Patents by Inventor Cheranellore Vasudevan
Cheranellore Vasudevan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220398382Abstract: A computer-implemented method for learning unknown concepts during natural language processing is disclosed, including identifying a sentence associated with an unknown concept, selecting a first sequential set of sentences from a first document, including the sentence associated with the unknown concept, one sentence prior, and subsequent to the sentence associated with the unknown concept, selecting a second sequential set of sentences from a second document, including a sentence associated with a known concept, and one sentence prior and subsequent to the sentence associated with the known concept, comparing concepts associated with the first sequential set of sentences and second sequential set of sentences, determining whether an inference can be made between the unknown concept associated with the sentence from the first document and the sentence associated with the known concept associated with the sentence from the second document, and tagging the unknown concept associated with the known concept.Type: ApplicationFiled: June 9, 2021Publication date: December 15, 2022Inventors: MAULANA BACHTIAR, Thi Thanh Thao Lai, Wen Rui Siow, Yida Lee, Ronny Syarif, Cheranellore Vasudevan
-
Patent number: 11521728Abstract: Embodiments for scheduling the delivery of multiple medications to a patient by a processor. Any interactions between the multiple medications or between one of the multiple medications and a type of food are considered to construct an analytical model to identify an optimized schedule for delivery of the multiple medications to the patient. The optimized schedule is adjusted in real time as additional information concerning the multiple medications and the type of food are introduced, and delivered to a dispensing device associated with the one of the multiple medications.Type: GrantFiled: June 25, 2019Date of Patent: December 6, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Derek P. Bagwell, Swaminathan Balasubramanian, Mamnoon Jamil, Cheranellore Vasudevan
-
Publication number: 20220384009Abstract: Embodiments for scheduling the delivery of multiple medications to a patient by a processor. Any interactions between the multiple medications or between one of the multiple medications and a type of food are considered to construct an analytical model to identify an optimized schedule for delivery of the multiple medications to the patient. The optimized schedule is adjusted in real time as additional information concerning the multiple medications and the type of food are introduced, and delivered to a dispensing device associated with the one of the multiple medications.Type: ApplicationFiled: June 25, 2019Publication date: December 1, 2022Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Derek P. BAGWELL, Swaminathan BALASUBRAMANIAN, Mamnoon JAMIL, Cheranellore VASUDEVAN
-
Patent number: 11496503Abstract: A method for event data fencing includes initializing a media monitoring algorithm, wherein the media monitoring algorithm scans for one or more words relating to a data breach in publicly available reports. Responsive to identifying a report from the publicly available reports relating to a vulnerability associated with the data breach, the method determines whether the vulnerability is associated with event data utilized for an authentication process. Responsive to determining the vulnerability is associated with a portion of the event data utilized for the authentication process, the method fences the portion of event data associated with the vulnerability, wherein fencing prevents the portion of event data from being utilized in the authentication process.Type: GrantFiled: May 17, 2019Date of Patent: November 8, 2022Assignee: International Business Machines CorporationInventors: Cheranellore Vasudevan, Swaminathan Balasubramanian, Sibasis Das, Priyansh Jaiswal, Peeyush Jaiswal
-
Publication number: 20220311758Abstract: In an approach to transient identification generation, one or more computer processors receive a request for one or more identification artifacts associated with a user from a requesting entity. One or more computer processors determine a first set of identification artifacts. One or more computer processors transmit the first set of identification artifacts to the requesting entity. One or more computer processors determine whether the first set of identification artifacts is an approved response to the request for the one or more identification artifacts. In response to determining the first set of identification artifacts is the approved response to the request for the one or more identification artifacts, one or more computer processors generate a transient identification that includes the first set of identification artifacts. One or more computer processors transmit the transient identification to the requesting entity.Type: ApplicationFiled: March 25, 2021Publication date: September 29, 2022Inventors: Swaminathan Balasubramanian, Thomas G. Lawless, III, Jason Malinowski, Genevieve van den Boer, CHERANELLORE VASUDEVAN
-
Publication number: 20220188871Abstract: A client device can receive, from a data processing system, first data, the first data selected by the data processing system based on second data generated by at least one IoT device with which the client device is associated, and the first data indicating at least one advertisement. The client device can access the at least one advertisement using the first data indicating the at least one advertisement. The client device can add the at least one advertisement to the content accessed by the client device. The client device can present the content with the at least one advertisement added to the content.Type: ApplicationFiled: December 14, 2020Publication date: June 16, 2022Inventors: Swaminathan Balasubramanian, Mamnoon Jamil, Jian Wu, Radha Mohan De, Cheranellore Vasudevan
-
Publication number: 20220191659Abstract: A tool for inter-vehicle communication. The tool determines whether contextual data and journey information for a user justifies a notification. Responsive to a determination that the contextual data and the journey information justifies the notification, the tool generates the notification. The tool generates a trust score for the notification. The tool determines one or more vehicles located within a pre-defined proximity of the user. The tool transmits the notification and the trust score to the one or more vehicles located within the pre-defined proximity of the user.Type: ApplicationFiled: December 16, 2020Publication date: June 16, 2022Inventors: Jason Malinowski, Cheranellore Vasudevan, Swaminathan Balasubramanian, Thomas G. Lawless, III
-
Patent number: 11363434Abstract: A tool for inter-vehicle communication. The tool determines whether contextual data and journey information for a user justifies a notification. Responsive to a determination that the contextual data and the journey information justifies the notification, the tool generates the notification. The tool generates a trust score for the notification. The tool determines one or more vehicles located within a pre-defined proximity of the user. The tool transmits the notification and the trust score to the one or more vehicles located within the pre-defined proximity of the user.Type: GrantFiled: December 16, 2020Date of Patent: June 14, 2022Assignee: International Business Machines CorporationInventors: Jason Malinowski, Cheranellore Vasudevan, Swaminathan Balasubramanian, Thomas G. Lawless, III
-
Publication number: 20220141229Abstract: A method for a story fill authentication process includes, responsive to receiving a first authentication request to authenticate a user, displaying a first generated story with one or more obfuscated portions, where the first generated story is based on event data associated with a first previously captured event and additional data utilized to enrich the event data for the first previously captured event. The method also includes, responsive to determining text provided for the one or more obfuscated portions of the first generated story at least meets a comparison threshold level to a first complete generated story based on a semantic comparison, granting the user access to a resource associated with the first authentication request.Type: ApplicationFiled: November 3, 2020Publication date: May 5, 2022Inventors: Swaminathan Balasubramanian, Peeyush Jaiswal, CHERANELLORE VASUDEVAN, Priyansh Jaiswal, SIBASIS DAS
-
Patent number: 11296886Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.Type: GrantFiled: April 5, 2019Date of Patent: April 5, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
-
Patent number: 11228578Abstract: A method for a two-factor authentication process includes, responsive to determining a first user authentication was prompted in a first application on a first device associated with a user, identifying a second application on a second device based on a user profile associated with the user. The method identifies a first event from a plurality of events that previously occurred in the second application in a select time frame, wherein the first event relates to a first action performed by the user in the second application. The method generates an authentication question based on the first event, wherein the authentication question is a second user authentication. Responsive to determining an answer provided by the user to the authentication question is correct, the method grants access to the first user authentication prompt.Type: GrantFiled: May 17, 2019Date of Patent: January 18, 2022Assignee: International Business Machines CorporationInventors: Cheranellore Vasudevan, Swaminathan Balasubramanian, Sibasis Das, Priyansh Jaiswal, Peeyush Jaiswal
-
Patent number: 11106870Abstract: Embodiments for intelligent text enhancement in an Internet of Things (IoT) computing environment by a processor. One or more contextual factors relating to text data in a communication may be interpreted to identify a mood/sentiment of the user prior to the user sending the communication to one or more persons using one of a plurality of applications. A text font matching the one or more contextual factors may be suggested in the communication.Type: GrantFiled: August 28, 2018Date of Patent: August 31, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julia Jankowski, Taylor Presley, Kaleigh E. Williams, Elizabeth C. Huntley, Cheranellore Vasudevan
-
Patent number: 11074939Abstract: Provided is a method for disambiguating an audio component extracted from audiovisual content. Audiovisual content is identified. The audiovisual content includes an audio component and a video component. An ambiguous expression is detected in the audio component. An object referenced by the ambiguous expression is identified in the video component. A verbal description of the object is generated. The verbal description is injected into the audio component to generate a modified audio component.Type: GrantFiled: April 21, 2020Date of Patent: July 27, 2021Assignee: International Business Machines CorporationInventors: Jason Malinowski, Swaminathan Balasubramanian, Cheranellore Vasudevan, Thomas G. Lawless, III
-
Patent number: 11025634Abstract: Embodiments for enhancing privacy and security of an image by a processor. Metadata associated with the image is configured with a usage designation, the usage designation having accompanying notification information for notifying an owner of the usage designation if a condition of the usage designation is met.Type: GrantFiled: August 8, 2016Date of Patent: June 1, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
-
Patent number: 11018887Abstract: An ambience adjustment method, system, and non-transitory computer readable medium, includes identifying an ambient condition in a user profile for a most similar first device to a second device and setting the ambient condition of the most similar first device as the ambient condition in the user profile of the second device.Type: GrantFiled: September 30, 2019Date of Patent: May 25, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Swaminathan Balasubramanian, Krisha Banerjee, Radha Mohan De, Ashley Dallas Delport, Indrajit Poddar, Cheranellore Vasudevan
-
Patent number: 10958671Abstract: A computer-implemented method includes: detecting, by a user device, an event that indicates a potential security compromise of the user device; determining, by the user device, a service accessible on the user device; sending, by the user device, a breach notification to a service provider corresponding to the service accessible on the user device; receiving, by the user device, a security profile from the service provider; and restricting, by the user device, access to the service provider by a client of the service provider on the user device until the security profile is satisfied by a user completing a security challenge defined in the security profile.Type: GrantFiled: November 22, 2019Date of Patent: March 23, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
-
Patent number: 10949512Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.Type: GrantFiled: July 10, 2019Date of Patent: March 16, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
-
Publication number: 20200411153Abstract: Embodiments for scheduling the delivery of multiple medications to a patient by a processor. Any interactions between the multiple medications or between one of the multiple medications and a type of food are considered to construct an analytical model to identify an optimized schedule for delivery of the multiple medications to the patient. The optimized schedule is adjusted in real time as additional information concerning the multiple medications and the type of food are introduced, and delivered to a dispensing device associated with the one of the multiple medications.Type: ApplicationFiled: June 25, 2019Publication date: December 31, 2020Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Derek P. BAGWELL, Swaminathan BALASUBRAMANIAN, Mamnoon JAMIL, Cheranellore VASUDEVAN
-
Publication number: 20200366665Abstract: A method for a two-factor authentication process includes, responsive to determining a first user authentication was prompted in a first application on a first device associated with a user, identifying a second application on a second device based on a user profile associated with the user. The method identifies a first event from a plurality of events that previously occurred in the second application in a select time frame, wherein the first event relates to a first action performed by the user in the second application. The method generates an authentication question based on the first event, wherein the authentication question is a second user authentication. Responsive to determining an answer provided by the user to the authentication question is correct, the method grants access to the first user authentication prompt.Type: ApplicationFiled: May 17, 2019Publication date: November 19, 2020Inventors: CHERANELLORE VASUDEVAN, Swaminathan Balasubramanian, SIBASIS DAS, Priyansh Jaiswal, Peeyush Jaiswal
-
Publication number: 20200366704Abstract: A method for event data fencing includes initializing a media monitoring algorithm, wherein the media monitoring algorithm scans for one or more words relating to a data breach in publicly available reports. Responsive to identifying a report from the publicly available reports relating to a vulnerability associated with the data breach, the method determines whether the vulnerability is associated with event data utilized for an authentication process. Responsive to determining the vulnerability is associated with a portion of the event data utilized for the authentication process, the method fences the portion of event data associated with the vulnerability, wherein fencing prevents the portion of event data from being utilized in the authentication process.Type: ApplicationFiled: May 17, 2019Publication date: November 19, 2020Inventors: CHERANELLORE VASUDEVAN, Swaminathan Balasubramanian, SIBASIS DAS, Priyansh Jaiswal, Peeyush Jaiswal