Patents by Inventor Mahesh S. Paradkar
Mahesh S. Paradkar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10659441Abstract: A service interface of an SSL application hosted on at least one computer system in a hosted network selecting at least one authorized cipher suite. An SSL socket of the SSL application negotiating with another SSL socket of another SSL application in the hosted network for a mutual cipher from among the at least one authorized cipher suite and a shared key to encrypt information exchanged during a secure session. Responsive to establishing a security connection between the SSL socket and the another SSL socket using the selected mutual cipher, the service interface sends to a centralized service an identifier of the selected mutual cipher. Responsive to the service interface receiving a revoked cipher alert from the centralized service, the service interface revokes one or more sessions of the SSL application using a revoked cipher in the revoked cipher alert matching the selected mutual cipher.Type: GrantFiled: December 10, 2018Date of Patent: May 19, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rinkesh I. Bansal, Shiv S. Jha, Sanjay B. Panchal, Mahesh S. Paradkar, Chintan Thaker
-
Publication number: 20190199696Abstract: A service interface of an SSL application hosted on at least one computer system in a hosted network selecting at least one authorized cipher suite. An SSL socket of the SSL application negotiating with another SSL socket of another SSL application in the hosted network for a mutual cipher from among the at least one authorized cipher suite and a shared key to encrypt information exchanged during a secure session. Responsive to establishing a security connection between the SSL socket and the another SSL socket using the selected mutual cipher, the service interface sends to a centralized service an identifier of the selected mutual cipher. Responsive to the service interface receiving a revoked cipher alert from the centralized service, the service interface revokes one or more sessions of the SSL application using a revoked cipher in the revoked cipher alert matching the selected mutual cipher.Type: ApplicationFiled: December 10, 2018Publication date: June 27, 2019Inventors: RINKESH I. BANSAL, SHIV S. JHA, SANJAY B. PANCHAL, MAHESH S. PARADKAR, CHINTAN THAKER
-
Patent number: 10218686Abstract: At a centralized service in a hosted environment, a permission list is established of at least one cipher suite valid for secure connections across multiple network environments. Responsive to the centralized service receiving a request from a socket indicating the socket is negotiating a secure connection with another socket, the centralized service sends the permission list to the socket, wherein the socket negotiates for a mutual cipher suite specified in the permission list with the another socket. Responsive to the centralized service identifying that a particular cipher suite matching the mutual cipher suite used in an ongoing secure session for the socket is revoked, the centralized service notifies the socket that the mutual cipher suite is revoked.Type: GrantFiled: October 24, 2016Date of Patent: February 26, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rinkesh I. Bansal, Shiv S. Jha, Sanjay B. Panchal, Mahesh S. Paradkar, Chintan Thaker
-
Publication number: 20180270248Abstract: Controlling access to a secure resource. Data relating to social media history information, demographic information, and psychometric information regarding a user having access to a secure resource is mined by a computer system. Mined data that indicates a potential security risk that meets a predefined security criteria with respect to the secure resource is identified by the computer system. A security risk level based on the identified data is determined. A level of access to the secure resource by the user computing device is set, based on one or more predetermined threshold values that are met, in response to a determination regarding such. Access is granted to the secure resource in accordance with the set level of access, in response to receiving a request to access the secure resource by the computer system.Type: ApplicationFiled: March 14, 2017Publication date: September 20, 2018Inventors: Lisa M. Bradley, Liam Harpur, Vivek Jain, Mahesh S. Paradkar, Aaron J. Quirk, Lin Sun
-
Publication number: 20180270250Abstract: Access to a secure resource is controlled. Data relating to social media history information, demographic information, and psychometric information regarding a user having access to a secure resource is mined by a computer system. Mined data that indicates a potential security risk that meets a predefined security criteria with respect to the secure resource is identified by the computer system. A security risk level based on the identified data is determined. A level of access to the secure resource by the user computing device is set, based on one or more predetermined threshold values that are met, in response to a determination regarding such. Access is granted to the secure resource in accordance with the set level of access, in response to receiving a request to access the secure resource by the computer system.Type: ApplicationFiled: September 14, 2017Publication date: September 20, 2018Inventors: Lisa M. Bradley, Liam Harpur, Vivek Jain, Mahesh S. Paradkar, Aaron J. Quirk, Lin Sun
-
Patent number: 10069842Abstract: Access to a secure resource is controlled. Data relating to social media history information, demographic information, and psychometric information regarding a user having access to a secure resource is mined by a computer system. Mined data that indicates a potential security risk that meets a predefined security criteria with respect to the secure resource is identified by the computer system. A security risk level based on the identified data is determined. A level of access to the secure resource by the user computing device is set, based on one or more predetermined threshold values that are met, in response to a determination regarding such. Access is granted to the secure resource in accordance with the set level of access, in response to receiving a request to access the secure resource by the computer system.Type: GrantFiled: September 14, 2017Date of Patent: September 4, 2018Assignee: International Business Machines CorporationInventors: Lisa M. Bradley, Liam Harpur, Vivek Jain, Mahesh S. Paradkar, Aaron J. Quirk, Lin Sun
-
Publication number: 20180115521Abstract: At a centralized service in a hosted environment, a permission list is established of at least one cipher suite valid for secure connections across multiple network environments. Responsive to the centralized service receiving a request from a socket indicating the socket is negotiating a secure connection with another socket, the centralized service sends the permission list to the socket, wherein the socket negotiates for a mutual cipher suite specified in the permission list with the another socket. Responsive to the centralized service identifying that a particular cipher suite matching the mutual cipher suite used in an ongoing secure session for the socket is revoked, the centralized service notifies the socket that the mutual cipher suite is revoked.Type: ApplicationFiled: October 24, 2016Publication date: April 26, 2018Inventors: RINKESH I. BANSAL, SHIV S. JHA, SANJAY B. PANCHAL, MAHESH S. PARADKAR, CHINTAN THAKER
-
Publication number: 20130282705Abstract: A method which on determination of an entity replacement request is configured to identify an optimized entity as a replacement based on a predefined set of metadata, wherein the metadata comprises a profile associated with the entity, wherein the profile of the entity is further based on a graph, such as a graphical representation of social links, associated with the entity; and provide the optimized entity as a replacement for the entity to be replaced. Other embodiments are also disclosed.Type: ApplicationFiled: April 24, 2012Publication date: October 24, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: CHIRAG K. BARHATE, MAHESH S. PARADKAR, Bhooshan P. Kelkar
-
Publication number: 20130253991Abstract: A method for maintaining professional-social networks can begin with the automatic creation of a professional-social network for each member of an organization by a professional-social network tool based upon electronic communication analysis. Each member can have a uniquely-identified organizational position within an organizational model of the organization. A professional-social network can be comprised of nodes representing the member's contacts that can be connected to the member by relationships that express an interaction context. In response to a change from a currently-held first organizational position to a second organizational position for a specified member, the specified member can be dissociated from the professional-social network of the first organizational position. The specified member can then be associated with the professional-social network of the second organizational position.Type: ApplicationFiled: May 30, 2012Publication date: September 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: CHIRAG K. BARHATE, Mahesh S. Paradkar
-
Publication number: 20130253989Abstract: A method for maintaining professional-social networks can begin with the automatic creation of a professional-social network for each member of an organization by a professional-social network tool based upon electronic communication analysis. Each member can have a uniquely-identified organizational position within an organizational model of the organization. A professional-social network can be comprised of nodes representing the member's contacts that can be connected to the member by relationships that express an interaction context. In response to a change from a currently-held first organizational position to a second organizational position for a specified member, the specified member can be dissociated from the professional-social network of the first organizational position. The specified member can then be associated with the professional-social network of the second organizational position.Type: ApplicationFiled: March 21, 2012Publication date: September 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: CHIRAG K. BARHATE, MAHESH S. PARADKAR
-
Patent number: 7165194Abstract: A computer software program is used to capture configuration values of predetermined parameters of vendor software and an operating system on which the vendor software is installed. Configuration values of predetermined parameters can be collected from more than one computer in a networked environment. A collated report of configuration values from the customer computer systems is sent to the vendor for diagnosis of the technical problem experienced by the customer.Type: GrantFiled: December 9, 2002Date of Patent: January 16, 2007Assignee: International Business Machines CorporationInventor: Mahesh S. Paradkar
-
Publication number: 20040153764Abstract: A computer software program is used to capture configuration values of predetermined parameters of vendor software and an operating system on which the vendor software is installed. Configuration values of predetermined parameters can be collected from more than one computer in a networked environment. A collated report of configuration values from the customer computer systems is sent to the vendor for diagnosis of the technical problem experienced by the customer.Type: ApplicationFiled: December 9, 2002Publication date: August 5, 2004Applicant: International Business Machines CorporationInventor: Mahesh S. Paradkar