Patents by Inventor Sandeep Ramesh Patil

Sandeep Ramesh Patil has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210266298
    Abstract: A method for mitigating misinformation in encrypted messaging environments includes receiving content from an originating user, encrypting the content into an originating message using a first encrypting key, appending an originating message identifier to the originating message, storing the originating message identifier on a messaging server in conjunction with transmitting the originating message to a first device corresponding to a first recipient, decrypting the originating message using a first decrypting key, storing the content on the first device to produce locally stored content and inserting the originating message identifier within metadata for the locally stored content. The method may also include encrypting the locally stored content into a new message intended for a second recipient, detecting the originating message identifier within the metadata for the locally stored content, and appending the originating message identifier to the new message.
    Type: Application
    Filed: February 25, 2020
    Publication date: August 26, 2021
    Inventors: Sachin Chandrakant Punadikar, Sasikanth Eda, Abhishek Jain, Sandeep Ramesh Patil
  • Publication number: 20210256167
    Abstract: A computer-implemented method for operating a storage system comprising a file system for managing a data object in one or more storage blocks may be provided. The method comprising receiving from a file system manager a message indicating that the data objects is to be encrypted, determining, in response to the received message, a set of unallocated storage blocks that were previously allocated for storing at least a portion of the data object, and rendering content of the unallocated storage blocks of the set unreadable.
    Type: Application
    Filed: February 14, 2020
    Publication date: August 19, 2021
    Inventors: Nils Haustein, Sandeep Ramesh Patil, Sasikanth Eda, Dominic Mueller-Wicke
  • Patent number: 11087028
    Abstract: Methods that can provide multi-layered data security in mobile personal computing devices are provided. One method includes assigning, by a processor, one of a plurality of security levels to applications of a mobile personal computing device, assigning one of the plurality of security levels to storage partitions of a storage device of the mobile personal computing device, and providing the applications access to data stored on the storage partitions based on a nexus of a first assigned security level for each application and a second assigned security level for each storage partition. Systems and apparatus that can include, perform, and/or implement the methods are also provided.
    Type: Grant
    Filed: September 4, 2018
    Date of Patent: August 10, 2021
    Assignee: International Business Machines Corporation
    Inventors: Abhishek Jain, Aakanksha Mathur, Sasikanth Eda, Sandeep Ramesh Patil
  • Patent number: 11071484
    Abstract: A method, system, and computer program product for limiting the amount of electromagnetic frequency emissions from a mobile device in a time of high anxiety. The method may include determining whether a user is awaiting a first notification on a mobile device. The method may also include estimating an anxiety level of the user based on the determining. The method may also include determining whether the anxiety level is above a threshold anxiety level. The method may also include calculating, in response to determining that the anxiety level is above the threshold anxiety level, a ping-pong rate for the mobile device. The method may also include reducing the ping-pong rate.
    Type: Grant
    Filed: November 20, 2019
    Date of Patent: July 27, 2021
    Assignee: International Business Machines Corporation
    Inventors: Sasikanth Eda, Abhishek Jain, Sandeep Ramesh Patil, Manojkiran Eda
  • Publication number: 20210223988
    Abstract: A computer-implemented method for storing blocks of a file in a heterogeneous environment. The method may comprise receiving a command header for an operation associated with a file from a first data node, matching the enhanced metadata with capabilities of a second data node, and generating a block layout map for the file based at least in part on the enhanced metadata and the capabilities of the second data node. The command header may include enhanced metadata associated with a file, and the enhanced metadata may comprise a type of workload that generated the file and a data access pattern.
    Type: Application
    Filed: January 22, 2020
    Publication date: July 22, 2021
    Inventors: Abhishek Jain, Sasikanth Eda, Sandeep Ramesh Patil, Anil Laxman Palled
  • Publication number: 20210208952
    Abstract: A computer-implemented method according to one aspect includes determining and storing characteristics of a plurality of cloud vendors; dividing a workload into a plurality of logical stages; determining characteristics of each of the plurality of logical stages; and for each of the plurality of logical stages, assigning the logical stage to one of the plurality of cloud vendors, based on a comparison of the characteristics of the plurality of cloud vendors to the characteristics of the logical stage.
    Type: Application
    Filed: January 2, 2020
    Publication date: July 8, 2021
    Inventors: Abhishek Jain, Sasikanth Eda, Dileep Dixith, Sandeep Ramesh Patil, Anbazhagan Mani
  • Publication number: 20210157849
    Abstract: A computer-implemented method according to one embodiment includes analyzing data to determine a sensitivity level for the data; assigning an audit level to the data, based on the sensitivity level; and performing auditing for the data, based on the audit level.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Abhishek Jain, Joseph Dain, Nilesh Prabhakar Bhosale, Sandeep Ramesh Patil
  • Publication number: 20210145339
    Abstract: A method, system, and computer program product for limiting the amount of electromagnetic frequency emissions from a mobile device in a time of high anxiety. The method may include determining whether a user is awaiting a first notification on a mobile device. The method may also include estimating an anxiety level of the user based on the determining. The method may also include determining whether the anxiety level is above a threshold anxiety level. The method may also include calculating, in response to determining that the anxiety level is above the threshold anxiety level, a ping-pong rate for the mobile device. The method may also include reducing the ping-pong rate.
    Type: Application
    Filed: November 20, 2019
    Publication date: May 20, 2021
    Inventors: Sasikanth Eda, Abhishek Jain, Sandeep Ramesh Patil, Manojkiran Eda
  • Publication number: 20210110003
    Abstract: Methods that can assign access permission to social media are disclosed herein. One method includes determining, by a processor, an impact of a plurality of impacts on an owner of a social media post, the impact based on a follower of the social media post, and assigning a permission of a plurality of permissions to the follower for accessing the social media post based on the determined impact. Apparatus, systems, and computer program products that can include, perform, and/or implement the methods are also disclosed herein.
    Type: Application
    Filed: October 14, 2019
    Publication date: April 15, 2021
    Inventors: Abhishek Jain, Sasikanth Eda, Sandeep Ramesh Patil, Sachin Chandrakant Punadikar
  • Publication number: 20210019190
    Abstract: A computer-implemented method according to one embodiment includes partitioning resources of a network file system (NFS) platform into a plurality of zones, based on a number of exports within the NFS platform; receiving, at one of the exports within the NFS platform, a request from a first application to utilize the resources of the NFS platform; and allocating a predetermined portion of the resources to the first application within one of the plurality of zones, based on information included within the request.
    Type: Application
    Filed: July 15, 2019
    Publication date: January 21, 2021
    Inventors: Sachin Chandrakant Punadikar, Sasikanth Eda, Abhishek Jain, Sandeep Ramesh Patil
  • Patent number: 10896162
    Abstract: Systems and methods to manage database data are provided. A particular method includes automatically identifying a plurality of storage devices. The storage devices include a first device of a first type and a second device of a second type. The first type includes a solid state memory device. The method may further identify a high priority data set of the database. A rebalancing operation is conducted that includes moving the high priority data set to the solid state memory device and substantially evening distribution of other data of the database among the storage devices.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: January 19, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Harshwardhan S. Mulay, Abhinay R. Nagpal, Sandeep Ramesh Patil, Yan Wang Stein
  • Patent number: 10831714
    Abstract: A computer-implemented method, according to one embodiment, includes: sending management data to a designated common cell in a namespace of a central storage location from one or more remote storage locations. The management data corresponds to object data stored at the one or more remote storage locations. the object data stored at each of the one or more remote storage locations is further transferred to a respective cell in the namespace of the central storage location. Moreover, a modified consistency hashing algorithm configuration is implemented. The modified consistency hashing algorithm configuration routes updates of existing object data in the one or more remote storage locations to the respective cells in the central storage location. Other systems, methods, and computer program products are described in additional embodiments.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sasikanth Eda, Sanjay Vipin Gandhi, Dean Hildebrand, Trishali Satish Nayar, Brian Nelson, William W. Owen, Sandeep Ramesh Patil, Smita J. Raut
  • Patent number: 10785629
    Abstract: A computer-implemented method includes receiving a first message intended for a target user device and determining that the target user device cannot receive the first message. The method also includes selecting a second user device from a dynamic list of second user devices believed to be in physical proximity to the target user device and sending a second message to the selected second user device, the second message at least referencing the first message. A system includes a processor and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method. A computer program product for emergency message forwarding includes a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computer to cause the computer to perform the foregoing method.
    Type: Grant
    Filed: July 17, 2019
    Date of Patent: September 22, 2020
    Assignee: International Business Machines Corporation
    Inventors: Kushal Patel, Sandeep Ramesh Patil, Sarvesh S. Patel
  • Patent number: 10762203
    Abstract: Methods and systems for reducing the impact of malware/ransomware in a caching environment are provided. A system for reducing the impact of malware/ransomware includes a pattern detection module that identifies one or more file operations associated with one or more malicious patterns. Additionally, the one or more file operations act on data stored at a first data site. The system also includes an administration module that provides an alert to an administrator that one or more malicious patterns have been identified and determines an administration action in response to the alert. The system further includes a replication module that performs a replication action for the one or more file operations based on the administration action, wherein the replication action is performed in relation to replicated data stored at a second data site.
    Type: Grant
    Filed: August 27, 2018
    Date of Patent: September 1, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ashish Pandey, Deepak Ghuge, Sandeep Ramesh Patil
  • Patent number: 10725971
    Abstract: A computer-implemented method, according to one embodiment, includes: dividing a namespace in a central storage location into more than one cell. A first of the more than one cell is a common cell, which is configured to store management data received from remote storage locations coupled to the central storage location. Each of the remaining cells are configured to store object data received from a respective one of the remote storage locations. Management data received from the remote storage locations is stored in the common cell of the central storage location. Object data is also received, where the object data corresponds to the management data received from the remote storage locations. Furthermore, the received object data is stored in the respective cells of the central storage location. Other systems, methods, and computer program products are described in additional embodiments.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: July 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sasikanth Eda, Sanjay Vipin Gandhi, Dean Hildebrand, Trishali Satish Nayar, Brian Nelson, William W. Owen, Sandeep Ramesh Patil, Smita J. Raut
  • Patent number: 10587423
    Abstract: A cognitive psychology authentication in a multi-factor authentication system. A request is received to access a secure resource associated with a user. A set of cognitive psychology questions are selected from a plurality of cognitive psychology questions for transmission to a client device associated with the request. A set of responses corresponding to the set of cognitive psychology questions are received and cognitive psychology data is generated based on the set of responses. A cognitive psychology profile associated with the user is retrieved from a database. An authentication score is calculated based on comparing the cognitive psychology data to the cognitive psychology profile. An authentication success notification is transmitted when the authentication score compares favorably to an authentication threshold. An authentication failure notification is transmitted when the authentication score compares unfavorably to the authentication threshold.
    Type: Grant
    Filed: November 22, 2017
    Date of Patent: March 10, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nataraj Nagaratnam, Pamela A. Nesbitt, Sandeep Ramesh Patil, Sasikanth Eda
  • Publication number: 20200074091
    Abstract: Methods that can provide multi-layered data security in mobile personal computing devices are provided. One method includes assigning, by a processor, one of a plurality of security levels to applications of a mobile personal computing device, assigning one of the plurality of security levels to storage partitions of a storage device of the mobile personal computing device, and providing the applications access to data stored on the storage partitions based on a nexus of a first assigned security level for each application and a second assigned security level for each storage partition. Systems and apparatus that can include, perform, and/or implement the methods are also provided.
    Type: Application
    Filed: September 4, 2018
    Publication date: March 5, 2020
    Inventors: Abhishek Jain, Aakanksha Mathur, Sasikanth Eda, Sandeep Ramesh Patil
  • Publication number: 20200065485
    Abstract: Methods and systems for reducing the impact of malware/ransomware in a caching environment are provided. A system for reducing the impact of malware/ransomware includes a pattern detection module that identifies one or more file operations associated with one or more malicious patterns. Additionally, the one or more file operations act on data stored at a first data site. The system also includes an administration module that provides an alert to an administrator that one or more malicious patterns have been identified and determines an administration action in response to the alert. The system further includes a replication module that performs a replication action for the one or more file operations based on the administration action, wherein the replication action is performed in relation to replicated data stored at a second data site.
    Type: Application
    Filed: August 27, 2018
    Publication date: February 27, 2020
    Inventors: Ashish Pandey, Deepak Ghuge, Sandeep Ramesh Patil
  • Publication number: 20190379400
    Abstract: Systems for location selection based on erasure code techniques are provided. One system includes a monitor module that monitors data speed characteristics for one or more locations on a storage device. Additionally, the system includes a classification module that determines an erasure code technique for an application, wherein data associated with the application is stored on a storage device. Also, the system includes a selection module that selects a location in one or more locations for storing data based on monitored data speed characteristics and a determined erasure code technique.
    Type: Application
    Filed: June 12, 2018
    Publication date: December 12, 2019
    Inventors: Sasikanth Eda, Poornima Gupte, Sukumar Vankadhara, Sandeep Ramesh Patil
  • Publication number: 20190188186
    Abstract: A computer-implemented method, according to one embodiment, includes: dividing a namespace in a central storage location into more than one cell. A first of the more than one cell is a common cell, which is configured to store management data received from remote storage locations coupled to the central storage location. Each of the remaining cells are configured to store object data received from a respective one of the remote storage locations. Management data received from the remote storage locations is stored in the common cell of the central storage location. Object data is also received, where the object data corresponds to the management data received from the remote storage locations. Furthermore, the received object data is stored in the respective cells of the central storage location. Other systems, methods, and computer program products are described in additional embodiments.
    Type: Application
    Filed: February 7, 2019
    Publication date: June 20, 2019
    Inventors: Sasikanth Eda, Sanjay Vipin Gandhi, Dean Hildebrand, Trishali Satish Nayar, Brian Nelson, William W. Owen, Sandeep Ramesh Patil, Smita J. Raut