Patents by Inventor Govindaraj Sampathkumar
Govindaraj Sampathkumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10832193Abstract: A method, system, and computer program product for work plan based access control are provided in the illustrative embodiments. For a portion of the work plan, a physical space is determined. Access to the physical space is used in a task in the portion. At least one workflow is initiated to determine whether to grant the access to the physical space. Responsive to the workflow granting the access to the physical space, the access to the physical space is configured for a first duration for a first user performing the task. Responsive to an indication of closing of the portion, the access to the physical space for the first duration for the first user performing the task is revoked.Type: GrantFiled: August 29, 2018Date of Patent: November 10, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David L. Kaminsky, Lori M. Pilgrim, Govindaraj Sampathkumar
-
Patent number: 10432637Abstract: A method, program product and apparatus for controlling access to profile information, multi-media resources or social network functions of a first user by a second user not listed on a friend or group listing of the first user. An application retrieves a threshold criteria for access control and social network statistics in response to an attempted access by an entity without an appropriate privilege. The application compares the statistics to the threshold. Then, if the statistics meet the threshold criteria, the application allows access.Type: GrantFiled: July 10, 2014Date of Patent: October 1, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David G. Kuehr-McLaren, Ranjan Kumar, Kwabena A. Mireku, Govindaraj Sampathkumar
-
Publication number: 20190012626Abstract: A method, system, and computer program product for work plan based access control are provided in the illustrative embodiments. For a portion of the work plan, a physical space is determined. Access to the physical space is used in a task in the portion. At least one workflow is initiated to determine whether to grant the access to the physical space. Responsive to the workflow granting the access to the physical space, the access to the physical space is configured for a first duration for a first user performing the task. Responsive to an indication of closing of the portion, the access to the physical space for the first duration for the first user performing the task is revoked.Type: ApplicationFiled: August 29, 2018Publication date: January 10, 2019Applicant: International Business Machines CorporationInventors: David L. Kaminsky, Lori M. Pilgrim, Govindaraj Sampathkumar
-
Patent number: 10102489Abstract: A method, system, and computer program product for work plan based access control are provided in the illustrative embodiments. For a portion of the work plan, a physical space is determined. Access to the physical space is used in a task in the portion. At least one workflow is initiated to determine whether to grant the access to the physical space. Responsive to the workflow granting the access to the physical space, the access to the physical space is configured for a first duration for a first user performing the task. Responsive to an indication of closing of the portion, the access to the physical space for the first duration for the first user performing the task is revoked.Type: GrantFiled: August 12, 2014Date of Patent: October 16, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David L. Kaminsky, Lori M. Pilgrim, Govindaraj Sampathkumar
-
Patent number: 9864742Abstract: A system to apply persona styles to written communications. The system includes a communication analyzer and a modification engine. The communication analyzer receives an element of original content of a written communication. The communication analyzer also receives a selection of a persona style. The selected persona style defines a communication style. The modification engine presents a substitute element to a user in response to a determination that the element of the original content of the written communication is incompatible with the selected persona style. The substitute element is compatible with the selected persona style.Type: GrantFiled: August 13, 2015Date of Patent: January 9, 2018Assignee: International Business Machines CorporationInventors: Li Chen, Yongcheng Li, Govindaraj Sampathkumar, Ryan Urquhart
-
Patent number: 9762525Abstract: Systems and methods of confirming an addressee of an email message include receiving an email message addressed to one or more forwarding addresses. At least one email address associated with each of the one or more forwarding addresses is obtained. A potential discrepancy in the email message is detected in response to the at least one obtained email address. Before sending the email message, an alert is issued to a sender of the email message. The alert provides a recommendation regarding whether to continue with sending the email message and identifies content associated with the email message that led to detecting the potential discrepancy.Type: GrantFiled: December 16, 2010Date of Patent: September 12, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Al Chakra, Li Chen, Daniel P. Julin, Henri Fouotsop Meli, Govindaraj Sampathkumar
-
Publication number: 20160048787Abstract: A method, system, and computer program product for work plan based access control are provided in the illustrative embodiments. For a portion of the work plan, a physical space is determined. Access to the physical space is used in a task in the portion. At least one workflow is initiated to determine whether to grant the access to the physical space. Responsive to the workflow granting the access to the physical space, the access to the physical space is configured for a first duration for a first user performing the task. Responsive to an indication of closing of the portion, the access to the physical space for the first duration for the first user performing the task is revoked.Type: ApplicationFiled: August 12, 2014Publication date: February 18, 2016Inventors: David L. Kaminsky, Lori M. Pilgrim, Govindaraj Sampathkumar
-
Publication number: 20150347391Abstract: A system to apply persona styles to written communications. The system includes a communication analyzer and a modification engine. The communication analyzer receives an element of original content of a written communication. The communication analyzer also receives a selection of a persona style. The selected persona style defines a communication style. The modification engine presents a substitute element to a user in response to a determination that the element of the original content of the written communication is incompatible with the selected persona style. The substitute element is compatible with the selected persona style.Type: ApplicationFiled: August 13, 2015Publication date: December 3, 2015Applicant: International Business Machines CorporationInventors: Li Chen, Yongcheng Li, Govindaraj Sampathkumar, Ryan Urquhart
-
Patent number: 9141689Abstract: A system to apply persona styles to written communications. The system includes a communication analyzer and a modification engine coupled to the communication analyzer. The communication analyzer identifies an element of original content of a written communication and determines that the element of the original content of the written communication is incompatible with a selected persona style. The selected persona style defines a communication style. The modification engine modifies the original content of the written communication to replace the element of the original content with a substitute element that is compatible with the selected persona style.Type: GrantFiled: June 11, 2008Date of Patent: September 22, 2015Assignee: International Business Machines CorporationInventors: Li Chen, Yongcheng Li, Govindaraj Sampathkumar, Ryan Urquhart
-
Patent number: 9124602Abstract: The Custom Access Controller adds a custom security hierarchy to the organizational data in the View Processor of WEBSPHERE Virtual Member Manager. Whenever an entity or application attempts to access a resources the access control engine starts the View Processor to identify the organizational data and assigned security policy for the resource. The assigned security policy is applied to a delegated administration path which is part of the delegated administration hierarchy but includes the appropriate path and security policy for the resource. The delegated administration path is sent to an access control engine that grants or denies access to the resource. A View Processor Interface allows network administrators to create and modify custom security hierarchies.Type: GrantFiled: January 5, 2007Date of Patent: September 1, 2015Assignee: International Business Machines CorporationInventors: David G. Kuehr-McLaren, Kwabena Mireku, Govindaraj Sampathkumar, Janette S. Wong
-
Publication number: 20140325612Abstract: A method, program product and apparatus for controlling access to profile information, multi-media resources or social network functions of a first user by a second user not listed on a friend or group listing of the first user. An application retrieves a threshold criteria for access control and social network statistics in response to an attempted access by an entity without an appropriate privilege. The application compares the statistics to the threshold. Then, if the statistics meet the threshold criteria, the application allows access.Type: ApplicationFiled: July 10, 2014Publication date: October 30, 2014Inventors: David G. Kuehr-McLaren, Ranjan Kumar, Kwabena A. Mireku, Govindaraj Sampathkumar
-
Patent number: 8856048Abstract: An apparatus, system, and method are disclosed for defining normal usage of a computing system resource. A method for defining normal usage of a computing system resource includes receiving a repeating schedule that represents system usage of one or more computing resources and receiving one or more demand events that will affect the system usage of the one or more computer resources. The method also automatically creates a predictive temporal profile that represents the system usage of the one or more computer resources from information comprising the repeating schedule and the one or more demand events. The predictive temporal profile is displayed for the user to review.Type: GrantFiled: October 15, 2009Date of Patent: October 7, 2014Assignee: International Business Machines CorporationInventors: Jeffrey A. Calcaterra, Andrew L. Hanson, Gregory R. Hintermeister, Govindaraj Sampathkumar
-
Patent number: 8838646Abstract: A method, program product and apparatus for controlling access to profile information, multi-media resources or social network functions of a first user by a second user not listed on a friend or group listing of the first user. An application retrieves a threshold criteria for access control and social network statistics in response to an attempted access by an entity without an appropriate privilege. The application compares the statistics to the threshold. Then, if the statistics meet the threshold criteria, the application allows access.Type: GrantFiled: March 5, 2008Date of Patent: September 16, 2014Assignee: International Business Machines CorporationInventors: David Gerard Kuehr-McLaren, Ranjan Kumar, Kwabena Mireku, Govindaraj Sampathkumar
-
Patent number: 8533168Abstract: Policies defining the entitlements to be assigned to a new identity joining a role are automatically generated. An automatic policy assigns a new identity the entitlements commonly owned by a predetermined number of identities in the role, which may be all of the role identities. A conditional policy recommends that a new identity be assigned the non-commonly-owned entitlements associated with the role identity whose non-entitlement attributes most closely match the non-entitlement attributes of the new identity. This may be automatically determined by iterating through a vector that maps the non-commonly-owned entitlements with the non-entitlement attributes of each role identity, comparing the non-entitlement attributes of the new identity to find the closest match. The non-commonly-owned entitlements of that identity are then recommended to be assigned to the new identity, upon approval.Type: GrantFiled: July 20, 2007Date of Patent: September 10, 2013Assignee: International Business Machines CorporationInventors: David G. Kuehr-McLaren, Pratik Gupta, Govindaraj Sampathkumar, Vincent C. Williams, Sharon L. Cutcher, Sumit Taank, Brian A. Stube, Hari Shankar
-
Publication number: 20120158860Abstract: Systems and methods of confirming an addressee of an email message include receiving an email message addressed to one or more forwarding addresses. At least one email address associated with each of the one or more forwarding addresses is obtained. A potential discrepancy in the email message is detected in response to the at least one obtained email address. Before sending the email message, an alert is issued to a sender of the email message. The alert provides a recommendation regarding whether to continue with sending the email message and identifies content associated with the email message that led to detecting the potential discrepancy.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Al Chakra, Li Chen, Daniel P. Julin, Henri Fouotsop Meli, Govindaraj Sampathkumar
-
Publication number: 20120157157Abstract: A method for exchanging contact information includes, with a mobile computing device, establishing communication with a peer mobile computing device within a specified distance from the mobile computing device, determining if the peer mobile computing device meets a trust policy, automatically receiving contact information from the peer mobile computing device, and storing the contact information in a temporary contact list. A mobile computing system includes a processor and a memory communicatively coupled to the processor. The processor is configured to establish communication with a peer mobile computing device within a specified distance from the mobile computing device, determine if the peer mobile computing device meets a trust policy, receive contact information from the peer mobile computing device, and place the contact information in a temporary contact list stored on the memory.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Al Chakra, Li Chen, Henri Fouotsop Meli, Govindaraj Sampathkumar
-
Patent number: 7962437Abstract: Data for a first time period in a primary data sequence is compared with data for a second time period in each of a set of secondary data sequences. The durations of the first and second time periods are correlated, and the first time period is different from the second time period. A ranking is assigned to each secondary data sequence based on the corresponding data for the second time period. The ranking for each of the set of secondary data sequences is written to a computer useable medium. The primary data sequence and the set of secondary data sequences are adjusted based on a request to change the primary data sequence to one of the set of secondary data sequences. The comparing, assigning, and writing are repeated for the adjusted primary data sequence and set of secondary data sequences.Type: GrantFiled: November 16, 2007Date of Patent: June 14, 2011Assignee: International Business Machines CorporationInventors: Brian Brandenburg, Randall A. Craig, Virginia D. Hill, Govindaraj Sampathkumar, Deanna M. Shaw
-
Publication number: 20110093413Abstract: An apparatus, system, and method are disclosed for defining normal usage of a computing system resource. A method for defining normal usage of a computing system resource includes receiving a repeating schedule that represents system usage of one or more computing resources and receiving one or more demand events that will affect the system usage of the one or more computer resources. The method also automatically creates a predictive temporal profile that represents the system usage of the one or more computer resources from information comprising the repeating schedule and the one or more demand events. The predictive temporal profile is displayed for the user to review.Type: ApplicationFiled: October 15, 2009Publication date: April 21, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jeffrey A. Calcaterra, Andrew L. Hanson, Gregory R. Hintermeister, Govindaraj Sampathkumar
-
Publication number: 20110071811Abstract: Performance impacting operations (e.g., maintenance operations) performed on a system can, depending on a current state of the system, heavily impact the performance of the system, thus affecting a customer's experience with the system. Functionality can be implemented to control execution of the performance impacting operations based on simulating the impact of executing the operation. Depending on the current state of the system, execution of the maintenance operations can be allowed, deferred, and even blocked. This can ensure that the performance of the system is not compromised.Type: ApplicationFiled: September 18, 2009Publication date: March 24, 2011Applicant: International Business Machines CorporationInventors: David Gerard Kuehr-McLaren, Govindaraj Sampathkumar
-
Patent number: 7870101Abstract: An abstraction layer associates a party-focused object, a security-focused object, or both, with an abstraction object. The party-focused or security focused object has one or more properties. The properties are presented in the abstraction object defined by the mapping schema. The abstraction layer converts a set of repository objects to at least one abstraction object.Type: GrantFiled: December 30, 2005Date of Patent: January 11, 2011Assignee: International Business Machines CorporationInventors: Mark William Hubbard, David Gerard Kuehr-McLaren, Govindaraj Sampathkumar, Janette Siu Jong Wong