Patents by Inventor Samir K. Dash
Samir K. Dash has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10551937Abstract: A method and system for interacting with an input device is provided. The method includes initializing a virtual keyboard viewable via an eyewear based video display enabled computing device. The eyewear based video display enabled computing device determines that two hands of a user are viewable via a view screen of the eyewear based video display enabled computing device. In response, characters or symbols of the virtual keyboard are mapped to a position and associated scaling of the two hands of the user. Movement of the hands is tracked and associated with gestures enabled by the movement. The associated gestures are converted into associated characters or symbols and input data specified by the user is received.Type: GrantFiled: July 23, 2019Date of Patent: February 4, 2020Assignee: International Business Machines CorporationInventor: Samir K. Dash
-
Publication number: 20190346936Abstract: A method and system for interacting with an input device is provided. The method includes initializing a virtual keyboard viewable via an eyewear based video display enabled computing device. The eyewear based video display enabled computing device determines that two hands of a user are viewable via a view screen of the eyewear based video display enabled computing device. In response, characters or symbols of the virtual keyboard are mapped to a position and associated scaling of the two hands of the user. Movement of the hands is tracked and associated with gestures enabled by the movement. The associated gestures are converted into associated characters or symbols and input data specified by the user is received.Type: ApplicationFiled: July 23, 2019Publication date: November 14, 2019Inventor: Samir K. Dash
-
Patent number: 10416776Abstract: A method and system for interacting with an input device is provided. The method includes initializing a virtual keyboard viewable via an eyewear based video display enabled computing device. The eyewear based video display enabled computing device determines that two hands of a user are viewable via a view screen of the eyewear based video display enabled computing device. In response, characters or symbols of the virtual keyboard are mapped to a position and associated scaling of the two hands of the user. Movement of the hands is tracked and associated with gestures enabled by the movement. The associated gestures are converted into associated characters or symbols and input data specified by the user is received.Type: GrantFiled: September 24, 2015Date of Patent: September 17, 2019Assignee: International Business Machines CorporationInventor: Samir K. Dash
-
Publication number: 20170337727Abstract: A method for digital surface rendering. The method includes providing a programmable display covering a portion of a surface of an object. The method further includes receiving a set of desired features for an appearance of the object. The method further includes generating an image of the portion of the surface of the object incorporating the set of desired features and displaying the image on the programmable display, thereby causing the object to appear to have the desired features.Type: ApplicationFiled: August 9, 2017Publication date: November 23, 2017Inventor: Samir K. Dash
-
Publication number: 20170255264Abstract: A method for digital surface rendering. The method includes providing a programmable display covering a portion of a surface of an object. The method further includes receiving a set of desired features for an appearance of the object. The method further includes generating an image of the portion of the surface of the object incorporating the set of desired features and displaying the image on the programmable display, thereby causing the object to appear to have the desired features.Type: ApplicationFiled: March 2, 2016Publication date: September 7, 2017Inventor: Samir K. Dash
-
Patent number: 9736122Abstract: Embodiments of the present invention disclose a method, system, and computer program product for bluesalt security. A computer receives a confidential data configuration wherein specific sensor are assigned to specific confidential information. The assigned sensors are measured for values as a system administrator enters a password corresponding to the confidential information. The measured values are converted into a salt and concatenated with the password to generate a primary key. The primary key is used to encrypt the confidential information, then the primary key is encrypted using a secondary key comprised of a second password with a second set of sensor information as the salt. The encrypted key is saved securely while the secondary key is destroyed. In order to decrypt the confidential information, a user must replicate the password and sensor values to generate the primary or secondary key.Type: GrantFiled: September 2, 2015Date of Patent: August 15, 2017Assignee: International Business Machines CorporationInventor: Samir K. Dash
-
Patent number: 9698982Abstract: Embodiments of the present invention disclose a method, system, and computer program product for bluesalt security. A computer receives a confidential data configuration wherein specific sensor are assigned to specific confidential information. The assigned sensors are measured for values as a system administrator enters a password corresponding to the confidential information. The measured values are converted into a salt and concatenated with the password to generate a primary key. The primary key is used to encrypt the confidential information, then the primary key is encrypted using a secondary key comprised of a second password with a second set of sensor information as the salt. The encrypted key is saved securely while the secondary key is destroyed. In order to decrypt the confidential information, a user must replicate the password and sensor values to generate the primary or secondary key.Type: GrantFiled: January 3, 2017Date of Patent: July 4, 2017Assignee: International Business Machines CorporationInventor: Samir K. Dash
-
Patent number: 9692596Abstract: Embodiments of the present invention disclose a method, system, and computer program product for bluesalt security. A computer receives a confidential data configuration wherein specific sensor are assigned to specific confidential information. The assigned sensors are measured for values as a system administrator enters a password corresponding to the confidential information. The measured values are converted into a salt and concatenated with the password to generate a primary key. The primary key is used to encrypt the confidential information, then the primary key is encrypted using a secondary key comprised of a second password with a second set of sensor information as the salt. The encrypted key is saved securely while the secondary key is destroyed. In order to decrypt the confidential information, a user must replicate the password and sensor values to generate the primary or secondary key.Type: GrantFiled: January 3, 2017Date of Patent: June 27, 2017Assignee: International Business Machines CorporationInventor: Samir K. Dash
-
Publication number: 20170111169Abstract: Embodiments of the present invention disclose a method, system, and computer program product for bluesalt security. A computer receives a confidential data configuration wherein specific sensor are assigned to specific confidential information. The assigned sensors are measured for values as a system administrator enters a password corresponding to the confidential information. The measured values are converted into a salt and concatenated with the password to generate a primary key. The primary key is used to encrypt the confidential information, then the primary key is encrypted using a secondary key comprised of a second password with a second set of sensor information as the salt. The encrypted key is saved securely while the secondary key is destroyed. In order to decrypt the confidential information, a user must replicate the password and sensor values to generate the primary or secondary key.Type: ApplicationFiled: January 3, 2017Publication date: April 20, 2017Inventor: Samir K. Dash
-
Publication number: 20170111168Abstract: Embodiments of the present invention disclose a method, system, and computer program product for bluesalt security. A computer receives a confidential data configuration wherein specific sensor are assigned to specific confidential information. The assigned sensors are measured for values as a system administrator enters a password corresponding to the confidential information. The measured values are converted into a salt and concatenated with the password to generate a primary key. The primary key is used to encrypt the confidential information, then the primary key is encrypted using a secondary key comprised of a second password with a second set of sensor information as the salt. The encrypted key is saved securely while the secondary key is destroyed. In order to decrypt the confidential information, a user must replicate the password and sensor values to generate the primary or secondary key.Type: ApplicationFiled: January 3, 2017Publication date: April 20, 2017Inventor: Samir K. Dash
-
Publication number: 20170090747Abstract: A method and system for interacting with an input device is provided. The method includes initializing a virtual keyboard viewable via an eyewear based video display enabled computing device. The eyewear based video display enabled computing device determines that two hands of a user are viewable via a view screen of the eyewear based video display enabled computing device. In response, characters or symbols of the virtual keyboard are mapped to a position and associated scaling of the two hands of the user. Movement of the hands is tracked and associated with gestures enabled by the movement. The associated gestures are converted into associated characters or symbols and input data specified by the user is received.Type: ApplicationFiled: September 24, 2015Publication date: March 30, 2017Inventor: Samir K. Dash
-
Patent number: 9590957Abstract: Embodiments of the present invention disclose a method, system, and computer program product for bluesalt security. A computer receives a confidential data configuration wherein specific sensor are assigned to specific confidential information. The assigned sensors are measured for values as a system administrator enters a password corresponding to the confidential information. The measured values are converted into a salt and concatenated with the password to generate a primary key. The primary key is used to encrypt the confidential information, then the primary key is encrypted using a secondary key comprised of a second password with a second set of sensor information as the salt. The encrypted key is saved securely while the secondary key is destroyed. In order to decrypt the confidential information, a user must replicate the password and sensor values to generate the primary or secondary key.Type: GrantFiled: March 23, 2016Date of Patent: March 7, 2017Assignee: International Business Machines CorporationInventor: Samir K. Dash
-
Publication number: 20170063812Abstract: Embodiments of the present invention disclose a method, system, and computer program product for bluesalt security. A computer receives a confidential data configuration wherein specific sensor are assigned to specific confidential information. The assigned sensors are measured for values as a system administrator enters a password corresponding to the confidential information. The measured values are converted into a salt and concatenated with the password to generate a primary key. The primary key is used to encrypt the confidential information, then the primary key is encrypted using a secondary key comprised of a second password with a second set of sensor information as the salt. The encrypted key is saved securely while the secondary key is destroyed. In order to decrypt the confidential information, a user must replicate the password and sensor values to generate the primary or secondary key.Type: ApplicationFiled: March 23, 2016Publication date: March 2, 2017Inventor: Samir K. Dash
-
Publication number: 20170061147Abstract: Embodiments of the present invention disclose a method, system, and computer program product for bluesalt security. A computer receives a confidential data configuration wherein specific sensor are assigned to specific confidential information. The assigned sensors are measured for values as a system administrator enters a password corresponding to the confidential information. The measured values are converted into a salt and concatenated with the password to generate a primary key. The primary key is used to encrypt the confidential information, then the primary key is encrypted using a secondary key comprised of a second password with a second set of sensor information as the salt. The encrypted key is saved securely while the secondary key is destroyed. In order to decrypt the confidential information, a user must replicate the password and sensor values to generate the primary or secondary key.Type: ApplicationFiled: September 2, 2015Publication date: March 2, 2017Inventor: Samir K. Dash
-
Publication number: 20170003872Abstract: In an approach to user input using a touch-encoded keyboard, according to an embodiment of the present invention, interaction of one or more touch objects with a touch-sensitive surface of a device is detected, the number of touch objects is determined, and one or more characteristics associated with the interaction are captured. A transformation of the touch input to data input or command input is performed based on a predefined mapping. Embodiments of the invention can be used to enable data input to devices with touch-sensitive surfaces measuring only square millimeters in size.Type: ApplicationFiled: July 2, 2015Publication date: January 5, 2017Inventor: Samir K. Dash