Patents by Inventor Sathya Santhar
Sathya Santhar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200026237Abstract: A display apparatus including a display; a holographic projector a fingerprint scanner to read a fingerprint from a user's finger spaced from the fingerprint scanner when placed in proximity to the holographic object; a camera to image the holographic object and the user's finger; a non-transitory storage medium that stores instructions; and a processor that executes the instructions to: responsive to the receipt of images from the camera, perform image analysis to: identify a position of the user's finger with respect to the display surface and the holographic object, identify a position of the holographic object with respect to the display surface and identify the proximity of the user's finger with the holographic object; and responsive to the image analysis to identify the proximity of the user's finger with the holographic object, provide an input to the fingerprint scanner to read the fingerprint of the user's finger.Type: ApplicationFiled: July 17, 2018Publication date: January 23, 2020Inventors: Sarbajit K. Rakshit, Sathya Santhar
-
Publication number: 20200019923Abstract: An example operation may include one or more of receiving, by a blockchain node, a first transaction comprising an asset identifier and an expiration date, verifying the expiration date has not changed from one or more previous transactions comprising the asset identifier, calculating an expected delivery date for an asset corresponding to the asset identifier, validating the first transaction in response to the expected delivery date not later than the expiration date. and committing the first transaction to a blockchain.Type: ApplicationFiled: July 12, 2018Publication date: January 16, 2020Inventors: Sathya Santhar, Sarbajit K. Rakshit, Samuel M. Jawaharlal, Balamurugaramanathan Sivaramalingam
-
Publication number: 20190332431Abstract: Method of allocating tasks in a computing environment including: receiving a software application having tasks for processing; splitting the software application into the tasks; selecting a task for processing in a first computing environment without encryption, a second computing environment with homomorphic encryption or a third computing environment without encryption based on the following algorithm: analyzing the tasks for the presence of a security marker indicating a security level of the tasks; when there is no security marker, selecting the task for processing in the least costly of first computing environment without encryption or the third computing environment without encryption; and when the security marker is present and the processing of the task involves any computation, selecting the task for processing in the least costly of the second computing environment with homomorphic encryption or the third computing environment.Type: ApplicationFiled: July 12, 2019Publication date: October 31, 2019Inventors: Gopal K. Bhageria, Pooja Malik, Sathya Santhar, Vikram Yadav
-
Patent number: 10455078Abstract: An apparatus and method for controlling mobile phone settings can include setting up an external speaker or an auxiliary port providing an audio signal output. In particular, the method runs to disable speaker and other audio extension ports thereby providing more control to the caller and preventing mishandling at the receiver's mobile device. The method includes initiating the call, from the calling device, with a non-speaker call signal setting. The receiving mobile interprets such signal and automatically disables the speaker/aux ports of the receiver mobile during the call duration. The apparatus and method implements a speaker disabled call initiated by the sender with the inclusion of a flag set to indicate the speaker disable feature in the signaling mobile channel of the network and be processed and carried over the network to the receiving mobile. The destination mobile resolves the flag to modify device settings to disable speaker and other audio extension ports.Type: GrantFiled: July 11, 2018Date of Patent: October 22, 2019Assignee: International Business Machines CorporationInventors: Sathya Santhar, Sarbajit K. Rakshit, Balamurugaramanathan Sivaramalingam, Samuel Mathew Jawaharlal
-
Publication number: 20190295692Abstract: A method and associated systems for using machine-learning methods to perform linear regression on a DNA-computing platform. One or more processors generate and initialize beta coefficients of a system of linear equations. These initial values are encoded into nucleobase chains that are then padded to a standard length. The chains are allowed to bind with complementary template chains in a DNA-computing reaction, and the resulting DNA molecules are decoded to reveal the relative the relative likelihood of each chain to bind. The initial values of the beta coefficients are weighted proportionally to these likelihoods, and the process is repeated iteratively until the beta coefficients converge to optimal values.Type: ApplicationFiled: June 12, 2019Publication date: September 26, 2019Inventors: Aaron K. Baughman, Jennifer McDonough, Sathya Santhar, Craig M. Trim
-
Patent number: 10423449Abstract: Method of allocating tasks in a computing environment including: receiving a software application having tasks for processing; splitting the software application into the tasks; selecting a task for processing in a first computing environment without encryption, a second computing environment with homomorphic encryption or a third computing environment without encryption based on the following algorithm: analyzing the tasks for the presence of a security marker indicating a security level of the tasks; when there is no security marker, selecting the task for processing in the least costly of first computing environment without encryption or the third computing environment without encryption; and when the security marker is medium or high and the processing of the task involves any computation, selecting the task for processing in the least costly of the second computing environment with homomorphic encryption or the third computing environment.Type: GrantFiled: November 20, 2017Date of Patent: September 24, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gopal K. Bhageria, Pooja Malik, Sathya Santhar, Vikram Yadav
-
Publication number: 20190256905Abstract: An apparatus for magnetic flux density based DNA sequencing. The apparatus comprising a device for generating a static magnetic field; a nanopore device; a gel medium; and a magnetometer for measuring a change in magnetic flux density of the static magnetic field as a chain of nucleotides travels through the gel medium.Type: ApplicationFiled: April 30, 2019Publication date: August 22, 2019Inventors: Samuel Mathew Jawaharlal, Arunachalam Narayanan, Sathya Santhar, Balamurugaramanathan Sivaramalingam
-
Patent number: 10388404Abstract: A method and associated systems for using machine-learning methods to perform linear regression on a DNA-computing platform. One or more processors generate and initialize beta coefficients of a system of linear equations. These initial values are encoded into nucleobase chains that are then padded to a standard length. The chains are allowed to bind with complementary template chains in a DNA-computing reaction, and the resulting DNA molecules are decoded to reveal the relative the relative likelihood of each chain to bind. The initial values of the beta coefficients are weighted proportionally to these likelihoods, and the process is repeated iteratively until the beta coefficients converge to optimal values.Type: GrantFiled: October 27, 2015Date of Patent: August 20, 2019Assignee: International Business Machines CorporationInventors: Aaron K. Baughman, Jennifer McDonough, Sathya Santhar, Craig M. Trim
-
Publication number: 20190238521Abstract: A process receives a specification of a finite-state machine and an encrypted language element of a language over an input alphabet for the finite-state machine. The received encrypted language element is encrypted with a selected public key of a plurality of public keys. The process decrypts the encrypted language element using each private key of a plurality of private keys corresponding to the public keys. The decrypting provides a plurality of decrypted language elements and the process applies each decrypted language element to the finite-state machine. The process identifies a decrypted language element that that is accepted by the finite-state machine. The process identifies a private key, of the private keys, used in the decrypting that provided the decrypted language element identified as being accepted by the finite-state machine. The process receives from the message sender an encrypted message, and uses the identified private key in decrypting the encrypted message.Type: ApplicationFiled: April 3, 2019Publication date: August 1, 2019Inventors: Samuel M. JAWAHARLAL, Arunachalam NARAYANAN, Sathya SANTHAR, Balamurugaramanathan SIVARAMALINGAM
-
Patent number: 10344326Abstract: In an approach to magnetic flux density based DNA sequencing, a static magnetic field is provided. A chain of nucleotides is passed through the magnetic field. A change in magnetic flux density of the static magnetic field due to an ionic voltage associated with an individual nucleotide or base pair of the chain of nucleotides is measured. An identity of the nucleotide is determined based on the change in magnetic flux density.Type: GrantFiled: May 25, 2016Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Samuel Mathew Jawaharlal, Arunachalam Narayanan, Sathya Santhar, Balamurugaramanathan Sivaramalingam
-
Patent number: 10339361Abstract: A computer-implemented method for authenticating a composite fingerprint includes executing on a computer processor the step of receiving the composite fingerprint, wherein the composite fingerprint is a thermal image of a reference finger with a thermal impression of another finger from a thermal scanner. The composite fingerprint is authenticated according to a known fingerprint of the reference finger and a known fingerprint of the other finger. A result of the authentication is returned.Type: GrantFiled: March 23, 2017Date of Patent: July 2, 2019Assignee: International Business Machines CorporationInventors: Sarbajit K. Rakshit, Sathya Santhar
-
Patent number: 10320758Abstract: A process selects a public key from a plurality of public keys provided by a message recipient that is to receive an encrypted message. The process establishes an input alphabet for a finite-state machine. The process further constructs the finite-state machine and a language over the input alphabet such that the finite-state machine accepts the language, where the language includes language elements. The process encrypts a language element of the language using the selected public key to provide an encrypted language element. The process electronically transmits the encrypted language element and a specification of the finite-state machine to the message recipient for securely identifying the selected public key to the message recipient. The process encrypts a message using the selected public key to provide the encrypted message. The process also electronically transmits the encrypted message to the message recipient.Type: GrantFiled: April 25, 2017Date of Patent: June 11, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Samuel M. Jawaharlal, Arunachalam Narayanan, Sathya Santhar, Balamurugaramanathan Sivaramalingam
-
Publication number: 20190171483Abstract: A method and system for allocating data processing jobs between public and private cloud based on various SLA and cost factors associated to each job, and particularly, job allocation using minimal cost association by applying logistic regression. Jobs are analyzed based on various factors such as compute and operational intensity, kind of environment, I/O operations bandwidth, costs involved to deploy in private and public cloud and all these parameters are balanced to arrive at minimized cost. Methods are implemented for receiving input data representing a current request to run a job on a virtual machine, associated job characteristics, features associated with VMs running on a public networked or private networked host computing environment, and features associated with the host computing environment.Type: ApplicationFiled: December 1, 2017Publication date: June 6, 2019Inventors: Sathya Santhar, Gopal Bhageria, Pooja Malik, Vikram Yadav
-
Publication number: 20190155643Abstract: Method of allocating tasks in a computing environment including: receiving a software application having tasks for processing; splitting the software application into the tasks; selecting a task for processing in a first computing environment without encryption, a second computing environment with homomorphic encryption or a third computing environment without encryption based on the following algorithm: analyzing the tasks for the presence of a security marker indicating a security level of the tasks; when there is no security marker, selecting the task for processing in the least costly of first computing environment without encryption or the third computing environment without encryption; and when the security marker is medium or high and the processing of the task involves any computation, selecting the task for processing in the least costly of the second computing environment with homomorphic encryption or the third computing environment.Type: ApplicationFiled: November 20, 2017Publication date: May 23, 2019Inventors: Gopal K. Bhageria, Pooja Malik, Sathya Santhar, Vikram Yadav
-
Publication number: 20190132270Abstract: Aspect include configured computer device processor that determine unstructured context data for a user processing an electronic message, the unstructured personal context data one or more of user motion data, user biometric data, environmental conditions of the user and audio speech data. The configured processors further determine a structured metadata value that is descriptive of a context of the user from the unstructured context data and is one or more of an emotional state value, a type of a vocal utterance and a user physical condition. The configured processors also incorporate the determined structured metadata value within a data structure defining the electronic message, and forward the determined structured metadata value to a recipient of the electronic message.Type: ApplicationFiled: October 26, 2017Publication date: May 2, 2019Inventors: SAMUEL M. JAWAHARLAL, Sarbajit K. Rakshit, SATHYA SANTHAR, Balamurugaramanathan Sivaramalingam
-
Publication number: 20190108516Abstract: An example operation may include one or more of storing a plurality of transactions in a carbon footprint blockchain, each stored transaction including one or more items and a carbon footprint associated with the one or more items included in the transaction, receiving a transaction processing request from a merchant terminal, the transaction processing request including an identification of an item and a user identification, executing chaincode which determines an aggregate carbon footprint of the user based on a carbon footprint of the item and a carbon footprint of one or more previous purchases of the user stored in the carbon footprint blockchain, and transmitting information about the determined aggregate carbon footprint of the user to the merchant terminal.Type: ApplicationFiled: October 11, 2017Publication date: April 11, 2019Inventors: Samuel M. Jawaharlal, Sarbajit K. Rakshit, Sathya Santhar, Balamurugaramanathan Sivaramalingam
-
Publication number: 20190095585Abstract: An example operation may include one or more of storing genetic information of a plurality of users as a plurality of respective transactions in a blockchain database, receiving a request to perform a chromosomal determination of a female user and a male user, from among the plurality of users, extracting chromosomal information of the female user and the male user from genetic information stored in the blockchain database and proactively determining genetic disorders that can occur if the female user and the male user have offspring based on the extracted chromosomal information, and outputting information about the proactively determined genetic disorders for display on a display device.Type: ApplicationFiled: September 27, 2017Publication date: March 28, 2019Inventors: Samuel M. Jawaharlal, Sarbajit K. Rakshit, Sathya Santhar, Balamurugaramanathan Sivaramalingam
-
Publication number: 20190052523Abstract: The present disclosure is a method for method for applying control rules to a mobile device in an environment. The method comprises the first step of loading a virtual boundary of an environment onto a Wi-Fi router, which is wirelessly connected to an access point in the environment. Such virtual boundary can be a layout of a home, office, or other building. Next, the method includes the steps of assigning a control rule to the virtual boundary, receiving a data packet at the Wi-Fi router from a Wi-Fi enabled mobile device in the virtual boundary and connected to the access point, and applying the control rule to the data packet.Type: ApplicationFiled: August 8, 2017Publication date: February 14, 2019Inventors: Samuel Mathew Jawaharlal, Sarbajit K. Rakshit, Sathya Santhar, Balamurugaramanathan Sivaramalingam
-
Patent number: 10191764Abstract: A method for agent-based transaction analysis which includes: building an instrumented binary code of a software application for a transaction; configuring an analysis agent for the software application; starting the software application in an application process environment with the instrumented binary code; attaching the analysis agent to the instrumented binary code of the software application; extracting by the analysis agent the metadata from the software application; sending the metadata to a central analysis server in an environment separate from the application process environment; and building by the central analysis server an end-to-end description of the transaction from the metadata.Type: GrantFiled: June 22, 2017Date of Patent: January 29, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Samuel M. Jawaharlal, Arunachalam Narayanan, Sathya Santhar, Santosh Shanmukh, Balamurugaramanathan Sivaramalingam
-
Publication number: 20190012749Abstract: The dynamic estimation of the cost functions involved in agriculture to determine which crops will result in the best return on investment given local conditions. A user interface allows a user to define a predetermined geographic area for analysis. A processor retrieves historical data encompassing the predetermined geographic area from a database and crop yield factor information from aerial images of the area and uses that information to calculate a minimized cost function for any particular crop to be grown in the area. A user may also select sub-areas for further analysis, for intercropping, and to assess the cost functions for multiple crops.Type: ApplicationFiled: July 5, 2017Publication date: January 10, 2019Inventors: Samuel Mathew Jawaharlal, Arunachalam Narayanan, Sathya Santhar, Balamurugaramanathan Sivaramalingam