Patents by Inventor Sushain Pandit

Sushain Pandit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10375556
    Abstract: An initiation of an emergency communication with an emergency service associated with an emergency telephone number is detected by a mobile communications device. A completion of the emergency communication using a first communication path associated with a mobile communications service provider is attempted. The mobile communication device determines that the emergency communication using the first communication path has failed. An identity of a destination of the failed emergency communication is determined using location and telemetry data from the mobile communication device. A connection of the mobile communications device to the identified destination is facilitated using a second communication path. The mobile communications device is identified to the determined destination as an originator of the connection.
    Type: Grant
    Filed: December 21, 2017
    Date of Patent: August 6, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Brent Gross, Sushain Pandit, Guenter A. Sauter, Charles D. Wolfson, Michael R. Self, Frederick L. White
  • Publication number: 20190239058
    Abstract: An initiation of an emergency communication with an emergency service associated with an emergency telephone number is detected by a mobile communications device. A completion of the emergency communication using a first communication path associated with a mobile communications service provider is attempted. The mobile communication device determines that the emergency communication using the first communication path has failed. An identity of a destination of the failed emergency communication is determined using location and telemetry data from the mobile communication device. A connection of the mobile communications device to the identified destination is facilitated using a second communication path. The mobile communications device is identified to the determined destination as an originator of the connection.
    Type: Application
    Filed: April 12, 2019
    Publication date: August 1, 2019
    Applicants: International Business Machines Corporation, LaaSer Critical Communications Corporation
    Inventors: Brent Gross, Sushain Pandit, Guenter A. Sauter, Charles D. Wolfson, Michael R. Self, Frederick L. White
  • Publication number: 20190200204
    Abstract: An initiation of an emergency communication with an emergency service associated with an emergency telephone number is detected by a mobile communications device. A completion of the emergency communication using a first communication path associated with a mobile communications service provider is attempted. The mobile communication device determines that the emergency communication using the first communication path has failed. An identity of a destination of the failed emergency communication is determined using location and telemetry data from the mobile communication device. A connection of the mobile communications device to the identified destination is facilitated using a second communication path. The mobile communications device is identified to the determined destination as an originator of the connection.
    Type: Application
    Filed: December 21, 2017
    Publication date: June 27, 2019
    Applicants: International Business Machines Corporation, LaaSer Critical Communications Corporation
    Inventors: Brent Gross, Sushain Pandit, Guenter A. Sauter, Charles D. Wolfson, Michael R. Self, Frederick L. White
  • Publication number: 20190197250
    Abstract: A system and method for managing and controlling data licenses for information assets. An information asset is stored in a repository, and registered in a catalog for the repository. A data license is associated with the information asset in the catalog, wherein the data license is stored as part of the information asset's metadata in the catalog. Access to the information asset stored in the repository is controlled based on the data license. A new data license is automatically created for a new information asset derived from an existing information asset, wherein the new data license is derived from an existing data license for the existing information asset. A lineage graph of the information asset is automatically created for audit purposes, to show that the information asset has been accessed in compliance with the data license.
    Type: Application
    Filed: December 27, 2017
    Publication date: June 27, 2019
    Inventors: Ivan Matthew Milman, Martin Oberhofer, Sushain Pandit, Charles Daniel Wolfson
  • Publication number: 20190188312
    Abstract: User information categorization using consent-based class rules is described. Consent from a user is received regarding at least one functional area where user information is shareable is received. Based on the consent, at least one data class that is permitted to be shared is determined. A user information designation is associated with the at least one data class and class rules are applied to user information associated with the user information designation based on the association between the user information designation and the at least one data class.
    Type: Application
    Filed: December 14, 2017
    Publication date: June 20, 2019
    Inventors: Sushain Pandit, Martin Oberhofer, Steven Lockwood
  • Publication number: 20190122226
    Abstract: A method, computer system, and a computer program product for smart validation of suspicious activity reports is provided. The present invention may include receiving a plurality of suspicious activity data from a reporting software. The present invention may also include analyzing the plurality of suspicious activity data using a plurality of analytics, wherein the analysis validates the plurality of stored suspicious activity data using the plurality of analytics. The present invention may then include providing feedback to a user based on the analyzed plurality of suspicious activity.
    Type: Application
    Filed: October 20, 2017
    Publication date: April 25, 2019
    Inventors: Vijay Ekambaram, Ivan M. Milman, Martin Oberhofer, Sushain Pandit
  • Patent number: 10262149
    Abstract: The program controls access to data objects stored on a tangible device of a computer system within an enterprise. A user request to access a data object identifies a user role by looking up the user identification in an enterprise directory. The program determines whether the role of the user is permitted access to a system and also determines a risk score representing a risk of dissemination of the requested data object. The program compares the risk score of the requested data object to a pre-configured threshold value of the requested data object and controls access to the requested data object, based on the role of the user, and the risk score associated with the risk of disseminating the requested data object.
    Type: Grant
    Filed: June 16, 2017
    Date of Patent: April 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Ivan M. Milman, Martin Oberhofer, Sushain Pandit
  • Patent number: 10255364
    Abstract: A user interface is generated that displays a set of selectable terms from a glossary of business terms and is configured to generate a business metadata query that identifies a forum with member profiles. A data movement executable is generated that identifies the forum and an analytical processing environment. The data movement executable is deployed and data is moved from the forum into the analytical processing environment. Analytics are performed on the data from the forum. Metadata is identified from the analytics. The glossary of business terms is updated using the metadata from the analytics.
    Type: Grant
    Filed: November 24, 2014
    Date of Patent: April 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Brian P. Byrne, Ivan M. Milman, Martin Oberhofer, Sushain Pandit
  • Patent number: 10169207
    Abstract: Input of a video file is received. The video file includes video of a representation of a wearable device. One or more motion vector data is determined based on the video file. One or more motion sensor data is generated based on the motion vector data. One or more test results are determined using the motion sensor data. The video file, the motion vector data, and the motion sensor data are stored.
    Type: Grant
    Filed: February 15, 2018
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Subhajit Bhuiya, Vijay Ekambaram, Donald A. Padilla, Sushain Pandit
  • Patent number: 10162736
    Abstract: Input of a video file is received. The video file includes video of a representation of a wearable device. One or more motion vector data is determined based on the video file. One or more motion sensor data is generated based on the motion vector data. One or more test results are determined using the motion sensor data. The video file, the motion vector data, and the motion sensor data are stored.
    Type: Grant
    Filed: November 17, 2016
    Date of Patent: December 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Subhajit Bhuiya, Vijay Ekambaram, Donald A. Padilla, Sushain Pandit
  • Patent number: 10162892
    Abstract: Embodiments of the invention provide an approach for creating, evolving and using a weighted semantic graph to manage and potentially identify certain information assets within an enterprise. The semantic graph may be generated by monitoring users navigating through search results which provide a set of information assets responsive to a search query. By recording the navigation path taken by many users, relationships between information assets may be identified. Further, once generated, the semantic graph may be used to present users with an indication of related information assets as part of the search results. Further still, the semantic graph may also be used to identify information assets “hubs” as well as information assets that may provide low utility to individuals within the enterprise.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: December 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Brian P. Byrne, Martin A. Oberhofer, Sushain Pandit, Charles D. Wolfson
  • Publication number: 20180365439
    Abstract: The program controls access to data objects stored on a tangible device of a computer system within an enterprise. A user request to access a data object identifies a user role by looking up the user identification in an enterprise directory. The program determines whether the role of the user is permitted access to a system and also determines a risk score representing a risk of dissemination of the requested data object. The program compares the risk score of the requested data object to a pre-configured threshold value of the requested data object and controls access to the requested data object, based on the role of the user, and the risk score associated with the risk of disseminating the requested data object.
    Type: Application
    Filed: June 16, 2017
    Publication date: December 20, 2018
    Inventors: Ivan M. Milman, Martin Oberhofer, Sushain Pandit
  • Publication number: 20180285392
    Abstract: A first entity and a second entity can be retrieved from a database and compared. The first entity and the second entity can each comprise at least one respective primary key, at least one respective attribute, and at least one pair of corresponding instances. One or more equivalent attributes can be identified, and, for each equivalent attribute, a set of attribute value differences can be compiled for each respective corresponding instance between the first entity and the second entity.
    Type: Application
    Filed: June 4, 2018
    Publication date: October 4, 2018
    Inventors: Subramanian Palaniappan, Sushain Pandit
  • Patent number: 10073871
    Abstract: A first entity and a second entity can be retrieved from a database and compared. The first entity and the second entity can each comprise at least one respective primary key, at least one respective attribute, and at least one pair of corresponding instances. One or more equivalent attributes can be identified, and, for each equivalent attribute, a set of attribute value differences can be compiled for each respective corresponding instance between the first entity and the second entity.
    Type: Grant
    Filed: November 9, 2015
    Date of Patent: September 11, 2018
    Assignee: International Business Machines Corporation
    Inventors: Subramanian Palaniappan, Sushain Pandit
  • Publication number: 20180225449
    Abstract: Disclosed aspects relate to counter-fraud operation management. A counter-fraud operation may be executed using an initial set of parameter values for a set of parameters of the counter-fraud operation. A set of user counter-fraud activities of a user may be monitored corresponding to a user interface. A set of user feedback data may be captured to determine a feedback-driven set of parameter values for a set of parameters of the counter-fraud operation. The feedback-driven set of parameter values may be determined for the set of parameters of the counter-fraud operation. The counter-fraud operation using the feedback-driven set of parameter values may be executed.
    Type: Application
    Filed: February 9, 2017
    Publication date: August 9, 2018
    Inventors: Brian P. Byrne, Sushain Pandit, Kalaivanan Saravanan, Yogendra K. Srivastava
  • Publication number: 20180225450
    Abstract: Disclosed aspects relate to counter-fraud operation management. A counter-fraud operation may be executed using an initial set of parameter values for a set of parameters of the counter-fraud operation. A set of user counter-fraud activities of a user may be monitored corresponding to a user interface. A set of user feedback data may be captured to determine a feedback-driven set of parameter values for a set of parameters of the counter-fraud operation. The feedback-driven set of parameter values may be determined for the set of parameters of the counter-fraud operation. The counter-fraud operation using the feedback-driven set of parameter values may be executed.
    Type: Application
    Filed: October 20, 2017
    Publication date: August 9, 2018
    Inventors: Brian P. Byrne, Sushain Pandit, Kalaivanan Saravanan, Yogendra K. Srivastava
  • Patent number: 10032039
    Abstract: The program controls access to data objects stored on a tangible device of a computer system within an enterprise. A user request to access a data object identifies a user role by looking up the user identification in an enterprise directory. The program determines whether the role of the user is permitted access to a system and also determines a risk score representing a risk of dissemination of the requested data object. The program compares the risk score of the requested data object to a pre-configured threshold value of the requested data object and controls access to the requested data object, based on the role of the user, and the risk score associated with the risk of disseminating the requested data object.
    Type: Grant
    Filed: December 18, 2017
    Date of Patent: July 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Ivan M. Milman, Martin Oberhofer, Sushain Pandit
  • Publication number: 20180150388
    Abstract: Input of a video file is received. The video file includes video of a representation of a wearable device. One or more motion vector data is determined based on the video file. One or more motion sensor data is generated based on the motion vector data. One or more test results are determined using the motion sensor data. The video file, the motion vector data, and the motion sensor data are stored.
    Type: Application
    Filed: February 15, 2018
    Publication date: May 31, 2018
    Inventors: Subhajit Bhuiya, Vijay Ekambaram, Donald A. Padilla, Sushain Pandit
  • Publication number: 20180137034
    Abstract: Input of a video file is received. The video file includes video of a representation of a wearable device. One or more motion vector data is determined based on the video file. One or more motion sensor data is generated based on the motion vector data. One or more test results are determined using the motion sensor data. The video file, the motion vector data, and the motion sensor data are stored.
    Type: Application
    Filed: November 17, 2016
    Publication date: May 17, 2018
    Inventors: Subhajit Bhuiya, Vijay Ekambaram, Donald A. Padilla, Sushain Pandit
  • Publication number: 20180039657
    Abstract: A method to manage data relationships is provided. The method may include generating a visualization to display the data and relationships. The method may also include a user to interacting with the visualization to create, read, update, and/or delete data and relationships. The method may further include constraints to prevent changes from being made. The method may also include contextual assistance to aid a user in interacting with and reading the visualization.
    Type: Application
    Filed: August 5, 2016
    Publication date: February 8, 2018
    Inventor: Sushain Pandit