Patents by Inventor Amol A. Dhondse
Amol A. Dhondse has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11165881Abstract: An approach includes a system implemented in a computer infrastructure including a processor. The approach further includes the processor configured to receive dimensionally aware linkages. The approach further includes the processor configured to retrieve aggregated data from a data set. The approach further includes the processor configured to identify at least one affinity cluster related to the dimensionally aware linkages in at least two dimensions and the retrieved aggregated data by performing at least one lookup linkage which matches at least one dimension of the at least two dimensions of the dimensionally aware linkages with the retrieved aggregated data. The approach further includes the processor configured to provide personalized content to a user having same or similar user preferences as the received dimensionally aware linkages based on the identified at least one affinity cluster.Type: GrantFiled: May 13, 2019Date of Patent: November 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Faried Abrahams, Amol A. Dhondse, Kerrie L. Holley, Anand Pikle, Gandhi Sivakumar, Lennox E. Thomas
-
Patent number: 11095621Abstract: An approach for securing sensitive information in communication data is provided. In an embodiment, communication data is received from an ongoing communication (e.g., phone conversation, exchange of text messages, etc.) between a user and at least one other person. Contextual input is derived based on the content of the communication data and historical data from one or more external sources. A sensitivity index score for each element (e.g., portion) of the communication data is derived based on an assessment of the contextual input. The elements of the communication data having a sensitivity index score greater than a predefined threshold value are deemed to be security sensitive and, therefore, are encoded prior to transmission to its intended recipient.Type: GrantFiled: September 18, 2018Date of Patent: August 17, 2021Assignee: International Business Machines CorporationInventors: Gandhi Sivakumar, Anand Pikle, Amol A. Dhondse, Laura Rusu
-
Patent number: 11030544Abstract: A mapping is constructed between a node of a cultural hierarchy and a node of an organizational hierarchy. The cultural hierarchy is a data structure representing an arrangement of characteristics of different social levels relative to one another in a culture. The organizational hierarchy is a data structure representing an arrangement of characteristics of different roles of people relative to one another in a group. A set of cultural attributes is constructed to represent a persona of a human user according to mapping. Using a cultural attribute, an adjustment rule is selected from a library. A machine output is modified according to the adjustment rule. The machine output is in response to a dialog between a data processing system and human user in a machine-human interaction. The adjusted output is transformed and presented as a response to the human user in the machine-human interaction.Type: GrantFiled: July 31, 2018Date of Patent: June 8, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Faried Abrahams, Amol A. Dhondse, Raman Harishankar, Anand Pikle, Gandhi Sivakumar
-
Patent number: 10885590Abstract: Approaches presented herein enable automatically fulfilling an obligation under a smart contract. A block is added to a blockchain ledger in response to an event that triggers the obligation. The block includes data related to the event. Inferences related to the event are derived based on an analysis of event data and historical data incorporated in prior blocks in the blockchain ledger. Based on the inferences, a potential cause of the event is derived. Based on the potential cause, an interested stakeholder to the fulfilling of the obligation is identified. The interested stakeholder is added to a group that is allowed access to the blockchain ledger corresponding to the smart contract.Type: GrantFiled: April 4, 2018Date of Patent: January 5, 2021Assignee: International Business Machines CorporationInventors: Gandhi Sivakumar, Faried Abrahams, Krishnan K. Ramachandran, Anand Pikle, Amol A. Dhondse
-
Patent number: 10832315Abstract: A method for providing bidding support to a user during an auction using cognitive modeling comprises obtaining data associated with the auction, with the obtained data comprising data associated with at least one bidder. The obtained data is analyzed, and at least one output is generated based on the analysis. The at least one output is sent to at least one device associated with the user. The at least one device is configured to generate at least one alert based on the at least one output, with the at least one alert providing decision support to the user with respect to bidding strategy.Type: GrantFiled: January 4, 2017Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Amol A. Dhondse, Anand Pikle, Laura I. Rusu, Gandhi Sivakumar
-
Patent number: 10606951Abstract: Approaches presented herein enable optimizing resource allocation to a bid request response based on a cognitive analysis of natural language artifacts. More specifically, a bid request and a plurality of supporting artifacts in a natural language are obtained. A cognitive analysis of the request and supporting artifacts is performed to extract a set of information entities. The extracted information entities are normalized using a lexical-relations based graph database to classify the set of extracted information entities as standardized concepts. A subset of the set of the standardized concepts is identified as a set of parameters corresponding to a set of predetermined variables. Each variable of the set of predetermined variables is weighted according to a likelihood that the variable indicates a relevance of a resource. A probability that a particular resource is relevant is determined based on the weighting and that resource is assigned to the bid request response.Type: GrantFiled: April 17, 2018Date of Patent: March 31, 2020Assignee: International Business Machines CorporationInventors: Faried Abrahams, Rashida A. Hodge, Gandhi Sivakumar, Amol A. Dhondse, Anand Pikle
-
Publication number: 20200092265Abstract: An approach for securing sensitive information in communication data is provided. In an embodiment, communication data is received from an ongoing communication (e.g., phone conversation, exchange of text messages, etc.) between a user and at least one other person. Contextual input is derived based on the content of the communication data and historical data from one or more external sources. A sensitivity index score for each element (e.g., portion) of the communication data is derived based on an assessment of the contextual input. The elements of the communication data having a sensitivity index score greater than a predefined threshold value are deemed to be security sensitive and, therefore, are encoded prior to transmission to its intended recipient.Type: ApplicationFiled: September 18, 2018Publication date: March 19, 2020Inventors: Gandhi Sivakumar, Anand Pikle, Amol A. Dhondse, Laura Rusu
-
Patent number: 10460102Abstract: A security control system for a kinematic robot uses a cognitive assessment agent to map proposed instructions to either legitimate or illegitimate actions based on contextual variables. The agent computes a security anomaly index score representing a variance of a likely kinematic action of the robot compared to acceptable actions. If the score exceeds a predetermined threshold, a security alert is generated for the robot's administrator. The contextual variables include a user profile, a user location, and subject matter of the kinematic actions. The analysis compares input text to predefined classification metadata, and can also compare verbal phrases or body gestures to corresponding baselines. Different numeric weights can be applied to the contextual variables. The computing begins with a default value for the score and thereafter increments or decrements the score based on the weights. The weights can be adjusted based on a supervisory appraisal of the computed score.Type: GrantFiled: November 2, 2017Date of Patent: October 29, 2019Assignee: International Business Machines CorporationInventors: Amol A. Dhondse, Anand Pikle, Gandhi Sivakumar
-
Patent number: 10452842Abstract: A security control system for a kinematic robot uses a cognitive assessment agent to map proposed instructions to either legitimate or illegitimate actions based on contextual variables. The agent computes a security anomaly index score representing a variance of a likely kinematic action of the robot compared to acceptable actions. If the score exceeds a predetermined threshold, a security alert is generated for the robot's administrator. The contextual variables include a user profile, a user location, and subject matter of the kinematic actions. The analysis compares input text to predefined classification metadata, and can also compare verbal phrases or body gestures to corresponding baselines. Different numeric weights can be applied to the contextual variables. The computing begins with a default value for the score and thereafter increments or decrements the score based on the weights. The weights can be adjusted based on a supervisory appraisal of the computed score.Type: GrantFiled: June 7, 2017Date of Patent: October 22, 2019Assignee: International Business Machines CorporationInventors: Amol A. Dhondse, Anand Pikle, Gandhi Sivakumar
-
Publication number: 20190317991Abstract: Approaches presented herein enable optimizing resource allocation to a bid request response based on a cognitive analysis of natural language artifacts. More specifically, a bid request and a plurality of supporting artifacts in a natural language are obtained. A cognitive analysis of the request and supporting artifacts is performed to extract a set of information entities. The extracted information entities are normalized using a lexical-relations based graph database to classify the set of extracted information entities as standardized concepts. A subset of the set of the standardized concepts is identified as a set of parameters corresponding to a set of predetermined variables. Each variable of the set of predetermined variables is weighted according to a likelihood that the variable indicates a relevance of a resource. A probability that a particular resource is relevant is determined based on the weighting and that resource is assigned to the bid request response.Type: ApplicationFiled: April 17, 2018Publication date: October 17, 2019Inventors: Faried Abrahams, Rashida A. Hodge, Gandhi Sivakumar, Amol A. Dhondse, Anand Pikle
-
Publication number: 20190311437Abstract: Approaches presented herein enable automatically fulfilling an obligation under a smart contract. A block is added to a blockchain ledger in response to an event that triggers the obligation. The block includes data related to the event. Inferences related to the event are derived based on an analysis of event data and historical data incorporated in prior blocks in the blockchain ledger. Based on the inferences, a potential cause of the event is derived. Based on the potential cause, an interested stakeholder to the fulfilling of the obligation is identified. The interested stakeholder is added to a group that is allowed access to the blockchain ledger corresponding to the smart contract.Type: ApplicationFiled: April 4, 2018Publication date: October 10, 2019Inventors: Gandhi Sivakumar, Faried Abrahams, Krishnan K. Ramachandran, Anand Pikle, Amol A. Dhondse
-
Patent number: 10341459Abstract: An approach includes a system implemented in a computer infrastructure including a processor. The approach further includes the processor configured to receive dimensionally aware linkages. The approach further includes the processor configured to retrieve aggregated data from a data set. The approach further includes the processor configured to identify at least one affinity cluster related to the dimensionally aware linkages in at least two dimensions and the retrieved aggregated data by performing at least one lookup linkage which matches at least one dimension of the at least two dimensions of the dimensionally aware linkages with the retrieved aggregated data. The approach further includes the processor configured to provide personalized content to a user having same or similar user preferences as the received dimensionally aware linkages based on the identified at least one affinity cluster.Type: GrantFiled: September 18, 2015Date of Patent: July 2, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Faried Abrahams, Amol A. Dhondse, Kerrie L. Holley, Anand Pikle, Gandhi Sivakumar, Lennox E. Thomas
-
Patent number: 10334103Abstract: Approaches presented herein enable managing an incoming communication on a communication device from a communication channel. Specifically, the incoming communication is received and analyzed to determine, based on a context of the incoming communication, a situational pattern from among a plurality of situational pattern models. Based on the determined situational pattern, a criticality level is identified. One or more prompts from among a plurality of prompts are transmitted to a wearable device based on the criticality level for display to provide notification to a user of the criticality of the incoming communication.Type: GrantFiled: January 25, 2017Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: Faried Abrahams, Amol A. Dhondse, Anand Pikle, Gandhi Sivakumar, Susan L. Sylvia
-
Patent number: 10248711Abstract: A method and associated systems for a multidimensional information repository for managing dynamic time-sensitive and space-sensitive user profiles. A profile-management system receives an incoming event that identifies a user profile and is associated with a location, a time period, and a subject. The system searches the repository for records that identify the profile, location, time period, and subject and creates any such records that do not already exist. The system then creates time-sensitive and space-sensitive linkages that link the user profile record to the location, time-period, and subject records. The system dynamically updates these linkages in response to changes to the user profile and uses the linkages to assign context to queries submitted to a main database. In another embodiment, the system recommends additional linkages based on patterns identified in the newly created linkages.Type: GrantFiled: January 27, 2015Date of Patent: April 2, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Faried Abrahams, Amol A. Dhondse, Anand Pikle, Gandhi Sivakumar, Lennox E. Thomas
-
Publication number: 20180357414Abstract: A security control system for a kinematic robot uses a cognitive assessment agent to map proposed instructions to either legitimate or illegitimate actions based on contextual variables. The agent computes a security anomaly index score representing a variance of a likely kinematic action of the robot compared to acceptable actions. If the score exceeds a predetermined threshold, a security alert is generated for the robot's administrator. The contextual variables include a user profile, a user location, and subject matter of the kinematic actions. The analysis compares input text to predefined classification metadata, and can also compare verbal phrases or body gestures to corresponding baselines. Different numeric weights can be applied to the contextual variables. The computing begins with a default value for the score and thereafter increments or decrements the score based on the weights. The weights can be adjusted based on a supervisory appraisal of the computed score.Type: ApplicationFiled: June 7, 2017Publication date: December 13, 2018Inventors: Amol A. Dhondse, Anand Pikle, Gandhi Sivakumar
-
Publication number: 20180357415Abstract: A security control system for a kinematic robot uses a cognitive assessment agent to map proposed instructions to either legitimate or illegitimate actions based on contextual variables. The agent computes a security anomaly index score representing a variance of a likely kinematic action of the robot compared to acceptable actions. If the score exceeds a predetermined threshold, a security alert is generated for the robot's administrator. The contextual variables include a user profile, a user location, and subject matter of the kinematic actions. The analysis compares input text to predefined classification metadata, and can also compare verbal phrases or body gestures to corresponding baselines. Different numeric weights can be applied to the contextual variables. The computing begins with a default value for the score and thereafter increments or decrements the score based on the weights. The weights can be adjusted based on a supervisory appraisal of the computed score.Type: ApplicationFiled: November 2, 2017Publication date: December 13, 2018Inventors: Amol A. Dhondse, Anand Pikle, Gandhi Sivakumar
-
Publication number: 20180341655Abstract: A mapping is constructed between a node of a cultural hierarchy and a node of an organizational hierarchy. The cultural hierarchy is a data structure representing an arrangement of characteristics of different social levels relative to one another in a culture. The organizational hierarchy is a data structure representing an arrangement of characteristics of different roles of people relative to one another in a group. A set of cultural attributes is constructed to represent a persona of a human user according to mapping. Using a cultural attribute, an adjustment rule is selected from a library. A machine output is modified according to the adjustment rule. The machine output is in response to a dialog between a data processing system and human user in a machine-human interaction. The adjusted output is transformed and presented as a response to the human user in the machine-human interaction.Type: ApplicationFiled: July 31, 2018Publication date: November 29, 2018Applicant: International Business Machines CorporationInventors: Faried Abrahams, Amol A. Dhondse, Raman Harishankar, Anand Pikle, Gandhi Sivakumar
-
Patent number: 10114968Abstract: Embodiments include method, systems and computer program products for proximity based content security. Aspects include receiving a request to access a secured data by a user device; accessing, by a processor, a security profile for the secured data; obtaining environmental data from one or more sensors related to the user device, wherein a type of the one or more sensors is determined by the security profile; and providing access to the secured data based upon a determination that the environmental data is in compliance with the security profile.Type: GrantFiled: February 19, 2016Date of Patent: October 30, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Amol A. Dhondse, Anand Pikle, Laura I. Rusu, Gandhi Sivakumar
-
Patent number: 10083215Abstract: A model-based approach for transforming data. A modeling framework that includes a plurality of rules for performing transformations of data is developed. A data unit is configured. The data unit is assigned to a job that includes one or more rules of the plurality of rules. The job transforms the data unit from a data format of a source system into a data format of a destination system. Usage statistics for at least one rule of the job are monitored. An aggregate rule is determined based on a first atomic rule and a second atomic rule. The first atomic rule and the second atomic rule are identified by at least one, or in part by a common pattern. A first rule of the job is identified based on the usage statistics of a plurality of data units. The first rule is removed from memory.Type: GrantFiled: April 6, 2015Date of Patent: September 25, 2018Assignee: International Business Machines CorporationInventors: Dale K. Davis Jones, Amol A. Dhondse, Anand Pikle, Gandhi Sivakumar
-
Publication number: 20180268305Abstract: The factual accuracy of an event is verified. Event data is received by a computer, whereby the event data includes actor data related to at least one actor involved in the event and location data related to a location of the event. A factual scenario is created based on the event data. A cognitive reasoning and analysis of the event data is performed to derive inferences regarding the event and a time-sequenced series of inferences is composed based on the cognitive reasoning and analysis of the event data. Integrity of the event data is validated by comparing a data points from different sources and at least one flag is prompted when an instance of factual inconsistency is identified by the step of validating the integrity. A rendering of the event is generated based on the factual scenario and the time-sequenced series of inferences.Type: ApplicationFiled: March 20, 2017Publication date: September 20, 2018Inventors: Amol A. Dhondse, Anand Pikle, Stephen J. Price, Krishnan K. Ramachandran, Gandhi Sivakumar