Patents by Inventor Dhinakaran Vinayagamurthy
Dhinakaran Vinayagamurthy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240428105Abstract: One or more systems, computer program products and/or computer-implemented methods of use provided herein relate to a process to generate an ansatz-hardware pairing. A system can comprise a memory that stores computer executable components, and a processor that executes the computer executable components stored in the memory, wherein the computer executable components can comprise a machine learning model that compares inputs to a database of stored ansatz-hardware pairings and that generates the ansatz-hardware pairing based on the comparing, wherein the inputs comprise desired ansatz metrics, defining a variational quantum algorithm, and hardware metrics of quantum hardware available to operate a quantum circuit defined by the ansatz, and a generating component that determines a prediction comprising the ansatz-hardware pairing, wherein the prediction comprises a predicted accuracy of an output of the quantum circuit to be performed on the quantum hardware of the ansatz-hardware pairing.Type: ApplicationFiled: June 26, 2023Publication date: December 26, 2024Inventors: Anupama RAY, Kalyan DASGUPTA, SheshaShayee K RAGHUNATHAN, Dhinakaran VINAYAGAMURTHY, Dhiraj MADAN
-
Publication number: 20240281804Abstract: A group of transactions to be rolled back in a blockchain ledger can be identified. Whether the transactions in the group are eligible to be rolled back together can be determined. Other transactions can be recommended, and the other transactions may be added to the group to be rolled back together. A rollback transaction can be added to the blockchain ledger that rolls back effect of the transactions, where the rollback transaction has zero or more inputs and zero or more output, the rollback transaction having at least one selected from at least one input and at least one output. An unspent output of a transaction in the group is provided as an input of the rollback transaction. Input of a transaction in the group, that is not an output of another transaction in the group, is provided as an output of the rollback transaction.Type: ApplicationFiled: February 21, 2023Publication date: August 22, 2024Inventors: Krishnasuri Narayanam, Vinayaka Pandit, Sandeep Nishad, Venkatraman Ramakrishna, Dhinakaran Vinayagamurthy
-
Publication number: 20240243932Abstract: Execution of one or more actions executing on at least one device is monitored to protect access to a selected digital asset. The monitoring includes determining whether a chosen action to be initiated by one entity to claim a chosen digital asset of another entity has completed. Based on determining that the chosen action has not completed, execution of a selected action, initiated by the other entity, to claim a selected digital asset of the one entity is prevented. Based on preventing execution of the selected action, a determination is made as to whether the chosen action has completed the claim of the chosen digital asset of the other entity. Based on determining that the chosen action has completed, completion of execution of the selected action to claim the selected digital asset of the one entity is facilitated.Type: ApplicationFiled: January 18, 2023Publication date: July 18, 2024Inventors: Angelo DE CARO, Kaoutar EL KHIYAOUI, Venkatraman RAMAKRISHNA, Dhinakaran VINAYAGAMURTHY, Krishnasuri NARAYANAM, Sandeep NISHAD
-
Publication number: 20240212040Abstract: A computer-implemented method for automatically and digitally securing an asset is disclosed. The computer-implemented method includes hashing a secret preimage to produce a secret hash. The computer-implemented method further includes locking a digital collateral asset with the secret hash for a first predetermined period of time. The computer-implemented method further includes locking a digital loan asset with the secret hash for a second predetermined period of time, wherein the second predetermined period of time is less than the first predetermined period of time. The computer-implemented method further pledging a digital loan repayment up to the amount of time of the first predetermined period of time plus the second predetermined period of time. The computer-implemented method further includes responsive to receiving a pledge for the digital loan repayment, automatically unlocking the digital collateral asset for a borrower of the digital loan asset.Type: ApplicationFiled: December 27, 2022Publication date: June 27, 2024Inventors: Krishnasuri Narayanam, VENKATRAMAN RAMAKRISHNA, Dhinakaran Vinayagamurthy, Sandeep Nishad, VINAYAKA PANDIT
-
Patent number: 11928234Abstract: One embodiment provides a method, including: receiving, from a user at a collaboration platform, a request to perform a computation; generating a workflow comprising a sequence of steps for performing the computation; identifying potential data sources comprising the type of data and able to assist in performing at least one of the sequence of steps of the workflow; selecting computation data sources that collaborate to perform the computation, wherein the selecting is performed dynamically and based upon characteristics of a network created by the collaboration platform and between the computation data sources; and facilitating performance of the computation by the computation data sources using data of the computation data sources, wherein during performance of the computation the computation data sources collaborate within the network to perform the workflow while maintaining individual privacy of the data of the computation data sources and providing proof verifying a trustworthiness of the computation.Type: GrantFiled: August 6, 2021Date of Patent: March 12, 2024Assignee: International Business Machines CorporationInventors: Pankaj Satyanarayan Dayama, Nitin Singh, Dhinakaran Vinayagamurthy, Santosh Ravi Kiran Penubothula
-
Publication number: 20240080191Abstract: A system and method for a multi-party computation (MPC) is provided. In implementations, a method includes identifying a blockchain network and a computing device to perform an MPC based on an index; generating an MPC request including a function to be performed by the blockchain network and the computing device, data required for the function, and a verification policy defining a verification protocol to be performed by the blockchain network and the computing device; sending the MPC request to the blockchain network and the computing device; and receiving responses from a representative computing node of the blockchain network and the computing device, wherein each of the responses includes: an output of an MPC protocol performed by the blockchain network and the computing device to jointly compute the function while keeping the inputs private from one another and private from the computing system; and a proof based on the verification policy.Type: ApplicationFiled: September 1, 2022Publication date: March 7, 2024Inventors: Dhinakaran Vinayagamurthy, Krishnasuri Narayanam, Venkatraman Ramakrishna, Ermyas Abebe, Angelo De Caro, Yining Hu, Vinayaka Pandit
-
Patent number: 11860868Abstract: Methods, systems, and computer program products for a secure database-as-a-service are provided herein. A computer-implemented method includes obtaining, by a database service, data associated with one or more client devices to be stored in at least one encrypted database; encrypting, without mutation and in accordance with one or more security requirements, at least a portion of the data using an order preserving encryption scheme, wherein the encrypting comprises (i) computing a set of encryption parameters for the portion of the data and (ii) applying a process that converts a fixed-length cipher text corresponding to the portion of the data to a variable-length cipher text; and storing the encrypted data in the at least one encrypted database, wherein the database service enables one or more indexes to be built over the encrypted data to improve performance of query processing.Type: GrantFiled: December 14, 2021Date of Patent: January 2, 2024Assignee: International Business Machines CorporationInventors: Akshar Kaul, Dhinakaran Vinayagamurthy, Pankaj Satyanarayan Dayama, Santosh Ravi Kiran Penubothula
-
Patent number: 11861476Abstract: One embodiment provides a method, including: receiving a query from a user; providing the query to data owners, wherein each of the data owners has a local machine learning model and wherein the plurality of data owners train a meta-model; secret sharing model output from the data owners between the other data owners, wherein the model output comprises an output responsive to the query computed using the local machine learning model; receiving, from each of the plurality of data owners, a set of meta-features corresponding to the query; and generating a response to the query, wherein the generating comprises determining, by evaluating the meta-model using the set of meta-features received from each of the plurality of data owners, weights for outputs from the local machine learning models and aggregating the outputs in view of the weights.Type: GrantFiled: August 18, 2021Date of Patent: January 2, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dhinakaran Vinayagamurthy, Sandeep Nishad, Harsh Chaudhari, Pankaj Satyanarayan Dayama, Saneem Ahmed Chemmengath
-
Patent number: 11836269Abstract: One embodiment provides a method, including: receiving, at a database proxy acting as an intermediary between a plurality of database clients and a service provider providing data management services for the plurality of database clients, a set of queries, of at least one of the plurality of database clients, for data stored at the service provider in an encrypted form, wherein the database proxy maintains a security budget defining a maximum threshold amount of data leakage for the plurality of database clients; batching the set of queries into query batches; transforming, for each query batch, each query within the query batch, wherein the transforming includes changing the query to reduce data leakage; performing, responsive to transforming each query within the query batch, a transformation on each of the query batches to reduce data leakage; executing, at the database proxy and utilizing an order-preserving encryption algorithm, the query batches; and calculating a remaining security budget based upon daType: GrantFiled: August 23, 2021Date of Patent: December 5, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dhinakaran Vinayagamurthy, Utsav Singhal, Akshar Kaul
-
Patent number: 11782952Abstract: One embodiment provides a method, including: receiving, at a service provider and from a user, a request for computation of a function, wherein the request includes a description of the function to be computed and requirements of the user; identifying, from data sources accessible to the service provider, a plurality of data sources to participate in the computation in view of the requirements and the description of the function, wherein each of the plurality of data sources includes data of a data owner and constraints on use of the data; identifying a multi-party computation protocol and parameters of the multi-party computation protocol for performing the computation; and running the computation of the function using the data of the plurality of data sources and in view of the requirements of the user and the constraints of the plurality of data sources.Type: GrantFiled: August 18, 2021Date of Patent: October 10, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dhinakaran Vinayagamurthy, Santosh Ravi Kiran Penubothula, Pankaj Satyanarayan Dayama, Nitin Singh, Abhishek Singh, Vinayaka Pandit
-
Patent number: 11727157Abstract: Methods, systems, and computer program products for building an encrypted document store are provided herein. A computer-implemented method includes building an encrypted ordered key-value store; encrypting one or more sensitive keys to be stored in the ordered key-value store using an order preserving encryption scheme; storing a state of the order preserving encryption scheme in the ordered key-value store; and encrypting one or more values corresponding to the one or more sensitive keys using a semantically secure encryption scheme.Type: GrantFiled: July 22, 2021Date of Patent: August 15, 2023Assignee: International Business Machines CorporationInventors: Dhinakaran Vinayagamurthy, Akshar Kaul, Santosh Ravi Kiran Penubothula, Pankaj Satyanarayan Dayama, Vinayaka Pandit
-
Publication number: 20230252482Abstract: A node on a blockchain network may receive an operation to initiate a token swap between a first party with a first token on a first blockchain network and a second party with a second token on a second blockchain network, receive a refund request operation, and receive a freeze operation from a committee preventing claiming of the first and the second token.Type: ApplicationFiled: February 9, 2022Publication date: August 10, 2023Inventors: Angelo De Caro, Yacov Manevich, Kaoutar El Khiyaoui, Dhinakaran Vinayagamurthy, VENKATRAMAN RAMAKRISHNA
-
Patent number: 11687665Abstract: One embodiment provides a computer implemented method, including: receiving, at a service provider from each of a plurality of data owners each having data accessible to the service provider, a privacy budget, wherein the privacy budget identifies a set of privacy requirements to be employed by the service provider on data of the data owner; receiving, at the service provider, a query from a client; receiving, at the service provider from each of at least a subset of the data owners, a response to the query; adding, by the service provider, noise to each of the responses, wherein an amount of noise added to each response is based upon the privacy budget of the data owner corresponding to a given response; and returning, by the service provider to the client, an aggregated response including the responses having added noise.Type: GrantFiled: December 14, 2020Date of Patent: June 27, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dhinakaran Vinayagamurthy, Sandeep Nishad, Dayama Pankaj Satyanarayan
-
Publication number: 20230185800Abstract: Methods, systems, and computer program products for a secure database-as-a-service are provided herein. A computer-implemented method includes obtaining, by a database service, data associated with one or more client devices to be stored in at least one encrypted database; encrypting, without mutation and in accordance with one or more security requirements, at least a portion of the data using an order preserving encryption scheme, wherein the encrypting comprises (i) computing a set of encryption parameters for the portion of the data and (ii) applying a process that converts a fixed-length cipher text corresponding to the portion of the data to a variable-length cipher text; and storing the encrypted data in the at least one encrypted database, wherein the database service enables one or more indexes to be built over the encrypted data to improve performance of query processing.Type: ApplicationFiled: December 14, 2021Publication date: June 15, 2023Inventors: Akshar Kaul, Dhinakaran Vinayagamurthy, Pankaj Satyanarayan Dayama, Santosh Ravi Kiran Penubothula
-
Publication number: 20230059492Abstract: One embodiment provides a method, including: receiving, at a service provider and from a user, a request for computation of a function, wherein the request includes a description of the function to be computed and requirements of the user; identifying, from data sources accessible to the service provider, a plurality of data sources to participate in the computation in view of the requirements and the description of the function, wherein each of the plurality of data sources includes data of a data owner and constraints on use of the data; identifying a multi-party computation protocol and parameters of the multi-party computation protocol for performing the computation; and running the computation of the function using the data of the plurality of data sources and in view of the requirements of the user and the constraints of the plurality of data sources.Type: ApplicationFiled: August 18, 2021Publication date: February 23, 2023Inventors: Dhinakaran Vinayagamurthy, Santosh Ravi Kiran Penubothula, Pankaj Satyanarayan Dayama, Nitin Singh, Abhishek Singh, VINAYAKA PANDIT
-
Publication number: 20230055992Abstract: One embodiment provides a method, including: receiving, at a database proxy acting as an intermediary between a plurality of database clients and a service provider providing data management services for the plurality of database clients, a set of queries, of at least one of the plurality of database clients, for data stored at the service provider in an encrypted form, wherein the database proxy maintains a security budget defining a maximum threshold amount of data leakage for the plurality of database clients; batching the set of queries into query batches; transforming, for each query batch, each query within the query batch, wherein the transforming includes changing the query to reduce data leakage; performing, responsive to transforming each query within the query batch, a transformation on each of the query batches to reduce data leakage; executing, at the database proxy and utilizing an order-preserving encryption algorithm, the query batches; and calculating a remaining security budget based upon daType: ApplicationFiled: August 23, 2021Publication date: February 23, 2023Inventors: Dhinakaran Vinayagamurthy, Utsav Singhal, Akshar Kaul
-
Publication number: 20230058219Abstract: One embodiment provides a method, including: receiving a query from a user; providing the query to data owners, wherein each of the data owners has a local machine learning model and wherein the plurality of data owners train a meta-model; secret sharing model output from the data owners between the other data owners, wherein the model output comprises an output responsive to the query computed using the local machine learning model; receiving, from each of the plurality of data owners, a set of meta-features corresponding to the query; and generating a response to the query, wherein the generating comprises determining, by evaluating the meta-model using the set of meta-features received from each of the plurality of data owners, weights for outputs from the local machine learning models and aggregating the outputs in view of the weights.Type: ApplicationFiled: August 18, 2021Publication date: February 23, 2023Inventors: Dhinakaran Vinayagamurthy, Sandeep Nishad, Harsh Chaudhari, Pankaj Satyanarayan Dayama, Saneem Ahmed Chemmengath
-
Publication number: 20230041073Abstract: One embodiment provides a method, including: receiving, from a user at a collaboration platform, a request to perform a computation; generating a workflow comprising a sequence of steps for performing the computation; identifying potential data sources comprising the type of data and able to assist in performing at least one of the sequence of steps of the workflow; selecting computation data sources that collaborate to perform the computation, wherein the selecting is performed dynamically and based upon characteristics of a network created by the collaboration platform and between the computation data sources; and facilitating performance of the computation by the computation data sources using data of the computation data sources, wherein during performance of the computation the computation data sources collaborate within the network to perform the workflow while maintaining individual privacy of the data of the computation data sources and providing proof verifying a trustworthiness of the computation.Type: ApplicationFiled: August 6, 2021Publication date: February 9, 2023Inventors: Pankaj Satyanarayan Dayama, Nitin Singh, Dhinakaran Vinayagamurthy, Santosh Ravi Kiran Penubothula
-
Publication number: 20230022338Abstract: Methods, systems, and computer program products for building an encrypted document store are provided herein. A computer-implemented method includes building an encrypted ordered key-value store; encrypting one or more sensitive keys to be stored in the ordered key-value store using an order preserving encryption scheme; storing a state of the order preserving encryption scheme in the ordered key-value store; and encrypting one or more values corresponding to the one or more sensitive keys using a semantically secure encryption scheme.Type: ApplicationFiled: July 22, 2021Publication date: January 26, 2023Inventors: Dhinakaran Vinayagamurthy, Akshar Kaul, Santosh Ravi Kiran Penubothula, Pankaj Satyanarayan Dayama, Vinayaka Pandit
-
Patent number: 11481680Abstract: Methods, systems, and computer program products for verifying confidential machine learning models are provided herein. A computer-implemented method includes obtaining (i) a set of training data and (ii) a request, from a requestor, for a machine learning model, wherein the request is accompanied by at least a set of test data; obtaining a commitment from a provider in response to the request, the commitment comprising a special hash corresponding to parameters of a candidate machine learning model trained on the set of training data; revealing the set of test data to the requestor; obtaining, from the requestor, (i) a claim of performance of the candidate machine learning model for the test data and (ii) a proof of the performance of the candidate machine learning model; and verifying the claimed performance for the requestor based on (i) the special hash and (ii) the proof of the claimed performance.Type: GrantFiled: April 17, 2020Date of Patent: October 25, 2022Assignee: International Business Machines CorporationInventors: Pankaj S. Dayama, Nitin Singh, Dhinakaran Vinayagamurthy, Vinayaka Pandit