Patents by Inventor Heiko H. Ludwig

Heiko H. Ludwig has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190066686
    Abstract: A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.
    Type: Application
    Filed: August 24, 2017
    Publication date: February 28, 2019
    Inventors: Nathalie Baracaldo Angel, Heiko H. Ludwig, Robert J. Moore, Guangjie Ren
  • Publication number: 20180352025
    Abstract: One embodiment provides a quality of service (QoS) monitoring framework for dynamically binding one or more customer applications to one or more microservices in a dynamic service environment, collecting compliance data and contextual data from the dynamic service environment and one or more hosting environments, and modifying a monitoring infrastructure for the one or more customer applications based on the compliance data and the contextual data.
    Type: Application
    Filed: June 6, 2017
    Publication date: December 6, 2018
    Inventors: Obinna B. Anya, Heiko H. Ludwig, Nagapramod S. Mandagere, Mohamed Mohamed, Mu Qiao, Ramani R. Routray, Samir Tata
  • Publication number: 20180336916
    Abstract: One embodiment provides a method comprising answering one or more incoming phone calls received at one or more pre-specified phone numbers utilizing a bot. The bot is configured to engage in a conversation with a caller initiating an incoming phone call utilizing a voice recording that impersonates a human being. The method further comprises recording each conversation the bot engages in, and classifying each recorded conversation as one of poison data or truthful training data based on content of the recorded conversation and one or more learned detection models for detecting poisoned data.
    Type: Application
    Filed: July 31, 2018
    Publication date: November 22, 2018
    Inventors: Nathalie Baracaldo Angel, Pawan R. Chowdhary, Heiko H. Ludwig, Robert J. Moore, Taiga Nakamura
  • Publication number: 20180305010
    Abstract: One embodiment provides a method comprising receiving a request to release a utility holder detachably mounted to a surface mount. The utility holder maintains a utility payload. A set of rotatable holding brackets is coupled to the surface mount in a pivotable fashion to engage the holding brackets with the utility holder in order to mount the utility holder to the surface mount. The method further comprises, in response to receiving the request, powering on a drone attached to the utility holder, and releasing the utility holder from the surface mount by actuating rotation of the holding brackets to disengage the holding brackets from the utility holder, enabling the drone to transport the utility holder from the surface mount to a desired location.
    Type: Application
    Filed: April 25, 2017
    Publication date: October 25, 2018
    Inventors: Nathalie Baracaldo Angel, Sandeep Gopisetty, Heiko H. Ludwig, David M. Ungar
  • Patent number: 10102868
    Abstract: One embodiment provides a method comprising answering one or more incoming phone calls received at one or more pre-specified phone numbers utilizing a bot. The bot is configured to engage in a conversation with a caller initiating an incoming phone call utilizing a voice recording that impersonates a human being. The method further comprises recording each conversation the bot engages in, and classifying each recorded conversation as one of poison data or truthful training data based on content of the recorded conversation and one or more learned detection models for detecting poisoned data.
    Type: Grant
    Filed: February 17, 2017
    Date of Patent: October 16, 2018
    Assignee: International Business Machines Corporation
    Inventors: Nathalie Baracaldo Angel, Pawan R. Chowdhary, Heiko H. Ludwig, Robert J. Moore, Taiga Nakamura
  • Publication number: 20180262403
    Abstract: One embodiment provides a method for monitoring context-dependent quality of service in a shared computing environment that includes detecting, by a processor, a change in context. Service classes are dynamically assigned to individual users and respective applications within shared computing environment customers based on the change in context. Service level agreement (SLA) statistics for each assigned service class are aggregated and collected.
    Type: Application
    Filed: March 7, 2017
    Publication date: September 13, 2018
    Inventors: Nathalie Baracaldo Angel, Heiko H. Ludwig, Rui Zhang
  • Publication number: 20180240028
    Abstract: One embodiment provides a method comprising intercepting a voice communication, collecting multi-sensory inputs associated with the voice communication, and determining an overall risk assessment metric for the voice communication based on the multi-sensory inputs and learned signatures. The multi-sensory inputs are indicative of content of the voice communication and one or more contextual factors associated with a target of the voice communication. The overall risk assessment metric indicates a likelihood the voice communication is a scam.
    Type: Application
    Filed: February 17, 2017
    Publication date: August 23, 2018
    Inventors: Nathalie Baracaldo Angel, Pawan R. Chowdhary, Heiko H. Ludwig, Robert J. Moore, Hovey Raymond Strong
  • Publication number: 20180241647
    Abstract: One embodiment provides a method comprising intercepting an incoming communication for a user, and determining whether to classify the incoming communication as a suspicious incoming communication based on content of the incoming communication and a learned classification model or learned signatures. The method further comprises monitoring one or more outgoing communications from the user, and invoking an action relating to scam prevention in response to determining an outgoing communication from the user is linked to a suspicious incoming communication.
    Type: Application
    Filed: February 17, 2017
    Publication date: August 23, 2018
    Inventors: Nathalie Baracaldo Angel, Pawan R. Chowdhary, Heiko H. Ludwig, Robert J. Moore, Amir J. Safavi
  • Publication number: 20180240473
    Abstract: One embodiment provides a method comprising answering one or more incoming phone calls received at one or more pre-specified phone numbers utilizing a bot. The bot is configured to engage in a conversation with a caller initiating an incoming phone call utilizing a voice recording that impersonates a human being. The method further comprises recording each conversation the bot engages in, and classifying each recorded conversation as one of poison data or truthful training data based on content of the recorded conversation and one or more learned detection models for detecting poisoned data.
    Type: Application
    Filed: February 17, 2017
    Publication date: August 23, 2018
    Inventors: Nathalie Baracaldo Angel, Pawan R. Chowdhary, Heiko H. Ludwig, Robert J. Moore, Taiga Nakamura
  • Publication number: 20180046493
    Abstract: In one embodiment, a computer program product includes a computer readable storage medium having program instructions embodied therewith. The embodied program instructions are executable by a processor to cause the processor to receive, by the processor, a first job request. The embodied program instructions are also executable by the processor to cause the processor to analyze, by the processor, the first job request to determine a user skill level of a user that submitted the first job request. Moreover, the embodied program instructions are executable by the processor to cause the processor to admit, by the processor, the first job request to a data analytics system and/or a data storage system in a specified order with respect to other received job requests based on at least the user skill level of the user that submitted the first job request. Other systems and methods are described in accordance with more embodiments.
    Type: Application
    Filed: October 24, 2017
    Publication date: February 15, 2018
    Inventors: Nathalie Baracaldo-Angel, Heiko H. Ludwig, William W. Owen, Rui Zhang
  • Patent number: 9870251
    Abstract: In one embodiment, a computer program product includes a computer-readable storage medium having program instructions embodied therewith. The embodied program instructions are executable by a processor to cause the processor to receive, by the processor, a first job request, and analyze, by the processor, the first job request to determine: an estimated complexity of the first job request based on one or more attributes of the first job request and a user skill level of a user that submitted the first job request. Moreover, the embodied program instructions are executable by the processor to admit, by the processor, the first job request to a data analytics system and/or a data storage system in a specified order with respect to other received job requests based on at least: the estimated complexity of the first job request, and the user skill level of the user that submitted the first job request.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: January 16, 2018
    Assignee: International Business Machines Corporation
    Inventors: Nathalie Baracaldo Angel, Heiko H. Ludwig, William W. Owen, Rui Zhang
  • Publication number: 20170090975
    Abstract: In one embodiment, a computer program product includes a computer readable storage medium having program instructions embodied therewith. The embodied program instructions are executable by a processor to cause the processor to receive, by the processor, a first job request, and analyze, by the processor, the first job request to determine: an estimated complexity of the first job request based on one or more attributes of the first job request and a user skill level of a user that submitted the first job request. Moreover, the embodied program instructions are executable by the processor to admit, by the processor, the first job request to a data analytics system and/or a data storage system in a specified order with respect to other received job requests based on at least: the estimated complexity of the first job request, and the user skill level of the user that submitted the first job request.
    Type: Application
    Filed: September 29, 2015
    Publication date: March 30, 2017
    Inventors: Nathalie Baracaldo Angel, Heiko H. Ludwig, William W. Owen, Rui Zhang
  • Patent number: 7222107
    Abstract: A Transaction Authorization Method operating over a computer network comprising a plurality of interconnected computers and a plurality of resources, each computer including a processor, memory and input/output devices, each resource operatively coupled to at least one of the computers and executing at least one of the activities in the process flow, the method characterized in that it assembles an electronic authorization of a transaction in a manner which is verifiable by extracting and verifying whether role certificates of at least one type, associated with the authorization, are themselves authentic. The method eliminates the need of having to authorize each and every signature on a transaction individually by providing an authorization structure based on roles, this structure being accessible on a public network for verification that the transaction is authorized.
    Type: Grant
    Filed: January 5, 2001
    Date of Patent: May 22, 2007
    Assignee: International Business Machines Corporation
    Inventors: Heiko H. Ludwig, Luke J. O'Connor
  • Patent number: 7031999
    Abstract: A method and a computer network for interconnecting a first server computer (112) of a service requestor (1) and a second server computer (122) of a service provider (2), each of the first server computer (112) and the second server computer (122) being connected to at least one client computer (111, 121), the first server computer (112) running a first workflow management system application (3), and the second server computer (122) running a second workflow management system application (4), the method comprising providing a first and a second connector application (5a, 6a) for permitting the first server computer (112) access to a copy of the first connector application (5a) and for permitting the second server computer (122) access to a copy of the second connector application (6a), wherein the copies of the first and the second connector application (5a, 6a) each comprises a connection agreement (8, 12) for a first work task (7) of a first workflow instance (18) encompassed by the first workflow managemen
    Type: Grant
    Filed: November 4, 1999
    Date of Patent: April 18, 2006
    Assignee: International Business Machines Corporation
    Inventors: Heiko H. Ludwig, Keith G. Whittingham
  • Publication number: 20030009513
    Abstract: The present invention provides systems and methods for confirming the fulfillment of a transition condition in a workflow management system (WFMS) by a device connectable to the workflow management system via a network. The transition condition comprises an application transition condition and a fulfillment condition. The fulfillment condition comprises a requirement of a signature for confirming the application transition condition. In an example embodiment, the method comprises confirming at least part of the fulfillment of the application transition condition by signing with the signature that the application transition condition has been fulfilled.
    Type: Application
    Filed: June 26, 2002
    Publication date: January 9, 2003
    Applicant: International Business Machines Corporation
    Inventors: Heiko H. Ludwig, Elsie A. VanHerreweghen
  • Publication number: 20010021928
    Abstract: A Transaction Authorization Method operating over a computer network comprising a plurality of interconnected computers and a plurality of resources, each computer including a processor, memory and input/output devices, each resource operatively coupled to at least one of the computers and executing at least one of the activities in the process flow, the method characterized in that it assembles an electronic authorization of a transaction in a manner which is verifiable by extracting and verifying whether role certificates of at least one type, associated with the authorization, are themselves authentic. The method eliminates the need of having to authorize each and every signature on a transaction individually by providing an authorization structure based on roles, this structure being accessible on a public network for verification that the transaction is authorized.
    Type: Application
    Filed: January 5, 2001
    Publication date: September 13, 2001
    Inventors: Heiko H. Ludwig, Luke J. O' Connor