Patents by Inventor Prabir Bhattacharya
Prabir Bhattacharya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240126791Abstract: This disclosure relates generally to long-form answer extraction and, more particularly, to long-form answer extraction based on combination of sentence index generation techniques. Existing answer extractions techniques have achieved significant progress for extractive short answers; however, less progress has been made for long form questions that require explanations. Further the state-of-art long-answer extractions techniques result in poorer long-form answers or not address sparsity which becomes an issue longer contexts. Additionally, pre-trained generative sequence-to-sequence models are gaining popularity for factoid answer extraction tasks. Hence the disclosure proposes a long-form answer extraction based on several steps including training a set of generative sequence-to-sequence models comprising a sentence indices generation model and a sentence index spans generation.Type: ApplicationFiled: September 20, 2023Publication date: April 18, 2024Applicant: Tata Consultancy Services LimitedInventors: ANUMITA DASGUPTABANDYOPADHYAY, PRABIR MALLICK, TAPAS NAYAK, INDRAJIT BHATTACHARYA, SANGAMESHWAR SURYAKANT PATIL
-
Publication number: 20240119075Abstract: Conventional Question and Answer (QA) datasets are created for generating factoid questions only and the present disclosure generates longform technical QA dataset from textbooks. Initially, the system receives a technical textbook document and extracts a plurality of contexts. Further, a first plurality of questions are generated based on the plurality of contexts. A plurality of answerable questions are generated further based on the plurality of contexts using an unsupervised template-based matching technique. Further, a combined plurality of questions are generated by combining the first plurality of questions and the plurality of answerable questions. Further, an answer for the combined plurality of questions are generated using an autoregressive language model and a mapping score is computed. Further, a plurality of optimal answers are selected based on the corresponding mapping score.Type: ApplicationFiled: October 2, 2023Publication date: April 11, 2024Applicant: Tata Consultancy Services LimitedInventors: PRABIR MALLICK, SAMIRAN PAL, AVINASH KUMAR SINGH, ANUMITA DASGUPTA, SOHAM DATTA, KAAMRAAN KHAN, TAPAS NAYAK, INDRAJIT BHATTACHARYA, GIRISH KESHAV PALSHIKAR
-
Patent number: 7236590Abstract: A data structure to be used for representing the problem is selected. An instance of the problem is represented with the data structure. The data is encrypted with a sequence which is obtained by solving the problem. Alternatively, in an alternative embodiment of the present invention, a program for heuristically solving an NP-hard problem is received. A data structure that represents an instance of the problem is received. The program is applied to the instance of the problem to obtain a sequence. The data is decrypted with the sequence.Type: GrantFiled: December 14, 2000Date of Patent: June 26, 2007Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Gregory Michael Perkins, Prabir Bhattacharya
-
Patent number: 7114080Abstract: A remote computer access facility uses two dedicated computers outside the firewall. To ensure security the system makes use of biometrics features and a one-time password mechanism on top of secure socket layer (SSL) to authenticate a user. The system also provides three layers of security levels for transmission. The first layer establishes an SSL connection, the second layer periodically asks for a one-time password (OTP), and the third layer uses any kind of conventional encryption. The combination of the biometric, OTP and encryption key forms a strong password. The system also uses a mechanism for secure file accesses within the organization based on the security privileges assigned to various users. Based on the user's access privileges, the server side software module sends the requested file in an encrypted form along with the key to decrypt that fileāthis key is encrypted by the user's strong password.Type: GrantFiled: March 28, 2001Date of Patent: September 26, 2006Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Mahfuzur Rahman, Prabir Bhattacharya
-
Publication number: 20060061599Abstract: In some embodiments, systems and methods for visually rendering images rotate images at time of display based on annotations indicating needed rotations. In other embodiments, systems and methods for visually rendering images rotate images at time of display by determining a needed rotation for an image based on automatic orientation recognition. In further embodiments, systems and methods for visually rendering images rotate images at time of display by utilizing fuzzy logic to determine a best rotation angle for an image based on a none precise marking generated by computer vision or signal processing applied to the image. In yet further embodiments, systems and methods for annotating images annotate images at time of image capture, time of image display, or any time in between by using one or more of automatic image orientation recognition, user input specifying a needed rotation, and sensed orientation of an image capture mechanism.Type: ApplicationFiled: September 17, 2004Publication date: March 23, 2006Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.Inventors: Hong Yu, Prabir Bhattacharya
-
Patent number: 7006630Abstract: A multilayer digital content protection system, particularly for a digital cinema application is provided. Detection of unauthorized activity at the time it is occurring is provided using a first protection layer. Two layers of imperceptible watermarks, one camcorder viewable and one camcorder invisible are inserted into unauthorized copies of the digital content with second and third protection layers. Strong near infrared is also used to degrade the quality of any attempted unauthorized recording of digital content using a camcorder.Type: GrantFiled: June 3, 2003Date of Patent: February 28, 2006Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Hong Heather Yu, Prabir Bhattacharya
-
Publication number: 20050193201Abstract: A network method in which a first client securely accesses and controls an electronic device coupled to a second client is provided. Mutual authentication is performed between the first client and a proxy coupled to the second client. The first client requests presence information related to the electronic device from the proxy. The presence information is sent from the proxy to the first client. The first client sends a signal to control at least one function of the electronic device.Type: ApplicationFiled: February 26, 2004Publication date: September 1, 2005Inventors: Mahfuzur Rahman, Prabir Bhattacharya
-
Patent number: 6910132Abstract: The user's fingerprint is analyzed by the pattern matching module which draws upon pre-stored fingerprint data that may be encrypted. The pattern matching module work in conjuntion with an authorization module and resource access module to ascertain a user's authorization level or security level and then give the user access to only those computer resources for which he or she has been granted authorization. The system preferably employs inter-modular encryption so that the system can be distributed across a network if desired.Type: GrantFiled: September 15, 2000Date of Patent: June 21, 2005Assignee: Matsushita Electric Industrial Co., Ltd.Inventor: Prabir Bhattacharya
-
Publication number: 20050024516Abstract: An improved digital camera is provided that detects pictures of human subjects whose eyes are not closed. The improved digital camera generally includes an eye detection activation element that is operable to initiate an eye detection mode; an image sensor that captures image data for a target subject; an image processor that converts the image data into a digital image form; and an eye detection component that evaluates the digital image form for the target subject and determines whether at least one eye of the target subject is closed.Type: ApplicationFiled: July 31, 2003Publication date: February 3, 2005Inventors: Robert Fish, Prabir Bhattacharya
-
Publication number: 20040247120Abstract: A multilayer digital content protection system, particularly for a digital cinema application is provided. Detection of unauthorized activity at the time it is occurring is provided using a first protection layer. Two layers of imperceptible watermarks, one camcorder viewable and one camcorder invisible are inserted into unauthorized copies of the digital content with second and third protection layers. Strong near infrared is also used to degrade the quality of any attempted unauthorized recording of digital content using a camcorder.Type: ApplicationFiled: June 3, 2003Publication date: December 9, 2004Inventors: Hong Heather Yu, Prabir Bhattacharya
-
Publication number: 20040064702Abstract: One aspect of the present invention is a method for embedding a watermark in a digital movie. The method includes: buffering portions of an electronic digital representation of a digital movie in at least one digital representation domain; embedding an electronic watermark into at least one of the buffered digital representation domain of the movie; and presenting portions of the digital movie while the embedding is occurring.Type: ApplicationFiled: September 27, 2002Publication date: April 1, 2004Inventors: Hong Heather Yu, Prabir Bhattacharya
-
Publication number: 20040019805Abstract: An apparatus and method for secure data handling in a distributed network is implemented by a secure agent connected by a secure channel to a primary communication unit, secondary communication unit, and clients. The primary communication unit and secondary communication units are connected to separate key-stores having keys. A method using distributed keys for encryption and decryption is disclosed. Another method utilizes multiple-time keys.Type: ApplicationFiled: July 25, 2002Publication date: January 29, 2004Inventors: Gregory M. Perkins, Dennis Bushmitch, Prabir Bhattacharya
-
Publication number: 20030202683Abstract: A method for interpreting objects alongside a road obtains an image of an object in the vicinity of the road, displays the image to an occupant of the vehicle and receives a signal selecting the object. The method identifies the object by extracting and recognizing text from the image. The method then translates the text into a language with which the occupant of the vehicle is familiar and presents the translated text to the occupant either as a text overlay on the displayed image or as a speech signal.Type: ApplicationFiled: April 30, 2002Publication date: October 30, 2003Inventors: Yue Ma, Prabir Bhattacharya, Jinhong Katherine Guo, Chieh-Chung Chang
-
Patent number: 6566504Abstract: A process for inactivating viral contaminants of lyophilized Factor VIII by heat is provided. The process comprises forming a stable complex between the Factor VIII and a cyclodextrin in an aqueous solution. The solution is then lyophilized, and the Factor VIII/cyclodextrin complex is recovered. The lyophilized Factor VIII/cyclodextrin is then heated to 60° C. to inactivate any virus present. The material may then be reconstituted prior to administration to a patient.Type: GrantFiled: June 28, 2001Date of Patent: May 20, 2003Assignee: Alpha Therapeutic CorporationInventors: Prabir Bhattacharya, Toshiharu Motokubota, Norman M. Fedalizo
-
Publication number: 20020144128Abstract: A remote computer access facility uses two dedicated computers outside the firewall. To ensure security the system makes use of biometrics features and a one-time password mechanism on top of secure socket layer (SSL) to authenticate a user. The system also provides three layers of security levels for transmission. The first layer establishes an SSL connection, the second layer periodically asks for a one-time password (OTP), and the third layer uses any kind of conventional encryption. The combination of the biometric, OTP and encryption key forms a strong password. The system also uses a mechanism for secure file accesses within the organization based on the security privileges assigned to various users. Based on the user's access privileges, the server side software module sends the requested file in an encrypted form along with the key to decrypt that file—this key is encrypted by the user's strong password.Type: ApplicationFiled: March 28, 2001Publication date: October 3, 2002Inventors: Mahfuzur Rahman, Prabir Bhattacharya
-
Publication number: 20020094083Abstract: A method and system for providing access to a data file enables predetermination of the number of times the file is accessible. The data file is encrypted with a master key, and one or more dual-encrypted blocks are generated based on a set of secondary keys. The dual-encrypted blocks are contained within the encrypted data file. The method further provides for providing the encrypted data file and an attachment file to an authorized user, where the attachment file enables a device to access the data file content once for each secondary key. The file is accessed by decrypting single-encrypted blocks of the data file with a master key. Dual-encrypted blocks of the data file are decrypted with the master key and a secondary key. The decryption steps are repeated for a set of secondary keys such that the device is able to access the data file content once for each secondary key in the set.Type: ApplicationFiled: January 12, 2001Publication date: July 18, 2002Inventors: Prabir Bhattacharya, Gregory M. Perkins
-
Publication number: 20020078364Abstract: A data structure to be used for representing the problem is selected. An instance of the problem is represented with the data structure. The data is encrypted with a sequence which is obtained by solving the problem. Alternatively, in an alternative embodiment of the present invention, a program for heuristically solving an NP-hard problem is received. A data structure that represents an instance of the problem is received. The program is applied to the instance of the problem to obtain a sequence. The data is decrypted with the sequence.Type: ApplicationFiled: December 14, 2000Publication date: June 20, 2002Applicant: Matsushita Electric Industrial Co., Ltd.Inventors: Gregory Michael Perkins, Prabir Bhattacharya
-
Publication number: 20010047085Abstract: A process for the viral inactivation of lyophilized blood proteins, particularly Factor VIII, by heat comprising forming a stable complex between the blood protein and a cyclodextrin in an aqueous solution. The solution is then lyophilized and the blood protein/cyclodextrin complex is recovered. The lyophilized blood protein/cyclodextrin is then heated, e.g., to 80° C. for 72 hours, to inactivate any virus present. The material may then be reconstituted prior to administration to a patient.Type: ApplicationFiled: June 28, 2001Publication date: November 29, 2001Applicant: Alpha Therapeutic GroupInventors: Prabir Bhattacharya, Toshiharu Motokubota, Norman M. Fedalizo
-
Patent number: 6284874Abstract: The present invention is directed to a process for purifying &agr;1-proteinase inhibitor. The process comprises providing an impure protein fraction which comprises &agr;1-proteinase inhibitor. The impure protein fraction is precipitated with a precipitant comprising PEG. The supernatant from the PEG precipitation, which comprises &agr;1-proteinase inhibitor, is collected and applied to an anion-exchange medium. A fraction comprising &agr;1-proteinase inhibitor is recovered from the anion-exchange medium and applied to a metal chelate medium. A fraction comprising &agr;1-proteinase inhibitor is then recovered from the metal chelate medium. Alpha1-proteinase inhibitor purified by the process has a specific activity greater than 0.6 units/mg.Type: GrantFiled: June 17, 1994Date of Patent: September 4, 2001Assignee: Alpha Therapeutic CorporationInventors: T. (Tom) Taniguchi, John M. Rolf, Prabir Bhattacharya, Yahiro (Roy) Uemura
-
Patent number: 5744586Abstract: Method for obtaining highly purified transferrin from a partially purified plasma fraction containing transferrin in which the starting fraction is concentrated. Its ionic strength is reduced and then transferrin is adsorbed onto a chromatographic column. Following elution, the transferrin can be further processed through to packaging in final containers. The final purified transferrin product is sterile, at least 95% pure and is substantially free of enveloped and non-enveloped viruses.Type: GrantFiled: June 26, 1996Date of Patent: April 28, 1998Assignee: Alpha Therapeutic CorporationInventors: John M. Rolf, Akimasa Ohmizu, Shawn D. Latham, Prabir Bhattacharya