Patents by Inventor Satyam Jakkula

Satyam Jakkula has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250141906
    Abstract: A network intrusion prevention and protection deployment method, system, and computer program product for providing security in a multi-cloud service mesh, the computer-implemented method including selectively deploying, via an instruction from an administrator, a network intrusion prevention and protection tool in a multi-cloud service mesh.
    Type: Application
    Filed: October 30, 2023
    Publication date: May 1, 2025
    Inventors: Sudheesh S. Kairali, Satyam Jakkula, Sudhanshu Sekher Sar, MADHURI MADHAVAN PILLAI, Sarbajit K. Rakshit
  • Publication number: 20250132987
    Abstract: A computer implemented method for computing device collaboration. A number of processor units identify computing device groupings for collaboration in processing data based on synergy levels between the computing device groupings. The computing device groupings process a set of common data types. The number of processor units instruct the computing device groupings to share the data for the set of common data types. The number of processor units deploy a number of relay devices to facilitate communications between the computing device groupings in response to the computing device groupings not being in communication with each other.
    Type: Application
    Filed: October 20, 2023
    Publication date: April 24, 2025
    Inventors: Sudheesh S. KAIRALI, Satyam JAKKULA, Sarbajit K. RAKSHIT, Sudhanshu Sekher SAR
  • Publication number: 20250133135
    Abstract: A computer implemented method for managing data in a mobile computing device. A number of processor units determine a geographic location of a mobile computing device. The number of processor units predict a predicted data residency issue with meeting data residency requirements for data stored in the mobile computing device based on the geographic location of the mobile computing device and a set of movement patterns for the mobile computing device. The number of processor units identify a number of recipient devices that meet the data residency requirements for moving the data from the mobile computing device to the number of recipient devices in response to predicting the predicted data residency issue. The number of processor units move the data to the number of recipient devices from the mobile computing device in response to identifying the number of recipient devices.
    Type: Application
    Filed: October 20, 2023
    Publication date: April 24, 2025
    Inventors: Sudheesh S. Kairali, Shanmukha Sai Ram Pavan Parvathina, Sudhanshu Sekher Sar, Satyam Jakkula, Sarbajit K. Rakshit
  • Publication number: 20250106282
    Abstract: A method, computer program product, and computer system are provided for smart log shipping in a heterogeneous computing environment. A first edge device and a second edge device in a heterogeneous cloud computing environment are identified. The first edge device is caused to transmit collected log data associated with the first edge device to the second edge device based on a lack of network connectivity between the first edge device and a cloud data center. The transmitted collected log data is received from the second edge device.
    Type: Application
    Filed: September 21, 2023
    Publication date: March 27, 2025
    Inventors: Sudheesh S. Kairali, Satyam Jakkula, Sudhanshu Sekher Sar, Sarbajit K. Rakshit
  • Publication number: 20250097544
    Abstract: Provided are a computer program product, system, and method for generating expanded content in a video stream based on predicting viewer behavior. A determination is made of promoted content rendered in the video. In response to determining the promoted content, invoking at least one machine learning model to perform determining whether a viewer of the video is interested in the promoted content and generating expanded content for a duration in response to determining that the viewer of the video is interested in the promoted content. The rendering of the video is paused and the expanded content is rendered for the duration while pausing the rendering of the video. The rendering of the video is continued in response to completing the rendering of the expanded content.
    Type: Application
    Filed: September 15, 2023
    Publication date: March 20, 2025
    Inventors: Sarbajit K. Rakshit, Sudhanshu Sekher Sar, Satyam Jakkula, Sudheesh S. Kairali
  • Publication number: 20250080533
    Abstract: Mechanisms are provided for controlling docking of an edge capacity with a cloud computing system. A bill of materials (BOM) enabled agent, executing on the edge capacity, sends a BOM data structure specifying components of a configuration of the edge capacity. A lookup operation of components of the BOM data structure is performed in a BOM controls mapping data structure to identify controls or policies applicable to the components of the BOM data structure. The identified controls/policies are transmitted to the BOM enabled agent for execution to determine if there are any violations. Results of the identified controls or policies are received which specify whether there are any violations of the controls/policies. In response to at least one violation being detected, docking of the edge capacity with the cloud computing system is denied. In response to no violations, the edge capacity docks with the cloud computing system.
    Type: Application
    Filed: August 29, 2023
    Publication date: March 6, 2025
    Inventors: Sudheesh S. Kairali, Sarbajit K. Rakshit, Sudhanshu Sekher Sar, Satyam Jakkula
  • Publication number: 20250037442
    Abstract: Provided are a computer program product, system, and method for providing user guidance to use and train a generative adversarial network. A discriminator, implementing machine learning, is trained to output a high probability from input comprising an input image comprising a real image representing a desirable design item superimposed on a body in a pose represented in the input image, a context of the input image and a pose of the body represented in the input image. A generator, implementing machine learning, generates an output image based on an input context, an input pose, and random noise. The discriminator outputs a probability the output image, from the generator, represents a real image having a desirable design item from input comprising the output image, the input context, and the input pose. The generator is trained to output the output image for the input pose and the input context with the probability.
    Type: Application
    Filed: July 25, 2023
    Publication date: January 30, 2025
    Inventors: Sarbajit K. Rakshit, Sudhanshu Sekher Sar, Sudheesh S. Kairali, Satyam Jakkula
  • Publication number: 20250029152
    Abstract: Dynamically overlaying advertising on media seamlessly is provided. An advertisement generator is directed to generate advertising corresponding to each particular winning entity on an e-auction website in response to an e-auction component assigning advertising rights to corresponding winning entities. The advertising corresponding to each particular winning entity is overlayed on a specific set of virtual advertisement placeholders assigned to that particular winning entity within media dynamically while the media is playing on a set of client devices without stopping scene flow of the media.
    Type: Application
    Filed: July 19, 2023
    Publication date: January 23, 2025
    Inventors: Satyam Jakkula, Sarbajit K. Rakshit, Sudhanshu Sekher Sar, Sudheesh S. Kairali
  • Publication number: 20250029031
    Abstract: Computer-implemented methods for providing uninterrupted remote control of a production device are provided. Aspects include obtaining a production task to be performed using the production device, identifying a remote worker, from a remote worker database, to perform the production task via a virtual reality device, and assigning the production task to the remote worker. Aspects also include monitoring a remote worker environment of the remote worker during performance of the production task and determining that the production task needs to be reassigned. Aspects further include identifying a replacement remote worker from the remote worker database and reassigning the production task to the replacement remote worker.
    Type: Application
    Filed: July 21, 2023
    Publication date: January 23, 2025
    Inventors: Sarbajit K. Rakshit, Sudheesh S. Kairali, Binoy Thomas, Satyam Jakkula
  • Publication number: 20250005511
    Abstract: A method, computer program product, and computer system for optimizing locations of micro-warehouses that minimize an aggregate carbon footprint within a geographical region. A first trained artificial intelligence model is used to extract, for a geographical region, a product demand of users located in the geographical region over a fixed time period, and delivery location clusters within the geographical region. The delivery location clusters output by the first trained artificial intelligence model is input into a regression model, the regression model outputting recommended locations of temporary micro-warehouses within the geographical region. A second trained artificial intelligence model is used to modify the recommended locations and output optimized locations based on reducing an aggregate carbon footprint caused by emissions resulting from transportation to and from the temporary micro-warehouses.
    Type: Application
    Filed: June 27, 2023
    Publication date: January 2, 2025
    Inventors: Sudhanshu Sekher Sar, Sarbajit K. Rakshit, Sudheesh S. Kairali, Satyam Jakkula
  • Publication number: 20240242599
    Abstract: A computer-implemented method, system and program product enabling communication and collaboration between autonomous vehicles and non-autonomous driving along a shared roadway. Autonomous vehicles having difficulty traveling along the roadway or making driving decisions due to the presence of non-autonomous vehicles request deployment of unmanned aerial vehicles (UAV). Based on the current driving conditions, the number of non-autonomous vehicles and other factors, a number of UAVs are deployed and attached to the non-autonomous vehicles. The UAVs scan the surrounding environment and nearby vehicles within the environment. UAVs transmit scanned images, sensor data and other information to the nearby autonomous vehicles which generate driving decisions based on the data collection of the autonomous vehicle in conjunction with data provided by UAVs. Driving decisions of autonomous vehicles are transmitted to the UAVs.
    Type: Application
    Filed: January 13, 2023
    Publication date: July 18, 2024
    Inventors: Sarbajit K. Rakshit, Satyam Jakkula, Sudhanshu Sekher Sar, Sudheesh S. Kairali
  • Publication number: 20240204572
    Abstract: Embodiments of the present disclosure provide an enhanced system and new techniques to implement a multi-vehicle moving power bus for supplying external power to autonomous target vehicles moving on the road. A multi-vehicle power bus controller forms a multi-vehicle moving power bus and controls a roadside laser power-beaming source connecting with autonomous vehicles in the moving power bus and supplying external power to the moving power bus. Any target autonomous vehicles in the moving power bus requiring additional power for battery charging are supplied with requested power from the multi-vehicle moving power bus connected to one or more roadside laser power-beaming sources.
    Type: Application
    Filed: December 19, 2022
    Publication date: June 20, 2024
    Inventors: Sarbajit K. RAKSHIT, Sudhanshu Sekher SAR, Sudheesh S. KAIRALI, Satyam JAKKULA
  • Publication number: 20240203059
    Abstract: Techniques are described with respect to a system, method, and computer product for managing a risk-free walkway. An associated method includes defining a virtual space in augmented reality and determining a geofence between at least a contaminated area and the risk-free walkway that avoids the contaminated area. The method further includes rendering augmented reality content in the virtual space with the risk-free walkway being associated with a user.
    Type: Application
    Filed: December 15, 2022
    Publication date: June 20, 2024
    Inventors: Sudhanshu Sekher Sar, Sudheesh S. Kairali, Sarbajit K. Rakshit, Satyam Jakkula
  • Publication number: 20240202644
    Abstract: Techniques are described with respect to a system, method, and computer product for delivering package in a risk-free walkway. An associated method includes generating location profile associated with a location and analyzing a user profile associated with a user. The method further including determining an optimal path for delivery of package associated with the user based on the location profile and deploying a robot designed to utilize the optimal path to deliver package based on the user profile.
    Type: Application
    Filed: December 15, 2022
    Publication date: June 20, 2024
    Inventors: Sudhanshu Sekher Sar, Sudheesh S. Kairali, Sarbajit K. Rakshit, Satyam Jakkula
  • Publication number: 20240203046
    Abstract: A computer-implemented method, according to one embodiment, includes outputting a first virtual reality (VR) environment representation for display on a plurality of VR devices. First inputs received from participants using the VR devices are analyzed to determine whether to output a second VR environment representation. The method further includes determining, based on the analysis, a second VR environment representation and a first transitional sequence for the VR devices to output while transitioning from displaying the first VR environment representation to displaying the second VR environment representation. The second VR environment representation and the first transitional sequence are output for display on the VR devices.
    Type: Application
    Filed: December 14, 2022
    Publication date: June 20, 2024
    Inventors: Sarbajit K. Rakshit, Sudheesh S. Kairali, Satyam Jakkula, Binoy Thomas
  • Publication number: 20240123843
    Abstract: Computer-implemented methods for wireless power transfer among multiple vehicles are provided. Aspects include identifying a group of vehicles, from a plurality of vehicles, that require charging and identifying a wireless charging capability of each vehicle of the group of vehicles. Aspects also include deploying wireless power chargers to the vehicles of the group of vehicles that do not have wireless charging capability and charging each vehicle of the group of vehicles using a wireless power transfer module. The charging of the group of vehicles is performed while the vehicles are in motion.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 18, 2024
    Inventors: Sarbajit K. Rakshit, Satyam Jakkula, Sudheesh S. Kairali, Sudhanshu Sekher Sar
  • Publication number: 20240129243
    Abstract: According to an aspect, a computer-implemented method includes identifying applications in a network environment that perform periodic data extraction and data transmission operations and identifying a frequency and a data transmission load for each of the operations. Aspects also include predicting an available bandwidth in the network environment based at least in part on the periodic data extraction and data transmission operations and based on a determination that the available bandwidth in the network environment will fall below a threshold value during a time interval instructing the applications to modify the one or more of the periodic data extraction and data transmission operations to increase the frequency associated with the one or more of the periodic data extraction and data transmission operations.
    Type: Application
    Filed: October 17, 2022
    Publication date: April 18, 2024
    Inventors: Sudheesh S. Kairali, Satyam Jakkula, Sarbajit K. Rakshit, Sudhanshu Sekher Sar
  • Publication number: 20240114050
    Abstract: A method and system provide computer system security for a focus computer system (FCS). The method comprises creating a security digital twin (SDT) for the FCS with an associated security ontology for the FCS. A potential threat analyzer receives a potential threat object (PTO), and maps it to an enterprise attack vector pattern. The method further comprises searching, on another computer system (OCS) for a predicted attack pattern having a similar pattern to the enterprise attack vector pattern. Conditioned upon finding the predicted attack pattern, and using a potential threat handler locating an action mitigation plan (AMP) related to the predicted attack pattern in the data fabric associated with the OCS, the method further comprises copying the OCS predicted attack pattern to an FCS predicted attack pattern store, copying the OCS AMP to an FCS AMP store, and defending the FCS from the PTO using the AMP.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Inventors: Sudheesh S. Kairali, Sarbajit K. Rakshit, Satyam Jakkula, Sudhanshu Sekher Sar, Maureen Kraft
  • Publication number: 20240098505
    Abstract: A method comprising establishing a local communication network among and between a plurality of onboard vehicle computers respectively located in a plurality of vehicles, polling the vicinity of each vehicle to determine a set of qualified mobile device(s) that meet the following criteria: (i) the qualified mobile device is located within one of the vehicles of the plurality of vehicles, (ii) the qualified mobile device is configured and equipped to join the local network, and (iii) the qualified mobile device consents to join the local network, and adding the set of qualified mobile device(s) to the local network.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 21, 2024
    Inventors: Sarbajit K. Rakshit, Sudheesh S. Kairali, Sudhanshu Sekher Sar, Satyam Jakkula
  • Publication number: 20240053984
    Abstract: At a mirrored operator, a current operand snapshot is received from a source operator. The current operand snapshot comprises configuration data of a set of source operands managed by the source operator, and the set of source operands comprises at least one source operand. A set of mirrored operands is configured by the mirrored operator according to the current operand snapshot, resulting in a first configuration of the set of mirrored operands. At the mirrored operator, a change request is received from the source operator. The change request comprises a request to modify a configuration of the set of source operands. The first configuration of the set of mirrored operands is modified by the mirrored operator according to the change request.
    Type: Application
    Filed: August 11, 2022
    Publication date: February 15, 2024
    Applicant: International Business Machines Corporation
    Inventors: Sudheesh S. Kairali, Subru S K, Sarbajit K. Rakshit, Satyam Jakkula, Sudhanshu Sekher Sar