Patents by Inventor Rajesh M. Desai
Rajesh M. Desai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210263977Abstract: Discovering second-order documents and latent custodians in an e-discovery system is provided. A list of first-order documents and document custodians within a base state of the e-discovery system are identified based on a plurality of terms corresponding to a meet and confer practice for a legal matter instance. The plurality of terms is masked within the first-order documents. The first-order documents having the plurality of terms masked are divided into groups. A list of second-order documents is generated from a group of documents. A list of second-order document custodians is generated based on corresponding custodian relationships to second-order documents. Finally, each second-order document custodian in the list of second-order document custodians that has a corresponding rank exceeding a defined rank threshold level is identified as an official document custodian in the e-discovery system.Type: ApplicationFiled: February 20, 2020Publication date: August 26, 2021Inventors: Roger C. Raphael, Rajesh M. Desai, Nazrul Islam, Magesh Jayapandian, Jojo Joseph
-
Patent number: 11100598Abstract: Embodiments generally relate to providing litigation management for multiple remote content systems using asynchronous bi-directional replication pipelines. In some embodiments, a method includes retrieving, at one or more inbound replicators of one or more respective bi-directional pipelines, metadata associated with documents stored in one or more content repositories. The method further includes resolving, at a governance control hub, conflicts associated with legal holds on one or more of the documents based on the metadata. The method further includes sending conflict resolution results from one or more outbound applicators of the bi-directional pipelines to the content repositories, where the content repositories enforce legal holds on the documents.Type: GrantFiled: January 23, 2018Date of Patent: August 24, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roger C. Raphael, Ronald L. Rathgeber, Rajesh M. Desai, Gabriel Valencia, Justo Perez, William Russell Belknap, Sudhakar Basireddy
-
Publication number: 20210119970Abstract: A method, apparatus, system, and computer program product evaluate an information asset with a corpus of policies in conjunction with the context of access including a specific user. A large corresponding set of rules in the policy corpus are identified by computer system. A continuous process of rule evaluation occurs against information asset metadata wherein a series of processing including set of common subexpressions between the predicates of all active rules, pre-evaluation, compaction and storage are identified by the computer system in the policy and rule corpus. Metadata for the information asset is applied by the computer system to the set of common subexpressions to form partially evaluated rules for the policy. The partially evaluated rules henceforth compacted are stored by the computer system in association with the information asset.Type: ApplicationFiled: October 16, 2019Publication date: April 22, 2021Inventors: Roger C. Raphael, Rajesh M. Desai, Iun Veng Leong, Brian Joseph Owings
-
Publication number: 20210109724Abstract: A method adapts a dataflow instance. A set of source data nodes, a set of terminal data nodes, and a set of computation nodes in the dataflow are identified from a directed graph. The set of computation nodes performs operations on data flowing from the set of source data nodes through computation nodes and onwards to terminal data nodes in the dataflow. The data nodes are evaluated with policies and a user context. A number of transformation compute nodes is computed from the policy decisions and added downstream of the set of source data nodes and optionally upstream of the set of terminal data nodes when the data, the dataflow or system does not meet the declared policies without the necessary computed number of transformation compute nodes. The number of transformation compute nodes are an additional portion of the overall set of computation nodes to enforce the declared policy.Type: ApplicationFiled: October 11, 2019Publication date: April 15, 2021Inventors: Roger C. Raphael, Rajesh M. Desai, Sonali Surange, Hani Talal Jamjoon
-
Patent number: 10956135Abstract: A method adapts a dataflow instance. A set of source data nodes, a set of terminal data nodes, and a set of computation nodes in the dataflow are identified from a directed graph. The set of computation nodes performs operations on data flowing from the set of source data nodes through computation nodes and onwards to terminal data nodes in the dataflow. The data nodes are evaluated with policies and a user context. A number of transformation compute nodes is computed from the policy decisions and added downstream of the set of source data nodes and optionally upstream of the set of terminal data nodes when the data, the dataflow or system does not meet the declared policies without the necessary computed number of transformation compute nodes. The number of transformation compute nodes are an additional portion of the overall set of computation nodes to enforce the declared policy.Type: GrantFiled: October 11, 2019Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Roger C. Raphael, Rajesh M. Desai, Sonali Surange, Hani Talal Jamjoon
-
Publication number: 20210081550Abstract: Serving data assets based on security policies is provided. A request to access an asset received from a user having a particular context is evaluated based on a set of asset access enforcement policies. An asset access policy enforcement decision is generated based on evaluating the request. It is determined whether the asset access policy enforcement decision is to transform particular data of the asset prior to allowing access. In response to determining that the asset access policy enforcement decision is to transform the particular data of the asset prior to allowing access, a transformation specification that includes an ordered subset of unit transformations for transforming the particular data of the asset is generated based on the particular context of the user and the set of asset access enforcement policies. A transformed asset is generated by applying the transformation specification to the asset transforming the particular data of the asset.Type: ApplicationFiled: September 17, 2019Publication date: March 18, 2021Inventors: Roger C. Raphael, Hani Talal Jamjoom, Rajesh M. Desai, Iun Veng Leong, Uttama Shakya, Arjun Natarajan
-
Publication number: 20210064781Abstract: Disclosed is a computer-implemented method to identify and anonymize personal information, the method comprising analyzing a first corpus with a personal information sniffer, wherein the first corpus includes unstructured text, wherein the personal information sniffer is configured to detect a set of types of personal information, and wherein the personal information sniffer produces a first set of results. The method comprises analyzing the first corpus with a set of annotators, wherein each annotator is configured to identify all instances of a type of personal information in the corpus, and wherein the set of annotators produces a second set of results. The method comprises comparing the first set of results and the second set of results, determining, the first set of results does not match the second set of results, and updating, based on the determining, the personal information sniffer.Type: ApplicationFiled: June 19, 2019Publication date: March 4, 2021Inventors: Roger C. Raphael, Rajesh M. Desai, IUN VENG LEONG, RAMAKANTA SAMAL, Ansel Blume
-
Publication number: 20210028951Abstract: A data protection policy enforcement operation is provided for enforcing data protection policies in collaborative framework environments which permit a plurality of collaborators to jointly work on projects requiring access to project data assets. For this purpose, a method includes establishing, by a computer device, a plurality of rules for evaluating actions performed in a collaborative environment, the collaborative environment including a plurality of collaborators and a plurality of data assets associated with collaboration between the collaborators; in response to a request to perform an action in the collaborative environment, applying the rules to the plurality of data assets related to the data assets to create a plurality of determinations; in response to each of the plurality of determinations being allowed, allowing the action to be performed; and, in response to at least one of the plurality of determinations being denied, preventing the action from being performed.Type: ApplicationFiled: July 26, 2019Publication date: January 28, 2021Inventors: Roger C. RAPHAEL, Rajesh M. DESAI, Olena WOOLF, Arron LA
-
Patent number: 10897367Abstract: A data protection policy enforcement operation is provided for enforcing data protection policies in collaborative framework environments which permit a plurality of collaborators to jointly work on projects requiring access to project data assets. For this purpose, a method includes establishing, by a computer device, a plurality of rules for evaluating actions performed in a collaborative environment, the collaborative environment including a plurality of collaborators and a plurality of data assets associated with collaboration between the collaborators; in response to a request to perform an action in the collaborative environment, applying the rules to the plurality of data assets related to the data assets to create a plurality of determinations; in response to each of the plurality of determinations being allowed, allowing the action to be performed; and, in response to at least one of the plurality of determinations being denied, preventing the action from being performed.Type: GrantFiled: July 26, 2019Date of Patent: January 19, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roger C. Raphael, Rajesh M. Desai, Olena Woolf, Arron La
-
Patent number: 10783112Abstract: Provided are techniques for a high performance compliance mechanism for structured and unstructured data in an enterprise. A record to represent a collection of structured objects is generated. The record is stored in a file plan container associated with a disposition schedule. The collection of the structured objects represented by the record is disposed in accordance with the disposition schedule.Type: GrantFiled: March 27, 2017Date of Patent: September 22, 2020Assignee: International Business Machines CorporationInventors: William R. Belknap, Rajesh M. Desai, Roger C. Raphael, Ronald L. Rathgeber
-
Patent number: 10713218Abstract: An electronic-discovery system and method, wherein content items and hold anchors are stored in a repository, tracking objects and representational anchor objects are stored in a database system, and the tracking objects represent the content items and the representational anchor objects represent the hold anchors. A first hold anchor is used for placing a hold on the content items for a first defined period of time, and a first representational anchor object and one or more of the tracking objects are used for representing and tracking the holds for the first defined period of time. When the first defined period of time expires, a second hold anchor is used for placing the hold on the content items for a second defined period of time, and a second representational anchor object and the tracking objects are used for representing and tracking the holds for the second defined period of time.Type: GrantFiled: September 14, 2017Date of Patent: July 14, 2020Assignee: International Business Machines CorporationInventors: Rajesh M. Desai, Aidon P. Jennery, Lijing E. Lin, Roger C. Raphael
-
Publication number: 20200210619Abstract: A method, system and computer program product for detecting sensitive personal information in a storage device. A block delta list containing a list of changed blocks in the storage device is processed. After identifying the changed blocks from the block delta list, a search is performed on those identified changed blocks for sensitive personal information using a character scanning technique. After identifying a changed block deemed to contain sensitive personal information, the changed block is translated from the block level to the file level using a hierarchical reverse mapping technique. By only analyzing the changed blocks to determine if they contain sensitive personal information, a lesser quantity of blocks needs to be processed in order to detect sensitive personal information in the storage device in near real-time. In this manner, sensitive personal information is detected in the storage device using fewer computing resources in a shorter amount of time.Type: ApplicationFiled: March 6, 2020Publication date: July 2, 2020Inventors: Rajesh M. Desai, Mu Qiao, Roger C. Raphael, Ramani Routray
-
Patent number: 10671754Abstract: A method, system and computer program product for detecting sensitive personal information in a storage device. A block delta list containing a list of changed blocks in the storage device is processed. After identifying the changed blocks from the block delta list, a search is performed on those identified changed blocks for sensitive personal information using a character scanning technique. After identifying a changed block deemed to contain sensitive personal information, the changed block is translated from the block level to the file level using a hierarchical reverse mapping technique. By only analyzing the changed blocks to determine if they contain sensitive personal information, a lesser quantity of blocks needs to be processed in order to detect sensitive personal information in the storage device in near real-time. In this manner, sensitive personal information is detected in the storage device using fewer computing resources in a shorter amount of time.Type: GrantFiled: October 20, 2017Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Rajesh M. Desai, Mu Qiao, Roger C. Raphael, Ramani Routray
-
Patent number: 10671756Abstract: A method, system and computer program product for detecting sensitive personal information in a storage device. A block delta list containing a list of changed blocks in the storage device is processed. After identifying the changed blocks from the block delta list, a search is performed on those identified changed blocks for sensitive personal information using a character scanning technique. After identifying a changed block deemed to contain sensitive personal information, the changed block is translated from the block level to the file level using a hierarchical reverse mapping technique. By only analyzing the changed blocks to determine if they contain sensitive personal information, a lesser quantity of blocks needs to be processed in order to detect sensitive personal information in the storage device in near real-time. In this manner, sensitive personal information is detected in the storage device using fewer computing resources in a shorter amount of time.Type: GrantFiled: April 23, 2019Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Rajesh M. Desai, Mu Qiao, Roger C. Raphael, Ramani Routray
-
Publication number: 20200167329Abstract: A method, computer system, and computer program product for segment differential-based document text-index modeling are provided. The embodiment may include receiving, by a processor, a document with a valid document ID and version ID tuple. The embodiment may also include determining the received document is a new version of a previously stored document and consequently multiplexing versions of the document into a single indexed document. The embodiment may further include segmenting the received document and building a token vector. The embodiment may also include calculating a difference between the received new version of the document and the previously stored document using information obtained from the segmentation. The embodiment may further include in response to the calculated difference being below a pre-configured threshold value, discarding the received new version.Type: ApplicationFiled: November 28, 2018Publication date: May 28, 2020Inventors: Roger C. Raphael, Rajesh M. Desai, Fumihiko Terui, Justo L. Perez, Thomas Hampp
-
Publication number: 20200134757Abstract: Provided are techniques for extracting, deriving, and using legal matter semantics to generate e-discovery queries in an e-discovery system. A semantic knowledge graph is iteratively built by receiving meet and confer document instances, legal matter types, historical e-discovery queries for different legal matters, and legal semantic types extracted from the historical e-discovery queries. The legal semantic types are added to the semantic knowledge graph, and a list of terms that serve as a basis of an initial query are identified. An e-discovery query is generated for an e-discovery system. The e-discovery query is modified using the semantic knowledge graph and additional input by receiving a legal matter type and meet and confer information, obtaining the legal semantic types that are relevant to the legal matter type and the meet and confer information, and modifying the e-discovery query. The modified e-discovery query is provided. Then, the modified e-discovery query is executed.Type: ApplicationFiled: October 30, 2018Publication date: April 30, 2020Inventors: Roger C. Raphael, Rajesh M. Desai, Nazrul Islam, Satwik Hebbar
-
Patent number: 10628414Abstract: Provided are a computer program product, system, and method for distributed processing of a query with distributed posting lists. A dispatch map has entries, wherein each entry identifies one of a plurality of terms in a dictionary, wherein for each of the terms there is a posting list identifying zero or more objects including the term, wherein at least one of the dispatch map entries indicate at least one distributed processing element including the posting list for the term. The dispatch map is used to dispatch sub-expressions comprising portions of a query to distributed processing elements having the posting lists for terms in the sub-expressions, wherein the distributed processing elements distributed the sub-expressions execute the sub-expressions on the posting lists for the terms in the sub-expression.Type: GrantFiled: June 21, 2016Date of Patent: April 21, 2020Assignee: International Business Machines CorporationInventors: Rajesh M. Desai, Alon S. Housfater, Roger C. Raphael, Paul S. Taylor
-
Publication number: 20190354514Abstract: Processing a database query for sets of data includes assigning a unique identifier from an integer space to each entity within data and creating one or more sets of entities each pertaining to a corresponding entity within the data. A representation is then generated on disk for each set of entities, wherein each representation encompasses and is suited for a range of the unique identifiers of entities within a corresponding set and indicates a presence of an entity within that corresponding set. Finally, a query is processed based on the representation for each set of entities to retrieve data satisfying the query, wherein the representation provides a constant time for association and dissociation operations that are append-only operations with deferred merge and automatic filtering of deleted and duplicate entities at query time.Type: ApplicationFiled: July 29, 2019Publication date: November 21, 2019Inventors: Rajesh M. Desai, Magesh Jayapandian, Iun V. Leong, Justo L. Perez, Roger C. Raphael, Gabriel Valencia
-
Patent number: 10452631Abstract: Processing a database query for sets of data includes assigning a unique identifier from an integer space to each entity within data and creating one or more sets of entities each pertaining to a corresponding entity within the data. A representation is then generated on disk for each set of entities, wherein each representation encompasses and is suited for a range of the unique identifiers of entities within a corresponding set and indicates a presence of an entity within that corresponding set. Finally, a query is processed based on the representation for each set of entities to retrieve data satisfying the query, wherein the representation provides a constant time for association and dissociation operations that are append-only operations with deferred merge and automatic filtering of deleted and duplicate entities at query time.Type: GrantFiled: March 15, 2017Date of Patent: October 22, 2019Assignee: International Business Machines CorporationInventors: Rajesh M. Desai, Magesh Jayapandian, Iun V. Leong, Justo L. Perez, Roger C. Raphael, Gabriel Valencia
-
Publication number: 20190304041Abstract: Embodiments generally relate to providing litigation management for multiple remote content systems using asynchronous bi-directional replication pipelines. In some embodiments, a method includes retrieving, at one or more inbound replicators of one or more respective bi-directional pipelines, metadata associated with documents stored in one or more content repositories. The method further includes resolving, at a governance control hub, conflicts associated with legal holds on one or more of the documents based on the metadata. The method further includes sending conflict resolution results from one or more outbound applicators of the bi-directional pipelines to the content repositories, where the content repositories enforce legal holds on the documents.Type: ApplicationFiled: June 18, 2019Publication date: October 3, 2019Inventors: Roger C. RAPHAEL, Ronald L. RATHGEBER, Rajesh M. DESAI, Gabriel VALENCIA, Justo L. PEREZ, William Russell BELKNAP, Sudhakar BASIREDDY