Patents by Inventor Ashish Kundu

Ashish Kundu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10833861
    Abstract: A processor-implemented method improves security in a blockchain network of devices by protecting security, privacy and ownership assurance of identity assets, where the blockchain network of devices supports a blockchain. An identity asset provider device establishes co-ownership of an identity asset for an identity asset provider and an entity. The identity asset provider device directs a first member of the blockchain network of devices to associate identities of the identity asset provider and the entity based on their co-ownership of the identity asset by using commitments between the identity asset provider and the entity and based on collaborative proof of ownership of the identity asset using zero knowledge proofs in the blockchain network of devices.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Suresh Chari, Hasini Gunasinghe, Hugo M. Krawczyk, Ashish Kundu, Kapil Kumar Singh, Dong Su
  • Publication number: 20200349194
    Abstract: An example operation may include one or more of generating a proposal to perform a ledger operation at a first node, informing one or more second nodes of the proposal, receiving a decision on consensus among the first node and the one or more second nodes for the proposal, and performing the ledger operation at the first node when there is consensus, wherein the ledger operation changes a state database of a ledger of the first node and wherein the state database corresponds to a blockchain stored in the ledger.
    Type: Application
    Filed: May 2, 2019
    Publication date: November 5, 2020
    Inventors: Ashish Kundu, Mukesh K. Mohania, Hoang Tam Vo, Zehra N. Sura
  • Patent number: 10820574
    Abstract: Techniques for drone device control are provided. In one example, a computer-implemented method comprises establishing, by a plurality of drone devices respectively operatively coupled to processors and coordinating with one other, a defined region of a defined coordinate space of a geographic area, wherein the defined region is associated with an animal. The computer-implemented method also comprises monitoring, by the plurality of drone devices, a physical relationship between the animal and the defined region. The computer-implemented method can also comprise, in response to identifying that the physical relationship between the animal and the defined region fails to meet a criterion, performing, by the plurality of drone devices, a pattern of operations selected to alter the physical relationship between the animal and the defined region to satisfy the criterion.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: November 3, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael S. Gordon, James Robert Kozloski, Ashish Kundu, Clifford A. Pickover
  • Patent number: 10824481
    Abstract: Embodiments for implementing partial synchronization between compute processes based on threshold specification in a computing environment. One or more compute processes may be synchronized in one of a plurality of types of computing platforms using a barrier having a barrier release condition based on a threshold of one or more measures. The barrier is defined according to one or more parameters. The one or more compute processes may be released via the barrier upon exceeding the threshold of the one or more measures.
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: November 3, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Zehra Sura, Li Zhang, Ashish Kundu, Ravi Nair
  • Patent number: 10817600
    Abstract: A computer-implemented method protects stack memory by moving contents of stack memory to an accumulation general purpose register. One or more processors identify an authorized function and a malicious function in a computer program, in which the malicious function is able to execute a call that provides the malicious function with access to stack memory that is used by the authorized function. The processor(s) move data from the stack memory to a protected kernel register before the call is executed, and store results of execution of the authorized function in a first register that is accessible only to the authorized function. The processor(s) then clear the stack memory, and move the results of execution of the authorized function from the first register to an accumulation general purpose register that is also accessible only to the authorized function.
    Type: Grant
    Filed: June 4, 2019
    Date of Patent: October 27, 2020
    Assignee: International Business Machines Corporation
    Inventors: Arun K. Iyengar, Ashish Kundu, Gong Su, Qi Zhang
  • Patent number: 10812254
    Abstract: A processor-implemented method provides a calculated identity confidence score for an identity. The processor(s) in each of a plurality of decentralized identity providers calculate an identity confidence score of an entity. The processor(s) store the calculated identity confidence score in a blockchain. The processor(s) retrieve the calculated identity confidence score from the blockchain. The processor(s) provide the calculated identity confidence score to a requestor, which is a computer-based system that performs an action based on the provided calculated identity score.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: October 20, 2020
    Assignee: International Business Machines Corporation
    Inventors: Suresh N. Chari, Ashish Kundu, Sridhar Muppidi
  • Patent number: 10802483
    Abstract: Using an imaging device of a user device associated with a public user, an image of an autonomous vehicle (AV) operating in an area is captured. The public user associated with the user device is other than an occupant or controller of the AV. Image processing of the image is performed to extract a set of visual characteristics of the AV. A visual characteristic in the set of visual characteristics is insufficient to uniquely identify the AV. From a set of AVs a subset of candidate AVs is selected where each candidate AV in the subset of candidate AVs matches within a tolerance at least one visual characteristic in the set of visual characteristics, the subset of candidate AVs including the AV. A stop command is sent to the AV, causing the AV to execute a stopping operation resulting in a change in a velocity of the AV.
    Type: Grant
    Filed: October 19, 2017
    Date of Patent: October 13, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael S. Gordon, James R. Kozloski, Ashish Kundu, Clifford A. Pickover
  • Patent number: 10792462
    Abstract: A context-sensitive soundscape is generated by receiving a first identifier for identifying a target cognitive state for a user, and a second identifier for identifying a user cohort for the user. A present context is determined for the user. A machine-learning procedure is performed to map the target cognitive state to a set of audio output characteristics based upon the identified user cohort and the determined present context. An audio output is generated to create the context-sensitive soundscape that includes the set of audio output characteristics.
    Type: Grant
    Filed: June 5, 2017
    Date of Patent: October 6, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael S. Gordon, James R. Kozloski, Ashish Kundu, Clifford A. Pickover
  • Patent number: 10779509
    Abstract: An unmanned aerial vehicle for determining geolocation exclusion zones of animals. The unmanned aerial vehicle includes a processor-based monitoring device to track geolocation information associated with an animal from the unmanned aerial vehicle, an identification device mounted on the unmanned aerial vehicle to identify the animal and to track a position of the animal over time, and a mapping device coupled to the monitoring device to determine locations where the animal has traversed and to identify where an encounter with the animal is reduced.
    Type: Grant
    Filed: February 4, 2020
    Date of Patent: September 22, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael S. Gordon, James R. Kozloski, Ashish Kundu, Peter K. Malkin, Clifford A. Pickover
  • Patent number: 10772295
    Abstract: An unmanned aerial vehicle for determining geolocation foraging zones for animals, the unmanned aerial vehicle comprising a processor-based monitoring device to monitor a plurality of geolocations, an identification device to identify an animal and to track a position of the animal in relation to the plurality of geolocations, a risk analysis device to evaluate a level of risk associated with each of the plurality of geolocations, and a mapping device coupled to the monitoring device to select a geolocation foraging zone when the level of risk associated with the geolocation foraging zone is below a predetermined threshold value.
    Type: Grant
    Filed: August 22, 2016
    Date of Patent: September 15, 2020
    Assignee: International Business Machines Corporation
    Inventors: Vittorio Castelli, Ashish Kundu, Clifford A. Pickover
  • Publication number: 20200265723
    Abstract: A method, system, and/or computer program product controls operations of an aerial drone within a predetermined airspace. One or more processors detects that the aerial drone has entered a predetermined airspace, and also determines a physical size of the aerial drone. In response to detecting that the aerial drone has entered the predetermined airspace, one or more processors directs the aerial drone to alter a velocity of the aerial drone based on its physical size.
    Type: Application
    Filed: March 8, 2020
    Publication date: August 20, 2020
    Inventors: MICHAEL S. GORDON, JAMES R. KOZLOSKI, ASHISH KUNDU, PETER K. MALKIN, CLIFFORD A. PICKOVER
  • Patent number: 10740445
    Abstract: A system, method and program product for providing cognitive behavior security control (CBSC). A system is disclosed that includes: a repository having a plurality of challenges each including an interactive graphical task; a user interface for graphically presenting challenges to users; an enrollment system for assigning challenges to users and determining an authentic response for each user; an authentication system that collects an observed response from a user presented with an assigned challenge and determines a security control result based on a closeness of the observed response with the authentic response of the user.
    Type: Grant
    Filed: July 18, 2017
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Anuradha Bhamidipaty, Ashish Kundu, Debasisha Padhi, Sreekrishnan Venkateswaran
  • Patent number: 10717446
    Abstract: A computer-implemented method, system, and/or computer program product controls a driving mode of a self-driving vehicle (SDV). One or more processors compare a control processor competence level of an on-board SDV control processor in controlling the SDV to a human driver competence level of a human driver in controlling the SDV while the SDV encounters a current roadway condition which is a result of current weather conditions of the roadway on which the SDV is currently traveling. One or more processors then selectively assign control of the SDV to the SDV control processor or to the human driver while the SDV encounters the current roadway condition based on which of the control processor competence level and the human driver competence level is relatively higher to one another.
    Type: Grant
    Filed: April 18, 2018
    Date of Patent: July 21, 2020
    Assignee: Slingshot IOT LLC
    Inventors: Michael S. Gordon, James R. Kozloski, Ashish Kundu, Peter K. Malkin, Clifford A. Pickover
  • Patent number: 10715317
    Abstract: A processor-implemented method improves security in a blockchain network of devices, which supports a blockchain, by protecting security, privacy, financial fairness, and secure transfer of identity assets. An identity asset provider device creates an identity asset related to an entity. The identity asset provider also creates a provider key, which is composed of multiple bits, and which is needed to decrypt an encrypted version of the identity asset. The identity asset provider device transmits the provider key bit-by-bit to an identity asset consumer device. A price for the provider key depends on how many bits have been transmitted to the identity asset consumer device.
    Type: Grant
    Filed: December 12, 2017
    Date of Patent: July 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Suresh Chari, Hasini Gunasinghe, Ashish Kundu, Kapil Kumar Singh, Dong Su
  • Publication number: 20200211095
    Abstract: A method, system, and/or computer program product controls a self-driving vehicle (SDV) based on a purchase transaction at a point of sale (POS) device. One or more processors detects a purchase transaction at a device for a product. In response to detecting the purchase transaction at the POS device, the processors(s) transmits instructions to the SDV to transport a passenger associated with the purchase transaction from a location of the POS device to a predetermined location.
    Type: Application
    Filed: March 6, 2020
    Publication date: July 2, 2020
    Inventors: MICHAEL S. GORDON, JAMES R. KOZLOSKI, ASHISH KUNDU, PETER K. MALKIN, CLIFFORD A. PICKOVER
  • Publication number: 20200210609
    Abstract: Automatically generating audit logs is provided. Audit log statement insertion points are identified in components of an application based on a static code analysis identifying start and end operations on sensitive data in the components of the application. The application is instrumented with audit log statements at the audit log statement insertion points in the components of the application. Audit logs of monitored sensitive data activity events in the application are generated using the audit log statements at the audit log statement insertion points in the components of the application.
    Type: Application
    Filed: March 10, 2020
    Publication date: July 2, 2020
    Inventors: Suresh N. Chari, Ted A. Habeck, Ashish Kundu, Ian M. Molloy
  • Publication number: 20200198783
    Abstract: A vehicular alert system includes an autonomous aerial vehicle and a central computer. The autonomous aerial vehicle includes a processor, a display, and a detector. The processor controls a data transceiver. The detector detects one or more vehicular condition. The central computer communicates with the autonomous aerial vehicle via the data transceiver. The central computer includes a memory device. The memory device stores vehicular condition data and road condition data. The central computer communicates one of a vehicular condition or a road condition to the autonomous aerial vehicle. The processor of the autonomous aerial vehicle displays the received condition on the display.
    Type: Application
    Filed: February 28, 2020
    Publication date: June 25, 2020
    Inventors: ASHISH KUNDU, CLIFFORD A. PICKOVER, JAMES R. KOZLOSKI, JUSTIN D. WEISZ, MICHAEL GORDON
  • Publication number: 20200204557
    Abstract: An example operation may include one or more of receiving, by a blockchain node or peer of a blockchain network, attribute data for a user profile, creating blockchain transactions to store attribute hashes and metadata to a shared ledger, receiving a user profile query from an identity consumer, creating blockchain transactions to retrieve attribute hashes and metadata corresponding to the query, reconstructing the user profile from the metadata, responding to the query by providing attribute data to the identity consumer, and creating and storing hashes of the attribute data and metadata to the shared ledger.
    Type: Application
    Filed: December 19, 2018
    Publication date: June 25, 2020
    Inventors: Kapil Kumar Singh, Suresh N. Chari, Ashish Kundu, Sridhar Muppidi, Dong Su
  • Patent number: 10685127
    Abstract: Provided is a computer-implemented method for automatically preserving privacy in a user interface. The method includes detecting privacy objects that are being presented via a UI of a computing device to a first user. A security status of the UI is evaluated based at least in part on analyzing audio captured by an audio capture device of the computing device. A privacy mode of the UI that executes privacy actions that are associated with the detected privacy objects is activated based on determining that the security status is in an unsecure state. The privacy mode is deactivated based on determining that the security status has changed from the unsecure state to a secure state, in which determining that the security status has changed from unsecure to secure is based on analyzing the audio captured by the audio capture device of the computing device.
    Type: Grant
    Filed: January 8, 2018
    Date of Patent: June 16, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ashish Kundu, Amit Anil Nanavati, Danny Soroker
  • Patent number: 10685391
    Abstract: A method, system, and/or computer program product controls a self-driving vehicle based on a purchase transaction at a point of sale (POS) device. One or more processors detect a purchase transaction at the POS device. In response to detecting the purchase transaction at the POS device, the processor(s) transmit instructions to the SDV to pick up a passenger associated with the purchase transaction at a predetermined location.
    Type: Grant
    Filed: May 24, 2016
    Date of Patent: June 16, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael S. Gordon, James R. Kozloski, Ashish Kundu, Peter K. Malkin, Clifford A. Pickover