Patents by Inventor Arvind Sathi
Arvind Sathi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10609559Abstract: A mobile hub can receive from a mobile device a selection of a first user profile from a listing of a plurality of user profiles of a user of the mobile device that are stored on the mobile hub. Responsive to receiving the selection of the first user profile, a first of a plurality of mobile networks indicated in the first user profile as being available to the user can be identified. The first mobile network can satisfy at least a first user specified criterion associated with the first user profile. A subscriber authentication associated with the user profile can be selected. The subscriber authentication can be configured to authenticate the user with the first of the plurality of mobile networks and configured to be processed by the first mobile device to automatically establish presence on the first mobile network. The subscriber authentication can be communicated to the mobile device.Type: GrantFiled: March 29, 2019Date of Patent: March 31, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susan J. Christian, Alan D. Emery, Arvind Sathi, Fernando M. Siqueira, Mathews Thomas
-
Publication number: 20190230509Abstract: A mobile hub can receive from a mobile device a selection of a first user profile from a listing of a plurality of user profiles of a user of the mobile device that are stored on the mobile hub. Responsive to receiving the selection of the first user profile, a first of a plurality of mobile networks indicated in the first user profile as being available to the user can be identified. The first mobile network can satisfy at least a first user specified criterion associated with the first user profile. A subscriber authentication associated with the user profile can be selected. The subscriber authentication can be configured to authenticate the user with the first of the plurality of mobile networks and configured to be processed by the first mobile device to automatically establish presence on the first mobile network. The subscriber authentication can be communicated to the mobile device.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Inventors: Susan J. Christian, Alan D. Emery, Arvind Sathi, Fernando M. Siqueira, Mathews Thomas
-
Patent number: 10285057Abstract: A mobile hub can receive from a mobile device a request to authenticate a user of the mobile device with the mobile hub. Responsive to receiving the request, a user profile of the user stored on the mobile hub can be identified. A first of a plurality of mobile networks indicated in the user profile as being available to the user can be identified. The first mobile network can satisfy at least one user specified criterion associated with the user profile. A subscriber authentication associated with the user profile can be selected. The subscriber authentication can be configured to authenticate the user with the first of the plurality of mobile networks and configured to be processed by the first mobile device to automatically establish presence on the first mobile network. The subscriber authentication can be communicated to the mobile device.Type: GrantFiled: July 18, 2018Date of Patent: May 7, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susan J. Christian, Alan D. Emery, Arvind Sathi, Fernando M. Siqueira, Mathews Thomas
-
Publication number: 20180324588Abstract: A mobile hub can receive from a mobile device a request to authenticate a user of the mobile device with the mobile hub. Responsive to receiving the request, a user profile of the user stored on the mobile hub can be identified. A first of a plurality of mobile networks indicated in the user profile as being available to the user can be identified. The first mobile network can satisfy at least one user specified criterion associated with the user profile. A subscriber authentication associated with the user profile can be selected. The subscriber authentication can be configured to authenticate the user with the first of the plurality of mobile networks and configured to be processed by the first mobile device to automatically establish presence on the first mobile network. The subscriber authentication can be communicated to the mobile device.Type: ApplicationFiled: July 18, 2018Publication date: November 8, 2018Inventors: Susan J. Christian, Alan D. Emery, Arvind Sathi, Fernando M. Siqueira, Mathews Thomas
-
Patent number: 10057771Abstract: A mobile hub can receive from a mobile device a request to authenticate a user of the mobile device with the mobile hub. Responsive to receiving the request, a user profile of the user can be identified. A first of a plurality of mobile networks indicated in the user profile as being available to the user can be identified. The first mobile network can satisfy at least one user specified criterion associated with the user profile. A subscriber authentication associated with the user profile can be selected. The subscriber authentication can be configured to authenticate the user with the first of the plurality of mobile networks and configured to be processed by the first mobile device to automatically establish presence on the first mobile network. The subscriber authentication can be communicated to the mobile device.Type: GrantFiled: May 23, 2017Date of Patent: August 21, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susan J. Christian, Alan D. Emery, Arvind Sathi, Fernando M. Siqueira, Mathews Thomas
-
Publication number: 20170257763Abstract: A mobile hub can receive from a mobile device a request to authenticate a user of the mobile device with the mobile hub. Responsive to receiving the request, a user profile of the user can be identified. A first of a plurality of mobile networks indicated in the user profile as being available to the user can be identified. The first mobile network can satisfy at least one user specified criterion associated with the user profile. A subscriber authentication associated with the user profile can be selected. The subscriber authentication can be configured to authenticate the user with the first of the plurality of mobile networks and configured to be processed by the first mobile device to automatically establish presence on the first mobile network. The subscriber authentication can be communicated to the mobile device.Type: ApplicationFiled: May 23, 2017Publication date: September 7, 2017Inventors: Susan J. Christian, Alan D. Emery, Arvind Sathi, Fernando M. Siqueira, Mathews Thomas
-
Patent number: 9693229Abstract: A mobile hub can receive from a mobile device a request to authenticate a user of the mobile device with the mobile hub. Responsive to receiving the request, a user profile of the user can be identified. A first of a plurality of mobile networks indicated in the user profile as being available to the user can be identified. The first mobile network can satisfy at least one user specified criterion associated with the user profile. A subscriber authentication associated with the user profile can be selected. The subscriber authentication can be configured to authenticate the user with the first of the plurality of mobile networks and configured to be processed by the first mobile device to automatically establish presence on the first mobile network. The subscriber authentication can be communicated to the mobile device.Type: GrantFiled: November 5, 2015Date of Patent: June 27, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susan J. Christian, Alan D. Emery, Arvind Sathi, Fernando M. Siqueira, Mathews Thomas
-
Publication number: 20170134944Abstract: A mobile hub can receive from a mobile device a request to authenticate a user of the mobile device with the mobile hub. Responsive to receiving the request, a user profile of the user can be identified. A first of a plurality of mobile networks indicated in the user profile as being available to the user can be identified. The first mobile network can satisfy at least one user specified criterion associated with the user profile. A subscriber authentication associated with the user profile can be selected. The subscriber authentication can be configured to authenticate the user with the first of the plurality of mobile networks and configured to be processed by the first mobile device to automatically establish presence on the first mobile network. The subscriber authentication can be communicated to the mobile device.Type: ApplicationFiled: November 5, 2015Publication date: May 11, 2017Inventors: Susan J. Christian, Alan D. Emery, Arvind Sathi, Fernando M. Siqueira, Mathews Thomas
-
Patent number: 9635507Abstract: A computing device generates profiles based on mobile device data. The computing device receives a plurality of mobile device records of a plurality of mobile devices in a region, that each include a timestamp, a location data, and an activity data, and assigns each of the plurality of mobile device records to one of a plurality of space-time boxes. The computing device performs analytics on the mobile device records assigned to the plurality of space-time boxes to yield a resulting plurality of profiles, which can include a mobility profile indicating the number of locations in the region that each mobile device occupies during a span, a hangout profile indicating the number of mobile devices that occupy each location in the region during a span, and a buddy profile indicating the mobile devices that occupy the same location in the region as a given mobile device.Type: GrantFiled: November 26, 2013Date of Patent: April 25, 2017Assignee: GLOBALFOUNDRIES INC.Inventors: Thomas J. Eunice, Christian E. Loza, Arvind Sathi, Mathews Thomas, Janki Y. Vora
-
Publication number: 20150148058Abstract: A computing device generates profiles based on mobile device data. The computing device receives a plurality of mobile device records of a plurality of mobile devices in a region, that each include a timestamp, a location data, and an activity data, and assigns each of the plurality of mobile device records to one of a plurality of space-time boxes. The computing device performs analytics on the mobile device records assigned to the plurality of space-time boxes to yield a resulting plurality of profiles, which can include a mobility profile indicating the number of locations in the region that each mobile device occupies during a span, a hangout profile indicating the number of mobile devices that occupy each location in the region during a span, and a buddy profile indicating the mobile devices that occupy the same location in the region as a given mobile device.Type: ApplicationFiled: November 26, 2013Publication date: May 28, 2015Applicant: International Business Machines CorporationInventors: Thomas J. Eunice, Christian E. Loza, Arvind Sathi, Mathews Thomas, Janki Y. Vora
-
Publication number: 20120272329Abstract: An approach for obfuscating sensitive data while preserving data usability is presented. The in-scope data files of an application are identified. The in-scope data files include sensitive data that must be masked to preserve its confidentiality. Data definitions are collected. Primary sensitive data fields are identified. Data names for the primary sensitive data fields are normalized. The primary sensitive data fields are classified according to sensitivity. Appropriate masking methods are selected from a pre-defined set to be applied to each data element based on rules exercised on the data. The data being masked is profiled to detect invalid data. Masking software is developed and input considerations are applied. The selected masking method is executed and operational and functional validation is performed.Type: ApplicationFiled: July 3, 2012Publication date: October 25, 2012Applicant: International Business Machines CorporationInventors: Garland Grammer, Shallin Joshi, William Kroeschel, Sudir Kumar, Arvind Sathi, Mahesh Viswanathan
-
Patent number: 7877398Abstract: A method and system of masking a group of related data values. A record in an unmasked data file of n records is read. The record includes a first set of data values of data elements included in a related data group (RDG) and one or more data values of one or more data elements external to the RDG. A random number k is received. A second set of data values is retrieved from a lookup table that associates n key values with n sets of data values. Retrieving the second set of data values includes identifying that the second set of data values is associated with a key value of k. The n sets of data values are included in the umnasked data file's n records. The record is masked by replacing the first set of data values with the retrieved second set of data values.Type: GrantFiled: November 19, 2007Date of Patent: January 25, 2011Assignee: International Business Machines CorporationInventors: William Kroeschel, Arvind Sathi, Mahesh Viswanathan
-
Publication number: 20090132575Abstract: A method and system of masking a group of related data values. A record in an unmasked data file of n records is read. The record includes a first set of data values of data elements included in a related data group (RDG) and one or more data values of one or more data elements external to the RDG. A random number k is received. A second set of data values is retrieved from a lookup table that associates n key values with n sets of data values. Retrieving the second set of data values includes identifying that the second set of data values is associated with a key value of k. The n sets of data values are included in the umnasked data file's n records. The record is masked by replacing the first set of data values with the retrieved second set of data values.Type: ApplicationFiled: November 19, 2007Publication date: May 21, 2009Inventors: William Kroeschel, Arvind Sathi, Mahesh Viswanathan
-
Publication number: 20090132419Abstract: A method and system for obfuscating sensitive data while preserving data usability. The in-scope data files of an application are identified. The in-scope data files include sensitive data that must be masked to preserve its confidentiality. Data definitions are collected. Primary sensitive data fields are identified. Data names for the primary sensitive data fields are normalized. The primary sensitive data fields are classified according to sensitivity. Appropriate masking methods are selected from a pre-defined set to be applied to each data element based on rules exercised on the data. The data being masked is profiled to detect invalid data. Masking software is developed and input considerations are applied. The selected masking method is executed and operational and functional validation is performed.Type: ApplicationFiled: November 15, 2007Publication date: May 21, 2009Inventors: Garland Grammer, Shallin Joshi, William Kroeschel, Sudir Kumar, Arvind Sathi, Mahesh Viswanathan