Patents by Inventor Peeyush Jaiswal

Peeyush Jaiswal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240070255
    Abstract: Provided are techniques for continuous authentication for a real time hologram. A request and a hologram are received, where the hologram is embedded with a first key phrase in accordance with a first sequence, and where the first sequence indicates which portions of the first key phrase are embedded in specific locations of the hologram. A first seed and a second seed are retrieved. A second key phrase is generated using the first seed. A second sequence is generated using the second seed. It is determined whether portions of the second key phrase are embedded in specific locations of the hologram in accordance with the second sequence. In response to determining that the portions of the second key phrase are embedded in specific locations of the hologram in accordance with the second sequence, the hologram is displayed, and the request is processed. Otherwise, the request is rejected.
    Type: Application
    Filed: August 26, 2022
    Publication date: February 29, 2024
    Inventors: Paul LLAMAS VIRGEN, Priyansh JAISWAL, Peeyush JAISWAL
  • Patent number: 11854264
    Abstract: A computer that identifies the video. The computer annotates the video using a deep learning tool. The computer analyzes the annotated video to highlight a dangerous condition. The computer identifies a video from a repository with the dangerous condition. The computer analyzes the video and the video from the repository using a similarity analysis. The computer determines a score based on the annotated video and based on comparing the video to the video from the repository and based on determining the score is above a threshold value, the computer generates an action.
    Type: Grant
    Filed: June 18, 2021
    Date of Patent: December 26, 2023
    Assignee: KYNDRYL, INC.
    Inventors: Mauro Marzorati, Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
  • Patent number: 11829741
    Abstract: A method, computer program product and computer system to generate a codebase for tenant microservices in a distributed computing environment is provided. A processor receives a request from a tenant to deploy a microservice in a distributed computing environment. A processor retrieves a schema associated with the tenant and the microservice to be deployed. A processor retrieves a constructor class associated with the microservice. A processor deploys an instance of the microservice within the distributed computing environment based on the constructor class associated with the microservice. A processor provides a service endpoint within the distributed computing environment managed by the deployed instance of the microservice.
    Type: Grant
    Filed: March 8, 2022
    Date of Patent: November 28, 2023
    Assignee: International Business Machines Corporation
    Inventors: Slobodan Sipcic, Peeyush Jaiswal, Naeem Ahmed, Priyansh Jaiswal, Niyati Patel
  • Publication number: 20230289158
    Abstract: A method, computer program product and computer system to generate a codebase for tenant microservices in a distributed computing environment is provided. A processor receives a request from a tenant to deploy a microservice in a distributed computing environment. A processor retrieves a schema associated with the tenant and the microservice to be deployed. A processor retrieves a constructor class associated with the microservice. A processor deploys an instance of the microservice within the distributed computing environment based on the constructor class associated with the microservice. A processor provides a service endpoint within the distributed computing environment managed by the deployed instance of the microservice.
    Type: Application
    Filed: March 8, 2022
    Publication date: September 14, 2023
    Inventors: Slobodan Sipcic, Peeyush Jaiswal, Naeem Ahmed, Priyansh Jaiswal, NIYATI PATEL
  • Patent number: 11757892
    Abstract: A method for a story fill authentication process includes, responsive to receiving a first authentication request to authenticate a user, displaying a first generated story with one or more obfuscated portions, where the first generated story is based on event data associated with a first previously captured event and additional data utilized to enrich the event data for the first previously captured event. The method also includes, responsive to determining text provided for the one or more obfuscated portions of the first generated story at least meets a comparison threshold level to a first complete generated story based on a semantic comparison, granting the user access to a resource associated with the first authentication request.
    Type: Grant
    Filed: November 3, 2020
    Date of Patent: September 12, 2023
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Peeyush Jaiswal, Cheranellore Vasudevan, Priyansh Jaiswal, Sibasis Das
  • Patent number: 11736619
    Abstract: A method, computer system, and a computer program product for automated urgency detection is provided. The present invention may include capturing at least one caller parameter. The present invention may include determining whether an incoming call is urgent. The present invention may include conveying a determined urgency to a receiver of the incoming call.
    Type: Grant
    Filed: December 3, 2020
    Date of Patent: August 22, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shikhar Kwatra, Peeyush Jaiswal, Raghuveer Prasad Nagar, Priyansh Jaiswal, Reji Jose, Jeremy R. Fox
  • Patent number: 11722470
    Abstract: A producer system may insert an encrypted value in a field in a message, where the message is associated with a schema that specifies a public key used to encrypt the encrypted value of the field and further specifies a type of an unencrypted form of the encrypted value, insert one or more unencrypted values in one or more fields in the message, and send the message to an external computing system. A consumer system may receive the message, determine, based at least in part on the public key specified by the schema, a private key associated with the public key, and decrypt, using the private key, the encrypted value of the field into the unencrypted form of the encrypted value.
    Type: Grant
    Filed: August 29, 2018
    Date of Patent: August 8, 2023
    Assignee: International Business Machines Corporation
    Inventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, Austin Michael Delamar, Naeem Ahmed, Rahul Ragunathan
  • Publication number: 20230245127
    Abstract: A computer-implemented method includes: setting up, by a computing device, an identification profile by capturing a first image using a camera of the computing device; requesting, by the computing device, an authentication action by an authentication device; comparing, by the computing device, recognized elements of the first image and a second image, the recognized elements of the first image and the second image including at least one of ephemeral features and transient features; determining, by the computing device, whether a confidence level is above a predetermined threshold based on a comparison of the recognized elements of the first image and the second image; and completing, by the computing device, authentication of the computing device with the authentication device in response to a determination that the confidence level is above the predetermined threshold.
    Type: Application
    Filed: February 2, 2022
    Publication date: August 3, 2023
    Inventors: Mauro MARZORATI, Paul LLAMAS VIRGEN, Priyansh JAISWAL, Peeyush JAISWAL
  • Patent number: 11646020
    Abstract: A method for managing electronic communication notifications includes responsive to receiving a communication from a first user, identifying one or more keywords in the communication based on a plurality of keywords associated with a plurality of queries previously presented by a second user. Determining whether the communication includes a reply to a first open query, wherein the first open query represents a question previously presented by the second user directed to the first user. Responsive to determining the communication from the first user includes the reply to the first open query, notifying the second user utilizing a first alert type for the communication from the first user that includes the reply for the first open query, wherein the first alert type is different from a second alert type for notifying the second user regarding a communication that does not include the reply for the first open query.
    Type: Grant
    Filed: January 24, 2020
    Date of Patent: May 9, 2023
    Assignee: International Business Machines Corporation
    Inventors: Priyansh Jaiswal, Peeyush Jaiswal
  • Publication number: 20230065847
    Abstract: According to one embodiment, a method, computer system, and computer program product for network bandwidth conservation is provided. The embodiment may include monitoring eye focus of a user. The embodiment may include monitoring voice input of the user. In response to determining the eye focus of the user is on a video feed of another user for more than a threshold amount of focus time, the embodiment may include receiving the video feed of the another user. In response to determining the eye focus of the user is on a screen of a video conference and determining, based on the voice input, the user is speaking towards the screen of the video conference, the embodiment may include enabling a camera of the user and transmitting a video feed of the user.
    Type: Application
    Filed: August 31, 2021
    Publication date: March 2, 2023
    Inventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, PAUL LLAMAS VIRGEN, Victor Povar
  • Publication number: 20230069102
    Abstract: A method, computer system, and a computer program product for enhanced caller identification (ID) is provided. The present invention may include, receiving, by a receiving party device, a call from a calling party device. The present invention may also include, retrieving, by the receiving party device, a previous interaction information corresponding to a previous interaction between a receiving party associated with the receiving party device and a calling party associated with the calling party device. The present invention may further include, in response to the received call from the calling party device, displaying, on the receiving party device, the retrieved previous interaction information corresponding to the previous interaction between the receiving party and the calling party.
    Type: Application
    Filed: August 24, 2021
    Publication date: March 2, 2023
    Inventors: Peeyush Jaiswal, Priyansh Jaiswal
  • Patent number: 11558390
    Abstract: According to one embodiment, a method, computer system, and computer program product for managing access to one or more protected web resources based on the location of an approver is provided. The present invention may include granting the requestor access to the protected web resource based on one or more access requirements being met, wherein at least one access requirement comprises a location of one or more authorization devices corresponding with one or more approvers being within a threshold distance of a computing device of a requestor requesting a protected web resource.
    Type: Grant
    Filed: July 1, 2020
    Date of Patent: January 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Cesar Augusto Rodriguez Bravo, David Jaramillo, Peeyush Jaiswal, Priyansh Jaiswal
  • Patent number: 11558669
    Abstract: A method for dynamic content filtering includes accessing, by a processing unit, a media content that includes several content portions. The method further includes determining a rating tag associated with each content portion from the media content, and a user profile of a user requesting the media content to be rendered. The user profile contains a permission level for the user. The method further includes filtering the content portions from the media content based on the permission level, wherein, in response to the rating tag of a particular content portion exceeding the permission level in the user profile, filtering out the particular content portion. The method further includes rendering content portions that were not filtered out.
    Type: Grant
    Filed: March 6, 2020
    Date of Patent: January 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Priyansh Jaiswal, Slobodan Sipcic, Peeyush Jaiswal
  • Patent number: 11539810
    Abstract: A method for managing data streams for similar content on multiple client devices includes receiving a new request for content from a server provider. In response to determining there is an existing request associated with an existing data stream for the content from the server provider, the method includes blocking the new request. The method also includes receiving the existing data stream from the service provider for the content via an external network and performing a stream computation for the existing data stream to provide a first data stream for the existing request for the content and a second data stream for the new request for the content. The method also includes sending the first data stream for the existing request for the content to a first client device and the second data stream for the new request for the content to a second client device, via a local network.
    Type: Grant
    Filed: May 16, 2022
    Date of Patent: December 27, 2022
    Assignee: International Business Machines Corporation
    Inventors: Peeyush Jaiswal, Priyansh Jaiswal, Paul Llamas Virgen
  • Publication number: 20220405510
    Abstract: A computer that identifies the video. The computer annotates the video using a deep learning tool. The computer analyzes the annotated video to highlight a dangerous condition. The computer identifies a video from a repository with the dangerous condition. The computer analyzes the video and the video from the repository using a similarity analysis. The computer determines a score based on the annotated video and based on comparing the video to the video from the repository and based on determining the score is above a threshold value, the computer generates an action.
    Type: Application
    Filed: June 18, 2021
    Publication date: December 22, 2022
    Inventors: Mauro Marzorati, PAUL LLAMAS VIRGEN, Priyansh Jaiswal, Peeyush Jaiswal
  • Publication number: 20220382922
    Abstract: According to one embodiment, a method, computer system, and computer program product for determining packaging compatibility is provided. The embodiment may include creating a digital twin representation of a manufacturing object based on received data of the manufacturing object. The embodiment may include identifying a position of the digital twin representation within a hierarchy of associated digital twin representations. The embodiment may include monitoring for a change to the digital twin representation. The embodiment may include determining a compatibility of a changed digital twin representation within the hierarchy. In response to determining that the changed digital twin representation is incompatible within the hierarchy, the embodiment may include sending an incompatible change alert.
    Type: Application
    Filed: May 25, 2021
    Publication date: December 1, 2022
    Inventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, PAUL LLAMAS VIRGEN, CAROLINA GARCIA DELGADO
  • Patent number: 11496503
    Abstract: A method for event data fencing includes initializing a media monitoring algorithm, wherein the media monitoring algorithm scans for one or more words relating to a data breach in publicly available reports. Responsive to identifying a report from the publicly available reports relating to a vulnerability associated with the data breach, the method determines whether the vulnerability is associated with event data utilized for an authentication process. Responsive to determining the vulnerability is associated with a portion of the event data utilized for the authentication process, the method fences the portion of event data associated with the vulnerability, wherein fencing prevents the portion of event data from being utilized in the authentication process.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: November 8, 2022
    Assignee: International Business Machines Corporation
    Inventors: Cheranellore Vasudevan, Swaminathan Balasubramanian, Sibasis Das, Priyansh Jaiswal, Peeyush Jaiswal
  • Patent number: 11483371
    Abstract: One or more computer processors compile a list of asynchronous web calls associated with a retrieved webpage. The one or more computer processors map each asynchronous web call in the list of asynchronous web calls with one or more respective HTML snippets. The one or more computer processors identify content associated with the one or more mapped HTML snippets. The one or more computer processors dynamically suspend one or more asynchronous web calls utilizing a trained model and the identified content, wherein suspending the web call prevents the web call from modifying the retrieved webpage.
    Type: Grant
    Filed: November 23, 2020
    Date of Patent: October 25, 2022
    Assignee: International Business Machines Corporation
    Inventors: Peeyush Jaiswal, Shikhar Kwatra, Priyansh Jaiswal
  • Patent number: 11475175
    Abstract: Embodiments for intelligent design structure selection in an Internet of Things (IoT) computing environment by a processor. Levels of satisfaction and behavior patterns of one or more users having similar user profiles influencing the behavior patterns may be learned and evaluated. One or more design structure solutions may be cognitively suggested according to the levels of satisfaction and the behavior patterns.
    Type: Grant
    Filed: June 14, 2018
    Date of Patent: October 18, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peeyush Jaiswal, Priyansh Jaiswal, Paul Krystek, Shikhar Kwatra
  • Patent number: 11468818
    Abstract: A computer-implemented method includes: computing, by a computing device, average pixel colors of a plurality of windows of a screen of a device; normalizing, by the computing device, the average pixel colors of the screen of the device; converting, by the computing device, the normalized average pixel colors of the screen of the device to average pixel gray scale colors; creating, by the computing device, at least one adaptive filter which corresponds to at least one of the average pixel gray scale colors; and overlaying, by the computing device, the at least one adaptive filter to at least one window of the windows of the screen of the device.
    Type: Grant
    Filed: February 10, 2022
    Date of Patent: October 11, 2022
    Assignee: KYNDRYL, INC.
    Inventors: Mauro Marzorati, Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal