Patents by Inventor Sudhanshu Shekhar

Sudhanshu Shekhar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190378408
    Abstract: A computer-implemented dynamic road stretch dividing method, the method comprising: determining a current lane distribution of partitions of a road stretch; calculating a new lane distribution of the road stretch to ameliorate traffic based on a pragmatic factor; changing an alignment of the partitions of the current lane distribution to obtain the new lane distribution; and updating the pragmatic factor based on at least one of an external policy and a constraint input by a user.
    Type: Application
    Filed: August 22, 2019
    Publication date: December 12, 2019
    Inventors: Kuntal Dey, Rakesh Rameshrao Pimplikar, Sudhanshu Shekhar Singh, Biplav Srivastava
  • Publication number: 20190205378
    Abstract: Disclosed is a method and a system for extracting entity information from target data. The method comprises: providing the target data; refining the target data to obtain at least one base entity information having a plurality of base entity units using an algorithm, wherein the algorithm is based on a predefined syntax; generating a plurality of strings for each of the base entity information, wherein the plurality of strings comprises at least one base entity unit among the plurality of base entity units; sorting the plurality of strings in a decreasing order of length of the plurality of strings; identifying an entity type of the plurality of strings, based on an ontology, by processing the plurality of strings sequentially; assigning labels to the plurality of strings based on the entity type; and mapping the labelled plurality of strings to a predefined signature to obtain the entity information.
    Type: Application
    Filed: December 27, 2018
    Publication date: July 4, 2019
    Inventors: Gaurav Tripathi, Vatsal Agarwal, Prashant Patil, Girish Kumar, Tapashi Mandal, Sudhanshu Shekhar
  • Publication number: 20190205389
    Abstract: Disclosed is a method and a system for identifying key terms in a digital document. The method comprises providing the digital document and analysing the digital document to identify key terms in the digital document. The digital document includes a first text in a first language. Furthermore, analysing the digital document comprises translating the first text in the first language to obtain a second text in a second language, translating the first text in the first language to obtain a third text in a third language, translating the obtained second text in the second language to obtain a fourth text in the third language, comparing at least one pair of first text, second text, third text and fourth text to identify at least one set of similar text between the compared at least one pair, and processing the set of similar text to obtain key terms in the digital document.
    Type: Application
    Filed: December 27, 2018
    Publication date: July 4, 2019
    Inventors: Gaurav Tripathi, Vatsal Agarwal, Sudhanshu Shekhar
  • Publication number: 20190205318
    Abstract: Disclosed is a method of managing a network of field-specific entity records. The method comprises accessing the network of field-specific entity records comprising at least one pair of field-specific entity records within at least one field segment, wherein the at least one pair of field-specific entity records is associated with relations therebetween, and wherein the at least one pair of field-specific entity records comprises a first pair of field-specific entity records and at least one second pair of field-specific entity records; determining a weightage score of each of the relations between the at least one pair of field-specific entity records; determining an importance score of each field-specific entity record; determining a change in the importance score, and/or the weightage score of a relation between field-specific entity records of the at least one second pair of field-specific entity records; and updating the network of field-specific entity records.
    Type: Application
    Filed: December 27, 2018
    Publication date: July 4, 2019
    Inventors: Gaurav Tripathi, Vatsal Agarwal, Sudhanshu Shekhar, Akshesh Doshi
  • Publication number: 20190188646
    Abstract: One embodiment provides a method, including: receiving a requisition for a job position, the requisition having a plurality of recruiters, each having influence in selecting a candidate; generating a profile for an ideal candidate comprising (i) a plurality of attributes and (ii) weights corresponding to each of the attributes; receiving, for a plurality of candidates, profiles for each the candidates; comparing the profile of each of the plurality of candidates against the ideal candidate, using a distance method computation to determine the distance between the plurality of candidates and the ideal candidate based upon the weights; ranking the plurality of candidates and providing the ranking to each of the plurality of recruiters; receiving input from each of the plurality of recruiters that modifies the ranking, recalculating the weights of the attributes based upon the modified ranking, and modifying the ranking; and providing a final ranking of the plurality of candidates.
    Type: Application
    Filed: December 14, 2017
    Publication date: June 20, 2019
    Inventors: Sarthak Ahuja, Ritwik Chaudhuri, Manish Kataria, Manu Kuchhal, Gyana Ranjan Parija, Sudhanshu Shekhar Singh
  • Publication number: 20180376057
    Abstract: A contextual zoom control method, system, and computer program product, includes detecting faces in an area of interest when a user is performing an image capturing action, extracting a facial image for each of a set of key individuals attending an event where the user is performing the image capturing action, creating a ranked list of the set of key individuals according to a predetermined parameter of each key individual, pairing each detected face with a matching extracted facial image to label an identity of each key individual in the area of interest, and in a single individual capturing mode, performing a camera function to assist the user in performing the image capturing action on the identity that is paired with a highest ranked individual on the ranked list within the area of interest.
    Type: Application
    Filed: August 31, 2018
    Publication date: December 27, 2018
    Inventors: Kuntal Dey, Seema Nagar, Sudhanshu Shekhar Singh, Enara C. Vijil
  • Patent number: 10136049
    Abstract: A contextual zoom control method, system, and computer program product, includes detecting faces in an area of interest when a user is performing an image capturing action, extracting a facial image for each of a set of key individuals attending an event where the user is performing the image capturing action, creating a ranked list of the set of key individuals according to a predetermined parameter of each key individual, pairing each detected face with a matching extracted facial image to label an identity of each key individual in the area of interest, and in a single individual capturing mode, performing a camera function to assist the user in performing the image capturing action on the identity that is paired with a highest ranked individual on the ranked list within the area of interest.
    Type: Grant
    Filed: January 9, 2017
    Date of Patent: November 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kuntal Dey, Seema Nagar, Sudhanshu Shekhar Singh, Enara C. Vijil
  • Publication number: 20180247528
    Abstract: A dynamic road stretch dividing method, system, and computer program product, include determining a current lane distribution of partitions of a road stretch, calculating a new lane distribution of the road stretch to ameliorate traffic based on a pragmatic factor, and changing an alignment of the partitions of the current lane distribution to obtain the new lane distribution.
    Type: Application
    Filed: February 27, 2017
    Publication date: August 30, 2018
    Inventors: Kuntal Dey, Rakesh Rameshrao Pimplikar, Sudhanshu Shekhar Singh, Biplav Srivastava
  • Publication number: 20180197146
    Abstract: A resume remarketing method, system, and computer program product, including creating a remarketing cookie based on an interest factor of a first user in a first type of resume, matching the first user with a second user based on a similarity between a role of the first and second users, and transferring the remarketing cookie from the first user to the second user to remarket the first type of resume to the second user.
    Type: Application
    Filed: January 6, 2017
    Publication date: July 12, 2018
    Inventors: Kuntal Dey, Seema Nagar, Sudhanshu Shekhar Singh, Roman Vaculin
  • Publication number: 20180198975
    Abstract: A contextual zoom control method, system, and computer program product, includes detecting faces in an area of interest when a user is performing an image capturing action, extracting a facial image for each of a set of key individuals attending an event where the user is performing the image capturing action, creating a ranked list of the set of key individuals according to a predetermined parameter of each key individual, pairing each detected face with a matching extracted facial image to label an identity of each key individual in the area of interest, and in a single individual capturing mode, performing a camera function to assist the user in performing the image capturing action on the identity that is paired with a highest ranked individual on the ranked list within the area of interest.
    Type: Application
    Filed: January 9, 2017
    Publication date: July 12, 2018
    Inventors: Kuntal Dey, Seema Nagar, Sudhanshu Shekhar Singh, Enara C. Vijil
  • Publication number: 20180196783
    Abstract: A resume rearrangement method, system, and computer program product, includes linking content segments of a resume including key terms with each other based on a pairwise similarity score between the key terms of the content segments, identifying an interest segment within the resume that draws interest from a current reader, and displaying a summary for the current reader including the interest segment that has drawn the interest of the current reader and a reference to at least one other segment that is linked with the interest segment.
    Type: Application
    Filed: January 9, 2017
    Publication date: July 12, 2018
    Inventors: Kuntal Dey, Seema Nagar, Sudhanshu Shekhar Singh, Roman Vaculin
  • Patent number: 9160766
    Abstract: A computer-implemented method for protecting organizations against spear phishing attacks may include (1) searching a plurality of websites for user profiles belonging users who are affiliated with an organization and who have access to at least one privileged computing resource controlled by the organization, (2) retrieving, from the user profiles, personal information describing the users, (3) determining, based on the personal information, that a portion of the user profiles belongs to an individual user with access to the privileged computing resource, (4) identifying at least one phishing attack risk factor in the user profiles that belong to the individual user, and (5) assessing, based at least in part on the phishing attack risk factor, a risk of a phishing attack targeting the individual user to illegitimately gain access to the privileged computing resource. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: April 25, 2014
    Date of Patent: October 13, 2015
    Assignee: Symantec Corporation
    Inventors: Anand Kashyap, Sudhanshu Shekhar
  • Publication number: 20150264084
    Abstract: A computer-implemented method for protecting organizations against spear phishing attacks may include (1) searching a plurality of websites for user profiles belonging users who are affiliated with an organization and who have access to at least one privileged computing resource controlled by the organization, (2) retrieving, from the user profiles, personal information describing the users, (3) determining, based on the personal information, that a portion of the user profiles belongs to an individual user with access to the privileged computing resource, (4) identifying at least one phishing attack risk factor in the user profiles that belong to the individual user, and (5) assessing, based at least in part on the phishing attack risk factor, a risk of a phishing attack targeting the individual user to illegitimately gain access to the privileged computing resource. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: April 25, 2014
    Publication date: September 17, 2015
    Applicant: Symantec Corporation
    Inventors: Anand Kashyap, Sudhanshu Shekhar
  • Patent number: 6931605
    Abstract: The present invention relates to a current conveyor circuit capable of operating at very low voltages, said circuit comprising: three LVCM's and four MOSFETS, wherein LVCM1 provides a constant bias current to flow through M3, if port X is kept open and the difference between the bias current and the injected current flows through M3 if a current is injected into port X, which gets reflected at port Z due to the action of LVCM1, M3 and M4, LVCM2 maintains the drain currents of M1 and M2 constant, and LVCM3 maintains a constant tail current in the circuit.
    Type: Grant
    Filed: March 28, 2001
    Date of Patent: August 16, 2005
    Assignee: Council of Scientific & Industrial Research
    Inventors: Sher Singh Rajput, Sudhanshu Shekhar Jamuar
  • Publication number: 20020194419
    Abstract: The present invention relates to a current conveyor circuit capable of operating at very low voltages, said circuit comprising: three LVCM's and four MOSFETS, wherein LVCM1 provides a constant bias current to flow through M3, if port X is kept open and the difference between the bias current and the injected current flows through M3 if a current is injected into port X, which gets reflected at port Z due to the action of LVCM1, M3 and M4, LVCM2 maintains the drain currents of M1 and M2 constant, and LVCM3 maintains a constant tail current in the circuit.
    Type: Application
    Filed: March 28, 2001
    Publication date: December 19, 2002
    Inventors: Sher Singh Rajput, Sudhanshu Shekhar Jamuar