Kyle Greeley, ChunHui Y. Higgins, Omar Hammami, Gustavo Adolfo Arismendi Camero, Ryan West, Emilio Fiallos
  • Patent number: 11687709
    Abstract: Provided are a method, system, and computer program product for representing text, in which a text is received and analyzed by utilizing a pre-trained embedding model and a feature vector model, wherein selected words in the text have corresponding weights. Operations whose parameters include weights of a feature vector and an embedding are performed to generate a weighted embedding data structure. A summation is performed of all corresponding columns of a plurality of rows of the weighted embedding data structure to generate a data structure that represents the text. The data structure that represents the text is utilized to generate at least one of a classification metadata for the text and a summarization of the text.
    Type: Grant
    Filed: October 22, 2020
    Date of Patent: June 27, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dylan Zucker, Adham Suliman, Foad Khoshouei, ChunHui Y. Higgins, Raghu Kiran Ganti, Shirley M. Han, Isaiah Santala
  • Publication number: 20220400121
    Abstract: An approach is disclosed that retrieves a set of current system data corresponding to a computer system and a set of current outputs from an anomaly detection model that is monitoring the computer system. The current system data and the anomaly detection model outputs are input to a trained anomaly detection supervisor model. The trained anomaly detection supervisor model processes the inputs and provides a set of performance data corresponding to the anomaly detection model. The anomaly detection model is then adjusted when the set of performance data indicates that the anomaly detection model is performing below a threshold.
    Type: Application
    Filed: June 10, 2021
    Publication date: December 15, 2022
    Inventors: Shirley M. Han, ANBANG XU, Rama Kalyani T. Akkiraju, Salil Ahuja, Xiaotong LIU
  • Publication number: 20220311655
    Abstract: A tool for automatically generating incident management process efficiency metrics utilizing real-time communication analysis. The tool retrieves real-time conversation data from one or more communication sources, wherein the real-time conversation data includes one or more messages having data related to an information technology (IT) incident. The tool performs conversation analysis on the one or more messages. The tool determines one or more timestamps of interest for the IT incident from the one or more messages. The tool generates one or more incident management process efficiency metrics for the IT incident utilizing the one or more timestamps of interest. The tool predicts based, at least in part, on historical conversation data, an outcome for the IT incident. The tool sends the one or more incident management process efficiency metrics and the outcome for the IT incident to a user in a notification.
    Type: Application
    Filed: March 23, 2021
    Publication date: September 29, 2022
    Inventors: Shirley M. Han, Rama Kalyani T. Akkiraju, Salil Ahuja, Anbang Xu
  • Publication number: 20220217177
    Abstract: A computer-implemented method, computer system, and computer program product for threat management. A set of features used by a machine learning model is collected by the computer system to determine a threat type for an access attempt when the access attempt is detected. A cluster is determined, by the machine learning model in the computer system, for the access attempt using the set of features, wherein the machine learning model implements clustering to determine the cluster for the access attempt, and wherein the cluster for the access attempt corresponds to the threat type for the access attempt. A set of actions is performed by the machine learning model in the computer system based on the threat type determined for the access attempt.
    Type: Application
    Filed: January 4, 2021
    Publication date: July 7, 2022
    Inventors: William Wesley Beaver, Oner Sufri, Kevin Potter, Shirley M. Han, Zachary Ryan, Kyle Greeley, ChunHui Y. Higgins, Omar Hammami, Gustavo Adolfo Arismendi Camero, Ryan West, Emilio Fiallos
  • Publication number: 20220129625
    Abstract: Provided are a method, system, and computer program product for representing text, in which a text is received and analyzed by utilizing a pre-trained embedding model and a feature vector model, wherein selected words in the text have corresponding weights. Operations whose parameters include weights of a feature vector and an embedding are performed to generate a weighted embedding data structure. A summation is performed of all corresponding columns of a plurality of rows of the weighted embedding data structure to generate a data structure that represents the text. The data structure that represents the text is utilized to generate at least one of a classification metadata for the text and a summarization of the text.
    Type: Application
    Filed: October 22, 2020
    Publication date: April 28, 2022
    Inventors: Dylan Zucker, Adham Suliman, Foad Khoshouei, ChunHui Y. Higgins, Raghu Kiran Ganti, Shirley M. Han, Isaiah Santala