Patents by Inventor Paul Llamas
Paul Llamas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250144883Abstract: A method, computer system, and a computer program product are provided for multi-dimensional printing. A printing request for printing tan object with at least one component is received. Information is obtained about the specifics of the object from a knowledgebase corpus database including at least a material requirement for printing of the object. The number of associated components and material and geometric requirements of each component and the object is analyzed. An output model is generated using at least one machine learning optimization model. The output model is generated based on the information obtained about the object and the analysis of the object's geometry and material requirements. The output model is stored in the knowledgebase corpus database.Type: ApplicationFiled: November 3, 2023Publication date: May 8, 2025Inventors: SILVIA CRISTINA SANTA ANA VELASCO, Carolina Garcia Delgado, Perla Guadalupe Reyes Ramirez, Paul Llamas Virgen, Jeremy R. Fox
-
Patent number: 12284310Abstract: The invention discloses a computer-implemented method, computer program product, and computer system, for utilizing a hypervisor installed on a smartphone running separate virtual machines (VMs), one configured for personal use and another for work use, thereby allowing for separate operating environments on one piece of hardware. The method includes receiving one or more notifications, or calls, on the smartphone and determining whether the one or more notifications, or calls, are during work hours. The method selects, automatically, the work VM as default if the one or more notifications, or calls, are during work hours. If the one or more notifications, or calls, are not during work hours, the method automatically selects the personal VM as default. The method further notifies a user to switch VMs if the one or more notifications, or calls, occur during a time that is a non-default VM.Type: GrantFiled: September 22, 2022Date of Patent: April 22, 2025Assignee: International Business Machines CorporationInventors: Derek Brewer, Robert Wilhelm, Jon D Gullixson, Paul Llamas Virgen
-
Publication number: 20250104362Abstract: Techniques are described with respect to a system, method, and computer program product for visualizing gaming virtual objects. An associated method includes analyzing a physical object within a physical space; rendering a virtual object associated with the physical object based on the analysis; optimizing the virtual object within a virtual environment associated with the physical space; and integrating the optimized virtual object into the virtual environment.Type: ApplicationFiled: September 25, 2023Publication date: March 27, 2025Inventors: Paul Llamas Virgen, Romelia H. Flores, Ana Paula Appel, Utz Bacher
-
Publication number: 20250094592Abstract: A request manager for managing service requests in a trust environment, where the trust environment includes a number of devices configured to communicate within the environment including Internet of Things (IoT) devices. The request manager includes: a processor; a memory storing programing for the processor to manage service requests; and a network connection for the processor to communicate with a client device to receive a service request and with devices in the trust environment providing services to complete the service request. The programming causes the request manager to receive a service request from a client device and determine how to complete the service request with the services available within the trust environment.Type: ApplicationFiled: September 19, 2023Publication date: March 20, 2025Inventors: Paul Llamas Virgen, Su Liu, Utz Bacher, Dario Andres Silva Moran
-
Publication number: 20250086223Abstract: A method, computer system, and a computer program product are provided for providing a multi-perspective multimedia output. In one embodiment, this comprises a first captured version of an event from a first capturing device and a second captured version of the event from a second capturing device. A geolocation polygon is then calculated based on a geolocation of the first capturing device used as a first point of reference, and a geolocation of the second capturing device used as a second point of reference. An ephemeral cloud is then established by determining any digital resources available within the geolocation polygon. The first and second captured versions are then processed by using the resources available within said ephemeral cloud. A single output is then generated using the processed first and second captured versions. The single output is a combination of the first and second captured versions.Type: ApplicationFiled: September 7, 2023Publication date: March 13, 2025Inventors: Mara Miranda Bautista, Paul Llamas Virgen, Silvia Esther Sanchez Lopez, Carlos Andres Martinez Vazquez
-
Publication number: 20250055909Abstract: Techniques are described with respect to a system, method, and computer program product for representing Internet-Of-Things (IOT) devices in a virtual environment. An associated method includes detecting a plurality of IOT devices associated with a physical space; extracting a plurality of IOT capabilities associated with the plurality of IOT devices; rendering a virtual IOT device based on the plurality of IOT capabilities; and visualizing the virtual IOT device within the virtual environment associated with the physical space.Type: ApplicationFiled: August 10, 2023Publication date: February 13, 2025Inventors: Paul Llamas Virgen, Romelia H. Flores, Dario Andres Silva Moran, Su Liu
-
Publication number: 20250037721Abstract: According to one embodiment, a method, computer system, and computer program product for context-aware voice self-authorization is provided. The embodiment may include identifying a speaker in audio data using two or more authentication techniques. The embodiment may also include capturing contextual information related to the audio data. The embodiment may further include encoding the contextual information into an audible voice. The embodiment may also include converting the audible voice to an inaudible sound frequency. The embodiment may further include embedding the inaudible sound frequency voice with audio data.Type: ApplicationFiled: July 26, 2023Publication date: January 30, 2025Inventors: Su Liu, Yang Liang, Terry James Hoffman, Paul Llamas Virgen
-
Patent number: 12206516Abstract: According to one embodiment, a method, computer system, and computer program product for network bandwidth conservation is provided. The embodiment may include monitoring eye focus of a user. The embodiment may include monitoring voice input of the user. In response to determining the eye focus of the user is on a video feed of another user for more than a threshold amount of focus time, the embodiment may include receiving the video feed of the another user. In response to determining the eye focus of the user is on a screen of a video conference and determining, based on the voice input, the user is speaking towards the screen of the video conference, the embodiment may include enabling a camera of the user and transmitting a video feed of the user.Type: GrantFiled: August 31, 2021Date of Patent: January 21, 2025Assignee: International Business Machines CorporationInventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, Paul Llamas Virgen, Victor Povar
-
Publication number: 20250007981Abstract: A broker capability augmenting method, system, and computer program product for increasing a capability of a Message Queuing Telemetry Transfer (MQTT) broker in an Internet-of-Things (IoT) network including obtaining data from an IoT neighborhood to detect an IoT network topology over time, collecting data from IoT devices in the IoT neighborhood, defining an input parameter to a machine learning model, and training the machine learning model on the collected data and the input parameter.Type: ApplicationFiled: June 28, 2023Publication date: January 2, 2025Inventors: Paul Llamas Virgen, Jesus Gabriel Trillo Vargas, Su Liu, Jeffrey Alan Schmidt
-
Publication number: 20240430251Abstract: Described is a method of generating a temporary access code to access a resource by a client device presently not authorized to access the resource, while an authorized user device is currently accessing the resource through a connection to a local network to which the client device is also connected. The method can receive a request from the user device to provide the client device access to the resource and generate a temporary access code to access the resource. The method can also receive a scanned temporary access code from the client device and determine whether the scanned temporary access code matches the generated temporary access code for the resource. In the event the scanned temporary access code matches the generated temporary access code for the resource, the method can grant the client device access to the resource associated with the generated temporary access code.Type: ApplicationFiled: June 22, 2023Publication date: December 26, 2024Inventors: Priyansh Jaiswal, Paul Llamas Virgen, Peeyush Jaiswal
-
Publication number: 20240394429Abstract: A computer-implemented method, system and computer program product for optimizing a manufacturing process of a physical product using a virtual environment. A representative sample as a digital representation for each batch of components to be assembled into the physical product is generated based on component batch data. A digital twin simulation in a virtual environment using the digital representation for each batch of components is then created and executed to determine potential defects in assembling components into the physical product prior to actually assembling the components into the physical product. An analysis is performed in the simulation to determine whether any combination of components to be assembled into the physical product has been identified as failing to meet a predetermined tolerance range thereby identifying a potential defect in assembling the physical product.Type: ApplicationFiled: May 24, 2023Publication date: November 28, 2024Inventors: Perla Guadalupe Reyes Ramirez, Silvia Cristina Santa Ana Velasco, Carolina Garcia Delgado, Paul Llamas Virgen, Scott E. Schneider
-
Publication number: 20240348626Abstract: According to one embodiment, a method, computer system, and computer program product for mitigating cyberattacks is provided. The present invention may include responding to a verification of a detected attack on a system, by detecting one or more modifications to one or more software components made by malicious network traffic; identifying the malicious network traffic; determining one or more compromised software components based on the detected one or more modifications and the identified malicious network traffic; performing digital twin simulation to evaluate one or more risks associated with the one or more compromised software components in order to identify the one or more software components to encapsulate; creating an encapsulated environment; provisioning the one or more software components to encapsulate to the encapsulated environment; and redirecting the malicious network traffic to the encapsulated environment.Type: ApplicationFiled: April 14, 2023Publication date: October 17, 2024Inventors: Mauro Marzorati, Paul Llamas Virgen, Pedro Mauricio Manjarrez Gutierrez, Karla Paulina Calderon Vaca
-
Publication number: 20240330949Abstract: A method, computer program product, and a system are configured to: detect sensors in an Internet-of-Things (IoT) network of a supply chain of fresh produce; collect data from the detected sensors via the IoT network; determine a demand of a type of produce at a future date using the collected data and a forecasting model; determine a change to an output of a greenhouse growing the type of produce based on the determined demand for the type of produce; determine a growing plan for the greenhouse based on the determined change to the output of the greenhouse; adjust one or more growing environment conditions in the greenhouse based on the growing plan, wherein the adjusting includes sending control signals to one or more computer-based environment control systems in the greenhouse, and wherein the adjusting changes a maturity time of a batch of the type of produce growing the greenhouse.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Inventors: Su Liu, Syed I. Haiderzaidi, Paul Llamas Virgen, Demetrice L Browder
-
Publication number: 20240314062Abstract: A method, a structure, and a computer system for dynamic media routing. The exemplary embodiments may include determining a quality of one or more existing network connections corresponding to one or more participants of a virtual conference and transmitting a media stream sample and a corresponding checksum value between the one or more members of the virtual conference using one or more alternative network connections. The exemplary embodiments may further include determining a quality of the one or more alternative network connections based on the media stream sample and the corresponding checksum value, and, based on determining that the quality of the one or more alternative network connections is higher than the quality of the one or more existing network connections, switching the one or more existing network connections to the one or more alternative network connections.Type: ApplicationFiled: March 17, 2023Publication date: September 19, 2024Inventors: Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
-
Publication number: 20240305678Abstract: A method, a structure, and a computer system for a conference operator. The exemplary embodiments may include extracting features from a conference of participants and determining whether a statement made by a first participant is directed to a second participant based on the features. The exemplary embodiments may further include, based on determining that the statement made by the first participant is directed to the second participant, determining whether the statement made by the first participant is part of a subconference and, based on determining that the statement made by the first participant is part of the subconference, emphasizing media corresponding to the subconference while deemphasizing media corresponding to the conference.Type: ApplicationFiled: March 7, 2023Publication date: September 12, 2024Inventors: Paul Llamas Virgen, Peeyush Jaiswal, Priyansh Jaiswal
-
Patent number: 12058186Abstract: A method, computer system, and a computer program product for private audio communication in a conference call is provided. The present invention may include receiving a mute request from a first participant in a conference call. The present invention may also include muting the first participant in the conference call. The present invention may further include capturing an audio from the muted first participant. The present invention may include transmitting the captured audio to a second participant in the conference call over a private communication channel.Type: GrantFiled: November 30, 2022Date of Patent: August 6, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peeyush Jaiswal, Priyansh Jaiswal, Paul Llamas Virgen
-
Publication number: 20240250951Abstract: A computer-implemented method, according to one embodiment, includes determining whether a first user, the first user being associated with a first virtual security zone that includes a first group of security policies, has a need for a first security policy included in a second virtual security zone associated with a second user. In response to a determination that the first user has a need for the first security policy included in the second virtual security zone, a determination is made as to whether the first user is authorized to at least temporarily inherit the first security policy from the second virtual security zone. The method further includes causing the first security policy to be inherited by the first virtual security zone from the second virtual security zone in response to a determination that the first user is authorized to at least temporarily inherit the first security policy.Type: ApplicationFiled: January 23, 2023Publication date: July 25, 2024Inventors: Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
-
Publication number: 20240214364Abstract: A method for authenticating a user to access a resource is disclosed. In one embodiment, such a method includes determining multiple devices on which to perform a multi-factor authentication sequence. The multiple devices include at least one virtual device and at least one physical device. As part of completing the multi-factor authentication sequence, the method requires a user to perform a first authentication action on a virtual device and a second authentication action on a physical device. In certain embodiments, the first authentication action and the second authentication action must be performed in a designated order and/or with a designated timing to successfully complete the multi-factor authentication sequence. In response to the user completing the multi-factor authorization sequence on both the virtual device and the physical device, the method grants authorization to the user to access a resource. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: December 21, 2022Publication date: June 27, 2024Applicant: International Business Machines CorporationInventors: Humberto Orozco Cervantes, Paul Llamas Virgen, Romelia H. Flores
-
Publication number: 20240202037Abstract: Managing high-demand physical resource usage is provided. An identification of a first physical resource to track availability of the first physical resource via an on-demand virtual queue is received from a first user. An image of the first physical resource is uploaded to the on-demand virtual queue. The image containing metadata regarding a geographic location of the first physical resource. A request to utilize the first physical resource is received from a second user. The second user is added to the on-demand virtual queue for the first physical resource. An indication that the first physical resource is available with the geographic location of the first physical resource is sent to the second user who is first in the on-demand virtual queue. The second user is removed from the on-demand virtual queue in response to receiving an indication that the second user finished utilizing the first physical resource.Type: ApplicationFiled: December 16, 2022Publication date: June 20, 2024Inventors: Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
-
Patent number: 12008317Abstract: A method, computer system, and a computer program product for summarizing a piece of information based on a personal learning style of a user is provided. The present invention may include summarizing to the piece of information associated with at least one information source, wherein an output is generated from the summarized piece of information. The present invention may then include generating a summary of the piece of information based on the personal learning style of the user and a plurality of data associated with the user, wherein the personal learning style of the user is determined by a personality test. The present invention may further include presenting the generated summary to the user.Type: GrantFiled: January 23, 2019Date of Patent: June 11, 2024Assignee: International Business Machines CorporationInventors: Perla Guadalupe Reyes Ramirez, Paul Llamas Virgen, Silvia Cristina Santa Ana Velasco, Carolina Garcia Delgado