Patents by Inventor SARITHA ARUNKUMAR

SARITHA ARUNKUMAR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160165437
    Abstract: Anonymizing location information of a mobile device by an anonymization provider. The anonymizing provider receives, from the mobile device, location information identifying the location of the mobile device and an anonymity requirement. The anonymization provider selects an obfuscation value indicating an extent of location obfuscation that satisfies the received anonymity requirement. The extent of location obfuscation determines location boundaries within which a generated obfuscated location will reside. The anonymization provider generates an obfuscated location for the mobile device and sends the obfuscated location to the mobile device.
    Type: Application
    Filed: February 18, 2016
    Publication date: June 9, 2016
    Inventors: Saritha Arunkumar, Stephen D. Pipes, Mudhakar Srivatsa
  • Publication number: 20160149883
    Abstract: A method for authenticating a user of a computing device. The method includes a computer processor receiving an indication that a user of a computing device is accessing an object that utilizes an authentication process. The method further includes a computer processor selecting a first multi-media file that is associated with a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline user input authentication sequence. The method further includes creating a first temporal manipulation vector based on the user profile and a security requirement of the object of the authentication process, wherein the temporal manipulation vector modifies a presentation of a multi-media file and a corresponding time sequence of a user input authentication sequence in the multi-media file. The method further includes transmitting the first temporal manipulation vector and the first multi-media file to the computing device.
    Type: Application
    Filed: April 15, 2015
    Publication date: May 26, 2016
    Inventors: Saritha Arunkumar, Stephen D. Pipes
  • Publication number: 20160149902
    Abstract: A method for authenticating a user of a computing device. The method includes a computer processor receiving an indication that a user of a computing device is accessing an object that utilizes an authentication process. The method further includes a computer processor selecting a first multi-media file that is associated with a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline user input authentication sequence. The method further includes creating a first temporal manipulation vector based on the user profile and a security requirement of the object of the authentication process, wherein the temporal manipulation vector modifies a presentation of a multi-media file and a corresponding time sequence of a user input authentication sequence in the multi-media file. The method further includes transmitting the first temporal manipulation vector and the first multi-media file to the computing device.
    Type: Application
    Filed: November 25, 2014
    Publication date: May 26, 2016
    Inventors: Saritha Arunkumar, Stephen D. Pipes
  • Patent number: 9319876
    Abstract: Anonymizing location information of a mobile device by an anonymization provider. The anonymization provider receives, from the mobile device, location information identifying the location of the mobile device and anonymity requirements. The anonymization provider determines whether the received location information satisfies the received anonymity requirements. Based on the received location information satisfying the received anonymity requirements, the anonymization provider generates an obfuscated location for the mobile device and sends the obfuscated location to the mobile device. Based on the received location information not satisfying the received anonymity requirements, the anonymization provider sends a request for new anonymity requirements to the mobile device.
    Type: Grant
    Filed: March 26, 2015
    Date of Patent: April 19, 2016
    Assignee: International Business Machines Corporation
    Inventors: Saritha Arunkumar, Stephen D. Pipes, Mudhakar Srivatsa
  • Publication number: 20150350890
    Abstract: Anonymizing location information of a mobile device by an anonymization provider. The anonymization provider receives, from the mobile device, location information identifying the location of the mobile device and anonymity requirements. The anonymization provider determines whether the received location information satisfies the received anonymity requirements. Based on the received location information satisfying the received anonymity requirements, the anonymization provider generates an obfuscated location for the mobile device and sends the obfuscated location to the mobile device. Based on the received location information not satisfying the received anonymity requirements, the anonymization provider sends a request for new anonymity requirements to the mobile device.
    Type: Application
    Filed: March 26, 2015
    Publication date: December 3, 2015
    Inventors: Saritha Arunkumar, Stephen D. Pipes, Mudhakar Srivatsa
  • Publication number: 20150350891
    Abstract: A technique for anonymizing location information of a mobile device includes intercepting, by the mobile device, a request for access to actual location information of the mobile device made by an application. The mobile device redirects the request to a trusted edge server. The trusted edge server obfuscates the location information based on a location of one or more other mobile devices proximal to the mobile device to generate obfuscated location information. The one or more other mobile devices are selected based on a similarity between a user profile associated with the mobile device and user profiles associated with the one or more other mobile devices. The trusted edge server returns the obfuscated location information to the mobile device, which sends the obfuscated location information to the application in place of the requested location information.
    Type: Application
    Filed: May 29, 2015
    Publication date: December 3, 2015
    Inventors: SARITHA ARUNKUMAR, MUDHAKAR SRIVATSA, STEPHEN D. PIPES
  • Publication number: 20150156185
    Abstract: A method and/or computer program product indicates a trustworthiness of data processed in accordance with a processing rule. A first trust weight is assigned to a data item to be processed to provide a weighted data item, the first trust weight representing a level of trust in the data item. A second trust weight is assigned to the processing rule to provide a weighted processing rule, the second trust weight representing a level of trust in the processing rule. The weighted data item is processed in accordance with the weighted processing rule to generate a data output and an indication of a level of trust in the data output.
    Type: Application
    Filed: December 1, 2014
    Publication date: June 4, 2015
    Inventors: SARITHA ARUNKUMAR, STEPHEN D. PIPES, MUDHAKAR SRIVATSA