Patents by Inventor Peeyush Jaiswal
Peeyush Jaiswal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12206516Abstract: According to one embodiment, a method, computer system, and computer program product for network bandwidth conservation is provided. The embodiment may include monitoring eye focus of a user. The embodiment may include monitoring voice input of the user. In response to determining the eye focus of the user is on a video feed of another user for more than a threshold amount of focus time, the embodiment may include receiving the video feed of the another user. In response to determining the eye focus of the user is on a screen of a video conference and determining, based on the voice input, the user is speaking towards the screen of the video conference, the embodiment may include enabling a camera of the user and transmitting a video feed of the user.Type: GrantFiled: August 31, 2021Date of Patent: January 21, 2025Assignee: International Business Machines CorporationInventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, Paul Llamas Virgen, Victor Povar
-
Publication number: 20240430251Abstract: Described is a method of generating a temporary access code to access a resource by a client device presently not authorized to access the resource, while an authorized user device is currently accessing the resource through a connection to a local network to which the client device is also connected. The method can receive a request from the user device to provide the client device access to the resource and generate a temporary access code to access the resource. The method can also receive a scanned temporary access code from the client device and determine whether the scanned temporary access code matches the generated temporary access code for the resource. In the event the scanned temporary access code matches the generated temporary access code for the resource, the method can grant the client device access to the resource associated with the generated temporary access code.Type: ApplicationFiled: June 22, 2023Publication date: December 26, 2024Inventors: Priyansh Jaiswal, Paul Llamas Virgen, Peeyush Jaiswal
-
Patent number: 12113924Abstract: A method, computer system, and a computer program product for enhanced caller identification (ID) is provided. The present invention may include, receiving, by a receiving party device, a call from a calling party device. The present invention may also include, retrieving, by the receiving party device, a previous interaction information corresponding to a previous interaction between a receiving party associated with the receiving party device and a calling party associated with the calling party device. The present invention may further include, in response to the received call from the calling party device, displaying, on the receiving party device, the retrieved previous interaction information corresponding to the previous interaction between the receiving party and the calling party.Type: GrantFiled: August 24, 2021Date of Patent: October 8, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peeyush Jaiswal, Priyansh Jaiswal
-
Publication number: 20240314062Abstract: A method, a structure, and a computer system for dynamic media routing. The exemplary embodiments may include determining a quality of one or more existing network connections corresponding to one or more participants of a virtual conference and transmitting a media stream sample and a corresponding checksum value between the one or more members of the virtual conference using one or more alternative network connections. The exemplary embodiments may further include determining a quality of the one or more alternative network connections based on the media stream sample and the corresponding checksum value, and, based on determining that the quality of the one or more alternative network connections is higher than the quality of the one or more existing network connections, switching the one or more existing network connections to the one or more alternative network connections.Type: ApplicationFiled: March 17, 2023Publication date: September 19, 2024Inventors: Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
-
Publication number: 20240305678Abstract: A method, a structure, and a computer system for a conference operator. The exemplary embodiments may include extracting features from a conference of participants and determining whether a statement made by a first participant is directed to a second participant based on the features. The exemplary embodiments may further include, based on determining that the statement made by the first participant is directed to the second participant, determining whether the statement made by the first participant is part of a subconference and, based on determining that the statement made by the first participant is part of the subconference, emphasizing media corresponding to the subconference while deemphasizing media corresponding to the conference.Type: ApplicationFiled: March 7, 2023Publication date: September 12, 2024Inventors: Paul Llamas Virgen, Peeyush Jaiswal, Priyansh Jaiswal
-
Patent number: 12058186Abstract: A method, computer system, and a computer program product for private audio communication in a conference call is provided. The present invention may include receiving a mute request from a first participant in a conference call. The present invention may also include muting the first participant in the conference call. The present invention may further include capturing an audio from the muted first participant. The present invention may include transmitting the captured audio to a second participant in the conference call over a private communication channel.Type: GrantFiled: November 30, 2022Date of Patent: August 6, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peeyush Jaiswal, Priyansh Jaiswal, Paul Llamas Virgen
-
Publication number: 20240250951Abstract: A computer-implemented method, according to one embodiment, includes determining whether a first user, the first user being associated with a first virtual security zone that includes a first group of security policies, has a need for a first security policy included in a second virtual security zone associated with a second user. In response to a determination that the first user has a need for the first security policy included in the second virtual security zone, a determination is made as to whether the first user is authorized to at least temporarily inherit the first security policy from the second virtual security zone. The method further includes causing the first security policy to be inherited by the first virtual security zone from the second virtual security zone in response to a determination that the first user is authorized to at least temporarily inherit the first security policy.Type: ApplicationFiled: January 23, 2023Publication date: July 25, 2024Inventors: Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
-
Publication number: 20240202037Abstract: Managing high-demand physical resource usage is provided. An identification of a first physical resource to track availability of the first physical resource via an on-demand virtual queue is received from a first user. An image of the first physical resource is uploaded to the on-demand virtual queue. The image containing metadata regarding a geographic location of the first physical resource. A request to utilize the first physical resource is received from a second user. The second user is added to the on-demand virtual queue for the first physical resource. An indication that the first physical resource is available with the geographic location of the first physical resource is sent to the second user who is first in the on-demand virtual queue. The second user is removed from the on-demand virtual queue in response to receiving an indication that the second user finished utilizing the first physical resource.Type: ApplicationFiled: December 16, 2022Publication date: June 20, 2024Inventors: Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
-
Publication number: 20240179194Abstract: A method, computer system, and a computer program product for private audio communication in a conference call is provided. The present invention may include receiving a mute request from a first participant in a conference call. The present invention may also include muting the first participant in the conference call. The present invention may further include capturing an audio from the muted first participant. The present invention may include transmitting the captured audio to a second participant in the conference call over a private communication channel.Type: ApplicationFiled: November 30, 2022Publication date: May 30, 2024Inventors: Peeyush Jaiswal, Priyansh Jaiswal, Paul Llamas Virgen
-
Publication number: 20240163399Abstract: According to one embodiment, a method, computer system, and computer program product for selective conference recording is provided. The embodiment may include, in response to an initiation of a recording of a web conference, receiving a recording authorization selection and a recording access permission selection from each participant within a plurality of participants to the web conference. The embodiment may also include writing the recording authorization selection and the recording access permission selection to a corresponding TCP header for each participant. The embodiment may further include recording a stream of the web conference for each participant based on the recording authorization selection. The embodiment may also include, in response to the recording ending, encrypting the stream for each participant based on the recording access permission selection. The embodiment may also include generating an enriched recording of the web conference based on the encrypted streams.Type: ApplicationFiled: November 16, 2022Publication date: May 16, 2024Inventors: Priyansh Jaiswal, Peeyush Jaiswal, Paul Llamas Virgen, Jonathan D. Dunne
-
Publication number: 20240070255Abstract: Provided are techniques for continuous authentication for a real time hologram. A request and a hologram are received, where the hologram is embedded with a first key phrase in accordance with a first sequence, and where the first sequence indicates which portions of the first key phrase are embedded in specific locations of the hologram. A first seed and a second seed are retrieved. A second key phrase is generated using the first seed. A second sequence is generated using the second seed. It is determined whether portions of the second key phrase are embedded in specific locations of the hologram in accordance with the second sequence. In response to determining that the portions of the second key phrase are embedded in specific locations of the hologram in accordance with the second sequence, the hologram is displayed, and the request is processed. Otherwise, the request is rejected.Type: ApplicationFiled: August 26, 2022Publication date: February 29, 2024Inventors: Paul LLAMAS VIRGEN, Priyansh JAISWAL, Peeyush JAISWAL
-
Patent number: 11854264Abstract: A computer that identifies the video. The computer annotates the video using a deep learning tool. The computer analyzes the annotated video to highlight a dangerous condition. The computer identifies a video from a repository with the dangerous condition. The computer analyzes the video and the video from the repository using a similarity analysis. The computer determines a score based on the annotated video and based on comparing the video to the video from the repository and based on determining the score is above a threshold value, the computer generates an action.Type: GrantFiled: June 18, 2021Date of Patent: December 26, 2023Assignee: KYNDRYL, INC.Inventors: Mauro Marzorati, Paul Llamas Virgen, Priyansh Jaiswal, Peeyush Jaiswal
-
Patent number: 11829741Abstract: A method, computer program product and computer system to generate a codebase for tenant microservices in a distributed computing environment is provided. A processor receives a request from a tenant to deploy a microservice in a distributed computing environment. A processor retrieves a schema associated with the tenant and the microservice to be deployed. A processor retrieves a constructor class associated with the microservice. A processor deploys an instance of the microservice within the distributed computing environment based on the constructor class associated with the microservice. A processor provides a service endpoint within the distributed computing environment managed by the deployed instance of the microservice.Type: GrantFiled: March 8, 2022Date of Patent: November 28, 2023Assignee: International Business Machines CorporationInventors: Slobodan Sipcic, Peeyush Jaiswal, Naeem Ahmed, Priyansh Jaiswal, Niyati Patel
-
Publication number: 20230289158Abstract: A method, computer program product and computer system to generate a codebase for tenant microservices in a distributed computing environment is provided. A processor receives a request from a tenant to deploy a microservice in a distributed computing environment. A processor retrieves a schema associated with the tenant and the microservice to be deployed. A processor retrieves a constructor class associated with the microservice. A processor deploys an instance of the microservice within the distributed computing environment based on the constructor class associated with the microservice. A processor provides a service endpoint within the distributed computing environment managed by the deployed instance of the microservice.Type: ApplicationFiled: March 8, 2022Publication date: September 14, 2023Inventors: Slobodan Sipcic, Peeyush Jaiswal, Naeem Ahmed, Priyansh Jaiswal, NIYATI PATEL
-
Patent number: 11757892Abstract: A method for a story fill authentication process includes, responsive to receiving a first authentication request to authenticate a user, displaying a first generated story with one or more obfuscated portions, where the first generated story is based on event data associated with a first previously captured event and additional data utilized to enrich the event data for the first previously captured event. The method also includes, responsive to determining text provided for the one or more obfuscated portions of the first generated story at least meets a comparison threshold level to a first complete generated story based on a semantic comparison, granting the user access to a resource associated with the first authentication request.Type: GrantFiled: November 3, 2020Date of Patent: September 12, 2023Assignee: International Business Machines CorporationInventors: Swaminathan Balasubramanian, Peeyush Jaiswal, Cheranellore Vasudevan, Priyansh Jaiswal, Sibasis Das
-
Patent number: 11736619Abstract: A method, computer system, and a computer program product for automated urgency detection is provided. The present invention may include capturing at least one caller parameter. The present invention may include determining whether an incoming call is urgent. The present invention may include conveying a determined urgency to a receiver of the incoming call.Type: GrantFiled: December 3, 2020Date of Patent: August 22, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shikhar Kwatra, Peeyush Jaiswal, Raghuveer Prasad Nagar, Priyansh Jaiswal, Reji Jose, Jeremy R. Fox
-
Patent number: 11722470Abstract: A producer system may insert an encrypted value in a field in a message, where the message is associated with a schema that specifies a public key used to encrypt the encrypted value of the field and further specifies a type of an unencrypted form of the encrypted value, insert one or more unencrypted values in one or more fields in the message, and send the message to an external computing system. A consumer system may receive the message, determine, based at least in part on the public key specified by the schema, a private key associated with the public key, and decrypt, using the private key, the encrypted value of the field into the unencrypted form of the encrypted value.Type: GrantFiled: August 29, 2018Date of Patent: August 8, 2023Assignee: International Business Machines CorporationInventors: Slobodan Sipcic, Peeyush Jaiswal, Priyansh Jaiswal, Austin Michael Delamar, Naeem Ahmed, Rahul Ragunathan
-
Publication number: 20230245127Abstract: A computer-implemented method includes: setting up, by a computing device, an identification profile by capturing a first image using a camera of the computing device; requesting, by the computing device, an authentication action by an authentication device; comparing, by the computing device, recognized elements of the first image and a second image, the recognized elements of the first image and the second image including at least one of ephemeral features and transient features; determining, by the computing device, whether a confidence level is above a predetermined threshold based on a comparison of the recognized elements of the first image and the second image; and completing, by the computing device, authentication of the computing device with the authentication device in response to a determination that the confidence level is above the predetermined threshold.Type: ApplicationFiled: February 2, 2022Publication date: August 3, 2023Inventors: Mauro MARZORATI, Paul LLAMAS VIRGEN, Priyansh JAISWAL, Peeyush JAISWAL
-
Patent number: 11646020Abstract: A method for managing electronic communication notifications includes responsive to receiving a communication from a first user, identifying one or more keywords in the communication based on a plurality of keywords associated with a plurality of queries previously presented by a second user. Determining whether the communication includes a reply to a first open query, wherein the first open query represents a question previously presented by the second user directed to the first user. Responsive to determining the communication from the first user includes the reply to the first open query, notifying the second user utilizing a first alert type for the communication from the first user that includes the reply for the first open query, wherein the first alert type is different from a second alert type for notifying the second user regarding a communication that does not include the reply for the first open query.Type: GrantFiled: January 24, 2020Date of Patent: May 9, 2023Assignee: International Business Machines CorporationInventors: Priyansh Jaiswal, Peeyush Jaiswal
-
Publication number: 20230069102Abstract: A method, computer system, and a computer program product for enhanced caller identification (ID) is provided. The present invention may include, receiving, by a receiving party device, a call from a calling party device. The present invention may also include, retrieving, by the receiving party device, a previous interaction information corresponding to a previous interaction between a receiving party associated with the receiving party device and a calling party associated with the calling party device. The present invention may further include, in response to the received call from the calling party device, displaying, on the receiving party device, the retrieved previous interaction information corresponding to the previous interaction between the receiving party and the calling party.Type: ApplicationFiled: August 24, 2021Publication date: March 2, 2023Inventors: Peeyush Jaiswal, Priyansh Jaiswal