Patents by Inventor Pratima Ahuja

Pratima Ahuja has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8392700
    Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
    Type: Grant
    Filed: July 2, 2008
    Date of Patent: March 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
  • Patent number: 7650606
    Abstract: Disclosed is a technique for system recovery. Information identifying one or more work requests is retrieved, along with an order of the work requests, for a business process. If the business process is non-transactional, an in-memory structure is created for the business process, a recovery stub is created for each work request, and the recovery stub for each work request is placed into the in-memory structure based on the order.
    Type: Grant
    Filed: January 30, 2004
    Date of Patent: January 19, 2010
    Assignee: International Business Machines Corporation
    Inventors: Pratima Ahuja, Ramani Mathrubutham, Adwait Sathye, Chendong Zou
  • Patent number: 7644266
    Abstract: An apparatus, system, and method are disclosed for selective, end-to-end message level security. The apparatus includes a message class definition module, a security module, and a messaging module. The message class definition module identifies a predetermined message class of an internode message. The security module applies security to the message at an application layer. The security that is applied to the message corresponds to a security level, which depends on the message class of the message. The security may include encryption, authentication, and/or other security features. The messaging module communicates the message between a first node and a second node. A third node, such as a broker, may be interposed between the first and second nodes, in which case the security of the message is preserved at the third node.
    Type: Grant
    Filed: September 23, 2004
    Date of Patent: January 5, 2010
    Assignee: International Business Machines Corporation
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
  • Patent number: 7607006
    Abstract: A method is disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The method includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
    Type: Grant
    Filed: September 23, 2004
    Date of Patent: October 20, 2009
    Assignee: International Business Machines Corporation
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
  • Patent number: 7546604
    Abstract: The present invention provides a method for remotely activating application programs and adapters including a queue manager (QM) that monitors for predetermined trigger events (e.g., time out for messages in an application queue) and, when such events occur, generates a trigger message. The trigger message includes process information associated with the application which is used by a trigger monitor application to issue an appropriate command to the application.
    Type: Grant
    Filed: November 26, 2003
    Date of Patent: June 9, 2009
    Assignee: International Business Machines Corporation
    Inventors: Weixin Xu, Pratima Ahuja, Adwait B. Sathye, Chengdong Zou
  • Publication number: 20080285752
    Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
    Type: Application
    Filed: July 2, 2008
    Publication date: November 20, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
  • Publication number: 20060064751
    Abstract: An apparatus, system, and method are disclosed for selective, end-to-end message level security. The apparatus includes a message class definition module, a security module, and a messaging module. The message class definition module identifies a predetermined message class of an internode message. The security module applies security to the message at an application layer. The security that is applied to the message corresponds to a security level, which depends on the message class of the message. The security may include encryption, authentication, and/or other security features. The messaging module communicates the message between a first node and a second node. A third node, such as a broker, may be interposed between the first and second nodes, in which case the security of the message is preserved at the third node.
    Type: Application
    Filed: September 23, 2004
    Publication date: March 23, 2006
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Zhang
  • Publication number: 20060064736
    Abstract: An apparatus, system, and method are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
    Type: Application
    Filed: September 23, 2004
    Publication date: March 23, 2006
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Zhang
  • Publication number: 20050172288
    Abstract: Disclosed is a technique for system recovery. Information identifying one or more work requests is retrieved, along with an order of the work requests, for a business process. If the business process is non-transactional, an in-memory structure is created for the business process, a recovery stub is created for each work request, and the recovery stub for each work request is placed into the in-memory structure based on the order. Also disclosed is a technique for system recovery in which, if the business process is transactional, an in-memory structure is created for the business process, a recovery stub is created for each work request that indicates that rollback is to be performed, and the recovery stub is placed for each work request into the in-memory structure based on the order.
    Type: Application
    Filed: January 30, 2004
    Publication date: August 4, 2005
    Inventors: Pratima Ahuja, Ramani Mathrubutham, Adwait Sathye, Chendong Zou
  • Publication number: 20050114867
    Abstract: The present invention provides a method, apparatus, and computer instructions for activating application programs and adapters. In an exemplary embodiment, a reactivation program is provided that includes a queue manager (QM) that operates to monitor for predetermined trigger events (e.g., time out for messages in an application queue) and, when such events occur, to generate a trigger message. The trigger message includes process information associated with the crashed application which is used by a trigger monitor application to issue an appropriate command to the application. In a preferred embodiment, the trigger message is placed in an initiation queue, read out by a trigger monitor, and a restart command message, according to the predetermined parameters, sent to the application. More than one process definition can be used by the initiation queue.
    Type: Application
    Filed: November 26, 2003
    Publication date: May 26, 2005
    Inventors: Weixin Xu, Pratima Ahuja, Adwait Sathye, Chengdong Zou