Patents by Inventor Pankaj Satyanarayan Dayama
Pankaj Satyanarayan Dayama has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11943357Abstract: Aspects of the present invention disclose a method for calculating a risk resulting from a network of networks that includes unknown relationships in a privacy preserving manner. The method includes one or more processors determining a set of conditions corresponding to a user of a network. The method further includes transmitting a compliance request corresponding to the set of conditions to one or more members of the network utilizing a privacy preserving algorithm. The method further includes determining a respective risk factor of one or more members of the network, wherein the respective risk factor corresponds to a response of each of the one or more members to the compliance request. The method further includes determining an overall risk of the network based at least in part on the risk factors of the one or more members.Type: GrantFiled: December 14, 2020Date of Patent: March 26, 2024Assignee: International Business Machines CorporationInventors: Roy Abitbol, Jonathan Bnayahu, Eliezer Segev Wasserkrug, Pankaj Satyanarayan Dayama, Artem Barger
-
Patent number: 11928234Abstract: One embodiment provides a method, including: receiving, from a user at a collaboration platform, a request to perform a computation; generating a workflow comprising a sequence of steps for performing the computation; identifying potential data sources comprising the type of data and able to assist in performing at least one of the sequence of steps of the workflow; selecting computation data sources that collaborate to perform the computation, wherein the selecting is performed dynamically and based upon characteristics of a network created by the collaboration platform and between the computation data sources; and facilitating performance of the computation by the computation data sources using data of the computation data sources, wherein during performance of the computation the computation data sources collaborate within the network to perform the workflow while maintaining individual privacy of the data of the computation data sources and providing proof verifying a trustworthiness of the computation.Type: GrantFiled: August 6, 2021Date of Patent: March 12, 2024Assignee: International Business Machines CorporationInventors: Pankaj Satyanarayan Dayama, Nitin Singh, Dhinakaran Vinayagamurthy, Santosh Ravi Kiran Penubothula
-
Patent number: 11861476Abstract: One embodiment provides a method, including: receiving a query from a user; providing the query to data owners, wherein each of the data owners has a local machine learning model and wherein the plurality of data owners train a meta-model; secret sharing model output from the data owners between the other data owners, wherein the model output comprises an output responsive to the query computed using the local machine learning model; receiving, from each of the plurality of data owners, a set of meta-features corresponding to the query; and generating a response to the query, wherein the generating comprises determining, by evaluating the meta-model using the set of meta-features received from each of the plurality of data owners, weights for outputs from the local machine learning models and aggregating the outputs in view of the weights.Type: GrantFiled: August 18, 2021Date of Patent: January 2, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dhinakaran Vinayagamurthy, Sandeep Nishad, Harsh Chaudhari, Pankaj Satyanarayan Dayama, Saneem Ahmed Chemmengath
-
Patent number: 11860868Abstract: Methods, systems, and computer program products for a secure database-as-a-service are provided herein. A computer-implemented method includes obtaining, by a database service, data associated with one or more client devices to be stored in at least one encrypted database; encrypting, without mutation and in accordance with one or more security requirements, at least a portion of the data using an order preserving encryption scheme, wherein the encrypting comprises (i) computing a set of encryption parameters for the portion of the data and (ii) applying a process that converts a fixed-length cipher text corresponding to the portion of the data to a variable-length cipher text; and storing the encrypted data in the at least one encrypted database, wherein the database service enables one or more indexes to be built over the encrypted data to improve performance of query processing.Type: GrantFiled: December 14, 2021Date of Patent: January 2, 2024Assignee: International Business Machines CorporationInventors: Akshar Kaul, Dhinakaran Vinayagamurthy, Pankaj Satyanarayan Dayama, Santosh Ravi Kiran Penubothula
-
Publication number: 20230359760Abstract: In an approach, a processor receives a query relating to mobile number porting on a mobile network that includes a hierarchy including a mobile network operator and a mobile virtual network operator, the query requiring access to customer private data. A processor identifies a minimal number of participants in the mobile network with access to the customer private data. A customer provides a response to the query.Type: ApplicationFiled: May 4, 2022Publication date: November 9, 2023Inventors: Jignesh K. Karia, Sudip Dutta, Pankaj Satyanarayan Dayama, Suman Das
-
Publication number: 20230325883Abstract: Promotional offers are offered to telecom subscribers in roaming network areas by recording promotional preferences of subscribers for receiving promotional calls, forwarding subscriber information from a local network telecom service provider to a roaming network service provider, and measuring with the roaming network telecom service provider the subscribers that are present within a roaming network geography. The subscribers can then be ranked by their duration within the roaming network geography, and promotional pools can be generated for the subscribers within the roaming network based on their preferences. Promotional offers can then be matched to the subscribers in the promotional pools based using the ranking of subscribers and the promotional preferences.Type: ApplicationFiled: October 20, 2021Publication date: October 12, 2023Inventors: Jignesh K. Karia, Mukundan Sundararajan, Pankaj Satyanarayan Dayama, Shilpa Shetty, NEHA SHAH, Vishal Awal
-
Patent number: 11782952Abstract: One embodiment provides a method, including: receiving, at a service provider and from a user, a request for computation of a function, wherein the request includes a description of the function to be computed and requirements of the user; identifying, from data sources accessible to the service provider, a plurality of data sources to participate in the computation in view of the requirements and the description of the function, wherein each of the plurality of data sources includes data of a data owner and constraints on use of the data; identifying a multi-party computation protocol and parameters of the multi-party computation protocol for performing the computation; and running the computation of the function using the data of the plurality of data sources and in view of the requirements of the user and the constraints of the plurality of data sources.Type: GrantFiled: August 18, 2021Date of Patent: October 10, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dhinakaran Vinayagamurthy, Santosh Ravi Kiran Penubothula, Pankaj Satyanarayan Dayama, Nitin Singh, Abhishek Singh, Vinayaka Pandit
-
Publication number: 20230318962Abstract: A method, computer system, and a computer program product for message directing are provided. A first computer receives a registration of members organized into a first closed group hierarchy. The first computer receives a notification of a sensed change of an element in an environment of the first closed group hierarchy. The first computer receives a first message from an external device. The first message relates to the changed element. The first computer selects a first member of the first closed group hierarchy for receipt of the first message. The selecting is based on message routing guidelines established for the first closed group hierarchy. In response to receiving the notification of the sensed change, the first computer transmits the first message to the selected first member of the first closed group hierarchy.Type: ApplicationFiled: March 29, 2022Publication date: October 5, 2023Inventors: Jignesh K Karia, Mukundan Sundararajan, Shilpa Shetty, Pankaj Satyanarayan Dayama, NEHA SHAH, Vishal Awal
-
Patent number: 11758043Abstract: Origin information for promotional calls is provided by recording caller numbers for parties making the promotional calls; and receiving subscriber numbers for receiving the promotional calls. The subscribers numbers are stored in a database that also includes approved content for the promotional calls to be received by the subscriber. Caller numbers and approved content are matched for the subscriber with a call scrubber including a disturbed ledger. The distributed ledger recording a caller designation attached to the caller numbers indicative of a type for the promotional call. A promotional call is received by the subscriber. The caller identification for the subscriber indicates both the caller numbers and the caller designation that is indicative of the type for the promotional call.Type: GrantFiled: October 21, 2021Date of Patent: September 12, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jignesh K Karia, Mukundan Sundararajan, Pankaj Satyanarayan Dayama, Vishal Awal, Shilpa Shetty, Neha Shah
-
Patent number: 11727157Abstract: Methods, systems, and computer program products for building an encrypted document store are provided herein. A computer-implemented method includes building an encrypted ordered key-value store; encrypting one or more sensitive keys to be stored in the ordered key-value store using an order preserving encryption scheme; storing a state of the order preserving encryption scheme in the ordered key-value store; and encrypting one or more values corresponding to the one or more sensitive keys using a semantically secure encryption scheme.Type: GrantFiled: July 22, 2021Date of Patent: August 15, 2023Assignee: International Business Machines CorporationInventors: Dhinakaran Vinayagamurthy, Akshar Kaul, Santosh Ravi Kiran Penubothula, Pankaj Satyanarayan Dayama, Vinayaka Pandit
-
Publication number: 20230185800Abstract: Methods, systems, and computer program products for a secure database-as-a-service are provided herein. A computer-implemented method includes obtaining, by a database service, data associated with one or more client devices to be stored in at least one encrypted database; encrypting, without mutation and in accordance with one or more security requirements, at least a portion of the data using an order preserving encryption scheme, wherein the encrypting comprises (i) computing a set of encryption parameters for the portion of the data and (ii) applying a process that converts a fixed-length cipher text corresponding to the portion of the data to a variable-length cipher text; and storing the encrypted data in the at least one encrypted database, wherein the database service enables one or more indexes to be built over the encrypted data to improve performance of query processing.Type: ApplicationFiled: December 14, 2021Publication date: June 15, 2023Inventors: Akshar Kaul, Dhinakaran Vinayagamurthy, Pankaj Satyanarayan Dayama, Santosh Ravi Kiran Penubothula
-
Patent number: 11658824Abstract: An example operation may include one or more of receiving a request to verify a first encrypted document from a computing device, retrieving a second set of encrypted tokens of a second encrypted document from a blockchain, determining a similarity value of the first encrypted document with respect to the second encrypted document based on a first set of encrypted tokens in the first encrypted document and the second set of encrypted tokens in the second encrypted document, and outputting the determined similarity value to the computing device in response to the request.Type: GrantFiled: June 7, 2021Date of Patent: May 23, 2023Assignee: International Business Machines CorporationInventors: Yedendra Shrinivasan, Krishnasuri Narayanam, Akshar Kaul, Pankaj Satyanarayan Dayama
-
Patent number: 11647377Abstract: A method, system, and computer program product for implementing mobile device roaming optimization is provided. The method includes receiving a selection for services associated with a first mobile device provider for activation during travel to a location associated with mobile device roaming attributes with respect to a mobile device of a user. A blockchain structure and a hash masking sensitive data of the user are generated. It is detected that the user and mobile device have traveled to the location and access to the blockchain structure is enabled. Roaming usage attributes of the mobile device are determined. Subsequently, operational functionality of the mobile device at the geographical location is enabled via roaming usage of a network of the second mobile device provider and second hash of consumption related information compliant with data residency is transmitted to the first mobile device provider to facilitate resolution of disputes across entities.Type: GrantFiled: June 9, 2021Date of Patent: May 9, 2023Assignee: International Business Machines CorporationInventors: Jignesh K. Karia, Pankaj Satyanarayan Dayama, Mukundan Sundararajan, Neha Shah, Arindam Dasgupta, Suman Das
-
Publication number: 20230130152Abstract: Origin information for promotional calls is provided by recording caller numbers for parties making the promotional calls; and receiving subscriber numbers for receiving the promotional calls. The subscribers numbers are stored in a database that also includes approved content for the promotional calls to be received by the subscriber. Caller numbers and approved content are matched for the subscriber with a call scrubber including a disturbed ledger. The distributed ledger recording a caller designation attached to the caller numbers indicative of a type for the promotional call. A promotional call is received by the subscriber. The caller identification for the subscriber indicates both the caller numbers and the caller designation that is indicative of the type for the promotional call.Type: ApplicationFiled: October 21, 2021Publication date: April 27, 2023Inventors: Jignesh K. Karia, Mukundan Sundararajan, Pankaj Satyanarayan Dayama, Vishal Awal, Shilpa Shetty, Neha Shah
-
Publication number: 20230096163Abstract: An example operation may include one or more of querying, via an application programming interface (API), a blockchain ledger for attributes of a shipment by a carrier from an origin location to a destination location, predicting, via an artificial intelligence (AI) model, one or more future events that will occur during the shipment based on the attributes of the shipment retrieved from querying the blockchain ledger, generating, via a smart contract, an accelerated e-invoice based on the one or more future events predicted by the AI model, and storing the accelerated e-invoice on the blockchain ledger.Type: ApplicationFiled: September 21, 2021Publication date: March 30, 2023Inventors: Krishnasuri Narayanam, Pankaj Satyanarayan Dayama, Yedendra Shrinivasan
-
Publication number: 20230061362Abstract: Message delivery in cellular roaming scenarios involves a user device activated with a home telecommunications service provider (TSP) that provides cellular service to the user device. The user device is located in a remote location and the user device is activated with a remote TSP providing roaming cellular service to the user device in a remote location on a cellular network of the remote TSP. A process includes, based on the user initiating a transaction with a remote application server that requires user authentication based on delivery of a transactional text message, receiving from the remote application server the transactional text message, encrypting the transactional text message to produce an encrypted transactional text message, and forwarding the encrypted transactional text message to the remote TSP for delivery as a short message service (SMS) text to the user device in the remote location via the cellular network of the remote TSP.Type: ApplicationFiled: August 31, 2021Publication date: March 2, 2023Inventors: Jignesh K. Karia, Mukundan Sundararajan, Pankaj Satyanarayan Dayama, Shilpa Shetty, Neha Shah, Vishal Awal
-
Publication number: 20230058219Abstract: One embodiment provides a method, including: receiving a query from a user; providing the query to data owners, wherein each of the data owners has a local machine learning model and wherein the plurality of data owners train a meta-model; secret sharing model output from the data owners between the other data owners, wherein the model output comprises an output responsive to the query computed using the local machine learning model; receiving, from each of the plurality of data owners, a set of meta-features corresponding to the query; and generating a response to the query, wherein the generating comprises determining, by evaluating the meta-model using the set of meta-features received from each of the plurality of data owners, weights for outputs from the local machine learning models and aggregating the outputs in view of the weights.Type: ApplicationFiled: August 18, 2021Publication date: February 23, 2023Inventors: Dhinakaran Vinayagamurthy, Sandeep Nishad, Harsh Chaudhari, Pankaj Satyanarayan Dayama, Saneem Ahmed Chemmengath
-
Publication number: 20230059492Abstract: One embodiment provides a method, including: receiving, at a service provider and from a user, a request for computation of a function, wherein the request includes a description of the function to be computed and requirements of the user; identifying, from data sources accessible to the service provider, a plurality of data sources to participate in the computation in view of the requirements and the description of the function, wherein each of the plurality of data sources includes data of a data owner and constraints on use of the data; identifying a multi-party computation protocol and parameters of the multi-party computation protocol for performing the computation; and running the computation of the function using the data of the plurality of data sources and in view of the requirements of the user and the constraints of the plurality of data sources.Type: ApplicationFiled: August 18, 2021Publication date: February 23, 2023Inventors: Dhinakaran Vinayagamurthy, Santosh Ravi Kiran Penubothula, Pankaj Satyanarayan Dayama, Nitin Singh, Abhishek Singh, VINAYAKA PANDIT
-
Publication number: 20230041073Abstract: One embodiment provides a method, including: receiving, from a user at a collaboration platform, a request to perform a computation; generating a workflow comprising a sequence of steps for performing the computation; identifying potential data sources comprising the type of data and able to assist in performing at least one of the sequence of steps of the workflow; selecting computation data sources that collaborate to perform the computation, wherein the selecting is performed dynamically and based upon characteristics of a network created by the collaboration platform and between the computation data sources; and facilitating performance of the computation by the computation data sources using data of the computation data sources, wherein during performance of the computation the computation data sources collaborate within the network to perform the workflow while maintaining individual privacy of the data of the computation data sources and providing proof verifying a trustworthiness of the computation.Type: ApplicationFiled: August 6, 2021Publication date: February 9, 2023Inventors: Pankaj Satyanarayan Dayama, Nitin Singh, Dhinakaran Vinayagamurthy, Santosh Ravi Kiran Penubothula
-
Publication number: 20230023325Abstract: Recommendation and approval of a header for a message includes generating a proposed header based on the name and/or brand of the entity and product and/or content of the message, classifying the proposed header using a machine learning model trained based on historical complaints on previously used headers related to the entity name and brand and product and/or content of the message and recommending the proposed header based on the classification. The training of the machine learning model may include learning a threshold wherein headers having a classification greater than the threshold are not recommended as having a high probability of being wrongly associated with the requesting entity and headers having a classification lower than the threshold are recommended as having a high probability of not being wrongly associated with the requesting entity.Type: ApplicationFiled: July 13, 2021Publication date: January 26, 2023Inventors: Jignesh K. Karia, Mukundan Sundararajan, Pankaj Satyanarayan Dayama, Neha Shah, Vishal Awal