Patents by Inventor Amit A. Nanavati
Amit A. Nanavati has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11328214Abstract: A method and associated systems provide real-time response to a request received from a real-time system like a self-driving vehicle or a device that communicates interactively with its environment. The response is selected from a set of candidate feasible responses by a group of computerized agents that each sort the feasible responses in order of that agent's specific preferences, based on that agent's particular priorities or expertise. The agents then reconcile their differences through an iterative procedure. During each iteration, each agent decides whether to retain its current preferences or to adopt the preferences of another agent. This decision is made by determining which preferences are most similar to that agent's own initial preferences, and by which preferences would be most useful in helping to achieve that agent's particular goals. When the agents reach consensus, the group's most-preferred response is returned quickly enough to provide real-time, interactive response.Type: GrantFiled: September 28, 2017Date of Patent: May 10, 2022Assignee: Kyndryl, Inc.Inventors: Sougata Mukherjea, Amit A. Nanavati, Ramasuri Narayanam, Gyana Ranjan Parija
-
Patent number: 10885080Abstract: Mechanisms are provided for implementing a conversation monitoring system. The conversation monitoring system monitors a conversation between at least two participants and extracting, by the conversation monitoring system, key terms present in communications between the at least two participants. The conversation monitoring system generates a provenance graph data structure based on the extraction of the key terms where the provenance graph data structure has speaker nodes representing the at least two participants, term nodes representing the key terms present in the communications, and edges connecting nodes in the provenance graph. The conversation monitoring system analyzes the provenance graph data structure to identify a relative ranking of the key terms within the conversation and generates an output representing content of the conversation based on the relative ranking of the key terms.Type: GrantFiled: February 5, 2018Date of Patent: January 5, 2021Assignee: International Business Machines CorporationInventors: Maryam Ashoori, Ashish Kundu, Amit A. Nanavati
-
Patent number: 10878011Abstract: Mechanisms are provided for implementing a conversation monitoring system. The conversation monitoring system monitors a conversation between at least two participants and extracting, by the conversation monitoring system, key terms present in communications between the at least two participants. The conversation monitoring system generates a provenance graph data structure based on the extraction of the key terms where the provenance graph data structure has speaker nodes representing the at least two participants, term nodes representing the key terms present in the communications, and edges connecting nodes in the provenance graph. The conversation monitoring system analyzes the provenance graph data structure to identify a relative ranking of the key terms within the conversation and generates an output representing content of the conversation based on the relative ranking of the key terms.Type: GrantFiled: February 5, 2018Date of Patent: December 29, 2020Assignee: International Business Machines CorporationInventors: Maryam Ashoori, Ashish Kundu, Amit A. Nanavati
-
Patent number: 10601752Abstract: A first electronic message being widely disseminated can be identified. First content of the first electronic message can be analyzed and a determination can be made as to whether the first content satisfies at least a first criterion. Responsive to determining that the first content satisfies at least the first criterion, a second electronic message including second content can be automatically generated. Communication of the second electronic message to a first set of people can be initiated, and responses by the first set of people to the second electronic message can be monitored. A determination can be made as to whether the responses satisfy at least a second criterion. Responsive to determining that the responses satisfy at least the second criterion, the second electronic message can be communicated to at least a second set of people.Type: GrantFiled: January 3, 2017Date of Patent: March 24, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Elezaveta Koumpan, Jenny S. Li, Amit A. Nanavati
-
Patent number: 10594642Abstract: A first electronic message being widely disseminated can be identified. First content of the first electronic message can be analyzed and a determination can be made as to whether the first content satisfies at least a first criterion. Responsive to determining that the first content satisfies at least the first criterion, a second electronic message including second content can be automatically generated. Communication of the second electronic message to a first set of people can be initiated, and responses by the first set of people to the second electronic message can be monitored. A determination can be made as to whether the responses satisfy at least a second criterion. Responsive to determining that the responses satisfy at least the second criterion, the second electronic message can be communicated to at least a second set of people.Type: GrantFiled: November 13, 2017Date of Patent: March 17, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Elezaveta Koumpan, Jenny S. Li, Amit A. Nanavati
-
Patent number: 10536507Abstract: An embodiment may be a cognitive event based file sharing system. The embodiment may include receiving a file share request by a user, wherein the file share request comprises a file selected for access by intended file recipients. The embodiment may include determining a storage capacity of a computing device of the user. The embodiment may include determining a storage capacity of computing devices of the intended file recipients. The embodiment may include allocating the file based on the storage capacity of the computing device of the user, the storage capacity of the computing devices of the intended file recipients, and a file management policy. The embodiment may include providing access to the file to the intended file recipients. The embodiment may include removing a portion of the file from at least one of the computing devices of the intended file recipients based on the occurrence of a specified event.Type: GrantFiled: December 1, 2017Date of Patent: January 14, 2020Assignee: International Business Machines CorporationInventors: Manish Kataria, Amit A. Nanavati
-
Patent number: 10484537Abstract: Embodiments of the invention provide a non-web based social networking system enabling users having limited Internet connectivity and/or limited access to high end mobile computing devices a cross networking opportunity with web-based social networking sites. Embodiments of the invention provide for additional communication modalities between social networking users, including but not limited to non-web based communication between the social networking users.Type: GrantFiled: October 29, 2009Date of Patent: November 19, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sheetal Agarwal, Koustuv Dasgupta, Arun Kumar, Amit A. Nanavati, Nitendra Rajput
-
Patent number: 10415742Abstract: A photographic monopod includes an extendable shaft, a bracket for fixing a photographic device at a first end of the extendable shaft, and a grip at a second end of the extendable shaft. The grip is opposite to the first end of the extendable shaft. The photo graphic monopod further includes a shutter control switch for controlling a shutter of the photographic device, and a shaft extension sensor for sensing a degree to which the extendable shaft is extended. The photographic monopod additionally includes a logic circuit for receiving the degree to which the extendable shaft is extended from the shaft extension sensor and disabling a connection between the shutter control switch and the photographic device when the degree to which the extendable shaft is extended exceeds a threshold.Type: GrantFiled: November 30, 2017Date of Patent: September 17, 2019Assignee: International Business Machines CorporationInventors: Ashish Kundu, Amit A. Nanavati, Clifford A. Pickover, Komminist Weldemariam
-
Publication number: 20190243917Abstract: Mechanisms are provided for implementing a conversation monitoring system. The conversation monitoring system monitors a conversation between at least two participants and extracting, by the conversation monitoring system, key terms present in communications between the at least two participants. The conversation monitoring system generates a provenance graph data structure based on the extraction of the key terms where the provenance graph data structure has speaker nodes representing the at least two participants, term nodes representing the key terms present in the communications, and edges connecting nodes in the provenance graph. The conversation monitoring system analyzes the provenance graph data structure to identify a relative ranking of the key terms within the conversation and generates an output representing content of the conversation based on the relative ranking of the key terms.Type: ApplicationFiled: February 5, 2018Publication date: August 8, 2019Inventors: Maryam Ashoori, Ashish Kundu, Amit A. Nanavati
-
Publication number: 20190243916Abstract: Mechanisms are provided for implementing a conversation monitoring system. The conversation monitoring system monitors a conversation between at least two participants and extracting, by the conversation monitoring system, key terms present in communications between the at least two participants. The conversation monitoring system generates a provenance graph data structure based on the extraction of the key terms where the provenance graph data structure has speaker nodes representing the at least two participants, term nodes representing the key terms present in the communications, and edges connecting nodes in the provenance graph. The conversation monitoring system analyzes the provenance graph data structure to identify a relative ranking of the key terms within the conversation and generates an output representing content of the conversation based on the relative ranking of the key terms.Type: ApplicationFiled: February 5, 2018Publication date: August 8, 2019Inventors: Maryam Ashoori, Ashish Kundu, Amit A. Nanavati
-
Publication number: 20190173937Abstract: An embodiment may be a cognitive event based file sharing system. The embodiment may include receiving a file share request by a user, wherein the file share request comprises a file selected for access by intended file recipients. The embodiment may include determining a storage capacity of a computing device of the user. The embodiment may include determining a storage capacity of computing devices of the intended file recipients. The embodiment may include allocating the file based on the storage capacity of the computing device of the user, the storage capacity of the computing devices of the intended file recipients, and a file management policy. The embodiment may include providing access to the file to the intended file recipients. The embodiment may include removing a portion of the file from at least one of the computing devices of the intended file recipients based on the occurrence of a specified event.Type: ApplicationFiled: December 1, 2017Publication date: June 6, 2019Inventors: Manish Kataria, Amit A. Nanavati
-
Publication number: 20190162359Abstract: A photographic monopod includes an extendable shaft, a bracket for fixing a photographic device at a first end of the extendable shaft, and a grip at a second end of the extendable shaft. The grip is opposite to the first end of the extendable shaft. The photo graphic monopod further includes a shutter control switch for controlling a shutter of the photographic device, and a shaft extension sensor for sensing a degree to which the extendable shaft is extended. The photographic monopod additionally includes a logic circuit for receiving the degree to which the extendable shaft is extended from the shaft extension sensor and disabling a connection between the shutter control switch and the photographic device when the degree to which the extendable shaft is extended exceeds a threshold.Type: ApplicationFiled: November 30, 2017Publication date: May 30, 2019Inventors: ASHISH KUNDU, Amit A. NANAVATI, Clifford A. PICKOVER, Komminist WELDEMARIAM
-
Publication number: 20190095804Abstract: A method and associated systems provide real-time response to a request received from a real-time system like a self-driving vehicle or a device that communicates interactively with its environment. The response is selected from a set of candidate feasible responses by a group of computerized agents that each sort the feasible responses in order of that agent's specific preferences, based on that agent's particular priorities or expertise. The agents then reconcile their differences through an iterative procedure. During each iteration, each agent decides whether to retain its current preferences or to adopt the preferences of another agent. This decision is made by determining which preferences are most similar to that agent's own initial preferences, and by which preferences would be most useful in helping to achieve that agent's particular goals. When the agents reach consensus, the group's most-preferred response is returned quickly enough to provide real-time, interactive response.Type: ApplicationFiled: September 28, 2017Publication date: March 28, 2019Inventors: Sougata Mukherjea, Amit A. Nanavati, Ramasuri Narayanam, Gyana Ranjan Parija
-
Patent number: 10063577Abstract: Methods, systems, and computer program products for securing deployments using command analytics are provided herein. A computer-implemented method includes collecting command sequences sent from one or more applications to one or more of a distributed group of multiple devices within a network; detecting one or more invalid command sequences and/or one or more out-of-sequence command sequences among the collected command sequences, wherein said detecting comprises comparing the collected command sequences against a repository of historical data of valid command sequences pertaining to the distributed group of multiple devices within the network; generating an alert upon a determination that one of the collected command sequences does not match an entry in the repository; and performing one or more remedial actions based on the generated alert.Type: GrantFiled: January 13, 2016Date of Patent: August 28, 2018Assignee: International Business Machines CorporationInventors: Shalini Kapoor, Palanivel Kodeswaran, Amit A. Nanavati, Sayandeep Sen
-
Publication number: 20180191657Abstract: A first electronic message being widely disseminated can be identified. First content of the first electronic message can be analyzed and a determination can be made as to whether the first content satisfies at least a first criterion. Responsive to determining that the first content satisfies at least the first criterion, a second electronic message including second content can be automatically generated. Communication of the second electronic message to a first set of people can be initiated, and responses by the first set of people to the second electronic message can be monitored. A determination can be made as to whether the responses satisfy at least a second criterion. Responsive to determining that the responses satisfy at least the second criterion, the second electronic message can be communicated to at least a second set of people.Type: ApplicationFiled: January 3, 2017Publication date: July 5, 2018Inventors: Elezaveta Koumpan, Jenny S. Li, Amit A. Nanavati
-
Publication number: 20180191658Abstract: A first electronic message being widely disseminated can be identified. First content of the first electronic message can be analyzed and a determination can be made as to whether the first content satisfies at least a first criterion. Responsive to determining that the first content satisfies at least the first criterion, a second electronic message including second content can be automatically generated. Communication of the second electronic message to a first set of people can be initiated, and responses by the first set of people to the second electronic message can be monitored. A determination can be made as to whether the responses satisfy at least a second criterion. Responsive to determining that the responses satisfy at least the second criterion, the second electronic message can be communicated to at least a second set of people.Type: ApplicationFiled: November 13, 2017Publication date: July 5, 2018Inventors: Elezaveta Koumpan, Jenny S. Li, Amit A. Nanavati
-
Patent number: 9940761Abstract: Methods, systems, and computer program products for self-driving vehicle sensor fault remediation are provided herein. A computer-implemented method includes detecting a fault in one or more sensors of a self-driving vehicle; determining a remedial action in response to the detected fault, wherein said determining comprises (i) comparing the fault to a database comprising (a) historical sensor fault information and (b) sensor fault remedy information, and (ii) analyzing one or more items of contextual information pertaining to the location of the self-driving vehicle; generating a signal comprising one or more instructions pertaining to carrying out the determined remedial action; and outputting the generated signal to one or more remote-controlled pilotless airborne devices configured to remotely carry out the determined remedial action on the self-driving vehicle.Type: GrantFiled: August 2, 2016Date of Patent: April 10, 2018Assignee: International Business Machines CorporationInventors: Ashish Kundu, Amit A. Nanavati, Clifford A. Pickover, Komminist S. Weldemariam
-
Publication number: 20180040171Abstract: Methods, systems, and computer program products for self-driving vehicle sensor fault remediation are provided herein. A computer-implemented method includes detecting a fault in one or more sensors of a self-driving vehicle; determining a remedial action in response to the detected fault, wherein said determining comprises (i) comparing the fault to a database comprising (a) historical sensor fault information and (b) sensor fault remedy information, and (ii) analyzing one or more items of contextual information pertaining to the location of the self-driving vehicle; generating a signal comprising one or more instructions pertaining to carrying out the determined remedial action; and outputting the generated signal to one or more remote-controlled pilotless airborne devices configured to remotely carry out the determined remedial action on the self-driving vehicle.Type: ApplicationFiled: August 2, 2016Publication date: February 8, 2018Inventors: Ashish Kundu, Amit A. Nanavati, Clifford A. Pickover, Komminist S. Weldemariam
-
Patent number: 9749137Abstract: Crypto-glasses include systems that implement a method of authentication of users by blinking, the crypto-glasses including a frame configured so as to be worn by a user, a processor, a display device communicating with the processor so as to dynamically display data, and a communication unit, as executed by the processor, to execute the method of authentication by transmitting data to the display device for performing the authentication of the user to interact with the display device. The communication unit is configured to display in an optical unit of the crypto-glasses a key map which correlates data input into the display device with keys of the display device, the key map indicating data different from that of the keys of the display device.Type: GrantFiled: January 27, 2016Date of Patent: August 29, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ashish Kundu, Amit A. Nanavati, Danny Soroker
-
Publication number: 20170201541Abstract: Methods, systems, and computer program products for securing deployments using command analytics are provided herein. A computer-implemented method includes collecting command sequences sent from one or more applications to one or more of a distributed group of multiple devices within a network; detecting one or more invalid command sequences and/or one or more out-of-sequence command sequences among the collected command sequences, wherein said detecting comprises comparing the collected command sequences against a repository of historical data of valid command sequences pertaining to the distributed group of multiple devices within the network; generating an alert upon a deteimination that one of the collected command sequences does not match an entry in the repository; and performing one or more remedial actions based on the generated alert.Type: ApplicationFiled: January 13, 2016Publication date: July 13, 2017Inventors: Shalini Kapoor, Palanivel Kodeswaran, Amit A. Nanavati, Sayandeep Sen