Patents by Inventor Utpal
Utpal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240146693Abstract: A method, computer system, and a computer program product is provided for establishing a dynamically adaptive network firewall. A firewall model is established that identifies resources that can be used and a plurality of nodes that connect to one another to form a network. A set of external rules and policies are provided to each resource. The firewall implemented using the firewall model upon receiving of incoming data and upon traffic flow. The firewall expands or contracts the network by adding or removing resources according to work that needs to be performed. The work includes both tasks to be completed and efforts that has to be taken by the firewall to ensure security by preventing unauthorized access into the network.Type: ApplicationFiled: October 28, 2022Publication date: May 2, 2024Inventors: SATISHKUMAR SADAGOPAN, MUDHAKAR SRIVATSA, Dinesh C. Verma, Mathews Thomas, Utpal Mangla, Gerald Coon
-
Publication number: 20240143630Abstract: This disclosure relates generally to multi-class multi-label classification and more particularly to contradiction avoided learning for multi-class multi-label classification. Conventional classification methods do not consider contradictory outcomes in multi-label classification tasks wherein contradictory outcomes have significant negative impact in the classification problem solution. The present disclosure provides a contradiction avoided learning multi-class multi-label classification. The disclosed method utilizes a binary contradiction matrix constructed using domain knowledge. Based on the binary contradiction matrix the training dataset is divided into two parts, one comprising contradictions and the second without contradictions. The classification model is trained using the divided datasets using a contradiction loss and a binary cross entropy loss to avoid contradictions during learning of the classification model.Type: ApplicationFiled: October 26, 2023Publication date: May 2, 2024Applicant: Tata Counultancy Services LimitedInventors: Arijit UKIL, Arpan PAL, Soumadeep SAHA, Utpal GARAIN
-
Publication number: 20240134717Abstract: An approach for managing workload deployment in a distributed network, including edge computing is provided. The approach includes deploying several modules, such as, EMM (energy management module), LDM (localized deployment manager) and EDM (edge deployment manager). These modules will be constantly monitoring and managing the energy consumption at the edge nodes under their purview and communicate with other modules to develop a holistic energy management system (e.g., energy policies, energy algorithms, energy plans, etc.) to ensure the most effective energy management of workload is implemented.Type: ApplicationFiled: October 19, 2022Publication date: April 25, 2024Inventors: Mathews Thomas, Utpal Mangla, Sai Srinivas Gorti, Sharath Prasad Krishna Prasad, Venkatesh Ashok Rao Rao, Praveen Jayachandran, Eric Lee Gose, Juel Daniel Raju, Amandeep Singh
-
Publication number: 20240137375Abstract: Embodiments related to using a foundational model for network packet traces. A technique includes receiving network traffic of a network and extracting features from the network traffic, the features having a function related to communications in the network. The technique includes generating tokens from the features, each of the features corresponding to a respective one of the tokens, training a machine learning model by inputting the tokens, the machine learning model being trained to output contextual embeddings for the tokens, and using the contextual embeddings to determine an anomaly in the network traffic.Type: ApplicationFiled: October 19, 2022Publication date: April 25, 2024Inventors: MUDHAKAR SRIVATSA, Davis Wertheimer, Franck Vinh Le, Utpal Mangla, SATISHKUMAR SADAGOPAN, Mathews Thomas, Dinesh C. Verma
-
Publication number: 20240129887Abstract: A computer-implemented method for grouping devices in a massive multiple-input and multiple-output (MIMO)-based cellular network, in accordance with one embodiment, includes determining movement states of end devices in a cell of the massive MIMO-based cellular network, estimating payload requirements of the end devices, and grouping the end devices in a group based on the determined movement states and the estimated payload requirements.Type: ApplicationFiled: October 18, 2022Publication date: April 18, 2024Inventors: Utpal Mangla, Saurabh Agrawal, Dinesh C. Verma, Mathews Thomas, Sagar Tayal
-
Publication number: 20240129178Abstract: A method for determining a correlation of one or more events occurring in a plurality of nodes of a network includes accessing, by a computing device, address information associated with each of the plurality of nodes on the network. The computing device can further access one or more event IDs associated with one or more events occurring on the plurality of nodes. The computing device can further create an association the one or more events occurring on the plurality of nodes with related events occurring on others of the plurality of nodes, the association including the address information.Type: ApplicationFiled: October 14, 2022Publication date: April 18, 2024Inventors: Mudhakar Srivatsa, Jonathan Ian Settle, Satishkumar Sadagopan, Mathews Thomas, Utpal Mangla
-
Patent number: 11954085Abstract: A computer implemented method performs data skipping in a hierarchically organized computing system. A group of processor units determines leaf node data sketches for data in leaf nodes in the hierarchically organized computing system. The leaf node data sketches summarize attributes of data in the leaf nodes. The group of processor units aggregates the leaf node data sketches at intermediate nodes in the hierarchically organized computing system to form aggregated data sketches at the intermediate nodes and retains data sketches received at the intermediate nodes from a group of child nodes to form retained data sketches. The retained data sketches are one of leaf node data sketches and the aggregated data sketches. The group of processor units searches the data using the retained data sketches and the data skipping within the hierarchically organized computing system in response to queries made to the intermediate nodes in the hierarchically organized computing system.Type: GrantFiled: September 22, 2022Date of Patent: April 9, 2024Assignee: International Business Machines CorporationInventors: Mudhakar Srivatsa, Raghu Kiran Ganti, Joshua M. Rosenkranz, Linsong Chu, Tuan Minh Hoang Trong, Utpal Mangla, Satishkumar Sadagopan, Mathews Thomas
-
Publication number: 20240113769Abstract: A communication system for a remote location, which is out of range of a telecom provider, is provided. The communication system includes a remote multi-access edge computer (RMEC) proximate to the remote location and communicative with the telecom provider. The RMEC is configured to run software of the telecom provider whereby the RMEC is securely connectable with the telecom provider such that the RMEC is capable of providing cellular connectivity to a cell phone operably deployed at the remote location.Type: ApplicationFiled: October 4, 2022Publication date: April 4, 2024Inventors: Mathews Thomas, Sharath Prasad Krishna Prasad, Sai Srinivas Gorti, Amandeep Singh, Dushyant K. Behl, Utpal Mangla
-
Publication number: 20240109611Abstract: Air deflector device for a vehicle, including: an air deflector portion configured to deflect an air flow occurring due to a movement of the vehicle, whereby the air deflector portion is further configured to be moved between a closed position and an opened position, whereby the air flow occurring due to a movement of the vehicle is pushing the air deflector portion from its opened position in its closed position; a locking mechanism configured to be moved between an unlocked position and a locked position; and/or a mounting mechanism including a force element configured to apply a force pushing the air deflector portion from its opened position in its closed position; and an actuation mechanism configured to push the air deflector portion from its closed position in its opened position.Type: ApplicationFiled: August 29, 2023Publication date: April 4, 2024Inventors: Anders Bengtsson, Tobias Johansson, John Bresner, Utpal Sharma, Leo Nguyen
-
Publication number: 20240104075Abstract: A computer implemented method performs data skipping in a hierarchically organized computing system. A group of processor units determines leaf node data sketches for data in leaf nodes in the hierarchically organized computing system. The leaf node data sketches summarize attributes of data in the leaf nodes. The group of processor units aggregates the leaf node data sketches at intermediate nodes in the hierarchically organized computing system to form aggregated data sketches at the intermediate nodes and retains data sketches received at the intermediate nodes from a group of child nodes to form retained data sketches. The retained data sketches are one of leaf node data sketches and the aggregated data sketches. The group of processor units searches the data using the retained data sketches and the data skipping within the hierarchically organized computing system in response to queries made to the intermediate nodes in the hierarchically organized computing system.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Inventors: MUDHAKAR SRIVATSA, RAGHU KIRAN GANTI, Joshua M. Rosenkranz, Linsong Chu, Tuan Minh HOANG TRONG, Utpal Mangla, SATISHKUMAR SADAGOPAN, Mathews Thomas
-
Publication number: 20240096492Abstract: The present invention relates to the field of evaluating clinical diagnostic models. Conventional metrics does not consider context dependent clinical principles and is unable to capture critically important features that ought to be present in a diagnostic model. Thus, present disclosure provides a method and system for evaluating clinical efficacy of multi-label multi-class computational diagnostic models. Diagnosis for a given dataset of diagnostic samples is obtained from the diagnostic model which is then classified as wrong, missed, over or right diagnosis, based on which a first penalty is calculated. A second penalty is calculated for each diagnostic sample using a contradiction matrix. The first and second penalties are summed up to compute a pre-score for each diagnostic sample. Finally, the diagnostic model is evaluated using a metric that is based on sum of pre-scores, and scores from a perfect and a null multi-label multi-class computational diagnostic model.Type: ApplicationFiled: September 13, 2023Publication date: March 21, 2024Applicant: Tata Consultancy Services LimitedInventors: Arijit UKIL, Trisrota DEB, Ishan SAHU, Sai Chander RACHA, Sundeep KHANDELWAL, Arpan PAL, Utpal GARAIN, Soumadeep SAHA
-
Publication number: 20240098486Abstract: Computer-implemented methods for autonomous identification of rouge devices in a communications network are provided. Aspects include collecting connection trace data including connection characteristics for each of a plurality of mobile devices in communication with a communications network and aggregating the connection trace data. Aspects also include determining performance characteristics for each of a plurality of groups of the plurality of mobile devices, wherein each of the plurality of groups corresponds to mobile devices having a type approval code and comparing the performance characteristics for each of the plurality of groups. Based on a determination that the performance characteristics of one of the plurality of groups deviate from the performance characteristics of a remaining set of the plurality of groups by more than a first threshold amount, aspects include designating the type approval code associated with the one of the plurality of groups as a rogue type approval code.Type: ApplicationFiled: September 21, 2022Publication date: March 21, 2024Inventors: Mathews Thomas, Sagar Tayal, Utpal Mangla, Dinesh C. Verma, SAURABH AGRAWAL
-
Publication number: 20240075751Abstract: A personalized identification document processing system includes a print station that includes a thermal print head and a print ribbon that is engageable by the thermal print head to thermally transfer material from the print ribbon to personalize the plastic identification document. The print ribbon includes a repeating sequence of panels of thermally transferrable material, with each sequence of panels including at least one panel of thermally transferrable color material followed by at least one panel of thermally transferrable radiation curable protective topcoat material. The color material and the topcoat material are applied to the plastic identification document in a printing process, with the topcoat material applied over at least a portion of the color material. The topcoat material is then cured and once cured enhances the durability of the color material.Type: ApplicationFiled: August 31, 2023Publication date: March 7, 2024Inventors: Roman Knipp, Pauline Ukpabi, Utpal Vaidya, Ryan Schwiderski, Matthew Stebbins
-
Publication number: 20240075764Abstract: A personalized identification document processing system includes a print station that is configured as a retransfer printer with a retransfer film having a transferrable print receptive material and a transferrable radiation curable material. An image/data is printed on the transferrable print receptive material, and thereafter the print receptive material containing the printed image/data together with at least some of the transferrable radiation curable material is transferred to a surface of the plastic identification document. The radiation curable material is then cured and once cured enhances the durability of the printed image/data.Type: ApplicationFiled: August 31, 2023Publication date: March 7, 2024Inventors: Pauline Ukpabi, Roman Knipp, Utpal Vaidya, Ryan Schwiderski, Matthew Stebbins
-
Patent number: 11924028Abstract: A computer-implemented method and a computer system establish network slices within a physical network having a plurality of network elements. The method includes receiving a request to instantiate a network slice at a network element. The method also includes determining a performance metric of the network element. The method further includes delaying instantiation of the requested network slice within the network element in response to determining that the performance metric of the network element is below a threshold. The method also includes instantiating the requested network slice within the network element in response to determining that the performance metric of the network element is at or above the threshold. Finally, the method includes deactivating the requested network slice in response to determining that the performance metric of the network element is below the threshold at a time subsequent to instantiating the requested network slice.Type: GrantFiled: February 24, 2021Date of Patent: March 5, 2024Assignee: International Business Machines CorporationInventors: Dinesh C. Verma, Mudhakar Srivatsa, Utpal Mangla, Mathews Thomas, Satish Sadagopan
-
Patent number: 11914651Abstract: Classifying and filtering data by categorizing a portion of a data segment according to the content of the portion, correlating each portion with a user content preference dictionary, assigning a content weight to each portion according to the correlation, and masking content portions having a weight below a threshold value.Type: GrantFiled: November 6, 2019Date of Patent: February 27, 2024Assignee: International Business Machines CorporationInventors: Prabhuranjan Parhi, Mohan Gopal Meher, Utpal Kanti Patra, Jyothi Jaggumahantri
-
Publication number: 20240062311Abstract: A method, computer system, and a computer program product managing data usage integrity is provided. In one embodiment, the method comprises receiving data connected with data usage of at least one user in a computer environment. The pricing information is then for the user relating to the data usage. The computer embodiment is segmented into a plurality of segment areas and a payment price is calculated for each segment area. An anomaly is detected by comparing the data usage and the associated pricing for each of segmented areas according to a preselected value. If an anomaly is selected, an end-to-end simulation check is performed for the computer environment to ascertain whether the payment price for the segment may be inconsistent with a resource usage affecting an end-to-end flow for the computer environment.Type: ApplicationFiled: August 19, 2022Publication date: February 22, 2024Inventors: Utpal Mangla, Dinesh C. Verma, SATISH SADAGOPAN, MUDHAKAR SRIVATSA, Mathews Thomas
-
Patent number: 11895592Abstract: Methods, systems, and devices for wireless communications are described. Multiple reference signal occasions may occur during an inactive period of a discontinuous reception cycle configured for a wireless device. An amount of time the UE will be awake during the discontinuous reception cycle if the UE wakes up during a reference signal occasion of the multiple reference signal occasions may be determined for each of the reference signal occasions. The UE may wake up during the reference signal occasion associated with the shortest amount of awake time relative to the other reference signal occasions.Type: GrantFiled: June 20, 2022Date of Patent: February 6, 2024Assignee: QUALCOMM IncorporatedInventors: Vishnu Namboodiri Karakkad Kesavan Namboodiri, Arnab Pal, Madhusudan Sathyanarayan, Utpal Barman
-
Publication number: 20240037212Abstract: Role-based access controls (RBAC) are extended to include multi-party authorizations for certain computing cluster operations or data items. Upon receiving a request to perform an operation over a computing cluster or its data, a check is carried out to determine if the operation (e.g., READ, WRITE, EXECUTE, DELETE, etc.) is subject to both a role-based access control as well as a multi-party authorization (MPA) consensus protocol. The determination to allow or deny the request includes (1) accessing a role-based access control record corresponding to the operation or data item, and (2) invoking the multi-party authorization consensus protocol. Prior to performance of the operation, a computer program collects “approve” or “deny” responses from individual ones of the multiple parties. When approval consensus is reached, the operation is performed. If approval is denied, or if an approval consensus is not reached within a time limit, then the operation is not performed.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Applicant: Nutanix, Inc.Inventors: Ashwini RAJENDRAN, William O'DONNELL, Heli Utpal MODI, Malay PRAJAPATI, Ketan SHAH
-
Publication number: 20240037213Abstract: Methods, systems, and computer program products for thwarting a malware attack. A data storage system stores data items, some of which data items correspond to snapshots. Upon identification of a possible ransomware attack on a data item, the system identifies a version of the snapshot that is not subject to the ransomware attack and seeks to protect the data state of the system from further damage (e.g., due to performance of unauthorized operations on the version of the snapshot that is not subject to the ransomware attack) by requiring consensus from a multi-party authorization (MPA) consensus regime before carrying out requested operations over the snapshot. The MPA consensus regime operates by determining that the operation is subject to a role-based access control (RBAC) as well as a multi-party authorization (MPA) consensus protocol, and then allowing or denying execution of the requested operations based on achieving consensus from among candidate approvers.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Applicant: Nutanix, Inc.Inventors: Ashwini RAJENDRAN, William O'DONNELL, Heli Utpal MODI, James SARANTOS, Malay PRAJAPATI, Mark NIJMEIJER, Naveen KUMAR, Sandeep Jeevraj PARMAR, Sasthakumar RAMAMURTHY, Ketan SHAH