Patents by Inventor Nisanth M. Simon

Nisanth M. Simon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10936753
    Abstract: The present invention provides a method and system for securely transferring data over a computer network. A first party's computer: parses vulnerable words and numbers of a data set providing information for a second party, generates masked values of the parsed vulnerable words and numbers, updates the data set by replacing the vulnerable words and numbers with the masked values, and sends the updated data set to a third party for analysis, and for subsequent decoding, by the second party, of the masked values of the parsed vulnerable words and numbers. The first party's computer generates a first, second, third and fourth symbol of the masked values of a parsed word by: incrementing a first symbol of the parsed word by one, decrementing a second symbol of the parsed word by one, decrementing a second symbol of the parsed word by one, and inserting a predetermined marker symbol, respectively.
    Type: Grant
    Filed: October 8, 2019
    Date of Patent: March 2, 2021
    Assignee: International Business Machines Corporation
    Inventors: Javed Iqbal Abdul, Jose Peter, Nisanth M. Simon
  • Patent number: 10740711
    Abstract: According to an embodiment of the present invention, a system dynamically optimizes a service workflow including one or more software services. Initially, the system receives a request to optimize a service workflow, wherein the request includes one or more service requirements and one or more performance objectives related to the one or more service requirements. The system validates service plan information associated with at least one software service plan offered by one or more service providers and generates a plurality of candidate workflows based on the service requirements and performance objectives. The system then determines an optimized workflow from the candidate workflows and executes the optimized workflow to perform operations of the software services. Embodiments of the present invention further include a method and computer program product for dynamically optimizing a service workflow including one or more software services in substantially the same manner as described above.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Trent A. Gray-Donald, Simon Harris, Nisanth M. Simon
  • Patent number: 10733557
    Abstract: According to an embodiment of the present invention, a system dynamically optimizes a service workflow including one or more software services. Initially, the system receives a request to optimize a service workflow, wherein the request includes one or more service requirements and one or more performance objectives related to the one or more service requirements. The system validates service plan information associated with at least one software service plan offered by one or more service providers and generates a plurality of candidate workflows based on the service requirements and performance objectives. The system then determines an optimized workflow from the candidate workflows and executes the optimized workflow to perform operations of the software services. Embodiments of the present invention further include a method and computer program product for dynamically optimizing a service workflow including one or more software services in substantially the same manner as described above.
    Type: Grant
    Filed: April 4, 2017
    Date of Patent: August 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Trent A. Gray-Donald, Simon Harris, Nisanth M. Simon
  • Patent number: 10628395
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for detecting changes in database schema. The embodiments may include receiving a first database schema. The embodiments may include creating a first value corresponding to the first database schema by utilizing a compressed value algorithm. The compressed value algorithm may create a single value corresponding to each database schema. The embodiments may include receiving a second database schema. The embodiments may include creating a second value corresponding to the second database schema by utilizing the compressed value algorithm. The embodiments may include determining whether there is a difference between the first database schema and the second database schema by comparing the first value and the second value.
    Type: Grant
    Filed: May 17, 2016
    Date of Patent: April 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Nisanth M. Simon, Tuong C. Truong, Ruiming Zhou
  • Publication number: 20200034568
    Abstract: The present invention provides a method and system for securely transferring data over a computer network. A first party's computer: parses vulnerable words and numbers of a data set providing information for a second party, generates masked values of the parsed vulnerable words and numbers, updates the data set by replacing the vulnerable words and numbers with the masked values, and sends the updated data set to a third party for analysis, and for subsequent decoding, by the second party, of the masked values of the parsed vulnerable words and numbers. The first party's computer generates a first, second, third and fourth symbol of the masked values of a parsed word by: incrementing a first symbol of the parsed word by one, decrementing a second symbol of the parsed word by one, decrementing a second symbol of the parsed word by one, and inserting a predetermined marker symbol, respectively.
    Type: Application
    Filed: October 8, 2019
    Publication date: January 30, 2020
    Inventors: Javed Iqbal Abdul, Jose Peter, Nisanth M. Simon
  • Patent number: 10521609
    Abstract: The present invention provides a method, and associated computer system and computer program product, for masking selected vulnerable data portions of a data set transmitted over a network by parsing the vulnerable data, generating masked values for the vulnerable data including generating symbols of the masked values of a parsed word of the parsed vulnerable data, updating the data set to include the masked values, then sending the updated data set to a third party for analysis and for subsequent decoding of the masked values of the parsed vulnerable data. The symbols, used to represent basic sounds of a language, are contained in a set in a fixed order.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: December 31, 2019
    Assignee: International Business Machines Corporation
    Inventors: Javed Iqbal Abdul, Jose Peter, Nisanth M. Simon
  • Publication number: 20190156063
    Abstract: The present invention provides a method, and associated computer system and computer program product, for masking selected vulnerable data portions of a data set transmitted over a network by parsing the vulnerable data, generating masked values for the vulnerable data including generating symbols of the masked values of a parsed word of the parsed vulnerable data, updating the data set to include the masked values, then sending the updated data set to a third party for analysis and for subsequent decoding of the masked values of the parsed vulnerable data. The symbols, used to represent basic sounds of a language, are contained in a set in a fixed order.
    Type: Application
    Filed: January 29, 2019
    Publication date: May 23, 2019
    Inventors: Javed Iqbal Abdul, Jose Peter, Nisanth M. Simon
  • Patent number: 10242231
    Abstract: The present invention provides a method, and associated computer system and computer program product, for masking selected vulnerable data portions of a data set transmitted over a network by parsing the vulnerable data, generating masked values for the vulnerable data, updating the data set to include the masked values, then sending the updated data set to a third party for analysis.
    Type: Grant
    Filed: March 22, 2017
    Date of Patent: March 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Javed Iqbal Abdul, Jose Peter, Nisanth M. Simon
  • Publication number: 20190066008
    Abstract: According to an embodiment of the present invention, a system dynamically optimizes a service workflow including one or more software services. Initially, the system receives a request to optimize a service workflow, wherein the request includes one or more service requirements and one or more performance objectives related to the one or more service requirements. The system validates service plan information associated with at least one software service plan offered by one or more service providers and generates a plurality of candidate workflows based on the service requirements and performance objectives. The system then determines an optimized workflow from the candidate workflows and executes the optimized workflow to perform operations of the software services. Embodiments of the present invention further include a method and computer program product for dynamically optimizing a service workflow including one or more software services in substantially the same manner as described above.
    Type: Application
    Filed: October 31, 2018
    Publication date: February 28, 2019
    Inventors: Trent A. Gray-Donald, Simon Harris, Nisanth M. Simon
  • Patent number: 10169379
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for detecting changes in database schema. The embodiments may include receiving a first database schema. The embodiments may include creating a first value corresponding to the first database schema by utilizing a compressed value algorithm. The compressed value algorithm may create a single value corresponding to each database schema. The embodiments may include receiving a second database schema. The embodiments may include creating a second value corresponding to the second database schema by utilizing the compressed value algorithm. The embodiments may include determining whether there is a difference between the first database schema and the second database schema by comparing the first value and the second value.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Nisanth M. Simon, Tuong C. Truong, Ruiming Zhou
  • Publication number: 20180285794
    Abstract: According to an embodiment of the present invention, a system dynamically optimizes a service workflow including one or more software services. Initially, the system receives a request to optimize a service workflow, wherein the request includes one or more service requirements and one or more performance objectives related to the one or more service requirements. The system validates service plan information associated with at least one software service plan offered by one or more service providers and generates a plurality of candidate workflows based on the service requirements and performance objectives. The system then determines an optimized workflow from the candidate workflows and executes the optimized workflow to perform operations of the software services. Embodiments of the present invention further include a method and computer program product for dynamically optimizing a service workflow including one or more software services in substantially the same manner as described above.
    Type: Application
    Filed: April 4, 2017
    Publication date: October 4, 2018
    Inventors: Trent A. Gray-Donald, Simon Harris, Nisanth M. Simon
  • Publication number: 20180276411
    Abstract: The present invention provides a method, and associated computer system and computer program product, for masking selected vulnerable data portions of a data set transmitted over a network by parsing the vulnerable data, generating masked values for the vulnerable data, updating the data set to include the masked values, then sending the updated data set to a third party for analysis.
    Type: Application
    Filed: March 22, 2017
    Publication date: September 27, 2018
    Inventors: Javed Iqbal Abdul, Jose Peter, Nisanth M. Simon
  • Publication number: 20160378794
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for detecting changes in database schema. The embodiments may include receiving a first database schema. The embodiments may include creating a first value corresponding to the first database schema by utilizing a compressed value algorithm. The compressed value algorithm may create a single value corresponding to each database schema. The embodiments may include receiving a second database schema. The embodiments may include creating a second value corresponding to the second database schema by utilizing the compressed value algorithm. The embodiments may include determining whether there is a difference between the first database schema and the second database schema by comparing the first value and the second value.
    Type: Application
    Filed: May 17, 2016
    Publication date: December 29, 2016
    Inventors: Nisanth M. Simon, Tuong C. Truong, Ruiming Zhou
  • Publication number: 20160378793
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for detecting changes in database schema. The embodiments may include receiving a first database schema. The embodiments may include creating a first value corresponding to the first database schema by utilizing a compressed value algorithm. The compressed value algorithm may create a single value corresponding to each database schema. The embodiments may include receiving a second database schema. The embodiments may include creating a second value corresponding to the second database schema by utilizing the compressed value algorithm. The embodiments may include determining whether there is a difference between the first database schema and the second database schema by comparing the first value and the second value.
    Type: Application
    Filed: June 26, 2015
    Publication date: December 29, 2016
    Inventors: Nisanth M. Simon, Tuong C. Truong, Ruiming Zhou
  • Publication number: 20150379525
    Abstract: Methods and arrangements for identifying a potential customer base of a concern. A contemplated method includes: identifying a prospective customer of a concern, via a social media network; identifying connections of the prospective customer within the social media network; determining a subset of the connections, wherein members of the subset comprise members of the concern; determining connections of the members of the subset; determining whether the connections of the members of the subset comprise the prospective customer; and if the connections of the members of the subset comprise the prospective customer, determining contact information of the prospective customer. Other variants and embodiments are broadly contemplated herein.
    Type: Application
    Filed: June 25, 2014
    Publication date: December 31, 2015
    Inventors: Rema Ananthanarayanan, Shrinivas Kulkarni, Nisanth M. Simon, L. Venkata Subramaniam
  • Patent number: 8965867
    Abstract: Methods and arrangements for measuring and utilizing media topic influence. A publically disseminated media transmission is received. Public influence of the media transmission is measured via: identifying one or more media sources used to disseminate the media transmission; and obtaining one or more predetermined influence values associated with the one or more media sources.
    Type: Grant
    Filed: November 30, 2012
    Date of Patent: February 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Sameep Mehta, Mrinmaya Sachan, Nisanth M. Simon, L. Venkata Subramaniam
  • Patent number: 8788470
    Abstract: Provided are techniques for selecting row identifiers from an initial index structure storing rows of randomized indexes. The row identifiers are randomized. Groups are formed with the randomized row identifiers so that each group has a predetermined number of row identifiers. At least one group is selected from the groups. Indexes are retrieved from the initial index structure that correspond to the row identifiers in the selected at least one group. The retrieved indexes are encoded by adding product information to form new identifiers.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: July 22, 2014
    Assignee: International Business Machines Corporation
    Inventor: Nisanth M. Simon
  • Publication number: 20140156673
    Abstract: Methods and arrangements for measuring and utilizing media topic influence. A publically disseminated media transmission is received. Public influence of the media transmission is measured via: identifying one or more media sources used to disseminate the media transmission; and obtaining one or more predetermined influence values associated with the one or more media sources.
    Type: Application
    Filed: November 30, 2012
    Publication date: June 5, 2014
    Applicant: International Business Machines Corporation
    Inventors: Sameep Mehta, Mrinmaya Sachan, Nisanth M. Simon, L. Venkata Subramaniam
  • Patent number: 8560698
    Abstract: A plurality of subgroups of identifiers are identified including at least a first subgroup of identifiers and a second subgroup of identifiers within an identifier range. A first set of identifiers is selected in the first subgroup. The first set of identifiers in the first subgroup is compared with a second set of identifiers in the second subgroup and a first set of common identifiers is identified using metadata of the second set of identifiers. A third set of identifiers is generated by eliminating the first set of common identifiers from the first set of identifiers. The third set of identifiers is compared with a fourth set of identifiers in a repository of stored identifiers, to identify a second set of common identifiers. A fifth set of identifiers is generated by eliminating the second set of common identifiers from the third set of identifiers.
    Type: Grant
    Filed: June 27, 2010
    Date of Patent: October 15, 2013
    Assignee: International Business Machines Corporation
    Inventors: Shrinivas Kulkarni, Nisanth M. Simon
  • Patent number: 8375066
    Abstract: A method, a system, and a computer program product for creating a set of identifiers are disclosed. A first set of identifiers is generated by a first randomization of a partition. Identifiers of the first set of identifiers are selected to generate a third set of identifiers. A second set of identifiers comprising a pre-defined number of identifiers is generated by a second randomization of the third set of identifiers.
    Type: Grant
    Filed: April 26, 2010
    Date of Patent: February 12, 2013
    Assignee: International Business Machines Corporation
    Inventor: Nisanth M. Simon