Patents by Inventor Dinesh C. Verma

Dinesh C. Verma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180295061
    Abstract: A method and system are provided for controlling a volume of incoming traffic into a network having a plurality of ingress routers. The method includes monitoring respective loads of the plurality of ingress routers. The method further includes selecting a particular one of the plurality of ingress routers to receive future incoming traffic based on at least the respective loads of the plurality of ingress routers. The method also includes creating a mapping between an internal source IP address and a client IP address. The internal source IP address relates to the particular one of the plurality of routers. The client IP address is for a client device accessing the Internet through the network. The method additionally includes rewriting a destination IP address of the incoming traffic based on the mapping. At least the monitoring, selecting, and creating steps are performed by a controller.
    Type: Application
    Filed: June 14, 2018
    Publication date: October 11, 2018
    Inventors: Franck Le, Vasileios Pappas, Mudhakar Srivatsa, Dinesh C. Verma
  • Patent number: 10097510
    Abstract: The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of methods and/or algorithms.
    Type: Grant
    Filed: August 14, 2013
    Date of Patent: October 9, 2018
    Assignee: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Bong Jun Ko, Thai Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh C. Verma
  • Patent number: 10085157
    Abstract: Techniques for reconfiguring mobile networks based on network state information are provided. In one aspect, a method for managing a mobile network is provided. The method includes the steps of: gathering network state information from an edge of the mobile network, wherein the edge of the mobile network includes a radio network and a cellular network through which user equipment communicate with an internet protocol (IP) network which is at a core of the mobile network; analyzing the network state information based on policy controls to determine actions for optimizing the mobile network; and reconfiguring the mobile network using the actions for optimizing the mobile network. A system for managing a mobile network is also provided.
    Type: Grant
    Filed: June 18, 2015
    Date of Patent: September 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Shahrokh Daijavad, Bijan Davari, Brian P. Naughton, Dinesh C. Verma
  • Publication number: 20180241806
    Abstract: A method includes configuring worker services to operate in a stateless manner and providing support services that enable the worker services to operate in the stateless manner. The support services include (i) a management service for providing notifications of server removal and addition, (ii) a state maintenance service for maintaining state information in a central location, and (iii) a load balancer service for distributing requests among worker services. The method includes altering a number of servers allocated to at least one worker service, responsive to a notification from the management service. A private protocol is used between the worker services and toad balancer service (a) to send, from the worker services to the load balancer service, a respective pointer to the state information associated with the requests, and (b) to include the respective pointer in the requests when any of the requests are forwarded to any worker service.
    Type: Application
    Filed: February 22, 2017
    Publication date: August 23, 2018
    Inventors: Seraphin B. Calo, Douglas M. Freimuth, Franck V. Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma
  • Publication number: 20180241807
    Abstract: A method includes configuring worker services to operate in a stateless manner and providing support services that enable the worker services to operate in the stateless manner. The support services include (i) a management service for providing notifications of server removal and addition, (ii) a state maintenance service for maintaining state information in a central location, and (iii) a load balancer service for distributing requests among worker services. The method includes altering a number of servers allocated to at least one worker service, responsive to a notification from the management service. A private protocol is used between the worker services and load balancer service (a) to send, from the worker services to the load balancer service, a respective pointer to the state information associated with the requests, and (b) to include the respective pointer in the requests when any of the requests are forwarded to any worker service.
    Type: Application
    Filed: November 8, 2017
    Publication date: August 23, 2018
    Inventors: Seraphin B. Calo, Douglas M. Freimuth, Franck V. Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma
  • Publication number: 20180241804
    Abstract: A method is provided of using a set of servers to provide deferential services that have a pre-negotiated time for notice to release the servers. The method includes defining a virtual checkpoint frame interval that is constrained to a duration of up to half of the pre-negotiated time for notice to release the servers. The method includes collecting packets and transactions occurring during the interval that are processed by a current server. The method includes, responsive to an end of the interval, (i) writing, to a shared state database, a state of processing of the packets and transactions occurring during the interval, and (ii) releasing the packets and transactions occurring during the interval. The method includes copying the packets and transactions occurring during the interval, and the state, from the current server to another server for subsequent processing, responsive to an indication of an instance loss on the current server.
    Type: Application
    Filed: November 8, 2017
    Publication date: August 23, 2018
    Inventors: Seraphin B. Calo, Douglas M. Freimuth, Franck V. Le, Maroun Touma, Dinesh C. Verma
  • Publication number: 20180241803
    Abstract: A method is provided of using a set of servers to provide deferential services that have a pre-negotiated time for notice to release the servers. The method includes defining a virtual checkpoint frame interval that is constrained to a duration of up to half of the pre-negotiated time for notice to release the servers. The method includes collecting packets and transactions occurring during the interval that are processed by a current server. The method includes, responsive to an end of the interval, (i) writing, to a shared state database, a state of processing of the packets and transactions occurring during the interval, and (ii) releasing the packets and transactions occurring during the interval. The method includes copying the packets and transactions occurring during the interval, and the state, from the current server to another server for subsequent processing, responsive to an indication of an instance loss on the current server.
    Type: Application
    Filed: February 22, 2017
    Publication date: August 23, 2018
    Inventors: Seraphin B. Calo, Douglas M. Freimuth, Franck V. Le, Maroun Touma, Dinesh C. Verma
  • Publication number: 20180225357
    Abstract: An approach for self-improving classification. The approach receives sensor data of a machine, wherein the sensor data is collected during operation of the machine. The approach defines one or more categories, wherein each category of the one or more categories is associated with one or more parameters. The approach determines whether the sensor data matches one or more parameters of a first category of the one or more categories. Responsive to a determination that the sensor data matches the one or more parameters of the first category, the approach classifies the sensor data into the first category. The approach applies a first category label to the sensor data, wherein the first category label is associated with the first category.
    Type: Application
    Filed: February 15, 2018
    Publication date: August 9, 2018
    Inventors: Nancy A. Greco, Bong Jun Ko, Maroun Touma, Dinesh C. Verma, David A. Wood
  • Publication number: 20180225355
    Abstract: An approach for self-improving classification. The approach receives sensor data of a machine, wherein the sensor data is collected during operation of the machine. The approach defines one or more categories, wherein each category of the one or more categories is associated with one or more parameters. The approach determines whether the sensor data matches one or more parameters of a first category of the one or more categories. Responsive to a determination that the sensor data matches the one or more parameters of the first category, the approach classifies the sensor data into the first category. The approach applies a first category label to the sensor data, wherein the first category label is associated with the first category.
    Type: Application
    Filed: February 7, 2017
    Publication date: August 9, 2018
    Inventors: Nancy A. Greco, Bong Jun Ko, Maroun Touma, Dinesh C. Verma, David A. Wood
  • Publication number: 20180196498
    Abstract: Techniques for power savings in communications equipment are provided. The computer-implemented method can comprise identifying, by an electronic device operatively coupled to a processing unit, one or more connectivity requirements of one or more servers associated with a data center. The computer-implemented method can also comprise determining, by the electronic device, a defined graph that satisfies the one or more connectivity requirements. The computer-implemented method can further comprise powering down, by the electronic device, one or more elements of the data center that are not required by the defined graph; and powering up, by the device one or more nodes of the data center, which are in any state other than power up, that are required by the defined graph.
    Type: Application
    Filed: December 8, 2017
    Publication date: July 12, 2018
    Inventors: Hubertus Franke, Douglas M. Freimuth, David P. Olshefski, John M. Tracey, Dinesh C. Verma, Charles P. Wright
  • Publication number: 20180196496
    Abstract: Techniques for power savings in communications equipment are provided. The computer-implemented method can comprise identifying, by an electronic device operatively coupled to a processing unit, one or more connectivity requirements of one or more servers associated with a data center. The computer-implemented method can also comprise determining, by the electronic device, a defined graph that satisfies the one or more connectivity requirements. The computer-implemented method can further comprise powering down, by the electronic device, one or more elements of the data center that are not required by the defined graph; and powering up, by the device one or more nodes of the data center, which are in any state other than power up, that are required by the defined graph.
    Type: Application
    Filed: January 6, 2017
    Publication date: July 12, 2018
    Inventors: Hubertus Franke, Douglas M. Freimuth, David P. Olshefski, John M. Tracey, Dinesh C. Verma, Charles P. Wright
  • Patent number: 10021028
    Abstract: A method and system are provided for controlling a volume of incoming traffic into a network having a plurality of ingress routers. The method includes monitoring respective loads of the plurality of ingress routers. The method further includes selecting a particular one of the plurality of ingress routers to receive future incoming traffic based on at least the respective loads of the plurality of ingress routers. The method also includes creating a mapping between an internal source IP address and a client IP address. The internal source IP address relates to the particular one of the plurality of routers. The client IP address is for a client device accessing the Internet through the network. The method additionally includes rewriting a destination IP address of the incoming traffic based on the mapping. At least the monitoring, selecting, and creating steps are performed by a controller.
    Type: Grant
    Filed: June 16, 2014
    Date of Patent: July 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Franck Le, Vasileios Pappas, Mudhakar Srivatsa, Dinesh C. Verma
  • Publication number: 20180143912
    Abstract: In an aspect of the present disclosure, a method is disclosed including receiving first transaction data from a first trusted party that includes a first pending transaction between the first trusted party and a second trusted party and a second pending transaction between the first trusted party and an un-trusted party. The method further includes receiving second transaction data from the second trusted party that includes a third pending transaction between the second trusted party and the un-trusted party. The method further includes analyzing the first and second transaction data to determine whether more than one trusted party has a pending transaction with the same un-trusted party, determining that the first trusted party and the second trusted party each have a pending transaction with the un-trusted party, and modifying the first pending transaction, the second pending transaction, and the third pending transaction. The modification includes removing the third pending transaction.
    Type: Application
    Filed: November 3, 2017
    Publication date: May 24, 2018
    Inventors: Raghu K. Ganti, Mudhakar Srivatsa, Dinesh C. Verma
  • Publication number: 20180144151
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Application
    Filed: January 22, 2018
    Publication date: May 24, 2018
    Inventors: SERAPHIN B. CALO, BONG JUN KO, KANG-WON LEE, THEODOROS SALONIDIS, DINESH C. VERMA
  • Publication number: 20180121858
    Abstract: Embodiments include methods, systems, and computer program products for scheduling service personnel. Aspects include obtaining observational data for a plurality of service individuals. Aspects also include developing a personality profile for each of the plurality of service individuals based on the observational data. Aspects include receiving a service request from a customer. Then, aspects include obtaining attribute data about the customer to determine one or more inferred personality traits of the customer and analyzing the one or more personality traits of the customer and the personality profile of each of the plurality of service individuals to determine a personality matching score for each of the plurality of service individuals.
    Type: Application
    Filed: October 28, 2016
    Publication date: May 3, 2018
    Inventors: DOUGLAS M. FREIMUTH, BONG JUN KO, DINESH C. VERMA, SHIQIANG WANG
  • Patent number: 9942908
    Abstract: Techniques for resource sharing among wireless service providers in a wireless network cloud (WNC) are provided. In one aspect, a method for spectrum sharing in a WNC that hosts multiple wireless service providers is provided. The method includes the following steps. A spectrum usage is predicted for each of the wireless service providers during a given future time-window. An excess amount of spectrum, if any, each of the wireless service providers will have during the given time-window is determined. The excess amount of spectrum is allocated from the wireless service providers having the excess amount of spectrum to those of the wireless service providers having a spectrum usage that will exceed an allocated spectrum capacity during the given time-window.
    Type: Grant
    Filed: August 6, 2013
    Date of Patent: April 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Dinesh C. Verma, Murtaza Zafer
  • Patent number: 9942907
    Abstract: Techniques for resource sharing among wireless service providers in a wireless network cloud (WNC) are provided. In one aspect, a method for spectrum sharing in a WNC that hosts multiple wireless service providers is provided. The method includes the following steps. A spectrum usage is predicted for each of the wireless service providers during a given future time-window. An excess amount of spectrum, if any, each of the wireless service providers will have during the given time-window is determined. The excess amount of spectrum is allocated from the wireless service providers having the excess amount of spectrum to those of the wireless service providers having a spectrum usage that will exceed an allocated spectrum capacity during the given time-window.
    Type: Grant
    Filed: April 10, 2013
    Date of Patent: April 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Dinesh C. Verma, Murtaza Zafer
  • Publication number: 20180097686
    Abstract: A downstream element in a pipeline processing a network flow receives a first request and executes an indexing function to compute an index into a control block for storing state information associated with the data packet. The downstream element transmits a request to an upstream element to include the index as a tag in one or more subsequent data packets that comprises the plurality of network fields and the associated values. Subsequent data packet may be received at the downstream element with the tag having the index information. The downstream element may process the subsequent data packet based on the tag without having to execute the indexing function on the subsequent data packet.
    Type: Application
    Filed: October 5, 2016
    Publication date: April 5, 2018
    Inventors: Hubertus Franke, Douglas M. Freimuth, David P. Olshefski, John M. Tracey, Dinesh C. Verma, Charles P. Wright
  • Patent number: 9934397
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: April 3, 2018
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Bong Jun Ko, Kang-Won Lee, Theodoros Salonidis, Dinesh C. Verma
  • Publication number: 20180089205
    Abstract: Performing a search to locate a set of candidate providers within a current context. An inventory associates each of a respective plurality of providers with a corresponding context of a plurality of contexts, a corresponding temporally defined dynamic state, and a corresponding set of static attributes. The inventory is searched to identify providers that are associated with the current context. The corresponding temporally defined dynamic state and the corresponding set of static attributes that are associated with each of the identified providers is retrieved. A query comprising a target temporally defined dynamic state and a target static attribute is received. A filtered set of providers is identified which satisfies the target static attribute. Each of the corresponding temporally defined dynamic states are compared with the target temporally defined state to determine a corresponding matching closeness level for each provider of the filtered set.
    Type: Application
    Filed: September 27, 2016
    Publication date: March 29, 2018
    Inventors: Gopal Soora, Dinesh C. Verma