Patents by Inventor Ramani Routray

Ramani Routray has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10476879
    Abstract: An example operation may include one or more of storing a public key and one or more corresponding addresses associated with a user profile in a blockchain, creating a credential for the user profile based on the public key, forwarding the credential to the one or more addresses, receiving a request for access to a site from a user device associated with the user profile, and retrieving the credential based on the one or more addresses from the blockchain.
    Type: Grant
    Filed: July 26, 2017
    Date of Patent: November 12, 2019
    Assignee: International Business Machines Corporation
    Inventors: Luis Angel D. Bathen, Gabor Madl, Ramani Routray
  • Publication number: 20190332933
    Abstract: In training a new neural network, batches of the new training dataset are generated. An epoch of batches is passed through the new neural network using an initial weight (?). An area minimized (Ai) under an error function curve and an accuracy for the epoch are calculated. It is then determined whether a set of conditions are met, where the set of conditions includes whether Ai is less than an average area (A_avg) from a training of an existing neural network and whether the accuracy is within a predetermined threshold. When the set of conditions are not met, a new ? is calculated by modifying a dynamic learning rate (?) by an amount proportional to a ratio of Ai/A_avg and by calculating the new ? using the modified ? according to ( ? * ? ( J ? ( ? ) ? ? + ? * ? a b ? J ? ( ? ) ? ? ? ) . The process is repeated a next epoch until the set of conditions are met.
    Type: Application
    Filed: April 30, 2018
    Publication date: October 31, 2019
    Inventors: Mu QIAO, Ramani ROUTRAY, Abhinandan KELGERE RAMESH, Claire ABU-ASSAL
  • Publication number: 20190251286
    Abstract: A method, system and computer program product for detecting sensitive personal information in a storage device. A block delta list containing a list of changed blocks in the storage device is processed. After identifying the changed blocks from the block delta list, a search is performed on those identified changed blocks for sensitive personal information using a character scanning technique. After identifying a changed block deemed to contain sensitive personal information, the changed block is translated from the block level to the file level using a hierarchical reverse mapping technique. By only analyzing the changed blocks to determine if they contain sensitive personal information, a lesser quantity of blocks needs to be processed in order to detect sensitive personal information in the storage device in near real-time. In this manner, sensitive personal information is detected in the storage device using fewer computing resources in a shorter amount of time.
    Type: Application
    Filed: April 23, 2019
    Publication date: August 15, 2019
    Inventors: Rajesh M. Desai, Mu Qiao, Roger C. Raphael, Ramani Routray
  • Publication number: 20190179883
    Abstract: Evaluation of textual annotation models is provided. In various embodiments, an annotation model is applied to textual training data to derive a plurality of automatic annotations. The plurality of automatic annotations is compared to ground truth annotations of the textual data to determine overlapping tokens between the plurality of automatic annotations and the ground truth annotations. Weights are assigned to the overlapping tokens. Based on the weights of the overlapping tokens, scores are determined for the automatic annotations. The scores indicate the correctness of the automatic annotations relative to the ground truth annotations. Based on the scores of for the automatic annotations, an accuracy of the annotation model is determined.
    Type: Application
    Filed: December 8, 2017
    Publication date: June 13, 2019
    Inventors: Sheng Hua Bao, Robert Ip, Pathirage Perera, Cartic Ramakrishnan, Ramani Routray, Sundari Voruganti
  • Publication number: 20190122000
    Abstract: A method, system and computer program product for detecting sensitive personal information in a storage device. A block delta list containing a list of changed blocks in the storage device is processed. After identifying the changed blocks from the block delta list, a search is performed on those identified changed blocks for sensitive personal information using a character scanning technique. After identifying a changed block deemed to contain sensitive personal information, the changed block is translated from the block level to the file level using a hierarchical reverse mapping technique. By only analyzing the changed blocks to determine if they contain sensitive personal information, a lesser quantity of blocks needs to be processed in order to detect sensitive personal information in the storage device in near real-time. In this manner, sensitive personal information is detected in the storage device using fewer computing resources in a shorter amount of time.
    Type: Application
    Filed: October 20, 2017
    Publication date: April 25, 2019
    Inventors: Rajesh M. Desai, Mu Qiao, Roger C. Raphael, Ramani Routray
  • Publication number: 20190036932
    Abstract: An example operation may include one or more of storing a public key and one or more corresponding addresses associated with a user profile in a blockchain, creating a credential for the user profile based on the public key, forwarding the credential to the one or more addresses, receiving a request for access to a site from a user device associated with the user profile, and retrieving the credential based on the one or more addresses from the blockchain.
    Type: Application
    Filed: July 26, 2017
    Publication date: January 31, 2019
    Inventors: Luis Angel D. Bathen, Gabor Madl, Ramani Routray
  • Publication number: 20190036778
    Abstract: An example operation may include one or more of identifying one or more data volume management policies from a plurality of different parties, storing the one or more data volume management policies in a smart contract stored on a blockchain, identifying one or more data access thresholds being exceeded on a network, modifying an operating status of the network based on the one or more policies and the one or more data access thresholds being exceeded, and storing the modified operating status in the blockchain.
    Type: Application
    Filed: July 26, 2017
    Publication date: January 31, 2019
    Inventors: Luis Angel D. Bathen, Gabor Madl, Ramani Routray, Sangeetha Seshadri
  • Publication number: 20180365560
    Abstract: A method loads training samples and forms training data set from the training samples. The method uses the bidirectional LSTM recurrent neural network that includes one or more input cells and one or more output cells and trains it with the training data set. The method determines a sensitive information and confidence values based on analyzing a text with the trained neural network. The method selects predicted samples from the text, where the sensitive information confidence value corresponding to a one or more predicted samples is above a threshold value, based on determining that a sensitive information accuracy has improved. The method forms a new training data set, where the new training data set comprises the samples and the verified one or more predicted samples based on the verified one or more predicted samples, and trains the previously trained neural network with the new training data set.
    Type: Application
    Filed: June 19, 2017
    Publication date: December 20, 2018
    Inventors: MU QIAO, YUYA J. ONG, RAMANI ROUTRAY, ROGER C. RAPHAEL
  • Patent number: 7685165
    Abstract: A policy-based resource management system provides an infrastructure that uses high-level definitions of data-types along with desired policy rules to manage legacy data. In particular, relevant legacy data is identified as well as the characteristics of storage devices where the legacy data resides. The storage management system determines what if any of the legacy data is stored in a manner that is non-compliant with the policy rules and corrects any violations. It generates corrective action plans, and then uses existing data migration software to migrate the data. Accordingly, the legacy data may be managed in a policy-based manner without requiring typical storage management software.
    Type: Grant
    Filed: April 1, 2005
    Date of Patent: March 23, 2010
    Assignee: International Business Machines Corporation
    Inventors: Sandeep Gopisetty, Norman Jerome Pass, Ramani Routray, Aameek Singh, Gauri Shah, Sandeep Uttamchandani, Kaladhar Voruganti
  • Publication number: 20070011197
    Abstract: A multi-plan generation system generates a multi-plan for a multi-layer storage area network. The system generates a predetermined number of plans while generating and retaining globally optimum plans. The system dynamically calculates and orders these plans according to optimization criteria and user requirements. The system comprises a planner for each of the layers in a storage area network such as a host planner, a storage planner, a network planner, a zone planner, etc. Each of the planners applies a variance optimization, a preview optimization, and a detail optimization and interacts with a policy repository to obtain policy guidance, enabling the system to prune the set of plans. A control module invokes the planners in a predetermined order.
    Type: Application
    Filed: July 9, 2005
    Publication date: January 11, 2007
    Inventors: Murthy Devarakonda, David George, Sandeep Gopisetty, Kang-Won Lee, Konstantinos Magoutis, Ramani Routray, Gauri Shah, Chung-Hao Tan, Norbert Vogl, Kaladhar Voruganti
  • Publication number: 20060224550
    Abstract: A policy-based resource management system provides an infrastructure that uses high-level definitions of data-types along with desired policy rules to manage legacy data. In particular, relevant legacy data is identified as well as the characteristics of storage devices where the legacy data resides. The storage management system determines what if any of the legacy data is stored in a manner that is non-compliant with the policy rules and corrects any violations. It generates corrective action plans, and then uses existing data migration software to migrate the data. Accordingly, the legacy data may be managed in a policy-based manner without requiring typical storage management software.
    Type: Application
    Filed: April 1, 2005
    Publication date: October 5, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sandeep Gopisetty, Norman Pass, Ramani Routray, Aameek Singh, Gauri Shah, Sandeep Uttamchandani, Kaladhar Voruganti
  • Publication number: 20060095885
    Abstract: Systems and methods for designing storage area network fabric. Preferably included are an arrangement for collecting user requirements on data flows to be supported by the fabric, an arrangement for grouping the data flows into flow groups according to at least one physical location parameter, an arrangement for designing components of fabric for the flow groups, the components being associated with at least one geographical region, and an arrangement for obtaining fabric by joining the fabric components via interconnection fabric, whereby flow groups over a plurality of geographical regions are supported.
    Type: Application
    Filed: October 30, 2004
    Publication date: May 4, 2006
    Applicant: IBM Corporation
    Inventors: Dakshi Agrawal, Sandeep Gopisetty, Kang-Won Lee, Ramani Routray, Dinesh Verma, Kaladhar Voruganti
  • Publication number: 20050015641
    Abstract: A system and method to automatically and dynamically optimize available resources to meet application data availability and business objectives. In one embodiment, a backup and data recovery system continually and dynamically adjust to the backup and recovery or restore process depending on the customer's environment, workload, and business objectives. Acceptable tolerance of downtime due to recovery and backup impacts the customer's business or system operation. From this high-level business requirement, the present system determines the backup and recovery plan details. The present system accepts application data availability policies based on business objectives, and devises, executes and refines a resource optimal backup and recovery strategy required to deliver the desired quality of service in the environments that have dynamically changing application workloads, business objectives, and hardware/software infrastructure technologies.
    Type: Application
    Filed: July 16, 2003
    Publication date: January 20, 2005
    Applicant: International Business Machines Corporation
    Inventors: Nagraj Alur, Vitthal Gogate, Inderpal Narang, Ramani Routray, Mahadevan Subramanian