Patents by Inventor Cheranellore Vasudevan

Cheranellore Vasudevan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10169894
    Abstract: A sub-image of data of a first full image may be selected. The sub-image of data may at least partially obscure an object within the first full image. A request to replace the sub-image of data may be transmitted over a network. The request may include transmitting the full image and transmitting metadata associated with the first full image to one or more of a server computing device. The server computing device may analyze a history of images and select one or more images of the history of images that match one or more attributes of the metadata. The server computing device may replace the sub-image of data using the one or more images to generate at least a second full image that includes the object, wherein the object is not obscured. The second full image may be received over the network.
    Type: Grant
    Filed: October 6, 2016
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Patent number: 10169884
    Abstract: Embodiments for processing an image by a processor. The image may be analyzed for one or more identified image elements. An action to be performed by a device, interconnected in an Internet of Things (IoT) Network, may be associated based on the one or more identified image elements. One or more settings of the device may be preconfigured to perform the action.
    Type: Grant
    Filed: January 3, 2017
    Date of Patent: January 1, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Publication number: 20180357693
    Abstract: Systems and a method for transporting smart shopping bags are provided herein. The system includes a plurality of drones, each of which is operable to travel to a plurality of designated locations to search for smart shopping bags. The smart shopping bags are configured to store goods for transport and are operable to store and wirelessly communicate user preferences, information related to stored goods, and one or more destinations for the goods. Upon finding a smart shopping bag, each of the drones is operable to query the smart shopping bag to determine whether the smart shopping bag is suitable for pickup by the drone. If the smart shopping bag is suitable for pickup, each of the drones is operable to transport the smart shopping bag toward a first one of the one or more destinations.
    Type: Application
    Filed: June 7, 2017
    Publication date: December 13, 2018
    Inventors: Swaminathan BALASUBRAMANIAN, Radha M. DE, Ashley D. DELPORT, Indrajit PODDAR, Cheranellore VASUDEVAN
  • Publication number: 20180349582
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Application
    Filed: November 15, 2017
    Publication date: December 6, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20180349578
    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.
    Type: Application
    Filed: May 31, 2017
    Publication date: December 6, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20180332013
    Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.
    Type: Application
    Filed: May 15, 2017
    Publication date: November 15, 2018
    Applicant: International Business Machines Corporation
    Inventors: Eric V. Kline, Mark E. Maresh, Colm Nolan, Juan F. Vargas, Cheranellore Vasudevan, Michael J. Whitney
  • Publication number: 20180253762
    Abstract: Embodiments of the invention include method, systems and computer program products for selecting a service. Aspects include includes receiving, by a processor, customer data. External data is also received, wherein the external data includes social media posts associated with one or more services. Based at least in part on the social media posts, one or more patterns are determined for one or more services. Based at least in part on the customer data, a customer preference for a service environment is determined. A list of service recommendations is created based at least in part on the customer preferences and the one or more patterns.
    Type: Application
    Filed: March 3, 2017
    Publication date: September 6, 2018
    Inventors: Swaminathan Balasubramanian, Thomas G. Lawless, III, Jason R. Malinowski, Cheranellore Vasudevan
  • Patent number: 10057275
    Abstract: A processor-implemented method is provided. The method may include providing a content registry with at least one application program interface (API) to manage a plurality of entries stored in the content registry. The method may also include providing access to the plurality of entries by a pre-authorized search engine to the content registry in response to a search requested by an authorized requester.
    Type: Grant
    Filed: January 6, 2017
    Date of Patent: August 21, 2018
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Publication number: 20180225421
    Abstract: A method for providing destination guidance based on health risk information, includes receiving a destination request and searching, based on the request, to get a set of destination candidates. Susceptibility of the first user is identified based on retrieved health condition information of the first user. A second user from the plurality of second users that carries a communicable ailment is identified. Rules are applied to determine whether the communicable ailment represents a health risk to the susceptibility of the first user. When it is determined that the communicable ailment represents a health risk to the susceptibility of the first user, the set of destination candidates is filtered to remove candidates that would bring the first user into proximity with the second user that carries the communicable ailment.
    Type: Application
    Filed: February 8, 2017
    Publication date: August 9, 2018
    Inventors: SWAMINATHAN BALASUBRAMANIAN, THOMAS G. LAWLESS, III, JASON R. MALINOWSKI, CHERANELLORE VASUDEVAN
  • Patent number: 10032301
    Abstract: A sub-image of data of a first full image may be selected. The sub-image of data may at least partially obscure an object within the first full image. A request to replace the sub-image of data may be transmitted over a network. The request may include transmitting the full image and transmitting metadata associated with the first full image to one or more of a server computing device. The server computing device may analyze a history of images and select one or more images of the history of images that match one or more attributes of the metadata. The server computing device may replace the sub-image of data using the one or more images to generate at least a second full image that includes the object, wherein the object is not obscured. The second full image may be received over the network.
    Type: Grant
    Filed: February 12, 2018
    Date of Patent: July 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Patent number: 10032302
    Abstract: A sub-image of data of a first full image may be selected. The sub-image of data may at least partially obscure an object within the first full image. A request to replace the sub-image of data may be transmitted over a network. The request may include transmitting the full image and transmitting metadata associated with the first full image to one or more of a server computing device. The server computing device may analyze a history of images and select one or more images of the history of images that match one or more attributes of the metadata. The server computing device may replace the sub-image of data using the one or more images to generate at least a second full image that includes the object, wherein the object is not obscured. The second full image may be received over the network.
    Type: Grant
    Filed: February 12, 2018
    Date of Patent: July 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Publication number: 20180189743
    Abstract: Embodiments for intelligent scheduling management by a processor. One or more time slots are cognitively identified for scheduling a meeting according to a plurality of identified contextual factors, scheduling availability, an attendance confidence level assigned to each of the one or more users, and meeting topic and objective such that a user aggregation contribution score is provided for the one or more time slots. A meeting is scheduled during the one or more time slots for one or more users according to the user aggregation contribution score.
    Type: Application
    Filed: January 4, 2017
    Publication date: July 5, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Swaminathan BALASUBRAMANIAN, Sibasis DAS, Richard GORZELA, Peeyush JAISWAL, Priyansh JAISWAL, Asima SILVA, Jaime M. STOCKTON, Cheranellore VASUDEVAN
  • Publication number: 20180189970
    Abstract: Embodiments for processing an image by a processor. The image may be analyzed for one or more identified image elements. An action to be performed by a device, interconnected in an Internet of Things (IoT) Network, may be associated based on the one or more identified image elements. One or more settings of the device may be preconfigured to perform the action.
    Type: Application
    Filed: January 3, 2017
    Publication date: July 5, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Swaminathan BALASUBRAMANIAN, Radha M. DE, Ashley D. DELPORT, Indrajit PODDAR, Cheranellore VASUDEVAN
  • Publication number: 20180144529
    Abstract: A sub-image of data of a first full image may be selected. The sub-image of data may at least partially obscure an object within the first full image. A request to replace the sub-image of data may be transmitted over a network. The request may include transmitting the full image and transmitting metadata associated with the first full image to one or more of a server computing device. The server computing device may analyze a history of images and select one or more images of the history of images that match one or more attributes of the metadata. The server computing device may replace the sub-image of data using the one or more images to generate at least a second full image that includes the object, wherein the object is not obscured. The second full image may be received over the network.
    Type: Application
    Filed: February 12, 2018
    Publication date: May 24, 2018
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Publication number: 20180144528
    Abstract: A sub-image of data of a first full image may be selected. The sub-image of data may at least partially obscure an object within the first full image. A request to replace the sub-image of data may be transmitted over a network. The request may include transmitting the full image and transmitting metadata associated with the first full image to one or more of a server computing device. The server computing device may analyze a history of images and select one or more images of the history of images that match one or more attributes of the metadata. The server computing device may replace the sub-image of data using the one or more images to generate at least a second full image that includes the object, wherein the object is not obscured. The second full image may be received over the network.
    Type: Application
    Filed: February 12, 2018
    Publication date: May 24, 2018
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Publication number: 20180122120
    Abstract: A sub-image of data of a first full image may be selected. The sub-image of data may at least partially obscure an object within the first full image. A request to replace the sub-image of data may be transmitted over a network. The request may include transmitting the full image and transmitting metadata associated with the first full image to one or more of a server computing device. The server computing device may analyze a history of images and select one or more images of the history of images that match one or more attributes of the metadata. The server computing device may replace the sub-image of data using the one or more images to generate at least a second full image that includes the object, wherein the object is not obscured. The second full image may be received over the network.
    Type: Application
    Filed: December 27, 2017
    Publication date: May 3, 2018
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Publication number: 20180109549
    Abstract: A computer-implemented method includes: detecting, by a user device, an event that indicates a potential security compromise of the user device; determining, by the user device, a service accessible on the user device; sending, by the user device, a breach notification to a service provider corresponding to the service accessible on the user device; receiving, by the user device, a security profile from the service provider; and restricting, by the user device, access to the service provider by a client of the service provider on the user device until the security profile is satisfied by a user completing a security challenge defined in the security profile.
    Type: Application
    Filed: December 19, 2017
    Publication date: April 19, 2018
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Patent number: 9945672
    Abstract: A system for providing destination guidance based on tracked real-time ambient health conditions includes one or more location tracking devices carried by one or more participants. The one or more location tracking devices track the locations of the one or more participants and providing the tracked locations to a central server when it is determined that the one or more participants are infected by a communicable ailment. The central server receives the provided tracked locations and transmits the tracked locations to a navigation guidance device carried by a user, without transmitting identifying details about the one or more participants. The navigation guidance device carried by the user provides guidance to the user on selecting a destination or route that avoids contact with or exposure to the plurality of participants.
    Type: Grant
    Filed: June 7, 2016
    Date of Patent: April 17, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Swaminathan Balasubramanian, Thomas G. Lawless, III, Jason Richard Malinowski, Cheranellore Vasudevan
  • Publication number: 20180101971
    Abstract: A sub-image of data of a first full image may be selected. The sub-image of data may at least partially obscure an object within the first full image. A request to replace the sub-image of data may be transmitted over a network. The request may include transmitting the full image and transmitting metadata associated with the first full image to one or more of a server computing device. The server computing device may analyze a history of images and select one or more images of the history of images that match one or more attributes of the metadata. The server computing device may replace the sub-image of data using the one or more images to generate at least a second full image that includes the object, wherein the object is not obscured. The second full image may be received over the network.
    Type: Application
    Filed: October 6, 2016
    Publication date: April 12, 2018
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Patent number: 9940476
    Abstract: A method for selective exposure of document tags associated with a plurality of online search engine content based on a predetermined user criteria is provided. The method may include annotating a content tag associated with the plurality of search engine content with a plurality of metadata, whereby the plurality of metadata includes a text and an access control. The method may also include displaying a plurality of content based on the annotated content tag.
    Type: Grant
    Filed: June 11, 2015
    Date of Patent: April 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan