Patents by Inventor SARITHA ARUNKUMAR
SARITHA ARUNKUMAR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10360357Abstract: A method modifies a physical device for use by a particular person. One or more processors receive information from a sensor indicating a detection by the sensor of a sequence of actions performed by an unidentified person. The sequence of actions are physical actions performed in a particular order, and the physical actions are disparate types of physical movements performed by the unidentified person. One or more processors compare the sequence of actions performed by the unidentified person a known sequence of actions for a particular person. In response to the sequence of actions performed by the unidentified person matching the known sequence of actions for the particular person, one or more processors identify the unidentified person as the particular person and then modify a physical device for use by the particular person.Type: GrantFiled: January 10, 2017Date of Patent: July 23, 2019Assignee: International Business Machines CorporationInventors: Saritha Arunkumar, Kuntal Dey, Nizar Lethif, Enara C. Vijil
-
Publication number: 20190213628Abstract: A split and merge advertisement method, system, and non-transitory computer readable medium, include splitting a first advertisement to be played on a second device when a moving user of a first group of users moves from a proximity of a first device to a proximity of the second device.Type: ApplicationFiled: March 19, 2019Publication date: July 11, 2019Inventors: Saritha Arunkumar, Kuntal Dey, Nizar Lethif, Enara C. Vijil
-
Patent number: 10346872Abstract: A split and merge advertisement method, system, and non-transitory computer readable medium, include an advertisement splitting circuit configured to split the first advertisement to be played on a second device when a moving user of the first group of users moves from a proximity of the first device to a proximity of the second device as detected by the user identifying unit of each of the first device and the second device, an optimization circuit configured to optimize a second advertisement to be played on the first device for the first group of users having a new group composition and a third advertisement to be played on the second device for the moving user, and an advertisement merging circuit configured to merge the third advertisement with the second advertisement when the moving user moves from the second device to the first device.Type: GrantFiled: June 29, 2016Date of Patent: July 9, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Saritha Arunkumar, Kuntal Dey, Nizar Lethif, Enara C. Vijil
-
Publication number: 20190188374Abstract: A processor-implemented method enables a device based on authentication of a particular user. One or more processors data mine past activities of a particular user. The past activities are detected by physical monitoring devices that monitor the particular user. The processor(s) create an authentication question and answer for the particular user based on the past activities of the particular user that the one or more processors have data mined. The processor(s) receive a request to use an electronic device used by the particular user, and then 1) transmit the authentication question to the electronic device used by the particular user and 2) receive an authentication answer to the authentication question from the electronic device used by the particular user. In response to the authentication answer from the electronic device matching the answer for the authentication question, the processor(s) remotely enable the electronic device for the particular user.Type: ApplicationFiled: December 19, 2017Publication date: June 20, 2019Inventors: SARITHA ARUNKUMAR, KUNTAL DEY, NIZAR LETHIF, ENARA C. VIJIL
-
Patent number: 10326773Abstract: Embodiments disclose systems, methods, and computer program products to perform an operation for adapting a set of devices used to authenticate a client device. The operation generally includes determining a plurality of broker devices available for attesting a location of a client device, and determining, from the available broker devices, a first and second subset of broker devices based on a credibility score determined for each of the available broker devices. The operation also includes attesting the location of the client device based on information received from the first subset of broker devices regarding devices in proximity to each of the broker devices in the first subset. The operation further includes upon determining that a number of responses with the information from at least one of the broker devices in the first subset has reached a threshold, reassigning broker devices in the first and second subsets.Type: GrantFiled: October 7, 2016Date of Patent: June 18, 2019Assignee: International Business Machines CorporationInventors: Saritha Arunkumar, Diyanesh B. Chinnakkonda Vidyapoornachary, Douglas J. Cowie, Farheen Munshi, Saravanan Sethuraman
-
Patent number: 10318796Abstract: Age progression of a test facial image is facilitated by compiling training data, including a training set(s) having selected initial images of subjects by gender and age-group. In addition, the age progression includes manipulating the training data, including: for a given age-group of a training set, substantially aligning respective face shapes; determining a common frame based on the aligned shapes; substantially aligning respective face appearances to generate a shape-free form corresponding to the face appearance of each subject, using the substantially aligned shapes to generate an age-specific shape-dictionary for each age-group, and a common shape-dictionary for the age-groups of the training set, and using the aligned appearances to generate at least an age-specific appearance-dictionary for each age-group, and a common appearance-dictionary for the age-groups of the training set.Type: GrantFiled: November 10, 2016Date of Patent: June 11, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Saritha Arunkumar, Nalini K. Ratha, Christos Sagonas, Peter W. Waggett
-
Patent number: 10318892Abstract: Application of inter-class and intra-class filtering, based on aggregate point-to-point distances, to vector data for purposes of filtering the vector data for purposes of pattern recognition. In some embodiments: (i) the inter-class filtering is based on Euclidean distance, in all dimensions, between vector data points in vector space; and/or (ii) the intra-class filtering is based on a distance, in all dimensions, between vector data points in vector space.Type: GrantFiled: December 14, 2016Date of Patent: June 11, 2019Assignee: International Business Machines CorporationInventors: Saritha Arunkumar, Su Yang
-
Publication number: 20190116456Abstract: A computer-implemented information verification method, system, and non-transitory computer readable medium, include measuring a first signal strength from a user device to a second device, wherein the first signal strength is measured from a perspective of the user device, measuring a second signal strength from the second device to the user device, wherein the second signal strength is measured from a perspective of the second device, comparing the first signal strength with the second signal strength, and verifying an information, based on a result of said comparing.Type: ApplicationFiled: October 24, 2017Publication date: April 18, 2019Inventors: Saritha Arunkumar, Nizar Lethif, Mudhakar Srivatsa, Enara Vijil
-
Patent number: 10218713Abstract: A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an authentication application utilizing location services executing on the computing device to obtain location data from the location services. The processor obtains the location data and creates and encodes a data structure in a secured area of a memory; the data structure is only accessible to the authentication application. The processor transmits to an authentication server, an authentication request that includes the encoded location data, requesting access to secure content. The processor obtains a request to query identifiers proximate to the computing device for additional location information and queries the identifiers and transmits this additional location information to the authentication server.Type: GrantFiled: July 2, 2018Date of Patent: February 26, 2019Assignee: International Business Machines CorporationInventors: Saritha Arunkumar, Diyanesh B. Chinnakkonda Vidyapoornachary, Saravanan Sethuraman
-
Publication number: 20180324190Abstract: A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an authentication application utilizing location services executing on the computing device to obtain location data from the location services. The processor obtains the location data and creates and encodes a data structure in a secured area of a memory; the data structure is only accessible to the authentication application. The processor transmits to an authentication server, an authentication request that includes the encoded location data, requesting access to secure content. The processor obtains a request to query identifiers proximate to the computing device for additional location information and queries the identifiers and transmits this additional location information to the authentication server.Type: ApplicationFiled: July 2, 2018Publication date: November 8, 2018Inventors: Saritha Arunkumar, Diyanesh B. Chinnakkonda Vidyapoornachary, Saravanan Sethuraman
-
Publication number: 20180262519Abstract: A computer-implemented method (and structure) includes receiving information. The received information is converted into a strictly hierarchical data format. A precision for a releasing the strictly hierarchical data is calculated based on privacy protection levels and a reward for different precision levels. The strictly hierarchical data is sequentially released at the calculated precision.Type: ApplicationFiled: March 9, 2017Publication date: September 13, 2018Inventors: Saritha Arunkumar, Supriyo Chakraborty, Raghu Kiran Ganti, Mudhakar Srivatsa
-
Patent number: 10075440Abstract: In authentication in global attestation, a server receives a request for access to a location based service. The server establishes a connection with a first device and with a second device, wherein the devices are connected by a location bounded network. The server sends a key order information to the first device and a first plurality of keys to the second device. The server receives a second plurality of keys from the first device, wherein the second plurality of keys is an ordered set of keys compiled using the key order information and the first plurality of keys. The server determines that the second plurality of keys received from the first device matches an expected plurality of keys. The server outputs, to the location based service, a notification indicating a result of the determining that the second plurality of keys matches the expected plurality of keys.Type: GrantFiled: May 17, 2017Date of Patent: September 11, 2018Assignee: International Business Machines CorporationInventors: Saritha Arunkumar, Diyanesh B. Chinnakkonda Vidyapoornachary, Douglas J. Cowie, Saravanan Sethuraman
-
Patent number: 10069829Abstract: In authentication in global attestation, a server receives a request for access to a location based service. The server establishes a connection with a first device and with a second device, wherein the devices are connected by a location bounded network. The server sends a key order information to the first device and a first plurality of keys to the second device. The server receives a second plurality of keys from the first device, wherein the second plurality of keys is an ordered set of keys compiled using the key order information and the first plurality of keys. The server determines that the second plurality of keys received from the first device matches an expected plurality of keys. The server outputs, to the location based service, a notification indicating a result of the determining that the second plurality of keys matches the expected plurality of keys.Type: GrantFiled: September 28, 2017Date of Patent: September 4, 2018Assignee: International Business Machines CorporationInventors: Saritha Arunkumar, Diyanesh B. Chinnakkonda Vidyapoornachary, Douglas J. Cowie, Saravanan Sethuraman
-
Patent number: 10063563Abstract: A method indicates a trustworthiness of data processed in accordance with a processing rule. A first trust weight is assigned to a data item to be processed to provide a weighted data item, the first trust weight representing a level of trust in the data item. A trust value is selected from a set of data trust values, the selected trust value being representative of a determined level of trust in the data item. The selected trust value is defined as the first trust weight which is associated with the data item. The first trust weight is assigned to a processing rule to provide a weighted processing rule, the first trust weight representing a level of trust in the processing rule. The weighted data item is processed in accordance with the weighted processing rule to generate a data output and an indication of a trust level for the data output.Type: GrantFiled: January 4, 2017Date of Patent: August 28, 2018Assignee: International Business Machines CorporationInventors: Saritha Arunkumar, Stephen D. Pipes, Mudhakar Srivatsa
-
Patent number: 10057276Abstract: A method, computer program product, and system for authenticating a computing device by geographic attestation includes a processor utilizing executing an authentication application utilizing location services executing on the computing device to obtain location data from the location services. The processor obtains the location data and creates and encodes a data structure in a secured area of a memory; the data structure is only accessible to the authentication application. The processor transmits to an authentication server, an authentication request that includes the encoded location data, requesting access to secure content. The processor obtains a request to query identifiers proximate to the computing device for additional location information and queries the identifiers and transmits this additional location information to the authentication server.Type: GrantFiled: September 19, 2016Date of Patent: August 21, 2018Assignee: International Business Machines CorporationInventors: Saritha Arunkumar, Diyanesh B. Chinnakkonda Vidyapoornachary, Saravanan Sethuraman
-
Publication number: 20180212976Abstract: A computer-implemented information verification method, system, and non-transitory computer readable medium, include acquiring a first measurement from a user device specific to a user device location, acquiring a second measurement from a second device specific to a second device location, comparing the first measurement with the second measurement, and verifying the user device is within a proximity of the second device to grant access for the user device to the second device, based on a result of the comparing.Type: ApplicationFiled: January 25, 2017Publication date: July 26, 2018Inventors: Saritha Arunkumar, Kuntal Dey, Nizar Lethif, Enara C. Vijil
-
Publication number: 20180196682Abstract: A method modifies a physical device for use by a particular person. One or more processors receive information from a sensor indicating a detection by the sensor of a sequence of actions performed by an unidentified person. The sequence of actions are physical actions performed in a particular order, and the physical actions are disparate types of physical movements performed by the unidentified person. One or more processors compare the sequence of actions performed by the unidentified person a known sequence of actions for a particular person. In response to the sequence of actions performed by the unidentified person matching the known sequence of actions for the particular person, one or more processors identify the unidentified person as the particular person and then modify a physical device for use by the particular person.Type: ApplicationFiled: January 10, 2017Publication date: July 12, 2018Inventors: SARITHA ARUNKUMAR, KUNTAL DEY, NIZAR LETHIF, ENARA C. VIJIL
-
Publication number: 20180196936Abstract: An authentication control method, system, and computer program product, includes performing an initial calibration to login to a registered device by detecting a plurality of biological signals, biometric signals, and idiosyncratic signals of a user and selecting a combination of the plurality of biological signals, biometric signals, and idiosyncratic signals to use in an initial calibration-authentication score, computing a login-authentication score at a time of the login based on a user input of signals corresponding to the signals of the initial calibration-authentication score, and allowing the login to the registered device if the login-authentication score is within a predetermined threshold of the initial calibration-authentication score.Type: ApplicationFiled: January 10, 2017Publication date: July 12, 2018Inventors: Saritha Arunkumar, Kuntal Dey, Nizar Lethif, Enara C. Vijil
-
Publication number: 20180129867Abstract: Age progression of a test facial image is facilitated by compiling training data, including a training set(s) having selected initial images of subjects by gender and age-group. In addition, the age progression includes manipulating the training data, including: for a given age-group of a training set, substantially aligning respective face shapes; determining a common frame based on the aligned shapes; substantially aligning respective face appearances to generate a shape-free form corresponding to the face appearance of each subject, using the substantially aligned shapes to generate an age-specific shape-dictionary for each age-group, and a common shape-dictionary for the age-groups of the training set, and using the aligned appearances to generate at least an age-specific appearance-dictionary for each age-group, and a common appearance-dictionary for the age-groups of the training set.Type: ApplicationFiled: November 10, 2016Publication date: May 10, 2018Inventors: Saritha ARUNKUMAR, Nalini K. RATHA, Christos SAGONAS, Peter W. WAGGETT
-
Publication number: 20180103021Abstract: Embodiments disclose systems, methods, and computer program products to perform an operation for adapting a set of devices used to authenticate a client device. The operation generally includes determining a plurality of broker devices available for attesting a location of a client device, and determining, from the available broker devices, a first and second subset of broker devices based on a credibility score determined for each of the available broker devices. The operation also includes attesting the location of the client device based on information received from the first subset of broker devices regarding devices in proximity to each of the broker devices in the first subset. The operation further includes upon determining that a number of responses with the information from at least one of the broker devices in the first subset has reached a threshold, reassigning broker devices in the first and second subsets.Type: ApplicationFiled: October 7, 2016Publication date: April 12, 2018Inventors: Saritha ARUNKUMAR, Diyanesh B. Chinnakkonda Vidyapoornachary, Douglas J. COWIE, Farheen MUNSHI, Saravanan SETHURAMAN