Patents by Inventor Krishnan Sugavanam
Krishnan Sugavanam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12100246Abstract: A computer-implemented method for obfuscating sensitive information associated with mail delivery is disclosed. The computer-implemented method includes identifying that a piece of mail directed towards a potential recipient includes a particular type of sensitive information. The computer-implemented method further includes selecting a mail obfuscation policy for the particular type of sensitive information based on the particular type of sensitive information. The computer-implemented method further includes performing an obfuscation action with respect to the particular type of sensitive information based on the selected mail obfuscation policy.Type: GrantFiled: September 27, 2021Date of Patent: September 24, 2024Assignee: International Business Machines CorporationInventors: Uri Kartoun, Aris Gkoulalas-Divanis, Sophie Batchelder, Krishnan Sugavanam
-
Publication number: 20240195807Abstract: According to one embodiment, a method, computer system, and computer program product for user authentication. The embodiment may include receiving, at an authentication server, respective multiple location coordinates from first and second registered devices. Storing, on the authentication server, respective moving windows comprising registered, device specific, last n location coordinates from the first and the second registered devices. Receiving a request to access the authentication server via the first registered device. The request comprises log-in credentials of a user and a first hash value calculated at the first registered device. Computing, at the authentication server, a second hash value using a set of the last n location coordinates from each of the respective moving windows. Comparing the first hash value and the second hash value. In response to the first and the second hash values being equal, and the log-in credentials being verified, granting access to the authentication server.Type: ApplicationFiled: April 19, 2023Publication date: June 13, 2024Inventors: Krishnan Sugavanam, ARIS GKOULALAS-DIVANIS, Sophie Batchelder, Uri Kartoun
-
Publication number: 20240056455Abstract: According to one embodiment, a method, computer system, and computer program product for user authentication. The embodiment may include receiving, from a first device, multiple location coordinates of the first device. The embodiment may include storing, on a second device, a second moving window comprising last n location coordinates of the multiple location coordinates. The embodiment may include receiving, from the first device, a request to access the second device, wherein the request comprises log-in credentials and a first hash value. The embodiment may include computing, on the second device, a second hash value based on the second moving window. The embodiment may include verifying the log-in credentials. The embodiment may include comparing the first hash value and the second hash value. In response to the first and the second hash values being equal, and the log-in credentials being verified, the embodiment may include granting access.Type: ApplicationFiled: April 19, 2023Publication date: February 15, 2024Inventors: Krishnan Sugavanam, ARIS GKOULALAS-DIVANIS, Sophie Batchelder, Uri Kartoun
-
Patent number: 11860946Abstract: A computer-implemented method includes: receiving, by a computing device, text extracted from a webpage in a browser and a Uniform Resource Locator (URL) of a linked webpage associated with the text; generating, by the computing device, questions based on the text; retrieving, by the computing device, content of the linked webpage using the URL; generating, by the computing device, answers to the questions using the retrieved content; and returning, by the computing device, the questions and the answers to the browser such that the browser displays the questions and the answers in the webpage.Type: GrantFiled: January 11, 2022Date of Patent: January 2, 2024Assignee: KYNDRYL, INC.Inventors: Michael Seth Silverstein, Zachary A. Silverstein, Jayanth Krishnan, Krishnan Sugavanam
-
Publication number: 20230283688Abstract: A computer-implemented method including: displaying, by a mobile device, a push notification from an application of the mobile device; determining, by the mobile device, an associated notification parameter for the push notification; receiving, by the mobile device, a user input by a user of the mobile device; determining, by the mobile device, the user input indicates interest in the push notification; and maintaining, by the mobile device, presence of the push notification on a display of the mobile device based on determining the user input indicates interest in the push notification and the associated notification parameter.Type: ApplicationFiled: March 3, 2022Publication date: September 7, 2023Inventors: Michael Seth SILVERSTEIN, Zachary A. SILVERSTEIN, Jayanth KRISHNAN, Krishnan SUGAVANAM
-
Publication number: 20230222164Abstract: A computer-implemented method includes: receiving, by a computing device, text extracted from a webpage in a browser and a Uniform Resource Locator (URL) of a linked webpage associated with the text; generating, by the computing device, questions based on the text; retrieving, by the computing device, content of the linked webpage using the URL; generating, by the computing device, answers to the questions using the retrieved content; and returning, by the computing device, the questions and the answers to the browser such that the browser displays the questions and the answers in the webpage.Type: ApplicationFiled: January 11, 2022Publication date: July 13, 2023Inventors: Michael Seth Silverstein, Zachary A. Silverstein, Jayanth Krishnan, Krishnan Sugavanam
-
Patent number: 11675602Abstract: Embodiments for managing a computing system are provided. A Root-of-Trust (RoT) device within the computing system is caused to boot. The computing system includes at least one peripheral device, and the RoT device is in operable communication with the at least one peripheral device and a management server. The at least one peripheral device is caused to at least partially boot. The RoT device is caused to retrieve a firmware image associated with the at least one peripheral device from the management server. The at least one peripheral device is caused to reboot utilizing the firmware image.Type: GrantFiled: July 28, 2021Date of Patent: June 13, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sandhya Koteshwara, Krishnan Sugavanam, Dong Chen
-
Publication number: 20230094317Abstract: A computer-implemented method for obfuscating sensitive information associated with mail delivery is disclosed. The computer-implemented method includes identifying that a piece of mail directed towards a potential recipient includes a particular type of sensitive information. The computer-implemented method further includes selecting a mail obfuscation policy for the particular type of sensitive information based on the particular type of sensitive information. The computer-implemented method further includes performing an obfuscation action with respect to the particular type of sensitive information based on the selected mail obfuscation policy.Type: ApplicationFiled: September 27, 2021Publication date: March 30, 2023Inventors: Uri Kartoun, Aris Gkoulalas-Divanis, Sophie Batchelder, Krishnan Sugavanam
-
Publication number: 20230033667Abstract: Embodiments for managing a computing system are provided. A Root-of-Trust (RoT) device within the computing system is caused to boot. The computing system includes at least one peripheral device, and the RoT device is in operable communication with the at least one peripheral device and a management server. The at least one peripheral device is caused to at least partially boot. The RoT device is caused to retrieve a firmware image associated with the at least one peripheral device from the management server. The at least one peripheral device is caused to reboot utilizing the firmware image.Type: ApplicationFiled: July 28, 2021Publication date: February 2, 2023Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sandhya KOTESHWARA, Krishnan SUGAVANAM, Dong CHEN
-
Publication number: 20220413690Abstract: A computer-implemented method for organizing tasks presented on a graphical user interface of a computer hardware system for a user includes the following operations. An electronic message associated with a collaborative messaging application executing with the computer hardware system is received. A first collaboration having one or more collaborative tasks is identified from the electronic message. A need-for-action, a time-to-act, and a time-to-complete are determined for the first collaboration. A moving average for the first collaboration is adjusted based upon the need-for-action, the time-to-action, and a time-to-complete. The presentation of the first collaboration within the graphical user interface is altered based upon the moving average.Type: ApplicationFiled: June 24, 2021Publication date: December 29, 2022Inventors: Keith Kaplan, Jayanth Krishnan, Paul R. Bastide, Krishnan Sugavanam
-
Publication number: 20220269830Abstract: A method secures a computer display. One or more processors detect whether there is a presence of an authorized portable device proximate to the computer display. Based on what the processor(s) detect, the processor(s) apply a rule, which is based on one or more portable devices being proximate to the computer display, to selectively continue or end a current session on the computer display.Type: ApplicationFiled: February 24, 2021Publication date: August 25, 2022Inventors: URI KARTOUN, KRISHNAN SUGAVANAM, JAYANTH KRISHNAN, ARIS GKOULALAS-DIVANIS
-
Patent number: 11409918Abstract: Described is a baseboard management controller (BMC). The BMC comprises a BMC flash storage storing firmware and an access permission table. The access permission table defines an access control policy for access requests to peripherals communicatively coupled to the BMC. The BMC further comprises an access control chip comprising one or more processors and a write-once memory. The write-once memory stores a copy of the access permission table. The access control chip is configured to manage access to the peripherals using the access permission table.Type: GrantFiled: April 28, 2021Date of Patent: August 9, 2022Assignee: International Business Machines CorporationInventors: Krishnan Sugavanam, Sandhya Koteshwara, Dong Chen
-
Patent number: 9971713Abstract: A Multi-Petascale Highly Efficient Parallel Supercomputer of 100 petaflop-scale includes node architectures based upon System-On-a-Chip technology, where each processing node comprises a single Application Specific Integrated Circuit (ASIC). The ASIC nodes are interconnected by a five dimensional torus network that optimally maximize the throughput of packet communications between nodes and minimize latency. The network implements collective network and a global asynchronous network that provides global barrier and notification functions. Integrated in the node design include a list-based prefetcher. The memory system implements transaction memory, thread level speculation, and multiversioning cache that improves soft error rate at the same time and supports DMA functionality allowing for parallel processing message-passing.Type: GrantFiled: April 30, 2015Date of Patent: May 15, 2018Assignee: GLOBALFOUNDRIES INC.Inventors: Sameh Asaad, Ralph E. Bellofatto, Michael A. Blocksome, Matthias A. Blumrich, Peter Boyle, Jose R. Brunheroto, Dong Chen, Chen-Yong Cher, George L. Chiu, Norman Christ, Paul W. Coteus, Kristan D. Davis, Gabor J. Dozsa, Alexandre E. Eichenberger, Noel A. Eisley, Matthew R. Ellavsky, Kahn C. Evans, Bruce M. Fleischer, Thomas W. Fox, Alan Gara, Mark E. Giampapa, Thomas M. Gooding, Michael K. Gschwind, John A. Gunnels, Shawn A. Hall, Rudolf A. Haring, Philip Heidelberger, Todd A. Inglett, Brant L. Knudson, Gerard V. Kopcsay, Sameer Kumar, Amith R. Mamidala, James A. Marcella, Mark G. Megerian, Douglas R. Miller, Samuel J. Miller, Adam J. Muff, Michael B. Mundy, John K. O'Brien, Kathryn M. O'Brien, Martin Ohmacht, Jeffrey J. Parker, Ruth J. Poole, Joseph D. Ratterman, Valentina Salapura, David L. Satterfield, Robert M. Senger, Burkhard Steinmacher-Burow, William M. Stockdell, Craig B. Stunkel, Krishnan Sugavanam, Yutaka Sugawara, Todd E. Takken, Barry M. Trager, James L. Van Oosten, Charles D. Wait, Robert E. Walkup, Alfred T. Watson, Robert W. Wisniewski, Peng Wu
-
Patent number: 9390038Abstract: Embodiments include a method for bypassing data in an active memory device. The method includes a requestor determining a number of transfers to a grantor that have not been communicated to the grantor, requesting to the interconnect network that the bypass path be used for the transfers based on the number of transfers meeting a threshold and communicating the transfers via the bypass path to the grantor based on the request, the interconnect network granting control of the grantor in response to the request. The method also includes the interconnect network requesting control of the grantor based on an event and communicating delayed transfers via the interconnect network from other requestors, the delayed transfers being delayed due to the grantor being previously controlled by the requestor, the communicating based on the control of the grantor being changed back to the interconnect network.Type: GrantFiled: August 14, 2013Date of Patent: July 12, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bruce M. Fleischer, Thomas W. Fox, Hans M. Jacobson, Ravi Nair, Martin Ohmacht, Krishnan Sugavanam
-
Patent number: 9298654Abstract: Embodiments include a method for bypassing data in an active memory device. The method includes a requestor determining a number of transfers to a grantor that have not been communicated to the grantor, requesting to the interconnect network that the bypass path be used for the transfers based on the number of transfers meeting a threshold and communicating the transfers via the bypass path to the grantor based on the request, the interconnect network granting control of the grantor in response to the request. The method also includes the interconnect network requesting control of the grantor based on an event and communicating delayed transfers via the interconnect network from other requestors, the delayed transfers being delayed due to the grantor being previously controlled by the requestor, the communicating based on the control of the grantor being changed back to the interconnect network.Type: GrantFiled: March 15, 2013Date of Patent: March 29, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bruce M. Fleischer, Thomas W. Fox, Hans M. Jacobson, Ravi Nair, Martin Ohmacht, Krishnan Sugavanam
-
Publication number: 20160011996Abstract: A Multi-Petascale Highly Efficient Parallel Supercomputer of 100 petaflop-scale includes node architectures based upon System-On-a-Chip technology, where each processing node comprises a single Application Specific Integrated Circuit (ASIC). The ASIC nodes are interconnected by a five dimensional torus network that optimally maximize the throughput of packet communications between nodes and minimize latency. The network implements collective network and a global asynchronous network that provides global barrier and notification functions. Integrated in the node design include a list-based prefetcher. The memory system implements transaction memory, thread level speculation, and multiversioning cache that improves soft error rate at the same time and supports DMA functionality allowing for parallel processing message-passing.Type: ApplicationFiled: April 30, 2015Publication date: January 14, 2016Inventors: Sameh Asaad, Ralph E. Bellofatto, Michael A. Blocksome, Matthias A. Blumrich, Peter Boyle, Jose R. Brunheroto, Dong Chen, Chen-Yong Cher, George L. Chiu, Norman Christ, Paul W. Coteus, Kristan D. Davis, Gabor J. Dozsa, Alexandre E. Eichenberger, Noel A. Eisley, Matthew R. Ellavsky, Kahn C. Evans, Bruce M. Fleischer, Thomas W. Fox, Alan Gara, Mark E. Giampapa, Thomas M. Gooding, Michael K. Gschwind, John A. Gunnels, Shawn A. Hall, Rudolf A. Haring, Philip Heidelberger, Todd A. Inglett, Brant L. Knudson, Gerard V. Kopcsay, Sameer Kumar, Amith R. Mamidala, James A. Marcella, Mark G. Megerian, Douglas R. Miller, Samuel J. Miller, Adam J. Muff, Michael B. Mundy, John K. O'Brien, Kathryn M. O'Brien, Martin Ohmacht, Jeffrey J. Parker, Ruth J. Poole, Joseph D. Ratterman, Valentina Salapura, David L. Satterfield, Robert M. Senger, Burkhard Steinmacher-Burow, William M. Stockdell, Craig B. Stunkel, Krishnan Sugavanam, Yutaka Sugawara, Todd E. Takken, Barry M. Trager, James L. Van Oosten, Charles D. Wait, Robert E. Walkup, Alfred T. Watson, Robert W. Wisniewski, Peng Wu
-
Patent number: 9081501Abstract: A Multi-Petascale Highly Efficient Parallel Supercomputer of 100 petaOPS-scale computing, at decreased cost, power and footprint, and that allows for a maximum packaging density of processing nodes from an interconnect point of view. The Supercomputer exploits technological advances in VLSI that enables a computing model where many processors can be integrated into a single Application Specific Integrated Circuit (ASIC).Type: GrantFiled: January 10, 2011Date of Patent: July 14, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sameh Asaad, Ralph E. Bellofatto, Michael A. Blocksome, Matthias A. Blumrich, Peter Boyle, Jose R. Brunheroto, Dong Chen, Chen-Yong Cher, George L. Chiu, Norman Christ, Paul W. Coteus, Kristan D. Davis, Gabor J. Dozsa, Alexandre E. Eichenberger, Noel A. Eisley, Matthew R. Ellavsky, Kahn C. Evans, Bruce M. Fleischer, Thomas W. Fox, Alan Gara, Mark E. Giampapa, Thomas M. Gooding, Michael K. Gschwind, John A. Gunnels, Shawn A. Hall, Rudolf A. Haring, Philip Heidelberger, Todd A. Inglett, Brant L. Knudson, Gerard V. Kopcsay, Sameer Kumar, Amith R. Mamidala, James A. Marcella, Mark G. Megerian, Douglas R. Miller, Samuel J. Miller, Adam J. Muff, Michael B. Mundy, John K. O'Brien, Kathryn M. O'Brien, Martin Ohmacht, Jeffrey J. Parker, Ruth J. Poole, Joseph D. Ratterman, Valentina Salapura, David L. Satterfield, Robert M. Senger, Brian Smith, Burkhard Steinmacher-Burow, William M. Stockdell, Craig B. Stunkel, Krishnan Sugavanam, Yutaka Sugawara, Todd E. Takken, Barry M. Trager, James L. Van Oosten, Charles D. Wait, Robert E. Walkup, Alfred T. Watson, Robert W. Wisniewski, Peng Wu
-
Patent number: 8868975Abstract: A system and method for improving the yield rate of a multiprocessor semiconductor chip that includes primary processor cores and one or more redundant processor cores. A first tester conducts a first test on one or more processor cores, and encodes results of the first test in an on-chip non-volatile memory. A second tester conducts a second test on the processor cores, and encodes results of the second test in an external non-volatile storage device. An override bit of a multiplexer is set if a processor core fails the second test. In response to the override bit, the multiplexer selects a physical-to-logical mapping of processor IDs according to one of: the encoded results in the memory device or the encoded results in the external storage device. On-chip logic configures the processor cores according to the selected physical-to-logical mapping.Type: GrantFiled: August 2, 2011Date of Patent: October 21, 2014Assignee: International Business Machines CorporationInventors: Ralph E. Bellofatto, Steven M. Douskey, Rudolf A. Haring, Moyra K. McManus, Martin Ohmacht, Dietmar Schmunkamp, Krishnan Sugavanam, Bryan J. Weatherford
-
Publication number: 20140281100Abstract: Embodiments include a method for bypassing data in an active memory device. The method includes a requestor determining a number of transfers to a grantor that have not been communicated to the grantor, requesting to the interconnect network that the bypass path be used for the transfers based on the number of transfers meeting a threshold and communicating the transfers via the bypass path to the grantor based on the request, the interconnect network granting control of the grantor in response to the request. The method also includes the interconnect network requesting control of the grantor based on an event and communicating delayed transfers via the interconnect network from other requestors, the delayed transfers being delayed due to the grantor being previously controlled by the requestor, the communicating based on the control of the grantor being changed back to the interconnect network.Type: ApplicationFiled: August 14, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Bruce M. Fleischer, Thomas W. Fox, Hans M. Jacobson, Ravi Nair, Martin Ohmacht, Krishnan Sugavanam
-
Publication number: 20140281084Abstract: Embodiments include a method for bypassing data in an active memory device. The method includes a requestor determining a number of transfers to a grantor that have not been communicated to the grantor, requesting to the interconnect network that the bypass path be used for the transfers based on the number of transfers meeting a threshold and communicating the transfers via the bypass path to the grantor based on the request, the interconnect network granting control of the grantor in response to the request. The method also includes the interconnect network requesting control of the grantor based on an event and communicating delayed transfers via the interconnect network from other requestors, the delayed transfers being delayed due to the grantor being previously controlled by the requestor, the communicating based on the control of the grantor being changed back to the interconnect network.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bruce M. Fleischer, Thomas W. Fox, Hans M. Jacobson, Ravi Nair, Martin Ohmacht, Krishnan Sugavanam