Patents by Inventor Debasisha Padhi
Debasisha Padhi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240135348Abstract: A method is provided that includes configuring a cellular phone to function as a mobile debit card by installing an application for contactless interfacing with ATMs. The method supplements the application with a neural network (NN) based biometric verification process configured to reduce an incorrect user error value over time to increasingly harden the application to undesired intrusion. The NN based biometric verification process comprises: performing an initial face recognition; greeting the user with one of a plurality of questions in a specific language of the user and evaluating a pre-defined answer provided from the user in the specific language; and detecting, in an acoustic utterance having dialogue in support of an ATM session, a voice and a prosody style indicative of the user in combination with lip and face movements made by the user corresponding to and in synchronization with the acoustic utterance.Type: ApplicationFiled: October 20, 2022Publication date: April 25, 2024Inventors: Amol Bhaskar Mahamuni, Debasisha Padhi, Nidhi Patel
-
Patent number: 11770411Abstract: A method, system, and computer program product for prioritizing endpoints to be checked during a change window based on certain criteria. The method may include receiving a request for processing from a plurality of servers. The method may also include determining a priority for each server of the plurality of servers based on specified criteria, where the specified criteria includes at least compliance-check history. The method may also include determining whether each server belongs to one or more groups. The method may also include determining a notification order for the plurality of servers based on the priority and whether each server belongs to the one or more groups. The method may also include sending a notification to each server in the notification order.Type: GrantFiled: September 23, 2019Date of Patent: September 26, 2023Assignee: KYNDRYL, INC.Inventors: Lohitashwa Thyagaraj, Debasisha Padhi, Richard Jay Cohen
-
Patent number: 11769080Abstract: A computer-implemented method in accordance with one embodiment includes, in response to a submission of an input dataset to an artificially intelligent application, receiving an explanation from each module of the application. The modules are configured within the application in a serial sequence in which each module, upon receiving the input dataset and any input generated by an immediately preceding module of the serial sequence, generates output that is forwarded as input to a next module, if any, in the sequence. A determination is made that at least two of the received explanations are semantically inconsistent.Type: GrantFiled: July 14, 2022Date of Patent: September 26, 2023Assignee: Kyndryl, Inc.Inventors: Sreekrishnan Venkateswaran, Debasisha Padhi, Shubhi Asthana, Anuradha Bhamidipaty, Ashish Kundu
-
Publication number: 20220351082Abstract: A computer-implemented method in accordance with one embodiment includes, in response to a submission of an input dataset to an artificially intelligent application, receiving an explanation from each module of the application. The modules are configured within the application in a serial sequence in which each module, upon receiving the input dataset and any input generated by an immediately preceding module of the serial sequence, generates output that is forwarded as input to a next module, if any, in the sequence. A determination is made that at least two of the received explanations are semantically inconsistent.Type: ApplicationFiled: July 14, 2022Publication date: November 3, 2022Inventors: Sreekrishnan Venkiteswaran, Debasisha Padhi, Shubhi Asthana, Anuradha Bhamidipaty, Ashish Kundu
-
Patent number: 11423334Abstract: An explainable artificially intelligent (XAI) application contains an ordered sequence of artificially intelligent software modules. When an input dataset is submitted to the application, each module generates an output dataset and an explanation that represents, as a set of Boolean expressions, reasoning by which each output element was chosen. If any pair of explanations are determined to be semantically inconsistent, and if this determination is confirmed by further determining that an apparent inconsistency was not a correct response to an unexpected characteristic of the input dataset, nonzero inconsistency scores are assigned to inconsistent elements of the pair of explanations.Type: GrantFiled: May 8, 2020Date of Patent: August 23, 2022Assignee: KYNDRYL, INC.Inventors: Sreekrishnan Venkateswaran, Debasisha Padhi, Shubhi Asthana, Anuradha Bhamidipaty, Ashish Kundu
-
Patent number: 11349833Abstract: Aspects of the present invention disclose a method, computer program product, and system for multi-factor authentication. In response to a request for an action, the method includes one or more processors whether a first authentication credential passes validation. In response to determining that the first authentication credential does pass validation, the method further includes one or more processors determining a second authentication credential, wherein the second authentication credential includes an indication of a wireless connection between a first computing device and a second computing device. The method further includes one or more processors determining whether the second authentication credential passes validation. In response to determining that the second authentication credential passes validation, the method further includes one or more processors allowing execution of the requested response.Type: GrantFiled: March 21, 2020Date of Patent: May 31, 2022Assignee: KYNDRYL, INC.Inventors: Sarin Kumar Thayyilsubramanian, Debasisha Padhi, Anuradha Bhamidipaty, Firas Bouz
-
Patent number: 11269753Abstract: A method, computer program product, and a system where a processor(s) obtains, from a data source, a list of objects at different layers of a computing system. The processor(s) generates exploration lists from the list (each exploration list with objects for a layer). The processor(s) identifies updated and new data at the layers associated with the objects on the list; the identified data comprises attributes for each layer. The processor(s) applies machine learning algorithm(s) to enrich the data by identifying dependencies between the attributes for each layer as influencers for one or more key performance indicators of the computing system. The processor(s) generates, from the enriched data, a hierarchy matrix. The processor(s) determines, based on the hierarchy matrix that an event associated with one or more computing resources of the computing system will influence a particular key performance indicator.Type: GrantFiled: May 5, 2020Date of Patent: March 8, 2022Assignee: Kyndryl, Inc.Inventors: Shashidhar Sastry, Rahul Chenny, Debasisha Padhi
-
Publication number: 20210350275Abstract: An explainable artificially intelligent (XAI) application contains an ordered sequence of artificially intelligent software modules. When an input dataset is submitted to the application, each module generates an output dataset and an explanation that represents, as a set of Boolean expressions, reasoning by which each output element was chosen. If any pair of explanations are determined to be semantically inconsistent, and if this determination is confirmed by further determining that an apparent inconsistency was not a correct response to an unexpected characteristic of the input dataset, nonzero inconsistency scores are assigned to inconsistent elements of the pair of explanations.Type: ApplicationFiled: May 8, 2020Publication date: November 11, 2021Inventors: Sreekrishnan Venkateswaran, Debasisha Padhi, Shubhi Asthana, Anuradha Bhamidipaty, Ashish Kundu
-
Publication number: 20210349802Abstract: A method, computer program product, and a system where a processor(s) obtains, from a data source, a list of objects at different layers of a computing system. The processor(s) generates exploration lists from the list (each exploration list with objects for a layer). The processor(s) identifies updated and new data at the layers associated with the objects on the list; the identified data comprises attributes for each layer. The processor(s) applies machine learning algorithm(s) to enrich the data by identifying dependencies between the attributes for each layer as influencers for one or more key performance indicators of the computing system. The processor(s) generates, from the enriched data, a hierarchy matrix. The processor(s) determines, based on the hierarchy matrix that an event associated with one or more computing resources of the computing system will influence a particular key performance indicator.Type: ApplicationFiled: May 5, 2020Publication date: November 11, 2021Inventors: Shashidhar Sastry, Rahul Chenny, Debasisha Padhi
-
Publication number: 20210297412Abstract: Aspects of the present invention disclose a method, computer program product, and system for multi-factor authentication. In response to a request for an action, the method includes one or more processors whether a first authentication credential passes validation. In response to determining that the first authentication credential does pass validation, the method further includes one or more processors determining a second authentication credential, wherein the second authentication credential includes an indication of a wireless connection between a first computing device and a second computing device. The method further includes one or more processors determining whether the second authentication credential passes validation. In response to determining that the second authentication credential passes validation, the method further includes one or more processors allowing execution of the requested response.Type: ApplicationFiled: March 21, 2020Publication date: September 23, 2021Inventors: Sarin Kumar Thayyilsubramanian, Debasisha Padhi, Anuradha Bhamidipaty, Firas Bouz
-
Patent number: 11025500Abstract: Provisioning infrastructure from visual diagrams can include selecting, with a first neural network, regions of interest within an infrastructure architecture diagram that corresponds to an infrastructure offered by an infrastructure provider for supporting a computer application. With a second neural network, infrastructure resources and interconnections among the infrastructure resources can be identified based on objects appearing within the regions of interest. Properties corresponding to the infrastructure resources identified can be determined with a third neural network. With a fourth neural network, an infrastructure architecture specification can be generated, the infrastructure architecture specification specifying the infrastructure resources, corresponding properties of the infrastructure resources, and interconnections among the infrastructure resources. The infrastructure architecture specification can be used to configure networked resources to support the computer application.Type: GrantFiled: July 17, 2019Date of Patent: June 1, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vysakh K. Chandran, Debasisha Padhi, Souri Subudhi
-
Publication number: 20210092157Abstract: A method, system, and computer program product for prioritizing endpoints to be checked during a change window based on certain criteria. The method may include receiving a request for processing from a plurality of servers. The method may also include determining a priority for each server of the plurality of servers based on specified criteria, where the specified criteria includes at least compliance-check history. The method may also include determining whether each server belongs to one or more groups. The method may also include determining a notification order for the plurality of servers based on the priority and whether each server belongs to the one or more groups. The method may also include sending a notification to each server in the notification order.Type: ApplicationFiled: September 23, 2019Publication date: March 25, 2021Inventors: Lohitashwa Thyagaraj, Debasisha Padhi, Richard Jay Cohen
-
Publication number: 20210021479Abstract: Provisioning infrastructure from visual diagrams can include selecting, with a first neural network, regions of interest within an infrastructure architecture diagram that corresponds to an infrastructure offered by an infrastructure provider for supporting a computer application. With a second neural network, infrastructure resources and interconnections among the infrastructure resources can be identified based on objects appearing within the regions of interest. Properties corresponding to the infrastructure resources identified can be determined with a third neural network. With a fourth neural network, an infrastructure architecture specification can be generated, the infrastructure architecture specification specifying the infrastructure resources, corresponding properties of the infrastructure resources, and interconnections among the infrastructure resources. The infrastructure architecture specification can be used to configure networked resources to support the computer application.Type: ApplicationFiled: July 17, 2019Publication date: January 21, 2021Inventors: Vysakh K. Chandran, Debasisha Padhi, Souri Subudhi
-
Publication number: 20210011947Abstract: A method for generating a graphical view of automata execution by an automatonic information technology (IT) management tool configured to monitor an IT infrastructure, where the tool includes a configuration items (CI) database containing configuration items that represent elements of the IT infrastructure, the tool including an execution log database configured to store automata execution status resulting from automatonic monitoring of the configuration items by the tool. The method includes collecting CI information values from the CI database, projecting the collected CI values into a template of a graphical view of the IT infrastructure generated by the tool, collecting state information values of the automata execution status from the execution log database, converting the state information values of the automata execution status into a graphic information and displaying the graphic information of the automata execution status on the graphical view of the IT infrastructure.Type: ApplicationFiled: July 12, 2019Publication date: January 14, 2021Inventors: Anuradha Bhamidipaty, Debasisha Padhi, Sarin K. Thayyilsubramanian
-
Patent number: 10740445Abstract: A system, method and program product for providing cognitive behavior security control (CBSC). A system is disclosed that includes: a repository having a plurality of challenges each including an interactive graphical task; a user interface for graphically presenting challenges to users; an enrollment system for assigning challenges to users and determining an authentic response for each user; an authentication system that collects an observed response from a user presented with an assigned challenge and determines a security control result based on a closeness of the observed response with the authentic response of the user.Type: GrantFiled: July 18, 2017Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Anuradha Bhamidipaty, Ashish Kundu, Debasisha Padhi, Sreekrishnan Venkateswaran
-
Publication number: 20190026448Abstract: A system, method and program product for providing cognitive behavior security control (CBSC). A system is disclosed that includes: a repository having a plurality of challenges each including an interactive graphical task; a user interface for graphically presenting challenges to users; an enrollment system for assigning challenges to users and determining an authentic response for each user; an authentication system that collects an observed response from a user presented with an assigned challenge and determines a security control result based on a closeness of the observed response with the authentic response of the user.Type: ApplicationFiled: July 18, 2017Publication date: January 24, 2019Inventors: Anuradha Bhamidipaty, Ashish Kundu, Debasisha Padhi, Sreekrishnan Venkiteswaran