Patents by Inventor Ritwik K. Kumar
Ritwik K. Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230344792Abstract: Systems and methods are disclosed for determining whether a message received by a client may be spam, in a computing environment that preserves privacy. The message may be encrypted. A client invokes the methods when a message is received from a sender that is not known to the client. A client can decrypt the message, break the message into chunks, and apply a differentially private algorithm to the set of chunks. The client transmits the differentially private message sketches to an aggregation server. The aggregation server receives a large collection of such message sketches for a large plurality of clients. The aggregation server returns aggregated message chunk (e.g. frequency) information to the client to assist the client in determining whether the message may be spam. The client can process the message based on the determination without disclosing the message content to the server.Type: ApplicationFiled: June 20, 2023Publication date: October 26, 2023Applicant: Apple Inc.Inventors: Eric D. Friedman, Ritwik K. Kumar, Lucas O. Winstrom
-
Patent number: 11722450Abstract: Systems and methods are disclosed for determining whether a message received by a client may be spam, in a computing environment that preserves privacy. The message may be encrypted. A client invokes the methods when a message is received from a sender that is not known to the client. A client can decrypt the message, break the message into chunks, and apply a differentially private algorithm to the set of chunks. The client transmits the differentially private message sketches to an aggregation server. The aggregation server receives a large collection of such message sketches for a large plurality of clients. The aggregation server returns aggregated message chunk (e.g. frequency) information to the client to assist the client in determining whether the message may be spam. The client can process the message based on the determination without disclosing the message content to the server.Type: GrantFiled: March 23, 2022Date of Patent: August 8, 2023Assignee: Apple Inc.Inventors: Eric D. Friedman, Ritwik K. Kumar, Lucas O. Winstrom
-
Publication number: 20220217110Abstract: Systems and methods are disclosed for determining whether a message received by a client may be spam, in a computing environment that preserves privacy. The message may be encrypted. A client invokes the methods when a message is received from a sender that is not known to the client. A client can decrypt the message, break the message into chunks, and apply a differentially private algorithm to the set of chunks. The client transmits the differentially private message sketches to an aggregation server. The aggregation server receives a large collection of such message sketches for a large plurality of clients. The aggregation server returns aggregated message chunk (e.g. frequency) information to the client to assist the client in determining whether the message may be spam. The client can process the message based on the determination without disclosing the message content to the server.Type: ApplicationFiled: March 23, 2022Publication date: July 7, 2022Applicant: Apple Inc.Inventors: Eric D. Friedman, Ritwik K. Kumar, Lucas O. Winstrom
-
Patent number: 11290411Abstract: Systems and methods are disclosed for determining whether a message received by a client may be spam, in a computing environment that preserves privacy. The message may be encrypted. A client invokes the methods when a message is received from a sender that is not known to the client. A client can decrypt the message, break the message into chunks, and apply a differentially private algorithm to the set of chunks. The client transmits the differentially private message sketches to an aggregation server. The aggregation server receives a large collection of such message sketches for a large plurality of clients. The aggregation server returns aggregated message chunk (e.g. frequency) information to the client to assist the client in determining whether the message may be spam. The client can process the message based on the determination without disclosing the message content to the server.Type: GrantFiled: September 11, 2020Date of Patent: March 29, 2022Assignee: Apple Inc.Inventors: Eric D. Friedman, Ritwik K. Kumar, Lucas Winstrom
-
Patent number: 11140171Abstract: A user device can verify a user's identity to a server while protecting user privacy by not sharing personal data with any other device. To ensure user privacy, the user device performs an enrollment process in which the user performs an action sequence. The user device collects action data from the action sequence and uses the action data locally to generate a set of public/private key pairs (or other representation) from which information about the action sequence cannot be extracted. The public keys, but not the underlying action data, are sent to a server to store. To verify user identity, a user device can repeat the collection of action data and the generation of the key pairs. If the device can prove to the server its possession of the private keys to a sufficient degree, the user's identity can be verified.Type: GrantFiled: July 3, 2019Date of Patent: October 5, 2021Assignee: Apple Inc.Inventors: Eric D. Friedman, Nathaniel C. Bush, Jefferson Provost, Vignesh Kumar, Gregory J. Kuhlmann, Tal Tversky, Ritwik K. Kumar, Eric M. Gottschalk, Lucas O. Winstrom
-
Publication number: 20200412681Abstract: Systems and methods are disclosed for determining whether a message received by a client may be spam, in a computing environment that preserves privacy. The message may be encrypted. A client invokes the methods when a message is received from a sender that is not known to the client. A client can decrypt the message, break the message into chunks, and apply a differentially private algorithm to the set of chunks. The client transmits the differentially private message sketches to an aggregation server. The aggregation server receives a large collection of such message sketches for a large plurality of clients. The aggregation server returns aggregated message chunk (e.g. frequency) information to the client to assist the client in determining whether the message may be spam. The client can process the message based on the determination without disclosing the message content to the server.Type: ApplicationFiled: September 11, 2020Publication date: December 31, 2020Inventors: Eric D. Friedman, Ritwik K. Kumar, Lucas Winstrom
-
Patent number: 10868672Abstract: A user device can verify a user's identity to a server while protecting user privacy by not sharing any personal data with any other device. To ensure user privacy and to allow multiple independent enrollments, the user device performs an enrollment process in which the user device locally collects and uses biometric data together with a random salt to generate a set of public/private key pairs from which biometric information cannot be extracted. The public keys and the salt, but not the biometric data, are sent to a server to store. To verify user identity, a user device can repeat the collection of biometric data from the user and the generation of public/private key pairs using the salt obtained from the server. If the device can prove to the server its possession of at least a minimum number of correct private keys, the user's identity can be verified.Type: GrantFiled: September 18, 2019Date of Patent: December 15, 2020Assignee: Apple Inc.Inventors: Augustin J. Farrugia, Ritwik K. Kumar, Gianpaolo Fasoli, Mathieu Ciet, Bruno Kindarji, Eric D. Friedman, Gianluca Barbieri, Lucas O. Winstrom
-
Patent number: 10778633Abstract: Systems and methods are disclosed for determining whether a message received by a client may be spam, in a computing environment that preserves privacy. The message may be encrypted. A client invokes the methods when a message is received from a sender that is not known to the client. A client can decrypt the message, break the message into chunks, and apply a differentially private algorithm to the set of chunks. The client transmits the differentially private message sketches to an aggregation server. The aggregation server receives a large collection of such message sketches for a large plurality of clients. The aggregation server returns aggregated message chunk (e.g. frequency) information to the client to assist the client in determining whether the message may be spam. The client can process the message based on the determination without disclosing the message content to the server.Type: GrantFiled: September 20, 2017Date of Patent: September 15, 2020Assignee: Apple Inc.Inventors: Eric D. Friedman, Ritwik K. Kumar, Lucas Winstrom
-
Publication number: 20200104479Abstract: Systems, methods, and computer-readable media for recommending passcodes for an electronic device using information local to the electronic device are provided. Such local information may be unique to a particular device and/or to a particular device user, such as unique data from one or more device applications, including, but not limited to, a calendar application, a media library application, and a contacts application.Type: ApplicationFiled: May 7, 2019Publication date: April 2, 2020Inventors: Ritwik K. Kumar, Eric D. Friedman
-
Patent number: 10599873Abstract: Systems and methods are described for rate-limiting a message-sending client interacting with a message service based on dynamically calculated risk assessments of the probability that the client is, or is not, a sender of a spam messages. The message service sends a proof of work problem to a sending client device with a difficulty level that is related to a risk assessment that the client is a sender of spam messages. The message system limits the rate at which a known or suspected spammer can send messages by giving the known or suspected spammer client harder proof of work problems to solve, while minimizing the burden on normal users of the message system by given them easier proof of work problems to solve that can typically be solved by the client within the time that it takes to type a message.Type: GrantFiled: September 18, 2017Date of Patent: March 24, 2020Assignee: Apple Inc.Inventors: Lucas O. Winstrom, Eric D. Friedman, Ritwik K. Kumar, Jeremy M. Stober, Amol V. Pattekar, Benoit Chevallier-Mames, Julien Lerouge, Gianpaolo Fasoli, Augustin J. Farrugia, Mathieu Ciet
-
Patent number: 10327712Abstract: Use of medical workflows where a first medical workflow is obtained from a plurality of medical acts performed in sequence that related to care of a patient. A set of condition-indication rules is applied to the first medical workflow to determine first condition information. The first condition information relates to a likelihood that a first medical condition exists in the patient.Type: GrantFiled: November 13, 2014Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: David J. Beymer, Karen W. Brannon, Colin B. Compas, Ritwik K. Kumar, Tanveer F. Syeda-Mahmood
-
Publication number: 20180091466Abstract: Systems and methods are disclosed for determining whether a message received by a client may be spam, in a computing environment that preserves privacy. The message may be encrypted. A client invokes the methods when a message is received from a sender that is not known to the client. A client can decrypt the message, break the message into chunks, and apply a differentially private algorithm to the set of chunks. The client transmits the differentially private message sketches to an aggregation server. The aggregation server receives a large collection of such message sketches for a large plurality of clients. The aggregation server returns aggregated message chunk (e.g. frequency) information to the client to assist the client in determining whether the message may be spam. The client can process the message based on the determination without disclosing the message content to the server.Type: ApplicationFiled: September 20, 2017Publication date: March 29, 2018Inventors: Eric D. Friedman, Ritwik K. Kumar, Lucas Winstrom
-
Publication number: 20180089465Abstract: Systems and methods are described for rate-limiting a message-sending client interacting with a message service based on dynamically calculated risk assessments of the probability that the client is, or is not, a sender of a spam messages. The message service sends a proof of work problem to a sending client device with a difficulty level that is related to a risk assessment that the client is a sender of spam messages. The message system limits the rate at which a known or suspected spammer can send messages by giving the known or suspected spammer client harder proof of work problems to solve, while minimizing the burden on normal users of the message system by given them easier proof of work problems to solve that can typically be solved by the client within the time that it takes to type a message.Type: ApplicationFiled: September 18, 2017Publication date: March 29, 2018Inventors: Lucas O. Winstrom, Eric D. Friedman, Ritwik K. Kumar, Jeremy M. Stober, Amol V. Pattekar, Benoit Chevallier-Mames, Julien Lerouge, Gianpaolo Fasoli, Augustin J. Farrugia, Mathieu Ciet
-
Patent number: 9349105Abstract: Machine learning solutions compensate for data missing from input (training) data and thereby arrive at a predictive model that is based upon, and consistent with, the training data. The predictive model can be generated within a learning algorithm framework by transforming the training data to generate modality or similarity kernels. Similarity values can be generated for these missing similarity values.Type: GrantFiled: December 18, 2013Date of Patent: May 24, 2016Assignee: International Business Machines CorporationInventors: David J. Beymer, Karen W. Brannon, Ting Chen, Moritz A. W. Hardt, Ritwik K. Kumar, Tanveer F. Syeda-Mahmood
-
Publication number: 20150278707Abstract: Embodiments relate to creating a classification rule by combining classifiers. Aspects include receiving N training samples d, wherein each of the N training samples d includes a label l, receiving T classifiers C, and initializing a first random weight vector ? for the N training samples d. Aspects also include initializing a second random weight vector ? for the T classifiers C and creating, by a processor, the classification rule by identifying a combination of one or more of the T classifiers C that best approximates the label l for each of the N training samples d based on the first random weight vector and the second random weight vector ?.Type: ApplicationFiled: March 31, 2014Publication date: October 1, 2015Applicant: International Business Machines CorporationInventors: David J. Beymer, Karen W. Brannon, Ting Chen, Ritwik K. Kumar, Tanveer Syeda-Mahmood
-
Patent number: 9092849Abstract: Embodiments relate to segmenting blood vessels in angiogram images. An aspect includes a method that includes receiving and preprocessing at least one angiogram frame and preprocessing. In one embodiment, at least one angiogram frame is received and preprocessed. Bottom-up filtering of the preprocessed angiogram frame and top-down segmentation of the preprocessed angiogram frame are performed based on the results of the bottom-up filtering. The bottom-up filtering and the top-down segmentation are iteratively repeated until the difference between results of the top-down segmentation from consecutive iterations is equal to or below a threshold value. Based on determining that a difference between results of the top-down segmentation from consecutive iterations is below or equal to the threshold value, the results of the top-down segmentation are outputted.Type: GrantFiled: June 28, 2013Date of Patent: July 28, 2015Assignee: International Business Machines CorporationInventors: David J. Beymer, Ritwik K. Kumar, Tanveer F. Syeda-Mahmood, Fei Wang, Yong Zhang
-
Patent number: 9064306Abstract: Embodiments relate to segmenting blood vessels in angiogram images. An aspect includes a method that includes receiving and preprocessing at least one angiogram frame and preprocessing. In one embodiment, at least one angiogram frame is received and preprocessed. Bottom-up filtering of the preprocessed angiogram frame and top-down segmentation of the preprocessed angiogram frame are performed based on the results of the bottom-up filtering. The bottom-up filtering and the top-down segmentation are iteratively repeated until the difference between results of the top-down segmentation from consecutive iterations is equal to or below a threshold value. Based on determining that a difference between results of the top-down segmentation from consecutive iterations is below or equal to the threshold value, the results of the top-down segmentation are outputted.Type: GrantFiled: August 21, 2013Date of Patent: June 23, 2015Assignee: International Business Machines CorporationInventors: David J. Beymer, Ritwik K. Kumar, Tanveer F. Syeda-Mahmood, Fei Wang, Yong Zhang
-
Publication number: 20150170055Abstract: Machine learning solutions compensate for data missing from input (training) data and thereby arrive at a predictive model that is based upon, and consistent with, the training data. The predictive model can be generated within a learning algorithm framework by transforming the training data to generate modality or similarity kernels. Similarity values can be generated for these missing similarity values.Type: ApplicationFiled: December 18, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: David J. Beymer, Karen W. Brannon, Ting Chen, Moritz A. W. Hardt, Ritwik K. Kumar, Tanveer F. Syeda-Mahmood
-
Publication number: 20150141826Abstract: Use of medical workflows where a first medical workflow is obtained from a plurality of medical acts performed in sequence that related to care of a patient. A set of condition-indication rules is applied to the first medical workflow to determine first condition information. The first condition information relates to a likelihood that a first medical condition exists in the patient.Type: ApplicationFiled: November 13, 2014Publication date: May 21, 2015Inventors: David J. Beymer, Karen W. Brannon, Colin B. Compas, Ritwik K. Kumar, Tanveer F. Syeda-Mahmood
-
Publication number: 20150003697Abstract: Embodiments relate to segmenting blood vessels in angiogram images. An aspect includes a method that includes receiving and preprocessing at least one angiogram frame and preprocessing. In one embodiment, at least one angiogram frame is received and preprocessed. Bottom-up filtering of the preprocessed angiogram frame and top-down segmentation of the preprocessed angiogram frame are performed based on the results of the bottom-up filtering. The bottom-up filtering and the top-down segmentation are iteratively repeated until the difference between results of the top-down segmentation from consecutive iterations is equal to or below a threshold value. Based on determining that a difference between results of the top-down segmentation from consecutive iterations is below or equal to the threshold value, the results of the top-down segmentation are outputted.Type: ApplicationFiled: August 21, 2013Publication date: January 1, 2015Applicant: International Business Machines CorporationInventors: David J. Beymer, Ritwik K. Kumar, Tanveer F. Syeda-Mahmood, Fei Wang, Yong Zhang