Patents by Inventor Amitava Mukherjee
Amitava Mukherjee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10084551Abstract: A method for molecular communication within a nanonetwork. The method includes the steps of: (i) providing a nanonetwork communication system including a transmitter, a receiver, and a physical channel layer, the physical channel layer including a medium configured to allow a communication molecule to be transmitted from the transmitter to the receiver; (ii) transmitting, via the physical channel layer, the communication molecule from the transmitter in a plurality of bursts, wherein information is encoded in the concentration of the communication molecule; (iii) receiving the communication molecule by the receiver; and (iv) varying at least one of the plurality of bursts, wherein varying the plurality of bursts modulates the information transmitted by the communication molecule.Type: GrantFiled: February 23, 2017Date of Patent: September 25, 2018Assignee: International Business Machines CorporationInventors: Sushovan Das, Soumallya Chatterjee, Amitava Mukherjee, Mrinal K. Naskar
-
Publication number: 20180241481Abstract: A method for molecular communication within a nanonetwork. The method includes the steps of: (i) providing a nanonetwork communication system including a transmitter, a receiver, and a physical channel layer, the physical channel layer including a medium configured to allow a communication molecule to be transmitted from the transmitter to the receiver; (ii) transmitting, via the physical channel layer, the communication molecule from the transmitter in a plurality of bursts, wherein information is encoded in the concentration of the communication molecule; (iii) receiving the communication molecule by the receiver; and (iv) varying at least one of the plurality of bursts, wherein varying the plurality of bursts modulates the information transmitted by the communication molecule.Type: ApplicationFiled: February 23, 2017Publication date: August 23, 2018Inventors: Sushovan Das, Soumallya Chatterjee, Amitava Mukherjee, Mrinal K. Naskar
-
Patent number: 9477701Abstract: A method and associated systems for generic data compression. A mobile device receives realtime data from a medical-monitoring device, such as a heart monitor, worn by a patient. The invention compresses and encodes this data into ASCII text characters, which are transmitted via a commonly available low-bandwidth text-messaging service, such as the SMS service supported by most cell phones. The text messages are received by a second mobile device, which decodes the text characters into their original form and displays them to a healthcare practitioner. More critical portions of the data are encoded by a high-precision lossless compression mechanism. In some embodiments, the two mobile devices may be cell phones and the second device may have the ability to interpret the decoded information in order to determine whether to directly or indirectly alert the practitioner or other parties of an exceptional condition detected by the medical monitor.Type: GrantFiled: November 30, 2015Date of Patent: October 25, 2016Assignee: International Business Machines CorporationInventors: Tanmoy Kundu, Kaushik Lahiri, Avirup Mandal, Amitava Mukherjee, Mrinal K. Naskar, Sandipan Sinha
-
Patent number: 9357472Abstract: A method of routing data in a wireless sensor network, a program product and a wireless sensor network. The method, includes: (a) detecting a temporal event by a source sensor node of a wireless sensor network comprising a multiplicity of sensor nodes; (b) identifying multiple paths from the source sensor node to a sink of the wireless sensor network, the multiple paths consisting of sensor node to sensor node hops; and after (b), (c) using a processor of the source sensor node, optimizing a distribution of data packets to each path of the multiple paths by simultaneously reducing (i) power consumed by sensor nodes in each path of the multiple paths and (ii) a time to transmit the data packets from the source sensor node to the sink.Type: GrantFiled: June 26, 2013Date of Patent: May 31, 2016Assignee: International Business Machines CorporationInventor: Amitava Mukherjee
-
Publication number: 20150040220Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.Type: ApplicationFiled: October 16, 2014Publication date: February 5, 2015Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
-
Publication number: 20150003309Abstract: A method of routing data in a wireless sensor network, a program product and a wireless sensor network. The method, includes: (a) detecting a temporal event by a source sensor node of a wireless sensor network comprising a multiplicity of sensor nodes; (b) identifying multiple paths from the source sensor node to a sink of the wireless sensor network, the multiple paths consisting of sensor node to sensor node hops; and after (b), (c) using a processor of the source sensor node, optimizing a distribution of data packets to each path of the multiple paths by simultaneously reducing (i) power consumed by sensor nodes in each path of the multiple paths and (ii) a time to transmit the data packets from the source sensor node to the sink.Type: ApplicationFiled: June 26, 2013Publication date: January 1, 2015Inventor: Amitava Mukherjee
-
Publication number: 20140173731Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.Type: ApplicationFiled: February 3, 2014Publication date: June 19, 2014Applicant: RedShift InterNetworking, Inc.Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
-
Patent number: 8730946Abstract: A system and method to precisely learn and enforce security rules for Unified Communication (UC) applications and endpoints is disclosed. According to one embodiment, a behavioral learning system learns and abstracts positive flow behaviors of UC applications and endpoints. The properties of previously received messages from the endpoints and learned behaviors of the plurality of endpoints are stored in a database. A message from a endpoint is received by a message scanner and correlated with the AOR records in the database. The message is classified into one of a whitelist, a blacklist, and a graylist based on the results of analysis by the analysis engine. The whitelist contains the AOR records that are legitimate, the blacklist contains the AOR records that are a potential attack, and the graylist contains the AOR records that belong to neither the whitelist nor the blacklist.Type: GrantFiled: October 20, 2008Date of Patent: May 20, 2014Assignee: Redshift Internetworking, Inc.Inventors: Srinivas Mantripragada, Amitava Mukherjee
-
Patent number: 8644703Abstract: An optimal resource utilization method and system is disclosed. The method includes monitoring an optical network comprising optical cross connect (OXC) nodes comprising regenerators and connected by links. Communication paths each comprising a group of OXC nodes connected by links of said links are selected. Routing demands, working communication paths, and protection communication paths are selected. A computer processor assigns successive links a wave length and allocates regenerators to multiple successive links. The computer processor positions a first group of the regenerators along the working communication paths and positioning a second group of regenerators along the protection communication paths.Type: GrantFiled: February 22, 2011Date of Patent: February 4, 2014Assignee: International Business Machines CorporationInventor: Amitava Mukherjee
-
Patent number: 8514760Abstract: A method of routing data in a wireless sensor network, a program product and a wireless sensor network. The method, includes: (a) detecting a temporal event by a source sensor node of a wireless sensor network comprising a multiplicity of sensor nodes; (b) identifying multiple paths from the source sensor node to a sink of the wireless sensor network, the multiple paths consisting of sensor node to sensor node hops; and after (b), (c) using a processor of the source sensor node, optimizing a distribution of data packets to each path of the multiple paths by simultaneously reducing (i) power consumed by sensor nodes in each path of the multiple paths and (ii) a time to transmit the data packets from the source sensor node to the sink.Type: GrantFiled: April 27, 2010Date of Patent: August 20, 2013Assignee: International Business Machiness CorporationInventor: Amitava Mukherjee
-
Publication number: 20120246103Abstract: A method and system for detecting a spam over internet telephony (SPIT) is disclosed. Incoming call requests are received and analyzed using heuristic algorithms. A runtime action is provided based on the analysis using the heuristic algorithms. The heuristic algorithms include zero-touch heuristic algorithms that require no human intervention, one-touch heuristic algorithms that require human intervention one time, and multi-touch heuristic algorithms that require human intervention more than one time. Cumulative probability is calculated for each incoming call request, and the incoming call request is classified as a spam if the cumulative probability exceeds a threshold.Type: ApplicationFiled: April 17, 2012Publication date: September 27, 2012Inventors: SRINIVAS MANTRIPRAGADA, Amitava Mukherjee, Rickard Per-Olof Sjöberg
-
Publication number: 20120213516Abstract: An optimal resource utilization method and system is disclosed. The method includes monitoring an optical network comprising optical cross connect (OXC) nodes comprising regenerators and connected by links. Communication paths each comprising a group of OXC nodes connected by links of said links are selected. Routing demands, working communication paths, and protection communication paths are selected. A computer processor assigns successive links a wave length and allocates regenerators to multiple successive links. The computer processor positions a first group of the regenerators along the working communication paths and positioning a second group of regenerators along the protection communication paths.Type: ApplicationFiled: February 22, 2011Publication date: August 23, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Amitava Mukherjee
-
Publication number: 20120204261Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.Type: ApplicationFiled: April 16, 2012Publication date: August 9, 2012Inventors: SRINIVAS MANTRIPRAGADA, Amitava MUKHERJEE, Barry BOMZER
-
Patent number: 8176001Abstract: A method and system for detecting a spam over internet telephony (SPIT) is disclosed. Incoming call requests are received and analyzed using heuristic algorithms. A runtime action is provided based on the analysis using the heuristic algorithms. The heuristic algorithms include zero-touch heuristic algorithms that require no human intervention, one-touch heuristic algorithms that require human intervention one time, and multi-touch heuristic algorithms that require human intervention more than one time. Cumulative probability is calculated for each incoming call request, and the incoming call request is classified as a spam if the cumulative probability exceeds a threshold.Type: GrantFiled: October 20, 2008Date of Patent: May 8, 2012Assignee: RedShift InterNetworking, Inc.Inventors: Srinivas Mantripragada, Amitava Mukherjee, Rickard Per-Olof Sjöberg
-
Patent number: 8161540Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.Type: GrantFiled: July 28, 2008Date of Patent: April 17, 2012Assignee: RedShift InterNetworking, Inc.Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
-
Publication number: 20110261738Abstract: A method of routing data in a wireless sensor network, a program product and a wireless sensor network. The method, includes: (a) detecting a temporal event by a source sensor node of a wireless sensor network comprising a multiplicity of sensor nodes; (b) identifying multiple paths from the source sensor node to a sink of the wireless sensor network, the multiple paths consisting of sensor node to sensor node hops; and after (b), (c) using a processor of the source sensor node, optimizing a distribution of data packets to each path of the multiple paths by simultaneously reducing (i) power consumed by sensor nodes in each path of the multiple paths and (ii) a time to transmit the data packets from the source sensor node to the sink.Type: ApplicationFiled: April 27, 2010Publication date: October 27, 2011Applicant: International Business Machines CorporationInventor: Amitava Mukherjee
-
Publication number: 20090106318Abstract: A method and system for detecting a spam over internet telephony (SPIT) is disclosed. Incoming call requests are received and analyzed using heuristic algorithms. A runtime action is provided based on the analysis using the heuristic algorithms. The heuristic algorithms include zero-touch heuristic algorithms that require no human intervention, one-touch heuristic algorithms that require human intervention one time, and multi-touch heuristic algorithms that require human intervention more than one time. Cumulative probability is calculated for each incoming call request, and the incoming call request is classified as a spam if the cumulative probability exceeds a threshold.Type: ApplicationFiled: October 20, 2008Publication date: April 23, 2009Inventors: Srinivas Mantripragada, Amitava Mukherjee, Rickard Per-Olof Sjoberg
-
Publication number: 20090103524Abstract: A system and method to precisely learn and enforce security rules for Unified Communication (UC) applications and endpoints is disclosed. According to one embodiment, a behavioral learning system learns and abstracts positive flow behaviors of UC applications and endpoints. The properties of previously received messages from the endpoints and learned behaviors of the plurality of endpoints are stored in a database. A message from a endpoint is received by a message scanner and correlated with the AOR records in the database. The message is classified into one of a whitelist, a blacklist, and a graylist based on the results of analysis by the analysis engine. The whitelist contains the AOR records that are legitimate, the blacklist contains the AOR records that are a potential attack, and the graylist contains the AOR records that belong to neither the whitelist nor the blacklist.Type: ApplicationFiled: October 20, 2008Publication date: April 23, 2009Inventors: Srinivas Mantripragada, Amitava Mukherjee
-
Publication number: 20090028135Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.Type: ApplicationFiled: July 28, 2008Publication date: January 29, 2009Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
-
Patent number: 5193110Abstract: An integrated services platform for a telephone communication system includes a plurality of application processing ports for providing different types of information services through the telephone communication system. A master control unit and a high speed digital switch control processing of incoming phone calls to recognize the type of service being requested by a subscriber and non-subscriber, and route the call to the appropriate application processing port which is capable of providing the requested service. Application processing ports can be provided to implement a number of information services including videotex, voice, speech synthesis, E-mail, facsimile store and forward, speech recognition, telex, residential call answering, business voice messaging, home shopping, classified advertising, trucking dispatch, doctor's register and automated attendant. In this manner, a centrally located services platform can be provided to provide a number of different types of service to the user.Type: GrantFiled: October 9, 1990Date of Patent: March 9, 1993Assignee: Boston Technology, IncorporatedInventors: Scott A. Jones, Allen T. Arumainayagam, Amitava Mukherjee, Donald F. Picard, Richard E. Cohen