Patents by Inventor Akila Srinivasan
Akila Srinivasan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240114389Abstract: The method provides for one or more processors to disperse object data for storage within a fifth-generation radio access network (RAN). The one or more processors receive radio frequency (RF) input for object data storage from a client device. The one or more processors perform a setup session configuring the RF input received for object data storage. The one or more processors perform a translation of the received RF input, wherein the translation enables processing of the RF input by an information dispersal algorithm (IDA) and enables storage of the object data of the RF input among multiple next generation node base stations (gNBs) forming a gNB cluster within a radio access network (RAN), and the one or more processors storing the object data of the received RF input across the gNB cluster in an Object Segment format.Type: ApplicationFiled: September 29, 2022Publication date: April 4, 2024Inventors: Alfredo R Castillo, Akila Srinivasan
-
Patent number: 11740825Abstract: A method includes: identifying, by a first program module, a bucket having an object lifecycle management rule in a dispersed storage network; creating, by a second program module, ranges of object names included in a namespace of the bucket; determining, by a third program module and for respective objects in each of the ranges, whether the respective objects satisfy the object lifecycle management rule of the bucket; and performing, by a fourth program module and based on the determining, an action on one of the respective objects that satisfies the object lifecycle management rule, the action being defined by the object lifecycle management rule.Type: GrantFiled: January 14, 2020Date of Patent: August 29, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David Brittain Bolen, Kevin Michael Freese, Thomas Dubucq, Akila Srinivasan, Wesley Leggette, Vivek Bajpai
-
Publication number: 20230065759Abstract: A computer-implemented method, a computer system and a computer program product manage a medical treatment of a care recipient. The method includes obtaining a treatment record for the care recipient from a server. The method also includes capturing real-time biometric data of the care recipient using a plurality of sensors. The method further includes determining a severity level of the adverse event by comparing the real-time biometric data with the treatment record in response to detecting an adverse event in the real-time biometric data. In addition, the method includes generating a recommendation for an alternative treatment in response to the severity level being above a threshold. Lastly, the method includes transmitting a notification comprising the recommendation to a treatment provider.Type: ApplicationFiled: September 2, 2021Publication date: March 2, 2023Inventors: David Bacarella, Clinton Anthony Black, Natalie Brooks Powell, ARIS GKOULALAS-DIVANIS, Susan Hallen, Pranay Kumar Jha, Elisabetta Rinaldi, Akila Srinivasan
-
Patent number: 11558459Abstract: A method includes: receiving, by a computing device, input defining a custom storage class in a first dispersed storage network; receiving, by the computing device, input defining a data management rule in the first dispersed storage network; determining, by the computing device, a data object in the first dispersed storage network satisfies the data management rule; and moving, by the computing device and in response to the determining, the data object to a second dispersed storage network according to the custom storage class.Type: GrantFiled: March 27, 2020Date of Patent: January 17, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Amit Lamba, Gregory R. Dhuse, Akila Srinivasan, Ying Zhao Guo
-
Publication number: 20220385464Abstract: Systems and methods for enforcing durability of second level encryption keys by a key management system (KMS) are provided. In embodiment, a method includes: receiving a first request to encrypt a first level key, the request including the first level key and a second level key identification associated with a stored encrypted second level key; determining that a durability check of the encrypted second level key is required based on the request; determining a durability status of the encrypted second level key by comparing actual storage of the encrypted second level key in one or more storage locations with predetermined storage rules for a durability level of the encrypted second level key, wherein the durability status indicates that the storage of the encrypted second level key complies with the durability level; and sending a notification regarding the durability status to the data storage service.Type: ApplicationFiled: May 25, 2021Publication date: December 1, 2022Inventors: Vaijayanthimala K. Anand, Wesley Leggette, Akila Srinivasan, Bruno Henriques, Cameron Paul Kurotori
-
Patent number: 11163457Abstract: A method for execution by a computing device includes determining a set of actor parties required to authorize a change of protection status of a stored resource from a protected status to an unprotected status. A minimum quorum is determined for each of the set of actor parties. A plurality of authorizations to change the protection status of the resource to the unprotected status are received from a plurality of requestors via the network. A plurality of subsets of the plurality of requestors corresponding to the set of actor parties are identified. The protection status of the resource is set to the unprotected status in response to determining, for every one of the set of actor parties, that a number of requestors in a corresponding one of the plurality of subsets is greater than or equal to the minimum quorum for the one of the set of actor parties.Type: GrantFiled: June 24, 2019Date of Patent: November 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Amit H. Lamba, Mark D. Seaborn, Akila Srinivasan
-
Patent number: 11163458Abstract: A method for execution by a computing device includes determining a set of actor parties required to authorize a change of protection status of a stored resource from a protected status to an unprotected status. A minimum quorum is determined for each of the set of actor parties. A plurality of authorizations to change the protection status of the resource to the unprotected status are received from a plurality of requestors via the network. A plurality of subsets of the plurality of requestors corresponding to the set of actor parties are identified. The protection status of the resource is set to the unprotected status in response to determining, for every one of the set of actor parties, that a number of requestors in a corresponding one of the plurality of subsets is greater than or equal to the minimum quorum for the one of the set of actor parties.Type: GrantFiled: September 16, 2019Date of Patent: November 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Amit H. Lamba, Mark D. Seaborn, Akila Srinivasan
-
Publication number: 20210306419Abstract: A method includes: receiving, by a computing device, input defining a custom storage class in a first dispersed storage network; receiving, by the computing device, input defining a data management rule in the first dispersed storage network; determining, by the computing device, a data object in the first dispersed storage network satisfies the data management rule; and moving, by the computing device and in response to the determining, the data object to a second dispersed storage network according to the custom storage class.Type: ApplicationFiled: March 27, 2020Publication date: September 30, 2021Inventors: Amit Lamba, Gregory R. Dhuse, Akila Srinivasan, Ying Zhao Guo
-
Publication number: 20210216233Abstract: A method includes: identifying, by a first program module, a bucket having an object lifecycle management rule in a dispersed storage network; creating, by a second program module, ranges of object names included in a namespace of the bucket; determining, by a third program module and for respective objects in each of the ranges, whether the respective objects satisfy the object lifecycle management rule of the bucket; and performing, by a fourth program module and based on the determining, an action on one of the respective objects that satisfies the object lifecycle management rule, the action being defined by the object lifecycle management rule.Type: ApplicationFiled: January 14, 2020Publication date: July 15, 2021Inventors: David Brittain Bolen, Kevin Michael Freese, Thomas Dubucq, Akila Srinivasan, Wesley Leggette, Vivek Bajpai
-
Publication number: 20200401325Abstract: A method for execution by a computing device includes determining a set of actor parties required to authorize a change of protection status of a stored resource from a protected status to an unprotected status. A minimum quorum is determined for each of the set of actor parties. A plurality of authorizations to change the protection status of the resource to the unprotected status are received from a plurality of requestors via the network. A plurality of subsets of the plurality of requestors corresponding to the set of actor parties are identified. The protection status of the resource is set to the unprotected status in response to determining, for every one of the set of actor parties, that a number of requestors in a corresponding one of the plurality of subsets is greater than or equal to the minimum quorum for the one of the set of actor parties.Type: ApplicationFiled: September 16, 2019Publication date: December 24, 2020Inventors: Amit H. Lamba, Mark D. Seaborn, Akila Srinivasan
-
Publication number: 20200401324Abstract: A method for execution by a computing device includes determining a set of actor parties required to authorize a change of protection status of a stored resource from a protected status to an unprotected status. A minimum quorum is determined for each of the set of actor parties. A plurality of authorizations to change the protection status of the resource to the unprotected status are received from a plurality of requestors via the network. A plurality of subsets of the plurality of requestors corresponding to the set of actor parties are identified. The protection status of the resource is set to the unprotected status in response to determining, for every one of the set of actor parties, that a number of requestors in a corresponding one of the plurality of subsets is greater than or equal to the minimum quorum for the one of the set of actor parties.Type: ApplicationFiled: June 24, 2019Publication date: December 24, 2020Inventors: Amit H. Lamba, Mark D. Seaborn, Akila Srinivasan
-
Patent number: 10575222Abstract: There is provided a method comprising determining a first subset of cells served by a first base station to be suitable for handover to a user equipment associated with a second base station, the subset comprising at least one but not all of the cells served by the first base station and providing information to the second base station from the first base station, said information comprising an indication of the determined first subset of cells.Type: GrantFiled: August 13, 2015Date of Patent: February 25, 2020Assignee: Nokia Solutions and Networks OyInventors: Faisal Farooqi, Tarun Agarwal, Akila Srinivasan
-
Patent number: 10349363Abstract: Systems and techniques for configuring a wireless base station. A wireless base station enters a configuration mode including less than full cellular functionality, receives neighboring cell information at least one neighbor cell in the vicinity of the wireless base station using communications requiring less than full cellular functionality by the wireless base station, and entering an operational mode including full cellular functionality, using a configuration based at least in part on the neighboring cell information.Type: GrantFiled: November 26, 2014Date of Patent: July 9, 2019Assignee: Nokia Solutions and Networks OyInventors: Ashley Herr, Akila Srinivasan, John Harris, Jason Shy
-
Publication number: 20180338291Abstract: Systems and techniques for configuring a wireless base station. A wireless base station enters a configuration mode including less than full cellular functionality, receives neighboring cell information at least one neighbor cell in the vicinity of the wireless base station using communications requiring less than full cellular functionality by the wireless base station, and entering an operational mode including full cellular functionality, using a configuration based at least in part on the neighboring cell information.Type: ApplicationFiled: November 26, 2014Publication date: November 22, 2018Inventors: Ashley HERR, Akila SRINIVASAN, John HARRIS, Jason SHY
-
Patent number: 10045312Abstract: In accordance with an example embodiment of the present invention, methods, apparatae and software products are presented for enabling transmission by devices requiring a priori and periodic authorization from a spectrum access server for transmission.Type: GrantFiled: August 12, 2016Date of Patent: August 7, 2018Assignee: NOKIA TECHNOLOGIES OYInventors: Alex Hirsbrunner, Akila Srinivasan, Tarun Agarwal, William Gayde
-
Publication number: 20180220342Abstract: There is provided a method comprising determining a first subset of cells served by a first base station to be suitable for handover to a user equipment associated with a second base station, the subset comprising at least one but not all of the cells served by the first base station and providing information to the second base station from the first base station, said information comprising an indication of the determined first subset of cellsType: ApplicationFiled: August 13, 2015Publication date: August 2, 2018Inventors: Faisal FAROOQI, Tarun AGARWAL, Akila SRINIVASAN
-
Patent number: 9974079Abstract: Various communication systems may benefit from improved radio frequency transmissions. For example, communication systems may benefit from the selection of a frequency band based on measurements of a spectrum surrounding the user equipment. A method, in certain embodiments, may include taking measurements by a base station of a spectrum of an environment surrounding a user equipment. The method may also include determining based on the measurements and radio frequency capabilities of the base station at least one desired frequency for transmission by the user equipment. In addition, the method may include sending a request from the base station to a network entity requesting a grant of the at least one desired frequency for transmission by the user equipment.Type: GrantFiled: November 8, 2016Date of Patent: May 15, 2018Assignee: NOKIA SOLUTIONS AND NETWORKS OYInventors: William Gayde, Akila Srinivasan, Tarun Agarwal, Alex Hirsbrunner
-
Publication number: 20180132241Abstract: Various communication systems may benefit from improved radio frequency transmissions. For example, communication systems may benefit from the selection of a frequency band based on measurements of a spectrum surrounding the user equipment. A method, in certain embodiments, may include taking measurements by a base station of a spectrum of an environment surrounding a user equipment. The method may also include determining based on the measurements and radio frequency capabilities of the base station at least one desired frequency for transmission by the user equipment. In addition, the method may include sending a request from the base station to a network entity requesting a grant of the at least one desired frequency for transmission by the user equipment.Type: ApplicationFiled: November 8, 2016Publication date: May 10, 2018Inventors: William GAYDE, Akila SRINIVASAN, Tarun AGARWAL, Alex HIRSBRUNNER
-
Publication number: 20180049140Abstract: In accordance with an example embodiment of the present invention, methods, apparatae and software products are presented for enabling transmission by devices requiring a priori and periodic authorization from a spectrum access server for transmission.Type: ApplicationFiled: August 12, 2016Publication date: February 15, 2018Inventors: Alex Hirsbrunner, Akila Srinivasan, Tarun Agarwal, William Gayde