Patents by Inventor Dhinakaran Vinayagamurthy

Dhinakaran Vinayagamurthy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240428105
    Abstract: One or more systems, computer program products and/or computer-implemented methods of use provided herein relate to a process to generate an ansatz-hardware pairing. A system can comprise a memory that stores computer executable components, and a processor that executes the computer executable components stored in the memory, wherein the computer executable components can comprise a machine learning model that compares inputs to a database of stored ansatz-hardware pairings and that generates the ansatz-hardware pairing based on the comparing, wherein the inputs comprise desired ansatz metrics, defining a variational quantum algorithm, and hardware metrics of quantum hardware available to operate a quantum circuit defined by the ansatz, and a generating component that determines a prediction comprising the ansatz-hardware pairing, wherein the prediction comprises a predicted accuracy of an output of the quantum circuit to be performed on the quantum hardware of the ansatz-hardware pairing.
    Type: Application
    Filed: June 26, 2023
    Publication date: December 26, 2024
    Inventors: Anupama RAY, Kalyan DASGUPTA, SheshaShayee K RAGHUNATHAN, Dhinakaran VINAYAGAMURTHY, Dhiraj MADAN
  • Publication number: 20240281804
    Abstract: A group of transactions to be rolled back in a blockchain ledger can be identified. Whether the transactions in the group are eligible to be rolled back together can be determined. Other transactions can be recommended, and the other transactions may be added to the group to be rolled back together. A rollback transaction can be added to the blockchain ledger that rolls back effect of the transactions, where the rollback transaction has zero or more inputs and zero or more output, the rollback transaction having at least one selected from at least one input and at least one output. An unspent output of a transaction in the group is provided as an input of the rollback transaction. Input of a transaction in the group, that is not an output of another transaction in the group, is provided as an output of the rollback transaction.
    Type: Application
    Filed: February 21, 2023
    Publication date: August 22, 2024
    Inventors: Krishnasuri Narayanam, Vinayaka Pandit, Sandeep Nishad, Venkatraman Ramakrishna, Dhinakaran Vinayagamurthy
  • Publication number: 20240243932
    Abstract: Execution of one or more actions executing on at least one device is monitored to protect access to a selected digital asset. The monitoring includes determining whether a chosen action to be initiated by one entity to claim a chosen digital asset of another entity has completed. Based on determining that the chosen action has not completed, execution of a selected action, initiated by the other entity, to claim a selected digital asset of the one entity is prevented. Based on preventing execution of the selected action, a determination is made as to whether the chosen action has completed the claim of the chosen digital asset of the other entity. Based on determining that the chosen action has completed, completion of execution of the selected action to claim the selected digital asset of the one entity is facilitated.
    Type: Application
    Filed: January 18, 2023
    Publication date: July 18, 2024
    Inventors: Angelo DE CARO, Kaoutar EL KHIYAOUI, Venkatraman RAMAKRISHNA, Dhinakaran VINAYAGAMURTHY, Krishnasuri NARAYANAM, Sandeep NISHAD
  • Publication number: 20240212040
    Abstract: A computer-implemented method for automatically and digitally securing an asset is disclosed. The computer-implemented method includes hashing a secret preimage to produce a secret hash. The computer-implemented method further includes locking a digital collateral asset with the secret hash for a first predetermined period of time. The computer-implemented method further includes locking a digital loan asset with the secret hash for a second predetermined period of time, wherein the second predetermined period of time is less than the first predetermined period of time. The computer-implemented method further pledging a digital loan repayment up to the amount of time of the first predetermined period of time plus the second predetermined period of time. The computer-implemented method further includes responsive to receiving a pledge for the digital loan repayment, automatically unlocking the digital collateral asset for a borrower of the digital loan asset.
    Type: Application
    Filed: December 27, 2022
    Publication date: June 27, 2024
    Inventors: Krishnasuri Narayanam, VENKATRAMAN RAMAKRISHNA, Dhinakaran Vinayagamurthy, Sandeep Nishad, VINAYAKA PANDIT
  • Patent number: 11928234
    Abstract: One embodiment provides a method, including: receiving, from a user at a collaboration platform, a request to perform a computation; generating a workflow comprising a sequence of steps for performing the computation; identifying potential data sources comprising the type of data and able to assist in performing at least one of the sequence of steps of the workflow; selecting computation data sources that collaborate to perform the computation, wherein the selecting is performed dynamically and based upon characteristics of a network created by the collaboration platform and between the computation data sources; and facilitating performance of the computation by the computation data sources using data of the computation data sources, wherein during performance of the computation the computation data sources collaborate within the network to perform the workflow while maintaining individual privacy of the data of the computation data sources and providing proof verifying a trustworthiness of the computation.
    Type: Grant
    Filed: August 6, 2021
    Date of Patent: March 12, 2024
    Assignee: International Business Machines Corporation
    Inventors: Pankaj Satyanarayan Dayama, Nitin Singh, Dhinakaran Vinayagamurthy, Santosh Ravi Kiran Penubothula
  • Publication number: 20240080191
    Abstract: A system and method for a multi-party computation (MPC) is provided. In implementations, a method includes identifying a blockchain network and a computing device to perform an MPC based on an index; generating an MPC request including a function to be performed by the blockchain network and the computing device, data required for the function, and a verification policy defining a verification protocol to be performed by the blockchain network and the computing device; sending the MPC request to the blockchain network and the computing device; and receiving responses from a representative computing node of the blockchain network and the computing device, wherein each of the responses includes: an output of an MPC protocol performed by the blockchain network and the computing device to jointly compute the function while keeping the inputs private from one another and private from the computing system; and a proof based on the verification policy.
    Type: Application
    Filed: September 1, 2022
    Publication date: March 7, 2024
    Inventors: Dhinakaran Vinayagamurthy, Krishnasuri Narayanam, Venkatraman Ramakrishna, Ermyas Abebe, Angelo De Caro, Yining Hu, Vinayaka Pandit
  • Patent number: 11860868
    Abstract: Methods, systems, and computer program products for a secure database-as-a-service are provided herein. A computer-implemented method includes obtaining, by a database service, data associated with one or more client devices to be stored in at least one encrypted database; encrypting, without mutation and in accordance with one or more security requirements, at least a portion of the data using an order preserving encryption scheme, wherein the encrypting comprises (i) computing a set of encryption parameters for the portion of the data and (ii) applying a process that converts a fixed-length cipher text corresponding to the portion of the data to a variable-length cipher text; and storing the encrypted data in the at least one encrypted database, wherein the database service enables one or more indexes to be built over the encrypted data to improve performance of query processing.
    Type: Grant
    Filed: December 14, 2021
    Date of Patent: January 2, 2024
    Assignee: International Business Machines Corporation
    Inventors: Akshar Kaul, Dhinakaran Vinayagamurthy, Pankaj Satyanarayan Dayama, Santosh Ravi Kiran Penubothula
  • Patent number: 11861476
    Abstract: One embodiment provides a method, including: receiving a query from a user; providing the query to data owners, wherein each of the data owners has a local machine learning model and wherein the plurality of data owners train a meta-model; secret sharing model output from the data owners between the other data owners, wherein the model output comprises an output responsive to the query computed using the local machine learning model; receiving, from each of the plurality of data owners, a set of meta-features corresponding to the query; and generating a response to the query, wherein the generating comprises determining, by evaluating the meta-model using the set of meta-features received from each of the plurality of data owners, weights for outputs from the local machine learning models and aggregating the outputs in view of the weights.
    Type: Grant
    Filed: August 18, 2021
    Date of Patent: January 2, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dhinakaran Vinayagamurthy, Sandeep Nishad, Harsh Chaudhari, Pankaj Satyanarayan Dayama, Saneem Ahmed Chemmengath
  • Patent number: 11836269
    Abstract: One embodiment provides a method, including: receiving, at a database proxy acting as an intermediary between a plurality of database clients and a service provider providing data management services for the plurality of database clients, a set of queries, of at least one of the plurality of database clients, for data stored at the service provider in an encrypted form, wherein the database proxy maintains a security budget defining a maximum threshold amount of data leakage for the plurality of database clients; batching the set of queries into query batches; transforming, for each query batch, each query within the query batch, wherein the transforming includes changing the query to reduce data leakage; performing, responsive to transforming each query within the query batch, a transformation on each of the query batches to reduce data leakage; executing, at the database proxy and utilizing an order-preserving encryption algorithm, the query batches; and calculating a remaining security budget based upon da
    Type: Grant
    Filed: August 23, 2021
    Date of Patent: December 5, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dhinakaran Vinayagamurthy, Utsav Singhal, Akshar Kaul
  • Patent number: 11782952
    Abstract: One embodiment provides a method, including: receiving, at a service provider and from a user, a request for computation of a function, wherein the request includes a description of the function to be computed and requirements of the user; identifying, from data sources accessible to the service provider, a plurality of data sources to participate in the computation in view of the requirements and the description of the function, wherein each of the plurality of data sources includes data of a data owner and constraints on use of the data; identifying a multi-party computation protocol and parameters of the multi-party computation protocol for performing the computation; and running the computation of the function using the data of the plurality of data sources and in view of the requirements of the user and the constraints of the plurality of data sources.
    Type: Grant
    Filed: August 18, 2021
    Date of Patent: October 10, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dhinakaran Vinayagamurthy, Santosh Ravi Kiran Penubothula, Pankaj Satyanarayan Dayama, Nitin Singh, Abhishek Singh, Vinayaka Pandit
  • Patent number: 11727157
    Abstract: Methods, systems, and computer program products for building an encrypted document store are provided herein. A computer-implemented method includes building an encrypted ordered key-value store; encrypting one or more sensitive keys to be stored in the ordered key-value store using an order preserving encryption scheme; storing a state of the order preserving encryption scheme in the ordered key-value store; and encrypting one or more values corresponding to the one or more sensitive keys using a semantically secure encryption scheme.
    Type: Grant
    Filed: July 22, 2021
    Date of Patent: August 15, 2023
    Assignee: International Business Machines Corporation
    Inventors: Dhinakaran Vinayagamurthy, Akshar Kaul, Santosh Ravi Kiran Penubothula, Pankaj Satyanarayan Dayama, Vinayaka Pandit
  • Publication number: 20230252482
    Abstract: A node on a blockchain network may receive an operation to initiate a token swap between a first party with a first token on a first blockchain network and a second party with a second token on a second blockchain network, receive a refund request operation, and receive a freeze operation from a committee preventing claiming of the first and the second token.
    Type: Application
    Filed: February 9, 2022
    Publication date: August 10, 2023
    Inventors: Angelo De Caro, Yacov Manevich, Kaoutar El Khiyaoui, Dhinakaran Vinayagamurthy, VENKATRAMAN RAMAKRISHNA
  • Patent number: 11687665
    Abstract: One embodiment provides a computer implemented method, including: receiving, at a service provider from each of a plurality of data owners each having data accessible to the service provider, a privacy budget, wherein the privacy budget identifies a set of privacy requirements to be employed by the service provider on data of the data owner; receiving, at the service provider, a query from a client; receiving, at the service provider from each of at least a subset of the data owners, a response to the query; adding, by the service provider, noise to each of the responses, wherein an amount of noise added to each response is based upon the privacy budget of the data owner corresponding to a given response; and returning, by the service provider to the client, an aggregated response including the responses having added noise.
    Type: Grant
    Filed: December 14, 2020
    Date of Patent: June 27, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dhinakaran Vinayagamurthy, Sandeep Nishad, Dayama Pankaj Satyanarayan
  • Publication number: 20230185800
    Abstract: Methods, systems, and computer program products for a secure database-as-a-service are provided herein. A computer-implemented method includes obtaining, by a database service, data associated with one or more client devices to be stored in at least one encrypted database; encrypting, without mutation and in accordance with one or more security requirements, at least a portion of the data using an order preserving encryption scheme, wherein the encrypting comprises (i) computing a set of encryption parameters for the portion of the data and (ii) applying a process that converts a fixed-length cipher text corresponding to the portion of the data to a variable-length cipher text; and storing the encrypted data in the at least one encrypted database, wherein the database service enables one or more indexes to be built over the encrypted data to improve performance of query processing.
    Type: Application
    Filed: December 14, 2021
    Publication date: June 15, 2023
    Inventors: Akshar Kaul, Dhinakaran Vinayagamurthy, Pankaj Satyanarayan Dayama, Santosh Ravi Kiran Penubothula
  • Publication number: 20230059492
    Abstract: One embodiment provides a method, including: receiving, at a service provider and from a user, a request for computation of a function, wherein the request includes a description of the function to be computed and requirements of the user; identifying, from data sources accessible to the service provider, a plurality of data sources to participate in the computation in view of the requirements and the description of the function, wherein each of the plurality of data sources includes data of a data owner and constraints on use of the data; identifying a multi-party computation protocol and parameters of the multi-party computation protocol for performing the computation; and running the computation of the function using the data of the plurality of data sources and in view of the requirements of the user and the constraints of the plurality of data sources.
    Type: Application
    Filed: August 18, 2021
    Publication date: February 23, 2023
    Inventors: Dhinakaran Vinayagamurthy, Santosh Ravi Kiran Penubothula, Pankaj Satyanarayan Dayama, Nitin Singh, Abhishek Singh, VINAYAKA PANDIT
  • Publication number: 20230055992
    Abstract: One embodiment provides a method, including: receiving, at a database proxy acting as an intermediary between a plurality of database clients and a service provider providing data management services for the plurality of database clients, a set of queries, of at least one of the plurality of database clients, for data stored at the service provider in an encrypted form, wherein the database proxy maintains a security budget defining a maximum threshold amount of data leakage for the plurality of database clients; batching the set of queries into query batches; transforming, for each query batch, each query within the query batch, wherein the transforming includes changing the query to reduce data leakage; performing, responsive to transforming each query within the query batch, a transformation on each of the query batches to reduce data leakage; executing, at the database proxy and utilizing an order-preserving encryption algorithm, the query batches; and calculating a remaining security budget based upon da
    Type: Application
    Filed: August 23, 2021
    Publication date: February 23, 2023
    Inventors: Dhinakaran Vinayagamurthy, Utsav Singhal, Akshar Kaul
  • Publication number: 20230058219
    Abstract: One embodiment provides a method, including: receiving a query from a user; providing the query to data owners, wherein each of the data owners has a local machine learning model and wherein the plurality of data owners train a meta-model; secret sharing model output from the data owners between the other data owners, wherein the model output comprises an output responsive to the query computed using the local machine learning model; receiving, from each of the plurality of data owners, a set of meta-features corresponding to the query; and generating a response to the query, wherein the generating comprises determining, by evaluating the meta-model using the set of meta-features received from each of the plurality of data owners, weights for outputs from the local machine learning models and aggregating the outputs in view of the weights.
    Type: Application
    Filed: August 18, 2021
    Publication date: February 23, 2023
    Inventors: Dhinakaran Vinayagamurthy, Sandeep Nishad, Harsh Chaudhari, Pankaj Satyanarayan Dayama, Saneem Ahmed Chemmengath
  • Publication number: 20230041073
    Abstract: One embodiment provides a method, including: receiving, from a user at a collaboration platform, a request to perform a computation; generating a workflow comprising a sequence of steps for performing the computation; identifying potential data sources comprising the type of data and able to assist in performing at least one of the sequence of steps of the workflow; selecting computation data sources that collaborate to perform the computation, wherein the selecting is performed dynamically and based upon characteristics of a network created by the collaboration platform and between the computation data sources; and facilitating performance of the computation by the computation data sources using data of the computation data sources, wherein during performance of the computation the computation data sources collaborate within the network to perform the workflow while maintaining individual privacy of the data of the computation data sources and providing proof verifying a trustworthiness of the computation.
    Type: Application
    Filed: August 6, 2021
    Publication date: February 9, 2023
    Inventors: Pankaj Satyanarayan Dayama, Nitin Singh, Dhinakaran Vinayagamurthy, Santosh Ravi Kiran Penubothula
  • Publication number: 20230022338
    Abstract: Methods, systems, and computer program products for building an encrypted document store are provided herein. A computer-implemented method includes building an encrypted ordered key-value store; encrypting one or more sensitive keys to be stored in the ordered key-value store using an order preserving encryption scheme; storing a state of the order preserving encryption scheme in the ordered key-value store; and encrypting one or more values corresponding to the one or more sensitive keys using a semantically secure encryption scheme.
    Type: Application
    Filed: July 22, 2021
    Publication date: January 26, 2023
    Inventors: Dhinakaran Vinayagamurthy, Akshar Kaul, Santosh Ravi Kiran Penubothula, Pankaj Satyanarayan Dayama, Vinayaka Pandit
  • Patent number: 11481680
    Abstract: Methods, systems, and computer program products for verifying confidential machine learning models are provided herein. A computer-implemented method includes obtaining (i) a set of training data and (ii) a request, from a requestor, for a machine learning model, wherein the request is accompanied by at least a set of test data; obtaining a commitment from a provider in response to the request, the commitment comprising a special hash corresponding to parameters of a candidate machine learning model trained on the set of training data; revealing the set of test data to the requestor; obtaining, from the requestor, (i) a claim of performance of the candidate machine learning model for the test data and (ii) a proof of the performance of the candidate machine learning model; and verifying the claimed performance for the requestor based on (i) the special hash and (ii) the proof of the claimed performance.
    Type: Grant
    Filed: April 17, 2020
    Date of Patent: October 25, 2022
    Assignee: International Business Machines Corporation
    Inventors: Pankaj S. Dayama, Nitin Singh, Dhinakaran Vinayagamurthy, Vinayaka Pandit