Patents by Inventor Vijay Kumar Ananthapur Bache

Vijay Kumar Ananthapur Bache has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200034446
    Abstract: A method of dynamically rendering cognitive contacts that includes: identifying transitory contacts of interest to a user of a mobile device in various contexts; identifying various contexts applicable to the user; sorting the transitory contacts of interest into transitory contact types; mapping the various contexts to the transitory contact types into a mapping table; deriving a present context pertaining to a user of the mobile device; querying the mapping table for transitory contact types applicable to the present context; dynamically rendering the applicable transitory contact types to the user in a transitory contacts screen on the mobile device; and responsive to the user selecting one of the applicable transitory contact types, displaying the transitory contacts of interest in the transitory contacts screen on the mobile device corresponding to the transitory contact type.
    Type: Application
    Filed: July 25, 2018
    Publication date: January 30, 2020
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Saravanan Sadacharam, Rengia R. Vasudevan
  • Publication number: 20200012409
    Abstract: Systems and methods for cognitive composition of multi-dimensional icons and interactions are disclosed. In embodiments, a computer-implemented method comprises: generating, by a computing device, interaction logs based on user context data received; identifying, by the computing device, one or more target applications and associated scripts; automatically generating, by the computing device, a multi-dimensional icon for the one or more target applications based on the interaction logs, wherein the multi-dimensional icon comprises a geometric structure including content cells; allocating, by the computing device, the scripts to respective content cells of the multi-dimensional icon.
    Type: Application
    Filed: July 5, 2018
    Publication date: January 9, 2020
    Inventors: Saravanan SADACHARAM, Vijay Kumar ANANTHAPUR BACHE, Vijay EKAMBARAM, Padmanabha Venkatagiri SESHADRI
  • Publication number: 20190384804
    Abstract: A method controls execution of an intended application. One or more processors receive a first formatted character string that is in a first format. The processor(s) determine which application from multiple applications is an intended application that is to use the first formatted character string as a basis of an input to the intended application. The processor(s) convert the first formatted character string into a second formatted character string by applying a second format that is used by the intended application, and then execute the intended application by using the second formatted character string as an input to the intended application.
    Type: Application
    Filed: June 18, 2018
    Publication date: December 19, 2019
    Inventors: MANISH BHIDE, PURNA CHANDRA JASTI, VIJAY KUMAR ANANTHAPUR BACHE, PHANI KUMAR V. U. AYYAGARI, MADAN K. CHUKKA
  • Patent number: 10440530
    Abstract: Embodiments selectively place or accept telephone calls based on recipient preference information, wherein processors are configured to determine whether a first telephone number of a different telephone numbers associated to an identified recipient is ranked highest relative to others of the telephone numbers within the ordered ranking for preferred use in calling the recipient at a local times and geographic locations of receiving mobile devices associated with the telephone numbers. In response to determining that the first number is not ranked highest, the embodiments stop execution of the initiated call to the first number and request authorization from the caller to place the call to another of the telephone numbers that is ranked highest within the ordered ranking. Embodiments further iteratively request authorization from the caller to place the call to others of the telephone numbers next-highest in rank, until placing the call to an authorized one.
    Type: Grant
    Filed: August 30, 2018
    Date of Patent: October 8, 2019
    Assignee: International Business Machines Corporation
    Inventors: Vijay Kumar Ananthapur Bache, Jhilam Bera, Vijay Ekambaram, Saravanan Sadacharam
  • Patent number: 10417055
    Abstract: A computer-implemented method of movement of microprocess components in a computer environment which includes: dividing a process into a plurality of microprocess components, the process to be run in a computer environment; creating a plurality of microprocess component placement combinations for the microprocess components, each combination comprising a placement of two or more microprocessor components in the computer environment; computing a utility score for each combination of microprocess components based on minimizing an end to end time for the combination of microprocess components and resource used for the combination of microprocess components; choosing the microprocessor component placement combination that has the best utility score; and assigning the microprocess component placement combination with the best utility score to placement in the computer environment.
    Type: Grant
    Filed: January 11, 2017
    Date of Patent: September 17, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Sarbajit K. Rakshit, Saravanan Sadacharam
  • Publication number: 20190243463
    Abstract: A computer to receives a first set of data associated with movements of a second hand of the user on a first side of the first hand of the user and receiving a second set of data associated with movements of the second hand of the user on a second side of the first hand of the user. The first set of data is mapped to a first side of the transparent display and the second set of data is mapped to a second side of the transparent display. The approach includes receiving a first set of sensor data associated with movements of the second hand of the user on the first hand of the user and determining a manipulation of a content on a side of the transparent display corresponding to the first set of sensor data and sending instructions to the transparent display to display the content.
    Type: Application
    Filed: March 15, 2019
    Publication date: August 8, 2019
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Sarbajit K. Rakshit, Saravanan Sadacharam
  • Publication number: 20190245912
    Abstract: A method and system for optimizing data transfers includes generating a hash signature for a requested data file using a router agent of a Local Area Network (LAN), in response to an initiating user requesting the requested data file using a computer on a LAN communicating with a WAN/Internet, and the router agent configuring a file byte-stream for requested data files from the Wide Area Network (WAN/Internet). The generated hash signature of the requested data file is compared with an existing hash signature of an existing data file accessible using the local area network (LAN). The requested data file can be downloaded locally if a user accepts a local download of the requested data file being accessible using the LAN, in response to the generated hash signature matching the hash signature of the existing data file.
    Type: Application
    Filed: April 22, 2019
    Publication date: August 8, 2019
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Saravanan Sadacharam
  • Publication number: 20190230381
    Abstract: An approach is provided for compressing video frames captured by a camera. Clusters of the video frames are determined, where the clusters have correlations to respective sets of values of meta data associated with the video frames. The meta data includes a location, focal length, and direction of the camera, and a time of day during a capture of the video frames by the camera. Based on multiple video frames within each of the clusters being compared with each other but not being compared with a video frame in another cluster, base and delta frames are determined and stored for each of the clusters. An amount of storage required for the base and delta frames is based in part on each of the correlations to the respective sets of values of the meta data.
    Type: Application
    Filed: March 29, 2019
    Publication date: July 25, 2019
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Sarbajit K. Rakshit, Saravanan Sadacharam
  • Patent number: 10361509
    Abstract: A method, system and computer program product for programmatically adapting a magnetic field in a USB port for controlling USB device drive ejection from an adaptor port. The magnetic field is adapted based on the criticality of the tasks being performed in USB/pen drive/external hard-disk so as to prevent data-corruption and improve user experience (easy pull-off during non-critical tasks).
    Type: Grant
    Filed: September 27, 2018
    Date of Patent: July 23, 2019
    Assignee: International Business Machines Corporation
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Saravanan Sadacharam
  • Publication number: 20190200198
    Abstract: Aspects of the present invention provide a software defined radio (SDR) system and/or an approach for enabling heterogeneous device communications using a SDR device in an internet of things (IoT) environment. In an embodiment, the SDR device (e.g., a network adapter thereof) obtains a set of communications sent by an IoT device. Based on an analysis of the set of communications by an SDR bot running on the SDR device, a protocol of the set of communications is determined. The SDR bot interprets a communication of the set of communications, and, based on the interpreted communication, a notification is forwarded by the SDR device (e.g., by the network adapter). This notification can include an instruction to another IoT device to perform a task, a report based on communications from multiple IoT devices, or the like.
    Type: Application
    Filed: December 21, 2017
    Publication date: June 27, 2019
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Srikanth K. Murali, Padmanabha Venkatagiri Seshadri
  • Publication number: 20190188815
    Abstract: Generating a risk and constraint labeled context map of an operational space is provided. The risk and constraint labeled context map of the operational space corresponding to a user of a cognitive suit is generated to drive the cognitive suit contextually using three-dimension reconstruction, virtual reality, and semi-supervised learning. Labeled risks and constraints in the risk and constraint labeled context map are associated with cognitive suit actuation events to deploy a set of mitigation strategies to address the labeled risks and constraints. An apparatus embedded in the cognitive suit is actuated to deploy the set of mitigation strategies in response to sensing a labeled risk or labeled constraint proximate to the user along a trajectory of the user in the operational space.
    Type: Application
    Filed: December 20, 2017
    Publication date: June 20, 2019
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Srikanth K. Murali, Padmanabha Venkatagiri Shesadri
  • Patent number: 10321160
    Abstract: An approach is provided for compressing video frames captured by a camera. A location, focal length, and direction of the camera, and the time of day during capture of the video frames (i.e., meta data) are determined. The meta data is associated with the video frames. Clusters of the video frames are determined, where the clusters have correlations to respective sets of values of the meta data. Based on multiple video frames within each of the clusters being compared with each other but not being compared with a video frame in another cluster, base and delta frames are determined and stored for each of the clusters. An amount of storage required for the base and delta frames is based in part on each of the correlations to the respective sets of values of the meta data.
    Type: Grant
    Filed: July 13, 2017
    Date of Patent: June 11, 2019
    Assignee: International Business Machines Corporation
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Sarbajit K. Rakshit, Saravanan Sadacharam
  • Publication number: 20190171744
    Abstract: An example operation may include one or more of identifying a query from a requesting entity, where the query requests access to one or more blockchains, converting the query to an expression tree, creating one or more expression tree variations based on the expression tree, the one or more expression tree variations provide one or more different expressions than the expression tree and a same result as the expression tree, determining access conformity between one or more expression tree variations and the expression tree, selecting an expression tree variation with a greatest conformity rating, performing the query using the expression tree variation with the greatest conformity rating, and providing query results to a requesting entity.
    Type: Application
    Filed: December 2, 2017
    Publication date: June 6, 2019
    Inventors: Vijay Kumar Ananthapur Bache, Jhilam Bera, Vijay Ekambaram, Padmanabha Venkatagiri Seshadri
  • Publication number: 20190042784
    Abstract: A system, method and program product for implementing an ultrasound security system for a mobile device. A system is described that includes: an app flow analysis system that generates and maintains runtime flow graphs for apps running on the mobile device and analyzes the runtime flow graphs to identify a set of apps having confidential data flow application programming interfaces (APIs) in their execution paths; a detector that further evaluates the set of apps having confidential data flow APIs to identify a subset of vulnerable apps also having ultrasound emitting APIs; and a runtime correlation system that flags a vulnerable app as a potential data leak when a microphone detects an ultrasound transmission from the vulnerable app. Also contemplated is a countermeasure system that broadcasts a temporal sound blocking signal to neutralize an ultrasound transmission from the vulnerable app.
    Type: Application
    Filed: October 11, 2018
    Publication date: February 7, 2019
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Sarbajit K. Rakshit, Saravanan Sadacharam
  • Publication number: 20190020901
    Abstract: An approach is provided for compressing video frames captured by a camera. A location, focal length, and direction of the camera, and the time of day during capture of the video frames (i.e., meta data) are determined. The meta data is associated with the video frames. Clusters of the video frames are determined, where the clusters have correlations to respective sets of values of the meta data. Based on multiple video frames within each of the clusters being compared with each other but not being compared with a video frame in another cluster, base and delta frames are determined and stored for each of the clusters. An amount of storage required for the base and delta frames is based in part on each of the correlations to the respective sets of values of the meta data.
    Type: Application
    Filed: July 13, 2017
    Publication date: January 17, 2019
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Sarbajit K. Rakshit, Saravanan Sadacharam
  • Publication number: 20190018660
    Abstract: A method for creating a wireframe model for a user interface. A computer identifies an image on a user interface. The computer performs image recognition to identify objects and text within the image. The computer creates a digital widget model based on the step of performing image recognition. The computer delivers digital widget output to a user experience designer for editing, wherein the digital widget output is based on the step of creating. The computer stores edits made by the user experience designer in a historical records database and the wireframe model design is finalized.
    Type: Application
    Filed: July 11, 2017
    Publication date: January 17, 2019
    Inventors: Vijay Kumar Ananthapur Bache, Jhilam Bera, Vijay Ekambaram, Saravanan Sadacharam
  • Patent number: 10169604
    Abstract: A system, method and program product for implementing an ultrasound security system for a mobile device. A system is described that that integrates with an operating system on a mobile computing device, and includes: an app flow analysis system that generates and maintains runtime flow graphs for apps running on the mobile device and analyzes the runtime flow graphs to identify a set of apps having confidential data flow application programming interfaces (APIs) in their execution paths; a detector that further evaluates the set of apps having confidential data flow APIs to identify a subset of vulnerable apps also having ultrasound emitting APIs; and a runtime correlation system that flags a vulnerable app as a potential data leak when a call to an ultrasound emitting API is detected from the vulnerable app. Also contemplated is a countermeasure system that broadcasts a temporal sound blocking signal to neutralize an ultrasound transmission from the vulnerable app.
    Type: Grant
    Filed: December 13, 2016
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Sarbajit K. Rakshit, Saravanan Sadacharam
  • Publication number: 20180367596
    Abstract: A method and system for optimizing data transfers includes generating a hash signature for a requested data file using a router agent of a Local Area Network (LAN), in response to an initiating user requesting the requested data file using a computer on a LAN communicating with a WAN/Internet, and the router agent configuring a file byte-stream for requested data files from the Wide Area Network (WAN/Internet). The generated hash signature of the requested data file is compared with an existing hash signature of an existing data file accessible using the local area network (LAN). The requested data file can be downloaded locally if a user accepts a local download of the requested data file being accessible using the LAN, in response to the generated hash signature matching the hash signature of the existing data file.
    Type: Application
    Filed: June 14, 2017
    Publication date: December 20, 2018
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Saravanan Sadacharam
  • Publication number: 20180324173
    Abstract: Computer processors are configured to verify a unique user identification credential for a requesting user of a first client in response to receiving request for access to a microservice process from the user via the first client; create a client identification token in response to verifying a unique user identification credential for the user, and a session identification token for the request; pass the session identification token to the requesting client mapped to the client identification token; enable requested access by the first client to the requested microservice process in association with the session identification token in a session that is persisted to a session repository identified by the session identification token; and cause the requesting client to replicate the persisted session in association with the session identification token.
    Type: Application
    Filed: May 3, 2017
    Publication date: November 8, 2018
    Inventors: VIJAY KUMAR ANANTHAPUR BACHE, VIJAY EKAMBARAM, SARAVANAN SADACHARAM
  • Publication number: 20180307320
    Abstract: A computer to receives a first set of data associated with movements of a second hand of the user on a first side of the first hand of the user and receiving a second set of data associated with movements of the second hand of the user on a second side of the first hand of the user. The first set of data is mapped to a first side of the transparent display and the second set of data is mapped to a second side of the transparent display. The approach includes receiving a first set of sensor data associated with movements of the second hand of the user on the first hand of the user and determining a manipulation of a content on a side of the transparent display corresponding to the first set of sensor data and sending instructions to the transparent display to display the content.
    Type: Application
    Filed: November 1, 2017
    Publication date: October 25, 2018
    Inventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Sarbajit K. Rakshit, Saravanan Sadacharam