Patents by Inventor Ajay Jose
Ajay Jose has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11895128Abstract: Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives.Type: GrantFiled: January 15, 2021Date of Patent: February 6, 2024Assignee: Bank of America CorporationInventors: Peggy J. Qualls, Ghada I. Khashab, Lori Mammoser, Ajay Jose Paul, Anthony R. Bandos, Sidy Diop
-
Publication number: 20240037576Abstract: A method of implementing a scenario library includes generating a first sourcing event scenario using a scenario library and based on a first request received from a first client device. The method also includes storing the first sourcing event scenario as one of the plurality of sourcing event scenarios at the scenario library. The method further includes modifying a sourcing event template for generating the sourcing event by at least adding a reference to the first sourcing event scenario to the sourcing event template. The method further includes generating the sourcing event using the modified sourcing event template and based on a second request from one of the plurality of client devices. The method further includes displaying, in response to the second request, the generated possible combination of suppliers for the sourcing event. Related systems and articles of manufacture are provided.Type: ApplicationFiled: September 20, 2022Publication date: February 1, 2024Inventors: Monika Ahuja, Sunitha N, Ajay Jose
-
Patent number: 11757904Abstract: Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives.Type: GrantFiled: January 15, 2021Date of Patent: September 12, 2023Assignee: Bank of America CorporationInventors: Peggy J. Qualls, Ghada I. Khashab, Sidy Diop, Ajay Jose Paul, Lori Mammoser, Anthony R. Bandos
-
Patent number: 11683335Abstract: Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives.Type: GrantFiled: January 15, 2021Date of Patent: June 20, 2023Assignee: Bank of America CorporationInventors: Ghada I. Khashab, Lori Mammoser, Anthony R. Bandos, Peggy J. Qualls, Sidy Diop, Ajay Jose Paul
-
Publication number: 20230104645Abstract: Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives.Type: ApplicationFiled: December 7, 2022Publication date: April 6, 2023Inventors: Ghada I. Khashab, Lori Mammoser, Anthony R. Bandos, Peggy J. Qualls, Sidy Diop, Ajay Jose Paul
-
Publication number: 20220232016Abstract: Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives.Type: ApplicationFiled: January 15, 2021Publication date: July 21, 2022Inventors: Peggy J. Qualls, Ghada I. Khashab, Lori Mammoser, Ajay Jose Paul, Anthony R. Bandos, Sidy Diop
-
Publication number: 20220232018Abstract: Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives.Type: ApplicationFiled: January 15, 2021Publication date: July 21, 2022Inventors: Ajay Jose Paul, Ghada I. Khashab, Sidy Diop, Peggy J. Qualls, Anthony R. Bandos, Lori Mammoser
-
Publication number: 20220232030Abstract: Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives.Type: ApplicationFiled: January 15, 2021Publication date: July 21, 2022Inventors: Ghada I. Khashab, Lori Mammoser, Anthony R. Bandos, Peggy J. Qualls, Sidy Diop, Ajay Jose Paul
-
Publication number: 20220232017Abstract: Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives.Type: ApplicationFiled: January 15, 2021Publication date: July 21, 2022Inventors: Peggy J. Qualls, Ghada I. Khashab, Sidy Diop, Ajay Jose Paul, Lori Mammoser, Anthony R. Bandos
-
Patent number: 11250102Abstract: Some embodiments provide a program. The program receives from a client device a sourcing request specifying a plurality of variables comprising set of sources, a set of items, and a set of quantities associated with the items. The program further receives a set of offers from the set of sources. Each offer in the set of offers specifies an item in set of items, a price associated with the item, and a quantity associated with the item. The program also receives a selection of a set of defined scenarios for the sourcing event and the set of offers. The program further generates a set of linear programming models based on the set of defined scenarios the sourcing and the set of offers. The program also instructs solvers to solve the liner programming models.Type: GrantFiled: July 14, 2020Date of Patent: February 15, 2022Assignee: SAP SEInventors: Swapnil Laddha, Ajay Jose, Aarathi Vidyasagar, Rajendra Vuppala, Sudhir Bhojwani
-
Patent number: 10904595Abstract: A system and method for just-in-time embedded watermarking of streaming digital content. The system employs sequential processing to transcode streaming content to embed a user-specific watermark into the streaming content. Additionally, the just-in-time embedded watermarking system transcodes short segments of content on an as-needed basis, in response to user requests, instead of performing bulk transcoding of large amounts of content at once. Accordingly, the just-in-time embedded watermarking system provides consistent and predictable user playback experience. Further, the system automatically supports adaptive bit rate optimization by providing interoperability with multiple potential adaptive bit rates requestable by the content player device. The system watermarks the requested content segment in real-time during the streaming of the content by causing burn-in of the user-specific watermark into the streaming content.Type: GrantFiled: August 21, 2018Date of Patent: January 26, 2021Assignee: PRIME FOCUS TECHNOLOGIES, INC.Inventors: Raju Babannavar, Ajay Jose, Vimalesh Gul Melwani, Ramakrishnan Sankaranarayanan
-
Publication number: 20200342045Abstract: Some embodiments provide a program. The program receives from a client device a sourcing request specifying a plurality of variables comprising set of sources, a set of items, and a set of quantities associated with the items. The program further receives a set of offers from the set of sources. Each offer in the set of offers specifies an item in set of items, a price associated with the item, and a quantity associated with the item. The program also receives a selection of a set of defined scenarios for the sourcing event and the set of offers. The program further generates a set of linear programming models based on the set of defined scenarios the sourcing and the set of offers. The program also instructs solvers to solve the liner programming models.Type: ApplicationFiled: July 14, 2020Publication date: October 29, 2020Inventors: Swapnil Laddha, Ajay Jose, Aarathi Vidyasagar, Rajendra Vuppala, Sudhir Bhojwani
-
Patent number: 10747842Abstract: Some embodiments provide a program. The program receives from a client device a request specifying a plurality of variables comprising set of sources and a set of objects. The program further receives a set of values from the set of sources. Each value in the set of values specifies an object in set of objects. The program also receives a selection of a set of defined scenarios for the request and the set of values. The program further generates a set of linear programming models based on the set of defined scenarios, the request, and the set of values.Type: GrantFiled: November 27, 2018Date of Patent: August 18, 2020Assignee: SAP SEInventors: Swapnil Laddha, Ajay Jose, Aarathi Vidyasagar, Rajendra Vuppala, Sudhir Bhojwani
-
Publication number: 20200068238Abstract: A system and method for just-in-time embedded watermarking of streaming digital content. The system employs sequential processing to transcode streaming content to embed a user-specific watermark into the streaming content. Additionally, the just-in-time embedded watermarking system transcodes short segments of content on an as-needed basis, in response to user requests, instead of performing bulk transcoding of large amounts of content at once. Accordingly, the just-in-time embedded watermarking system provides consistent and predictable user playback experience. Further, the system automatically supports adaptive bit rate optimization by providing interoperability with multiple potential adaptive bit rates requestable by the content player device. The system watermarks the requested content segment in real-time during the streaming of the content by causing burn-in of the user-specific watermark into the streaming content.Type: ApplicationFiled: August 21, 2018Publication date: February 27, 2020Inventors: Raju BABANNAVAR, Ajay JOSE, Vimalesh Gul MELWANI, Ramakrishnan SANKARANARAYANAN
-
Publication number: 20190272307Abstract: Some embodiments provide a program. The program receives from a client device a request specifying a plurality of variables comprising set of sources and a set of objects. The program further receives a set of values from the set of sources. Each value in the set of values specifies an object in set of objects. The program also receives a selection of a set of defined scenarios for the request and the set of values. The program further generates a set of linear programming models based on the set of defined scenarios, the request, and the set of values.Type: ApplicationFiled: November 27, 2018Publication date: September 5, 2019Inventors: Swapnil Laddha, Ajay Jose, Aarathi Vidyasagar, Raj Vuppala, Sudhir Bhojwani