Patents by Inventor Prabir Bhattacharya

Prabir Bhattacharya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240126791
    Abstract: This disclosure relates generally to long-form answer extraction and, more particularly, to long-form answer extraction based on combination of sentence index generation techniques. Existing answer extractions techniques have achieved significant progress for extractive short answers; however, less progress has been made for long form questions that require explanations. Further the state-of-art long-answer extractions techniques result in poorer long-form answers or not address sparsity which becomes an issue longer contexts. Additionally, pre-trained generative sequence-to-sequence models are gaining popularity for factoid answer extraction tasks. Hence the disclosure proposes a long-form answer extraction based on several steps including training a set of generative sequence-to-sequence models comprising a sentence indices generation model and a sentence index spans generation.
    Type: Application
    Filed: September 20, 2023
    Publication date: April 18, 2024
    Applicant: Tata Consultancy Services Limited
    Inventors: ANUMITA DASGUPTABANDYOPADHYAY, PRABIR MALLICK, TAPAS NAYAK, INDRAJIT BHATTACHARYA, SANGAMESHWAR SURYAKANT PATIL
  • Publication number: 20240119075
    Abstract: Conventional Question and Answer (QA) datasets are created for generating factoid questions only and the present disclosure generates longform technical QA dataset from textbooks. Initially, the system receives a technical textbook document and extracts a plurality of contexts. Further, a first plurality of questions are generated based on the plurality of contexts. A plurality of answerable questions are generated further based on the plurality of contexts using an unsupervised template-based matching technique. Further, a combined plurality of questions are generated by combining the first plurality of questions and the plurality of answerable questions. Further, an answer for the combined plurality of questions are generated using an autoregressive language model and a mapping score is computed. Further, a plurality of optimal answers are selected based on the corresponding mapping score.
    Type: Application
    Filed: October 2, 2023
    Publication date: April 11, 2024
    Applicant: Tata Consultancy Services Limited
    Inventors: PRABIR MALLICK, SAMIRAN PAL, AVINASH KUMAR SINGH, ANUMITA DASGUPTA, SOHAM DATTA, KAAMRAAN KHAN, TAPAS NAYAK, INDRAJIT BHATTACHARYA, GIRISH KESHAV PALSHIKAR
  • Patent number: 7236590
    Abstract: A data structure to be used for representing the problem is selected. An instance of the problem is represented with the data structure. The data is encrypted with a sequence which is obtained by solving the problem. Alternatively, in an alternative embodiment of the present invention, a program for heuristically solving an NP-hard problem is received. A data structure that represents an instance of the problem is received. The program is applied to the instance of the problem to obtain a sequence. The data is decrypted with the sequence.
    Type: Grant
    Filed: December 14, 2000
    Date of Patent: June 26, 2007
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Gregory Michael Perkins, Prabir Bhattacharya
  • Patent number: 7114080
    Abstract: A remote computer access facility uses two dedicated computers outside the firewall. To ensure security the system makes use of biometrics features and a one-time password mechanism on top of secure socket layer (SSL) to authenticate a user. The system also provides three layers of security levels for transmission. The first layer establishes an SSL connection, the second layer periodically asks for a one-time password (OTP), and the third layer uses any kind of conventional encryption. The combination of the biometric, OTP and encryption key forms a strong password. The system also uses a mechanism for secure file accesses within the organization based on the security privileges assigned to various users. Based on the user's access privileges, the server side software module sends the requested file in an encrypted form along with the key to decrypt that fileā€”this key is encrypted by the user's strong password.
    Type: Grant
    Filed: March 28, 2001
    Date of Patent: September 26, 2006
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Mahfuzur Rahman, Prabir Bhattacharya
  • Publication number: 20060061599
    Abstract: In some embodiments, systems and methods for visually rendering images rotate images at time of display based on annotations indicating needed rotations. In other embodiments, systems and methods for visually rendering images rotate images at time of display by determining a needed rotation for an image based on automatic orientation recognition. In further embodiments, systems and methods for visually rendering images rotate images at time of display by utilizing fuzzy logic to determine a best rotation angle for an image based on a none precise marking generated by computer vision or signal processing applied to the image. In yet further embodiments, systems and methods for annotating images annotate images at time of image capture, time of image display, or any time in between by using one or more of automatic image orientation recognition, user input specifying a needed rotation, and sensed orientation of an image capture mechanism.
    Type: Application
    Filed: September 17, 2004
    Publication date: March 23, 2006
    Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.
    Inventors: Hong Yu, Prabir Bhattacharya
  • Patent number: 7006630
    Abstract: A multilayer digital content protection system, particularly for a digital cinema application is provided. Detection of unauthorized activity at the time it is occurring is provided using a first protection layer. Two layers of imperceptible watermarks, one camcorder viewable and one camcorder invisible are inserted into unauthorized copies of the digital content with second and third protection layers. Strong near infrared is also used to degrade the quality of any attempted unauthorized recording of digital content using a camcorder.
    Type: Grant
    Filed: June 3, 2003
    Date of Patent: February 28, 2006
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Hong Heather Yu, Prabir Bhattacharya
  • Publication number: 20050193201
    Abstract: A network method in which a first client securely accesses and controls an electronic device coupled to a second client is provided. Mutual authentication is performed between the first client and a proxy coupled to the second client. The first client requests presence information related to the electronic device from the proxy. The presence information is sent from the proxy to the first client. The first client sends a signal to control at least one function of the electronic device.
    Type: Application
    Filed: February 26, 2004
    Publication date: September 1, 2005
    Inventors: Mahfuzur Rahman, Prabir Bhattacharya
  • Patent number: 6910132
    Abstract: The user's fingerprint is analyzed by the pattern matching module which draws upon pre-stored fingerprint data that may be encrypted. The pattern matching module work in conjuntion with an authorization module and resource access module to ascertain a user's authorization level or security level and then give the user access to only those computer resources for which he or she has been granted authorization. The system preferably employs inter-modular encryption so that the system can be distributed across a network if desired.
    Type: Grant
    Filed: September 15, 2000
    Date of Patent: June 21, 2005
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventor: Prabir Bhattacharya
  • Publication number: 20050024516
    Abstract: An improved digital camera is provided that detects pictures of human subjects whose eyes are not closed. The improved digital camera generally includes an eye detection activation element that is operable to initiate an eye detection mode; an image sensor that captures image data for a target subject; an image processor that converts the image data into a digital image form; and an eye detection component that evaluates the digital image form for the target subject and determines whether at least one eye of the target subject is closed.
    Type: Application
    Filed: July 31, 2003
    Publication date: February 3, 2005
    Inventors: Robert Fish, Prabir Bhattacharya
  • Publication number: 20040247120
    Abstract: A multilayer digital content protection system, particularly for a digital cinema application is provided. Detection of unauthorized activity at the time it is occurring is provided using a first protection layer. Two layers of imperceptible watermarks, one camcorder viewable and one camcorder invisible are inserted into unauthorized copies of the digital content with second and third protection layers. Strong near infrared is also used to degrade the quality of any attempted unauthorized recording of digital content using a camcorder.
    Type: Application
    Filed: June 3, 2003
    Publication date: December 9, 2004
    Inventors: Hong Heather Yu, Prabir Bhattacharya
  • Publication number: 20040064702
    Abstract: One aspect of the present invention is a method for embedding a watermark in a digital movie. The method includes: buffering portions of an electronic digital representation of a digital movie in at least one digital representation domain; embedding an electronic watermark into at least one of the buffered digital representation domain of the movie; and presenting portions of the digital movie while the embedding is occurring.
    Type: Application
    Filed: September 27, 2002
    Publication date: April 1, 2004
    Inventors: Hong Heather Yu, Prabir Bhattacharya
  • Publication number: 20040019805
    Abstract: An apparatus and method for secure data handling in a distributed network is implemented by a secure agent connected by a secure channel to a primary communication unit, secondary communication unit, and clients. The primary communication unit and secondary communication units are connected to separate key-stores having keys. A method using distributed keys for encryption and decryption is disclosed. Another method utilizes multiple-time keys.
    Type: Application
    Filed: July 25, 2002
    Publication date: January 29, 2004
    Inventors: Gregory M. Perkins, Dennis Bushmitch, Prabir Bhattacharya
  • Publication number: 20030202683
    Abstract: A method for interpreting objects alongside a road obtains an image of an object in the vicinity of the road, displays the image to an occupant of the vehicle and receives a signal selecting the object. The method identifies the object by extracting and recognizing text from the image. The method then translates the text into a language with which the occupant of the vehicle is familiar and presents the translated text to the occupant either as a text overlay on the displayed image or as a speech signal.
    Type: Application
    Filed: April 30, 2002
    Publication date: October 30, 2003
    Inventors: Yue Ma, Prabir Bhattacharya, Jinhong Katherine Guo, Chieh-Chung Chang
  • Patent number: 6566504
    Abstract: A process for inactivating viral contaminants of lyophilized Factor VIII by heat is provided. The process comprises forming a stable complex between the Factor VIII and a cyclodextrin in an aqueous solution. The solution is then lyophilized, and the Factor VIII/cyclodextrin complex is recovered. The lyophilized Factor VIII/cyclodextrin is then heated to 60° C. to inactivate any virus present. The material may then be reconstituted prior to administration to a patient.
    Type: Grant
    Filed: June 28, 2001
    Date of Patent: May 20, 2003
    Assignee: Alpha Therapeutic Corporation
    Inventors: Prabir Bhattacharya, Toshiharu Motokubota, Norman M. Fedalizo
  • Publication number: 20020144128
    Abstract: A remote computer access facility uses two dedicated computers outside the firewall. To ensure security the system makes use of biometrics features and a one-time password mechanism on top of secure socket layer (SSL) to authenticate a user. The system also provides three layers of security levels for transmission. The first layer establishes an SSL connection, the second layer periodically asks for a one-time password (OTP), and the third layer uses any kind of conventional encryption. The combination of the biometric, OTP and encryption key forms a strong password. The system also uses a mechanism for secure file accesses within the organization based on the security privileges assigned to various users. Based on the user's access privileges, the server side software module sends the requested file in an encrypted form along with the key to decrypt that file—this key is encrypted by the user's strong password.
    Type: Application
    Filed: March 28, 2001
    Publication date: October 3, 2002
    Inventors: Mahfuzur Rahman, Prabir Bhattacharya
  • Publication number: 20020094083
    Abstract: A method and system for providing access to a data file enables predetermination of the number of times the file is accessible. The data file is encrypted with a master key, and one or more dual-encrypted blocks are generated based on a set of secondary keys. The dual-encrypted blocks are contained within the encrypted data file. The method further provides for providing the encrypted data file and an attachment file to an authorized user, where the attachment file enables a device to access the data file content once for each secondary key. The file is accessed by decrypting single-encrypted blocks of the data file with a master key. Dual-encrypted blocks of the data file are decrypted with the master key and a secondary key. The decryption steps are repeated for a set of secondary keys such that the device is able to access the data file content once for each secondary key in the set.
    Type: Application
    Filed: January 12, 2001
    Publication date: July 18, 2002
    Inventors: Prabir Bhattacharya, Gregory M. Perkins
  • Publication number: 20020078364
    Abstract: A data structure to be used for representing the problem is selected. An instance of the problem is represented with the data structure. The data is encrypted with a sequence which is obtained by solving the problem. Alternatively, in an alternative embodiment of the present invention, a program for heuristically solving an NP-hard problem is received. A data structure that represents an instance of the problem is received. The program is applied to the instance of the problem to obtain a sequence. The data is decrypted with the sequence.
    Type: Application
    Filed: December 14, 2000
    Publication date: June 20, 2002
    Applicant: Matsushita Electric Industrial Co., Ltd.
    Inventors: Gregory Michael Perkins, Prabir Bhattacharya
  • Publication number: 20010047085
    Abstract: A process for the viral inactivation of lyophilized blood proteins, particularly Factor VIII, by heat comprising forming a stable complex between the blood protein and a cyclodextrin in an aqueous solution. The solution is then lyophilized and the blood protein/cyclodextrin complex is recovered. The lyophilized blood protein/cyclodextrin is then heated, e.g., to 80° C. for 72 hours, to inactivate any virus present. The material may then be reconstituted prior to administration to a patient.
    Type: Application
    Filed: June 28, 2001
    Publication date: November 29, 2001
    Applicant: Alpha Therapeutic Group
    Inventors: Prabir Bhattacharya, Toshiharu Motokubota, Norman M. Fedalizo
  • Patent number: 6284874
    Abstract: The present invention is directed to a process for purifying &agr;1-proteinase inhibitor. The process comprises providing an impure protein fraction which comprises &agr;1-proteinase inhibitor. The impure protein fraction is precipitated with a precipitant comprising PEG. The supernatant from the PEG precipitation, which comprises &agr;1-proteinase inhibitor, is collected and applied to an anion-exchange medium. A fraction comprising &agr;1-proteinase inhibitor is recovered from the anion-exchange medium and applied to a metal chelate medium. A fraction comprising &agr;1-proteinase inhibitor is then recovered from the metal chelate medium. Alpha1-proteinase inhibitor purified by the process has a specific activity greater than 0.6 units/mg.
    Type: Grant
    Filed: June 17, 1994
    Date of Patent: September 4, 2001
    Assignee: Alpha Therapeutic Corporation
    Inventors: T. (Tom) Taniguchi, John M. Rolf, Prabir Bhattacharya, Yahiro (Roy) Uemura
  • Patent number: 5744586
    Abstract: Method for obtaining highly purified transferrin from a partially purified plasma fraction containing transferrin in which the starting fraction is concentrated. Its ionic strength is reduced and then transferrin is adsorbed onto a chromatographic column. Following elution, the transferrin can be further processed through to packaging in final containers. The final purified transferrin product is sterile, at least 95% pure and is substantially free of enveloped and non-enveloped viruses.
    Type: Grant
    Filed: June 26, 1996
    Date of Patent: April 28, 1998
    Assignee: Alpha Therapeutic Corporation
    Inventors: John M. Rolf, Akimasa Ohmizu, Shawn D. Latham, Prabir Bhattacharya