Patents by Inventor Nisanth M. Simon
Nisanth M. Simon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10936753Abstract: The present invention provides a method and system for securely transferring data over a computer network. A first party's computer: parses vulnerable words and numbers of a data set providing information for a second party, generates masked values of the parsed vulnerable words and numbers, updates the data set by replacing the vulnerable words and numbers with the masked values, and sends the updated data set to a third party for analysis, and for subsequent decoding, by the second party, of the masked values of the parsed vulnerable words and numbers. The first party's computer generates a first, second, third and fourth symbol of the masked values of a parsed word by: incrementing a first symbol of the parsed word by one, decrementing a second symbol of the parsed word by one, decrementing a second symbol of the parsed word by one, and inserting a predetermined marker symbol, respectively.Type: GrantFiled: October 8, 2019Date of Patent: March 2, 2021Assignee: International Business Machines CorporationInventors: Javed Iqbal Abdul, Jose Peter, Nisanth M. Simon
-
Patent number: 10740711Abstract: According to an embodiment of the present invention, a system dynamically optimizes a service workflow including one or more software services. Initially, the system receives a request to optimize a service workflow, wherein the request includes one or more service requirements and one or more performance objectives related to the one or more service requirements. The system validates service plan information associated with at least one software service plan offered by one or more service providers and generates a plurality of candidate workflows based on the service requirements and performance objectives. The system then determines an optimized workflow from the candidate workflows and executes the optimized workflow to perform operations of the software services. Embodiments of the present invention further include a method and computer program product for dynamically optimizing a service workflow including one or more software services in substantially the same manner as described above.Type: GrantFiled: October 31, 2018Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Trent A. Gray-Donald, Simon Harris, Nisanth M. Simon
-
Patent number: 10733557Abstract: According to an embodiment of the present invention, a system dynamically optimizes a service workflow including one or more software services. Initially, the system receives a request to optimize a service workflow, wherein the request includes one or more service requirements and one or more performance objectives related to the one or more service requirements. The system validates service plan information associated with at least one software service plan offered by one or more service providers and generates a plurality of candidate workflows based on the service requirements and performance objectives. The system then determines an optimized workflow from the candidate workflows and executes the optimized workflow to perform operations of the software services. Embodiments of the present invention further include a method and computer program product for dynamically optimizing a service workflow including one or more software services in substantially the same manner as described above.Type: GrantFiled: April 4, 2017Date of Patent: August 4, 2020Assignee: International Business Machines CorporationInventors: Trent A. Gray-Donald, Simon Harris, Nisanth M. Simon
-
Patent number: 10628395Abstract: Embodiments of the present invention disclose a method, computer program product, and system for detecting changes in database schema. The embodiments may include receiving a first database schema. The embodiments may include creating a first value corresponding to the first database schema by utilizing a compressed value algorithm. The compressed value algorithm may create a single value corresponding to each database schema. The embodiments may include receiving a second database schema. The embodiments may include creating a second value corresponding to the second database schema by utilizing the compressed value algorithm. The embodiments may include determining whether there is a difference between the first database schema and the second database schema by comparing the first value and the second value.Type: GrantFiled: May 17, 2016Date of Patent: April 21, 2020Assignee: International Business Machines CorporationInventors: Nisanth M. Simon, Tuong C. Truong, Ruiming Zhou
-
Publication number: 20200034568Abstract: The present invention provides a method and system for securely transferring data over a computer network. A first party's computer: parses vulnerable words and numbers of a data set providing information for a second party, generates masked values of the parsed vulnerable words and numbers, updates the data set by replacing the vulnerable words and numbers with the masked values, and sends the updated data set to a third party for analysis, and for subsequent decoding, by the second party, of the masked values of the parsed vulnerable words and numbers. The first party's computer generates a first, second, third and fourth symbol of the masked values of a parsed word by: incrementing a first symbol of the parsed word by one, decrementing a second symbol of the parsed word by one, decrementing a second symbol of the parsed word by one, and inserting a predetermined marker symbol, respectively.Type: ApplicationFiled: October 8, 2019Publication date: January 30, 2020Inventors: Javed Iqbal Abdul, Jose Peter, Nisanth M. Simon
-
Patent number: 10521609Abstract: The present invention provides a method, and associated computer system and computer program product, for masking selected vulnerable data portions of a data set transmitted over a network by parsing the vulnerable data, generating masked values for the vulnerable data including generating symbols of the masked values of a parsed word of the parsed vulnerable data, updating the data set to include the masked values, then sending the updated data set to a third party for analysis and for subsequent decoding of the masked values of the parsed vulnerable data. The symbols, used to represent basic sounds of a language, are contained in a set in a fixed order.Type: GrantFiled: January 29, 2019Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Javed Iqbal Abdul, Jose Peter, Nisanth M. Simon
-
Publication number: 20190156063Abstract: The present invention provides a method, and associated computer system and computer program product, for masking selected vulnerable data portions of a data set transmitted over a network by parsing the vulnerable data, generating masked values for the vulnerable data including generating symbols of the masked values of a parsed word of the parsed vulnerable data, updating the data set to include the masked values, then sending the updated data set to a third party for analysis and for subsequent decoding of the masked values of the parsed vulnerable data. The symbols, used to represent basic sounds of a language, are contained in a set in a fixed order.Type: ApplicationFiled: January 29, 2019Publication date: May 23, 2019Inventors: Javed Iqbal Abdul, Jose Peter, Nisanth M. Simon
-
Patent number: 10242231Abstract: The present invention provides a method, and associated computer system and computer program product, for masking selected vulnerable data portions of a data set transmitted over a network by parsing the vulnerable data, generating masked values for the vulnerable data, updating the data set to include the masked values, then sending the updated data set to a third party for analysis.Type: GrantFiled: March 22, 2017Date of Patent: March 26, 2019Assignee: International Business Machines CorporationInventors: Javed Iqbal Abdul, Jose Peter, Nisanth M. Simon
-
Publication number: 20190066008Abstract: According to an embodiment of the present invention, a system dynamically optimizes a service workflow including one or more software services. Initially, the system receives a request to optimize a service workflow, wherein the request includes one or more service requirements and one or more performance objectives related to the one or more service requirements. The system validates service plan information associated with at least one software service plan offered by one or more service providers and generates a plurality of candidate workflows based on the service requirements and performance objectives. The system then determines an optimized workflow from the candidate workflows and executes the optimized workflow to perform operations of the software services. Embodiments of the present invention further include a method and computer program product for dynamically optimizing a service workflow including one or more software services in substantially the same manner as described above.Type: ApplicationFiled: October 31, 2018Publication date: February 28, 2019Inventors: Trent A. Gray-Donald, Simon Harris, Nisanth M. Simon
-
Patent number: 10169379Abstract: Embodiments of the present invention disclose a method, computer program product, and system for detecting changes in database schema. The embodiments may include receiving a first database schema. The embodiments may include creating a first value corresponding to the first database schema by utilizing a compressed value algorithm. The compressed value algorithm may create a single value corresponding to each database schema. The embodiments may include receiving a second database schema. The embodiments may include creating a second value corresponding to the second database schema by utilizing the compressed value algorithm. The embodiments may include determining whether there is a difference between the first database schema and the second database schema by comparing the first value and the second value.Type: GrantFiled: June 26, 2015Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Nisanth M. Simon, Tuong C. Truong, Ruiming Zhou
-
Publication number: 20180285794Abstract: According to an embodiment of the present invention, a system dynamically optimizes a service workflow including one or more software services. Initially, the system receives a request to optimize a service workflow, wherein the request includes one or more service requirements and one or more performance objectives related to the one or more service requirements. The system validates service plan information associated with at least one software service plan offered by one or more service providers and generates a plurality of candidate workflows based on the service requirements and performance objectives. The system then determines an optimized workflow from the candidate workflows and executes the optimized workflow to perform operations of the software services. Embodiments of the present invention further include a method and computer program product for dynamically optimizing a service workflow including one or more software services in substantially the same manner as described above.Type: ApplicationFiled: April 4, 2017Publication date: October 4, 2018Inventors: Trent A. Gray-Donald, Simon Harris, Nisanth M. Simon
-
Publication number: 20180276411Abstract: The present invention provides a method, and associated computer system and computer program product, for masking selected vulnerable data portions of a data set transmitted over a network by parsing the vulnerable data, generating masked values for the vulnerable data, updating the data set to include the masked values, then sending the updated data set to a third party for analysis.Type: ApplicationFiled: March 22, 2017Publication date: September 27, 2018Inventors: Javed Iqbal Abdul, Jose Peter, Nisanth M. Simon
-
Publication number: 20160378794Abstract: Embodiments of the present invention disclose a method, computer program product, and system for detecting changes in database schema. The embodiments may include receiving a first database schema. The embodiments may include creating a first value corresponding to the first database schema by utilizing a compressed value algorithm. The compressed value algorithm may create a single value corresponding to each database schema. The embodiments may include receiving a second database schema. The embodiments may include creating a second value corresponding to the second database schema by utilizing the compressed value algorithm. The embodiments may include determining whether there is a difference between the first database schema and the second database schema by comparing the first value and the second value.Type: ApplicationFiled: May 17, 2016Publication date: December 29, 2016Inventors: Nisanth M. Simon, Tuong C. Truong, Ruiming Zhou
-
Publication number: 20160378793Abstract: Embodiments of the present invention disclose a method, computer program product, and system for detecting changes in database schema. The embodiments may include receiving a first database schema. The embodiments may include creating a first value corresponding to the first database schema by utilizing a compressed value algorithm. The compressed value algorithm may create a single value corresponding to each database schema. The embodiments may include receiving a second database schema. The embodiments may include creating a second value corresponding to the second database schema by utilizing the compressed value algorithm. The embodiments may include determining whether there is a difference between the first database schema and the second database schema by comparing the first value and the second value.Type: ApplicationFiled: June 26, 2015Publication date: December 29, 2016Inventors: Nisanth M. Simon, Tuong C. Truong, Ruiming Zhou
-
Publication number: 20150379525Abstract: Methods and arrangements for identifying a potential customer base of a concern. A contemplated method includes: identifying a prospective customer of a concern, via a social media network; identifying connections of the prospective customer within the social media network; determining a subset of the connections, wherein members of the subset comprise members of the concern; determining connections of the members of the subset; determining whether the connections of the members of the subset comprise the prospective customer; and if the connections of the members of the subset comprise the prospective customer, determining contact information of the prospective customer. Other variants and embodiments are broadly contemplated herein.Type: ApplicationFiled: June 25, 2014Publication date: December 31, 2015Inventors: Rema Ananthanarayanan, Shrinivas Kulkarni, Nisanth M. Simon, L. Venkata Subramaniam
-
Patent number: 8965867Abstract: Methods and arrangements for measuring and utilizing media topic influence. A publically disseminated media transmission is received. Public influence of the media transmission is measured via: identifying one or more media sources used to disseminate the media transmission; and obtaining one or more predetermined influence values associated with the one or more media sources.Type: GrantFiled: November 30, 2012Date of Patent: February 24, 2015Assignee: International Business Machines CorporationInventors: Sameep Mehta, Mrinmaya Sachan, Nisanth M. Simon, L. Venkata Subramaniam
-
Patent number: 8788470Abstract: Provided are techniques for selecting row identifiers from an initial index structure storing rows of randomized indexes. The row identifiers are randomized. Groups are formed with the randomized row identifiers so that each group has a predetermined number of row identifiers. At least one group is selected from the groups. Indexes are retrieved from the initial index structure that correspond to the row identifiers in the selected at least one group. The retrieved indexes are encoded by adding product information to form new identifiers.Type: GrantFiled: September 14, 2012Date of Patent: July 22, 2014Assignee: International Business Machines CorporationInventor: Nisanth M. Simon
-
Publication number: 20140156673Abstract: Methods and arrangements for measuring and utilizing media topic influence. A publically disseminated media transmission is received. Public influence of the media transmission is measured via: identifying one or more media sources used to disseminate the media transmission; and obtaining one or more predetermined influence values associated with the one or more media sources.Type: ApplicationFiled: November 30, 2012Publication date: June 5, 2014Applicant: International Business Machines CorporationInventors: Sameep Mehta, Mrinmaya Sachan, Nisanth M. Simon, L. Venkata Subramaniam
-
Patent number: 8560698Abstract: A plurality of subgroups of identifiers are identified including at least a first subgroup of identifiers and a second subgroup of identifiers within an identifier range. A first set of identifiers is selected in the first subgroup. The first set of identifiers in the first subgroup is compared with a second set of identifiers in the second subgroup and a first set of common identifiers is identified using metadata of the second set of identifiers. A third set of identifiers is generated by eliminating the first set of common identifiers from the first set of identifiers. The third set of identifiers is compared with a fourth set of identifiers in a repository of stored identifiers, to identify a second set of common identifiers. A fifth set of identifiers is generated by eliminating the second set of common identifiers from the third set of identifiers.Type: GrantFiled: June 27, 2010Date of Patent: October 15, 2013Assignee: International Business Machines CorporationInventors: Shrinivas Kulkarni, Nisanth M. Simon
-
Patent number: 8375066Abstract: A method, a system, and a computer program product for creating a set of identifiers are disclosed. A first set of identifiers is generated by a first randomization of a partition. Identifiers of the first set of identifiers are selected to generate a third set of identifiers. A second set of identifiers comprising a pre-defined number of identifiers is generated by a second randomization of the third set of identifiers.Type: GrantFiled: April 26, 2010Date of Patent: February 12, 2013Assignee: International Business Machines CorporationInventor: Nisanth M. Simon