Patents by Inventor Harjoben Singh

Harjoben Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10489715
    Abstract: The method includes identifying a log stream from a first device, wherein the first device is of an unknown device type. The method further includes identifying features in the log stream from the first device. The method further includes determining a probability that the log stream from the first device was created by a specific device type based on matching of features of the identified log stream from the first device and features in log streams from a plurality of known device types.
    Type: Grant
    Filed: June 2, 2015
    Date of Patent: November 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Tien Hiong Lee, Konstantin Levinski, Harjoben Singh, Weng Sing Tang
  • Patent number: 10489714
    Abstract: The method includes identifying a log stream from a first device, wherein the first device is of an unknown device type. The method further includes identifying features in the log stream from the first device. The method further includes determining a probability that the log stream from the first device was created by a specific device type based on matching of features of the identified log stream from the first device and features in log streams from a plurality of known device types.
    Type: Grant
    Filed: March 27, 2015
    Date of Patent: November 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Tien Hiong Lee, Konstantin Levinski, Harjoben Singh, Weng Sing Tang
  • Patent number: 9973521
    Abstract: Embodiments of the present invention disclose populating a database by conducting a training phase to analyze training security log streams. A server extracts the words contained within the training security log and replaces each of the extracted words with a symbol to form a symbol string and an n-gram scan is conducted on the symbol string to generate statistical data. Tokens are extracted from symbol string, where the tokens are words, phrase or alphanumeric sequence represented by a symbol within training security log stream. The symbol string is replaced with the words they represent to allow for the identification of the actual token phrases. A scan is conducted on the token phrase to acquire scan data on the identified token phrases. Once the tokens, position information, and scan data are known they are stored within the database to allow security log streams to be analyzed in real time.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: May 15, 2018
    Assignee: International Business Machines Corporation
    Inventors: Tien Hiong Lee, Konstantin Levinski, Xin Qian, Harjoben Singh, Weng Sing Tang
  • Patent number: 9922560
    Abstract: A first plurality of traffic data transmitted by a first client device associated with a first vehicle may be received. The received first plurality of traffic data may be stored in a database according to a license plate of the first vehicle. A second plurality of traffic data transmitted by a second client device associated with a second vehicle may be received. The license plate of the first vehicle may be identified within the received second plurality of traffic data using at least one image recognition technique. The identified license plate may be determined to be stored in the database. The first plurality of traffic data may be transmitted to the second client device based on determining the identified license plate is stored in the database. The transmitted first plurality of traffic data may be displayed within a user interface associated with the second client device.
    Type: Grant
    Filed: March 14, 2016
    Date of Patent: March 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Randy V. Kamajaya, Tien Hiong Lee, Konstantin Levinski, Harjoben Singh
  • Publication number: 20170263122
    Abstract: A first plurality of traffic data transmitted by a first client device associated with a first vehicle may be received. The received first plurality of traffic data may be stored in a database according to a license plate of the first vehicle. A second plurality of traffic data transmitted by a second client device associated with a second vehicle may be received. The license plate of the first vehicle may be identified within the received second plurality of traffic data using at least one image recognition technique. The identified license plate may be determined to be stored in the database. The first plurality of traffic data may be transmitted to the second client device based on determining the identified license plate is stored in the database. The transmitted first plurality of traffic data may be displayed within a user interface associated with the second client device.
    Type: Application
    Filed: March 14, 2016
    Publication date: September 14, 2017
    Inventors: Randy V. Kamajaya, Tien Hiong Lee, Konstantin Levinski, Harjoben Singh
  • Publication number: 20170187734
    Abstract: Embodiments of the present invention disclose populating a database by conducting a training phase to analyze training security log streams. A server extracts the words contained within the training security log and replaces each of the extracted words with a symbol to form a symbol string and an n-gram scan is conducted on the symbol string to generate statistical data. Tokens are extracted from symbol string, where the tokens are words, phrase or alphanumeric sequence represented by a symbol within training security log stream. The symbol string is replaced with the words they represent to allow for the identification of the actual token phrases. A scan is conducted on the token phrase to acquire scan data on the identified token phrases. Once the tokens, position information, and scan data are known they are stored within the database to allow security log streams to be analyzed in real time.
    Type: Application
    Filed: December 28, 2015
    Publication date: June 29, 2017
    Inventors: Tien Hiong Lee, Konstantin Levinski, XIN QIAN, Harjoben Singh, Weng Sing Tang
  • Publication number: 20160283854
    Abstract: The method includes identifying a log stream from a first device, wherein the first device is of an unknown device type. The method further includes identifying features in the log stream from the first device. The method further includes determining a probability that the log stream from the first device was created by a specific device type based on matching of features of the identified log stream from the first device and features in log streams from a plurality of known device types.
    Type: Application
    Filed: June 2, 2015
    Publication date: September 29, 2016
    Inventors: Tien Hiong Lee, Konstantin Levinski, Harjoben Singh, Weng Sing Tang
  • Publication number: 20160283853
    Abstract: The method includes identifying a log stream from a first device, wherein the first device is of an unknown device type. The method further includes identifying features in the log stream from the first device. The method further includes determining a probability that the log stream from the first device was created by a specific device type based on matching of features of the identified log stream from the first device and features in log streams from a plurality of known device types.
    Type: Application
    Filed: March 27, 2015
    Publication date: September 29, 2016
    Inventors: Tien Hiong Lee, Konstantin Levinski, Harjoben Singh, Weng Sing Tang