Patents by Inventor Krishna Kishore Yellepeddy

Krishna Kishore Yellepeddy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20040064502
    Abstract: A bidirectional metadirectory agent a data source converter layer; a filters and rules layer for blocking disallowed changes; a mapping layer for translating attributes in change commands from a local set of attribute names to a set of metadirectory attribute names, and vice versa, and for converting change commands between said agent-internal common format and a directory change protocol; an extensible user customization layer for implementing custom metadirectory agent functions; and a metadirectory interface for sending and receiving said change commands in said directory change protocol.
    Type: Application
    Filed: September 30, 2002
    Publication date: April 1, 2004
    Applicant: International Business Machines Corporation
    Inventors: Krishna Kishore Yellepeddy, Rod Mancisidor
  • Publication number: 20040064729
    Abstract: Through associating each data partition within a replicated storage domain of networked storage devices with one of multiple secret keys shared with a file manager, a credential is issued from the file manager to a client requesting access to a partition. The credential includes a network address for the partition to which the client is to direct its actions. The storage device periodically confirms with the file manager the validity of the shared secret keys. Through logical process and evaluations applied to issuing the credential and determining the address of the partition to be included in each credential, the file manager may invalidate partitions individually, provide load balancing between access of original and replica partitions, and provide security functions such as isolation of partitions for access by and tracking of unauthorized users, or for testing purposes.
    Type: Application
    Filed: September 30, 2002
    Publication date: April 1, 2004
    Applicant: International Business Machines Corporation
    Inventor: Krishna Kishore Yellepeddy
  • Publication number: 20030231629
    Abstract: A system and method for gathering data regarding receivers of multicast content is provided. A spanning tree is used to connect a content producer, such as a pay-per-view broadcaster, to one or more receivers over a computer network, such as the Internet. Clients that wish to join a multicast group to which content is sent join the multicast group at the client's designated multicast router. The router sends information regarding the request, such as a tally of the number of clients that have joined the group, through intermediate routers to an endpoint router as identified by the spanning tree. The content producer is able to use the information, such as the tally and demographic information, to analyze the group of receivers. In a pay-per-view setting, the tally can further be compared to the number of subscribers to determine whether illicit receivers have joined the group, whereupon appropriate action is taken.
    Type: Application
    Filed: June 13, 2002
    Publication date: December 18, 2003
    Applicant: International Business Machines Corporation
    Inventors: Dwip N. Banerjee, Rabindranath Dutta, Kumar Ravi, Krishna Kishore Yellepeddy
  • Publication number: 20030233540
    Abstract: A system and method for securely delivering data content to devices across a computer network, such as the Internet, is provided. A secure channel (i.e., using Secure Socket Layers or other encryption technology) is used to provide details regarding a non-secure channel. The details may include a multicast group identifier if multicast broadcasting is used or a port identifier if a number of ports are used. The legitimate clients receive the details and listen for packets corresponding to the multicast group or port number. The details change periodically or in response to the detection of illicit receivers. Details regarding subsequent non-secure channel details are provided on the secure channel so that legitimate clients are able to continue receiving data packets, while illicit receivers are unable to continue receiving the data stream without interruption.
    Type: Application
    Filed: June 13, 2002
    Publication date: December 18, 2003
    Applicant: International Business Machines Corporation
    Inventors: Dwip N. Banerjee, Kumar Ravi, Krishna Kishore Yellepeddy
  • Publication number: 20030145003
    Abstract: A system and method which propagates change operations to data items within a metadirectory on a differential basis in order to minimize or eliminate redundant updates to attributes within data items that have not changed, as well as conserve computing resources and transmission bandwidth consumed by update activities in large organizations of data items. A best match entry in the metadirectory is selected using a weighted score process, a determination is made as to exactly which attributes are changed by the update operation, and a differential update is propagated throughout the metadirectory via direct joiner access to the data items, or through remote access such as through LDAP.
    Type: Application
    Filed: January 10, 2002
    Publication date: July 31, 2003
    Applicant: International Business Machines Corporation
    Inventors: Krishna Kishore Yellepeddy, Rod Mancisidor
  • Publication number: 20030061092
    Abstract: An apparatus and a method for collaborative voting that maintains anonymity of the voters are provided. With the apparatus and method, information regarding voters is compiled into a database and used to generate one or more interfaces through which another voter or potential voter may be informed of the voting patterns of other voters. Through the apparatus and method, the voter or potential voter may select a subject, an individual voter, one or more groups of voters, a geographical voter area, voting information for various times, and the like. In response to such a selection, voting information for the corresponding selection is provided to the voter. In addition, the apparatus and method may provide an interface through which a voter may enter a comment or the like. The entered comments may then be viewed by other voters or potential voters when the submitter of the comment is selected or is part of a group of voters falling within a category selected by a voter or potential voter.
    Type: Application
    Filed: September 26, 2001
    Publication date: March 27, 2003
    Applicant: International Business Machines Corporation
    Inventors: Rabindranath Dutta, Krishna Kishore Yellepeddy
  • Publication number: 20030036820
    Abstract: The present invention enables a facility (home, business or industrial site) to optimize the consumption of energy in that facility. In this invention, the power companies that supply energy provide information to its client facilities on the cost and availability of energy from that company on a real-time basis. Each client facility would have a power accounting server. These servers store this and process this information to predict when the rates for using the energy will be the least expensive for a particular task or to operate a particular appliance. A homeowner (client facility) for example can program appliances such as a dishwasher or laundry machine to turn on when the cost of energy is below a particular threshold price. The present invention has the capability to receive characteristics about a particular appliance, generate a list of energy consumption options for that particular product at a particular time period and select and implement the most efficient energy supply option.
    Type: Application
    Filed: August 16, 2001
    Publication date: February 20, 2003
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Krishna Kishore Yellepeddy, Rabindranath Dutta
  • Publication number: 20020120841
    Abstract: A architecture for implementing PKI technology is described. Individual processing modules responsive to events are initiated. These individual software module building blocks, or “beans” are placed and linked together in an assembly line-like manner. Each bean is responsive to particular events and does one particular action in the scheme. For example, individual beans are responsive to different format PKI requests from a network, and in turn generate an event corresponding to that request. The event is broadcast to other beans that take the event and perform some other operation in the defined process. Other beans include certificate generators, publishers, manipulators, broadcasters to output streams, and also beans that can act as boolean branches. When strung together, the beans form a cohesive PKI schema. The ability to place beans in the flow and remove them allows great flexibility in developing PKI implementations.
    Type: Application
    Filed: December 15, 2000
    Publication date: August 29, 2002
    Applicant: International Business Machines Corporation
    Inventors: Krishna Kishore Yellepeddy, Lok Yan Leung, Anthony Joseph Nadalin
  • Publication number: 20020120840
    Abstract: A architecture for implementing PKI technology is described. Individual processing modules responsive to events are initiated. These individual software module building blocks, or “beans” are placed and linked together in an assembly line-like manner. Each bean is responsive to particular events and does one particular action in the scheme. For example, individual beans are responsive to different format PKI requests from a network, and in turn generate an event corresponding to that request. The event is broadcast to other beans that take the event and perform some other operation in the defined process. Other beans include certificate generators, publishers, manipulators, broadcasters to output streams, and also beans that can act as boolean branches. When strung together, the beans form a cohesive PKI schema. The ability to place beans in the flow and remove them allows great flexibility in developing PKI implementations.
    Type: Application
    Filed: December 15, 2000
    Publication date: August 29, 2002
    Applicant: International Business Machines Corporation
    Inventors: Krishna Kishore Yellepeddy, Lok Yan Leung, Anthony Joseph Nadalin
  • Publication number: 20020116609
    Abstract: A architecture for implementing PKI technology is described. Individual processing modules responsive to events are initiated. These individual software module building blocks, or “beans” are placed and linked together in an assembly line-like manner. Each bean is responsive to particular events and does one particular action in the scheme. For example, individual beans are responsive to different format PKI requests from a network, and in turn generate an event corresponding to that request. The event is broadcast to other beans that take the event and perform some other operation in the defined process. Other beans include certificate generators, publishers, manipulators, broadcasters to output streams, and also beans that can act as boolean branches. When strung together, the beans form a cohesive PKI schema. The ability to place beans in the flow and remove them allows great flexibility in developing PKI implementations.
    Type: Application
    Filed: December 15, 2000
    Publication date: August 22, 2002
    Applicant: International Business Machines Corporation
    Inventors: Krishna Kishore Yellepeddy, Lok Yan Leung, Anthony Joseph Nadalin
  • Patent number: 6288790
    Abstract: Data processing systems are provided with a mobile print support facility useful for mobile data processing systems such as laptops, notebooks, and the like. When a client data processing system is disconnected from a desired remote print server, or the remote print server is otherwise inaccessible, a local transient printer queue is automatically created and all print jobs submitted by the client data processing system are spooled to the transient printer queue. Once a transient printer queue is created, a mobile print connection manager periodically checks a status of the connection to the remote printer queue. When reconnected, print jobs within the transient printer queue are replayed to the remote printer queue. Print jobs may be replayed in the background or a replay GUI may be spawned to allow the user to manipulate transient printer queues and their contents.
    Type: Grant
    Filed: May 15, 1998
    Date of Patent: September 11, 2001
    Assignee: International Business Machines Corporation
    Inventors: Krishna Kishore Yellepeddy, Keith Edward Carter
  • Patent number: 6052785
    Abstract: A system and method for managing client authorization to access remote data repositories through a middle tier server such as a web server. Client remote data repository access is intercepted by the middle tier server and the server is searched for stored credentials permitting client access to the remote data repository. If found, the stored credentials are used to authenticate access without further interaction with the client system. If no stored credentials are found, the server requests credentials from the client and passes them to the remote data repository for validation. Validated credentials are stored by the server for future use and indexed by a client identifier. Permitted remote data repository access is stored with the validated credentials. Access to a mounted remote file system is not permitted without authorization even if the remote file system would not otherwise require authorization.
    Type: Grant
    Filed: November 21, 1997
    Date of Patent: April 18, 2000
    Assignee: International Business Machines Corporation
    Inventors: David Dah-Haur Lin, Amal Ahmed Shaheen, Krishna Kishore Yellepeddy
  • Patent number: 6032227
    Abstract: A system and method for managing a mobile file system cache to maximize data storage and reduce problems from cache full conditions. Cache management automatically determines when the space available in the cache falls below a user-specified threshold. The cache manager attempts to free space needed for caching the next object. Files are deleted from the cache if no server updates are pending and if such deletion will provide the needed space. If automatic deletion does not provide sufficient space, the user is prompted for action. The system user can control the cache by increasing or reducing its size and drive allocation and can explicitly evict clean files from the cache. Cache expansion can be to logical or physical storage devices different than those on which the original cache is stored. The system enables separate storage of temporary files allowing identification and deletion of such files.
    Type: Grant
    Filed: November 18, 1998
    Date of Patent: February 29, 2000
    Assignee: International Business Machines Corporation
    Inventors: Amal Ahmed Shaheen, Krishna Kishore Yellepeddy
  • Patent number: 5893920
    Abstract: A system and method for managing a mobile file system cache to maximize data storage and reduce problems from cache full conditions. Cache management automatically determines when the space available in the cache falls below a user-specified threshold. The cache manager attempts to free space needed for caching the next object. Files are deleted from the cache if no server updates are pending and if such deletion will provide the needed space. If automatic deletion does not provide sufficient space, the user is prompted for action. The system user can control the cache by increasing or reducing its size and drive allocation and can explicitly evict clean files from the cache. Cache expansion can be to logical or physical storage devices different than those on which the original cache is stored. The system enables separate storage of temporary files allowing identification and deletion of such files.
    Type: Grant
    Filed: September 30, 1996
    Date of Patent: April 13, 1999
    Assignee: International Business Machines Corporation
    Inventors: Amal Ahmed Shaheen, Krishna Kishore Yellepeddy
  • Patent number: 5699511
    Abstract: An improved file system apparatus and method for minimizing the length of time a client system waits before declaring a data communication link disconnected. The apparatus and method dynamically modify a file system request time-out value based on the actual length of time required to service each file system request. In one embodiment, a time-out value is determined for each request type based on the actual response time and a buffer time for each request type. The response timer is based on readings from a system clock therefore operating as a low overhead process. A monitoring system periodically tests the server to ensure that a physical connection still exists.
    Type: Grant
    Filed: October 10, 1995
    Date of Patent: December 16, 1997
    Assignee: International Business Machines Corporation
    Inventors: Thomas Joseph Porcaro, Theodore Clayton Waldron, III, Richard Byron Ward, Krishna Kishore Yellepeddy