Patents by Inventor Bong-Jun Ko

Bong-Jun Ko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11121909
    Abstract: A computer-implemented method includes: receiving, using a processor, multiple data session records (DSRs); storing the multiple DSRs in a memory communicatively coupled to the processor; analyzing, using the processor, the stored multiple DSRs for temporal and spatial data; and determining, using the processor, quality degradation by using the temporal and spatial data for the stored multiple DSRs.
    Type: Grant
    Filed: April 11, 2019
    Date of Patent: September 14, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Parul Gupta, Shivkumar Kalyanaraman, Bong Jun Ko, Vinay Kumar Kolar, Ravi Kothari, Kang-Won Lee, Ramya Raghavendra, Dinesh C. Verma, Petros Zerfos
  • Publication number: 20210281309
    Abstract: Aspects of the invention include methods of performing beam management in a base station of a cellular network. A method includes obtaining, at the base station, information indicating whether one or more terminals of the cellular network have data to transmit, and determining, using the base station, during a sweep by the base station if an upcoming terminal has data to transmit based on the information. The sweep by the base station is a sequential movement of the beam over a coverage area. The method also includes foregoing, by the base station, any communication with the upcoming terminal during the sweep based on the information indicating that the upcoming terminal has no data to transmit, and communicating, using the base station, with the upcoming terminal during the sweep based on the information indicating that the upcoming terminal has data to transmit.
    Type: Application
    Filed: March 6, 2020
    Publication date: September 9, 2021
    Inventors: Dinesh C. Verma, Ramya Raghavendra, Bong Jun Ko, Mudhakar Srivatsa, Nirmit V. Desai, Raghu Kiran Ganti, Shiqiang Wang, Supriyo Chakraborty
  • Publication number: 20210282067
    Abstract: A computer-implemented method for delivering network connectivity includes receiving, by an edge server, a set of communication packets from a communication device. The method further includes storing, by the edge server, the set of communication packets as part of outbound data. The method further includes determining, by the edge server, that a mobile access point is within a communicable range of the edge server. The mobile access point travels back and forth between the edge server and a base station. The method further includes transmitting, by the edge server, the outbound data to the mobile access point that is within the communicable range.
    Type: Application
    Filed: March 6, 2020
    Publication date: September 9, 2021
    Inventors: Dinesh C. VERMA, Ramya RAGHAVENDRA, Bong Jun KO, Mudhakar SRIVATSA, Niramit V. DESAI, Raghu Kiran GANTI, Shiqiang WANG, Supriyo CHAKRABORTY
  • Publication number: 20210271998
    Abstract: A provenance method, system, and non-transitory computer readable medium for a plurality of eidetic systems having logs, include crawling the logs of each node of a plurality of nodes of the eidetic systems to cluster segments across the logs of temporally correlated events into clustered segments and analyzing the correlated segments to interleave an order of processes in the logs and assign a probability to the order of the processes occurring.
    Type: Application
    Filed: May 13, 2021
    Publication date: September 2, 2021
    Inventors: Bong Jun Ko, Christian Makaya, Jorge J. Ortiz, Swati Rallapalli, Dinesh C. Verma, Xiping Wang
  • Patent number: 11055623
    Abstract: A provenance method, system, and non-transitory computer readable medium for a plurality of eidetic systems having logs, include a log-segment clustering circuit configured to crawl the logs of each of the eidetic systems to cluster segments across the logs of temporally correlated events into clustered segments, a probabilistic interleaving circuit configured to analyze the correlated segments to interleave an order of processes in the logs and assign a probability to the order of the processes occurring, and a probabilistic linearization circuit configured to create a probability tree which includes a total probability that a process in the clustered segments causes a next process in the clustered segments until an end of the temporal event of the clustered segments for each of the interleaved order of processes interleaved by the probabilistic interleaving circuit.
    Type: Grant
    Filed: June 20, 2016
    Date of Patent: July 6, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bong Jun Ko, Christian Makaya, Jorge J. Ortiz, Swati Rallapalli, Dinesh C. Verma, Xiping Wang
  • Publication number: 20210158099
    Abstract: A method, a computer program product, and a computer system determine when to perform a federated learning process. The method includes identifying currently available contributors among contributors of a federated learning task for which the federated learning process is to be performed. The method includes determining a usefulness metric of the currently available contributors for respective datasets from each of the currently available contributors used in performing the federated learning process. The method includes, as a result of the usefulness metric of the currently available contributors being at least a usefulness threshold, generating a recommendation to perform the federated learning process with the datasets of the currently available contributors. The method includes transmitting the recommendation to a processing component configured to perform the federated learning process.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Tiffany Tuor, Shiqiang Wang, Changchang Liu, Bong Jun KO, Wei-Han Lee
  • Publication number: 20210141414
    Abstract: Embodiments are disclosed for a method for a wearable secure data device. The method includes setting an operational mode for the wearable secure data device that stores a plurality of secure data items. The method also includes receiving a request for at least one of the secure data items from a client device that is communicating with a third-party device. Additionally, the method includes determining if the operational mode is associated with allowing access to the secure data items. Further, the method includes providing a response based on the determination.
    Type: Application
    Filed: November 12, 2019
    Publication date: May 13, 2021
    Inventors: Dinesh C. Verma, Bong Jun KO, Shahrokh DAIJAVAD, Nirmit V Desai, MUDHAKAR SRIVATSA
  • Patent number: 10963363
    Abstract: A method, system and computer program product for adaptive system monitoring. In one embodiment, the method comprises generating time-varying correlation graphs indicating correlations between a multitude of parameters of the system, and using the correlation graphs to identify monitoring logic for monitoring the system. In an embodiment, the correlation graphs are used to select a group of the parameters as monitoring parameters, and these monitoring parameters are dynamically changed. In one embodiment, the monitoring parameters form sets of monitoring parameters, and each set of monitoring parameters is used to monitor the system for an associated period of time. The lengths of these monitoring periods are changed based on the rate of change of the correlation graphs. In an embodiment, the rate at which the monitoring parameters are changed is itself changed based on the rate of change of the correlation graphs.
    Type: Grant
    Filed: January 30, 2020
    Date of Patent: March 30, 2021
    Assignee: International Business Machines Corporation
    Inventors: Ramya Raghavendra, Murtaza Zafer, Bong Jun Ko
  • Publication number: 20210049020
    Abstract: Regulating a flow of data from an electronic device comprises generating a user profile associated with a user. Further, a resource profile is generated and is associated with one or more resources external to the electronic device. Additionally, a context profile is generated and describes an outcome of one or more previous interactions between the user of the electronic device and one or more resources. Rules are generated based on a comparison the user profile, the context profile and the site profile. Further, data sent from an electronic device is modified based on the set of rules.
    Type: Application
    Filed: August 16, 2019
    Publication date: February 18, 2021
    Inventors: Dinesh C. Verma, Bong Jun KO, Wei-Han Lee, Seraphin Bernard Calo
  • Publication number: 20210027761
    Abstract: Audio data of an original work is received. Text in the audio data is translated to a target language. The audio data is passed to a first deep learning model to learn voice features in the audio data. The audio data is passed to a second deep learning model to learn audio properties in the audio data. The translated text is synchronized to play in the position of original text of the original work in a synthesized voice. A translated audio data of the original work is created by combining the synchronized translated text in the synthesized voice with music of the audio data.
    Type: Application
    Filed: July 26, 2019
    Publication date: January 28, 2021
    Inventors: Shonda A. Witherspoon, Shalisha Witherspoon, Bong Jun Ko
  • Publication number: 20200364613
    Abstract: Method and apparatus for exchanging corpora via a data broker are provided. One example method generally includes receiving, at the data broker from a holder of a first corpus application, a coreset for the first corpus and transmitting the coreset to a set of data providers. The method further includes receiving, from a first data provider of the set of data providers, a value with respect to the coreset of a second corpus associated with the first data provider and transmitting, from the data broker to the holder of the first corpus, the value. The method further includes receiving, at the data broker from the holder of the first corpus, a request to receive the second corpus and receiving the second corpus from the first data provider. The method further includes validating the value of the second corpus and transmitting the second corpus to the holder of the first corpus.
    Type: Application
    Filed: May 17, 2019
    Publication date: November 19, 2020
    Inventors: MUDHAKAR SRIVATSA, Shiqiang Wang, Joshua M. Rosenkranz, SUPRIYO CHAKRABORTY, Bong Jun KO
  • Publication number: 20200328934
    Abstract: A computer-implemented method includes: receiving, using a processor, multiple data session records (DSRs); storing the multiple DSRs in a memory communicatively coupled to the processor; analyzing, using the processor, the stored multiple DSRs for temporal and spatial data; and determining, using the processor, quality degradation by using the temporal and spatial data for the stored multiple DSRs.
    Type: Application
    Filed: April 11, 2019
    Publication date: October 15, 2020
    Inventors: Parul Gupta, Shivkumar Kalyanaraman, Bong Jun KO, Vinay Kumar Kolar, Ravi Kothari, Kang-Won Lee, Ramya Raghavendra, Dinesh C. Verma, Petros Zerfos
  • Patent number: 10785646
    Abstract: A method is provided for transmitter authentication including generating a noise vector using a generative adversarial network generator model, wherein a signature of a first transmitter is embedded into a signal output by the first transmitter based at least on the noise vector; and using the signature to identify the first transmitter.
    Type: Grant
    Filed: August 24, 2018
    Date of Patent: September 22, 2020
    Assignee: International Business Machines Corporation
    Inventors: Supriyo Chakraborty, Bodhisatwa Sadhu, Bong Jun Ko, Dinesh C. Verma
  • Publication number: 20200213354
    Abstract: A GAN includes a first device and a second device. A discriminator model in the first device is trained to discriminate samples from a transmitter in the first device from samples from other transmitters, by collaborating by the first device with the second device to train the discriminator model to discriminate between samples from its transmitter and spoofed samples received from a generator model in the second device and to train the generator model in the second device to produce more accurate spoofed samples received by the first device during the training. The training results in a trained discriminator model, which is distributed to another device for use by the other device to discriminate samples received by the other device in order to perform authentication of the transmitter in the first device. The other device performs authentication of the transmitter of the first device using the distributed model.
    Type: Application
    Filed: January 2, 2019
    Publication date: July 2, 2020
    Inventors: Supriyo CHAKRABORTY, Bodhisatwa SADHU, Bong Jun KO, Dinesh C. VERMA
  • Publication number: 20200167260
    Abstract: A method, system and computer program product for adaptive system monitoring. In one embodiment, the method comprises generating time-varying correlation graphs indicating correlations between a multitude of parameters of the system, and using the correlation graphs to identify monitoring logic for monitoring the system. In an embodiment, the correlation graphs are used to select a group of the parameters as monitoring parameters, and these monitoring parameters are dynamically changed. In one embodiment, the monitoring parameters form sets of monitoring parameters, and each set of monitoring parameters is used to monitor the system for an associated period of time. The lengths of these monitoring periods are changed based on the rate of change of the correlation graphs. In an embodiment, the rate at which the monitoring parameters are changed is itself changed based on the rate of change of the correlation graphs.
    Type: Application
    Filed: January 30, 2020
    Publication date: May 28, 2020
    Inventors: Ramya Raghavendra, Murtaza Zafer, Bong Jun KO
  • Publication number: 20200118042
    Abstract: A user input is analyzed during labeling of a first portion of data to determine a behavior of a user. A labeling accuracy rate of the user is forecasted. A characteristic of a second portion of data to be presented to the user at a second time is determined. The second portion of data is presented to the user. A second label corresponding to the second portion of data is received. A second user input is analyzed to determine a second behavior of the user. The accuracy prediction model is refined. A second labeling accuracy rate of the user is forecasted. The recommendation model is refined.
    Type: Application
    Filed: October 15, 2018
    Publication date: April 16, 2020
    Applicant: International Business Machines Corporation
    Inventors: Shiqiang Wang, Irene Lizeth Manotas Gutierrez, Bong Jun Ko, Keith William Grueneberg
  • Patent number: 10599545
    Abstract: A method, system and computer program product for adaptive system monitoring. In one embodiment, the method comprises generating time-varying correlation graphs indicating correlations between a multitude of parameters of the system, and using the correlation graphs to identify monitoring logic for monitoring the system. In an embodiment, the correlation graphs are used to select a group of the parameters as monitoring parameters, and these monitoring parameters are dynamically changed. In one embodiment, the monitoring parameters form sets of monitoring parameters, and each set of monitoring parameters is used to monitor the system for an associated period of time. The lengths of these monitoring periods are changed based on the rate of change of the correlation graphs. In an embodiment, the rate at which the monitoring parameters are changed is itself changed based on the rate of change of the correlation graphs.
    Type: Grant
    Filed: April 24, 2012
    Date of Patent: March 24, 2020
    Assignee: International Business Machines Corporation
    Inventors: Bong Jun Ko, Ramya Raghavendra, Murtaza Zafer
  • Publication number: 20200068398
    Abstract: A method is provided for transmitter authentication including generating a noise vector using a generative adversarial network generator model, wherein a signature of a first transmitter is embedded into a signal output by the first transmitter based at least on the noise vector; and using the signature to identify the first transmitter.
    Type: Application
    Filed: August 24, 2018
    Publication date: February 27, 2020
    Inventors: SUPRIYO CHAKRABORTY, BODHISATWA SADHU, BONG JUN KO, DINESH C. VERMA
  • Publication number: 20190318268
    Abstract: A training process of a machine learning model is executed at the edge node for a number of iterations to generate a model parameter based at least in part on a local dataset and a global model parameter. A resource parameter set indicative of resources available at the edge node is estimated. The model parameter and the resource parameter set are sent to a synchronization node. Updates to the global model parameter and the number of iterations are received from the synchronization node based at least in part on the model parameter and the resource parameter set of edge nodes. The training process of the machine learning model is repeated at the edge node to determine an update to the model parameter based at least in part on the local dataset and updates to the global model parameter and the number of iterations from the synchronization node.
    Type: Application
    Filed: April 13, 2018
    Publication date: October 17, 2019
    Inventors: Shiqiang Wang, Tiffany Tuor, Theodoros Salonidis, Christian Makaya, Bong Jun KO
  • Publication number: 20190272299
    Abstract: A data mining method, system, and non-transitory computer readable medium, include defining a set of filter constraints as a filter function for clustering users' private records of data of a private domain, selecting a subset of users' public records of data from a filtered set of data from a public domain that is common with the users' private records of data, and creating a data file including the matched user of the private domain to the public records of the user of the private domain, where the set of the filter constraints comprises a function that captures the subset of the users' public records of data who are of interest to the private domain, and only performs data mining with that set of information from the public domain.
    Type: Application
    Filed: May 10, 2019
    Publication date: September 5, 2019
    Inventors: Nirmit V. Desai, Bong Jun Ko, Jorge J. Ortiz, Swati Rallapalli, Theodores Salonidis, Rahul Urgaonkar, Dinesh C. Verma