Patents by Inventor Ashish Kundu

Ashish Kundu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200170219
    Abstract: An unmanned aerial vehicle for determining geolocation exclusion zones of animals. The unmanned aerial vehicle includes a processor-based monitoring device to track geolocation information associated with an animal from the unmanned aerial vehicle, an identification device mounted on the unmanned aerial vehicle to identify the animal and to track a position of the animal over time, and a mapping device coupled to the monitoring device to determine locations where the animal has traversed and to identify where an encounter with the animal is reduced.
    Type: Application
    Filed: February 4, 2020
    Publication date: June 4, 2020
    Inventors: Michael S. Gordon, James R. Kozloski, Ashish Kundu, Peter K. Malkin, Clifford A. Pickover
  • Publication number: 20200174949
    Abstract: Server resources in a data center are disaggregated into shared server resource pools, which include a pool of secure processors. Advantageously, servers are constructed dynamically, on-demand and based on a tenant's workload requirements, by allocating from these resource pools. According to this disclosure, secure processor modules for new servers are allocated to provide security for data-in-use (and data-at-rest) in a dynamic fashion so that virtual and non-virtual capacity can be adjusted in the disaggregate compute system without any downtime, e.g., based on workload security requirements and data sensitivity characteristics. The approach herein optimizes an overall utilization of an available secure processors resource pool in the disaggregated environment. The resulting disaggregate compute system that is configured according to the approach cryptographically-protects workload data whenever it is outside the CPU chip.
    Type: Application
    Filed: November 29, 2018
    Publication date: June 4, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: HariGovind V. RAMASAMY, Eugen SCHENFELD, Valentina SALAPURA, John A. BIVENS, Yaoping RUAN, Min LI, Ashish KUNDU, Ruchi MAHINDRU, Richard H. BOIVIE
  • Patent number: 10671325
    Abstract: A processor-implemented method, system, and/or computer program product deletes data from a storage device. One or more processors identify a component sensitivity level of a component, an input sensitivity level of a data input to the component, and an output sensitivity level of a data output from the component, where the data output is stored in a storage device. The processor(s) average the component sensitivity level, the input sensitivity level, and the output sensitivity level to establish a composite sensitivity level, determine a deletion mode for deleting the output data from the storage device based on the composite sensitivity level, and delete the output data from the storage device by utilizing the deletion mode.
    Type: Grant
    Filed: October 28, 2015
    Date of Patent: June 2, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ashish Kundu, Dimitrios Pendarakis
  • Patent number: 10666636
    Abstract: A method establishes a session between a network service and a user device used by the user having a particular sociometric identity. One or more processors identify an interaction between a user and one or more provider entities. The processor(s) identify profiles for the one or more provider entities, where each profile of the one or more provider entities describes a type of service provided by a respective provider entity of the one or more provider entities, and compute a sociometric identity of the user based on the profiles of the one or more provider entities with which the user has had an interaction. One or more processors transmit the sociometric identity to a network service in order to establish a session between the network service and a user device used by the user having the sociometric identity.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: May 26, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ashish Kundu, Nalini K. Ratha
  • Publication number: 20200162469
    Abstract: Embodiments of the present invention provide systems and methods for thwarting attempts at the unauthorized access to the restricted resources within the target server in a multi-node system. Real-time detection of the user ID and thread ID associated with attempts to access the restricted resources within the target server in a multi-node system is achieved by analyzing causality, message queue, and event-driven patterns.
    Type: Application
    Filed: January 22, 2020
    Publication date: May 21, 2020
    Inventors: Ashish Kundu, Byung Chul Tak
  • Patent number: 10654570
    Abstract: A vehicular alert system includes an autonomous aerial vehicle and a central computer. The autonomous aerial vehicle includes a processor, a display, and a detector. The processor controls a data transceiver. The detector detects one or more vehicular condition. The central computer communicates with the autonomous aerial vehicle via the data transceiver. The central computer includes a memory device. The memory device stores vehicular condition data and road condition data. The central computer communicates one of a vehicular condition or a road condition to the autonomous aerial vehicle. The processor of the autonomous aerial vehicle displays the received condition on the display.
    Type: Grant
    Filed: June 5, 2017
    Date of Patent: May 19, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ashish Kundu, Clifford A. Pickover, James R. Kozloski, Justin D. Weisz, Michael Gordon
  • Patent number: 10657830
    Abstract: A method, system, and/or computer program product controls operations of an aerial drone within a predetermined airspace. A drone controller device detects a presence of an aerial drone. The drone controller device and the aerial drone negotiate permission to fly within a predetermined airspace under a predefined aerial drone state. In response to successfully negotiating the permission, the drone controller device enables a drone on-board computer to operate the aerial drone within the predetermined airspace in accordance with the predefined aerial drone state.
    Type: Grant
    Filed: March 28, 2016
    Date of Patent: May 19, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael S. Gordon, James R. Kozloski, Ashish Kundu, Peter K. Malkin, Clifford A. Pickover
  • Publication number: 20200151028
    Abstract: Embodiments for implementing partial synchronization between compute processes based on threshold specification in a computing environment. One or more compute processes may be synchronized in one of a plurality of types of computing platforms using a barrier having a barrier release condition based on a threshold of one or more measures. The barrier is defined according to one or more parameters. The one or more compute processes may be released via the barrier upon exceeding the threshold of the one or more measures.
    Type: Application
    Filed: November 13, 2018
    Publication date: May 14, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Zehra SURA, Li ZHANG, Ashish KUNDU, Ravi NAIR
  • Patent number: 10628600
    Abstract: Automatically generating audit logs is provided. Audit log statement insertion points are identified in software components of an application based on a static code analysis identifying start and end operations on sensitive data in the software components of the application. The application is instrumented with audit log statements at the audit log statement insertion points in the software components of the application. Audit logs of monitored sensitive data activity events in the application are generated using the audit log statements at the audit log statement insertion points in the software components of the application. A dynamic code analysis is performed on the application during execution of the application to prevent executing source code of the application from recording in the audit logs the sensitive data processed by the application.
    Type: Grant
    Filed: March 6, 2018
    Date of Patent: April 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Suresh N. Chari, Ted A. Habeck, Ashish Kundu, Ian M. Molloy
  • Publication number: 20200115863
    Abstract: Aspects of the present disclosure relate to an autonomous mobile attenuator system for mitigating vehicular collisions. The system includes one or more mobile attenuators that receive data indicating a need for deployment from one or more sensors. The one or more mobile attenuators perform a collision risk assessment on the received data to determine a probability of a potential vehicle collision. The one or more mobile attenuators determine the probability of the potential vehicle collision exceeds a predetermined risk threshold value. The one or more mobile attenuators determine a predicted location for the potential vehicle collision. The one or more mobile attenuators proceed to the predicted location to mitigate the potential vehicle collision.
    Type: Application
    Filed: October 10, 2018
    Publication date: April 16, 2020
    Inventors: James R. Kozloski, Michael S. Gordon, Ashish Kundu, Clifford A. Pickover
  • Patent number: 10609901
    Abstract: An unmanned aerial vehicle for determining geolocation exclusion zones of animals. The unmanned aerial vehicle includes a processor-based monitoring device to track geolocation information associated with an animal from the unmanned aerial vehicle, an identification device mounted on the unmanned aerial vehicle to identify the animal and to track a position of the animal over time, and a mapping device coupled to the monitoring device to determine locations where the animal has traversed and to identify where an encounter with the animal is reduced.
    Type: Grant
    Filed: February 19, 2016
    Date of Patent: April 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael S. Gordon, James R. Kozloski, Ashish Kundu, Peter K. Malkin, Clifford A. Pickover
  • Patent number: 10611474
    Abstract: A secure chain of data blocks is maintained at a given computing node, wherein the given computing node is part of a set of computing nodes in a distributed network of computing nodes, and wherein each of the set of computing nodes maintains the secure chain of data blocks. The secure chain of data blocks maintained at each computing node comprises one or more data blocks that respectively represent one or more transactions associated with an unmanned aerial vehicle (UAV). At least one data block is added to the secure chain of data blocks maintained at the given computing node in response to determining that transaction data associated with the at least one data block is valid.
    Type: Grant
    Filed: March 20, 2017
    Date of Patent: April 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Abhishek Kumar, Ashish Kundu, Clifford A. Pickover, Komminist Weldemariam
  • Patent number: 10607293
    Abstract: A method and/or computer program product automatically toggles insurance policy provisions for a self-driving vehicle (SDV) based on an operational mode of the SDV. One or more processor(s) receive an electronic signal indicating an operational mode of an SDV in real-time, where operational mode is either an autonomous mode or a manual mode. A first insurance policy provision provides coverage while the SDV is operating in the autonomous mode, and a second insurance policy provision provides coverage while the SDV is operating in the manual mode. The processor(s) monitor the SDV for a change in real-time to the operational mode of the SDV. In response to detecting a change in real-time to the operational mode of the SDV, the processor(s) dynamically toggle activation of the first and second insurance policy provisions consistent with the change in real-time to the operational mode of the SDV.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: March 31, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael S. Gordon, James R. Kozloski, Ashish Kundu, Peter K. Malkin, Clifford A. Pickover
  • Publication number: 20200099698
    Abstract: A method contains malware within a network resource. A blockchain system establishes a smart contract, on the blockchain system, for a network resource in a computer environment. The smart contract is for an action to be performed on the network resource if a malware is detected on the network resource. In response to malware being detected in the network resource, the blockchain system determines whether a consensus is reached by a plurality of computers on the blockchain system to implement the action to contain the malware based on the smart contract. In response to the consensus being reached by the plurality of computers, the blockchain system transmits, to the network resource, directions to implement the action on the network resource as specified by the smart contract.
    Type: Application
    Filed: September 21, 2018
    Publication date: March 26, 2020
    Inventors: ASHISH KUNDU, ABHISHEK MALVANKAR, SURESH N. CHARI
  • Patent number: 10581859
    Abstract: Embodiments of the present invention provide systems and methods for thwarting attempts at the unauthorized access to the restricted resources within the target server in a multi-node system. Real-time detection of the user ID and thread ID associated with attempts to access the restricted resources within the target server in a multi-node system is achieved by analyzing causality, message queue, and event-driven patterns.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: March 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ashish Kundu, Byung Chul Tak
  • Publication number: 20200067941
    Abstract: A method alters a computer resource in response to the computer resource moving from a first geolocation to a second geolocation. One or more processors receive a message indicating that a computer resource has moved from a first geolocation to a new geolocation. In response to receiving the message that the computer resource has moved from the first geolocation to the new geolocation, the processor(s) encrypt data that is stored on the computer resource, and apply decryption information to the encrypted data from the new geolocation, where the decryption information is specifically for decrypting encrypted data at the new geolocation. In response to the decryption information failing to decrypt the encrypted data at the new geolocation, the processor(s) and/or a user alter the computer resource.
    Type: Application
    Filed: October 29, 2019
    Publication date: February 27, 2020
    Inventors: Ashish KUNDU, Dimitrios PENDARAKIS, David R. SAFFORD
  • Publication number: 20200044848
    Abstract: A processor-implemented method facilitates identity exchange in a decentralized setting. A first system performs a pseudonymous handshake with a second system that has created an identity asset that identifies an entity. The second system has transmitted the identity asset to a third system, which is a set of peer computers that support a blockchain that securely maintains a ledger of the identity asset. The first system transmits a set of pseudonyms to the third system, where the set of pseudonyms comprises a first pseudonym that identifies the first system, a second pseudonym that identifies a user of the second system, and a third pseudonym that identifies the third system. The first system receives the identity asset from the third system, which securely ensures a validity of the identity asset as identified by the first pseudonym, the second pseudonym, and the third pseudonym.
    Type: Application
    Filed: August 2, 2018
    Publication date: February 6, 2020
    Inventors: SURESH N. CHARI, HASINI GUNASINGHE, ASHISH KUNDU, KAPIL KUMAR SINGH, DONG SU
  • Patent number: 10549602
    Abstract: A computer-implemented air quality amelioration method, computer program product, and system for a self-driving vehicle, the method including detecting a value of an air quality within a cabin of the self-driving vehicle and performing an amelioration action to improve the value of the air quality based on the detection of the value of the air quality being less than a predetermined value.
    Type: Grant
    Filed: January 3, 2017
    Date of Patent: February 4, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ashish Kundu, Clifford A. Pickover, Maja Vukovic, Komminist Weldemariam
  • Patent number: 10553045
    Abstract: A computer-implemented method includes obtaining fault information regarding a fault associated with a first drone. The computer-implemented method additionally includes obtaining context parameter data of the first drone. The computer-implemented method additionally includes, responsive to obtaining the fault information and the context parameter data, determining to apply a first test case of a plurality of test cases based on a first risk value determined for the first test case using the context parameter data. The first test case is associated with the fault. The computer-implemented method additionally includes causing the first drone to initiate execution of the first test case.
    Type: Grant
    Filed: March 1, 2018
    Date of Patent: February 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ashish Kundu, Ruchi Mahindru, Valentina Salapura, Manas R. Kumar Singh
  • Publication number: 20200036515
    Abstract: A processor-implemented method provides a calculated identity confidence score for an identity. The processor(s) in each of a plurality of decentralized identity providers calculate an identity confidence score of an entity. The processor(s) store the calculated identity confidence score in a blockchain. The processor(s) retrieve the calculated identity confidence score from the blockchain. The processor(s) provide the calculated identity confidence score to a requestor, which is a computer-based system that performs an action based on the provided calculated identity score.
    Type: Application
    Filed: July 30, 2018
    Publication date: January 30, 2020
    Inventors: SURESH N. CHARI, ASHISH KUNDU, SRIDHAR MUPPIDI