Patents by Inventor Cheranellore Vasudevan

Cheranellore Vasudevan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220398382
    Abstract: A computer-implemented method for learning unknown concepts during natural language processing is disclosed, including identifying a sentence associated with an unknown concept, selecting a first sequential set of sentences from a first document, including the sentence associated with the unknown concept, one sentence prior, and subsequent to the sentence associated with the unknown concept, selecting a second sequential set of sentences from a second document, including a sentence associated with a known concept, and one sentence prior and subsequent to the sentence associated with the known concept, comparing concepts associated with the first sequential set of sentences and second sequential set of sentences, determining whether an inference can be made between the unknown concept associated with the sentence from the first document and the sentence associated with the known concept associated with the sentence from the second document, and tagging the unknown concept associated with the known concept.
    Type: Application
    Filed: June 9, 2021
    Publication date: December 15, 2022
    Inventors: MAULANA BACHTIAR, Thi Thanh Thao Lai, Wen Rui Siow, Yida Lee, Ronny Syarif, Cheranellore Vasudevan
  • Patent number: 11521728
    Abstract: Embodiments for scheduling the delivery of multiple medications to a patient by a processor. Any interactions between the multiple medications or between one of the multiple medications and a type of food are considered to construct an analytical model to identify an optimized schedule for delivery of the multiple medications to the patient. The optimized schedule is adjusted in real time as additional information concerning the multiple medications and the type of food are introduced, and delivered to a dispensing device associated with the one of the multiple medications.
    Type: Grant
    Filed: June 25, 2019
    Date of Patent: December 6, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Derek P. Bagwell, Swaminathan Balasubramanian, Mamnoon Jamil, Cheranellore Vasudevan
  • Publication number: 20220384009
    Abstract: Embodiments for scheduling the delivery of multiple medications to a patient by a processor. Any interactions between the multiple medications or between one of the multiple medications and a type of food are considered to construct an analytical model to identify an optimized schedule for delivery of the multiple medications to the patient. The optimized schedule is adjusted in real time as additional information concerning the multiple medications and the type of food are introduced, and delivered to a dispensing device associated with the one of the multiple medications.
    Type: Application
    Filed: June 25, 2019
    Publication date: December 1, 2022
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Derek P. BAGWELL, Swaminathan BALASUBRAMANIAN, Mamnoon JAMIL, Cheranellore VASUDEVAN
  • Patent number: 11496503
    Abstract: A method for event data fencing includes initializing a media monitoring algorithm, wherein the media monitoring algorithm scans for one or more words relating to a data breach in publicly available reports. Responsive to identifying a report from the publicly available reports relating to a vulnerability associated with the data breach, the method determines whether the vulnerability is associated with event data utilized for an authentication process. Responsive to determining the vulnerability is associated with a portion of the event data utilized for the authentication process, the method fences the portion of event data associated with the vulnerability, wherein fencing prevents the portion of event data from being utilized in the authentication process.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: November 8, 2022
    Assignee: International Business Machines Corporation
    Inventors: Cheranellore Vasudevan, Swaminathan Balasubramanian, Sibasis Das, Priyansh Jaiswal, Peeyush Jaiswal
  • Publication number: 20220311758
    Abstract: In an approach to transient identification generation, one or more computer processors receive a request for one or more identification artifacts associated with a user from a requesting entity. One or more computer processors determine a first set of identification artifacts. One or more computer processors transmit the first set of identification artifacts to the requesting entity. One or more computer processors determine whether the first set of identification artifacts is an approved response to the request for the one or more identification artifacts. In response to determining the first set of identification artifacts is the approved response to the request for the one or more identification artifacts, one or more computer processors generate a transient identification that includes the first set of identification artifacts. One or more computer processors transmit the transient identification to the requesting entity.
    Type: Application
    Filed: March 25, 2021
    Publication date: September 29, 2022
    Inventors: Swaminathan Balasubramanian, Thomas G. Lawless, III, Jason Malinowski, Genevieve van den Boer, CHERANELLORE VASUDEVAN
  • Publication number: 20220188871
    Abstract: A client device can receive, from a data processing system, first data, the first data selected by the data processing system based on second data generated by at least one IoT device with which the client device is associated, and the first data indicating at least one advertisement. The client device can access the at least one advertisement using the first data indicating the at least one advertisement. The client device can add the at least one advertisement to the content accessed by the client device. The client device can present the content with the at least one advertisement added to the content.
    Type: Application
    Filed: December 14, 2020
    Publication date: June 16, 2022
    Inventors: Swaminathan Balasubramanian, Mamnoon Jamil, Jian Wu, Radha Mohan De, Cheranellore Vasudevan
  • Publication number: 20220191659
    Abstract: A tool for inter-vehicle communication. The tool determines whether contextual data and journey information for a user justifies a notification. Responsive to a determination that the contextual data and the journey information justifies the notification, the tool generates the notification. The tool generates a trust score for the notification. The tool determines one or more vehicles located within a pre-defined proximity of the user. The tool transmits the notification and the trust score to the one or more vehicles located within the pre-defined proximity of the user.
    Type: Application
    Filed: December 16, 2020
    Publication date: June 16, 2022
    Inventors: Jason Malinowski, Cheranellore Vasudevan, Swaminathan Balasubramanian, Thomas G. Lawless, III
  • Patent number: 11363434
    Abstract: A tool for inter-vehicle communication. The tool determines whether contextual data and journey information for a user justifies a notification. Responsive to a determination that the contextual data and the journey information justifies the notification, the tool generates the notification. The tool generates a trust score for the notification. The tool determines one or more vehicles located within a pre-defined proximity of the user. The tool transmits the notification and the trust score to the one or more vehicles located within the pre-defined proximity of the user.
    Type: Grant
    Filed: December 16, 2020
    Date of Patent: June 14, 2022
    Assignee: International Business Machines Corporation
    Inventors: Jason Malinowski, Cheranellore Vasudevan, Swaminathan Balasubramanian, Thomas G. Lawless, III
  • Publication number: 20220141229
    Abstract: A method for a story fill authentication process includes, responsive to receiving a first authentication request to authenticate a user, displaying a first generated story with one or more obfuscated portions, where the first generated story is based on event data associated with a first previously captured event and additional data utilized to enrich the event data for the first previously captured event. The method also includes, responsive to determining text provided for the one or more obfuscated portions of the first generated story at least meets a comparison threshold level to a first complete generated story based on a semantic comparison, granting the user access to a resource associated with the first authentication request.
    Type: Application
    Filed: November 3, 2020
    Publication date: May 5, 2022
    Inventors: Swaminathan Balasubramanian, Peeyush Jaiswal, CHERANELLORE VASUDEVAN, Priyansh Jaiswal, SIBASIS DAS
  • Patent number: 11296886
    Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.
    Type: Grant
    Filed: April 5, 2019
    Date of Patent: April 5, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Patent number: 11228578
    Abstract: A method for a two-factor authentication process includes, responsive to determining a first user authentication was prompted in a first application on a first device associated with a user, identifying a second application on a second device based on a user profile associated with the user. The method identifies a first event from a plurality of events that previously occurred in the second application in a select time frame, wherein the first event relates to a first action performed by the user in the second application. The method generates an authentication question based on the first event, wherein the authentication question is a second user authentication. Responsive to determining an answer provided by the user to the authentication question is correct, the method grants access to the first user authentication prompt.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: January 18, 2022
    Assignee: International Business Machines Corporation
    Inventors: Cheranellore Vasudevan, Swaminathan Balasubramanian, Sibasis Das, Priyansh Jaiswal, Peeyush Jaiswal
  • Patent number: 11106870
    Abstract: Embodiments for intelligent text enhancement in an Internet of Things (IoT) computing environment by a processor. One or more contextual factors relating to text data in a communication may be interpreted to identify a mood/sentiment of the user prior to the user sending the communication to one or more persons using one of a plurality of applications. A text font matching the one or more contextual factors may be suggested in the communication.
    Type: Grant
    Filed: August 28, 2018
    Date of Patent: August 31, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Julia Jankowski, Taylor Presley, Kaleigh E. Williams, Elizabeth C. Huntley, Cheranellore Vasudevan
  • Patent number: 11074939
    Abstract: Provided is a method for disambiguating an audio component extracted from audiovisual content. Audiovisual content is identified. The audiovisual content includes an audio component and a video component. An ambiguous expression is detected in the audio component. An object referenced by the ambiguous expression is identified in the video component. A verbal description of the object is generated. The verbal description is injected into the audio component to generate a modified audio component.
    Type: Grant
    Filed: April 21, 2020
    Date of Patent: July 27, 2021
    Assignee: International Business Machines Corporation
    Inventors: Jason Malinowski, Swaminathan Balasubramanian, Cheranellore Vasudevan, Thomas G. Lawless, III
  • Patent number: 11025634
    Abstract: Embodiments for enhancing privacy and security of an image by a processor. Metadata associated with the image is configured with a usage designation, the usage designation having accompanying notification information for notifying an owner of the usage designation if a condition of the usage designation is met.
    Type: Grant
    Filed: August 8, 2016
    Date of Patent: June 1, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Patent number: 11018887
    Abstract: An ambience adjustment method, system, and non-transitory computer readable medium, includes identifying an ambient condition in a user profile for a most similar first device to a second device and setting the ambient condition of the most similar first device as the ambient condition in the user profile of the second device.
    Type: Grant
    Filed: September 30, 2019
    Date of Patent: May 25, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Swaminathan Balasubramanian, Krisha Banerjee, Radha Mohan De, Ashley Dallas Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Patent number: 10958671
    Abstract: A computer-implemented method includes: detecting, by a user device, an event that indicates a potential security compromise of the user device; determining, by the user device, a service accessible on the user device; sending, by the user device, a breach notification to a service provider corresponding to the service accessible on the user device; receiving, by the user device, a security profile from the service provider; and restricting, by the user device, access to the service provider by a client of the service provider on the user device until the security profile is satisfied by a user completing a security challenge defined in the security profile.
    Type: Grant
    Filed: November 22, 2019
    Date of Patent: March 23, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Patent number: 10949512
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: March 16, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20200411153
    Abstract: Embodiments for scheduling the delivery of multiple medications to a patient by a processor. Any interactions between the multiple medications or between one of the multiple medications and a type of food are considered to construct an analytical model to identify an optimized schedule for delivery of the multiple medications to the patient. The optimized schedule is adjusted in real time as additional information concerning the multiple medications and the type of food are introduced, and delivered to a dispensing device associated with the one of the multiple medications.
    Type: Application
    Filed: June 25, 2019
    Publication date: December 31, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Derek P. BAGWELL, Swaminathan BALASUBRAMANIAN, Mamnoon JAMIL, Cheranellore VASUDEVAN
  • Publication number: 20200366665
    Abstract: A method for a two-factor authentication process includes, responsive to determining a first user authentication was prompted in a first application on a first device associated with a user, identifying a second application on a second device based on a user profile associated with the user. The method identifies a first event from a plurality of events that previously occurred in the second application in a select time frame, wherein the first event relates to a first action performed by the user in the second application. The method generates an authentication question based on the first event, wherein the authentication question is a second user authentication. Responsive to determining an answer provided by the user to the authentication question is correct, the method grants access to the first user authentication prompt.
    Type: Application
    Filed: May 17, 2019
    Publication date: November 19, 2020
    Inventors: CHERANELLORE VASUDEVAN, Swaminathan Balasubramanian, SIBASIS DAS, Priyansh Jaiswal, Peeyush Jaiswal
  • Publication number: 20200366704
    Abstract: A method for event data fencing includes initializing a media monitoring algorithm, wherein the media monitoring algorithm scans for one or more words relating to a data breach in publicly available reports. Responsive to identifying a report from the publicly available reports relating to a vulnerability associated with the data breach, the method determines whether the vulnerability is associated with event data utilized for an authentication process. Responsive to determining the vulnerability is associated with a portion of the event data utilized for the authentication process, the method fences the portion of event data associated with the vulnerability, wherein fencing prevents the portion of event data from being utilized in the authentication process.
    Type: Application
    Filed: May 17, 2019
    Publication date: November 19, 2020
    Inventors: CHERANELLORE VASUDEVAN, Swaminathan Balasubramanian, SIBASIS DAS, Priyansh Jaiswal, Peeyush Jaiswal