Patents by Inventor Bong-Jun Ko

Bong-Jun Ko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9742669
    Abstract: A method for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Grant
    Filed: July 26, 2016
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song
  • Publication number: 20170230851
    Abstract: Various embodiments manage service issues within a wireless communication network. In one embodiment, a one or more call detail records associated with a set of wireless communication devices of a wireless communication network is received. A set of information within each of the one or more call detail records is compared to a baseline statistical model. The baseline statistical model identifies a normal operating state of the wireless communication network. At least one outlier call detail record in the one or more call detail records is identified based on the comparison. The at least one outlier call detail record indicates that at least one wireless communication device associated with the at least one outlier call detail record experienced one or more service issues.
    Type: Application
    Filed: April 25, 2017
    Publication date: August 10, 2017
    Applicant: International Business Machines Corporation
    Inventors: Bong Jun KO, Kang-Won LEE, Ramya RAGHAVENDRA, Murtaza ZAFER
  • Publication number: 20170185634
    Abstract: Methods and systems for execution of distributed analytics include building a global linked structure that describes correspondences between dataset metadata structures, analytics metadata structures, and location metadata structures and that encodes compatibility between respective datasets, analytics, and locations. A set of analytics and compatible datasets for execution is determined based on the dataset metadata structures, analytics metadata structures, and global linked structure. An optimal execution location is determined based on the determined set of analytics and compatible datasets, the location metadata structures, and the global linked structure. The set of analytics and compatible datasets are deployed to the optimal location for execution.
    Type: Application
    Filed: December 28, 2015
    Publication date: June 29, 2017
    Inventors: Theodoros Salonidis, Bong Jun Ko, Rahul Urgaonkar, Swati Rallapalli
  • Publication number: 20170169205
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Application
    Filed: January 11, 2017
    Publication date: June 15, 2017
    Inventors: SERAPHIN B. CALO, BONG JUN KO, KANG-WON LEE, THEODOROS SALONIDIS, DINESH C. VERMA
  • Publication number: 20170169237
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Application
    Filed: December 15, 2015
    Publication date: June 15, 2017
    Inventors: SERAPHIN B. CALO, BONG JUN KO, KANG-WON LEE, THEODOROS SALONIDIS, DINESH C. VERMA
  • Publication number: 20170169206
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Application
    Filed: January 11, 2017
    Publication date: June 15, 2017
    Inventors: SERAPHIN B. CALO, BONG JUN KO, KANG-WON LEE, THEODOROS SALONIDIS, DINESH C. VERMA
  • Patent number: 9660862
    Abstract: Various embodiments manage service issues within a wireless communication network. In one embodiment, a one or more call detail records associated with a set of wireless communication devices of a wireless communication network is received. A set of information within each of the one or more call detail records is compared to a baseline statistical model. The baseline statistical model identifies a normal operating state of the wireless communication network. At least one outlier call detail record in the one or more call detail records is identified based on the comparison. The at least one outlier call detail record indicates that at least one wireless communication device associated with the at least one outlier call detail record experienced one or more service issues.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: May 23, 2017
    Assignee: International Business Machines Corporation
    Inventors: Bong Jun Ko, Kang-Won Lee, Ramya Raghavendra, Murtaza Zafer
  • Publication number: 20170118296
    Abstract: The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of methods and/or algorithms.
    Type: Application
    Filed: January 4, 2017
    Publication date: April 27, 2017
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song, Dinesh C. Verma
  • Patent number: 9614918
    Abstract: The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of systems and/or algorithms.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: April 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song, Dinesh C. Verma
  • Patent number: 9591085
    Abstract: The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of methods and/or algorithms.
    Type: Grant
    Filed: August 22, 2013
    Date of Patent: March 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song, Dinesh C. Verma
  • Publication number: 20160344627
    Abstract: Systems, methods and computer program products for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: July 19, 2016
    Publication date: November 24, 2016
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song
  • Publication number: 20160337163
    Abstract: A method for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: July 26, 2016
    Publication date: November 17, 2016
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song
  • Patent number: 9497202
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: November 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Bong Jun Ko, Kang-Won Lee, Theodoros Salonidis, Dinesh C. Verma
  • Publication number: 20160283522
    Abstract: A method and system are provided. The method includes identifying a set of applications compatible with a set of data. The applications and the data are untagged by corresponding metadata. The identifying step includes executing, by an execution platform, at least some of the applications in the set against at least some of the data in the set. The identifying step further includes analyzing, by a log analyzer, execution logs for executions of the at least some of the applications against the at least some of the data. The identifying step also includes indicating, by the log analyzer, a compatibility of the at least some of the applications to the at least some of the data by detecting compatibility relevant errors using the execution logs.
    Type: Application
    Filed: June 18, 2015
    Publication date: September 29, 2016
    Inventors: Keith W. Grueneberg, Bong Jun Ko, Jorge J. Ortiz, Theodoros Salonidis, Rahul Urgaonkar, Dinesh C. Verma, Xiping Wang
  • Publication number: 20160283521
    Abstract: A method and system are provided. The method includes identifying a set of applications compatible with a set of data. The applications and the data are untagged by corresponding metadata. The identifying step includes executing, by an execution platform, at least some of the applications in the set against at least some of the data in the set. The identifying step further includes analyzing, by a log analyzer, execution logs for executions of the at least some of the applications against the at least some of the data. The identifying step also includes indicating, by the log analyzer, a compatibility of the at least some of the applications to the at least some of the data by detecting compatibility relevant errors using the execution logs.
    Type: Application
    Filed: March 24, 2015
    Publication date: September 29, 2016
    Inventors: Keith W. Grueneberg, Bong Jun Ko, Jorge J. Ortiz, Theodoros Salonidis, Rahul Urgaonkar, Dinesh C. Verma, Xiping Wang
  • Patent number: 9426053
    Abstract: Systems, methods and computer program products for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Grant
    Filed: December 6, 2012
    Date of Patent: August 23, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song
  • Patent number: 9426054
    Abstract: Systems, methods and computer program products for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Grant
    Filed: March 8, 2013
    Date of Patent: August 23, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song
  • Publication number: 20160212655
    Abstract: Various embodiments estimate network load in a wireless communication network. In one embodiment, at least one call detail record associated with a wireless communication network is received. A topology representing the network is analyzed. The topology includes a plurality of nodes each representing a network element within the wireless communication network. The topology also includes a plurality of edges between two or more of the plurality of nodes. Each of the plurality of edges indicates that the two or more plurality of nodes are communicatively coupled to each other within the network. A set of paths is identified between two or more nodes in the plurality of nodes corresponding to a set of call flow information within the at least one call detail record. A state of each network element represented by the two or more nodes in the set of paths is determined based on the call detail record.
    Type: Application
    Filed: March 31, 2016
    Publication date: July 21, 2016
    Inventors: Bong Jun KO, Vinay Kumar KOLAR, Kang-Won LEE, Ramya RAGHAVENDRA, Dinesh VERMA, Murtaza ZAFER
  • Patent number: 9350670
    Abstract: Various embodiments estimate network load in a wireless communication network. In one embodiment, at least one call detail record associated with a wireless communication network is received. A topology representing the network is analyzed. The topology includes a plurality of nodes each representing a network element within the wireless communication network. The topology also includes a plurality of edges between two or more of the plurality of nodes. Each of the plurality of edges indicates that the two or more plurality of nodes are communicatively coupled to each other within the network. A set of paths is identified between two or more nodes in the plurality of nodes corresponding to a set of call flow information within the at least one call detail record. A state of each network element represented by the two or more nodes in the set of paths is determined based on the call detail record.
    Type: Grant
    Filed: April 22, 2014
    Date of Patent: May 24, 2016
    Assignee: International Business Machines Corporation
    Inventors: Bong Jun Ko, Vinay Kumar Kolar, Kang-Won Lee, Ramya Raghavendra, Dinesh Verma, Murtaza Zafer
  • Patent number: 9342357
    Abstract: A method and system are provided. The method includes defining an application manifest that describes a computing solution for transfer from a cloud site to an on-premises computing appliance at a given premises. The computing solution is executable for a dataset resident at the given premises. The method further includes defining a characterization of a local premises environment in which the computing solution will be executed. The method also includes modifying the application manifest using the characterization of the local premises environment by at least one of adding, removing and modifying at least one component of the application manifest to provide a modified application manifest. The method additionally includes installing the computing solution in a computing appliance at the local premises environment according to the modified application manifest. The computing appliance is for executing the computing solution.
    Type: Grant
    Filed: September 11, 2014
    Date of Patent: May 17, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Keith William Grueneberg, Bong Jun Ko, Jorge J. Ortiz, Theodoros Salonidis, Rahul Urgaonkar, Dinesh C. Verma, Xiping Wang