Patents by Inventor Peeyush Jaiswal

Peeyush Jaiswal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090235043
    Abstract: A system, method and program product for automatically partitioning tables in a database system. A partitioning system is provided that includes: a system for analyzing a plurality of partition settings that predefines partitioning operations that need to occur in the future; and an automatic partition roll-in system that automatically causes tables to be partitioned based on the partition settings.
    Type: Application
    Filed: March 17, 2008
    Publication date: September 17, 2009
    Inventors: Peeyush Jaiswal, Vikram S. Khatri, Burt L. Vialpando
  • Publication number: 20090125297
    Abstract: A computer-implemented method for dynamically generating a speech recognition grammar is provided. The method includes determining a target entry, and accessing a plurality of potential distractors. The method also includes selecting one or more distractors from the plurality of potential distractors. More particularly, each potential distractor selected is selected based upon an assessed acoustic dissimilarity between the distractor and the target entry. The method further includes dynamically generating a speech recognition grammar that includes the target entry and one or more of the distractors selected based upon an acoustic dissimilarity to the target entry.
    Type: Application
    Filed: November 8, 2007
    Publication date: May 14, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James Robert Lewis, Andrew Simpson, Peeyush Jaiswal
  • Publication number: 20090125898
    Abstract: A system for modifying an existing standard-based system at runtime can include a computer having an annotation framework layer configured to execute in conjunction with the standard-based system. Responsive to a user request, the annotation framework layer can associate a constraint with a selected message type. The constraint can specify a limitation on information that is requested within a service request type of message. The annotation framework layer can intercept a message exchanged between a client and a Web-based service and apply the constraint. When the intercepted message is a service request type of message, at least one parameter of the intercepted message can be modified to conform with the limitation after the service request is sent from the client and prior to the service request being received by the Web-based service. The message can be stored.
    Type: Application
    Filed: November 3, 2008
    Publication date: May 14, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Akram Bou-Ghannam, Vishwanath Narayan, Peeyush Jaiswal
  • Publication number: 20090110168
    Abstract: A method of providing a telephony service can include creating a database of subscriber identities and subscriber voice prints and telephony services associated with the subscriber identities and receiving a spoken utterance from a subscriber. A subscriber identity can be determined according to voice print identification of the spoken utterance and a telephony service associated with the subscriber can be activated according to the determined subscriber identity.
    Type: Application
    Filed: December 31, 2008
    Publication date: April 30, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vicki L. Colson, Brent L. Davis, Peeyush Jaiswal, Victor S. Moore
  • Publication number: 20090113395
    Abstract: A validation method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host, where the ghost agent can move within the grid environment. The actions of the host can be replicated by the ghost agent. Data related to the replicated actions can be compared with validation data. Validation output can be generated based upon the comparison.
    Type: Application
    Filed: December 31, 2008
    Publication date: April 30, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Michael Mirt
  • Patent number: 7522718
    Abstract: A method of providing telephony services can include receiving a request to query a subscriber information data store to determine service description information for a call. The service description information can specify at least one telephony service associated with a subscriber for use in processing the call. The method further can include querying the subscriber information data store to determine the service description information, receiving the service description information from the subscriber information data store, and providing the service description information to a telephony service node to implement a telephony service specified by the service description information with respect to the call.
    Type: Grant
    Filed: April 29, 2008
    Date of Patent: April 21, 2009
    Assignee: International Business Machines Corporation
    Inventors: Vicki Colson, Thomas Creamer, Peeyush Jaiswal, Moore Victor
  • Patent number: 7516443
    Abstract: A testing method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host. The actions of the host can be replicated within the ghost agent. At least one test routine can be loaded into the ghost agent. The test routine can be executed within the ghost agent. Moreover, the executing step can utilize data gathered from the replicated actions. Test output can be generated from the test routine.
    Type: Grant
    Filed: September 19, 2003
    Date of Patent: April 7, 2009
    Assignee: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Michael H. Mirt
  • Publication number: 20090083749
    Abstract: One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
    Type: Application
    Filed: December 2, 2008
    Publication date: March 26, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Neil A. Katz, Michael Mirt, Victor S. Moore
  • Publication number: 20090080623
    Abstract: A method of providing voice metrics over an established telephone call between a user and a subscriber can include receiving voice information from the user over the call and determining biometric information from the voice information for the user. The method further can include encoding the biometric metric information and sending the biometric information to the subscriber over the call.
    Type: Application
    Filed: December 8, 2008
    Publication date: March 26, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas E. Creamer, Peeyush Jaiswal, Victor S. Moore
  • Publication number: 20090080639
    Abstract: A method, system and computer-readable medium are disclosed for adjusting port usage and call duration in an interactive voice response (IVR) system based on changes in call volume. In one embodiment, the method comprises monitoring usage of one or more ports within an IVR system. A determination is made whether the usage of the ports exceeds a predetermined threshold for port usage. In response to determining port usage exceeds the predetermined threshold, the method adjusts one or more call flows within the IVR system to reduce call duration within the IVR system.
    Type: Application
    Filed: September 24, 2007
    Publication date: March 26, 2009
    Inventors: Sheri G. Daye, Peeyush Jaiswal, Naveen Narayan, Fang Wang
  • Publication number: 20090077116
    Abstract: A method, a system, and an apparatus for permitting a user to remain in contact with at least one other person. The present invention provides a method, a system, and an apparatus that is capable of enabling a user to remain in contact with others through a service that checks contacts set up in a predetermined contact list. The contact list is then contacted and the user is contacted with the results. As such, the present invention permits the user to remain in contact with a significant number of entities while saving time and effort by ensuring the user is only contacted with certain information. The system and method also permits the user to remain in contact even when the user is unavailable.
    Type: Application
    Filed: November 21, 2008
    Publication date: March 19, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas E. Creamer, Peeyush Jaiswal, Victor S. Moore, Anilkumar B. Patel
  • Patent number: 7506174
    Abstract: A method (10) and system (50) for using a biometrically enabled password can include an input device (58) capable of entering a password entry and a processor (56) coupled to the input device. The processor can monitor (16 or 26) a cadence such as monitoring a keystroke signature, store the cadence of the password entry, compare (28) the cadence of a subsequent password entry with the cadence of at least one previous password entry, establish (30) a stability metric with respect to the cadences compared, and require (32) both the password entry and the cadence once the cadence meets the stability metric. The processor can require only the password entry until the stability metric for the cadence is achieved. The processor can also determine (14) if the password entry is new and optionally require (18) only the password entry to enter the system if determined as new.
    Type: Grant
    Filed: November 3, 2004
    Date of Patent: March 17, 2009
    Assignee: Lenovo (Singapore) Pte Ltd.
    Inventors: Brent L. Davis, Shailesh B. Gandhi, Peeyush Jaiswal, James R. Lewis, Fang Wang
  • Publication number: 20090052634
    Abstract: A method of providing identifying information over a voice communications link can include receiving, from a call participant, a personal identification code over the voice communications link, determining identifying information for the call participant using the personal identification code, and encoding the identifying information of the call participant within a voice stream carried by the voice communications link. The voice stream and identifying information can be sent to a subscriber.
    Type: Application
    Filed: November 3, 2008
    Publication date: February 26, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas E. Creamer, Peeyush Jaiswal, Victor S. Moore
  • Patent number: 7496891
    Abstract: A method of modifying an existing standard-based system can include automatically identifying at least one message of the standard-based system at runtime. A constraint can be associated with a selected message of the standard-based system at runtime. The constraint can be one that is not a specifiable option within the standard-based system. The method also can include intercepting the selected message and applying the constraint to the selected message.
    Type: Grant
    Filed: December 22, 2004
    Date of Patent: February 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Akram Bou-Ghannam, Vishwanath Narayan, Peeyush Jaiswal
  • Publication number: 20090045251
    Abstract: The present invention provides a system and method to detect credit card fraud. It allows the user, or the credit card company, to limit the use of a particular credit card according to authorized use data which is prespecified by the card holder, such as allowing authorized use within a geographical area or a set of ZIP codes. This way, the credit card owner, can limit the credit card's use according to the card holder, such as within a specified geographical area, a date frame, a time frame or even to within particular stores or with particular vendors. In addition, data from the credit card's magnetic stripe is conveyed and compared against the authorized use data. With respect to geographical information, the present use geographical data is provided either by the particular point-of-sale terminal or from a GPS system.
    Type: Application
    Filed: August 14, 2007
    Publication date: February 19, 2009
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Publication number: 20090049136
    Abstract: A method and system manage a plurality of servers coupled to a network. Each of the servers is identified by a server name. At least one of the servers is identified by an old server name. The method notifies at least some of the plurality of servers that at a specified time the old server name will be changed to a new server name.
    Type: Application
    Filed: August 16, 2007
    Publication date: February 19, 2009
    Inventors: Peeyush Jaiswal, Naveen Narayan, Fang Wang
  • Patent number: 7493145
    Abstract: A method of providing a telephony service can include creating a database of subscriber identities and subscriber voice prints and telephony services associated with the subscriber identities and receiving a spoken utterance from a subscriber. A subscriber identity can be determined according to voice print identification of the spoken utterance and a telephony service associated with the subscriber can be activated according to the determined subscriber identity.
    Type: Grant
    Filed: December 20, 2002
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Vi ki L. Colson, Brent L. Davis, Peeyush Jaiswal, Victor S. Moore
  • Patent number: 7493387
    Abstract: A validation method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host, where the ghost agent can move within the grid environment. The actions of the host can be replicated by the ghost agent. Data related to the replicated actions can be compared with validation data. Validation output can be generated based upon the comparison.
    Type: Grant
    Filed: September 19, 2003
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Michael Mirt
  • Publication number: 20090041210
    Abstract: A method of and system for optimizing interactive voice response (IVR) unit port utilization starts each call of a plurality of calls on a separate IVR unit port. The method launches an IVR call flow for each call. Each IVR call flow includes a section that is common to all of the call flows. The method conferences together on a single IVR unit port at least some of the plurality of calls for the common section of the call flow by transferring calls to the single IVR unit port when each transferred call reaches the common section. The method synchronizes the calls conferenced together on the single port by inserting into the call flow on the single IVR unit port an on-hold treatment. The method starts the common section of the call flow when all calls have been transferred to the single IVR unit port.
    Type: Application
    Filed: August 6, 2007
    Publication date: February 12, 2009
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Patent number: 7486783
    Abstract: A method, system and apparatus for processing bill payments in a PSTN. The method of the invention can include, responsive to answering a telephone call from a caller over the PSTN, identifying the caller from a data communications source external to the telephone call and retrieving billing information for the identified caller. Once the billing information has been retrieved for the identified caller, the payment of a bill can be processed based upon the billing information. In a preferred aspect of the invention, the identifying step can include identifying the caller based upon identifying information for the caller received through a data communications link from a name resolution adapter disposed within the PSTN. For instance, the identifying step can include identifying the caller based upon identifying information retrieved from a LIDB and transmitted by the name resolution adapter.
    Type: Grant
    Filed: August 12, 2004
    Date of Patent: February 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Thomas E. Creamer, Peeyush Jaiswal, Victor S. Moore, Scott L. Winters