Patents by Inventor Ajay Mohindra

Ajay Mohindra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9009705
    Abstract: A computer implemented method, a computer program product, and a computer distribute a virtual machine image. A request for a virtual machine image is received. Responsive to receiving the request or the virtual machine image, the authenticity of a virtual machine image catalog associated with the virtual machine image is identified. Responsive to identifying that the virtual machine image catalog is authentic, a first digital signature to be sent with the virtual machine image is determined. Responsive to determining the signature, the virtual machine image and the signature is sent.
    Type: Grant
    Filed: October 1, 2012
    Date of Patent: April 14, 2015
    Assignee: International Business Machines Corporation
    Inventors: Ashish Kundu, Ajay Mohindra
  • Patent number: 8954364
    Abstract: A method for operating a sensor based application includes receiving a context hierarchy for the sensor based application, the context hierarchy comprising a plurality of contexts, wherein each of the contexts is assigned a level of interest and a priority, reading the context hierarchy and discovering at least one sensor associated with each of the plurality of contexts, and reading at least one value of each of the sensors, and applying the values.
    Type: Grant
    Filed: September 19, 2011
    Date of Patent: February 10, 2015
    Assignee: International Business Machines Corporation
    Inventors: David L. Lillethun, Ajay Mohindra, Anca Sailer
  • Patent number: 8954760
    Abstract: A computer implemented method is provided to verify an integrity of a solution. The computer implemented method comprises hashing, by a computer, a set of virtual machine instances in a solution topology of the solution. The computer hashes a set of connections in the solution topology. The set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof. The computer hashes a set of solution-specific information, and then signs the hashes to create a first signed topology.
    Type: Grant
    Filed: January 3, 2013
    Date of Patent: February 10, 2015
    Assignee: International Business Machines Corporation
    Inventors: Ashish Kundu, Ajay Mohindra
  • Publication number: 20140331089
    Abstract: Enabling remote debugging of virtual machines, in one aspect, may comprise attaching a debug virtual machine to a target virtual machine deployed in a virtualized environment. Interactions and/or access to the target virtual machine may be performed via the attached debug virtual machine. The debug virtual machine may be created and attached to the target virtual machine in response to receiving a request to debug the target machine, for example, from a remote user of the target virtual machine.
    Type: Application
    Filed: May 3, 2013
    Publication date: November 6, 2014
    Applicant: International Business Machines Corporation
    Inventors: Ajay Mohindra, Sambit Sahu, Upendra Sharma
  • Publication number: 20140331090
    Abstract: Enabling remote debugging of virtual machines, in one aspect, may comprise attaching a debug virtual machine to a target virtual machine deployed in a virtualized environment. Interactions and/or access to the target virtual machine may be performed via the attached debug virtual machine. The debug virtual machine may be created and attached to the target virtual machine in response to receiving a request to debug the target machine, for example, from a remote user of the target virtual machine.
    Type: Application
    Filed: August 28, 2013
    Publication date: November 6, 2014
    Applicant: International Business Machines Corporation
    Inventors: Ajay Mohindra, Sambit Sahu, Upendra Sharma
  • Patent number: 8875227
    Abstract: A computer-implemented process for privacy aware authenticated map-reduce processing receives data for a MapReduce operation to form received data, identifies a control point in a set of control points of the MapReduce operation to form an identified control point and identifies an applicable set of policies for the identified control point to form a selected set of policies. The selected set of policies is applied at the identified control point and responsive to a determination that application of the selected set of policies at the identified control point returned a positive result, the computer-implemented process continues operation to a next stage in the MapReduce operation.
    Type: Grant
    Filed: October 5, 2012
    Date of Patent: October 28, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ashish Kundu, Ajay Mohindra, Sambit Sahu
  • Publication number: 20140259089
    Abstract: Techniques, systems and articles of manufacture for security-aware admission control of requests in a distributed system. A method includes identifying a request dropped by a first application component in a distributed system, determining one or more actions to take with respect to the dropped request, said determining comprises identifying one or more policies of the first application component responsible for the dropped request and identifying one or more additional application components in the distributed system to be affected based on the identified one or more policies, and executing said one or more actions to control admission of one or more requests associated with the dropped request at the one or more additional application components.
    Type: Application
    Filed: March 8, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ashish Kundu, Ajay Mohindra, Sambit Sahu
  • Publication number: 20140259091
    Abstract: Systems and articles of manufacture for security-aware admission control of requests in a distributed system include identifying a request dropped by a first application component in a distributed system, determining one or more actions to take with respect to the dropped request, said determining comprises identifying one or more policies of the first application component responsible for the dropped request and identifying one or more additional application components in the distributed system to be affected based on the identified one or more policies, and executing said one or more actions to control admission of one or more requests associated with the dropped request at the one or more additional application components.
    Type: Application
    Filed: August 16, 2013
    Publication date: September 11, 2014
    Applicant: International Business Machines Corporation
    Inventors: Ashish Kundu, Ajay Mohindra, Sambit Sahu
  • Patent number: 8793766
    Abstract: In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
    Type: Grant
    Filed: March 13, 2012
    Date of Patent: July 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ashish Kundu, Ajay Mohindra, Sambit Sahu
  • Publication number: 20140207528
    Abstract: A data processing system provides a set of service value maps (SVMs) each having a plurality of nodes and linkages between nodes, forms a network model based on the SVMs and analyses the network model to compute aggregate values for the nodes to enable an identification of a node that matches at least one criterion. Analyzing can include using a degree centrality process where a value for each node is defined as a number of outgoing edges from the node, or an eigenvalue centrality process where a value of a node is proportional to a value of those nodes that the node is connected to. Each SVM can be represented as a directed acyclic graph (DAG) where each edge between nodes is an edge in the DAG. The at least one criterion can include a highest valued node identifying a value aggregation point (VAP) of the set of SVMs.
    Type: Application
    Filed: August 6, 2013
    Publication date: July 24, 2014
    Applicant: International Business Machines Corporation
    Inventors: Heiko LUDWIG, Rakesh Mohan, Ajay Mohindra, Mahmoud Naghshineh, Yuichi Nakamura, Bikram Sengupta
  • Patent number: 8776018
    Abstract: A system and method for associating a state with a distributed system and transitioning component states with recovery to reverse transitioning attempts includes defining a global state representing an overall provisioning state of a plurality of components involved in a system wherein a set of global states are employed as provisioning checkpoints. Individual software component methods are defined for transitioning from one state to another. Individual states are associated with a global state. A rollback method is defined by which a destination global state may be rolled back to a previous global state in an event of a failure.
    Type: Grant
    Filed: January 11, 2008
    Date of Patent: July 8, 2014
    Assignee: International Business Machines Corporation
    Inventors: Alexei A. Karve, Ajay Mohindra, Randy A. Rendahl
  • Publication number: 20140181981
    Abstract: Systems and methods for protection from buffer overflow vulnerability due to placement new constructs in C++ are provided. A system for protecting from buffer overflow vulnerability due to placement new constructs, comprises a compiler which is capable of receiving a program including a placement new instruction, and runtime which is capable of receiving binary code from the compiler and determining whether the program includes the placement new instruction and whether the placement new instruction would lead to buffer overflow, wherein the runtime is linked to a library including methods for preventing the buffer overflow, and selects a method for preventing the buffer overflow if the runtime determines that the placement new instruction would lead to the buffer overflow.
    Type: Application
    Filed: February 13, 2013
    Publication date: June 26, 2014
    Applicant: International Business Machines Corporation
    Inventors: Mihai Christodorescu, Ashish Kundu, Ajay Mohindra
  • Publication number: 20140181984
    Abstract: A computer implemented method is provided to verify an integrity of a solution. The computer implemented method comprises hashing, by a computer, a set of virtual machine instances in a solution topology of the solution. The computer hashes a set of connections in the solution topology. The set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof. The computer hashes a set of solution-specific information, and then signs the hashes to create a first signed topology.
    Type: Application
    Filed: December 21, 2012
    Publication date: June 26, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ashish Kundu, Ajay Mohindra
  • Publication number: 20140181980
    Abstract: Systems and methods for protection from buffer overflow vulnerability due to placement new constructs in C++ are provided. A system for protecting from buffer overflow vulnerability due to placement new constructs, comprises a compiler which is capable of receiving a program including a placement new instruction, and runtime which is capable of receiving binary code from the compiler and determining whether the program includes the placement new instruction and whether the placement new instruction would lead to buffer overflow, wherein the runtime is linked to a library including methods for preventing the buffer overflow, and selects a method for preventing the buffer overflow if the runtime determines that the placement new instruction would lead to the buffer overflow.
    Type: Application
    Filed: December 21, 2012
    Publication date: June 26, 2014
    Applicant: International Business Machines Corporation
    Inventors: Mihai Christodorescu, Ashish Kundu, Ajay Mohindra
  • Publication number: 20140172491
    Abstract: A plurality of traditional software applications are packaged as custom composite solutions, and are stored as custom composite solution deployable images. Customer input is obtained from a customer. At least one of the custom composite solution deployable images is deployed into a management cloud in response to the customer input.
    Type: Application
    Filed: December 14, 2012
    Publication date: June 19, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alexei Karve, Ajay Mohindra, Anca Sailer, Alla Segal
  • Publication number: 20140136707
    Abstract: A method, apparatus, and computer program product for managing a service is disclosed. A computer system collects information about the use of a set of resources by the service. Responsive to receiving a request to verify information about the use of the set of resources by the service, the computer system generates a description of the use of the set of resources by the service using the information collected. The computer system then creates a response to the request using the generated description of the use of the set of resources by the service as proof of the validity of the information.
    Type: Application
    Filed: November 14, 2012
    Publication date: May 15, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kirk A. Beaty, Ashish Kundu, Ajay Mohindra, Vijay K. Naik
  • Publication number: 20140136689
    Abstract: A method, apparatus, and computer program product for managing a service is disclosed. A computer system collects information about the use of a set of resources by the service. Responsive to receiving a request to verify information about the use of the set of resources by the service, the computer system generates a description of the use of the set of resources by the service using the information collected. The computer system then creates a response to the request using the generated description of the use of the set of resources by the service as proof of the validity of the information.
    Type: Application
    Filed: January 8, 2013
    Publication date: May 15, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kirk A. Beaty, Ashish Kundu, Ajay Mohindra, Vijay K. Naik
  • Publication number: 20140101714
    Abstract: A computer-implemented process for privacy aware authenticated map-reduce processing receives data for a MapReduce operation to form received data, identifies a control point in a set of control points of the MapReduce operation to form an identified control point and identifies an applicable set of policies for the identified control point to form a selected set of policies. The selected set of policies is applied at the identified control point and responsive to a determination that application of the selected set of policies at the identified control point returned a positive result, the computer-implemented process continues operation to a next stage in the MapReduce operation.
    Type: Application
    Filed: October 5, 2012
    Publication date: April 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ashish Kundu, Ajay Mohindra, Sambit Sahu
  • Publication number: 20140101715
    Abstract: A computer-implemented process for privacy aware authenticated map-reduce processing receives data for a MapReduce operation to form received data, identifies a control point in a set of control points of the MapReduce operation to form an identified control point and identifies an applicable set of policies for the identified control point to form a selected set of policies. The selected set of policies is applied at the identified control point and responsive to a determination that application of the selected set of policies at the identified control point returned a positive result, the computer-implemented process continues operation to a next stage in the MapReduce operation.
    Type: Application
    Filed: November 5, 2012
    Publication date: April 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ashish Kundu, Ajay Mohindra, Sambit Sahu
  • Publication number: 20140096133
    Abstract: A computer implemented method, a computer program product, and a computer distribute a virtual machine image. A request for a virtual machine image is received. Responsive to receiving the request or the virtual machine image, the authenticity of a virtual machine image catalog associated with the virtual machine image is identified. Responsive to identifying that the virtual machine image catalog is authentic, a first digital signature to be sent with the virtual machine image is determined. Responsive to determining the signature, the virtual machine image and the signature is sent.
    Type: Application
    Filed: October 1, 2012
    Publication date: April 3, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ashish Kundu, Ajay Mohindra