Patents by Inventor Govindaraj Sampathkumar

Govindaraj Sampathkumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090228486
    Abstract: A method, program product and apparatus for controlling access to profile information, multi-media resources or social network functions of a first user by a second user not listed on a friend or group listing of the first user. An application retrieves a threshold criteria for access control and social network statistics in response to an attempted access by an entity without an appropriate privilege. The application compares the statistics to the threshold. Then, if the statistics meet the threshold criteria, the application allows access.
    Type: Application
    Filed: March 5, 2008
    Publication date: September 10, 2009
    Inventors: David Gerard Kuehr-McLaren, Ranjan Kumar, Kwabena Mireku, Govindaraj Sampathkumar
  • Publication number: 20090132457
    Abstract: Data for a first time period in a primary data sequence is compared with data for a second time period in each of a set of secondary data sequences. The durations of the first and second time periods are correlated, and the first time period is different from the second time period. To this extent, the data in the primary data sequence during the first time period provides a template for assigning a ranking to each secondary data sequence based on the corresponding data for the second time period.
    Type: Application
    Filed: November 16, 2007
    Publication date: May 21, 2009
    Inventors: Brian Brandenburg, Randall A. Craig, Virginia D. Hill, Govindaraj Sampathkumar, Deanna M. Shaw
  • Publication number: 20090129591
    Abstract: A technique for securing selected document content includes receiving, at a printer, an unsecured electronic document. Selected content of the electronic document is then encrypted, with an encryption key, at the printer. A paper document whose content includes the encrypted selected content of the electronic document is then printed. The encrypted selected content of the paper document is unintelligible prior to decryption with a decryption key.
    Type: Application
    Filed: November 21, 2007
    Publication date: May 21, 2009
    Inventors: Gregory A. Hayes, David G. Kuehr-McLaren, Ranjan Kumar, Kwabena Mireku, Govindaraj Sampathkumar
  • Publication number: 20080168530
    Abstract: The Custom Access Controller adds a custom security hierarchy to the organizational data in the View Processor of WEBSPHERE Virtual Member Manager. Whenever an entity or application attempts to access a resources the access control engine starts the View Processor to identify the organizational data and assigned security policy for the resource. The assigned security policy is applied to a delegated administration path which is part of the delegated administration hierarchy but includes the appropriate path and security policy for the resource. The delegated administration path is sent to an access control engine that grants or denies access to the resource. A View Processor Interface allows network administrators to create and modify custom security hierarchies.
    Type: Application
    Filed: January 5, 2007
    Publication date: July 10, 2008
    Inventors: David G. Kuehr-McLaren, Kwabena Mireku, Govindaraj Sampathkumar, Janette S. Wong
  • Publication number: 20080016104
    Abstract: Policies defining the entitlements to be assigned to a new identity joining a role are automatically generated. An automatic policy assigns a new identity the entitlements commonly owned by a predetermined number of identities in the role, which may be all of the role identities. A conditional policy recommends that a new identity be assigned the non-commonly-owned entitlements associated with the role identity whose non-entitlement attributes most closely match the non-entitlement attributes of the new identity. This may be automatically determined by iterating through a vector that maps the non-commonly-owned entitlements with the non-entitlement attributes of each role identity, comparing the non-entitlement attributes of the new identity to find the closest match. The non-commonly-owned entitlements of that identity are then recommended to be assigned to the new identity, upon approval.
    Type: Application
    Filed: July 20, 2007
    Publication date: January 17, 2008
    Inventors: David Kuehr-McLaren, Pratik Gupta, Govindaraj Sampathkumar, Vincent Williams, Sharon Cutcher, Sumit Taank, Brian Stube, Hari Shankar
  • Patent number: 7284000
    Abstract: Policies defining the entitlements to be assigned to a new identity joining a role are automatically generated. An automatic policy assigns a new identity the entitlements commonly owned by a predetermined number of identities in the role, which may be all of the role identities. A conditional policy recommends that a new identity be assigned the non-commonly-owned entitlements associated with the role identity whose non-entitlement attributes most closely match the non-entitlement attributes of the new identity. This may be automatically determined by iterating through a vector that maps the non-commonly-owned entitlements with the non-entitlement attributes of each role identity, comparing the non-entitlement attributes of the new identity to find the closest match. The non-commonly-owned entitlements of that identity are then recommended to be assigned to the new identity, upon approval.
    Type: Grant
    Filed: December 19, 2003
    Date of Patent: October 16, 2007
    Assignee: International Business Machines Corporation
    Inventors: David G. Kuehr-McLaren, Pratik Gupta, Govindaraj Sampathkumar, Vincent C. Williams, Sharon L. Cutcher, Sumit Taank, Brian A. Stube, Hari Shankar
  • Publication number: 20070156765
    Abstract: An abstraction layer associates a party-focused object, a security-focused object, or both, with an abstraction object. The party-focused object has a property. The property is presented in the abstraction object defined by the mapping schema. The abstraction layer converts a set of repository objects to at least one abstraction object.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Applicant: International Business Machines Corporation
    Inventors: Mark Hubbard, David Kuehr-McLaren, Govindaraj Sampathkumar, Janette Wong
  • Patent number: 6950855
    Abstract: A method and system for selecting master nodes to manage a target node group in a computer network having multiple nodes and overlapping node groups. The system includes determining a hamming distance for node pairs within the network. The node pair includes two node pair members and the hamming distance is the number of node groups the node pair members do not share in common. A participation index for nodes within the network is determined at a determining operation. The participation index is the number of node groups the node belongs to. An availability potential for node pairs is also determined. The availability potential is the sum of the participation indexes of the node pair members subtracted by the hamming distance of the node pair. An optimal combination of node pairs is found by searching for the maximum total availability potential for the network. A master node pair for the target node group is selected from the optimal combination of node pairs.
    Type: Grant
    Filed: January 18, 2002
    Date of Patent: September 27, 2005
    Assignee: International Business Machines Corporation
    Inventor: Govindaraj Sampathkumar
  • Publication number: 20050138061
    Abstract: Policies defining the entitlements to be assigned to a new identity joining a role are automatically generated. An automatic policy assigns a new identity the entitlements commonly owned by a predetermined number of identities in the role, which may be all of the role identities. A conditional policy recommends that a new identity be assigned the non-commonly-owned entitlements associated with the role identity whose non-entitlement attributes most closely match the non-entitlement attributes of the new identity. This may be automatically determined by iterating through a vector that maps the non-commonly-owned entitlements with the non-entitlement attributes of each role identity, comparing the non-entitlement attributes of the new identity to find the closest match. The non-commonly-owned entitlements of that identity are then recommended to be assigned to the new identity, upon approval.
    Type: Application
    Filed: December 19, 2003
    Publication date: June 23, 2005
    Inventors: David Kuehr-McLaren, Pratik Gupta, Govindaraj Sampathkumar, Vincent Williams, Sharon Cutcher, Sumit Taank, Brian Stube, Hari Shankar
  • Publication number: 20050138420
    Abstract: A role hierarchy is automatically generated by hierarchically ranking roles in a role based control system, each role including a plurality of identities having attributes. Iteratively at each hierarchical level: each non-cohesive role (wherein, in this case, at least one attribute is not possessed by every identity in the role) is replaced, at the same hierarchical level, by a cohesive role formed by grouping identities having at least one common attribute. The remaining identities are clustered into children roles based on attributes other than the common attribute, and the children roles are added to the role hierarchy at a hierarchical level below the cohesive role. If no common attribute exists in the non-cohesive role, the role is clustered into two or more new roles based on all the attributes in the role, and the non-cohesive role is replaced with the new roles at the same hierarchical level.
    Type: Application
    Filed: December 19, 2003
    Publication date: June 23, 2005
    Inventors: Govindaraj Sampathkumar, Pratik Gupta, David Kuehr-McLaren, Vincent Williams, Sharon Cutcher, Sumit Taank, Brian Stube, Hari Shankar
  • Publication number: 20050138419
    Abstract: An automated, bottom-up role discovery method for a role based control system includes automatically extracting identities and attributes from data sources and automatically clustering the identities based on the attributes to form recommended roles. The recommended roles may be modified by intervention of an administrator. Additionally, the recommended roles may be aggregated by defining the role definition as an attribute of each constituent identity, and re-clustering the identities to generate refined roles. The recommended, modified, and/or refined roles may then be utilized in a role based control system, such as a role based access control system. Periodically performing the role discovery process provides a means to audit a role based access control system.
    Type: Application
    Filed: December 19, 2003
    Publication date: June 23, 2005
    Inventors: Pratik Gupta, Govindaraj Sampathkumar, David Kuehr-McLaren, Vincent Williams, Sharon Cutcher, Sumit Taank, Brian Stube, Hari Shankar
  • Publication number: 20030140108
    Abstract: A method and system for selecting master nodes to manage a target node group in a computer network having multiple nodes and overlapping node groups. The system includes determining a hamming distance for node pairs within the network. The node pair includes two node pair members and the hamming distance is the number of node groups the node pair members do not share in common. A participation index for nodes within the network is determined at a determining operation. The participation index is the number of node groups the node belongs to. An availability potential for node pairs is also determined. The availability potential is the sum of the participation indexes of the node pair members subtracted by the hamming distance of the node pair. An optimal combination of node pairs is found by searching for the maximum total availability potential for the network. A master node pair for the target node group is selected from the optimal combination of node pairs.
    Type: Application
    Filed: January 18, 2002
    Publication date: July 24, 2003
    Applicant: International Business Machines Corporation
    Inventor: Govindaraj Sampathkumar