Patents by Inventor Sathya Santhar
Sathya Santhar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10897456Abstract: A process receives a specification of a finite-state machine and an encrypted language element of a language over an input alphabet for the finite-state machine. The received encrypted language element is encrypted with a selected public key of a plurality of public keys. The process decrypts the encrypted language element using each private key of a plurality of private keys corresponding to the public keys. The decrypting provides a plurality of decrypted language elements and the process applies each decrypted language element to the finite-state machine. The process identifies a decrypted language element that that is accepted by the finite-state machine. The process identifies a private key, of the private keys, used in the decrypting that provided the decrypted language element identified as being accepted by the finite-state machine. The process receives from the message sender an encrypted message, and uses the identified private key in decrypting the encrypted message.Type: GrantFiled: January 13, 2020Date of Patent: January 19, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Samuel M. Jawaharlal, Arunachalam Narayanan, Sathya Santhar, Balamurugaramanathan Sivaramalingam
-
Patent number: 10878940Abstract: A method and associated systems for using machine-learning methods to perform linear regression on a DNA-computing platform. One or more processors generate and initialize beta coefficients of a system of linear equations. These initial values are encoded into nucleobase chains that are then padded to a standard length. The chains are allowed to bind with complementary template chains in a DNA-computing reaction, and the resulting DNA molecules are decoded to reveal the relative the relative likelihood of each chain to bind. The initial values of the beta coefficients are weighted proportionally to these likelihoods, and the process is repeated iteratively until the beta coefficients converge to optimal values.Type: GrantFiled: June 12, 2019Date of Patent: December 29, 2020Assignee: International Business Machines CorporationInventors: Aaron K. Baughman, Jennifer McDonough, Sathya Santhar, Craig M. Trim
-
Publication number: 20200396064Abstract: Embodiments are disclosed for fairness in gaming. The techniques include generating a public-private key pair for a bet with a gaming application. The techniques further include encrypting the bet using the generated public-private key pair. Additionally, the techniques include providing the encrypted bet to the gaming application. The techniques also include providing a private key of the public-private key pair in response to a notice from the gaming application indicating whether the bet is won.Type: ApplicationFiled: June 13, 2019Publication date: December 17, 2020Inventors: Sathya Santhar, Sarbajit K. Rakshit, Mukundan Sundararajan, Balamurugaramanathan Sivaramalingam, Samuel Mathew Jawaharlal
-
Patent number: 10838363Abstract: A method that includes: recognizing by an object recognition device a physical object; comparing by the object recognition device the physical object with a fully completed object; identifying by the object recognition device a spatial position, an orientation and physical dimensions of the partially-completed physical object; creating by a three-dimensional (3D) modeling program a 3D model of the partially-completed physical object using the spatial position, the orientation and physical dimensions of the partially-completed physical object; inputting by the 3D modeling program to a holographic creation system a missing shape of the partially-completed physical object, the missing shape being a complementary portion of the partially-completed physical object; creating by the holographic creation system a 3D hologram of the complementary portion; displaying by a holographic projector the 3D hologram of the complementary portion adjacent to the partially-completed physical object.Type: GrantFiled: July 17, 2018Date of Patent: November 17, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sarbajit K. Rakshit, Sathya Santhar
-
Patent number: 10834611Abstract: A computer-implemented method includes: receiving, by a computer device, an initial travel plan from a call recipient; identifying, by the computer device, network locations along a route of the initial travel plan, the network locations being geographic locations where a communications network is available to a communication device of the call recipient; and predicting, by the computer device, one or more predicted available time slots of the call recipient, the predicted available time slots being periods of time during which the communication device of the call recipient is predicted to be in one of the network locations along the route, each of the predicted available time slots having a starting time, an ending time, and a duration.Type: GrantFiled: September 5, 2019Date of Patent: November 10, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Balamurugaramanathan Sivaramalingam, Sathya Santhar, Samuel Mathew Jawaharlal, Suvedhahari Velusamy
-
Patent number: 10817778Abstract: One or more processors receive hyperspectral band input, biometric input, and cognitive input as response input, from a user sampling a plurality of base foods, each base food prepared with a subset of ingredients and preparation techniques. The response input is transformed to a numeric representation of the respective input. Deep learning techniques are used to train an algorithm using the response data. A probabilistic ranking of base food is generated using unsupervised learning. Probability values of base food, ingredients, and preparation technique, associations preferred by the user, are generated, along with rules which define constraints associated with conditions for base food, ingredient, and preparation techniques, of user preferences. An objective function is generated that includes decision variables respectively aligned with constraints, and in response to optimizing the objective function, a preferred base food and ingredients, with preferred conditions of the user, is determined.Type: GrantFiled: June 27, 2016Date of Patent: October 27, 2020Assignee: International Business Machines CorporationInventors: Aaron K. Baughman, Rick A. Hamilton, II, Sathya Santhar, Ashish K. Tanuku
-
Patent number: 10761887Abstract: Method of allocating tasks in a computing environment including: receiving a software application having tasks for processing; splitting the software application into the tasks; selecting a task for processing in a first computing environment without encryption, a second computing environment with homomorphic encryption or a third computing environment without encryption based on the following algorithm: analyzing the tasks for the presence of a security marker indicating a security level of the tasks; when there is no security marker, selecting the task for processing in the least costly of first computing environment without encryption or the third computing environment without encryption; and when the security marker is present and the processing of the task involves any computation, selecting the task for processing in the least costly of the second computing environment with homomorphic encryption or the third computing environment.Type: GrantFiled: July 12, 2019Date of Patent: September 1, 2020Assignee: International Business Machines CorporationInventors: Gopal K. Bhageria, Pooja Malik, Sathya Santhar, Vikram Yadav
-
Patent number: 10756962Abstract: The present disclosure is a method for method for applying control rules to a mobile device in an environment. The method comprises the first step of loading a virtual boundary of an environment onto a Wi-Fi router, which is wirelessly connected to an access point in the environment. Such virtual boundary can be a layout of a home, office, or other building. Next, the method includes the steps of assigning a control rule to the virtual boundary, receiving a data packet at the Wi-Fi router from a Wi-Fi enabled mobile device in the virtual boundary and connected to the access point, and applying the control rule to the data packet.Type: GrantFiled: August 8, 2017Date of Patent: August 25, 2020Assignee: International Business Machines CorporationInventors: Samuel Mathew Jawaharlal, Sarbajit K. Rakshit, Sathya Santhar, Balamurugaramanathan Sivaramalingam
-
Patent number: 10755615Abstract: An intelligent, self-learning display uses knowledgebase rules to determine how to deform its flexible, touch-sensitive upper surface into a three-dimensional representation of displayed content. The upper surface is deformed by selectively inflating balloons, pistons, or other devices embedded into a lower layer of the display, such that the inflated devices exert upward pressure on specific regions of the surface. The flexible upper surface consists of two sublayers that each contain a grid of small strips. The two grids are skewed such that the lower-sublayer strips fill in otherwise-visible gaps between upper-sublayer strips during a deformation. A user may use tactile feedback to adjust characteristics of the deformation, such as the deformation's height. A machine-learning mechanism records user adjustments in a corpus that is then used to train the display to more accurately deform its surface when representing three-dimensional content.Type: GrantFiled: November 6, 2018Date of Patent: August 25, 2020Assignee: International Business Machines CorporationInventors: Sarbajit K. Rakshit, Sathya Santhar, Samuel M. Jawaharlal, Balamurugaramanathan Sivaramalingam
-
Patent number: 10708205Abstract: Aspect include configured computer device processor that determine unstructured context data for a user processing an electronic message, the unstructured personal context data one or more of user motion data, user biometric data, environmental conditions of the user and audio speech data. The configured processors further determine a structured metadata value that is descriptive of a context of the user from the unstructured context data and is one or more of an emotional state value, a type of a vocal utterance and a user physical condition. The configured processors also incorporate the determined structured metadata value within a data structure defining the electronic message, and forward the determined structured metadata value to a recipient of the electronic message.Type: GrantFiled: October 26, 2017Date of Patent: July 7, 2020Assignee: International Business Machines CorporationInventors: Samuel M. Jawaharlal, Sarbajit K. Rakshit, Sathya Santhar, Balamurugaramanathan Sivaramalingam
-
Patent number: 10691488Abstract: A method and system for allocating data processing jobs between public and private cloud based on various SLA and cost factors associated to each job, and particularly, job allocation using minimal cost association by applying logistic regression. Jobs are analyzed based on various factors such as compute and operational intensity, kind of environment, I/O operations bandwidth, costs involved to deploy in private and public cloud and all these parameters are balanced to arrive at minimized cost. Methods are implemented for receiving input data representing a current request to run a job on a virtual machine, associated job characteristics, features associated with VMs running on a public networked or private networked host computing environment, and features associated with the host computing environment.Type: GrantFiled: December 1, 2017Date of Patent: June 23, 2020Assignee: International Business Machines CorporationInventors: Sathya Santhar, Gopal Bhageria, Pooja Malik, Vikram Yadav
-
Publication number: 20200162265Abstract: Technology for matching “consequential-meaning hash key values” based on a sender-side text message and a corresponding receiver-side text message. In some embodiments, the hash key values will be based on a breakdown of the text into certain selected parts-of-speech categories.Type: ApplicationFiled: November 20, 2018Publication date: May 21, 2020Inventors: Samuel Mathew Jawaharlal, Sathya Santhar, Sarbajit K. Rakshit, Balamurugaramanathan Sivaramalingam
-
Publication number: 20200153804Abstract: A process receives a specification of a finite-state machine and an encrypted language element of a language over an input alphabet for the finite-state machine. The received encrypted language element is encrypted with a selected public key of a plurality of public keys. The process decrypts the encrypted language element using each private key of a plurality of private keys corresponding to the public keys. The decrypting provides a plurality of decrypted language elements and the process applies each decrypted language element to the finite-state machine. The process identifies a decrypted language element that that is accepted by the finite-state machine. The process identifies a private key, of the private keys, used in the decrypting that provided the decrypted language element identified as being accepted by the finite-state machine. The process receives from the message sender an encrypted message, and uses the identified private key in decrypting the encrypted message.Type: ApplicationFiled: January 13, 2020Publication date: May 14, 2020Inventors: Samuel M. JAWAHARLAL, Arunachalam NARAYANAN, Sathya SANTHAR, Balamurugaramanathan SIVARAMALINGAM
-
Publication number: 20200143720Abstract: An intelligent, self-learning display uses knowledgebase rules to determine how to deform its flexible, touch-sensitive upper surface into a three-dimensional representation of displayed content. The upper surface is deformed by selectively inflating balloons, pistons, or other devices embedded into a lower layer of the display, such that the inflated devices exert upward pressure on specific regions of the surface. The flexible upper surface consists of two sublayers that each contain a grid of small strips. The two grids are skewed such that the lower-sublayer strips fill in otherwise-visible gaps between upper-sublayer strips during a deformation. A user may use tactile feedback to adjust characteristics of the deformation, such as the deformation's height. A machine-learning mechanism records user adjustments in a corpus that is then used to train the display to more accurately deform its surface when representing three-dimensional content.Type: ApplicationFiled: November 6, 2018Publication date: May 7, 2020Inventors: Sarbajit K. Rakshit, Sathya Santhar, Samuel M. Jawaharlal, Balamurugaramanathan Sivaramalingam
-
Publication number: 20200125458Abstract: Dynamic checkpointing can include determining, using a processor, a process criticality corresponding to a process configured to execute on computer hardware. The process criticality indicates a priority of the process relative to at least one other process configured to execute on the computer hardware. A checkpoint schedule can be generated, using the processor and based on the process criticality, for checkpointing the process when it executes on the computer hardware.Type: ApplicationFiled: October 19, 2018Publication date: April 23, 2020Inventors: Sathya Santhar, Sarbajit K. Rakshit, Balamurugaramanathan Sivaramalingam, Samuel M. Jawaharlal
-
Patent number: 10609003Abstract: A process receives a specification of a finite-state machine and an encrypted language element of a language over an input alphabet for the finite-state machine. The received encrypted language element is encrypted with a selected public key of a plurality of public keys. The process decrypts the encrypted language element using each private key of a plurality of private keys corresponding to the public keys. The decrypting provides a plurality of decrypted language elements and the process applies each decrypted language element to the finite-state machine. The process identifies a decrypted language element that that is accepted by the finite-state machine. The process identifies a private key, of the private keys, used in the decrypting that provided the decrypted language element identified as being accepted by the finite-state machine. The process receives from the message sender an encrypted message, and uses the identified private key in decrypting the encrypted message.Type: GrantFiled: April 3, 2019Date of Patent: March 31, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Samuel M. Jawaharlal, Arunachalam Narayanan, Sathya Santhar, Balamurugaramanathan Sivaramalingam
-
Publication number: 20200077132Abstract: A computer-implemented includes streaming a first segment of multimedia data to a buffer on a first computing device at a first bitrate, wherein the first segment includes a first set of video frames encoded at a first resolution. The computer-implemented method further includes streaming a second segment of the multimedia data to the buffer on the first computing device at a second bitrate, wherein the second segment includes a second set of video frames encoded at a second resolution. The computer-implemented method further includes determining that a first predetermined threshold is reached. The computer-implemented method further includes streaming, in response to determining that the first predetermined threshold is reached, a third segment of multimedia data to the buffer on the first computing device, wherein the third segment includes a first set of pixels that are logically related to the second set of video frames of the second segment.Type: ApplicationFiled: August 31, 2018Publication date: March 5, 2020Inventors: Balamurugaramanathan Sivaramalingam, Sathya Santhar, Samuel Mathew Jawaharlal, Sarbajit K. Rakshit
-
Publication number: 20200074278Abstract: Optimizing the allocation of farmland between different crops is provided. First and second Deep Boltzmann machines (DBMs) are built, wherein the hidden layers of the DBMs are split into a plurality of neural networks, each neural network modeling a different timeframe of crop growth. A plurality of factors related to crop growth are fed into the first DBM, which is trained to produce a first multi-class output of predicted maximum crop yields within a specified overall timeframe. The first multi-class output is fed into the second DBM, which is trained to produce a second multi-class output of predicted crop yields. The second multi-class output is fed into a decision support system that generates a recommended allocation of the farmland among different crops during different timeframes to maximize total yield.Type: ApplicationFiled: August 30, 2018Publication date: March 5, 2020Inventors: Sathya Santhar, Abhay Patra, Harish Bharti, Sarbajit K. Rakshit
-
Publication number: 20200050931Abstract: Methods and systems for generating recommendation data to address behaviors exhibited by an entity are described. A processor may construct a finite automaton based on entity data associated with the entity. Each state of the finite automaton may represent a sentiment, and the finite automaton may accept a language representing a set of behaviors. The processor may receive a request comprising an input behavior string. The processor may apply the input behavior string on the finite automata to determine an output string. The processor may identify at least one neural model mapped to the output string, where the identified neural model comprises logic that facilitates interpretation of a cause of the behaviors among the input behavior string. The processor may generate the recommendation data using the identified neural model, where the recommendation data comprises a recommendation to address the behaviors among the input behavior string.Type: ApplicationFiled: August 8, 2018Publication date: February 13, 2020Inventors: Harish Bharti, Kshitij Kashyap Raval, Abhay Patra, Sarbajit K. Rakshit, Sathya Santhar
-
Publication number: 20200026239Abstract: A method that includes: recognizing by an object recognition device a physical object; comparing by the object recognition device the physical object with a fully completed object; identifying by the object recognition device a spatial position, an orientation and physical dimensions of the partially-completed physical object; creating by a three-dimensional (3D) modeling program a 3D model of the partially-completed physical object using the spatial position, the orientation and physical dimensions of the partially-completed physical object; inputting by the 3D modeling program to a holographic creation system a missing shape of the partially-completed physical object, the missing shape being a complementary portion of the partially-completed physical object; creating by the holographic creation system a 3D hologram of the complementary portion; displaying by a holographic projector the 3D hologram of the complementary portion adjacent to the partially-completed physical object.Type: ApplicationFiled: July 17, 2018Publication date: January 23, 2020Inventors: Sarbajit K. Rakshit, Sathya Santhar