Patents by Inventor Dinesh C. Verma
Dinesh C. Verma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200213354Abstract: A GAN includes a first device and a second device. A discriminator model in the first device is trained to discriminate samples from a transmitter in the first device from samples from other transmitters, by collaborating by the first device with the second device to train the discriminator model to discriminate between samples from its transmitter and spoofed samples received from a generator model in the second device and to train the generator model in the second device to produce more accurate spoofed samples received by the first device during the training. The training results in a trained discriminator model, which is distributed to another device for use by the other device to discriminate samples received by the other device in order to perform authentication of the transmitter in the first device. The other device performs authentication of the transmitter of the first device using the distributed model.Type: ApplicationFiled: January 2, 2019Publication date: July 2, 2020Inventors: Supriyo CHAKRABORTY, Bodhisatwa SADHU, Bong Jun KO, Dinesh C. VERMA
-
Patent number: 10680953Abstract: A method and system are provided for controlling a volume of incoming traffic into a network having a plurality of ingress routers. The method includes monitoring respective loads of the plurality of ingress routers. The method further includes selecting a particular one of the plurality of ingress routers to receive future incoming traffic based on at least the respective loads of the plurality of ingress routers. The method also includes creating a mapping between an internal source IP address and a client IP address. The internal source IP address relates to the particular one of the plurality of routers. The client IP address is for a client device accessing the Internet through the network. The method additionally includes rewriting a destination IP address of the incoming traffic based on the mapping. At least the monitoring, selecting, and creating steps are performed by a controller.Type: GrantFiled: June 14, 2018Date of Patent: June 9, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Franck Le, Vasileios Pappas, Mudhakar Srivatsa, Dinesh C. Verma
-
Publication number: 20200175033Abstract: Embodiments of the invention are directed to a computer-implemented method for distributed decentralized matching. A non-limiting example of the computer-implemented method comprises transmitting, through a peer-to-peer network, a self-describing service request to a plurality of service provider nodes. The method further comprises receiving, from at least one service provider node, a service offer response. The method further comprises retrieving a compatible schema between the service client node and the service provider node. The method further comprises displaying a list of each service offer response to a service client.Type: ApplicationFiled: November 29, 2018Publication date: June 4, 2020Inventors: Venkat Raghavan, Dinesh C. Verma
-
Patent number: 10671316Abstract: A backup and archival policy method, system, and non-transitory computer readable medium, includes performing correlation analytics to determine identification of a backup policy aligned with a criticality of operational data and backup data including identifying low value backup data having a value less than a predetermined low value threshold, creating a one-time archival of the operational data and the backup data including the low value backup data, and removing the low value backup data from a future data protection policy.Type: GrantFiled: January 2, 2019Date of Patent: June 2, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Carmen P. Allen, Jarir Kamel Chaar, Bernhard Julius Klingenberg, Radha P. Ratnaparkhi, Robert Michael Rees, Ramani Ranjan Routray, Dinesh C. Verma
-
Publication number: 20200167677Abstract: A method includes training, using a first set of training data, to produce a machine learning model to generate an output based on an input. In an embodiment, the method includes training, using a second set of training data, to produce a second model to generate the output based on the input. In an embodiment, the method includes receiving a query to explain a decision-making process of the machine learning model. In an embodiment, the method includes producing, in response to the query, an explanation of the decision-making process of the second model.Type: ApplicationFiled: November 27, 2018Publication date: May 28, 2020Applicant: International Business Machines CorporationInventors: Dinesh C. Verma, Seraphin Bernard Calo, Supriyo Chakraborty
-
Publication number: 20200169528Abstract: In an embodiment, a method includes detecting a set of domain name system (DNS) requests from a device in an Internet of Things (IoT) network. In an embodiment, a method includes identifying a set of identification information associated with the set of DNS requests. In an embodiment, a method includes predicting, based on the set of identification information, a device type of the device. In an embodiment, a method includes determining, in response to predicting the device type, a network configuration setting for the device type. In an embodiment, a method includes reconfiguring, in response to determining a network configuration setting, a network configuration of the device.Type: ApplicationFiled: November 27, 2018Publication date: May 28, 2020Applicant: International Business Machines CorporationInventors: Thai Franck Le, Dinesh C. Verma, Dilip Dinkar Kandlur
-
Patent number: 10665251Abstract: An embodiment of the invention may include a method, computer program product and computer system for multi-modal anomaly detection. The method, computer program product and computer system may include computing device which may receive primary sensor data from a primary sensor for a first device and determining a baseline from the primary sensor data for the first device. The computing device may receive primary sensor data from a primary sensor and secondary sensor data from a secondary sensor for a second device. The computing device may determine an anomaly in the primary sensor data for the second device based on the determined baseline for the first device and compare the anomaly in the primary sensor data for the second device to the received secondary sensor data for the second device.Type: GrantFiled: February 27, 2019Date of Patent: May 26, 2020Assignee: International Business Machines CorporationInventors: David Alvra Wood, III, Dinesh C. Verma
-
Patent number: 10659558Abstract: A method, system and computer program product for transmitting content across a link in a communications network. In an embodiment, the method comprises examining traffic in the network at a sender end of the link to determine if the traffic is carrying compressed content; when the traffic is carrying compressed content, decompressing at least one portion of the compressed content; and checking a cache to determine if the cache has content matching the at least one decompressed portion of the content. In an embodiment, the method further comprises when the cache has content matching the at least one decompressed portion of the content, determining an identifier associated with the at least one decompressed portion of the content; and using the identifier to reconstruct, at a receiving end of the link, the at least one decompressed portion of the content.Type: GrantFiled: May 5, 2016Date of Patent: May 19, 2020Assignee: International Business Machines CorporationInventors: Dakshi Agrawal, Vasileios Pappas, Ramya Raghavendra, Mudhakar Srivatsa, Dinesh C. Verma, Ho Y. Wong
-
Publication number: 20200125739Abstract: Distributed machine learning employs a central fusion server that coordinates the distributed learning process. Preferably, each of set of learning agents that are typically distributed from one another initially obtains initial parameters for a model from the fusion server. Each agent trains using a dataset local to the agent. The parameters that result from this local training (for a current iteration) are then passed back to the fusion server in a secure manner, and a partial homomorphic encryption scheme is then applied. In particular, the fusion server fuses the parameters from all the agents, and it then shares the results with the agents for a next iteration. In this approach, the model parameters are secured using the encryption scheme, thereby protecting the privacy of the training data, even from the fusion server itself.Type: ApplicationFiled: October 19, 2018Publication date: April 23, 2020Applicant: International Business Machines CorporationInventors: Dinesh C. Verma, Supriyo Chakraborty, Changchang Liu
-
Patent number: 10623276Abstract: Techniques for monitoring and managing applications in an environment with distributed administrative domains (such as a micro-cloud environment) are provided. In one aspect, a method for managing an application in an environment with distributed administrative domains includes the steps of: identifying points in a life cycle of the application where communication is allowed between the distributed administrative domains; obtaining, by the provider, management specific information for the application at the points identified in the life cycle of the application where communication is allowed between the distributed administrative domains, wherein the obtaining is performed using a filtering script provided by the user and a management script provided by the provider to validate that the management specific information conforms to a predetermined information exchange criteria; and performing management functions using the management specific information.Type: GrantFiled: December 29, 2015Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Bongjun Ko, Christian Makaya, Jorge J. Ortiz, Dinesh C. Verma
-
Publication number: 20200082231Abstract: A computing system for learning a device type and message formats used by a device is provided. The computing system includes an interface and a processor. The interface is receptive of documents describing identification information and communication and application protocols of devices. The processor is coupled with the interface to obtain rules of network packet analysis using document analytics and identify identification information and communication and application protocols of network messages from devices using the rules.Type: ApplicationFiled: September 11, 2018Publication date: March 12, 2020Inventors: Seraphin B. Calo, Douglas M. Freimuth, Dilip D. Kandlur, Thai F. Le, Erich Nahum, Jorge J. Ortiz, Maroun Touma, Dinesh C. Verma
-
Patent number: 10579952Abstract: Technical solutions are described for transportation of a shipment container. An example method includes receiving, by a first client device, a document schema from a document schema server, the document schema corresponding to a second client device. The method further includes creating, by the first client device, an electronic document according to the document schema, the electronic document created for transmission to the second client device. The creating includes generating, by the first client device, the electronic document including data-fields as specified by the document schema, and filling the data-fields of the electronic document as specified by the document schema. The computer-implemented method also includes transmitting, by the first client device, the electronic document for receipt by the second client device.Type: GrantFiled: May 11, 2016Date of Patent: March 3, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Venkat Raghavan, Dinesh C. Verma
-
Publication number: 20200068398Abstract: A method is provided for transmitter authentication including generating a noise vector using a generative adversarial network generator model, wherein a signature of a first transmitter is embedded into a signal output by the first transmitter based at least on the noise vector; and using the signature to identify the first transmitter.Type: ApplicationFiled: August 24, 2018Publication date: February 27, 2020Inventors: SUPRIYO CHAKRABORTY, BODHISATWA SADHU, BONG JUN KO, DINESH C. VERMA
-
Patent number: 10558256Abstract: Techniques for power savings in communications equipment are provided. The computer-implemented method can comprise identifying, by an electronic device operatively coupled to a processing unit, one or more connectivity requirements of one or more servers associated with a data center. The computer-implemented method can also comprise determining, by the electronic device, a defined graph that satisfies the one or more connectivity requirements. The computer-implemented method can further comprise powering down, by the electronic device, one or more elements of the data center that are not required by the defined graph; and powering up, by the device one or more nodes of the data center, which are in any state other than power up, that are required by the defined graph.Type: GrantFiled: December 8, 2017Date of Patent: February 11, 2020Assignee: International Business Machines CorporationInventors: Hubertus Franke, Douglas M. Freimuth, David P. Olshefski, John M. Tracey, Dinesh C. Verma, Charles P. Wright
-
Patent number: 10545567Abstract: Techniques for power savings in communications equipment are provided. The computer-implemented method can comprise identifying, by an electronic device operatively coupled to a processing unit, one or more connectivity requirements of one or more servers associated with a data center. The computer-implemented method can also comprise determining, by the electronic device, a defined graph that satisfies the one or more connectivity requirements. The computer-implemented method can further comprise powering down, by the electronic device, one or more elements of the data center that are not required by the defined graph; and powering up, by the device one or more nodes of the data center, which are in any state other than power up, that are required by the defined graph.Type: GrantFiled: January 6, 2017Date of Patent: January 28, 2020Assignee: International Business Machines CorporationInventors: Hubertus Franke, Douglas M. Freimuth, David P. Olshefski, John M. Tracey, Dinesh C. Verma, Charles P. Wright
-
Patent number: 10534414Abstract: A portable computing system includes a portable computing device consisting essentially of a logical processor, a memory in communication with the logical processor with operating system software, a high speed, secure wireless communication module in communication with the logical processor, an integrated power source suitable to provide all power needs of the portable computing device and an integrated electric power generation mechanism in communication with the integrated power source to recharge the integrated power source. In addition a visual display is provided that has a power supply separate from the integrated power source of the portable computing device and a complementary wireless communication module, the portable visual display in communication with the high speed, secure wireless communication module through the complementary wireless communication module. The portable computing device and the visual display do not share a physical connection.Type: GrantFiled: February 12, 2015Date of Patent: January 14, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shahrokh Daijavad, Alberto Valdes Garcia, Dinesh C Verma, Bodhisatwa Sadhu, Kai Schleupen
-
Publication number: 20190394262Abstract: A method is provided of using a set of servers to provide deferential services that have a pre-negotiated time for notice to release the servers. The method includes defining a virtual checkpoint frame interval that is constrained to a duration of up to half of the pre-negotiated time for notice to release the servers. The method includes, responsive to an end of the interval, (i) writing, to a shared state database, a state of processing of the packets and transactions occurring during the interval that are processed by a current one of the servers, and (ii) releasing the packets and transactions occurring during the interval. The method includes copying the packets and transactions occurring during the interval, and the state, from the current server to another server for subsequent processing, responsive to an indication of an instance loss on the current server.Type: ApplicationFiled: September 5, 2019Publication date: December 26, 2019Inventors: Seraphin B. Calo, Douglas M. Freimuth, Franck V. Le, Maroun Touma, Dinesh C. Verma
-
Publication number: 20190369712Abstract: Techniques for power savings in communications equipment are provided. The computer-implemented method can comprise identifying, by an electronic device operatively coupled to a processing unit, one or more connectivity requirements of one or more servers associated with a data center. The computer-implemented method can also comprise determining, by the electronic device, a defined graph that satisfies the one or more connectivity requirements. The computer-implemented method can further comprise powering down, by the electronic device, one or more elements of the data center that are not required by the defined graph; and powering up, by the device one or more nodes of the data center, which are in any state other than power up, that are required by the defined graph.Type: ApplicationFiled: August 14, 2019Publication date: December 5, 2019Inventors: Hubertus Franke, Douglas M. Freimuth, David P. Olshefski, John M. Tracey, Dinesh C. Verma, Charles P. Wright
-
Publication number: 20190339763Abstract: Techniques for power savings in communications equipment are provided. The computer-implemented method can comprise identifying, by an electronic device operatively coupled to a processing unit, one or more connectivity requirements of one or more servers associated with a data center. The computer-implemented method can also comprise determining, by the electronic device, a defined graph that satisfies the one or more connectivity requirements. The computer-implemented method can further comprise powering down, by the electronic device, one or more elements of the data center that are not required by the defined graph; and powering up, by the device one or more nodes of the data center, which are in any state other than power up, that are required by the defined graph.Type: ApplicationFiled: July 16, 2019Publication date: November 7, 2019Inventors: Hubertus Franke, Douglas M. Freimuth, David P. Olshefski, John M. Tracey, Dinesh C. Verma, Charles P. Wright
-
Patent number: 10423914Abstract: Technical solutions are described for selecting components from multiple vendors for a system. An example computer-implemented method includes receiving, by a processor, an environment map that identifies a first component placeholder of the system. The computer-implemented method further includes identifying, by the processor, that the first component placeholder interfaces with a second component placeholder of the system. The computer-implemented method further includes determining, by the processor, a role assigned to the first component placeholder, where the role indicates a type of data that a first component at the first component placeholder communicates with a second component at the second component placeholder. The computer-implemented method further includes determining, by the processor, a list of components for selecting the first component, where each component from the list of components matches the role assigned to the first component placeholder.Type: GrantFiled: July 8, 2016Date of Patent: September 24, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shahrokh Daijavad, Nirmit V. Desai, Martin G. Kienzle, Theodoros Salonidis, Rahul Urgaonkar, Dinesh C. Verma