Patents by Inventor Peeyush Jaiswal

Peeyush Jaiswal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12206516
    Abstract: According to one embodiment, a method, computer system, and computer program product for network bandwidth conservation is provided. The embodiment may include monitoring eye focus of a user. The embodiment may include monitoring voice input of the user. In response to determining the eye focus of the user is on a video feed of another user for more than a threshold amount of focus time, the embodiment may include receiving the video feed of the another user. In response to determining the eye focus of the user is on a screen of a video conference and determining, based on the voice input, the user is speaking towards the screen of the video conference, the embodiment may include enabling a camera of the user and transmitting a video feed of the user.
    Type: Grant
    Filed: August 31, 2021
    Date of Patent: January 21, 2025
    Assignee: International Business Machines Corporation
    Inventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, Paul Llamas Virgen, Victor Povar
  • Publication number: 20240430251
    Abstract: Described is a method of generating a temporary access code to access a resource by a client device presently not authorized to access the resource, while an authorized user device is currently accessing the resource through a connection to a local network to which the client device is also connected. The method can receive a request from the user device to provide the client device access to the resource and generate a temporary access code to access the resource. The method can also receive a scanned temporary access code from the client device and determine whether the scanned temporary access code matches the generated temporary access code for the resource. In the event the scanned temporary access code matches the generated temporary access code for the resource, the method can grant the client device access to the resource associated with the generated temporary access code.
    Type: Application
    Filed: June 22, 2023
    Publication date: December 26, 2024
    Inventors: Priyansh Jaiswal, Paul Llamas Virgen, Peeyush Jaiswal
  • Patent number: 12113924
    Abstract: A method, computer system, and a computer program product for enhanced caller identification (ID) is provided. The present invention may include, receiving, by a receiving party device, a call from a calling party device. The present invention may also include, retrieving, by the receiving party device, a previous interaction information corresponding to a previous interaction between a receiving party associated with the receiving party device and a calling party associated with the calling party device. The present invention may further include, in response to the received call from the calling party device, displaying, on the receiving party device, the retrieved previous interaction information corresponding to the previous interaction between the receiving party and the calling party.
    Type: Grant
    Filed: August 24, 2021
    Date of Patent: October 8, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peeyush Jaiswal, Priyansh Jaiswal
  • Publication number: 20240314062
    Abstract: A method, a structure, and a computer system for dynamic media routing. The exemplary embodiments may include determining a quality of one or more existing network connections corresponding to one or more participants of a virtual conference and transmitting a media stream sample and a corresponding checksum value between the one or more members of the virtual conference using one or more alternative network connections. The exemplary embodiments may further include determining a quality of the one or more alternative network connections based on the media stream sample and the corresponding checksum value, and, based on determining that the quality of the one or more alternative network connections is higher than the quality of the one or more existing network connections, switching the one or more existing network connections to the one or more alternative network connections.
    Type: Application
    Filed: March 17, 2023
    Publication date: September 19, 2024
    Inventors: Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
  • Publication number: 20240305678
    Abstract: A method, a structure, and a computer system for a conference operator. The exemplary embodiments may include extracting features from a conference of participants and determining whether a statement made by a first participant is directed to a second participant based on the features. The exemplary embodiments may further include, based on determining that the statement made by the first participant is directed to the second participant, determining whether the statement made by the first participant is part of a subconference and, based on determining that the statement made by the first participant is part of the subconference, emphasizing media corresponding to the subconference while deemphasizing media corresponding to the conference.
    Type: Application
    Filed: March 7, 2023
    Publication date: September 12, 2024
    Inventors: Paul Llamas Virgen, Peeyush Jaiswal, Priyansh Jaiswal
  • Patent number: 12058186
    Abstract: A method, computer system, and a computer program product for private audio communication in a conference call is provided. The present invention may include receiving a mute request from a first participant in a conference call. The present invention may also include muting the first participant in the conference call. The present invention may further include capturing an audio from the muted first participant. The present invention may include transmitting the captured audio to a second participant in the conference call over a private communication channel.
    Type: Grant
    Filed: November 30, 2022
    Date of Patent: August 6, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peeyush Jaiswal, Priyansh Jaiswal, Paul Llamas Virgen
  • Publication number: 20240250951
    Abstract: A computer-implemented method, according to one embodiment, includes determining whether a first user, the first user being associated with a first virtual security zone that includes a first group of security policies, has a need for a first security policy included in a second virtual security zone associated with a second user. In response to a determination that the first user has a need for the first security policy included in the second virtual security zone, a determination is made as to whether the first user is authorized to at least temporarily inherit the first security policy from the second virtual security zone. The method further includes causing the first security policy to be inherited by the first virtual security zone from the second virtual security zone in response to a determination that the first user is authorized to at least temporarily inherit the first security policy.
    Type: Application
    Filed: January 23, 2023
    Publication date: July 25, 2024
    Inventors: Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
  • Publication number: 20240202037
    Abstract: Managing high-demand physical resource usage is provided. An identification of a first physical resource to track availability of the first physical resource via an on-demand virtual queue is received from a first user. An image of the first physical resource is uploaded to the on-demand virtual queue. The image containing metadata regarding a geographic location of the first physical resource. A request to utilize the first physical resource is received from a second user. The second user is added to the on-demand virtual queue for the first physical resource. An indication that the first physical resource is available with the geographic location of the first physical resource is sent to the second user who is first in the on-demand virtual queue. The second user is removed from the on-demand virtual queue in response to receiving an indication that the second user finished utilizing the first physical resource.
    Type: Application
    Filed: December 16, 2022
    Publication date: June 20, 2024
    Inventors: Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
  • Publication number: 20240179194
    Abstract: A method, computer system, and a computer program product for private audio communication in a conference call is provided. The present invention may include receiving a mute request from a first participant in a conference call. The present invention may also include muting the first participant in the conference call. The present invention may further include capturing an audio from the muted first participant. The present invention may include transmitting the captured audio to a second participant in the conference call over a private communication channel.
    Type: Application
    Filed: November 30, 2022
    Publication date: May 30, 2024
    Inventors: Peeyush Jaiswal, Priyansh Jaiswal, Paul Llamas Virgen
  • Publication number: 20240163399
    Abstract: According to one embodiment, a method, computer system, and computer program product for selective conference recording is provided. The embodiment may include, in response to an initiation of a recording of a web conference, receiving a recording authorization selection and a recording access permission selection from each participant within a plurality of participants to the web conference. The embodiment may also include writing the recording authorization selection and the recording access permission selection to a corresponding TCP header for each participant. The embodiment may further include recording a stream of the web conference for each participant based on the recording authorization selection. The embodiment may also include, in response to the recording ending, encrypting the stream for each participant based on the recording access permission selection. The embodiment may also include generating an enriched recording of the web conference based on the encrypted streams.
    Type: Application
    Filed: November 16, 2022
    Publication date: May 16, 2024
    Inventors: Priyansh Jaiswal, Peeyush Jaiswal, Paul Llamas Virgen, Jonathan D. Dunne
  • Publication number: 20240070255
    Abstract: Provided are techniques for continuous authentication for a real time hologram. A request and a hologram are received, where the hologram is embedded with a first key phrase in accordance with a first sequence, and where the first sequence indicates which portions of the first key phrase are embedded in specific locations of the hologram. A first seed and a second seed are retrieved. A second key phrase is generated using the first seed. A second sequence is generated using the second seed. It is determined whether portions of the second key phrase are embedded in specific locations of the hologram in accordance with the second sequence. In response to determining that the portions of the second key phrase are embedded in specific locations of the hologram in accordance with the second sequence, the hologram is displayed, and the request is processed. Otherwise, the request is rejected.
    Type: Application
    Filed: August 26, 2022
    Publication date: February 29, 2024
    Inventors: Paul LLAMAS VIRGEN, Priyansh JAISWAL, Peeyush JAISWAL
  • Patent number: 11854264
    Abstract: A computer that identifies the video. The computer annotates the video using a deep learning tool. The computer analyzes the annotated video to highlight a dangerous condition. The computer identifies a video from a repository with the dangerous condition. The computer analyzes the video and the video from the repository using a similarity analysis. The computer determines a score based on the annotated video and based on comparing the video to the video from the repository and based on determining the score is above a threshold value, the computer generates an action.
    Type: Grant
    Filed: June 18, 2021
    Date of Patent: December 26, 2023
    Assignee: KYNDRYL, INC.
    Inventors: Mauro Marzorati, Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
  • Patent number: 11829741
    Abstract: A method, computer program product and computer system to generate a codebase for tenant microservices in a distributed computing environment is provided. A processor receives a request from a tenant to deploy a microservice in a distributed computing environment. A processor retrieves a schema associated with the tenant and the microservice to be deployed. A processor retrieves a constructor class associated with the microservice. A processor deploys an instance of the microservice within the distributed computing environment based on the constructor class associated with the microservice. A processor provides a service endpoint within the distributed computing environment managed by the deployed instance of the microservice.
    Type: Grant
    Filed: March 8, 2022
    Date of Patent: November 28, 2023
    Assignee: International Business Machines Corporation
    Inventors: Slobodan Sipcic, Peeyush Jaiswal, Naeem Ahmed, Priyansh Jaiswal, Niyati Patel
  • Publication number: 20230289158
    Abstract: A method, computer program product and computer system to generate a codebase for tenant microservices in a distributed computing environment is provided. A processor receives a request from a tenant to deploy a microservice in a distributed computing environment. A processor retrieves a schema associated with the tenant and the microservice to be deployed. A processor retrieves a constructor class associated with the microservice. A processor deploys an instance of the microservice within the distributed computing environment based on the constructor class associated with the microservice. A processor provides a service endpoint within the distributed computing environment managed by the deployed instance of the microservice.
    Type: Application
    Filed: March 8, 2022
    Publication date: September 14, 2023
    Inventors: Slobodan Sipcic, Peeyush Jaiswal, Naeem Ahmed, Priyansh Jaiswal, NIYATI PATEL
  • Patent number: 11757892
    Abstract: A method for a story fill authentication process includes, responsive to receiving a first authentication request to authenticate a user, displaying a first generated story with one or more obfuscated portions, where the first generated story is based on event data associated with a first previously captured event and additional data utilized to enrich the event data for the first previously captured event. The method also includes, responsive to determining text provided for the one or more obfuscated portions of the first generated story at least meets a comparison threshold level to a first complete generated story based on a semantic comparison, granting the user access to a resource associated with the first authentication request.
    Type: Grant
    Filed: November 3, 2020
    Date of Patent: September 12, 2023
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Peeyush Jaiswal, Cheranellore Vasudevan, Priyansh Jaiswal, Sibasis Das
  • Patent number: 11736619
    Abstract: A method, computer system, and a computer program product for automated urgency detection is provided. The present invention may include capturing at least one caller parameter. The present invention may include determining whether an incoming call is urgent. The present invention may include conveying a determined urgency to a receiver of the incoming call.
    Type: Grant
    Filed: December 3, 2020
    Date of Patent: August 22, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shikhar Kwatra, Peeyush Jaiswal, Raghuveer Prasad Nagar, Priyansh Jaiswal, Reji Jose, Jeremy R. Fox
  • Patent number: 11722470
    Abstract: A producer system may insert an encrypted value in a field in a message, where the message is associated with a schema that specifies a public key used to encrypt the encrypted value of the field and further specifies a type of an unencrypted form of the encrypted value, insert one or more unencrypted values in one or more fields in the message, and send the message to an external computing system. A consumer system may receive the message, determine, based at least in part on the public key specified by the schema, a private key associated with the public key, and decrypt, using the private key, the encrypted value of the field into the unencrypted form of the encrypted value.
    Type: Grant
    Filed: August 29, 2018
    Date of Patent: August 8, 2023
    Assignee: International Business Machines Corporation
    Inventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, Austin Michael Delamar, Naeem Ahmed, Rahul Ragunathan
  • Publication number: 20230245127
    Abstract: A computer-implemented method includes: setting up, by a computing device, an identification profile by capturing a first image using a camera of the computing device; requesting, by the computing device, an authentication action by an authentication device; comparing, by the computing device, recognized elements of the first image and a second image, the recognized elements of the first image and the second image including at least one of ephemeral features and transient features; determining, by the computing device, whether a confidence level is above a predetermined threshold based on a comparison of the recognized elements of the first image and the second image; and completing, by the computing device, authentication of the computing device with the authentication device in response to a determination that the confidence level is above the predetermined threshold.
    Type: Application
    Filed: February 2, 2022
    Publication date: August 3, 2023
    Inventors: Mauro MARZORATI, Paul LLAMAS VIRGEN, Priyansh JAISWAL, Peeyush JAISWAL
  • Patent number: 11646020
    Abstract: A method for managing electronic communication notifications includes responsive to receiving a communication from a first user, identifying one or more keywords in the communication based on a plurality of keywords associated with a plurality of queries previously presented by a second user. Determining whether the communication includes a reply to a first open query, wherein the first open query represents a question previously presented by the second user directed to the first user. Responsive to determining the communication from the first user includes the reply to the first open query, notifying the second user utilizing a first alert type for the communication from the first user that includes the reply for the first open query, wherein the first alert type is different from a second alert type for notifying the second user regarding a communication that does not include the reply for the first open query.
    Type: Grant
    Filed: January 24, 2020
    Date of Patent: May 9, 2023
    Assignee: International Business Machines Corporation
    Inventors: Priyansh Jaiswal, Peeyush Jaiswal
  • Publication number: 20230069102
    Abstract: A method, computer system, and a computer program product for enhanced caller identification (ID) is provided. The present invention may include, receiving, by a receiving party device, a call from a calling party device. The present invention may also include, retrieving, by the receiving party device, a previous interaction information corresponding to a previous interaction between a receiving party associated with the receiving party device and a calling party associated with the calling party device. The present invention may further include, in response to the received call from the calling party device, displaying, on the receiving party device, the retrieved previous interaction information corresponding to the previous interaction between the receiving party and the calling party.
    Type: Application
    Filed: August 24, 2021
    Publication date: March 2, 2023
    Inventors: Peeyush Jaiswal, Priyansh Jaiswal