Patents by Inventor Cheranellore Vasudevan
Cheranellore Vasudevan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230315834Abstract: Authenticating access to a system through the following operations: (i) determining at least one digital twin corresponding to a user; (ii) setting, by the user, modifications to at least one digital twin; (iii) generating, by the digital twin, a value based on the modifications; (iv) authenticating the user based on the generated value matching a stored value; and (v) based on the authentication, granting access to the system. A digital twin of a complex entity can have innumerable states based on the input values. In some embodiments, a new password can make an effect on a selected digital twin with one input or a sequence of inputs. The resulting state is transformed using a hashing algorithm to generate the final password, which is known only to the service provider, can act as a password.Type: ApplicationFiled: March 30, 2022Publication date: October 5, 2023Inventors: Devang Dineshchandra PATEL, Sagar Krupa Satya KUNAVARAPU, Apparsamy PERUMAL, Jian WU, Cheranellore VASUDEVAN
-
Patent number: 11757892Abstract: A method for a story fill authentication process includes, responsive to receiving a first authentication request to authenticate a user, displaying a first generated story with one or more obfuscated portions, where the first generated story is based on event data associated with a first previously captured event and additional data utilized to enrich the event data for the first previously captured event. The method also includes, responsive to determining text provided for the one or more obfuscated portions of the first generated story at least meets a comparison threshold level to a first complete generated story based on a semantic comparison, granting the user access to a resource associated with the first authentication request.Type: GrantFiled: November 3, 2020Date of Patent: September 12, 2023Assignee: International Business Machines CorporationInventors: Swaminathan Balasubramanian, Peeyush Jaiswal, Cheranellore Vasudevan, Priyansh Jaiswal, Sibasis Das
-
Publication number: 20230196369Abstract: A computer-implemented method, system and computer program product for identifying suspicious behavior. Requests to provide digital identification (ID) document(s) to a computing device of a verifier by a computing device of a consumer based on a validation context are detected. Responses to such requests are also detected in which the computing device of the consumer provides digital ID document(s) to the computing device of the verifier. A score is then generated corresponding to a likelihood of fraud in the transaction involving the consumer and the verifier using an artificial intelligence model based on the validation context, the digital ID document(s) requested to be provided by the computing device of the consumer and the digital ID document(s) provided to the computing device of the verifier. The computing device of the verifier may then be informed that there is evidence of fraud based on a value of the score.Type: ApplicationFiled: December 20, 2021Publication date: June 22, 2023Inventors: Jason Malinowski, Swaminathan Balasubramanian, Cheranellore Vasudevan, Genevieve van den Boer, Thomas G. Lawless, III, Gordan G. Greenlee
-
Publication number: 20230191821Abstract: A computer-implemented method, system and computer program product for verifying a user meets identification (ID) requirements for an associated activity or event. A request for a set of digital ID documents to be provided to the computing device of the verifier by the computing device of the device holder is detected. A response to the request is then detected which provides only a subset of the requested digital ID documents. Alternative digital ID document(s) are then identified to replace the digital ID document(s) that were requested but not provided by the device holder. An instruction is then issued to the computing device of the verifier to request one or more of the identified alternative digital ID documents from the computing device of the device holder in order to complete the verification process in determining if the device holder meets the ID requirements for an associated activity or event.Type: ApplicationFiled: December 20, 2021Publication date: June 22, 2023Inventors: Swaminathan Balasubramanian, Jason Malinowski, Cheranellore Vasudevan, Thomas G. Lawless, III, Genevieve van den Boer, Gordan G. Greenlee
-
Patent number: 11677736Abstract: In an approach to transient identification generation, one or more computer processors receive a request for one or more identification artifacts associated with a user from a requesting entity. One or more computer processors determine a first set of identification artifacts. One or more computer processors transmit the first set of identification artifacts to the requesting entity. One or more computer processors determine whether the first set of identification artifacts is an approved response to the request for the one or more identification artifacts. In response to determining the first set of identification artifacts is the approved response to the request for the one or more identification artifacts, one or more computer processors generate a transient identification that includes the first set of identification artifacts. One or more computer processors transmit the transient identification to the requesting entity.Type: GrantFiled: March 25, 2021Date of Patent: June 13, 2023Assignee: International Business Machines CorporationInventors: Swaminathan Balasubramanian, Thomas G. Lawless, III, Jason Malinowski, Genevieve van den Boer, Cheranellore Vasudevan
-
Patent number: 11676179Abstract: A client device can receive, from a data processing system, first data, the first data selected by the data processing system based on second data generated by at least one IoT device with which the client device is associated, and the first data indicating at least one advertisement. The client device can access the at least one advertisement using the first data indicating the at least one advertisement. The client device can add the at least one advertisement to the content accessed by the client device. The client device can present the content with the at least one advertisement added to the content.Type: GrantFiled: December 14, 2020Date of Patent: June 13, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Swaminathan Balasubramanian, Mamnoon Jamil, Jian Wu, Radha Mohan De, Cheranellore Vasudevan
-
Publication number: 20230090269Abstract: A method, computer system, and a computer program product for historical image search is provided. The present invention may include receiving an image search criteria. The present invention may also include generating a composite image search query based on the received image search criteria. The present invention may further include searching for a matching historical image based on the generated composite image search query. The present invention may also include returning a historical image search result.Type: ApplicationFiled: September 22, 2021Publication date: March 23, 2023Inventors: CHERANELLORE VASUDEVAN, Swaminathan Balasubramanian, SIBASIS DAS, Radha Mohan De
-
Publication number: 20230093468Abstract: Embodiments of the invention are directed to a computer-implemented method of performing an electronic search. The computer-implemented method includes receiving, using a processor, a composite electronic image including a plurality of electronically identifiable objects, wherein the composite electronic image is associated with a user. The processor is used to segment the composite electronic image into sub-images by providing at least one of the sub-images for each of the plurality of electronically identifiable objects. For each of the sub-images, the processor is used to perform personalized sub-image search operations. The personalized sub-image search operations include selecting a sub-image-to-be-searched from among the sub-images; associating the sub-image-to-be-searched with personalized metadata of the user; and searching, based at least in part on the personalized metadata of the user, a database to return a set of search images.Type: ApplicationFiled: September 20, 2021Publication date: March 23, 2023Inventors: Swaminathan Balasubramanian, Radha Mohan De, Mamnoon Jamil, Jian Wu, Cheranellore Vasudevan
-
Publication number: 20220398382Abstract: A computer-implemented method for learning unknown concepts during natural language processing is disclosed, including identifying a sentence associated with an unknown concept, selecting a first sequential set of sentences from a first document, including the sentence associated with the unknown concept, one sentence prior, and subsequent to the sentence associated with the unknown concept, selecting a second sequential set of sentences from a second document, including a sentence associated with a known concept, and one sentence prior and subsequent to the sentence associated with the known concept, comparing concepts associated with the first sequential set of sentences and second sequential set of sentences, determining whether an inference can be made between the unknown concept associated with the sentence from the first document and the sentence associated with the known concept associated with the sentence from the second document, and tagging the unknown concept associated with the known concept.Type: ApplicationFiled: June 9, 2021Publication date: December 15, 2022Inventors: MAULANA BACHTIAR, Thi Thanh Thao Lai, Wen Rui Siow, Yida Lee, Ronny Syarif, Cheranellore Vasudevan
-
Patent number: 11521728Abstract: Embodiments for scheduling the delivery of multiple medications to a patient by a processor. Any interactions between the multiple medications or between one of the multiple medications and a type of food are considered to construct an analytical model to identify an optimized schedule for delivery of the multiple medications to the patient. The optimized schedule is adjusted in real time as additional information concerning the multiple medications and the type of food are introduced, and delivered to a dispensing device associated with the one of the multiple medications.Type: GrantFiled: June 25, 2019Date of Patent: December 6, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Derek P. Bagwell, Swaminathan Balasubramanian, Mamnoon Jamil, Cheranellore Vasudevan
-
Publication number: 20220384009Abstract: Embodiments for scheduling the delivery of multiple medications to a patient by a processor. Any interactions between the multiple medications or between one of the multiple medications and a type of food are considered to construct an analytical model to identify an optimized schedule for delivery of the multiple medications to the patient. The optimized schedule is adjusted in real time as additional information concerning the multiple medications and the type of food are introduced, and delivered to a dispensing device associated with the one of the multiple medications.Type: ApplicationFiled: June 25, 2019Publication date: December 1, 2022Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Derek P. BAGWELL, Swaminathan BALASUBRAMANIAN, Mamnoon JAMIL, Cheranellore VASUDEVAN
-
Patent number: 11496503Abstract: A method for event data fencing includes initializing a media monitoring algorithm, wherein the media monitoring algorithm scans for one or more words relating to a data breach in publicly available reports. Responsive to identifying a report from the publicly available reports relating to a vulnerability associated with the data breach, the method determines whether the vulnerability is associated with event data utilized for an authentication process. Responsive to determining the vulnerability is associated with a portion of the event data utilized for the authentication process, the method fences the portion of event data associated with the vulnerability, wherein fencing prevents the portion of event data from being utilized in the authentication process.Type: GrantFiled: May 17, 2019Date of Patent: November 8, 2022Assignee: International Business Machines CorporationInventors: Cheranellore Vasudevan, Swaminathan Balasubramanian, Sibasis Das, Priyansh Jaiswal, Peeyush Jaiswal
-
Publication number: 20220311758Abstract: In an approach to transient identification generation, one or more computer processors receive a request for one or more identification artifacts associated with a user from a requesting entity. One or more computer processors determine a first set of identification artifacts. One or more computer processors transmit the first set of identification artifacts to the requesting entity. One or more computer processors determine whether the first set of identification artifacts is an approved response to the request for the one or more identification artifacts. In response to determining the first set of identification artifacts is the approved response to the request for the one or more identification artifacts, one or more computer processors generate a transient identification that includes the first set of identification artifacts. One or more computer processors transmit the transient identification to the requesting entity.Type: ApplicationFiled: March 25, 2021Publication date: September 29, 2022Inventors: Swaminathan Balasubramanian, Thomas G. Lawless, III, Jason Malinowski, Genevieve van den Boer, CHERANELLORE VASUDEVAN
-
Publication number: 20220191659Abstract: A tool for inter-vehicle communication. The tool determines whether contextual data and journey information for a user justifies a notification. Responsive to a determination that the contextual data and the journey information justifies the notification, the tool generates the notification. The tool generates a trust score for the notification. The tool determines one or more vehicles located within a pre-defined proximity of the user. The tool transmits the notification and the trust score to the one or more vehicles located within the pre-defined proximity of the user.Type: ApplicationFiled: December 16, 2020Publication date: June 16, 2022Inventors: Jason Malinowski, Cheranellore Vasudevan, Swaminathan Balasubramanian, Thomas G. Lawless, III
-
Publication number: 20220188871Abstract: A client device can receive, from a data processing system, first data, the first data selected by the data processing system based on second data generated by at least one IoT device with which the client device is associated, and the first data indicating at least one advertisement. The client device can access the at least one advertisement using the first data indicating the at least one advertisement. The client device can add the at least one advertisement to the content accessed by the client device. The client device can present the content with the at least one advertisement added to the content.Type: ApplicationFiled: December 14, 2020Publication date: June 16, 2022Inventors: Swaminathan Balasubramanian, Mamnoon Jamil, Jian Wu, Radha Mohan De, Cheranellore Vasudevan
-
Patent number: 11363434Abstract: A tool for inter-vehicle communication. The tool determines whether contextual data and journey information for a user justifies a notification. Responsive to a determination that the contextual data and the journey information justifies the notification, the tool generates the notification. The tool generates a trust score for the notification. The tool determines one or more vehicles located within a pre-defined proximity of the user. The tool transmits the notification and the trust score to the one or more vehicles located within the pre-defined proximity of the user.Type: GrantFiled: December 16, 2020Date of Patent: June 14, 2022Assignee: International Business Machines CorporationInventors: Jason Malinowski, Cheranellore Vasudevan, Swaminathan Balasubramanian, Thomas G. Lawless, III
-
Publication number: 20220141229Abstract: A method for a story fill authentication process includes, responsive to receiving a first authentication request to authenticate a user, displaying a first generated story with one or more obfuscated portions, where the first generated story is based on event data associated with a first previously captured event and additional data utilized to enrich the event data for the first previously captured event. The method also includes, responsive to determining text provided for the one or more obfuscated portions of the first generated story at least meets a comparison threshold level to a first complete generated story based on a semantic comparison, granting the user access to a resource associated with the first authentication request.Type: ApplicationFiled: November 3, 2020Publication date: May 5, 2022Inventors: Swaminathan Balasubramanian, Peeyush Jaiswal, CHERANELLORE VASUDEVAN, Priyansh Jaiswal, SIBASIS DAS
-
Patent number: 11296886Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.Type: GrantFiled: April 5, 2019Date of Patent: April 5, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
-
Patent number: 11228578Abstract: A method for a two-factor authentication process includes, responsive to determining a first user authentication was prompted in a first application on a first device associated with a user, identifying a second application on a second device based on a user profile associated with the user. The method identifies a first event from a plurality of events that previously occurred in the second application in a select time frame, wherein the first event relates to a first action performed by the user in the second application. The method generates an authentication question based on the first event, wherein the authentication question is a second user authentication. Responsive to determining an answer provided by the user to the authentication question is correct, the method grants access to the first user authentication prompt.Type: GrantFiled: May 17, 2019Date of Patent: January 18, 2022Assignee: International Business Machines CorporationInventors: Cheranellore Vasudevan, Swaminathan Balasubramanian, Sibasis Das, Priyansh Jaiswal, Peeyush Jaiswal
-
Patent number: 11106870Abstract: Embodiments for intelligent text enhancement in an Internet of Things (IoT) computing environment by a processor. One or more contextual factors relating to text data in a communication may be interpreted to identify a mood/sentiment of the user prior to the user sending the communication to one or more persons using one of a plurality of applications. A text font matching the one or more contextual factors may be suggested in the communication.Type: GrantFiled: August 28, 2018Date of Patent: August 31, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julia Jankowski, Taylor Presley, Kaleigh E. Williams, Elizabeth C. Huntley, Cheranellore Vasudevan