Patents by Inventor Dinesh T. Jain

Dinesh T. Jain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9998468
    Abstract: A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing system. The management component utilizes device compliance attributes to form a device risk vector associated with an end-user device. The management component further utilizes resource compliance attributes to form a resource risk vector associated with a provisioned-resource. The management component forms a policy vector utilizing compliance attributes included in a compliance policy. The management component compares the device and resource risk vectors to the policy vector to determine a threat vector, and uses the threat vector to evaluate the end-users, end-user devices, and user accounts for risk of security breach, damage to, and/or loss of components of the computing system.
    Type: Grant
    Filed: August 30, 2017
    Date of Patent: June 12, 2018
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Hockings, Dinesh T. Jain, Rohit U. Satyanarayana, Vincent C. Williams
  • Patent number: 9992201
    Abstract: A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing system. The management component utilizes device compliance attributes to form a device risk vector associated with an end-user device. The management component further utilizes resource compliance attributes to form a resource risk vector associated with a provisioned-resource. The management component forms a policy vector utilizing compliance attributes included in a compliance policy. The management component compares the device and resource risk vectors to the policy vector to determine a threat vector, and uses the threat vector to evaluate the end-users, end-user devices, and user accounts for risk of security breach, damage to, and/or loss of components of the computing system.
    Type: Grant
    Filed: August 30, 2017
    Date of Patent: June 5, 2018
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Hockings, Dinesh T. Jain, Rohit U. Satyanarayana, Vincent C. Williams
  • Publication number: 20170366549
    Abstract: A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing system. The management component utilizes device compliance attributes to form a device risk vector associated with an end-user device. The management component further utilizes resource compliance attributes to form a resource risk vector associated with a provisioned-resource. The management component forms a policy vector utilizing compliance attributes included in a compliance policy. The management component compares the device and resource risk vectors to the policy vector to determine a threat vector, and uses the threat vector to evaluate the end-users, end-user devices, and user accounts for risk of security breach, damage to, and/or loss of components of the computing system.
    Type: Application
    Filed: August 30, 2017
    Publication date: December 21, 2017
    Inventors: Christopher J. Hockings, Dinesh T. Jain, Rohit U. Satyanarayana, Vincent C. Williams
  • Publication number: 20170366548
    Abstract: A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing system. The management component utilizes device compliance attributes to form a device risk vector associated with an end-user device. The management component further utilizes resource compliance attributes to form a resource risk vector associated with a provisioned-resource. The management component forms a policy vector utilizing compliance attributes included in a compliance policy. The management component compares the device and resource risk vectors to the policy vector to determine a threat vector, and uses the threat vector to evaluate the end-users, end-user devices, and user accounts for risk of security breach, damage to, and/or loss of components of the computing system.
    Type: Application
    Filed: August 30, 2017
    Publication date: December 21, 2017
    Inventors: Christopher J. Hockings, Dinesh T. Jain, Rohit U. Satyanarayana, Vincent C. Williams
  • Publication number: 20170339160
    Abstract: A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing system. The management component utilizes device compliance attributes to form a device risk vector associated with an end-user device. The management component further utilizes resource compliance attributes to form a resource risk vector associated with a provisioned-resource. The management component forms a policy vector utilizing compliance attributes included in a compliance policy. The management component compares the device and resource risk vectors to the policy vector to determine a threat vector, and uses the threat vector to evaluate the end-users, end-user devices, and user accounts for risk of security breach, damage to, and/or loss of components of the computing system.
    Type: Application
    Filed: May 17, 2016
    Publication date: November 23, 2017
    Inventors: Christopher J. Hockings, Dinesh T. Jain, Rohit U. Satyanarayana, Vincent C. Williams
  • Patent number: 9762582
    Abstract: A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing system. The management component utilizes device compliance attributes to form a device risk vector associated with an end-user device. The management component further utilizes resource compliance attributes to form a resource risk vector associated with a provisioned-resource. The management component forms a policy vector utilizing compliance attributes included in a compliance policy. The management component compares the device and resource risk vectors to the policy vector to determine a threat vector, and uses the threat vector to evaluate the end-users, end-user devices, and user accounts for risk of security breach, damage to, and/or loss of components of the computing system.
    Type: Grant
    Filed: December 20, 2016
    Date of Patent: September 12, 2017
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Hockings, Dinesh T. Jain, Rohit U. Satyanarayana, Vincent C. Williams
  • Patent number: 9672348
    Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: June 6, 2017
    Assignee: International Business Machines Corporation
    Inventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A. J. Nye
  • Patent number: 9659166
    Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.
    Type: Grant
    Filed: January 30, 2015
    Date of Patent: May 23, 2017
    Assignee: International Business Machines Corporation
    Inventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A. J. Nye
  • Publication number: 20160226914
    Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.
    Type: Application
    Filed: May 27, 2015
    Publication date: August 4, 2016
    Inventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A.J. Nye
  • Publication number: 20160224781
    Abstract: Risk-based credential management is provided. A request to checkout credentials is received. The credentials are associated with at least one managed resource. A risk value of the request is determined. The determination of the risk value is based, at least in part, on risk information of the requesting device. A determination is made whether to deny the request based, at least in part, on the risk value and a first predetermined threshold of a checkout policy.
    Type: Application
    Filed: January 30, 2015
    Publication date: August 4, 2016
    Inventors: Leigh T. Doddy, Christopher J. Hockings, Dinesh T. Jain, Philip A.J. Nye
  • Publication number: 20150178876
    Abstract: In a method for resolving orphan accounts, information about at least one account on a computing system is received. One or more processors determine, from the received information, that a first potential orphan account exists on the computing system. One or more processors notify a first potential account owner of the first potential orphan account about the existence of the first potential orphan account. One or more processors receive an ownership claim for the first potential orphan account, wherein the ownership claim indicates that the first potential account owner is an actual owner of the first potential orphan account, and the one or more processors determine whether the ownership claim is legitimate.
    Type: Application
    Filed: June 27, 2014
    Publication date: June 25, 2015
    Inventors: Kaushal K. Kapadia, Dinesh T. Jain
  • Publication number: 20150178875
    Abstract: In a method for resolving orphan accounts, information about at least one account on a computing system is received. One or more processors determine, from the received information, that a first potential orphan account exists on the computing system. One or more processors notify a first potential account owner of the first potential orphan account about the existence of the first potential orphan account. One or more processors receive an ownership claim for the first potential orphan account, wherein the ownership claim indicates that the first potential account owner is an actual owner of the first potential orphan account, and the one or more processors determine whether the ownership claim is legitimate.
    Type: Application
    Filed: December 23, 2013
    Publication date: June 25, 2015
    Applicant: International Business Machines Corporation
    Inventors: Kaushal K. Kapadia, Dinesh T. Jain