Patents by Inventor Abhijit Belapurkar

Abhijit Belapurkar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240264986
    Abstract: A mechanism that flags and detects inaccurate or bad data, and annotates the flagged data with automatically generated metadata that may then be provided to end users (e.g., resource managers, service owners, finance analysts, data scientists, executives, etc.) via an application stack. The automatic annotations comprise quality annotations that may include data freshness, correctness, and/or completeness.
    Type: Application
    Filed: January 18, 2023
    Publication date: August 8, 2024
    Inventors: Michael Yang Liu, Abhijit Belapurkar, Abhishek Verma, Bhaswanth Uppalaguptam, Edward Chou, Michael Jun, Pramod Madabhushi, Richard A. Maher, Spiro Michaylov, Srirama Koneru, Nicole Pizarro
  • Patent number: 8561034
    Abstract: A method and system for injecting exceptions into a JAVA enterprise application during execution of the JAVA enterprise application is disclosed. The Java enterprise application includes multiple Enterprise JAVA Bean (EJB) classes. The EJB classes include one or more EJB methods. Each EJB is scanned for exceptions, and corresponding interface points of the EJB. The exceptions are automatically injected at the corresponding interface points based on scanning the EJB. The exceptions are then thrown to callers of the EJB methods. The exceptions are thrown before beginning execution of business logic of the EJB methods. Finally, the response of the JAVA enterprise application to the injected exceptions is analyzed.
    Type: Grant
    Filed: June 22, 2007
    Date of Patent: October 15, 2013
    Assignee: Infosys Technologies, Ltd.
    Inventors: Abhijit Belapurkar, Ravindra Karanam
  • Publication number: 20080134160
    Abstract: A method and system for injecting exceptions into a JAVA enterprise application during execution of the JAVA enterprise application is disclosed. The Java enterprise application includes multiple Enterprise JAVA Bean (EJB) classes. The EJB classes include one or more EJB methods. Each EJB is scanned for exceptions, and corresponding interface points of the EJB. The exceptions are automatically injected at the corresponding interface points based on scanning the EJB. The exceptions are then thrown to callers of the EJB methods. The exceptions are thrown before beginning execution of business logic of the EJB methods. Finally, the response of the JAVA enterprise application to the injected exceptions is analyzed.
    Type: Application
    Filed: June 22, 2007
    Publication date: June 5, 2008
    Inventors: Abhijit Belapurkar, Ravindra Karanam
  • Publication number: 20030070069
    Abstract: A pluggable authentication module (PAM) is designed for compatibility with a receiver component. In response to a request for a protected web resource, the receiver component receives a user identification (user ID) from a secure and trusted source; the receiver component need not receive a password corresponding to the user ID. The receiver component generates and sends a login request to the PAM for authentication of the user. The login request contains a representation of the user ID, but is void of a corresponding user password. The receiver component and the PAM perform a trust establishment protocol that enables the PAM to determine whether the login request (and the received user ID) is legitimate.
    Type: Application
    Filed: October 10, 2001
    Publication date: April 10, 2003
    Inventors: Abhijit Belapurkar, Gayathri Krishnamurthy, Maneesh Bhandari
  • Publication number: 20030065956
    Abstract: A data communication technique facilitates the transmission of a data element in a trusted manner such that the receiver component can trust that the data element was not modified during the transmission. In addition, the receiver component is assured that the data element could only have been transmitted by a particular sender component. The data communication technique utilizes a challenge-response routine that ensures data integrity and non-repudiation. The data element is sent from the sender component to the receiver component during the challenge-response routine; in accordance with the example embodiment, the hashed response generated by the sender component is based upon the data element. The data communication technique can be implemented in the context of a single sign-on protocol that allows an authenticated user of a linking site to access protected resources associated with a linked web site without having to separately login to the linked web site.
    Type: Application
    Filed: September 28, 2001
    Publication date: April 3, 2003
    Inventors: Abhijit Belapurkar, Gayathri Krishnamurthy, Abdul Rafman Azeez