Patents by Inventor Ajay Reddy

Ajay Reddy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11948694
    Abstract: Mechanisms are provided for compartmental epidemiological computer modeling based on mobility data. Machine learning training of an isolation rate prediction computer model is performed to generate a trained isolation rate prediction model that predicts an isolation rate of a biological population. Isolation data is received which comprises data indicating a measure of mobility of the biological population. The trained isolation rate prediction model is executed on input features extracted from the isolation data to generate a predicted isolation rate. A compartmental epidemiological computer model, comprising a plurality of compartments representing states of a population with regard to an infectious disease, is executed to simulate a progression of the infectious disease and flows of portions of the population from between compartments in the compartmental epidemiological computer model are controlled based on the predicted isolation rate.
    Type: Grant
    Filed: May 12, 2021
    Date of Patent: April 2, 2024
    Inventors: Vishrawas Gopalakrishnan, Sayali Navalekar, James H. Kaufman, Simone Bianco, Kun Hu, Ajay Ashok Deshpande, Sarah Kefayati, Ujwal Reddy Moramganti, George Sirbu, Xuan Liu, Raman Srinivasan, Pan Ding
  • Publication number: 20160095156
    Abstract: Aspects of the present disclosure provide an improved out-of-service (OOS) scan method that can increase the speed of acquiring service while avoiding unnecessary full scan, thus reducing scan time and/or power consumption of a user equipment. In one aspect of the disclosure, if a user equipment fails to acquire service after scanning a most recently used (MRU) list, the user equipment scans for the networks or cells stored in a neighbor list before performing a wider scan or a full scan.
    Type: Application
    Filed: September 29, 2014
    Publication date: March 31, 2016
    Inventors: Soumen Mitra, Aritra Ukil, Jun Hu, Rashid Ahmed Akbar Attar, Anand Rajurkar, Vamsi Krishna Chaitanya Komati, Ajay Reddy
  • Patent number: 8938791
    Abstract: A method for dynamically assigning a displayable realm name begins upon receipt of an authentication request to an application, such as a web application, being executed by an application server. In response, a determination is made whether an application realm name has been set in a configuration file associated with the application. If not, a custom display property is then evaluated. If the custom display property is set true, a realm name associated with an active authentication mechanism is retrieved and provided for display in an authentication panel. If the custom display property is set false, a default string is provided for display in the authentication panel. In this manner, an application server administrator can control what realm name is displayed to an end user in the event an application developer has not specified the realm name in the application configuration.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: January 20, 2015
    Assignee: International Business Machines Corporation
    Inventors: William J. O'Donnell, Paul William Bennett, Elisa Ferracane, Ajay Reddy Karkala, Ut Van Le, Michael Craig Thompson
  • Patent number: 8645679
    Abstract: A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints.
    Type: Grant
    Filed: June 17, 2011
    Date of Patent: February 4, 2014
    Assignee: International Business Machines Corporation
    Inventors: Elisa Ferracane, Paul William Bennett, William J. O'Donnell, Ajay Reddy Karkala, Ut Van Le, Michael Craig Thompson, Maxim Avery Moldenhauer
  • Publication number: 20120324528
    Abstract: A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints.
    Type: Application
    Filed: June 17, 2011
    Publication date: December 20, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Elisa Ferracane, Paul William Bennett, William J. O'Donnell, Ajay Reddy Karkala, Ut Van Le, Michael Craig Thompson, Maxim Avery Moldenhauer
  • Publication number: 20120317633
    Abstract: A method for dynamically assigning a displayable realm name begins upon receipt of an authentication request to an application, such as a web application, being executed by an application server. In response, a determination is made whether an application realm name has been set in a configuration file associated with the application. If not, a custom display property is then evaluated. If the custom display property is set true, a realm name associated with an active authentication mechanism is retrieved and provided for display in an authentication panel. If the custom display property is set false, a default string is provided for display in the authentication panel. In this manner, an application server administrator can control what realm name is displayed to an end user in the event an application developer has not specified the realm name in the application configuration.
    Type: Application
    Filed: June 10, 2011
    Publication date: December 13, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: William J. O'Donnell, Paul William Bennett, Elisa Ferracane, Ajay Reddy Karkala, Ut Van Le, Michael Craig Thompson
  • Patent number: 7765585
    Abstract: Run-as credentials delegation using identity assertion is presented. A server receives a request from a client that includes the client's user identifier and password. The server authenticates the client and stores the client's user identifier without the corresponding password in a client credential storage area. The server determines if a run-as command is specified to communicate with a downstream server. If a run-as command is specified, the server retrieves a corresponding run-as identity which identifies whether a client credential type, a server credential type, or a specific identifier credential type should be used in the run-as command. The server retrieves an identified credential corresponding to the identified credential type, and sends the identified credential in an identity assertion token to a downstream server.
    Type: Grant
    Filed: April 17, 2008
    Date of Patent: July 27, 2010
    Assignee: International Business Machines Corporation
    Inventors: Ching-Yun Chao, Hyen Vui Chung, Ajay Reddy, Vishwanath Venkataramappa
  • Patent number: 7526798
    Abstract: Run-as credentials delegation using identity assertion is presented. A server receives a request from a client that includes the client's user identifier and password. The server authenticates the client and stores the client's user identifier without the corresponding password in a client credential storage area. The server determines if a run-as command is specified to communicate with a downstream server. If a run-as command is specified, the server retrieves a corresponding run-as identity which identifies whether a client credential type, a server credential type, or a specific identifier credential type should be used in the run-as command. The server retrieves an identified credential corresponding to the identified credential type, and sends the identified credential in an identity assertion token to a downstream server.
    Type: Grant
    Filed: October 31, 2002
    Date of Patent: April 28, 2009
    Assignee: International Business Machines Corporation
    Inventors: Ching-Yun Chao, Hyen Vui Chung, Ajay Reddy, Vishwanath Venkataramappa
  • Publication number: 20080196097
    Abstract: Run-as credentials delegation using identity assertion is presented. A server receives a request from a client that includes the client's user identifier and password. The server authenticates the client and stores the client's user identifier without the corresponding password in a client credential storage area. The server determines if a run-as command is specified to communicate with a downstream server. If a run-as command is specified, the server retrieves a corresponding run-as identity which identifies whether a client credential type, a server credential type, or a specific identifier credential type should be used in the run-as command. The server retrieves an identified credential corresponding to the identified credential type, and sends the identified credential in an identity assertion token to a downstream server.
    Type: Application
    Filed: April 17, 2008
    Publication date: August 14, 2008
    Inventors: Ching-Yun Chao, Hyen Vui Chung, Ajay Reddy, Vishwanath Venkataramappa
  • Publication number: 20040088578
    Abstract: A system and method for run-as credentials delegation using identity assertion is presented. A server receives a request from a client that includes the client's user identifier and password. The server authenticates the client and stores the client's user identifier without the corresponding password in a client credential storage area. The server determines if a run-as command is specified to communicate with a downstream server. If a run-as command is specified, the server retrieves a corresponding run-as identity which identifies whether a client credential type, a server credential type, or a specific identifier credential type should be used in the run-as command. The server retrieves an identified credential corresponding to the identified credential type, and sends the identified credential in an identity assertion token to a downstream server.
    Type: Application
    Filed: October 31, 2002
    Publication date: May 6, 2004
    Applicant: International Business Machines Corporation
    Inventors: Ching-Yun Chao, Hyen Vui Chung, Ajay Reddy, Vishwanath Venkataramappa
  • Patent number: 6397383
    Abstract: The present invention provides a system and method for parsing a constraint language in a computer network. The method includes receiving a constraint string; parsing the constraint string, comprising replacement of valid operators, variables, and values with special characters; and determining if the parsed constraint string indicates the existence of errors in the constraint string. The parser of the present invention is based upon an analysis of the constraint language from which patterns of the language are identified. The easily implemented parser of the present invention is developed based on these patterns. Because the method of the present invention replaces members of a finite set of valid operators, variables, and values, instead of attempting to identify an infinite number of possible errors, it is able to detect all invalid constraints.
    Type: Grant
    Filed: February 26, 1999
    Date of Patent: May 28, 2002
    Assignee: International Business Machines Corp.
    Inventors: David Yu Chang, Ajay Reddy Karkala, John Shih-Yuan Wang