Patents by Inventor Debasisha Padhi

Debasisha Padhi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240135348
    Abstract: A method is provided that includes configuring a cellular phone to function as a mobile debit card by installing an application for contactless interfacing with ATMs. The method supplements the application with a neural network (NN) based biometric verification process configured to reduce an incorrect user error value over time to increasingly harden the application to undesired intrusion. The NN based biometric verification process comprises: performing an initial face recognition; greeting the user with one of a plurality of questions in a specific language of the user and evaluating a pre-defined answer provided from the user in the specific language; and detecting, in an acoustic utterance having dialogue in support of an ATM session, a voice and a prosody style indicative of the user in combination with lip and face movements made by the user corresponding to and in synchronization with the acoustic utterance.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Inventors: Amol Bhaskar Mahamuni, Debasisha Padhi, Nidhi Patel
  • Patent number: 11770411
    Abstract: A method, system, and computer program product for prioritizing endpoints to be checked during a change window based on certain criteria. The method may include receiving a request for processing from a plurality of servers. The method may also include determining a priority for each server of the plurality of servers based on specified criteria, where the specified criteria includes at least compliance-check history. The method may also include determining whether each server belongs to one or more groups. The method may also include determining a notification order for the plurality of servers based on the priority and whether each server belongs to the one or more groups. The method may also include sending a notification to each server in the notification order.
    Type: Grant
    Filed: September 23, 2019
    Date of Patent: September 26, 2023
    Assignee: KYNDRYL, INC.
    Inventors: Lohitashwa Thyagaraj, Debasisha Padhi, Richard Jay Cohen
  • Patent number: 11769080
    Abstract: A computer-implemented method in accordance with one embodiment includes, in response to a submission of an input dataset to an artificially intelligent application, receiving an explanation from each module of the application. The modules are configured within the application in a serial sequence in which each module, upon receiving the input dataset and any input generated by an immediately preceding module of the serial sequence, generates output that is forwarded as input to a next module, if any, in the sequence. A determination is made that at least two of the received explanations are semantically inconsistent.
    Type: Grant
    Filed: July 14, 2022
    Date of Patent: September 26, 2023
    Assignee: Kyndryl, Inc.
    Inventors: Sreekrishnan Venkateswaran, Debasisha Padhi, Shubhi Asthana, Anuradha Bhamidipaty, Ashish Kundu
  • Publication number: 20220351082
    Abstract: A computer-implemented method in accordance with one embodiment includes, in response to a submission of an input dataset to an artificially intelligent application, receiving an explanation from each module of the application. The modules are configured within the application in a serial sequence in which each module, upon receiving the input dataset and any input generated by an immediately preceding module of the serial sequence, generates output that is forwarded as input to a next module, if any, in the sequence. A determination is made that at least two of the received explanations are semantically inconsistent.
    Type: Application
    Filed: July 14, 2022
    Publication date: November 3, 2022
    Inventors: Sreekrishnan Venkiteswaran, Debasisha Padhi, Shubhi Asthana, Anuradha Bhamidipaty, Ashish Kundu
  • Patent number: 11423334
    Abstract: An explainable artificially intelligent (XAI) application contains an ordered sequence of artificially intelligent software modules. When an input dataset is submitted to the application, each module generates an output dataset and an explanation that represents, as a set of Boolean expressions, reasoning by which each output element was chosen. If any pair of explanations are determined to be semantically inconsistent, and if this determination is confirmed by further determining that an apparent inconsistency was not a correct response to an unexpected characteristic of the input dataset, nonzero inconsistency scores are assigned to inconsistent elements of the pair of explanations.
    Type: Grant
    Filed: May 8, 2020
    Date of Patent: August 23, 2022
    Assignee: KYNDRYL, INC.
    Inventors: Sreekrishnan Venkateswaran, Debasisha Padhi, Shubhi Asthana, Anuradha Bhamidipaty, Ashish Kundu
  • Patent number: 11349833
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for multi-factor authentication. In response to a request for an action, the method includes one or more processors whether a first authentication credential passes validation. In response to determining that the first authentication credential does pass validation, the method further includes one or more processors determining a second authentication credential, wherein the second authentication credential includes an indication of a wireless connection between a first computing device and a second computing device. The method further includes one or more processors determining whether the second authentication credential passes validation. In response to determining that the second authentication credential passes validation, the method further includes one or more processors allowing execution of the requested response.
    Type: Grant
    Filed: March 21, 2020
    Date of Patent: May 31, 2022
    Assignee: KYNDRYL, INC.
    Inventors: Sarin Kumar Thayyilsubramanian, Debasisha Padhi, Anuradha Bhamidipaty, Firas Bouz
  • Patent number: 11269753
    Abstract: A method, computer program product, and a system where a processor(s) obtains, from a data source, a list of objects at different layers of a computing system. The processor(s) generates exploration lists from the list (each exploration list with objects for a layer). The processor(s) identifies updated and new data at the layers associated with the objects on the list; the identified data comprises attributes for each layer. The processor(s) applies machine learning algorithm(s) to enrich the data by identifying dependencies between the attributes for each layer as influencers for one or more key performance indicators of the computing system. The processor(s) generates, from the enriched data, a hierarchy matrix. The processor(s) determines, based on the hierarchy matrix that an event associated with one or more computing resources of the computing system will influence a particular key performance indicator.
    Type: Grant
    Filed: May 5, 2020
    Date of Patent: March 8, 2022
    Assignee: Kyndryl, Inc.
    Inventors: Shashidhar Sastry, Rahul Chenny, Debasisha Padhi
  • Publication number: 20210350275
    Abstract: An explainable artificially intelligent (XAI) application contains an ordered sequence of artificially intelligent software modules. When an input dataset is submitted to the application, each module generates an output dataset and an explanation that represents, as a set of Boolean expressions, reasoning by which each output element was chosen. If any pair of explanations are determined to be semantically inconsistent, and if this determination is confirmed by further determining that an apparent inconsistency was not a correct response to an unexpected characteristic of the input dataset, nonzero inconsistency scores are assigned to inconsistent elements of the pair of explanations.
    Type: Application
    Filed: May 8, 2020
    Publication date: November 11, 2021
    Inventors: Sreekrishnan Venkateswaran, Debasisha Padhi, Shubhi Asthana, Anuradha Bhamidipaty, Ashish Kundu
  • Publication number: 20210349802
    Abstract: A method, computer program product, and a system where a processor(s) obtains, from a data source, a list of objects at different layers of a computing system. The processor(s) generates exploration lists from the list (each exploration list with objects for a layer). The processor(s) identifies updated and new data at the layers associated with the objects on the list; the identified data comprises attributes for each layer. The processor(s) applies machine learning algorithm(s) to enrich the data by identifying dependencies between the attributes for each layer as influencers for one or more key performance indicators of the computing system. The processor(s) generates, from the enriched data, a hierarchy matrix. The processor(s) determines, based on the hierarchy matrix that an event associated with one or more computing resources of the computing system will influence a particular key performance indicator.
    Type: Application
    Filed: May 5, 2020
    Publication date: November 11, 2021
    Inventors: Shashidhar Sastry, Rahul Chenny, Debasisha Padhi
  • Publication number: 20210297412
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for multi-factor authentication. In response to a request for an action, the method includes one or more processors whether a first authentication credential passes validation. In response to determining that the first authentication credential does pass validation, the method further includes one or more processors determining a second authentication credential, wherein the second authentication credential includes an indication of a wireless connection between a first computing device and a second computing device. The method further includes one or more processors determining whether the second authentication credential passes validation. In response to determining that the second authentication credential passes validation, the method further includes one or more processors allowing execution of the requested response.
    Type: Application
    Filed: March 21, 2020
    Publication date: September 23, 2021
    Inventors: Sarin Kumar Thayyilsubramanian, Debasisha Padhi, Anuradha Bhamidipaty, Firas Bouz
  • Patent number: 11025500
    Abstract: Provisioning infrastructure from visual diagrams can include selecting, with a first neural network, regions of interest within an infrastructure architecture diagram that corresponds to an infrastructure offered by an infrastructure provider for supporting a computer application. With a second neural network, infrastructure resources and interconnections among the infrastructure resources can be identified based on objects appearing within the regions of interest. Properties corresponding to the infrastructure resources identified can be determined with a third neural network. With a fourth neural network, an infrastructure architecture specification can be generated, the infrastructure architecture specification specifying the infrastructure resources, corresponding properties of the infrastructure resources, and interconnections among the infrastructure resources. The infrastructure architecture specification can be used to configure networked resources to support the computer application.
    Type: Grant
    Filed: July 17, 2019
    Date of Patent: June 1, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vysakh K. Chandran, Debasisha Padhi, Souri Subudhi
  • Publication number: 20210092157
    Abstract: A method, system, and computer program product for prioritizing endpoints to be checked during a change window based on certain criteria. The method may include receiving a request for processing from a plurality of servers. The method may also include determining a priority for each server of the plurality of servers based on specified criteria, where the specified criteria includes at least compliance-check history. The method may also include determining whether each server belongs to one or more groups. The method may also include determining a notification order for the plurality of servers based on the priority and whether each server belongs to the one or more groups. The method may also include sending a notification to each server in the notification order.
    Type: Application
    Filed: September 23, 2019
    Publication date: March 25, 2021
    Inventors: Lohitashwa Thyagaraj, Debasisha Padhi, Richard Jay Cohen
  • Publication number: 20210021479
    Abstract: Provisioning infrastructure from visual diagrams can include selecting, with a first neural network, regions of interest within an infrastructure architecture diagram that corresponds to an infrastructure offered by an infrastructure provider for supporting a computer application. With a second neural network, infrastructure resources and interconnections among the infrastructure resources can be identified based on objects appearing within the regions of interest. Properties corresponding to the infrastructure resources identified can be determined with a third neural network. With a fourth neural network, an infrastructure architecture specification can be generated, the infrastructure architecture specification specifying the infrastructure resources, corresponding properties of the infrastructure resources, and interconnections among the infrastructure resources. The infrastructure architecture specification can be used to configure networked resources to support the computer application.
    Type: Application
    Filed: July 17, 2019
    Publication date: January 21, 2021
    Inventors: Vysakh K. Chandran, Debasisha Padhi, Souri Subudhi
  • Publication number: 20210011947
    Abstract: A method for generating a graphical view of automata execution by an automatonic information technology (IT) management tool configured to monitor an IT infrastructure, where the tool includes a configuration items (CI) database containing configuration items that represent elements of the IT infrastructure, the tool including an execution log database configured to store automata execution status resulting from automatonic monitoring of the configuration items by the tool. The method includes collecting CI information values from the CI database, projecting the collected CI values into a template of a graphical view of the IT infrastructure generated by the tool, collecting state information values of the automata execution status from the execution log database, converting the state information values of the automata execution status into a graphic information and displaying the graphic information of the automata execution status on the graphical view of the IT infrastructure.
    Type: Application
    Filed: July 12, 2019
    Publication date: January 14, 2021
    Inventors: Anuradha Bhamidipaty, Debasisha Padhi, Sarin K. Thayyilsubramanian
  • Patent number: 10740445
    Abstract: A system, method and program product for providing cognitive behavior security control (CBSC). A system is disclosed that includes: a repository having a plurality of challenges each including an interactive graphical task; a user interface for graphically presenting challenges to users; an enrollment system for assigning challenges to users and determining an authentic response for each user; an authentication system that collects an observed response from a user presented with an assigned challenge and determines a security control result based on a closeness of the observed response with the authentic response of the user.
    Type: Grant
    Filed: July 18, 2017
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Anuradha Bhamidipaty, Ashish Kundu, Debasisha Padhi, Sreekrishnan Venkateswaran
  • Publication number: 20190026448
    Abstract: A system, method and program product for providing cognitive behavior security control (CBSC). A system is disclosed that includes: a repository having a plurality of challenges each including an interactive graphical task; a user interface for graphically presenting challenges to users; an enrollment system for assigning challenges to users and determining an authentic response for each user; an authentication system that collects an observed response from a user presented with an assigned challenge and determines a security control result based on a closeness of the observed response with the authentic response of the user.
    Type: Application
    Filed: July 18, 2017
    Publication date: January 24, 2019
    Inventors: Anuradha Bhamidipaty, Ashish Kundu, Debasisha Padhi, Sreekrishnan Venkiteswaran