Patents by Inventor Sudheesh S. Kairali

Sudheesh S. Kairali has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240144175
    Abstract: An embodiment for selectively transferring inventory on a temporary basis is provided. The embodiment may include receiving real-time and historical data relating to a plurality of products in a storage facility. The embodiment may also include identifying one or more high priority products during a selected timeframe. The embodiment may further include predicting a required amount of space in the storage facility to store the one or more high priority products. The embodiment may also include in response to determining the storage facility does not have the required amount of space, assigning a level of priority to each remaining product. The embodiment may further include identifying a transportation vehicle and a transit location of the transportation vehicle to temporarily store at least one first remaining product with a medium priority level. The embodiment may also include autonomously loading the transportation vehicle with the at least one first remaining product.
    Type: Application
    Filed: October 31, 2022
    Publication date: May 2, 2024
    Inventors: Sudheesh S. Kairali, Sudhanshu Sekher Sar, Sarbajit K. Rakshit
  • Patent number: 11973842
    Abstract: An overloaded period of a first service is forecast. A first transaction is predicted to arrive at the first service during the overloaded period. At a second service, a transaction sequence including the first transaction is delayed, the delaying resulting in a delayed transaction sequence, the delayed transaction sequence delaying arrival of the first transaction at the first service until after the overloaded period.
    Type: Grant
    Filed: February 11, 2022
    Date of Patent: April 30, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sudheesh S. Kairali, Sarbajit K. Rakshit
  • Publication number: 20240135334
    Abstract: Systems, methods and/or computer program products predictively automating configurations of modular service zones servicing physical assets, maximizing reuse of service zone(s) and optimizing time for servicing a plurality of physical assets. Digital twin models of physical assets are classified, and arranged into workflows for the service zones, sequencing services performed on physical assets arriving at service centers and preparing service zones based on types of services requested, the estimated time of arrival and similarities between classifications of different digital twins of physical assets. Based on sequences of the workflow, arrival times of physical assets and overlap between parts, tools, machines, etc.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 25, 2024
    Inventors: Sudheesh S. Kairali, Sarbajit K. Rakshit
  • Patent number: 11968231
    Abstract: A processor may identify one or more predicted microservice chains for each of one or more user profiles. The one or more predicted microservice chains may be selected based on historical information. The one or more user profiles may each be associated with a respective user of a user device. The processor may analyze user specific information. The user specific information may be associated with the user device. The processor may determine, based on the user specific information, if the user device causes network intrusion. The processor may perform, based on the determination, an action for the user device.
    Type: Grant
    Filed: August 4, 2021
    Date of Patent: April 23, 2024
    Assignee: International Business Machines Corporation
    Inventors: Sudheesh S. Kairali, Sarbajit K. Rakshit
  • Publication number: 20240123843
    Abstract: Computer-implemented methods for wireless power transfer among multiple vehicles are provided. Aspects include identifying a group of vehicles, from a plurality of vehicles, that require charging and identifying a wireless charging capability of each vehicle of the group of vehicles. Aspects also include deploying wireless power chargers to the vehicles of the group of vehicles that do not have wireless charging capability and charging each vehicle of the group of vehicles using a wireless power transfer module. The charging of the group of vehicles is performed while the vehicles are in motion.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 18, 2024
    Inventors: Sarbajit K. Rakshit, Satyam Jakkula, Sudheesh S. Kairali, Sudhanshu Sekher Sar
  • Publication number: 20240126530
    Abstract: An example operation may include one or more of identifying, via a hybrid environment, components which are included in a software program within the hybrid environment, generating a software bill of materials (SBOM) for the software program which comprises names of the identified components, detecting that the software program does not comply with a predefined policy based on the names of the identified components within the SBOM, and displaying a notification via a user interface based on the detection.
    Type: Application
    Filed: October 17, 2022
    Publication date: April 18, 2024
    Inventors: Sudheesh S. Kairali, Rambabu Parvatina, Venkatesh Krishnan, Shanmukha Sai Ram Paran Parvathina, Nataraj Nagaratnam
  • Publication number: 20240129243
    Abstract: According to an aspect, a computer-implemented method includes identifying applications in a network environment that perform periodic data extraction and data transmission operations and identifying a frequency and a data transmission load for each of the operations. Aspects also include predicting an available bandwidth in the network environment based at least in part on the periodic data extraction and data transmission operations and based on a determination that the available bandwidth in the network environment will fall below a threshold value during a time interval instructing the applications to modify the one or more of the periodic data extraction and data transmission operations to increase the frequency associated with the one or more of the periodic data extraction and data transmission operations.
    Type: Application
    Filed: October 17, 2022
    Publication date: April 18, 2024
    Inventors: Sudheesh S. Kairali, Satyam Jakkula, Sarbajit K. Rakshit, Sudhanshu Sekher Sar
  • Publication number: 20240119580
    Abstract: A system, method, and computer program product perform audio-visual inspection at a surface of a liquid over machinery that is operating under the surface. The audio-visual inspection includes each of feeding surface wave movements into a neural network, feeding bubble formation pattern into the neural network, feeding bubble dimensions into the neural network, and feeding underwater acoustic information to the neural network. The system, method, and computer program product further identify, using the neural network, a statistical anomaly from the audio-visual inspection indicating an anomaly of the performance of the machinery.
    Type: Application
    Filed: October 10, 2022
    Publication date: April 11, 2024
    Inventors: Sudheesh S. Kairali, Sarbajit K. Rakshit
  • Publication number: 20240114050
    Abstract: A method and system provide computer system security for a focus computer system (FCS). The method comprises creating a security digital twin (SDT) for the FCS with an associated security ontology for the FCS. A potential threat analyzer receives a potential threat object (PTO), and maps it to an enterprise attack vector pattern. The method further comprises searching, on another computer system (OCS) for a predicted attack pattern having a similar pattern to the enterprise attack vector pattern. Conditioned upon finding the predicted attack pattern, and using a potential threat handler locating an action mitigation plan (AMP) related to the predicted attack pattern in the data fabric associated with the OCS, the method further comprises copying the OCS predicted attack pattern to an FCS predicted attack pattern store, copying the OCS AMP to an FCS AMP store, and defending the FCS from the PTO using the AMP.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Inventors: Sudheesh S. Kairali, Sarbajit K. Rakshit, Satyam Jakkula, Sudhanshu Sekher Sar, Maureen Kraft
  • Publication number: 20240098505
    Abstract: A method comprising establishing a local communication network among and between a plurality of onboard vehicle computers respectively located in a plurality of vehicles, polling the vicinity of each vehicle to determine a set of qualified mobile device(s) that meet the following criteria: (i) the qualified mobile device is located within one of the vehicles of the plurality of vehicles, (ii) the qualified mobile device is configured and equipped to join the local network, and (iii) the qualified mobile device consents to join the local network, and adding the set of qualified mobile device(s) to the local network.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 21, 2024
    Inventors: Sarbajit K. Rakshit, Sudheesh S. Kairali, Sudhanshu Sekher Sar, Satyam Jakkula
  • Patent number: 11934510
    Abstract: A person's drawing capability is used as an authentication credential. During a training phase, a user is asked to hand draw various reference shapes such as a rectangle, flower, etc. These user drawings for a given shape are input to a training discriminator (with an “authentic” label) along with drawings automatically generated from a latent sample (with a “not authentic” label), and the training discriminator computes positive discrimination vectors for this shape that are unique to this user. Thereafter, when the user wants access to a resource (such as an online account, a mobile computing device, or an electronic document), the user is presented with a drawing challenge for one of the reference shapes, and they draw a corresponding challenge image. An image vector for the challenge image is generated, and if the image vector falls within the positive discrimination vectors, access to the resource is granted.
    Type: Grant
    Filed: December 17, 2020
    Date of Patent: March 19, 2024
    Assignee: International Business Machines Corporation
    Inventors: Sudheesh S. Kairali, Ankur Tagra
  • Patent number: 11930044
    Abstract: An approach for dynamically transitioning mobile client devices from one location to another within edge computing is disclosed. The approach includes retrieving locations for near edges and far edges and collecting one or more SCC (security compliance center) rules. The approach includes identifying edge access from one or more client devices and determining mobility pattern associated with the edge access. The approach includes determining edge recommendation based on the mobility patterns and applying the edge recommendation.
    Type: Grant
    Filed: January 5, 2022
    Date of Patent: March 12, 2024
    Assignee: International Business Machines Corporation
    Inventors: Sudheesh S. Kairali, Sarbajit K. Rakshit, Vijay Kalangumvathakkal, Nataraj Nagaratnam
  • Patent number: 11922360
    Abstract: An approach for managing delivery of packages utilizing one or more vehicles is disclosed. The approach includes loading delivery vehicles in a such a way that, based on contextual need of offloading of the packages from the delivery vehicles, the approach will selectively offload the packages from the delivery vehicle to on-demand warehouse as service location along the route of the delivery vehicle. The delivery vehicles can proactively analyze various contextual situation, and can identify which and how much products are to be off-loaded from the delivery vehicles, and can proactively book warehouse as a service location along with the route of the delivery vehicle so that the products can be transferred from a transportation vehicle to on-demand warehouse as a service location effectively and efficiently.
    Type: Grant
    Filed: February 4, 2022
    Date of Patent: March 5, 2024
    Assignee: International Business Machines Corporation
    Inventors: Sudheesh S. Kairali, Sarbajit K. Rakshit
  • Publication number: 20240053984
    Abstract: At a mirrored operator, a current operand snapshot is received from a source operator. The current operand snapshot comprises configuration data of a set of source operands managed by the source operator, and the set of source operands comprises at least one source operand. A set of mirrored operands is configured by the mirrored operator according to the current operand snapshot, resulting in a first configuration of the set of mirrored operands. At the mirrored operator, a change request is received from the source operator. The change request comprises a request to modify a configuration of the set of source operands. The first configuration of the set of mirrored operands is modified by the mirrored operator according to the change request.
    Type: Application
    Filed: August 11, 2022
    Publication date: February 15, 2024
    Applicant: International Business Machines Corporation
    Inventors: Sudheesh S. Kairali, Subru S K, Sarbajit K. Rakshit, Satyam Jakkula, Sudhanshu Sekher Sar
  • Publication number: 20240048597
    Abstract: A computer-implemented method according to one embodiment includes establishing a handshake between a security and compliance center (SCC) and a first operator of a first cluster via a manager component therebetween. An operand mapping of the SCC is updated, and the established handshake is used to cause the update to be communicated to the first operator of the first cluster. A computer program product according to another embodiment includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method. A system according to another embodiment includes a processor, and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.
    Type: Application
    Filed: August 3, 2022
    Publication date: February 8, 2024
    Inventors: Sudheesh S. Kairali, Sudhanshu Sekher Sar, Sarbajit K. Rakshit, Satyam Jakkula
  • Publication number: 20240037000
    Abstract: A processor may identify that an apparatus is to be disposed. The apparatus may be composed of one or more hardware components. The processor may analyze the apparatus. The processor may generate a respective digital twin for each of the one or more hardware components. The processor may analyze the respective digital twin for each of the one or more hardware components. The processor may determine a condition of each of the one or more hardware components based on the respective digital twin for each of the one or more hardware components.
    Type: Application
    Filed: July 26, 2022
    Publication date: February 1, 2024
    Inventors: Sudheesh S. Kairali, Sarbajit K. Rakshit
  • Publication number: 20240028408
    Abstract: Described are techniques for reference implementation of cloud computing resources. The techniques include receiving specifications for a computing resource flow to implement a computing solution in a cloud computing environment. The computing resource flow comprises a set of computing resources and computing resource relationships that implement the computing solution. The techniques further include identifying a reference architecture that corresponds to at least a part of the computing resource flow for the computing solution and obtaining a reference template for the reference architecture from a reference code repository. The techniques further include generating a solution template that is based in part on the reference template, and the solution template provisions the computing resource flow in the cloud computing environment to implement the computing solution.
    Type: Application
    Filed: July 22, 2022
    Publication date: January 25, 2024
    Inventors: Malarvizhi Kandasamy, Sudheesh S. Kairali, Sarbajit K. Rakshit
  • Patent number: 11870858
    Abstract: A processor may analyze one or more microservice chains based on one or more user profiles. The processor may generate, based on the analyzing, a health status associated with the one or more microservice chains. The processor may determine, based on the health status, whether a microservice in the one or more microservice chains is unhealthy. The processor may implement, automatically, a select microservice chain.
    Type: Grant
    Filed: February 1, 2022
    Date of Patent: January 9, 2024
    Assignee: International Business Machines Corporation
    Inventors: Sudheesh S. Kairali, Sarbajit K. Rakshit
  • Publication number: 20230409410
    Abstract: A method for automatically selecting a computing device to offload and process a computer task is provided. The method may include automatically identifying an off-loadable computer task to be offloaded from a first computing device to a second computing device. The method may further include determining a scheduled time and an amount of time for processing the identified off-loadable computer task. The method may further include, based on the identified off-loadable computer task, the scheduled time, and the determined amount of time, automatically identifying available computing devices from the plurality of computing devices for processing the identified off-loadable computer task. The method may further include, selecting the computing device from for processing the off-loadable computer task, wherein selecting a moving edge computing device further includes coordinating the scheduled time and the amount of time for processing the identified off-loadable computer task with a determined travel plan.
    Type: Application
    Filed: June 15, 2022
    Publication date: December 21, 2023
    Inventors: Sudheesh S. Kairali, Malarvizhi Kandasamy, Sarbajit K. Rakshit
  • Patent number: 11822551
    Abstract: An approach is provided that receives a request to write an entry to a database. Database caches are then checked for a portion of the entry, such as a portion that includes a primary key. Based on the checking, the approach determines whether to write the entry to the database. In response to the determination being that the entry cannot be written to the database, an error is returned with the error being returned without accessing the database, only the caches. On the other hand, the entry is written to the database in response to the determination being that the entry can be written to the database.
    Type: Grant
    Filed: August 31, 2021
    Date of Patent: November 21, 2023
    Assignee: International Business Machines Corporation
    Inventors: Hariharan Krishna, Shajeer K Mohammed, Sudheesh S. Kairali