Patents by Inventor VISHWA PERSAUD
VISHWA PERSAUD has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10742618Abstract: The computer receives customer registration information and encryption parameters from a customer, then transmits them to the server of an entity such as a pharmacy or bank. After the entity utilizes the transmitted encryption parameters to encrypt confidential portions of a message to the customer, the computer captures the message by way of receiving, photographing, scanning, or otherwise obtaining a copy of the message. The computer identifies glyphs in the message indicative of the corresponding encryption parameters as well as where the encrypted portions of the message start/end. Using the identified glyphs and corresponding encryption parameters, the computer decrypts the confidential portions of the message and displays the message in entirety on the computer.Type: GrantFiled: July 30, 2018Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Patent number: 10623184Abstract: In an approach for protecting a resource, a processor receives a resource and a parameter, wherein the parameter indicates a condition upon which the resource will be made accessible. A processor encrypts the resource. A processor associates the parameter with decryption information for the encrypted resource. A processor sends the encrypted resource to a computing device. A processor determines that the condition of the parameter has been met based on external information regarding the parameter. A processor sends the decryption information to the computing device.Type: GrantFiled: September 29, 2015Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Daniel F. D'Elena, Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Publication number: 20180359226Abstract: The computer receives customer registration information and encryption parameters from a customer, then transmits them to the server of an entity such as a pharmacy or bank. After the entity utilizes the transmitted encryption parameters to encrypt confidential portions of a message to the customer, the computer captures the message by way of receiving, photographing, scanning, or otherwise obtaining a copy of the message. The computer identifies glyphs in the message indicative of the corresponding encryption parameters as well as where the encrypted portions of the message start/end. Using the identified glyphs and corresponding encryption parameters, the computer decrypts the confidential portions of the message and displays the message in entirety on the computer.Type: ApplicationFiled: July 30, 2018Publication date: December 13, 2018Inventors: Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Patent number: 10121513Abstract: Systems and methods for dynamic image content overlaying are disclosed. In embodiments, a computer-implemented method comprises analyzing one or more digital image frames for the presence of a placeholder, wherein the placeholder overlays a dynamic image space on a display object and includes a content identifier and a contour mesh; determining the content identifier; retrieving select image content based on the content identifier; determining an orientation of the dynamic image space; transforming the select image content to produce transformed image content that matches the contour mesh and the orientation of the dynamic image space; and replacing the placeholder with the transformed image content to produce a set of one or more embedded image frames.Type: GrantFiled: August 30, 2016Date of Patent: November 6, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Patent number: 10057220Abstract: The computer receives customer registration information and encryption parameters from a customer, then transmits them to the server of an entity such as a pharmacy or bank. After the entity utilizes the transmitted encryption parameters to encrypt confidential portions of a message to the customer, the computer captures the message by way of receiving, photographing, scanning, or otherwise obtaining a copy of the message. The computer identifies glyphs in the message indicative of the corresponding encryption parameters as well as where the encrypted portions of the message start/end. Using the identified glyphs and corresponding encryption parameters, the computer decrypts the confidential portions of the message and displays the message in entirety on the computer.Type: GrantFiled: July 24, 2015Date of Patent: August 21, 2018Assignee: International Business Machines CorporationInventors: Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Publication number: 20180061456Abstract: Systems and methods for dynamic image content overlaying are disclosed. In embodiments, a computer-implemented method comprises analyzing one or more digital image frames for the presence of a placeholder, wherein the placeholder overlays a dynamic image space on a display object and includes a content identifier and a contour mesh; determining the content identifier; retrieving select image content based on the content identifier; determining an orientation of the dynamic image space; transforming the select image content to produce transformed image content that matches the contour mesh and the orientation of the dynamic image space; and replacing the placeholder with the transformed image content to produce a set of one or more embedded image frames.Type: ApplicationFiled: August 30, 2016Publication date: March 1, 2018Inventors: Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Patent number: 9760271Abstract: A method, system, and/or computer program product visualizes tabular data with dynamically-generated frozen regions. A control and coordination mechanism oversees modification of a visualization of a browser-based main data table. A cloning and sizing process recursively traverses regions of the browser-based main data table to selectively clone and size regions of the browser-based main data table to be frozen, wherein the regions of the browser-based main data table to be frozen are selectable from any area of the browser-based main data table. An element insertion and positioning process positions and makes visible each newly cloned frozen region, wherein each newly cloned frozen region overlays a region of the browser-based main data table. A responsiveness process uses event listeners and polling mechanisms to detect actions and changes in a table viewport of a visible portion of the browser-based main data table to trigger regeneration of each newly cloned frozen region.Type: GrantFiled: July 28, 2014Date of Patent: September 12, 2017Assignee: International Business Machines CorporationInventor: Vishwa Persaud
-
Publication number: 20170093574Abstract: In an approach for protecting a resource, a processor receives a resource and a parameter, wherein the parameter indicates a condition upon which the resource will be made accessible. A processor encrypts the resource. A processor associates the parameter with decryption information for the encrypted resource. A processor sends the encrypted resource to a computing device. A processor determines that the condition of the parameter has been met based on external information regarding the parameter. A processor sends the decryption information to the computing device.Type: ApplicationFiled: September 29, 2015Publication date: March 30, 2017Inventors: Daniel F. D'Elena, Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Publication number: 20170026348Abstract: The computer receives customer registration information and encryption parameters from a customer, then transmits them to the server of an entity such as a pharmacy or bank. After the entity utilizes the transmitted encryption parameters to encrypt confidential portions of a message to the customer, the computer captures the message by way of receiving, photographing, scanning, or otherwise obtaining a copy of the message. The computer identifies glyphs in the message indicative of the corresponding encryption parameters as well as where the encrypted portions of the message start/end. Using the identified glyphs and corresponding encryption parameters, the computer decrypts the confidential portions of the message and displays the message in entirety on the computer.Type: ApplicationFiled: July 24, 2015Publication date: January 26, 2017Inventors: Anthony E. Martinez, Vanessa V. Michelini, Vishwa Persaud
-
Publication number: 20160026356Abstract: A method, system, and/or computer program product visualizes tabular data with dynamically-generated frozen regions. A control and coordination mechanism oversees modification of a visualization of a browser-based main data table. A cloning and sizing process recursively traverses regions of the browser-based main data table to selectively clone and size regions of the browser-based main data table to be frozen, wherein the regions of the browser-based main data table to be frozen are selectable from any area of the browser-based main data table. An element insertion and positioning process positions and makes visible each newly cloned frozen region, wherein each newly cloned frozen region overlays a region of the browser-based main data table. A responsiveness process uses event listeners and polling mechanisms to detect actions and changes in a table viewport of a visible portion of the browser-based main data table to trigger regeneration of each newly cloned frozen region.Type: ApplicationFiled: July 28, 2014Publication date: January 28, 2016Inventor: VISHWA PERSAUD