Patents by Inventor Amitava Mukherjee

Amitava Mukherjee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10084551
    Abstract: A method for molecular communication within a nanonetwork. The method includes the steps of: (i) providing a nanonetwork communication system including a transmitter, a receiver, and a physical channel layer, the physical channel layer including a medium configured to allow a communication molecule to be transmitted from the transmitter to the receiver; (ii) transmitting, via the physical channel layer, the communication molecule from the transmitter in a plurality of bursts, wherein information is encoded in the concentration of the communication molecule; (iii) receiving the communication molecule by the receiver; and (iv) varying at least one of the plurality of bursts, wherein varying the plurality of bursts modulates the information transmitted by the communication molecule.
    Type: Grant
    Filed: February 23, 2017
    Date of Patent: September 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sushovan Das, Soumallya Chatterjee, Amitava Mukherjee, Mrinal K. Naskar
  • Publication number: 20180241481
    Abstract: A method for molecular communication within a nanonetwork. The method includes the steps of: (i) providing a nanonetwork communication system including a transmitter, a receiver, and a physical channel layer, the physical channel layer including a medium configured to allow a communication molecule to be transmitted from the transmitter to the receiver; (ii) transmitting, via the physical channel layer, the communication molecule from the transmitter in a plurality of bursts, wherein information is encoded in the concentration of the communication molecule; (iii) receiving the communication molecule by the receiver; and (iv) varying at least one of the plurality of bursts, wherein varying the plurality of bursts modulates the information transmitted by the communication molecule.
    Type: Application
    Filed: February 23, 2017
    Publication date: August 23, 2018
    Inventors: Sushovan Das, Soumallya Chatterjee, Amitava Mukherjee, Mrinal K. Naskar
  • Patent number: 9477701
    Abstract: A method and associated systems for generic data compression. A mobile device receives realtime data from a medical-monitoring device, such as a heart monitor, worn by a patient. The invention compresses and encodes this data into ASCII text characters, which are transmitted via a commonly available low-bandwidth text-messaging service, such as the SMS service supported by most cell phones. The text messages are received by a second mobile device, which decodes the text characters into their original form and displays them to a healthcare practitioner. More critical portions of the data are encoded by a high-precision lossless compression mechanism. In some embodiments, the two mobile devices may be cell phones and the second device may have the ability to interpret the decoded information in order to determine whether to directly or indirectly alert the practitioner or other parties of an exceptional condition detected by the medical monitor.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: October 25, 2016
    Assignee: International Business Machines Corporation
    Inventors: Tanmoy Kundu, Kaushik Lahiri, Avirup Mandal, Amitava Mukherjee, Mrinal K. Naskar, Sandipan Sinha
  • Patent number: 9357472
    Abstract: A method of routing data in a wireless sensor network, a program product and a wireless sensor network. The method, includes: (a) detecting a temporal event by a source sensor node of a wireless sensor network comprising a multiplicity of sensor nodes; (b) identifying multiple paths from the source sensor node to a sink of the wireless sensor network, the multiple paths consisting of sensor node to sensor node hops; and after (b), (c) using a processor of the source sensor node, optimizing a distribution of data packets to each path of the multiple paths by simultaneously reducing (i) power consumed by sensor nodes in each path of the multiple paths and (ii) a time to transmit the data packets from the source sensor node to the sink.
    Type: Grant
    Filed: June 26, 2013
    Date of Patent: May 31, 2016
    Assignee: International Business Machines Corporation
    Inventor: Amitava Mukherjee
  • Publication number: 20150040220
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Application
    Filed: October 16, 2014
    Publication date: February 5, 2015
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
  • Publication number: 20150003309
    Abstract: A method of routing data in a wireless sensor network, a program product and a wireless sensor network. The method, includes: (a) detecting a temporal event by a source sensor node of a wireless sensor network comprising a multiplicity of sensor nodes; (b) identifying multiple paths from the source sensor node to a sink of the wireless sensor network, the multiple paths consisting of sensor node to sensor node hops; and after (b), (c) using a processor of the source sensor node, optimizing a distribution of data packets to each path of the multiple paths by simultaneously reducing (i) power consumed by sensor nodes in each path of the multiple paths and (ii) a time to transmit the data packets from the source sensor node to the sink.
    Type: Application
    Filed: June 26, 2013
    Publication date: January 1, 2015
    Inventor: Amitava Mukherjee
  • Publication number: 20140173731
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Application
    Filed: February 3, 2014
    Publication date: June 19, 2014
    Applicant: RedShift InterNetworking, Inc.
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
  • Patent number: 8730946
    Abstract: A system and method to precisely learn and enforce security rules for Unified Communication (UC) applications and endpoints is disclosed. According to one embodiment, a behavioral learning system learns and abstracts positive flow behaviors of UC applications and endpoints. The properties of previously received messages from the endpoints and learned behaviors of the plurality of endpoints are stored in a database. A message from a endpoint is received by a message scanner and correlated with the AOR records in the database. The message is classified into one of a whitelist, a blacklist, and a graylist based on the results of analysis by the analysis engine. The whitelist contains the AOR records that are legitimate, the blacklist contains the AOR records that are a potential attack, and the graylist contains the AOR records that belong to neither the whitelist nor the blacklist.
    Type: Grant
    Filed: October 20, 2008
    Date of Patent: May 20, 2014
    Assignee: Redshift Internetworking, Inc.
    Inventors: Srinivas Mantripragada, Amitava Mukherjee
  • Patent number: 8644703
    Abstract: An optimal resource utilization method and system is disclosed. The method includes monitoring an optical network comprising optical cross connect (OXC) nodes comprising regenerators and connected by links. Communication paths each comprising a group of OXC nodes connected by links of said links are selected. Routing demands, working communication paths, and protection communication paths are selected. A computer processor assigns successive links a wave length and allocates regenerators to multiple successive links. The computer processor positions a first group of the regenerators along the working communication paths and positioning a second group of regenerators along the protection communication paths.
    Type: Grant
    Filed: February 22, 2011
    Date of Patent: February 4, 2014
    Assignee: International Business Machines Corporation
    Inventor: Amitava Mukherjee
  • Patent number: 8514760
    Abstract: A method of routing data in a wireless sensor network, a program product and a wireless sensor network. The method, includes: (a) detecting a temporal event by a source sensor node of a wireless sensor network comprising a multiplicity of sensor nodes; (b) identifying multiple paths from the source sensor node to a sink of the wireless sensor network, the multiple paths consisting of sensor node to sensor node hops; and after (b), (c) using a processor of the source sensor node, optimizing a distribution of data packets to each path of the multiple paths by simultaneously reducing (i) power consumed by sensor nodes in each path of the multiple paths and (ii) a time to transmit the data packets from the source sensor node to the sink.
    Type: Grant
    Filed: April 27, 2010
    Date of Patent: August 20, 2013
    Assignee: International Business Machiness Corporation
    Inventor: Amitava Mukherjee
  • Publication number: 20120246103
    Abstract: A method and system for detecting a spam over internet telephony (SPIT) is disclosed. Incoming call requests are received and analyzed using heuristic algorithms. A runtime action is provided based on the analysis using the heuristic algorithms. The heuristic algorithms include zero-touch heuristic algorithms that require no human intervention, one-touch heuristic algorithms that require human intervention one time, and multi-touch heuristic algorithms that require human intervention more than one time. Cumulative probability is calculated for each incoming call request, and the incoming call request is classified as a spam if the cumulative probability exceeds a threshold.
    Type: Application
    Filed: April 17, 2012
    Publication date: September 27, 2012
    Inventors: SRINIVAS MANTRIPRAGADA, Amitava Mukherjee, Rickard Per-Olof Sjöberg
  • Publication number: 20120213516
    Abstract: An optimal resource utilization method and system is disclosed. The method includes monitoring an optical network comprising optical cross connect (OXC) nodes comprising regenerators and connected by links. Communication paths each comprising a group of OXC nodes connected by links of said links are selected. Routing demands, working communication paths, and protection communication paths are selected. A computer processor assigns successive links a wave length and allocates regenerators to multiple successive links. The computer processor positions a first group of the regenerators along the working communication paths and positioning a second group of regenerators along the protection communication paths.
    Type: Application
    Filed: February 22, 2011
    Publication date: August 23, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Amitava Mukherjee
  • Publication number: 20120204261
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Application
    Filed: April 16, 2012
    Publication date: August 9, 2012
    Inventors: SRINIVAS MANTRIPRAGADA, Amitava MUKHERJEE, Barry BOMZER
  • Patent number: 8176001
    Abstract: A method and system for detecting a spam over internet telephony (SPIT) is disclosed. Incoming call requests are received and analyzed using heuristic algorithms. A runtime action is provided based on the analysis using the heuristic algorithms. The heuristic algorithms include zero-touch heuristic algorithms that require no human intervention, one-touch heuristic algorithms that require human intervention one time, and multi-touch heuristic algorithms that require human intervention more than one time. Cumulative probability is calculated for each incoming call request, and the incoming call request is classified as a spam if the cumulative probability exceeds a threshold.
    Type: Grant
    Filed: October 20, 2008
    Date of Patent: May 8, 2012
    Assignee: RedShift InterNetworking, Inc.
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Rickard Per-Olof Sjöberg
  • Patent number: 8161540
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Grant
    Filed: July 28, 2008
    Date of Patent: April 17, 2012
    Assignee: RedShift InterNetworking, Inc.
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
  • Publication number: 20110261738
    Abstract: A method of routing data in a wireless sensor network, a program product and a wireless sensor network. The method, includes: (a) detecting a temporal event by a source sensor node of a wireless sensor network comprising a multiplicity of sensor nodes; (b) identifying multiple paths from the source sensor node to a sink of the wireless sensor network, the multiple paths consisting of sensor node to sensor node hops; and after (b), (c) using a processor of the source sensor node, optimizing a distribution of data packets to each path of the multiple paths by simultaneously reducing (i) power consumed by sensor nodes in each path of the multiple paths and (ii) a time to transmit the data packets from the source sensor node to the sink.
    Type: Application
    Filed: April 27, 2010
    Publication date: October 27, 2011
    Applicant: International Business Machines Corporation
    Inventor: Amitava Mukherjee
  • Publication number: 20090106318
    Abstract: A method and system for detecting a spam over internet telephony (SPIT) is disclosed. Incoming call requests are received and analyzed using heuristic algorithms. A runtime action is provided based on the analysis using the heuristic algorithms. The heuristic algorithms include zero-touch heuristic algorithms that require no human intervention, one-touch heuristic algorithms that require human intervention one time, and multi-touch heuristic algorithms that require human intervention more than one time. Cumulative probability is calculated for each incoming call request, and the incoming call request is classified as a spam if the cumulative probability exceeds a threshold.
    Type: Application
    Filed: October 20, 2008
    Publication date: April 23, 2009
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Rickard Per-Olof Sjoberg
  • Publication number: 20090103524
    Abstract: A system and method to precisely learn and enforce security rules for Unified Communication (UC) applications and endpoints is disclosed. According to one embodiment, a behavioral learning system learns and abstracts positive flow behaviors of UC applications and endpoints. The properties of previously received messages from the endpoints and learned behaviors of the plurality of endpoints are stored in a database. A message from a endpoint is received by a message scanner and correlated with the AOR records in the database. The message is classified into one of a whitelist, a blacklist, and a graylist based on the results of analysis by the analysis engine. The whitelist contains the AOR records that are legitimate, the blacklist contains the AOR records that are a potential attack, and the graylist contains the AOR records that belong to neither the whitelist nor the blacklist.
    Type: Application
    Filed: October 20, 2008
    Publication date: April 23, 2009
    Inventors: Srinivas Mantripragada, Amitava Mukherjee
  • Publication number: 20090028135
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Application
    Filed: July 28, 2008
    Publication date: January 29, 2009
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
  • Patent number: 5193110
    Abstract: An integrated services platform for a telephone communication system includes a plurality of application processing ports for providing different types of information services through the telephone communication system. A master control unit and a high speed digital switch control processing of incoming phone calls to recognize the type of service being requested by a subscriber and non-subscriber, and route the call to the appropriate application processing port which is capable of providing the requested service. Application processing ports can be provided to implement a number of information services including videotex, voice, speech synthesis, E-mail, facsimile store and forward, speech recognition, telex, residential call answering, business voice messaging, home shopping, classified advertising, trucking dispatch, doctor's register and automated attendant. In this manner, a centrally located services platform can be provided to provide a number of different types of service to the user.
    Type: Grant
    Filed: October 9, 1990
    Date of Patent: March 9, 1993
    Assignee: Boston Technology, Incorporated
    Inventors: Scott A. Jones, Allen T. Arumainayagam, Amitava Mukherjee, Donald F. Picard, Richard E. Cohen