Patents by Inventor Tiberiu Suto
Tiberiu Suto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250254147Abstract: Described are techniques for Universal Serial Bus (USB) security. The techniques include intercepting, by a Universal Serial Bus (USB) firewall of a USB device connected to a host, a file access request for a file. The techniques further include transmitting the file access request for the file to an authorization server, where the authorization server determines whether the file access request for the file is permitted based on a hash of the file. The techniques further include receiving a cryptographically signed message from the authorization server based on the hash of the file, where the cryptographically signed message indicates whether the file access request for the file is permitted.Type: ApplicationFiled: February 2, 2024Publication date: August 7, 2025Inventors: Dimple Gajra, Tiberiu Suto, Richard Howe, Nikki Elyse Robinson, David Kumhyr
-
Publication number: 20250245025Abstract: A computer-implemented method for identifying, by a processor set, a cluster of users by learning from their interactions in a first virtual environment. The processor set may further classify characteristics of an avatar associated with each user of the cluster of users in the first virtual environment and generate a secure portal visible only to users of the cluster of users to teleport to a second virtual environment. The processor set may also generate a guest profile and a guest avatar in the second virtual environment for each user of the cluster of users. The processor may also adapt the guest avatar for each user of the cluster of users based on a theme of the second virtual environment and generate a new profile prefilled with data collected from previous virtual environments that contain a subset of profile data required for the second virtual environment.Type: ApplicationFiled: January 30, 2024Publication date: July 31, 2025Inventors: Eric Gendreau, NEIL DELIMA, Tiberiu Suto, Susan Aboelela, Jennifer M. Hatfield, Alissa Buck, Jeremy R. Fox
-
Patent number: 12333220Abstract: A process is provided for usage-pattern-based generation of a digital model of a product. The process includes obtaining a usage pattern of a user of a product, where the usage pattern includes a set of usage pattern parameters. In addition, the process includes using a machine learning model of an artificial intelligence system to generate a 3-D virtual image of the product aligned with the usage pattern, and analyzing, by the artificial intelligence system, the 3-D virtual image of the product to facilitate identifying a requirement specification for the product based on the usage pattern. Further, the process includes generating a digital model of a new product for the user based on the identified requirement specification.Type: GrantFiled: March 2, 2023Date of Patent: June 17, 2025Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tiberiu Suto, Martin G. Keen, Jeremy R. Fox, Sarbajit K. Rakshit
-
Patent number: 12327419Abstract: A method, computer program product, and system include a processor(s) that map a physical environment by utilizing one or more image capture devices to scan aspects of the physical environment. The mapping identifies contamination levels and features associated with objects in the environment. The processor(s) utilizes unsupervised learning and supervised learning to identify activities engaged in by a user in the environment. The processor(s) determines that a trigger event has occurred. The processor(s) identify an activity engaged in by the user and determine if a user interface utilized by the program code to display results is visible to the user. If the processor(s) determines that the interface is not visible, the processor(s) selects an alert mechanism to alert the user to the trigger event and alerts the user to the trigger event with the selected alert mechanism.Type: GrantFiled: August 31, 2022Date of Patent: June 10, 2025Assignee: Kyndryl, Inc.Inventors: Tiberiu Suto, Shikhar Kwatra, Jonathan Cottrell, Carolina G. Delgado, Kelly Camus
-
Patent number: 12314121Abstract: A method, computer program product, and computer system for creating a virtual collaborative space within an intelligent workflow framework. One or more processors of a computer system identify the need for a virtual collaborative space where human interactions can occur to test or optimize the existing workflow and identify triggers for when the virtual collaborative space shall be initiated based on historical learning models trained from instrumentation data generated by the workflow. Responsive to a trigger from the identified triggers, the one or more processors of the computer system alert a first user to enter the virtual collaborative space and initiate the virtual collaborative space. The one or more processors of the computer system replicate a scenario that activated the trigger including identifying parties of interest to the scenario and enable the first user to address an issue in the existing workflow that caused the trigger to occur.Type: GrantFiled: July 12, 2023Date of Patent: May 27, 2025Inventors: Jennifer M. Hatfield, Jill S. Dhillon, Cuong The Nguyen, Tiberiu Suto, Brian K. Adams, Neil Delima
-
Publication number: 20250131352Abstract: In an approach to managing access changes to enterprise resources, one or more computer processors detect a status change of an employment of a user in an enterprise. One or more computer processors retrieve an access level of the user associated with one or more enterprise resources. Based on the status change, one or more computer processors determine the access level of the user associated with at least one of the one or more enterprise resources needs to change. One or more computer processors determine whether the user is an owner of the at least one resource. In response to determining the user is an owner of the at least one resource, one or more computer processors retrieve an employee hierarchy. Based on the employee hierarchy, one or more computer processors assign temporary ownership of the at least one resource to a first employee of the enterprise.Type: ApplicationFiled: October 20, 2023Publication date: April 24, 2025Inventors: NEIL DELIMA, Tiberiu Suto, Jonathan Asghar, Neerju Gupta
-
Publication number: 20250106574Abstract: According to one embodiment, a method, computer system, and computer program product for reducing volume of a wireless audio device is provided. The embodiment may include monitoring, via a listening device, audible sounds and corresponding sound levels at a first location of an environment; identifying an audible sound at the first location with a corresponding sound level which exceeds a decibel threshold of the environment; creating a list of Bluetooth-enabled (BE) speakers, sorted by decreasing signal strength, discoverable via the listening device; capturing a segment of the audible sound; sending, from the listening device, a volume reduction request to a topmost BE speaker of the list located at a second location of the environment; responsive to receiving, at the listening device, a notification of match from the topmost BE speaker, re-measuring the corresponding sound level; and confirming the corresponding sound level is compliant with the decibel threshold.Type: ApplicationFiled: September 26, 2023Publication date: March 27, 2025Inventors: Tiberiu Suto, Juan Pablo Parga Jimenez, Bryan Fernando Rangel Aguirre, OLGA MARÍA ROJO LUGO
-
Patent number: 12260231Abstract: Optimizing a user experience during transition to an updated user interface includes using a computer processor to capture a user experience of a user's interaction with a program based on migration of the user interface from a current version of a page layout associated with the user to a new version of the page layout associated with the user. Disparity events experienced by the user while transitioning from the current version of the page layout to the new version of the page layout are analyzed, and a recommendation report of changes to the user interface is generated and sent to a developer associated with the new version of the page layout. An updated page layout reflecting modifications may then be received based on the recommendation report.Type: GrantFiled: July 19, 2023Date of Patent: March 25, 2025Assignee: International Business Machines CorporationInventors: Logan Bailey, Zachary A. Silverstein, Suman Patra, Tiberiu Suto
-
Publication number: 20250094019Abstract: Described is a method for generating graphics in a user interface corresponding to options provided by an interactive voice response component by determining an interactive voice response (IVR) component is active on a call initiated by a user. The method identifying a various options provided by the IVR component with respect to a keypad in a user interface on a touchscreen of a device and displaying a graphic for each option from the various options provided by the IVR component. In response to receiving a graphic selection for the plurality options from a user, sending an option selection corresponding to the graphic selection to the IVR component.Type: ApplicationFiled: September 15, 2023Publication date: March 20, 2025Inventors: Zachary A. Silverstein, Logan Bailey, Martin G. Keen, Tiberiu Suto
-
Publication number: 20250061402Abstract: A feature request and a price corresponding to the feature request are received. The feature request is validated, the validating determining an implementation cost of the feature request. Using a return on investment of the feature request, the feature request is selected for implementation, the return on investment computed using the implementation cost and the price. Implementation of the selected feature request is caused.Type: ApplicationFiled: October 20, 2023Publication date: February 20, 2025Applicant: International Business Machines CorporationInventors: Natalia Russi-Vigoya, Brett Witteck, Tiberiu Suto, Labib Farag Labib Hanna Saad, Muhammad Jawad Paracha
-
Patent number: 12229708Abstract: A method for dynamically rearranging one or more packages for delivery on a delivery vehicle in response to unforeseen changes in a pre-planned delivery route. The method detects, via one or more sensor-enabled shelves in a delivery vehicle, an address and package details of a respective delivery package. The method further integrates the one or more sensor-enabled shelves with a route map that depicts the pre-planned delivery route. The method further assigns new values to the one or more sensor-enabled shelves, in response to a change in the pre-planned delivery route, indicating a new sequence of delivery for each respective delivery package. The method further notifies a delivery person which delivery package is to be delivered at a current stop by illuminating the one or more sensor-enabled shelves containing the respective delivery package.Type: GrantFiled: January 27, 2023Date of Patent: February 18, 2025Assignee: International Business Machines CorporationInventors: Nadiya Kochura, Tiberiu Suto, Hemant Kumar Sivaswamy, Jeremy R. Fox
-
Publication number: 20250053663Abstract: A method including generating a queue of a plurality of workloads for execution in a data processing environment, where the plurality of workloads are organized in the queue based on respective priority values, and where a vulnerability scan is queued with a lower priority value and segmenting the vulnerability scan using at least one selected from a group consisting of: parallel segmentation and iterative segmentation. The parallel segmentation is configured to implement respective segments of the vulnerability scan at predetermined times to reduce downtime or performance impact of the data processing environment and the iterative segmentation is configured to repeatedly segment the vulnerability scan until respective segments of the vulnerability scan can be implemented in the data processing environment without any downtime or significant performance impact. The method further includes implementing the segmented vulnerability scan in the data processing environment.Type: ApplicationFiled: August 11, 2023Publication date: February 13, 2025Inventors: Tiberiu Suto, Heather Nicole Polgrean, Zachary A. Silverstein, Logan Bailey
-
Publication number: 20250045792Abstract: A computer implemented method manages a transaction. A number of processor units receives Internet of things data from a set of Internet of things sensors. The Internet of things data comprises current incentives for a group of products. The number of processor units identifies a set of transaction tokens for purchasing the group of products with a greatest benefit using the current incentives applicable to the group of products and token incentives for the transaction tokens. The number of processor units completes the transaction for the group of products using the set of transaction tokens.Type: ApplicationFiled: August 4, 2023Publication date: February 6, 2025Inventors: Hamid Majdabadi, Jeremy R. Fox, Tiberiu Suto, Su Liu
-
Publication number: 20250036492Abstract: In an approach to delayed delivery of irrelevant notifications, one or more computer processors determine an activity of a user. One or more computer processors calculate a focus score associated with the activity. One or more computer processors receive an incoming notification. One or more computer processors determine the focus score exceeds a pre-defined focus threshold. One or more computer processors calculate a relevance score of the incoming notification. One or more computer processors determine the relevance score exceeds a pre-defined relevance threshold. Based on the focus score exceeding the pre-defined focus threshold and the relevance score exceeding the pre-defined relevance threshold, one or more computer processors deliver the incoming notification at an opportune time.Type: ApplicationFiled: July 27, 2023Publication date: January 30, 2025Inventors: Valerie Lampkin, AVINASH ASTHANA, NEIL DELIMA, Tiberiu Suto, Suman Patra
-
Publication number: 20250028541Abstract: Optimizing a user experience during transition to an updated user interface includes using a computer processor to capture a user experience of a user's interaction with a program based on migration of the user interface from a current version of a page layout associated with the user to a new version of the page layout associated with the user. Disparity events experienced by the user while transitioning from the current version of the page layout to the new version of the page layout are analyzed, and a recommendation report of changes to the user interface is generated and sent to a developer associated with the new version of the page layout. An updated page layout reflecting modifications may then be received based on the recommendation report.Type: ApplicationFiled: July 19, 2023Publication date: January 23, 2025Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Logan BAILEY, Zachary A. SILVERSTEIN, Suman PATRA, Tiberiu SUTO
-
Publication number: 20250023741Abstract: Embodiments of the present invention provide an approach for authenticating video data utilizing a contextual identifier. Specifically, a set of video data including contextual identifiers is captured. A respective cryptographic signature for each frame of the set of video data is generated utilizing metadata of the respective frame. Each frame of the set of video data and the respective cryptographic signature are stored on a blockchain, and the set of video data is authenticated utilizing the respective cryptographic signatures stored on the blockchain.Type: ApplicationFiled: July 14, 2023Publication date: January 16, 2025Inventors: Shikhar Kwatra, Tiberiu Suto, Hemant Kumar Sivaswamy, Dinesh Kumar Bhudavaram, Nadiya Kochura
-
Publication number: 20250018657Abstract: A computer-implemented method, a computer system and a computer program product split a virtual printing model according to a probability of multidimensional printing failure. The method includes obtaining a virtual printing model of a multidimensional object, where the virtual printing model comprises print layers. The method also includes determining that a printing risk score for a location on the multidimensional object is above a printing risk threshold. The method further includes mapping a set of print layers of the virtual printing model to the location on the multidimensional object. Lastly, the method includes sending the print layers of the virtual printing model to a multidimensional printer, wherein a mapped set of print layers is sent first.Type: ApplicationFiled: July 13, 2023Publication date: January 16, 2025Inventors: Jeremy R. Fox, Jessica Nahulan, Carolina Garcia Delgado, Tiberiu Suto
-
Publication number: 20250021417Abstract: A method, computer program product, and computer system for creating a virtual collaborative space within an intelligent workflow framework. One or more processors of a computer system identify the need for a virtual collaborative space where human interactions can occur to test or optimize the existing workflow and identify triggers for when the virtual collaborative space shall be initiated based on historical learning models trained from instrumentation data generated by the workflow. Responsive to a trigger from the identified triggers, the one or more processors of the computer system alert a first user to enter the virtual collaborative space and initiate the virtual collaborative space. The one or more processors of the computer system replicate a scenario that activated the trigger including identifying parties of interest to the scenario and enable the first user to address an issue in the existing workflow that caused the trigger to occur.Type: ApplicationFiled: July 12, 2023Publication date: January 16, 2025Inventors: Jennifer M. Hatfield, Jill S. Dhillon, Cuong The Nguyen, Tiberiu Suto, Brian K. Adams, Neil Delima
-
Publication number: 20250021384Abstract: Described are techniques for bandwidth allocation in container orchestration systems. The techniques include monitoring storage bandwidth designated for one or more storage operations in association with one or more storage volumes attached to a server that hosts containerized applications, where a fixed amount of bandwidth provided to the server is divided between the storage bandwidth available for the one or more storage operations and network bandwidth available for network operations. The techniques further include determining that increasing the storage bandwidth will improve performance of at least one of the one or more storage operations. The techniques further include identifying an amount of the network bandwidth as being available for reallocation to the storage bandwidth, and reallocating the amount of the network bandwidth to the storage bandwidth for use in performing the one or more storage operations.Type: ApplicationFiled: July 14, 2023Publication date: January 16, 2025Inventors: Karthik Baskaran, Tiberiu Suto, Nadiya Kochura, Arashad Ahamad, Hemant Kumar Sivaswamy
-
Publication number: 20250013729Abstract: A computer-implemented method, according to one approach, includes: generating a multi-factor authentication challenge for a user in response to receiving a request from the user, The multi-factor authentication challenge includes a dynamic combination of available authentication factors corresponding to the user. The dynamic combination of authentication factors includes (i) at least one user defined authentication factor, (ii) at least one biometric authentication factor, and (iii) at least one activity-based authentication factor. Inputs are also received for the multi-factor authentication challenge, and a determination is made as to whether the inputs received satisfy the multi-factor authentication challenge.Type: ApplicationFiled: July 5, 2023Publication date: January 9, 2025Inventors: Ewa Karweta, Jill S. Dhillon, John Jacob Mutter, Tiberiu Suto, Neil Delima