Patents by Inventor Dinesh C. Verma

Dinesh C. Verma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9563371
    Abstract: A dynamic self-adjusting memory storage device and method of operating. The device includes a plurality of adjustable-size phase change memory (PCM) storage sub-modules connected to and communicating over a bus with a control device. One of the plurality of adjustable-size memory storage sub-modules is in a stand-by mode of operation. The control device implements steps to: determine, based on a switching criteria, when the memory storage device needs to be switched to a different operation mode; select one or more adjustable-sized memory storage sub-modules for switching to said different operation mode; copy stored data from a selected actively operating adjustable-size memory storage sub-module to said adjustable-size memory storage sub-module in said stand-by mode; and change the capacity of the selected actively operating adjustable-size memory storage sub-module after the copying.
    Type: Grant
    Filed: July 26, 2013
    Date of Patent: February 7, 2017
    Assignee: GLOBALFOUNDREIS INC.
    Inventors: Jing Li, Dinesh C. Verma
  • Patent number: 9560557
    Abstract: A processor-implemented method, apparatus, and/or computer program product move Open Systems Interconnection (OSI) layer 4 connections between wirelessly-connected user equipment to a series of cell-towers, wherein an OSI layer 4 connection is extracted out of the underlying cellular protocols at the series of cell-towers. A detection is made that user equipment, which has a broken-out layer 4 connection, has moved from a first cell-tower to a second cell-tower. Traffic for an existing layer 4 connection from the user equipment is tunnelled between the first cell-tower and the second cell-tower. In response to a predetermined trigger event occurring, an ongoing bidirectional flow of data packets is migrated from the user equipment over to layer 4 connections maintained at the second cell-tower. Furthermore, OSI layer 4 connections for all server ports other than the proxied active layer 4 connections that are proxied in the web cache are byte cached.
    Type: Grant
    Filed: July 7, 2016
    Date of Patent: January 31, 2017
    Assignee: International Business Machines Corporation
    Inventors: Bruce O. Anthony, Jr., Ronald L. Billau, Chatschik Bisdikian, Canio Cillis, Victor S. Moore, Erich M. Nahum, Robert B. Nicholson, Colin J. Thorne, Dinesh C. Verma
  • Patent number: 9560127
    Abstract: The present disclosure relates generally to the field of logical movement of data objects. In various examples, the logical movement of data objects may reduce or eliminate network hotspots (e.g., avoid formation of hotspots, remove existing hotspots and/or reduce the magnitude of hotspots). In various examples, the logical movement of data objects may be implemented in the form of systems, methods and/or algorithms.
    Type: Grant
    Filed: January 18, 2013
    Date of Patent: January 31, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Dinesh C. Verma
  • Publication number: 20170012849
    Abstract: A system for monitoring traffic characteristics between gateways in a computer network. The system includes a processor to construct a packet frame consisting of a sequence of network packets for transmission by a transmit gateway to receive gateways. The processor reorders network packets in the packet frame such that reordered network packets in the packet frame addressed to the same receive gateway of the plurality of receive gateways are send in uninterrupted succession. The processor then transmits the reordered network packets in the packet frame from the transmit gateway to the plurality of receive gateways.
    Type: Application
    Filed: July 7, 2015
    Publication date: January 12, 2017
    Inventor: Dinesh C. Verma
  • Publication number: 20160373487
    Abstract: Techniques for improving real-time communications over a mobile network are provided. In one aspect, a method for managing data transfer in a mobile network wherein user equipment transmit data through one or more cell towers is provided. The method includes the steps of: intercepting data packets from the user equipment; determining a location of a given one of the cell towers in the mobile network to which the data packets are to be sent; and tunneling the data packets directly to the given cell tower. A system for managing data transfer in a mobile network wherein user equipment transmit data through one or more cell towers is also provided.
    Type: Application
    Filed: June 18, 2015
    Publication date: December 22, 2016
    Inventors: Shahrokh Daijavad, Bijan Davari, Brian P. Naughton, Dinesh C. Verma
  • Publication number: 20160373298
    Abstract: Traffic redirection methods include determining a quality-affective factor comprising a quality-affective factor in an existing connection between a client and a server in a network. The quality-affective factor is compared to a threshold to determine whether the connection would benefit from a network processing function. A router is reconfigured to exclude the middlebox from the connection, if the connection would not benefit from the network processing function and if the middlebox is already present in the connection, to cease operation of the middlebox on the connection. The router reconfiguration is delayed until the connection is idle.
    Type: Application
    Filed: August 30, 2016
    Publication date: December 22, 2016
    Inventors: SERAPHIN B. CALO, WILLIAM CORNEJO, THAI F. LE, ERICH M. NAHUM, MAROUN TOUMA, DINESH C. VERMA
  • Publication number: 20160373941
    Abstract: Techniques for reconfiguring mobile networks based on network state information are provided. In one aspect, a method for managing a mobile network is provided. The method includes the steps of: gathering network state information from an edge of the mobile network, wherein the edge of the mobile network includes a radio network and a cellular network through which user equipment communicate with an internet protocol (IP) network which is at a core of the mobile network; analyzing the network state information based on policy controls to determine actions for optimizing the mobile network; and reconfiguring the mobile network using the actions for optimizing the mobile network. A system for managing a mobile network is also provided.
    Type: Application
    Filed: June 18, 2015
    Publication date: December 22, 2016
    Inventors: Shahrokh Daijavad, Bijan Davari, Brian P. Naughton, Dinesh C. Verma
  • Publication number: 20160366241
    Abstract: A method, system and computer program product for transmitting content across a link in a communications network. In an embodiment, the method comprises examining traffic in the network at a sender end of the link to determine if the traffic is carrying compressed content; when the traffic is carrying compressed content, decompressing at least one portion of the compressed content; and checking a cache to determine if the cache has content matching the at least one decompressed portion of the content. In an embodiment, the method further comprises when the cache has content matching the at least one decompressed portion of the content, determining an identifier associated with the at least one decompressed portion of the content; and using the identifier to reconstruct, at a receiving end of the link, the at least one decompressed portion of the content.
    Type: Application
    Filed: May 5, 2016
    Publication date: December 15, 2016
    Inventors: Dakshi Agrawal, Vasileios Pappas, Ramya Raghavendra, Mudhakar Srivatsa, Dinesh C. Verma, Ho Y. Wong
  • Patent number: 9521161
    Abstract: Techniques are provided for detecting computer fraud. The techniques include obtaining a text version of a candidate destination and a graphical rendering of the candidate destination, comparing the text version of the candidate destination and the graphical rendering of the candidate destination with a corresponding text version of a stored destination and a corresponding graphical rendering of the stored destination, and generating a fraud warning if the graphical rendering of the candidate destination is substantially similar to the graphical rendering of the stored destination while the text version of the candidate destination differs substantially from the corresponding text version of the stored destination.
    Type: Grant
    Filed: January 16, 2007
    Date of Patent: December 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: John Reumann, Dinesh C. Verma
  • Patent number: 9497202
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: November 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Bong Jun Ko, Kang-Won Lee, Theodoros Salonidis, Dinesh C. Verma
  • Publication number: 20160330087
    Abstract: A middlebox includes a network monitor module configured to determine a quality-affective factor in a connection between a client and a server in a network. A processor is configured to compare the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function. A network control module is configured to configure a router to exclude the middlebox from the connection if the connection would not benefit from the network processing function and if the middlebox is already present in the connection to cease operation of the middlebox on the connection. Router configuration is delayed until the connection is idle.
    Type: Application
    Filed: July 21, 2016
    Publication date: November 10, 2016
    Inventors: SERAPHIN B. CALO, WILLIAM CORNEJO, THAI F. LE, ERICH M. NAHUM, MAROUN TOUMA, DINESH C. VERMA
  • Patent number: 9485156
    Abstract: A system and method for monitoring liveliness includes a management device which has an application layer where applications are executed. A connection monitor is located other than on the application layer, and the connection monitor is configured to receive requests from clients and deliver the requests to components on the application layer. The components include a generic application monitor which responds to liveliness monitor requests from the clients for all applications monitored, and one or more applications which response to requests to that application.
    Type: Grant
    Filed: February 4, 2014
    Date of Patent: November 1, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael E. Baskey, Chun-Shi Chang, Lap T. Huynh, Dinakaran Joseph, Sambit Sahu, Dinesh C. Verma, Michael D. Williams
  • Publication number: 20160316400
    Abstract: A processor-implemented method, apparatus, and/or computer program product move Open Systems Interconnection (OSI) layer 4 connections between wirelessly-connected user equipment to a series of cell-towers, wherein an OSI layer 4 connection is extracted out of the underlying cellular protocols at the series of cell-towers. A detection is made that user equipment, which has a broken-out layer 4 connection, has moved from a first cell-tower to a second cell-tower. Traffic for an existing layer 4 connection from the user equipment is tunnelled between the first cell-tower and the second cell-tower. In response to a predetermined trigger event occurring, an ongoing bidirectional flow of data packets is migrated from the user equipment over to layer 4 connections maintained at the second cell-tower. Furthermore, OSI layer 4 connections for all server ports other than the proxied active layer 4 connections that are proxied in the web cache are byte cached.
    Type: Application
    Filed: July 7, 2016
    Publication date: October 27, 2016
    Inventors: BRUCE O. ANTHONY, JR., RONALD L. BILLAU, CHATSCHIK BISDIKIAN, CANIO CILLIS, VICTOR S. MOORE, ERICH M. NAHUM, ROBERT B. NICHOLSON, COLIN J. THORNE, DINESH C. VERMA
  • Publication number: 20160283522
    Abstract: A method and system are provided. The method includes identifying a set of applications compatible with a set of data. The applications and the data are untagged by corresponding metadata. The identifying step includes executing, by an execution platform, at least some of the applications in the set against at least some of the data in the set. The identifying step further includes analyzing, by a log analyzer, execution logs for executions of the at least some of the applications against the at least some of the data. The identifying step also includes indicating, by the log analyzer, a compatibility of the at least some of the applications to the at least some of the data by detecting compatibility relevant errors using the execution logs.
    Type: Application
    Filed: June 18, 2015
    Publication date: September 29, 2016
    Inventors: Keith W. Grueneberg, Bong Jun Ko, Jorge J. Ortiz, Theodoros Salonidis, Rahul Urgaonkar, Dinesh C. Verma, Xiping Wang
  • Publication number: 20160283521
    Abstract: A method and system are provided. The method includes identifying a set of applications compatible with a set of data. The applications and the data are untagged by corresponding metadata. The identifying step includes executing, by an execution platform, at least some of the applications in the set against at least some of the data in the set. The identifying step further includes analyzing, by a log analyzer, execution logs for executions of the at least some of the applications against the at least some of the data. The identifying step also includes indicating, by the log analyzer, a compatibility of the at least some of the applications to the at least some of the data by detecting compatibility relevant errors using the execution logs.
    Type: Application
    Filed: March 24, 2015
    Publication date: September 29, 2016
    Inventors: Keith W. Grueneberg, Bong Jun Ko, Jorge J. Ortiz, Theodoros Salonidis, Rahul Urgaonkar, Dinesh C. Verma, Xiping Wang
  • Patent number: 9451504
    Abstract: A processor-implemented method, apparatus, and/or computer program product move Open Systems Interconnection (OSI) layer 4 connections between wirelessly-connected user equipment to a series of cell-towers, wherein an OSI layer 4 connection is extracted out of the underlying cellular protocols at the series of cell-towers. A detection is made that user equipment, which has a broken-out layer 4 connection, has moved from a first cell-tower to a second cell-tower. Traffic for an existing layer 4 connection from the user equipment is tunnelled between the first cell-tower and the second cell-tower. A predetermined trigger event is identified. In response to the predetermined trigger event occurring, an ongoing bidirectional flow of data packets is migrated from the user equipment over to layer 4 connections maintained at the second cell-tower.
    Type: Grant
    Filed: January 3, 2013
    Date of Patent: September 20, 2016
    Assignee: International Business Machines Corporation
    Inventors: Bruce O. Anthony, Jr., Ronald L. Billau, Chatschik Bisdikian, Canio Cillis, Victor S. Moore, Erich M. Nahum, Robert B. Nicholson, Colin J. Thorne, Dinesh C. Verma
  • Patent number: 9450878
    Abstract: Traffic redirection methods include determining a quality-affective factor in a connection between a client and a server in a network; comparing the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; reconfiguring the network to redirect the connection to or away from a middlebox that performs the network processing function in accordance with the determination of whether the connection would benefit from the network processing function.
    Type: Grant
    Filed: August 21, 2012
    Date of Patent: September 20, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, William Cornejo, Thai F. Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma
  • Patent number: 9426076
    Abstract: Dynamic middleboxes include a network monitor module configured to determine a quality-affective factor in a connection between a client and a server in a network; a processor configured to compare the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; and a network control module configured to reconfigure the network to redirect the connection to a middlebox that performs the network processing function if the connection would benefit and further configured to reconfigure the network to exclude the middlebox from the connection if the connection would not benefit.
    Type: Grant
    Filed: September 11, 2012
    Date of Patent: August 23, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, William Cornejo, Thai F. Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma
  • Publication number: 20160239059
    Abstract: A portable computing system includes a portable computing device consisting essentially of a logical processor, a memory in communication with the logical processor with operating system software, a high speed, secure wireless communication module in communication with the logical processor, an integrated power source suitable to provide all power needs of the portable computing device and an integrated electric power generation mechanism in communication with the integrated power source power source to recharge the integrated power source. In addition a visual display is provided that has a power supply separate from the integrated power source of the portable computing device and a complementary wireless communication module, the portable visual display in communication with the high speed, secure wireless communication module through the complementary wireless communication module. The portable computing device and the visual display do not share a physical connection.
    Type: Application
    Filed: February 12, 2015
    Publication date: August 18, 2016
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shahrokh Daijavad, Alberto Valdes Garcia, Dinesh C. Verma, Bodhisatwa Sadhu, Kai Schleupin
  • Publication number: 20160241569
    Abstract: A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device. The communications network also sends a second content portion to the communications device, and this second content portion is customized for the user of the communications device based on selected information about the user that the communications network has. In one embodiment, the communications network uses the selected information about the user to customize the second content portion for the user, and sends the customized second content portion to the communications device. In an embodiment, the communications network sends the selected information to the content provider, and the content provider uses the selected information to customize the second content portion.
    Type: Application
    Filed: April 28, 2016
    Publication date: August 18, 2016
    Inventors: Dakshi Agrawal, Michael G. Hill, Sihyung Lee, Mudhakar Srivatsa, Dinesh C. Verma, Petros Zerfos, Joseph W. Ziskin