Patents by Inventor NINAD SATHAYE
NINAD SATHAYE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Cybersecurity for sensitive-information utterances in interactive voice sessions using risk profiles
Patent number: 11900927Abstract: An example method includes obtaining, by a computing system, first audio data representing one or more initial utterances during an interactive voice session with an interactive voice system; generating, by the computing system, based on the first audio data, a prediction regarding whether a subsequent utterance of a user in the interactive voice session will contain sensitive information, wherein the subsequent utterance follows the one or more initial utterances in time; obtaining, by the computing system, second audio data representing the subsequent utterance; determining, by the computing system, based on the prediction and based on a risk profile of the interactive voice system, whether to transmit the second audio data to the interactive voice system; and based on the determination to transmit the second audio data to the interactive voice system, transmitting the second audio data to the interactive voice system.Type: GrantFiled: December 23, 2020Date of Patent: February 13, 2024Assignee: OPTUM TECHNOLOGY, INC.Inventors: Devikiran Ramadas, Gregory J Boss, Ninad Sathaye, Raghav Bali, Nitin Dwivedi -
Patent number: 11854553Abstract: A method comprises obtaining, by a computing system, first audio data representing one or more initial utterances during an interactive voice session with an interactive voice system; generating, by the computing system, based on the first audio data, a prediction regarding whether a subsequent utterance of a user during the interactive voice session will contain sensitive information, the subsequent utterance following the one or more initial utterances in time; obtaining, by the computing system, second audio data representing the subsequent utterance; determining, by the computing system, based on the prediction, whether to transmit the second audio data; and based on a determination not to transmit the second audio data: replacing, by the computing system, the second audio data with third audio data that is based on a voice of the user; and transmitting, by the computing system, the third audio data.Type: GrantFiled: December 23, 2020Date of Patent: December 26, 2023Assignee: OPTUM TECHNOLOGY, INC.Inventors: Devikiran Ramadas, Gregory J Boss, Ninad Sathaye, Raghav Bali, Nitin Dwivedi
-
Patent number: 11682047Abstract: A method, computer system, and computer program product for cognitive elevator advertisements are provided. The embodiment may include identifying one or more passengers utilizing real-time sensor data. The embodiment may also include determining a preference value of each identified passenger for a plurality of product categories based on a plurality of data related to past purchase histories or purchasing patterns received from a plurality of databases simultaneously or almost simultaneously. The embodiment may further include computing corrected passenger preference values for the plurality of product categories based on unprejudiced preference values of the passengers multiplied by the preference values assigned to each product category. The embodiment may also include determining one or more targeted advertisements for one or more targeted passengers based on each computed passenger preference values.Type: GrantFiled: August 28, 2018Date of Patent: June 20, 2023Assignee: International Business Machines CorporationInventors: Anthony J. P. Behan, Ninad Sathaye, John Cohn, Rick A. Hamilton, II
-
Patent number: 11681895Abstract: Cognitive assistants which use feedback to highlight relevant points of interest to a user so that recommendations can be provided to the user based upon learned knowledge of the users preferences, tastes and customs are provided. For this purpose a computer-implemented method includes capturing user data of a user from a plurality of sensors, determining a cognitive state of the user from the captured data, correlating the user data to the cognitive state of the user, and making recommendations to the user based on the correlation of the user data and the determined cognitive state of the user.Type: GrantFiled: May 30, 2018Date of Patent: June 20, 2023Assignee: KYNDRYL, INC.Inventors: Ninad Sathaye, Rick A. Hamilton, II, Wouter Denayer, Edgar A. Zamora Duran
-
Publication number: 20220199093Abstract: An example method comprises obtaining, by a computing system, first audio data representing one or more initial utterances during an interactive voice session with an interactive voice system; generating, by the computing system, based on the first audio data, a prediction regarding whether a subsequent utterance of a user during the interactive voice session will contain sensitive information, the subsequent utterance following the one or more initial utterances in time; obtaining, by the computing system, second audio data representing the subsequent utterance; determining, by the computing system, based on the prediction, whether to transmit the second audio data; and based on a determination not to transmit the second audio data: replacing, by the computing system, the second audio data with third audio data that is based on a voice of the user; and transmitting, by the computing system, the third audio data.Type: ApplicationFiled: December 23, 2020Publication date: June 23, 2022Inventors: Devikiran Ramadas, Gregory J. Boss, Ninad Sathaye, Raghav Bali, Nitin Dwivedi
-
CYBERSECURITY FOR SENSITIVE-INFORMATION UTTERANCES IN INTERACTIVE VOICE SESSIONS USING RISK PROFILES
Publication number: 20220199073Abstract: An example method includes obtaining, by a computing system, first audio data representing one or more initial utterances during an interactive voice session with an interactive voice system; generating, by the computing system, based on the first audio data, a prediction regarding whether a subsequent utterance of a user in the interactive voice session will contain sensitive information, wherein the subsequent utterance follows the one or more initial utterances in time; obtaining, by the computing system, second audio data representing the subsequent utterance; determining, by the computing system, based on the prediction and based on a risk profile of the interactive voice system, whether to transmit the second audio data to the interactive voice system; and based on the determination to transmit the second audio data to the interactive voice system, transmitting the second audio data to the interactive voice system.Type: ApplicationFiled: December 23, 2020Publication date: June 23, 2022Inventors: Devikiran Ramadas, Gregory J Boss, Ninad Sathaye, Raghav Bali, Nitin Dwivedi -
Patent number: 11017129Abstract: Aspects provide for design template selectors, wherein processors are configured to determine a design pattern from a user input comprising a spatial arrangement of different discrete constituent design components, and determine that the design pattern input spatial arrangement of constituent components matches a portion of a selected one of a knowledge base plurality of completed design patterns that each comprise different fixed spatial arrangements of discrete constituent components within a threshold amount of confidence. Thus, aspects present the selected one of the knowledge base design patterns to the user as a suggested template for use in completing the design.Type: GrantFiled: April 17, 2018Date of Patent: May 25, 2021Assignee: International Business Machines CorporationInventors: Luis Carlos Cruz Huertas, Rick A. Hamilton, II, Ninad Sathaye, Edgar A. Zamora Duran
-
Patent number: 10977928Abstract: Security system devices are configured to retrieve historic first sensor data acquired from a protected area in response to receiving a threat alarm notification from a peer security system that is related to an area monitored by the peer security system, wherein the protected area is different from and geographically separate from the area monitored by the peer security system. The system devise determines that a security threat is indicated for the protected area by assessing the retrieved selection of historic first sensor data as a function of a relation of the threat alarm notification from the peer security system to the protected area, wherein assessing the historic first sensor data without the function of the relation of the threat alarm notification from the peer security system to the protected area results in determining that the security threat is not indicated for the protected area.Type: GrantFiled: April 20, 2020Date of Patent: April 13, 2021Assignee: International Business Machines CorporationInventors: Luis Carlos Cruz Huertas, Rick A Hamilton, II, Ninad Sathaye, Edgar A. Zamora Duran
-
Patent number: 10876919Abstract: Methods, systems, computer program products, and devices for in-pipeline optical interference-based cognitive systems for leak and defect detection are provided herein. A computer-implemented method includes obtaining optical interference-related data pertaining to at least one interior portion of a pipeline; obtaining multiple items of sensor data pertaining to the at least one interior portion of the pipeline; generating one or more pipeline-irregularity predictions by applying an inference-based algorithm to the optical interference-related data, the multiple items of sensor data, and one or more additional items of data, wherein each of the one or more pipeline-irregularity predictions comprises an identified location within the interior surface of the pipeline of a predicted irregularity and an estimated size of the predicted irregularity; and outputting the one or more pipeline-irregularity predictions to one or more users.Type: GrantFiled: April 30, 2018Date of Patent: December 29, 2020Assignee: International Business Machines CorporationInventors: Sukanya Randhawa, Ninad Sathaye, Ashwin Srinivas
-
Publication number: 20200294387Abstract: Security system devices are configured to retrieve historic first sensor data acquired from a protected area in response to receiving a threat alarm notification from a peer security system that is related to an area monitored by the peer security system, wherein the protected area is different from and geographically separate from the area monitored by the peer security system. The system devise determines that a security threat is indicated for the protected area by assessing the retrieved selection of historic first sensor data as a function of a relation of the threat alarm notification from the peer security system to the protected area, wherein assessing the historic first sensor data without the function of the relation of the threat alarm notification from the peer security system to the protected area results in determining that the security threat is not indicated for the protected area.Type: ApplicationFiled: April 20, 2020Publication date: September 17, 2020Inventors: LUIS CARLOS CRUZ HUERTAS, Rick A. Hamilton, II, NINAD SATHAYE, EDGAR A. ZAMORA DURAN
-
Patent number: 10771573Abstract: A computer-implemented method comprising: determining, by a computing device, characteristics of a social media message; selecting, by the computing device, a particular image, of a plurality of images, based on the characteristics of the social media message and characteristics of the particular image; and outputting, by the computing device, information identifying the selected image to incorporate the selected image in a user's social media profile.Type: GrantFiled: June 8, 2018Date of Patent: September 8, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edgar A. Zamora Duran, Ninad Sathaye, Clifford A. Pickover
-
Patent number: 10743068Abstract: A method and system for improving real-time digital media capture and presentation is provided. The method includes retrieving digital media content in real time and dividing the digital media content into groups each including similar digital media portions. A digital tag is assigned to each group and each digital tag digitally describes media elements within each portion of the similar digital media portions. Each portion is analyzed with respect to the media elements and associated metadata is generated. The metadata is assigned to each media element and the groups of similar digital media portions are configured for automated presentation for users.Type: GrantFiled: September 17, 2018Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Luis C. Cruz Huertas, Rick A Hamilton, II, Ninad Sathaye, Edgar A. Zamora Duran
-
Publication number: 20200168012Abstract: A computer-implemented method, system, and program product for providing a personal fuel efficiency for a vehicle of interest to a user. Responsive to receiving an input, a particular vehicle having a number of fuel efficiency attributes is identified. Driver attribute data providing information of personal driving behaviors of the user when driving another vehicle is accessed. The driver attribute data is obtained from a number of sensors on the other vehicle. Using the driver attribute data, a predicted impact on the number of fuel efficiency attributes is determined. The number of fuel efficiency attributes is adjusted based on the predicted impact to determine the personal fuel efficiency. The computer renders the personal fuel efficiency on a user device or on a display device located on the particular vehicle.Type: ApplicationFiled: November 28, 2018Publication date: May 28, 2020Inventors: Gregory J. Boss, Kulvir Singh Bhogal, Rick A. Hamilton, II, Ninad Sathaye
-
Patent number: 10636282Abstract: Security system devices are configured to retrieve historic first sensor data acquired from a protected area in response to receiving a threat alarm notification from a peer security system that is related to an area monitored by the peer security system, wherein the protected area is different from and geographically separate from the area monitored by the peer security system. The system devise determines that a security threat is indicated for the protected area by assessing the retrieved selection of historic first sensor data as a function of a relation of the threat alarm notification from the peer security system to the protected area, wherein assessing the historic first sensor data without the function of the relation of the threat alarm notification from the peer security system to the protected area results in determining that the security threat is not indicated for the protected area.Type: GrantFiled: May 22, 2019Date of Patent: April 28, 2020Assignee: International Business Machines CorporationInventors: Luis Carlos Cruz Huertas, Rick A Hamilton, II, Ninad Sathaye, Edgar A. Zamora Duran
-
Publication number: 20200092608Abstract: A method and system for improving real-time digital media capture and presentation is provided. The method includes retrieving digital media content in real time and dividing the digital media content into groups each including similar digital media portions. A digital tag is assigned to each group and each digital tag digitally describes media elements within each portion of the similar digital media portions. Each portion is analyzed with respect to the media elements and associated metadata is generated. The metadata is assigned to each media element and the groups of similar digital media portions are configured for automated presentation for users.Type: ApplicationFiled: September 17, 2018Publication date: March 19, 2020Inventors: Luis C. Cruz Huertas, Rick A. Hamilton II, Ninad Sathaye, Edgar A. Zamora Duran
-
Publication number: 20200074508Abstract: A method, computer system, and computer program product for cognitive elevator advertisements are provided. The embodiment may include identifying one or more passengers utilizing real-time sensor data. The embodiment may also include determining a preference value of each identified passenger for a plurality of product categories based on a plurality of data related to past purchase histories or purchasing patterns received from a plurality of databases simultaneously or almost simultaneously. The embodiment may further include computing corrected passenger preference values for the plurality of product categories based on unprejudiced preference values of the passengers multiplied by the preference values assigned to each product category. The embodiment may also include determining one or more targeted advertisements for one or more targeted passengers based on each computed passenger preference values.Type: ApplicationFiled: August 28, 2018Publication date: March 5, 2020Inventors: Anthony J.P. Behan, Ninad Sathaye, John Cohn, Rick A. Hamilton, II
-
Publication number: 20200027337Abstract: Security system devices are configured to retrieve historic first sensor data acquired from a protected area in response to receiving a threat alarm notification from a peer security system that is related to an area monitored by the peer security system, wherein the protected area is different from and geographically separate from the area monitored by the peer security system. The system devise determines that a security threat is indicated for the protected area by assessing the retrieved selection of historic first sensor data as a function of a relation of the threat alarm notification from the peer security system to the protected area, wherein assessing the historic first sensor data without the function of the relation of the threat alarm notification from the peer security system to the protected area results in determining that the security threat is not indicated for the protected area.Type: ApplicationFiled: May 22, 2019Publication date: January 23, 2020Inventors: LUIS CARLOS CRUZ HUERTAS, Rick A. Hamilton, II, NINAD SATHAYE, EDGAR A. ZAMORA DURAN
-
Publication number: 20190379750Abstract: A computer-implemented method comprising: determining, by a computing device, characteristics of a social media message; selecting, by the computing device, a particular image, of a plurality of images, based on the characteristics of the social media message and characteristics of the particular image; and outputting, by the computing device, information identifying the selected image to incorporate the selected image in a user's social media profile.Type: ApplicationFiled: June 8, 2018Publication date: December 12, 2019Inventors: Edgar A. Zamora Duran, Ninad Sathaye, Clifford A. Pickover
-
Publication number: 20190370628Abstract: Cognitive assistants which use feedback to highlight relevant points of interest to a user so that recommendations can be provided to the user based upon learned knowledge of the users preferences, tastes and customs are provided. For this purpose a computer-implemented method includes capturing user data of a user from a plurality of sensors, determining a cognitive state of the user from the captured data, correlating the user data to the cognitive state of the user, and making recommendations to the user based on the correlation of the user data and the determined cognitive state of the user.Type: ApplicationFiled: May 30, 2018Publication date: December 5, 2019Inventors: Ninad SATHAYE, Rick A. HAMILTON, II, Wouter DENAYER, Edgar A. ZAMORA DURAN
-
Publication number: 20190331549Abstract: Methods, systems, computer program products, and devices for in-pipeline optical interference-based cognitive systems for leak and defect detection are provided herein. A computer-implemented method includes obtaining optical interference-related data pertaining to at least one interior portion of a pipeline; obtaining multiple items of sensor data pertaining to the at least one interior portion of the pipeline; generating one or more pipeline-irregularity predictions by applying an inference-based algorithm to the optical interference-related data, the multiple items of sensor data, and one or more additional items of data, wherein each of the one or more pipeline-irregularity predictions comprises an identified location within the interior surface of the pipeline of a predicted irregularity and an estimated size of the predicted irregularity; and outputting the one or more pipeline-irregularity predictions to one or more users.Type: ApplicationFiled: April 30, 2018Publication date: October 31, 2019Inventors: Sukanya Randhawa, Ninad Sathaye, Ashwin Srinivas