Patents by Inventor Koduvayur P. Subbalakshmi

Koduvayur P. Subbalakshmi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10548021
    Abstract: Various embodiments of systems, architecture, and/or methods are described for negotiating accesses to wireless spectrum of heterogeneous networks (e.g., Wifi, cellular 3G, cellular LTE, cellular 5G etc.) among multiple users, service providers, and services. As such, a software defined architecture is disclosed. In some embodiments, the disclosed software defined architecture can include establishing a (dedicated) logical control path from a central controller remotely located from an end device of a user. Such a logical control path is agnostic to the type and/or number of underlying wireless networks and is supplemental to conventionally known data paths, i.e., paths for exchanging data.
    Type: Grant
    Filed: May 21, 2018
    Date of Patent: January 28, 2020
    Assignee: MISRAM LLC
    Inventors: Vidya Sagar, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi
  • Publication number: 20180338247
    Abstract: Various embodiments of systems, architecture, and/or methods are described for negotiating accesses to wireless spectrum of heterogeneous networks (e.g., Wifi, cellular 3G, cellular LTE, cellular 5G etc.) among multiple users, service providers, and services. As such, a software defined architecture is disclosed. In some embodiments, the disclosed software defined architecture can include establishing a (dedicated) logical control path from a central controller remotely located from an end device of a user. Such a logical control path is agnostic to the type and/or number of underlying wireless networks and is supplemental to conventionally known data paths, i.e., paths for exchanging data.
    Type: Application
    Filed: May 21, 2018
    Publication date: November 22, 2018
    Inventors: Vidya SAGAR, Rajarathnam CHANDRAMOULI, Koduvayur P. SUBBALAKSHMI
  • Patent number: 9292493
    Abstract: An apparatus and method for determining whether text is deceptive has a computer programmed with software that automatically analyzes text in digital form by at least one of statistical analysis of psycho-linguistic cues, IP geo-location, gender analysis, authorship analysis, and analysis to detect coded/camouflaged messages. The computer has truth data against which the text message can be compared and a graphical user interface. The computer may be connectable to the Internet and may obtain the text automatically. Speech-to-text software may be used to convert verbal messages to text for analysis. The system may be made available on a webpage, web service, on a computer or by a wireless device. The text may be emails, website content, tweets. In one embodiment, the system detects coded messages.
    Type: Grant
    Filed: April 26, 2011
    Date of Patent: March 22, 2016
    Assignee: The Trustees of The Stevens Institute of Technology
    Inventors: Rajarathnam Chandramouli, Xiaoling Chen, Koduvayur P. Subbalakshmi, Rohan Perera
  • Patent number: 9116877
    Abstract: An apparatus and method for determining whether a text is deceptive may comprise analyzing a body of textual content known to be one of text containing true content and text containing deceptive content; identifying psycho-linguistic cues that are indicative of a text being deceptive; statistically analyzing, via a computing device, a given text based upon the psycho-linguistic cues to determine if the text is deceptive. The apparatus and method may further comprise weighting the psycho-linguistic cues and statistically analyzing based on the weighted psycho-linguistic cues. The statistically analyzing step may be performed using one of a cue matching analysis, a weighted cue matching analysis, a Markov chain analysis, and a sequential probability ratio testing binary hypothesis analysis. The psycho-linguistic cues may be separated into categories, including increasing trend cues and decreasing trend cues and analyzed according to presence in a category from within the categories.
    Type: Grant
    Filed: January 6, 2011
    Date of Patent: August 25, 2015
    Assignee: The Trustees of the Stevens Institute of Technology
    Inventors: Rajarathnam Chandramouli, Xiaoling Chen, Koduvayur P. Subbalakshmi
  • Patent number: 8555052
    Abstract: A steganographic message/advertisement embedding method is presented that can be used for contextual and targeted advertising supporting unobtrusive and on-demand message/advertisement delivery. The present invention presents over two client devices, the method includes receiving, on a first client device, a primary multimedia presentation with a plurality of steganographic codes embedded therein; whereby the steganographic code is not perceivable during a rendering of the multimedia presentation and the steganographic code is associated with at least one secondary multimedia presentation. Next; the primary multimedia presentation is rendered on the first client device. The first client device receives a user selection to select at least one of the steganographic codes.
    Type: Grant
    Filed: August 21, 2007
    Date of Patent: October 8, 2013
    Assignee: The Trustees of The Stevens Institute of Technology
    Inventors: Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi, Helena S. Wisniewski
  • Publication number: 20130138428
    Abstract: An apparatus and method for determining whether text is deceptive has a computer programmed with software that automatically analyzes text in digital form by at least one of statistical analysis of psycho-linguistic cues, IP geo-location, gender analysis, authorship analysis, and analysis to detect coded/camouflaged messages. The computer has truth data against which the text message can be compared and a graphical user interface. The computer may be connectable to the Internet and may obtain the text automatically. Speech-to-text software may be used to convert verbal messages to text for analysis. The system may be made available on a webpage, web service, on a computer or by a wireless device. The text may be emails, website content, tweets. In one embodiment, the system detects coded messages (FIG. 19).
    Type: Application
    Filed: April 26, 2011
    Publication date: May 30, 2013
    Applicant: The Trustees of the Stevens Institute of Technology
    Inventors: Rajarathnam Chandramouli, Xiaoling Chen, Koduvayur P. Subbalakshmi, Rohan Perera
  • Publication number: 20130046531
    Abstract: An apparatus and method for determining whether a text is deceptive may comprise analyzing a body of textual content known to be one of text containing true content and text containing deceptive content; identifying psycho-linguistic cues that are indicative of a text being deceptive; statistically analyzing, via a computing device, a given text based upon the psycho-linguistic cues to determine if the text is deceptive. The apparatus and method may further comprise weighting the psycho-linguistic cues and statistically analyzing based on the weighted psycho-linguistic cues. The statistically analyzing step may be performed using one of a cue matching analysis, a weighted cue matching analysis, a Markov chain analysis, and a sequential probability ratio testing binary hypothesis analysis. The psycho-linguistic cues may be separated into categories, including increasing trend cues and decreasing trend cues and analyzed according to presence in a category from within the categories.
    Type: Application
    Filed: January 6, 2011
    Publication date: February 21, 2013
    Applicant: THE TRUSTEES OF THE STEVENS INSTITUTE OF TECHNOLOGY
    Inventors: Rajarathnam Chandramouli, Xiaoling Chen, Koduvayur P. Subbalakshmi
  • Publication number: 20120254333
    Abstract: A method and apparatus for automatically identifying harmful electronic messages, such as those presented in emails, on Craigslist or on Twitter, Facebook and other social media websites, features methodology for discriminating unwanted garbage communications (spam) and unwanted deceptive messages (scam) from wanted, truthful communications based upon patterns discernable from samples of each type of electronic communication. Methods are proposed that enable discrimination of wanted from unwanted communications in short electronic messages, such as on Twitter and for multilingual application.
    Type: Application
    Filed: April 25, 2012
    Publication date: October 4, 2012
    Inventors: Rajarathnam Chandramouli, Xiaoling Chen, Koduvayur P. Subbalakshmi, Peng Hao, Na Cheng, Rohan Perera
  • Publication number: 20100325413
    Abstract: A steganographic message/advertisement embedding method is presented that can be used for contextual and targeted advertising supporting unobtrusive and on-demand message/advertisement delivery. The present invention presents over two client devices, the method includes receiving, on a first client device, a primary multimedia presentation with a plurality of steganographic codes embedded therein; whereby the steganographic code is not perceivable during a rendering of the multimedia presentation and the steganographic code is associated with at least one secondary multimedia presentation. Next; the primary multimedia presentation is rendered on the first client device. The first client device receives a user selection to select at least one of the steganographic codes.
    Type: Application
    Filed: August 21, 2007
    Publication date: December 23, 2010
    Inventors: Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi, Helena S. Wisniewski
  • Patent number: 7529384
    Abstract: A product and process for extracting hidden data from a stego-image that has been subjected to scaling attacks are disclosed. The hidden data extraction method of the present invention retains the one-to-one mapping of the stego-image blocks to the corresponding blocks in the scaled image. When the stego-image is scaled down, the block size for extracting the hidden data is reduced proportionally. When the stego-image is scaled up, the block size for extracting the hidden data is increased proportionally. The total overall number of blocks of pixels to be examined is kept constant between the scaled image and the stego-image. The hidden data extraction method can be combined with any existing block-DCT based data hiding method to provide an overall method for dealing with scaling attacks. Both the extraction method and the combined method can be implemented in software and stored within a machine-readable medium.
    Type: Grant
    Filed: August 10, 2005
    Date of Patent: May 5, 2009
    Assignee: The Trustees of Stevens Institute of Technology
    Inventors: Koduvayur P. Subbalakshmi, Palak K. Amin