Patents by Inventor Arun C. Ramachandran
Arun C. Ramachandran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9203607Abstract: A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared between the sender and the receiver. Rather than sending a challenge and then waiting for a response, the challenge and response are both sent by the sender of the information. The information sent comprises an index with a challenge and a response from the Challenge-Response Table. Upon receiving the coded information, the receiver uses the Challenge-Response Table to decode the information by using the index to locate the challenge and its valid response. Upon determining that the challenge and the response are correct, a first decoded answer is determined. Upon determining that either the challenge or the response, or both, are incorrect, a second decoded answer is determined.Type: GrantFiled: March 9, 2012Date of Patent: December 1, 2015Assignee: International Business Machines CorporationInventors: Subramaniyam Chandrasekaran, Shunmugam Murugan, Arun C. Ramachandran, Lakshmanan Velusamy
-
Patent number: 8966254Abstract: A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared between the sender and the receiver. Rather than sending a challenge and then waiting for a response, the challenge and response are both sent by the sender of the information. The information sent comprises an index with a challenge and a response from the Challenge-Response Table. Upon receiving the coded information, the receiver uses the Challenge-Response Table to decode the information by using the index to locate the challenge and its valid response. Upon determining that the challenge and the response are correct, a first decoded answer is determined. Upon determining that either the challenge or the response, or both, are incorrect, a second decoded answer is determined.Type: GrantFiled: October 11, 2010Date of Patent: February 24, 2015Assignee: International Business Machines CorporationInventors: Subramaniyam Chandrasekaran, Shunmugam Murugan, Arun C. Ramachandran, Lakshmanan Velusamy
-
Patent number: 8655929Abstract: Disclosed herein are methods, systems, and computer program products for managing data within a file system. In embodiments, the method includes determining the location of data within a file to be modified, modifying the data within the file, and adjusting a pointer to point to the data block containing the modified data. The data within a file may be modified by deleting data from the file or inserting new data into the file. New data may be inserted into a file by writing the data into new data blocks and then adjusting the pointers to point to the location of the new data blocks. An example method may also include determining whether data blocks are incomplete blocks and identifying the incomplete blocks by negating the value of the pointers to those blocks.Type: GrantFiled: May 19, 2011Date of Patent: February 18, 2014Assignee: International Business Machines CorporationInventors: Divakar Adari, Savitri Hunasheekatti, Arun C. Ramachandran, Lakshmanan Velusamy
-
Patent number: 8615649Abstract: The invention includes a method for encrypting and transmitting a message M from a first location to a second location. Random numbers P and Q are initially selected, each of them being either a prime or a non-prime number. P and Q are both furnished to a sender and a recipient at the first and second locations, respectively. A client at the first location generates an encrypted message E, which is the remainder left when a modulus operator divides a first quantity, equal to M multiplied by P to the i power, where i is a selected number, by a second quantity equal to (PQ?1). A tuple comprising E and i is transmitted from the first location to the second location, and a second data processing system at the second location to determines the message M from E, i and Q.Type: GrantFiled: September 21, 2010Date of Patent: December 24, 2013Assignee: International Business Machines CorporationInventors: Subramaniyam Chandrasekaran, Arun C. Ramachandran, Lakshmanan Velusamy, Vinodh Kumar Venkatesan
-
Patent number: 8605895Abstract: An Eth root unit is configured to compute an Eth root of a number A with a machine. The Eth root unit locates a value E, which is even, in a first entry of a plurality of entries of a structure. The Eth root unit is configured to read a product of the pair of prime numbers from the first entry. The Eth root unit is configured to read a second of the pair of key values in the first entry. The Eth root unit is configured to encrypt the number A using the product of the pair of prime numbers to generate an encrypted value. The Eth root unit is configured to apply a decryption operation to the encrypted value using the second of the pair of key values to generate an intermediate value. The Eth root unit is configured to compute a square root of the intermediate value.Type: GrantFiled: December 13, 2011Date of Patent: December 10, 2013Assignee: International Business Machines CorporationInventors: Arun C. Ramachandran, Puvichakravarthy Ramachandran, Lakshmanan Velusamy
-
Publication number: 20130148809Abstract: An Eth root unit is configured to compute an Eth root of a number A with a machine. The Eth root unit locates a value E, which is even, in a first entry of a plurality of entries of a structure. The Eth root unit is configured to read a product of the pair of prime numbers from the first entry. The Eth root unit is configured to read a second of the pair of key values in the first entry. The Eth root unit is configured to encrypt the number A using the product of the pair of prime numbers to generate an encrypted value. The Eth root unit is configured to apply a decryption operation to the encrypted value using the second of the pair of key values to generate an intermediate value. The Eth root unit is configured to compute a square root of the intermediate value.Type: ApplicationFiled: December 13, 2011Publication date: June 13, 2013Applicant: International Business Machines CorporationInventors: Arun C. Ramachandran, Puvichakravarthy Ramachandran, Lakshmanan Velusamy
-
Publication number: 20120296864Abstract: Disclosed herein are methods, systems, and computer program products for managing data within a file system. In embodiments, the method includes determining the location of data within a file to be modified, modifying the data within the file, and adjusting a pointer to point to the data block containing the modified data. The data within a file may be modified by deleting data from the file or inserting new data into the file. New data may be inserted into a file by writing the data into new data blocks and then adjusting the pointers to point to the location of the new data blocks. An example method may also include determining whether data blocks are incomplete blocks and identifying the incomplete blocks by negating the value of the pointers to those blocks.Type: ApplicationFiled: May 19, 2011Publication date: November 22, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Divakar Adari, Savitri Hunasheekatti, Arun C. Ramachandran, Lakshmanan Velusamy
-
Publication number: 20120278333Abstract: A method provides computerized searching of a data set. A method determines the location of an item in a contiguous data set including a plurality of items, the data set is stored in a computer system, and the method assigns a numeric value to each of the plural items in the data set. A least squares polynomial may be created for the data set using ordered pairs of (x, y), wherein x is the assigned numeric value of the item the data set and y is the location of the item in the data set. A command is received to search for the location of a target item in the data set, and a calculated target item location in the data set is generated using a target item assigned numeric value and the least squares polynomial.Type: ApplicationFiled: April 21, 2012Publication date: November 1, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Arun C. Ramachandran, Lakshmanan Velusamy
-
Publication number: 20120278352Abstract: Systems and computer program products provide computerized searching of a data set. A computer system, for determining the location of an item in a contiguous data set including a plurality of items, the data set stored in the computer system, includes assigning a numeric value to each of the plurality of items in the data set. A least square polynomial may be created for the data set using ordered pairs of (x, y), wherein x is the assigned numeric value of the item the data set and y is the location of the item in the data set.Type: ApplicationFiled: April 27, 2011Publication date: November 1, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Arun C. Ramachandran, Lakshmanan Velusamy
-
Publication number: 20120173876Abstract: A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared between the sender and the receiver. Rather than sending a challenge and then waiting for a response, the challenge and response are both sent by the sender of the information. The information sent comprises an index with a challenge and a response from the Challenge-Response Table. Upon receiving the coded information, the receiver uses the Challenge-Response Table to decode the information by using the index to locate the challenge and its valid response. Upon determining that the challenge and the response are correct, a first decoded answer is determined. Upon determining that either the challenge or the response, or both, are incorrect, a second decoded answer is determined.Type: ApplicationFiled: March 9, 2012Publication date: July 5, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SUBRAMANIYAM CHANDRASEKARAN, SHUNMUGAM MURUGAN, ARUN C. RAMACHANDRAN, LAKSHMANAN VELUSAMY
-
Publication number: 20120089837Abstract: A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared between the sender and the receiver. Rather than sending a challenge and then waiting for a response, the challenge and response are both sent by the sender of the information. The information sent comprises an index with a challenge and a response from the Challenge-Response Table. Upon receiving the coded information, the receiver uses the Challenge-Response Table to decode the information by using the index to locate the challenge and its valid response. Upon determining that the challenge and the response are correct, a first decoded answer is determined. Upon determining that either the challenge or the response, or both, are incorrect, a second decoded answer is determined.Type: ApplicationFiled: October 11, 2010Publication date: April 12, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SUBRAMANIYAM CHANDRASEKARAN, SHUNMUGAM MURUGAN, ARUN C. RAMACHANDRAN, LAKSHMANAN VELUSAMY
-
Publication number: 20120070003Abstract: The invention includes a method for encrypting and transmitting a message M from a first location to a second location. Random numbers P and Q are initially selected, each of them being either a prime or a non-prime number. P and Q are both furnished to a sender and a recipient at the first and second locations, respectively. A client at the first location generates an encrypted message E, which is the remainder left when a modulus operator divides a first quantity, equal to M multiplied by P to the i power, where i is a selected number, by a second quantity equal to (PQ?1). A tuple comprising E and i is transmitted from the first location to the second location, and a second data processing system at the second location to determines the message M from E, i and Q.Type: ApplicationFiled: September 21, 2010Publication date: March 22, 2012Applicant: International Business Machines CorporationInventors: Subramaniyam Chandrasekaran, Arun C. Ramachandran, Lakshmanan Velusamy, Vinodh Kumar Venkatesan