Patents by Inventor Arun C. Ramachandran

Arun C. Ramachandran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9203607
    Abstract: A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared between the sender and the receiver. Rather than sending a challenge and then waiting for a response, the challenge and response are both sent by the sender of the information. The information sent comprises an index with a challenge and a response from the Challenge-Response Table. Upon receiving the coded information, the receiver uses the Challenge-Response Table to decode the information by using the index to locate the challenge and its valid response. Upon determining that the challenge and the response are correct, a first decoded answer is determined. Upon determining that either the challenge or the response, or both, are incorrect, a second decoded answer is determined.
    Type: Grant
    Filed: March 9, 2012
    Date of Patent: December 1, 2015
    Assignee: International Business Machines Corporation
    Inventors: Subramaniyam Chandrasekaran, Shunmugam Murugan, Arun C. Ramachandran, Lakshmanan Velusamy
  • Patent number: 8966254
    Abstract: A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared between the sender and the receiver. Rather than sending a challenge and then waiting for a response, the challenge and response are both sent by the sender of the information. The information sent comprises an index with a challenge and a response from the Challenge-Response Table. Upon receiving the coded information, the receiver uses the Challenge-Response Table to decode the information by using the index to locate the challenge and its valid response. Upon determining that the challenge and the response are correct, a first decoded answer is determined. Upon determining that either the challenge or the response, or both, are incorrect, a second decoded answer is determined.
    Type: Grant
    Filed: October 11, 2010
    Date of Patent: February 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Subramaniyam Chandrasekaran, Shunmugam Murugan, Arun C. Ramachandran, Lakshmanan Velusamy
  • Patent number: 8655929
    Abstract: Disclosed herein are methods, systems, and computer program products for managing data within a file system. In embodiments, the method includes determining the location of data within a file to be modified, modifying the data within the file, and adjusting a pointer to point to the data block containing the modified data. The data within a file may be modified by deleting data from the file or inserting new data into the file. New data may be inserted into a file by writing the data into new data blocks and then adjusting the pointers to point to the location of the new data blocks. An example method may also include determining whether data blocks are incomplete blocks and identifying the incomplete blocks by negating the value of the pointers to those blocks.
    Type: Grant
    Filed: May 19, 2011
    Date of Patent: February 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: Divakar Adari, Savitri Hunasheekatti, Arun C. Ramachandran, Lakshmanan Velusamy
  • Patent number: 8615649
    Abstract: The invention includes a method for encrypting and transmitting a message M from a first location to a second location. Random numbers P and Q are initially selected, each of them being either a prime or a non-prime number. P and Q are both furnished to a sender and a recipient at the first and second locations, respectively. A client at the first location generates an encrypted message E, which is the remainder left when a modulus operator divides a first quantity, equal to M multiplied by P to the i power, where i is a selected number, by a second quantity equal to (PQ?1). A tuple comprising E and i is transmitted from the first location to the second location, and a second data processing system at the second location to determines the message M from E, i and Q.
    Type: Grant
    Filed: September 21, 2010
    Date of Patent: December 24, 2013
    Assignee: International Business Machines Corporation
    Inventors: Subramaniyam Chandrasekaran, Arun C. Ramachandran, Lakshmanan Velusamy, Vinodh Kumar Venkatesan
  • Patent number: 8605895
    Abstract: An Eth root unit is configured to compute an Eth root of a number A with a machine. The Eth root unit locates a value E, which is even, in a first entry of a plurality of entries of a structure. The Eth root unit is configured to read a product of the pair of prime numbers from the first entry. The Eth root unit is configured to read a second of the pair of key values in the first entry. The Eth root unit is configured to encrypt the number A using the product of the pair of prime numbers to generate an encrypted value. The Eth root unit is configured to apply a decryption operation to the encrypted value using the second of the pair of key values to generate an intermediate value. The Eth root unit is configured to compute a square root of the intermediate value.
    Type: Grant
    Filed: December 13, 2011
    Date of Patent: December 10, 2013
    Assignee: International Business Machines Corporation
    Inventors: Arun C. Ramachandran, Puvichakravarthy Ramachandran, Lakshmanan Velusamy
  • Publication number: 20130148809
    Abstract: An Eth root unit is configured to compute an Eth root of a number A with a machine. The Eth root unit locates a value E, which is even, in a first entry of a plurality of entries of a structure. The Eth root unit is configured to read a product of the pair of prime numbers from the first entry. The Eth root unit is configured to read a second of the pair of key values in the first entry. The Eth root unit is configured to encrypt the number A using the product of the pair of prime numbers to generate an encrypted value. The Eth root unit is configured to apply a decryption operation to the encrypted value using the second of the pair of key values to generate an intermediate value. The Eth root unit is configured to compute a square root of the intermediate value.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 13, 2013
    Applicant: International Business Machines Corporation
    Inventors: Arun C. Ramachandran, Puvichakravarthy Ramachandran, Lakshmanan Velusamy
  • Publication number: 20120296864
    Abstract: Disclosed herein are methods, systems, and computer program products for managing data within a file system. In embodiments, the method includes determining the location of data within a file to be modified, modifying the data within the file, and adjusting a pointer to point to the data block containing the modified data. The data within a file may be modified by deleting data from the file or inserting new data into the file. New data may be inserted into a file by writing the data into new data blocks and then adjusting the pointers to point to the location of the new data blocks. An example method may also include determining whether data blocks are incomplete blocks and identifying the incomplete blocks by negating the value of the pointers to those blocks.
    Type: Application
    Filed: May 19, 2011
    Publication date: November 22, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Divakar Adari, Savitri Hunasheekatti, Arun C. Ramachandran, Lakshmanan Velusamy
  • Publication number: 20120278333
    Abstract: A method provides computerized searching of a data set. A method determines the location of an item in a contiguous data set including a plurality of items, the data set is stored in a computer system, and the method assigns a numeric value to each of the plural items in the data set. A least squares polynomial may be created for the data set using ordered pairs of (x, y), wherein x is the assigned numeric value of the item the data set and y is the location of the item in the data set. A command is received to search for the location of a target item in the data set, and a calculated target item location in the data set is generated using a target item assigned numeric value and the least squares polynomial.
    Type: Application
    Filed: April 21, 2012
    Publication date: November 1, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Arun C. Ramachandran, Lakshmanan Velusamy
  • Publication number: 20120278352
    Abstract: Systems and computer program products provide computerized searching of a data set. A computer system, for determining the location of an item in a contiguous data set including a plurality of items, the data set stored in the computer system, includes assigning a numeric value to each of the plurality of items in the data set. A least square polynomial may be created for the data set using ordered pairs of (x, y), wherein x is the assigned numeric value of the item the data set and y is the location of the item in the data set.
    Type: Application
    Filed: April 27, 2011
    Publication date: November 1, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Arun C. Ramachandran, Lakshmanan Velusamy
  • Publication number: 20120173876
    Abstract: A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared between the sender and the receiver. Rather than sending a challenge and then waiting for a response, the challenge and response are both sent by the sender of the information. The information sent comprises an index with a challenge and a response from the Challenge-Response Table. Upon receiving the coded information, the receiver uses the Challenge-Response Table to decode the information by using the index to locate the challenge and its valid response. Upon determining that the challenge and the response are correct, a first decoded answer is determined. Upon determining that either the challenge or the response, or both, are incorrect, a second decoded answer is determined.
    Type: Application
    Filed: March 9, 2012
    Publication date: July 5, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: SUBRAMANIYAM CHANDRASEKARAN, SHUNMUGAM MURUGAN, ARUN C. RAMACHANDRAN, LAKSHMANAN VELUSAMY
  • Publication number: 20120089837
    Abstract: A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared between the sender and the receiver. Rather than sending a challenge and then waiting for a response, the challenge and response are both sent by the sender of the information. The information sent comprises an index with a challenge and a response from the Challenge-Response Table. Upon receiving the coded information, the receiver uses the Challenge-Response Table to decode the information by using the index to locate the challenge and its valid response. Upon determining that the challenge and the response are correct, a first decoded answer is determined. Upon determining that either the challenge or the response, or both, are incorrect, a second decoded answer is determined.
    Type: Application
    Filed: October 11, 2010
    Publication date: April 12, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: SUBRAMANIYAM CHANDRASEKARAN, SHUNMUGAM MURUGAN, ARUN C. RAMACHANDRAN, LAKSHMANAN VELUSAMY
  • Publication number: 20120070003
    Abstract: The invention includes a method for encrypting and transmitting a message M from a first location to a second location. Random numbers P and Q are initially selected, each of them being either a prime or a non-prime number. P and Q are both furnished to a sender and a recipient at the first and second locations, respectively. A client at the first location generates an encrypted message E, which is the remainder left when a modulus operator divides a first quantity, equal to M multiplied by P to the i power, where i is a selected number, by a second quantity equal to (PQ?1). A tuple comprising E and i is transmitted from the first location to the second location, and a second data processing system at the second location to determines the message M from E, i and Q.
    Type: Application
    Filed: September 21, 2010
    Publication date: March 22, 2012
    Applicant: International Business Machines Corporation
    Inventors: Subramaniyam Chandrasekaran, Arun C. Ramachandran, Lakshmanan Velusamy, Vinodh Kumar Venkatesan