Patents by Inventor Peeyush Jaiswal

Peeyush Jaiswal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10949787
    Abstract: Embodiments provide an automated participation evaluator, wherein processors are configured to evaluate participation of meeting attendees with respect to performance criteria including participation criteria and deliverable contribution criteria; populate object fields associated to ones of the performance criteria and attendees with values representing a quality of performance of the associated attendees relative to the associated performance criteria; notify the attendees of the populated object field values in response to determining that time for evaluating participation of the attendees with respect to performance criteria has not elapsed; update the populated object field values via reevaluating participation of the attendees in response to the notifying of the attendees of the populated values; and reward the attendees with reward values selected as a function of the updated, populated values, in response to determining time for evaluating the participation of the attendees with respect to each of the
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: March 16, 2021
    Assignee: International Business Machines Corporation
    Inventors: Peeyush Jaiswal, Priyansh Jaiswal, David Jaramillo, Paul Llamas Virgen, Annita Tomko
  • Patent number: 10938985
    Abstract: In an approach for recommending a response time for callback, a processor receives an indication to initiate a callback to a caller after the caller requests the callback from a callee, wherein the callee is a user whom the caller has called. A processor analyzes callback information. A processor determines a callback time based on the callback information. A processor sends an alert about the callback, wherein the alert includes the determined callback time.
    Type: Grant
    Filed: November 27, 2018
    Date of Patent: March 2, 2021
    Assignee: International Business Machines Corporation
    Inventors: Priyansh Jaiswal, Shikhar Kwatra, Peeyush Jaiswal
  • Patent number: 10937127
    Abstract: Embodiments for managing text in rendered images by one or more processors are described. An image rendered by a display device is detected. The rendered image includes an object component and a text component at least partially overlapping the object component. A size of the object component of the image is caused to change. Based on a comparison of the changed size of the object component of the image to a size of the text component of the image, one or more text modification option is caused to be rendered by the display device. An indication of a selection of at least one of the one or more text modification option is received. The text component of the image is caused to change based on the selected one or more text modification option.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: March 2, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shikhar Kwatra, Peeyush Jaiswal, Priyansh Jaiswal, Sarbajit K. Rakshit
  • Patent number: 10909096
    Abstract: An approach for an automatic table cleanup process of use, implemented in relational databases, are provided. A method includes setting up a table cleanup process in a database which is operable to perform an automatic table cleanup on a table within the database using an auto purge value associated with the table. The method further includes altering the table with a virtual column to keep track of dates on the table. The method further includes turning on an automatic table maintenance capability of the database to include and initiate the table cleanup process. The method further includes running the table cleanup process to perform the automatic table cleanup using dates which are automatically filled in during an insert or update operation on the table, the table cleanup process comprising looking through the records and automatically purging the table when the auto purge value has been met.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: February 2, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peeyush Jaiswal, Burt L. Vialpando
  • Publication number: 20200366704
    Abstract: A method for event data fencing includes initializing a media monitoring algorithm, wherein the media monitoring algorithm scans for one or more words relating to a data breach in publicly available reports. Responsive to identifying a report from the publicly available reports relating to a vulnerability associated with the data breach, the method determines whether the vulnerability is associated with event data utilized for an authentication process. Responsive to determining the vulnerability is associated with a portion of the event data utilized for the authentication process, the method fences the portion of event data associated with the vulnerability, wherein fencing prevents the portion of event data from being utilized in the authentication process.
    Type: Application
    Filed: May 17, 2019
    Publication date: November 19, 2020
    Inventors: CHERANELLORE VASUDEVAN, Swaminathan Balasubramanian, SIBASIS DAS, Priyansh Jaiswal, Peeyush Jaiswal
  • Publication number: 20200366665
    Abstract: A method for a two-factor authentication process includes, responsive to determining a first user authentication was prompted in a first application on a first device associated with a user, identifying a second application on a second device based on a user profile associated with the user. The method identifies a first event from a plurality of events that previously occurred in the second application in a select time frame, wherein the first event relates to a first action performed by the user in the second application. The method generates an authentication question based on the first event, wherein the authentication question is a second user authentication. Responsive to determining an answer provided by the user to the authentication question is correct, the method grants access to the first user authentication prompt.
    Type: Application
    Filed: May 17, 2019
    Publication date: November 19, 2020
    Inventors: CHERANELLORE VASUDEVAN, Swaminathan Balasubramanian, SIBASIS DAS, Priyansh Jaiswal, Peeyush Jaiswal
  • Publication number: 20200273477
    Abstract: Provided is a system, method, and computer program product for filtering spoken content in a preferred format to a plurality of users within a communication session A processor may detect spoken content from a first user and a second user of a plurality of users within a communication session over a network. Speech features may be extracted from the detected spoken content. The first user and second user may be identified based on the extracted speech features. The spoken content of the first user and the second user may be filtered according to preferences determined from profiles of the plurality of users. The spoken content of the first user and the second user may be transmitted to the plurality of users in a preferred format based on preferences from the profiles.
    Type: Application
    Filed: February 21, 2019
    Publication date: August 27, 2020
    Inventors: Shikhar Kwatra, Peeyush Jaiswal, Priyansh Jaiswal
  • Patent number: 10757180
    Abstract: Workload processing is facilitated in a data processing environment including a sender system, a load balancer and a plurality of target resources. The sender system sends workloads to the load balancer, and the load balancer distributes the workloads to the plurality of target resources for processing. Facilitating workload processing includes receiving, by the load balancer, sender status-related information which is indicative of a workload capacity issue from the sender system's view related, at least in part, to the sending of the workloads to the load balancer. The load balancer distributes one or more workloads of the sender system to one or more target resources of the plurality of target resources in a manner based, at least in part, upon the received sender status-related information.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: August 25, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert D. Hodges, Peeyush Jaiswal, Priyansh Jaiswal
  • Patent number: 10719378
    Abstract: A computing system may receive a message that includes message data and a schema. The message data may include values associated with fields. The message may include a plurality of rules. Each of the plurality of rules may specify a respective one or more fields from a plurality of fields associated with the message and a respective action from a plurality of actions to perform on the values associated with the respective one or more fields. One or more of the plurality of rules may specify one or more output values that are associated with one or more output values resulting from performing one or more actions from the plurality of actions. In response to receiving the message, the computing system may perform the plurality of rules to generate the one or more output values associated with the one or more output fields.
    Type: Grant
    Filed: August 29, 2018
    Date of Patent: July 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, Naeem Ahmed, Rahul Ragunathan, Austin Michael Delamar
  • Publication number: 20200169634
    Abstract: In an approach for recommending a response time for callback, a processor receives an indication to initiate a callback to a caller after the caller requests the callback from a callee, wherein the callee is a user whom the caller has called. A processor analyzes callback information. A processor determines a callback time based on the callback information. A processor sends an alert about the callback, wherein the alert includes the determined callback time.
    Type: Application
    Filed: November 27, 2018
    Publication date: May 28, 2020
    Inventors: Priyansh Jaiswal, Shikhar Kwatra, Peeyush Jaiswal
  • Publication number: 20200143046
    Abstract: Taking security actions based on monitored computer and user physical activities includes using sensors of a computer system to identify physical activity being performed by a user of the computer system, monitoring computer system activity being performed by the computer system as the user performs the identified physical activity, determining whether the identified physical activity being performed by the user is associated with input to the computer system to cause the computer system activity being performed by the computer system, and performing processing based on determining that the identified physical activity is not associated with input to cause the computer system activity, the processing including automatically performing security measure(s) on the computer system.
    Type: Application
    Filed: November 7, 2018
    Publication date: May 7, 2020
    Inventors: Cesar Augusto RODRIGUEZ BRAVO, David JARAMILLO, Peeyush JAISWAL
  • Publication number: 20200076777
    Abstract: A producer system may insert an encrypted value in a field in a message, where the message is associated with a schema that specifies a public key used to encrypt the encrypted value of the field and further specifies a type of an unencrypted form of the encrypted value, insert one or more unencrypted values in one or more fields in the message, and send the message to an external computing system. A consumer system may receive the message, determine, based at least in part on the public key specified by the schema, a private key associated with the public key, and decrypt, using the private key, the encrypted value of the field into the unencrypted form of the encrypted value.
    Type: Application
    Filed: August 29, 2018
    Publication date: March 5, 2020
    Inventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, Austin Michael Delamar, Naeem Ahmed, Rahul Ragunathan
  • Publication number: 20200074011
    Abstract: Embodiments for implementing intelligent web navigation by at least a portion of a processor. One or more uniform resource locators (URLs) may be accessed (e.g., opened) according a user history of Internet activities, user preferences, one or more current user activities, calendar data, or a combination thereof. Selected feedback may be gathered (e.g., collected) from the user relating to the one or more URLs according to activities of the user performed on the one or more URLs. The one or more URLs may be classified into one of a plurality of classifications to indicate a degree of relevancy to the user.
    Type: Application
    Filed: August 29, 2018
    Publication date: March 5, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Priyansh JAISWAL, Shikhar KWATRA, Sushain PANDIT, Peeyush JAISWAL
  • Publication number: 20200073735
    Abstract: A computing system may receive a message that includes message data and a schema. The message data may include values associated with fields. The message may include a plurality of rules. Each of the plurality of rules may specify a respective one or more fields from a plurality of fields associated with the message and a respective action from a plurality of actions to perform on the values associated with the respective one or more fields. One or more of the plurality of rules may specify one or more output values that are associated with one or more output values resulting from performing one or more actions from the plurality of actions. In response to receiving the message, the computing system may perform the plurality of rules to generate the one or more output values associated with the one or more output fields.
    Type: Application
    Filed: August 29, 2018
    Publication date: March 5, 2020
    Inventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, Naeem Ahmed, Rahul Ragunathan, Austin Michael Delamar
  • Publication number: 20200051208
    Abstract: Embodiments for managing text in rendered images by one or more processors are described. An image rendered by a display device is detected. The rendered image includes an object component and a text component at least partially overlapping the object component. A size of the object component of the image is caused to change. Based on a comparison of the changed size of the object component of the image to a size of the text component of the image, one or more text modification option is caused to be rendered by the display device. An indication of a selection of at least one of the one or more text modification option is received. The text component of the image is caused to change based on the selected one or more text modification option.
    Type: Application
    Filed: August 13, 2018
    Publication date: February 13, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shikhar KWATRA, Peeyush JAISWAL, Priyansh JAISWAL, Sarbajit K. RAKSHIT
  • Publication number: 20200050593
    Abstract: A computer-implemented method includes: receiving, by a computing device, a database-level auto_purge value for a database having a plurality of tables, wherein the database-level auto_purge value represents a value associated with the entire database for when data is set to be purged or deleted from the plurality of tables in the database; setting, by the computing device, the database-level auto_purge value for the database; setting, by the computing device, table-level auto_purge values for the plurality of tables included in the database based on the database-level auto_purge value; and automatically purging data in the plurality of tables based on the table-level auto_purge values.
    Type: Application
    Filed: October 16, 2019
    Publication date: February 13, 2020
    Inventors: Peeyush Jaiswal, Priyansh Jaiswal, Burt L. Vialpando
  • Publication number: 20200052920
    Abstract: Embodiments for intelligent teleconference operations in an Internet of Things (IoT) computing environment by a processor. A communication connection for a conference call session may be cognitively initiated or terminated with one or more users according to one or more parameters associated with a user profile, a schedule of the one or more users, activities of daily living (“ADL”), one or more contextual factors, or a combination thereof.
    Type: Application
    Filed: August 13, 2018
    Publication date: February 13, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shikhar KWATRA, Peeyush JAISWAL, Priyansh JAISWAL, Sarbajit K. RAKSHIT
  • Publication number: 20200042916
    Abstract: Embodiments provide an automated participation evaluator, wherein processors are configured to evaluate participation of meeting attendees with respect to performance criteria including participation criteria and deliverable contribution criteria; populate object fields associated to ones of the performance criteria and attendees with values representing a quality of performance of the associated attendees relative to the associated performance criteria; notify the attendees of the populated object field values in response to determining that time for evaluating participation of the attendees with respect to performance criteria has not elapsed; update the populated object field values via reevaluating participation of the attendees in response to the notifying of the attendees of the populated values; and reward the attendees with reward values selected as a function of the updated, populated values, in response to determining time for evaluating the participation of the attendees with respect to each of the
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Inventors: Peeyush Jaiswal, PRIYANSH JAISWAL, David Jaramillo, PAUL LLAMAS VIRGEN, Annita Tomko
  • Publication number: 20190384865
    Abstract: Embodiments for intelligent design structure selection in an Internet of Things (IoT) computing environment by a processor. Levels of satisfaction and behavior patterns of one or more users having similar user profiles influencing the behavior patterns may be learned and evaluated. One or more design structure solutions may be cognitively suggested according to the levels of satisfaction and the behavior patterns.
    Type: Application
    Filed: June 14, 2018
    Publication date: December 19, 2019
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peeyush JAISWAL, Priyansh JAISWAL, Paul KRYSTEK, Shikhar KWATRA
  • Publication number: 20190347560
    Abstract: A method, computer system, and a computer program product for managing and optimizing connectivity of a plurality of IoT devices based on cognitive learning is provided. The present invention may include identifying a user, wherein a plurality of user context data is stored in a user profile. The present invention may then include detecting a change in at least one current user context associated with the identified user. The present invention may also include performing a connectivity and management analysis on the detected change in the at least one current user context. The present invention may then include generating at least one optimal plan for the plurality of IoT devices associated with the identified user based on the performed connectivity and management analysis. The preset invention may further include performing at least one action based on the generated at least one optimal plan.
    Type: Application
    Filed: May 8, 2018
    Publication date: November 14, 2019
    Inventors: Peeyush Jaiswal, Priyansh Jaiswal, Roxana Monge Nunez, Clifford A. Pickover, Luis G. Solano Enriquez