Patents by Inventor Neil Sondhi

Neil Sondhi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10171481
    Abstract: A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware processor. Following assignment of the sensitivity value to the communication, the communication is formatted for display. When sensitivity value exceeds a security threshold, the communication is parsed into a sequence of fragments. The communication is transmitted as the sequence of fragments when said sensitivity value exceeds the security threshold.
    Type: Grant
    Filed: March 24, 2015
    Date of Patent: January 1, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda L. Childress, Itzhack Goldberg, James R. Kozloski, Clifford A. Pickover, Neil Sondhi, Maja Vukovic
  • Patent number: 10158623
    Abstract: A method and system for regulating access by an access program to a data object residing in a storage system, which may be used to protect against data theft in a storage server. The storage server receives, from a client node, a certificate request for a certificate pertaining to access of the data object by the access program. The storage server validates the certificate request and in response, generates the certificate and transmits the certificate to the client node. The certificate request and the certificate each include a signature of the access program and an identifier of the data object. The storage server receives from the client node an I/O request for access of the data object by the access program. The storage server determines whether the I/O request is valid or invalid and processes the I/O request with privileged handling or degraded handling, respectively.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: December 18, 2018
    Assignee: International Business Machines Corporation
    Inventors: David Chambliss, Rhonda L. Childress, Itzhack Goldberg, Nir Mor, Cliff Pickover, Neil Sondhi
  • Publication number: 20180332048
    Abstract: A method and system for determining user security is provided. The method includes registering a first user associated with a service provider system by retrieving identification information for the first user and a first user communication device. In response, Internet of things (IOT) devices belonging to the first user are detected. A second user associated with the service provider system is registered by retrieving identification information for the second user and a second user communication device. In response, IOT devices belonging to the second user are detected. A request for a service provided by the service provider system is received from the first user via the first user communication device belonging to the first user.
    Type: Application
    Filed: July 12, 2018
    Publication date: November 15, 2018
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Neil Sondhi, Aviad Zlotnick
  • Patent number: 10127525
    Abstract: An embodiment of the invention provides a method for enhanced e-mail return receipts based on cognitive considerations. An input device receives an expected response time from a sender of an electronic message, wherein the expected response time includes the amount of time that the sender expects to receive a response to the electronic message. A processor generates a likelihood that the recipient of the electronic message will respond to the electronic message within the expected response time based on a profile of the recipient. The profile of the recipient includes the recipient's degree of attentiveness to the electronic message, the recipient's workload, the recipient's efficiency, and the recipient's work habits. A communications device presents the likelihood that the recipient will respond to the electronic message within the expected response time to the sender.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: November 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, James Robert Kosloski, Clifford A. Pickover, Neil Sondhi
  • Patent number: 10116668
    Abstract: A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware processor. Following assignment of the sensitivity value to the communication, the communication is formatted for display. When sensitivity value exceeds a security threshold, the communication is parsed into a sequence of fragments. The communication is transmitted as the sequence of fragments when said sensitivity value exceeds the security threshold.
    Type: Grant
    Filed: June 20, 2017
    Date of Patent: October 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, James R. Kozloski, Clifford A. Pickover, Neil Sondhi, Maja Vukovic
  • Publication number: 20180307893
    Abstract: A method includes acquiring a fingerprint of a person using a fingerprint scanner of a mobile device to power-off the mobile device, determining that the person is not authorized to use the mobile device based on their fingerprint, and maintaining the mobile device in a power-on state unbeknownst to the person.
    Type: Application
    Filed: April 19, 2017
    Publication date: October 25, 2018
    Inventors: Itzhack Goldberg, Jinho Hwang, Neil Sondhi, Maja Vukovic
  • Patent number: 10089166
    Abstract: Call-home systems are configured and utilized. A log file is presented on a user interface of a computing device. One or more interactions that are associated with one or more instructions to modify the log file are detected on the user interface. One or more modifications to the log file are applied to the log file based on the one or more interactions. The one or more modifications include at least one of a modification that omits information from the log file, a modification that redacts information in the log file, and a modification that obfuscates information in the log file. The modified version of the log file is transferred to a call-home server based on one or more data transfer options.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: October 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Stefan Lehmann, Erik Rueger, Christof Schmitt, Neil Sondhi
  • Publication number: 20180275870
    Abstract: A method for minimizing head seek movement and improving I/O performance of a hard disk drive is disclosed. In one embodiment, such a method includes logically dividing storage space of a hard disk drive into storage areas of substantially equal size. The method monitors a temperature of each of the storage areas. The temperature indicates how frequently data in a corresponding storage area is accessed. The method swaps data in storage areas of the hard disk drive based on temperature. These swaps involve moving hotter data toward outer tracks of the disk drive and colder data toward inner tracks of the disk drive. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: March 21, 2017
    Publication date: September 27, 2018
    Applicant: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Richard Hutzler, Gregory T. Kishi, Neil Sondhi
  • Publication number: 20180267910
    Abstract: Adaptive control of Input/Output (I/O) operations in a data storage system is provided to enable efficient use of the data storage system. More specifically, an interface is provided in order to adaptively control I/O operations to the data storage system. The interface receives a data request. The interface mediates with the data storage system and employs a handle which references one or more files. The handle designates how to process the data request associated with the referenced one or more files. The interface supports execution of the data request in accordance with the handle. Accordingly, the interface provides adaptive direct management of the data storage system at file granularity and/or at data request granularity as designated in the handle(s).
    Type: Application
    Filed: March 14, 2017
    Publication date: September 20, 2018
    Applicant: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Gregory T. Kishi, David B. Kumhyr, Neil Sondhi
  • Publication number: 20180267720
    Abstract: A technique for operating a data storage system includes accessing respective absolute expiration times for valid pages in one or more candidate storage blocks. Garbage collection is performed on ones of the candidate storage blocks that include a first predetermined number of the valid pages that do not expire, as indicated by the absolute expiration times, prior to a first predetermined time period. Garbage collection is deferred on ones of the candidate storage blocks that include a second predetermined number of the valid pages that expire, as indicated by the absolute expiration times, prior to a second predetermined time period.
    Type: Application
    Filed: March 14, 2017
    Publication date: September 20, 2018
    Inventors: ITZHACK GOLDBERG, FRANK KRICK, HEIKO H. SCHLOESSER, NEIL SONDHI
  • Publication number: 20180262873
    Abstract: An approach includes contacting a predefined contact information when a mobile device, which is password protected, is lost and subsequently found. The approach includes receiving an activation event predefined for a specified password protected mobile device, and receiving predefined contact information stored in the mobile device while the mobile device remains password protected, upon the receipt of the activation event.
    Type: Application
    Filed: May 11, 2018
    Publication date: September 13, 2018
    Inventors: Rhonda L. Childress, Itzhack GOLDBERG, Clifford A. PICKOVER, Neil SONDHI, Maja VUKOVIC
  • Publication number: 20180260408
    Abstract: For efficient data storage utilization and recycling, gradually degrading data according to data classes and using degrading data policies, predefined degrading rules, and data access patterns for conserving storage space prior. Each data class is associated with one of a plurality of degrading data policies, and each data policy includes a plurality of degrading rules to be applied to a corresponding data class of a corresponding data policy, the degrading rules defining data classes to be degraded based on data access patterns per data class to automatically degrade the data items according to each of the plurality of data classes until a predefined expiration date. Essential data is defined by a user such that the essential data is not subject to the data degradation so as to preserve at least a portion of files, documents, and videos comprising the essential data.
    Type: Application
    Filed: May 11, 2018
    Publication date: September 13, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack GOLDBERG, Dany MOSHKOVICH, Thorsten MUEHGE, Erik RUEGER, Neil SONDHI
  • Patent number: 10073772
    Abstract: Various embodiments for managing data integrity in a computing storage environment, by a processor device, are provided. In one embodiment, a method comprises applying a copy-on-write technique to a cache in a computer storage system such that each write arriving in the cache is assigned to a separate new physical location and registered sequentially in an order the write arrived, for preserving a state of the computer storage system during a failure event.
    Type: Grant
    Filed: February 5, 2016
    Date of Patent: September 11, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tara Astigarraga, Itzhack Goldberg, Gerhard H. Pieper, Neil Sondhi, Daniel J. Winarski
  • Publication number: 20180255500
    Abstract: A request to pair a first device with a second device is received. An indication is sent from the second device to the first device. The indication confirms that the second device is paired with the first device. One or more actions are received from the first device. The one or more actions may be taken on the second device.
    Type: Application
    Filed: May 7, 2018
    Publication date: September 6, 2018
    Inventors: Tara Astigarraga, Itzhack Goldberg, Jose R. Mosqueda Mejia, Neil Sondhi
  • Patent number: 10069840
    Abstract: A method and system for determining user security is provided. The method includes registering a first user associated with a service provider system by retrieving identification information for the first user and a first user communication device. In response, Internet of things (IOT) devices belonging to the first user are detected. A second user associated with the service provider system is registered by retrieving identification information for the second user and a second user communication device. In response, IOT devices belonging to the second user are detected. A request for a service provided by the service provider system is received from the first user via the first user communication device belonging to the first user.
    Type: Grant
    Filed: April 26, 2016
    Date of Patent: September 4, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Neil Sondhi, Aviad Zlotnick
  • Patent number: 10061317
    Abstract: In an approach, a processor receives a notification that an autonomous vehicle is parked at a first location within a parking area, wherein the autonomous vehicle is associated with a user. A processor receives a first set of information, wherein the first set of information comprises a first expected location of the user prior to returning to the parking area. A processor determines a second location to park the autonomous vehicle based on the first set of information. A processor causes the autonomous vehicle to move to the second location.
    Type: Grant
    Filed: September 27, 2017
    Date of Patent: August 28, 2018
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Jose R. Mosqueda Mejia, Neil Sondhi
  • Publication number: 20180232390
    Abstract: A system and method for deduplicating analyzing system logs is disclosed. The method includes capturing, by an image acquisition component, an image of at least one log entry, converting, by an image processing component, text in the image of the at least one log entry to machine-encoded text, and scanning, by a log scanning component, the machine-encoded text for the at least one redundant copy of the at least one log entry. The method also includes removing, by the log scanning component, the at least one redundant copy of the at least one log entry, determining, by a log analysis component, if the at least one log entry is significant, flagging the at least one log entry if the log entry is significant, and alerting a user if the log entry is flagged.
    Type: Application
    Filed: May 3, 2018
    Publication date: August 16, 2018
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Neil Sondhi
  • Publication number: 20180232391
    Abstract: A system and method for deduplicating analyzing system logs is disclosed. The method includes capturing, by an image acquisition component, an image of at least one log entry, converting, by an image processing component, text in the image of the at least one log entry to machine-encoded text, and scanning, by a log scanning component, the machine-encoded text for the at least one redundant copy of the at least one log entry. The method also includes removing, by the log scanning component, the at least one redundant copy of the at least one log entry, determining, by a log analysis component, if the at least one log entry is significant, flagging the at least one log entry if the log entry is significant, and alerting a user if the log entry is flagged.
    Type: Application
    Filed: May 3, 2018
    Publication date: August 16, 2018
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Neil Sondhi
  • Patent number: 10049117
    Abstract: For defragmentation-less deduplication using a processor device, holes are punched in a file in a data deduplication process for avoiding the use of defragmenting by allowing a file system to use the punched holes for reclaiming the free space for adding to a free space pool of the file system.
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: August 14, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack Goldberg, Neil Sondhi
  • Publication number: 20180218604
    Abstract: Embodiments for using vehicular collaboration for vehicular parking area availability detection by a processor. An indication, having a degree of certainty according to a plurality of factors for obtaining a vehicular parking area, may be provided upon receiving data capturing one or more vehicular parking areas from one or more devices of at least one of a plurality of collaborative vehicles in substantially close proximity to the one or more vehicular parking areas.
    Type: Application
    Filed: February 2, 2017
    Publication date: August 2, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tara ASTIGARRAGA, Itzhack GOLDBERG, Richard HUTZLER, Neil SONDHI, Daniel J. WINARSKI