Patents by Inventor Neil Sondhi

Neil Sondhi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180218004
    Abstract: A system and method for deduplicating analyzing system logs is disclosed. The method includes capturing, by an image acquisition component, an image of at least one log entry, converting, by an image processing component, text in the image of the at least one log entry to machine-encoded text, and scanning, by a log scanning component, the machine-encoded text for the at least one redundant copy of the at least one log entry. The method also includes removing, by the log scanning component, the at least one redundant copy of the at least one log entry, determining, by a log analysis component, if the at least one log entry is significant, flagging the at least one log entry if the log entry is significant, and alerting a user if the log entry is flagged.
    Type: Application
    Filed: January 31, 2017
    Publication date: August 2, 2018
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Neil Sondhi
  • Patent number: 10038971
    Abstract: An approach includes contacting a predefined contact information when a mobile device, which is password protected, is lost and subsequently found. The approach includes receiving an activation event predefined for a specified password protected mobile device, and receiving predefined contact information stored in the mobile device while the mobile device remains password protected, upon the receipt of the activation event.
    Type: Grant
    Filed: March 24, 2015
    Date of Patent: July 31, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Clifford A. Pickover, Neil Sondhi, Maja Vukovic
  • Patent number: 10031691
    Abstract: Methods and apparatuses for maintaining data integrity in deduplicated storage environments. A processor receives a request to write a first block of data to a storage device. A processor compares the first block of data to a second block of data, wherein the second block is stored on the storage device. A processor writes the first block of data to the storage device based, at least in part, on the first block of data matching the second block of data and an amount of pointers to the second block of data being above a predetermined amount.
    Type: Grant
    Filed: September 25, 2014
    Date of Patent: July 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Thomas K. Doerk, Itzhack Goldberg, Thorsten Muehge, Erik Rueger, Neil Sondhi
  • Publication number: 20180196429
    Abstract: In an approach, a processor receives a notification that an autonomous vehicle is parked at a first location within a parking area, wherein the autonomous vehicle is associated with a user. A processor receives a first set of information, wherein the first set of information comprises a first expected location of the user prior to returning to the parking area. A processor determines a second location to park the autonomous vehicle based on the first set of information. A processor causes the autonomous vehicle to move to the second location.
    Type: Application
    Filed: January 9, 2017
    Publication date: July 12, 2018
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Jose R. Mosqueda Mejia, Neil Sondhi
  • Publication number: 20180196431
    Abstract: In an approach, a processor receives a notification that an autonomous vehicle is parked at a first location within a parking area, wherein the autonomous vehicle is associated with a user. A processor receives a first set of information, wherein the first set of information comprises a first expected location of the user prior to returning to the parking area. A processor determines a second location to park the autonomous vehicle based on the first set of information. A processor causes the autonomous vehicle to move to the second location.
    Type: Application
    Filed: September 27, 2017
    Publication date: July 12, 2018
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Jose R. Mosqueda Mejia, Neil Sondhi
  • Patent number: 10004028
    Abstract: A request to pair a first device with a second device is received. An indication is sent from the second device to the first device. The indication confirms that the second device is paired with the first device. One or more actions are received from the first device. The one or more actions may be taken on the second device.
    Type: Grant
    Filed: September 22, 2016
    Date of Patent: June 19, 2018
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Itzhack Goldberg, Jose R. Mosqueda Mejia, Neil Sondhi
  • Patent number: 10002137
    Abstract: For efficient data storage utilization and recycling, gradually degrading data according to data classes and using degrading data policies, predefined degrading rules, and data access patterns for conserving storage space prior.
    Type: Grant
    Filed: February 13, 2014
    Date of Patent: June 19, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack Goldberg, Dany Moshkovich, Thorsten Muehge, Erik Rueger, Neil Sondhi
  • Patent number: 9996545
    Abstract: A system and method for deduplicating analyzing system logs is disclosed. The method includes capturing, by an image acquisition component, an image of at least one log entry, converting, by an image processing component, text in the image of the at least one log entry to machine-encoded text, and scanning, by a log scanning component, the machine-encoded text for the at least one redundant copy of the at least one log entry. The method also includes removing, by the log scanning component, the at least one redundant copy of the at least one log entry, determining, by a log analysis component, if the at least one log entry is significant, flagging the at least one log entry if the log entry is significant, and alerting a user if the log entry is flagged.
    Type: Grant
    Filed: September 7, 2017
    Date of Patent: June 12, 2018
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Neil Sondhi
  • Patent number: 9984228
    Abstract: An approach is provided for password re-usage identification based on an Input Method Editor (IME) analysis. The approach analyzes a number of keystrokes received from a user at the IME that is running on the information handling system. A set of keystrokes received at the IME are identified as a possible new password that is being established by the user. A set of existing password data is searched with the search being based on the possible new password. The set of existing passwords are stored in a data store accessible from at least one of the processors of the information handling system. In response to the searching identifying that one of the existing passwords matches the possible new password, a notification, or warning, is displayed to the user.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: May 29, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, David B. Kumhyr, Su Liu, Neil Sondhi
  • Patent number: 9985941
    Abstract: An embodiment of the invention may include a method, computer program product and computer system for password management. The embodiment may include a computing device that creates a password inventory. The password inventory may be a list of one or more passwords, where each of the one or more passwords corresponds to a password key. The embodiment may update the password inventory without input from a user. The embodiment may receive a first login request from a first device. The embodiment may transmit information detailing a first password key to the first device, where the first password key corresponds to a first password from the list of one or more passwords. The embodiment may receive information detailing a first entered password from the first device. The embodiment may determine whether the first entered password is identical to the first password from the list of one or more passwords.
    Type: Grant
    Filed: September 8, 2015
    Date of Patent: May 29, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Clifford A. Pickover, Neil Sondhi
  • Patent number: 9971887
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: May 15, 2018
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Patent number: 9972361
    Abstract: Various embodiments for audibly mapping computing components in a computer storage system, by a processor device, are provided. In one embodiment, a method comprises creating a detectible audible pattern using an actuator arm and head assembly of a hard disk drive operating in the computer storage system for physically mapping the hard disk drive to a logical location within the computer storage system.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: May 15, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack Goldberg, Harry McGregor, Christopher B. Moore, Neil Sondhi
  • Publication number: 20180131778
    Abstract: A method includes, responsive to receiving a request from a first user to establish an electronic communication with a second user, determining time zone information for the second user. Responsive to determining communication preferences exist for the second user, the method determines a notification procedure for the second user based on the communication preferences of the second user and the time zone information for the second user. The method sends the time zone information for the second user to the first user based on the notification procedure.
    Type: Application
    Filed: November 8, 2016
    Publication date: May 10, 2018
    Inventors: Itzhack Goldberg, Richard Hutzler, Samuel Kallner, Neil Sondhi
  • Patent number: 9965616
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: May 8, 2018
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Publication number: 20180124271
    Abstract: A method includes receiving a package comprising an image and metadata of the image including ambient condition data, storing the package in a memory, receiving a request for the image, outputting the image in response to the request, determining a context of the request, determining, using the context of the request, a substitute for the ambient condition data, and outputting the substitute for the ambient condition data with the image.
    Type: Application
    Filed: December 31, 2017
    Publication date: May 3, 2018
    Inventors: ITZHACK GOLDBERG, JAMES R. KOZLOSKI, CLIFFORD A. PICKOVER, NEIL SONDHI
  • Publication number: 20180107678
    Abstract: An approach to de-duplicating data in an electronic text repository by performing the following steps: (i) processing one or more text documents associated with an electronic text repository to identify first instances of a plurality of words; (ii) adding words associated with the identified first instances of the plurality of words to a list, wherein each word added to the list is assigned a unique serial number; and (iii) replacing the plurality of words included in the one or more text documents with serial numbers corresponding to the words associated with the list for generating one or more reduced documents.
    Type: Application
    Filed: October 13, 2016
    Publication date: April 19, 2018
    Inventors: Olympia Gluck, Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Neil Sondhi
  • Patent number: 9942116
    Abstract: A first electronic device can receive an identifying signal broadcast from a second electronic device located within a wireless communication range of the first electronic device, and in response, establish a first, local electronic communication path between the first and second electronic devices. The first electronic device can then receive a set of status data from the second electronic device over the local electronic communication path. The first electronic device can then establish a second, remote electronic communication path to a remote server and subsequently transmit, over the remote electronic communication path, the status data from the second electronic device along with status data from the first electronic device.
    Type: Grant
    Filed: July 14, 2016
    Date of Patent: April 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Erik Rueger, Neil Sondhi
  • Publication number: 20180096134
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Application
    Filed: November 7, 2017
    Publication date: April 5, 2018
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Publication number: 20180096133
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Application
    Filed: November 7, 2017
    Publication date: April 5, 2018
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Publication number: 20180096135
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Application
    Filed: November 17, 2017
    Publication date: April 5, 2018
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi