Patents by Inventor Gandhi Sivakumar

Gandhi Sivakumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10212278
    Abstract: Systems, methods and tools for leveraging computer networks, data sharing, data analytics and sentiment analysis to control the receipt of unwanted telephone calls and preventing unwanted telephone calls from disturbing a user through the implementation of contacts list and/or a shared table of unique calls. Contact lists and shared tables of unique calls may identify incoming calls that may be directed to the user or filtered out based on whether the incoming call's number is in the user's contact list and/or based on the past experiences of the individual users engaging with the incoming caller. Embodiments may track the past call durations for unique incoming number and track the sentiment of users during these calls and use the collected call data and sentiment determine whether subsequent incoming calls from a phone number should be forwarded to the user's telephone enabled device or automatically responded to with further instructions.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: February 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Geetha Adinarayan, Dinesh Radhakrishnan, Akshat Dixit, Gandhi Sivakumar
  • Publication number: 20190025939
    Abstract: An approach is provided that determines a user context that corresponds to a user of an information handling system. A number of predicted words are generated from various sources, with some of the words having a corresponding word-based context. The user context is compared to the word based context to identify at least one of the predicted words. The predicted words are displayed on a display device in a text messaging system utilized by the user, with the displayed word being selectable as a word to insert in a text message.
    Type: Application
    Filed: July 24, 2017
    Publication date: January 24, 2019
    Inventors: Kushal S. Patel, Sarvesh S. Patel, Mark A. Shewell, Gandhi Sivakumar
  • Publication number: 20190019506
    Abstract: Multi-turn conversation systems that are personalized to a user based on insights derived from big data are described. A computer-based conversation system for interacting with a user includes: a CPU, a computer readable memory, and a computer readable storage medium associated with a computer device; and program instructions defining a statement and question framer that is configured to: obtain insights about a user from a big data engine; and generate a response to an input from the user based on the insights and the input. The program instructions are stored on the computer readable storage medium for execution by the CPU via the computer readable memory.
    Type: Application
    Filed: July 14, 2017
    Publication date: January 17, 2019
    Inventors: Faried Abrahams, Lalit Agarwalla, Gandhi Sivakumar
  • Publication number: 20190019507
    Abstract: Multi-turn conversation systems that are personalized to a user based on insights derived from big data are described. A method includes: receiving, by a computer device, input from a user; obtaining, by the computer device, insights about the user; generating, by the computer device, a response based on the insights and the input; and outputting, by the computer device, the response.
    Type: Application
    Filed: December 15, 2017
    Publication date: January 17, 2019
    Inventors: Faried Abrahams, Lalit Agarwalla, Gandhi Sivakumar
  • Patent number: 10181333
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining speech based message data and biometric data of a speaker user of a messaging system, the speech based message data being input into a computer device by the speaker user and the biometric data indicating one or more aspect of a physical condition of the speaker user during the input of the speech based message data into the computer device; processing data to determine a truthfulness parameter of the speech based message data, the processing data to determine a truthfulness parameter including processing the biometric data; and associating the truthfulness parameter to the speech based message data, wherein the associating includes tagging the speech based message data with the truthfulness parameter.
    Type: Grant
    Filed: April 4, 2017
    Date of Patent: January 15, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James E. Bostick, John M. Ganci, Jr., Sarbajit Rakshit, Gandhi Sivakumar
  • Patent number: 10178294
    Abstract: Aspects of the present invention provide an approach for controlling an operation of a video capture device (e.g., in a cognitive robotic device). In an embodiment, a set of conditions is obtained using a cognitive computer system. Each of the obtained conditions includes a specific individual and a potential action that may be performed by the individual. The cognitive computer system analyzes video being captured by the video capture device to determine whether the video satisfies any of the set of conditions (e.g., the individual in the video is performing the action). If the cognitive computer system determines that one of the set of conditions has been satisfied, the operation of the video capture device (e.g., capture rate of the video) is modified to account for the satisfied condition.
    Type: Grant
    Filed: May 25, 2017
    Date of Patent: January 8, 2019
    Assignee: International Business Machines Corporation
    Inventors: Kristina Y. Choo, Rashida A. Hodge, Krishnan K. Ramachandran, Gandhi Sivakumar
  • Patent number: 10171291
    Abstract: A method, system, and/or computer program product establishes and utilizes a tenant-specific log for events related to a cloud-based service. A metamodel is created for a cloud-based service provided to a specific tenant of a cloud. The metamodel describes types of resources that are providing the cloud-based service that the specific tenant desires to monitor. In response to the cloud-based service being executed, the metamodel is used to identify a set of resources that are actually providing the cloud-based service for the specific tenant. A tenant-specific log is established to tracks events that occur on each actual resource from the set of resources, and records access to the specific unit of hardware by an authorized user of the specific unit of hardware. Operations related to the cloud-based service are transferred from the specific unit of hardware to a local device that is available only to the specific tenant.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Raman Harishankar, Cong-Tam Nguyen, Gandhi Sivakumar, Vijayaganesh Subramanian
  • Patent number: 10162952
    Abstract: Systems and methods for providing information security in a network environment are disclosed. The method includes initiating processing, invoked by a user, of at least one of a plurality of objects in a processing unit of a hardware layer, wherein the plurality of objects is hosted for a tenant. The method further includes determining that the processing of the at least one of the plurality of objects by the processing unit is authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes allowing the processing of the object based on a result of the determining.
    Type: Grant
    Filed: December 19, 2017
    Date of Patent: December 25, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bhushan P. Jain, Sandeep R. Patil, Sri Ramanathan, Gandhi Sivakumar, Matthew B. Trevathan, Wijayaratnam Wijayakumaran
  • Patent number: 10164828
    Abstract: A system, method and program product for managing profiles for devices in a network. A computer system is disclosed having a configuration management system for managing configuration profiles for a set of devices within a network, and includes: a boundary definition system that employs a computerized process for defining a plurality of geospatial boundaries; a device manager that employs a computerized process for interfacing with remote agents associated with respective devices to recognize when a device has migrated into a new geospatial boundary; and a profile management system that employs a computerized process for uploading an updated configuration profile to the remote agent in response to the device being migrated to the new geospatial boundary.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: December 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Shankar S. Kalyana, Jigneshkumar K. Karia, Gandhi Sivakumar
  • Patent number: 10158725
    Abstract: Embodiments of the present invention provide an approach for differentiated service identification/exposure in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, input model criteria will be generated. Such criteria may (among other things): identify service categories based on contextual bindings and domain centric functions; identify inter-service dependencies for a given business model (BPM); and/or provide dynamic validation of services to be exposed/identified. Embodiments of the present invention may further analyze service exposure criteria to provide efficient and accurate service exposure decisions as well as validation of the service exposure. This approach allows for consistent service exposure determinations based on decision histories of similarly (2-dimensional) aligned services in the past.
    Type: Grant
    Filed: October 27, 2015
    Date of Patent: December 18, 2018
    Assignee: International Business Machines Corporation
    Inventors: Nanjangud C. Narendra, Karthikeyan Ponnalagu, Gandhi Sivakumar
  • Publication number: 20180357414
    Abstract: A security control system for a kinematic robot uses a cognitive assessment agent to map proposed instructions to either legitimate or illegitimate actions based on contextual variables. The agent computes a security anomaly index score representing a variance of a likely kinematic action of the robot compared to acceptable actions. If the score exceeds a predetermined threshold, a security alert is generated for the robot's administrator. The contextual variables include a user profile, a user location, and subject matter of the kinematic actions. The analysis compares input text to predefined classification metadata, and can also compare verbal phrases or body gestures to corresponding baselines. Different numeric weights can be applied to the contextual variables. The computing begins with a default value for the score and thereafter increments or decrements the score based on the weights. The weights can be adjusted based on a supervisory appraisal of the computed score.
    Type: Application
    Filed: June 7, 2017
    Publication date: December 13, 2018
    Inventors: Amol A. Dhondse, Anand Pikle, Gandhi Sivakumar
  • Publication number: 20180357415
    Abstract: A security control system for a kinematic robot uses a cognitive assessment agent to map proposed instructions to either legitimate or illegitimate actions based on contextual variables. The agent computes a security anomaly index score representing a variance of a likely kinematic action of the robot compared to acceptable actions. If the score exceeds a predetermined threshold, a security alert is generated for the robot's administrator. The contextual variables include a user profile, a user location, and subject matter of the kinematic actions. The analysis compares input text to predefined classification metadata, and can also compare verbal phrases or body gestures to corresponding baselines. Different numeric weights can be applied to the contextual variables. The computing begins with a default value for the score and thereafter increments or decrements the score based on the weights. The weights can be adjusted based on a supervisory appraisal of the computed score.
    Type: Application
    Filed: November 2, 2017
    Publication date: December 13, 2018
    Inventors: Amol A. Dhondse, Anand Pikle, Gandhi Sivakumar
  • Publication number: 20180343376
    Abstract: Aspects of the present invention provide an approach for controlling an operation of a video capture device (e.g., in a cognitive robotic device). In an embodiment, a set of conditions is obtained using a cognitive computer system. Each of the obtained conditions includes a specific individual and a potential action that may be performed by the individual. The cognitive computer system analyzes video being captured by the video capture device to determine whether the video satisfies any of the set of conditions (e.g., the individual in the video is performing the action). If the cognitive computer system determines that one of the set of conditions has been satisfied, the operation of the video capture device (e.g., capture rate of the video) is modified to account for the satisfied condition.
    Type: Application
    Filed: May 25, 2017
    Publication date: November 29, 2018
    Inventors: Kristina Y. Choo, Rashida A. Hodge, Krishnan K. Ramachandran, Gandhi Sivakumar
  • Publication number: 20180343378
    Abstract: Aspects of the present invention provide an approach for controlling an operation of a video capture device (e.g., in a cognitive robotic device). In an embodiment, a set of conditions is obtained using a cognitive computer system. Each of the obtained conditions includes a specific individual and a potential action that may be performed by the individual. The cognitive computer system analyzes video being captured by the video capture device to determine whether the video satisfies any of the set of conditions (e.g., the individual in the video is performing the action). If the cognitive computer system determines that one of the set of conditions has been satisfied, the operation of the video capture device (e.g., capture rate of the video) is modified to account for the satisfied condition.
    Type: Application
    Filed: December 11, 2017
    Publication date: November 29, 2018
    Inventors: Kristina Y. Choo, Rashida A. Hodge, Krishnan K. Ramachandran, Gandhi Sivakumar
  • Publication number: 20180342093
    Abstract: A method for classifying and annotating an image includes: receiving, by a computer device and from a user interface, an input of an image; generating an annotation of the image, by the computer device, by passing the image to plural separate pipelines and tag libraries, wherein the plural separate pipelines and tag libraries include: a pipeline configured to classify and tag objects in the image; and a pipeline configured to tag kinematic aspects of the objects in the image; and outputting, by the computer device, the annotation to the user interface.
    Type: Application
    Filed: December 13, 2017
    Publication date: November 29, 2018
    Inventors: Kristina Y. Choo, Rashida A. Hodge, Krishnan K. Ramachandran, Gandhi Sivakumar
  • Publication number: 20180341655
    Abstract: A mapping is constructed between a node of a cultural hierarchy and a node of an organizational hierarchy. The cultural hierarchy is a data structure representing an arrangement of characteristics of different social levels relative to one another in a culture. The organizational hierarchy is a data structure representing an arrangement of characteristics of different roles of people relative to one another in a group. A set of cultural attributes is constructed to represent a persona of a human user according to mapping. Using a cultural attribute, an adjustment rule is selected from a library. A machine output is modified according to the adjustment rule. The machine output is in response to a dialog between a data processing system and human user in a machine-human interaction. The adjusted output is transformed and presented as a response to the human user in the machine-human interaction.
    Type: Application
    Filed: July 31, 2018
    Publication date: November 29, 2018
    Applicant: International Business Machines Corporation
    Inventors: Faried Abrahams, Amol A. Dhondse, Raman Harishankar, Anand Pikle, Gandhi Sivakumar
  • Publication number: 20180342092
    Abstract: A system for classifying and tagging digital images includes: a CPU, a computer readable memory, and a computer readable storage medium associated with a computer device; program instructions defining plural pipelines each configured to classify and tag aspects of the image, wherein a first one of the plural pipelines is configured to classify and tag an object in the image, and a second one of the plural pipelines is configured to classify and tag a kinematic aspect of the object in the image; program instructions defining a controller configured to: pass the image to each of the plural pipelines in a predefined order; and output an annotation of the image to a user interface. The program instructions are stored on the computer readable storage medium for execution by the CPU via the computer readable memory.
    Type: Application
    Filed: May 26, 2017
    Publication date: November 29, 2018
    Inventors: Kristina Y. Choo, Rashida A. Hodge, Krishnan K. Ramachandran, Gandhi Sivakumar
  • Publication number: 20180329971
    Abstract: A parallel track/sector switching device and associated method is provided. The method includes identifying data replication sources and locating data replication targets associated with the data replication sources. Data replication instances associated with moving data from the data replication sources to the data replication targets are determined. A first data replication instance for moving first data from a first data replication source to a first data replication target is determined and an antenna capacity associated with the first data replication source and the first data replication target is identified. A memory to track ID map associated with a storage device of the first data replication target is identified and it is determined if a last replication slot has been allotted to the first data replication target based on the memory to track ID map.
    Type: Application
    Filed: July 26, 2018
    Publication date: November 15, 2018
    Inventors: Faried Abrahams, Gandhi Sivakumar, Lennox E. Thomas
  • Publication number: 20180332449
    Abstract: The method include receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.
    Type: Application
    Filed: July 25, 2018
    Publication date: November 15, 2018
    Inventors: Geetha Adinarayan, Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai
  • Patent number: 10114968
    Abstract: Embodiments include method, systems and computer program products for proximity based content security. Aspects include receiving a request to access a secured data by a user device; accessing, by a processor, a security profile for the secured data; obtaining environmental data from one or more sensors related to the user device, wherein a type of the one or more sensors is determined by the security profile; and providing access to the secured data based upon a determination that the environmental data is in compliance with the security profile.
    Type: Grant
    Filed: February 19, 2016
    Date of Patent: October 30, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Amol A. Dhondse, Anand Pikle, Laura I. Rusu, Gandhi Sivakumar