Patents by Inventor Bong-Jun Ko

Bong-Jun Ko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9781215
    Abstract: The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of methods and/or algorithms.
    Type: Grant
    Filed: January 4, 2017
    Date of Patent: October 3, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song, Dinesh C. Verma
  • Publication number: 20170270589
    Abstract: Techniques for making shopping recommendations based on a user's social ties to friends and family are provided. In one aspect, a method for making shopping recommendations is provided. The method includes the steps of: collecting shopping data from users, wherein the users comprise a first user and one or more second users with social ties to the first user; and making recommendations to the first user based on the shopping data while the first user is shopping at a store, wherein the recommendations include preferences of the second users with social ties to the first user. A system for making shopping recommendations is also provided.
    Type: Application
    Filed: March 18, 2016
    Publication date: September 21, 2017
    Inventors: Keith W. Grueneberg, Bong Jun Ko, Christian Makaya, Jorge J. Ortiz, Swati RaIlapaIli, Theodoros Salonidis, Rahul Urgaonkar, Dinesh C. Verma, Xiping Wang
  • Patent number: 9747430
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Grant
    Filed: January 11, 2017
    Date of Patent: August 29, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Bong Jun Ko, Kang-Won Lee, Theodoros Salonidis, Dinesh C. Verma
  • Patent number: 9742669
    Abstract: A method for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Grant
    Filed: July 26, 2016
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song
  • Publication number: 20170230851
    Abstract: Various embodiments manage service issues within a wireless communication network. In one embodiment, a one or more call detail records associated with a set of wireless communication devices of a wireless communication network is received. A set of information within each of the one or more call detail records is compared to a baseline statistical model. The baseline statistical model identifies a normal operating state of the wireless communication network. At least one outlier call detail record in the one or more call detail records is identified based on the comparison. The at least one outlier call detail record indicates that at least one wireless communication device associated with the at least one outlier call detail record experienced one or more service issues.
    Type: Application
    Filed: April 25, 2017
    Publication date: August 10, 2017
    Applicant: International Business Machines Corporation
    Inventors: Bong Jun KO, Kang-Won LEE, Ramya RAGHAVENDRA, Murtaza ZAFER
  • Publication number: 20170185634
    Abstract: Methods and systems for execution of distributed analytics include building a global linked structure that describes correspondences between dataset metadata structures, analytics metadata structures, and location metadata structures and that encodes compatibility between respective datasets, analytics, and locations. A set of analytics and compatible datasets for execution is determined based on the dataset metadata structures, analytics metadata structures, and global linked structure. An optimal execution location is determined based on the determined set of analytics and compatible datasets, the location metadata structures, and the global linked structure. The set of analytics and compatible datasets are deployed to the optimal location for execution.
    Type: Application
    Filed: December 28, 2015
    Publication date: June 29, 2017
    Inventors: Theodoros Salonidis, Bong Jun Ko, Rahul Urgaonkar, Swati Rallapalli
  • Publication number: 20170169237
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Application
    Filed: December 15, 2015
    Publication date: June 15, 2017
    Inventors: SERAPHIN B. CALO, BONG JUN KO, KANG-WON LEE, THEODOROS SALONIDIS, DINESH C. VERMA
  • Publication number: 20170169206
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Application
    Filed: January 11, 2017
    Publication date: June 15, 2017
    Inventors: SERAPHIN B. CALO, BONG JUN KO, KANG-WON LEE, THEODOROS SALONIDIS, DINESH C. VERMA
  • Publication number: 20170169205
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Application
    Filed: January 11, 2017
    Publication date: June 15, 2017
    Inventors: SERAPHIN B. CALO, BONG JUN KO, KANG-WON LEE, THEODOROS SALONIDIS, DINESH C. VERMA
  • Patent number: 9660862
    Abstract: Various embodiments manage service issues within a wireless communication network. In one embodiment, a one or more call detail records associated with a set of wireless communication devices of a wireless communication network is received. A set of information within each of the one or more call detail records is compared to a baseline statistical model. The baseline statistical model identifies a normal operating state of the wireless communication network. At least one outlier call detail record in the one or more call detail records is identified based on the comparison. The at least one outlier call detail record indicates that at least one wireless communication device associated with the at least one outlier call detail record experienced one or more service issues.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: May 23, 2017
    Assignee: International Business Machines Corporation
    Inventors: Bong Jun Ko, Kang-Won Lee, Ramya Raghavendra, Murtaza Zafer
  • Publication number: 20170118296
    Abstract: The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of methods and/or algorithms.
    Type: Application
    Filed: January 4, 2017
    Publication date: April 27, 2017
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song, Dinesh C. Verma
  • Patent number: 9614918
    Abstract: The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of systems and/or algorithms.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: April 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song, Dinesh C. Verma
  • Patent number: 9591085
    Abstract: The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of methods and/or algorithms.
    Type: Grant
    Filed: August 22, 2013
    Date of Patent: March 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song, Dinesh C. Verma
  • Publication number: 20160344627
    Abstract: Systems, methods and computer program products for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: July 19, 2016
    Publication date: November 24, 2016
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song
  • Publication number: 20160337163
    Abstract: A method for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: July 26, 2016
    Publication date: November 17, 2016
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song
  • Patent number: 9497202
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: November 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Bong Jun Ko, Kang-Won Lee, Theodoros Salonidis, Dinesh C. Verma
  • Publication number: 20160283521
    Abstract: A method and system are provided. The method includes identifying a set of applications compatible with a set of data. The applications and the data are untagged by corresponding metadata. The identifying step includes executing, by an execution platform, at least some of the applications in the set against at least some of the data in the set. The identifying step further includes analyzing, by a log analyzer, execution logs for executions of the at least some of the applications against the at least some of the data. The identifying step also includes indicating, by the log analyzer, a compatibility of the at least some of the applications to the at least some of the data by detecting compatibility relevant errors using the execution logs.
    Type: Application
    Filed: March 24, 2015
    Publication date: September 29, 2016
    Inventors: Keith W. Grueneberg, Bong Jun Ko, Jorge J. Ortiz, Theodoros Salonidis, Rahul Urgaonkar, Dinesh C. Verma, Xiping Wang
  • Publication number: 20160283522
    Abstract: A method and system are provided. The method includes identifying a set of applications compatible with a set of data. The applications and the data are untagged by corresponding metadata. The identifying step includes executing, by an execution platform, at least some of the applications in the set against at least some of the data in the set. The identifying step further includes analyzing, by a log analyzer, execution logs for executions of the at least some of the applications against the at least some of the data. The identifying step also includes indicating, by the log analyzer, a compatibility of the at least some of the applications to the at least some of the data by detecting compatibility relevant errors using the execution logs.
    Type: Application
    Filed: June 18, 2015
    Publication date: September 29, 2016
    Inventors: Keith W. Grueneberg, Bong Jun Ko, Jorge J. Ortiz, Theodoros Salonidis, Rahul Urgaonkar, Dinesh C. Verma, Xiping Wang
  • Patent number: 9426053
    Abstract: Systems, methods and computer program products for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Grant
    Filed: December 6, 2012
    Date of Patent: August 23, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song
  • Patent number: 9426054
    Abstract: Systems, methods and computer program products for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Grant
    Filed: March 8, 2013
    Date of Patent: August 23, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song