Patents by Inventor Kakan Roy
Kakan Roy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10896247Abstract: Access to documents by parties can be controlled as follows. First, access can be controlled in accordance with access counters associated with the parties, where the documents have one or more versions. Second, access can be controlled in accordance with access levels associated with the parties. The access level of each party is one of a first access level, a second access level, a third access level, or a fourth access level. The first, second, third, and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. Third, access can be controlled in accordance with placement of organizations within a hierarchy of organizations, where the parties are organized over the organizations.Type: GrantFiled: January 24, 2018Date of Patent: January 19, 2021Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh H. Lam, Thao N. Nguyen, Kakan Roy, Amit J. Shah
-
Publication number: 20180150442Abstract: Access to documents by parties can be controlled as follows. First, access can be controlled in accordance with access counters associated with the parties, where the documents have one or more versions. Second, access can be controlled in accordance with access levels associated with the parties. The access level of each party is one of a first access level, a second access level, a third access level, or a fourth access level. The first, second, third, and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. Third, access can be controlled in accordance with placement of organizations within a hierarchy of organizations, where the parties are organized over the organizations.Type: ApplicationFiled: January 24, 2018Publication date: May 31, 2018Inventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh H. Lam, Thao N. Nguyen, Kakan Roy, Amit J. Shah
-
Patent number: 9971750Abstract: Illustrative embodiments disclose a computer process controlling access to one or more documents by one or more parties, the parties organized over one or more organizations. In response to a party associated with a first organization attempting to access documents, determining an access level associated with the party as a first access level, a second access level, a third access level, or a fourth access level. The first, second, third and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. In response to determining the access level associated with the party, permitting the party to access the documents, or preventing the party from accessing the documents, according to the access level associated with the party.Type: GrantFiled: April 10, 2012Date of Patent: May 15, 2018Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh Hue Lam, Thao Ngoc Nguyen, Kakan Roy, Amit Jaysukhial Shah
-
Patent number: 9323751Abstract: Access to documents by parties can be controlled as follows. First, access can be controlled in accordance with access counters associated with the parties, where the documents have one or more versions. Second, access can be controlled in accordance with access levels associated with the parties. The access level of each party is one of a first access level, a second access level, a third access level, or a fourth access level. The first, second, third, and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. Third, access can be controlled in accordance with placement of organizations within a hierarchy of organizations, where the parties are organized over the organizations.Type: GrantFiled: March 5, 2008Date of Patent: April 26, 2016Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh Hue Lam, Thao Ngoc Nguyen, Kakan Roy, Amit Jaysukhlal Shah
-
Patent number: 8635218Abstract: A method, system, and computer program for transforming a first document into a second document, whereby the second document is configured for use at an electronic device. The invention receives interface information about the electronic device. A content rules selector is configured to select content rules for modifying content in the first document. A presentation rules selector is configured to select presentation rules for presenting the content from the first document. A transformation generator is configured to combine the content rules and presentation rules to form transformation instructions for transforming the first document into the second document.Type: GrantFiled: September 2, 2003Date of Patent: January 21, 2014Assignee: International Business Machines CorporationInventors: Thomas Y. Kwok, Linh H. Lam, Thao N. Nguyen, Kakan Roy
-
Publication number: 20120197942Abstract: Illustrative embodiments disclose a computer process controlling access to one or more documents by one or more parties, the parties organized over one or more organizations. In response to a party associated with a first organization attempting to access documents, determining an access level associated with the party as a first access level, a second access level, a third access level, or a fourth access level. The first, second, third and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. In response to determining the access level associated with the party, permitting the party to access the documents, or preventing the party from accessing the documents, according to the access level associated with the party.Type: ApplicationFiled: April 10, 2012Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh Hue Lam, Thao Ngoc Nguyen, Kakan Roy, Amit Jaysukhial Shah
-
Patent number: 8140468Abstract: A system and method for automatically extracting contract data from electronic contracts includes an administrator module configured to provide templates for inputting document patterns and a list of contract data tags for each of a plurality of contract document types. A parser is configured to convert an electronic contract document into a contract text document and reformat the contract text document to provide a pattern for the text contract document. A pattern recognition engine is configured to determine a list of contract document types in the electronic contract by comparing and matching patterns of all known contract document types with the pattern of the contract text document. A contract data extraction engine is configured to extract contract data for each contract document type on the list.Type: GrantFiled: June 4, 2008Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventors: Thomas Yu-Kiu Kwok, Thao Ngoc Nguyen, Kakan Roy
-
Publication number: 20090228311Abstract: Access to documents by parties can be controlled as follows. First, access can be controlled in accordance with access counters associated with the parties, where the documents have one or more versions. Second, access can be controlled in accordance with access levels associated with the parties. The access level of each party is one of a first access level, a second access level, a third access level, or a fourth access level. The first, second, third, and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. Third, access can be controlled in accordance with placement of organizations within a hierarchy of organizations, where the parties are organized over the organizations.Type: ApplicationFiled: March 5, 2008Publication date: September 10, 2009Inventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh Hue Lam, Thao Ngoc Nguyen, Kakan Roy, Amit Jaysukhlal Shah
-
Publication number: 20080235227Abstract: A system and method for automatically extracting contract data from electronic contracts includes an administrator module configured to provide templates for inputting document patterns and a list of contract data tags for each of a plurality of contract document types. A parser is configured to convert an electronic contract document into a contract text document and reformat the contract text document to provide a pattern for the text contract document. A pattern recognition engine is configured to determine a list of contract document types in the electronic contract by comparing and matching patterns of all known contract document types with the pattern of the contract text document. A contract data extraction engine is configured to extract contract data for each contract document type on the list.Type: ApplicationFiled: June 4, 2008Publication date: September 25, 2008Inventors: Thomas Yu-Kiu Kwok, Thao Ngoc Nguyen, Kakan Roy
-
Patent number: 7363509Abstract: Under the present invention, a customized contract is created based on the needs of the parties and is then stored within a secure computer infrastructure. Security within the computer infrastructure is typically provided through encryption such as 128 bit encryption. Moreover, all actions taken with respect to the contract (e.g., approval, execution, etc.) occur within the infrastructure and are recorded so that a record can be provided. Any party taking action will first be authenticated before access to the infrastructure is granted. In order for the contract to be electronically executed, both the originating contract partner and the receiving contract partner must first deliberately approve the contract. Once approval has been obtained, the contract can be electronically executed by both parties. After execution is complete, a final image of the contract is generated that includes the electronic signatures and the date of execution.Type: GrantFiled: January 21, 2004Date of Patent: April 22, 2008Assignee: International Business Machines CorporationInventors: Aston G. Farquharson, Michael J. Cammarota, John R. Harrison, Thomas Y. Kwok, Linh Hue Lam, Thao N. Nguyen, Michael A. Penn, Kakan Roy, Michael B. Sandler, Gary D. Wexler
-
Publication number: 20070300295Abstract: A system and method for automatically extracting contract data from electronic contracts includes an administrator module configured to provide templates for inputting document patterns and a list of contract data tags for each of a plurality of contract document types. A parser is configured to convert an electronic contract document into a contract text document and reformat the contract text document to provide a pattern for the text contract document. A pattern recognition engine is configured to determine a list of contract document types in the electronic contract by comparing and matching patterns of all known contract document types with the pattern of the contract text document. A contract data extraction engine is configured to extract contract data for each contract document type on the list.Type: ApplicationFiled: June 22, 2006Publication date: December 27, 2007Inventors: Thomas Yu-Kiu Kwok, Thao Ngoc Nguyen, Kakan Roy
-
Publication number: 20050160278Abstract: Under the present invention, a customized contract is created based on the needs of the parties and is then stored within a secure computer infrastructure. Security within the computer infrastructure is typically provided through encryption such as 128 bit encryption. Moreover, all actions taken with respect to the contract (e.g., approval, execution, etc.) occur within the infrastructure and are recorded so that a record can be provided. Any party taking action will first be authenticated before access to the infrastructure is granted. In order for the contract to be electronically executed, both the originating contract partner and the receiving contract partner must first deliberately approve the contract. Once approval has been obtained, the contract can be electronically executed by both parties. After execution is complete, a final image of the contract is generated that includes the electronic signatures and the date of execution.Type: ApplicationFiled: January 21, 2004Publication date: July 21, 2005Applicant: International Business Machines CorporationInventors: Aston Farquharson, Michael Cammarota, John Harrison, Thomas Kwok, Linh Lam, Thao Nguyen, Michael Penn, Kakan Roy, Michael Sandler, Gary Wexler
-
Publication number: 20050050000Abstract: A method, system, and computer program for transforming a first document into a second document, whereby the second document is configured for use at an electronic device. The invention receives interface information about the electronic device. A content rules selector is configured to select content rules for modifying content in the first document. A presentation rules selector is configured to select presentation rules for presenting the content from the first document. A transformation generator is configured to combine the content rules and presentation rules to form transformation instructions for transforming the first document into the second document.Type: ApplicationFiled: September 2, 2003Publication date: March 3, 2005Inventors: Thomas Kwok, Linh Lam, Thao Nguyen, Kakan Roy
-
Publication number: 20040044566Abstract: A method, system and computer program for providing content from a merchant site to a target user over a computer network. The merchant site provides a landing page to the target user in response to a request for data. The landing page includes a redirect module configured to redirect the target user to a destination page. The landing page also includes a cookie module configured to store a computer readable client cookie in memory identifying the marketing channel referring the target user to the merchant site.Type: ApplicationFiled: August 30, 2002Publication date: March 4, 2004Inventors: Janet K. Bostelmann, Casey L. Gentry, Thomas Y. Kwok, Linh H. Lam, Thao N. Nguyen, Kakan Roy