Patents by Inventor Mahesh S. Paradkar

Mahesh S. Paradkar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10659441
    Abstract: A service interface of an SSL application hosted on at least one computer system in a hosted network selecting at least one authorized cipher suite. An SSL socket of the SSL application negotiating with another SSL socket of another SSL application in the hosted network for a mutual cipher from among the at least one authorized cipher suite and a shared key to encrypt information exchanged during a secure session. Responsive to establishing a security connection between the SSL socket and the another SSL socket using the selected mutual cipher, the service interface sends to a centralized service an identifier of the selected mutual cipher. Responsive to the service interface receiving a revoked cipher alert from the centralized service, the service interface revokes one or more sessions of the SSL application using a revoked cipher in the revoked cipher alert matching the selected mutual cipher.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: May 19, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rinkesh I. Bansal, Shiv S. Jha, Sanjay B. Panchal, Mahesh S. Paradkar, Chintan Thaker
  • Publication number: 20190199696
    Abstract: A service interface of an SSL application hosted on at least one computer system in a hosted network selecting at least one authorized cipher suite. An SSL socket of the SSL application negotiating with another SSL socket of another SSL application in the hosted network for a mutual cipher from among the at least one authorized cipher suite and a shared key to encrypt information exchanged during a secure session. Responsive to establishing a security connection between the SSL socket and the another SSL socket using the selected mutual cipher, the service interface sends to a centralized service an identifier of the selected mutual cipher. Responsive to the service interface receiving a revoked cipher alert from the centralized service, the service interface revokes one or more sessions of the SSL application using a revoked cipher in the revoked cipher alert matching the selected mutual cipher.
    Type: Application
    Filed: December 10, 2018
    Publication date: June 27, 2019
    Inventors: RINKESH I. BANSAL, SHIV S. JHA, SANJAY B. PANCHAL, MAHESH S. PARADKAR, CHINTAN THAKER
  • Patent number: 10218686
    Abstract: At a centralized service in a hosted environment, a permission list is established of at least one cipher suite valid for secure connections across multiple network environments. Responsive to the centralized service receiving a request from a socket indicating the socket is negotiating a secure connection with another socket, the centralized service sends the permission list to the socket, wherein the socket negotiates for a mutual cipher suite specified in the permission list with the another socket. Responsive to the centralized service identifying that a particular cipher suite matching the mutual cipher suite used in an ongoing secure session for the socket is revoked, the centralized service notifies the socket that the mutual cipher suite is revoked.
    Type: Grant
    Filed: October 24, 2016
    Date of Patent: February 26, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rinkesh I. Bansal, Shiv S. Jha, Sanjay B. Panchal, Mahesh S. Paradkar, Chintan Thaker
  • Publication number: 20180270248
    Abstract: Controlling access to a secure resource. Data relating to social media history information, demographic information, and psychometric information regarding a user having access to a secure resource is mined by a computer system. Mined data that indicates a potential security risk that meets a predefined security criteria with respect to the secure resource is identified by the computer system. A security risk level based on the identified data is determined. A level of access to the secure resource by the user computing device is set, based on one or more predetermined threshold values that are met, in response to a determination regarding such. Access is granted to the secure resource in accordance with the set level of access, in response to receiving a request to access the secure resource by the computer system.
    Type: Application
    Filed: March 14, 2017
    Publication date: September 20, 2018
    Inventors: Lisa M. Bradley, Liam Harpur, Vivek Jain, Mahesh S. Paradkar, Aaron J. Quirk, Lin Sun
  • Publication number: 20180270250
    Abstract: Access to a secure resource is controlled. Data relating to social media history information, demographic information, and psychometric information regarding a user having access to a secure resource is mined by a computer system. Mined data that indicates a potential security risk that meets a predefined security criteria with respect to the secure resource is identified by the computer system. A security risk level based on the identified data is determined. A level of access to the secure resource by the user computing device is set, based on one or more predetermined threshold values that are met, in response to a determination regarding such. Access is granted to the secure resource in accordance with the set level of access, in response to receiving a request to access the secure resource by the computer system.
    Type: Application
    Filed: September 14, 2017
    Publication date: September 20, 2018
    Inventors: Lisa M. Bradley, Liam Harpur, Vivek Jain, Mahesh S. Paradkar, Aaron J. Quirk, Lin Sun
  • Patent number: 10069842
    Abstract: Access to a secure resource is controlled. Data relating to social media history information, demographic information, and psychometric information regarding a user having access to a secure resource is mined by a computer system. Mined data that indicates a potential security risk that meets a predefined security criteria with respect to the secure resource is identified by the computer system. A security risk level based on the identified data is determined. A level of access to the secure resource by the user computing device is set, based on one or more predetermined threshold values that are met, in response to a determination regarding such. Access is granted to the secure resource in accordance with the set level of access, in response to receiving a request to access the secure resource by the computer system.
    Type: Grant
    Filed: September 14, 2017
    Date of Patent: September 4, 2018
    Assignee: International Business Machines Corporation
    Inventors: Lisa M. Bradley, Liam Harpur, Vivek Jain, Mahesh S. Paradkar, Aaron J. Quirk, Lin Sun
  • Publication number: 20180115521
    Abstract: At a centralized service in a hosted environment, a permission list is established of at least one cipher suite valid for secure connections across multiple network environments. Responsive to the centralized service receiving a request from a socket indicating the socket is negotiating a secure connection with another socket, the centralized service sends the permission list to the socket, wherein the socket negotiates for a mutual cipher suite specified in the permission list with the another socket. Responsive to the centralized service identifying that a particular cipher suite matching the mutual cipher suite used in an ongoing secure session for the socket is revoked, the centralized service notifies the socket that the mutual cipher suite is revoked.
    Type: Application
    Filed: October 24, 2016
    Publication date: April 26, 2018
    Inventors: RINKESH I. BANSAL, SHIV S. JHA, SANJAY B. PANCHAL, MAHESH S. PARADKAR, CHINTAN THAKER
  • Publication number: 20130282705
    Abstract: A method which on determination of an entity replacement request is configured to identify an optimized entity as a replacement based on a predefined set of metadata, wherein the metadata comprises a profile associated with the entity, wherein the profile of the entity is further based on a graph, such as a graphical representation of social links, associated with the entity; and provide the optimized entity as a replacement for the entity to be replaced. Other embodiments are also disclosed.
    Type: Application
    Filed: April 24, 2012
    Publication date: October 24, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: CHIRAG K. BARHATE, MAHESH S. PARADKAR, Bhooshan P. Kelkar
  • Publication number: 20130253991
    Abstract: A method for maintaining professional-social networks can begin with the automatic creation of a professional-social network for each member of an organization by a professional-social network tool based upon electronic communication analysis. Each member can have a uniquely-identified organizational position within an organizational model of the organization. A professional-social network can be comprised of nodes representing the member's contacts that can be connected to the member by relationships that express an interaction context. In response to a change from a currently-held first organizational position to a second organizational position for a specified member, the specified member can be dissociated from the professional-social network of the first organizational position. The specified member can then be associated with the professional-social network of the second organizational position.
    Type: Application
    Filed: May 30, 2012
    Publication date: September 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: CHIRAG K. BARHATE, Mahesh S. Paradkar
  • Publication number: 20130253989
    Abstract: A method for maintaining professional-social networks can begin with the automatic creation of a professional-social network for each member of an organization by a professional-social network tool based upon electronic communication analysis. Each member can have a uniquely-identified organizational position within an organizational model of the organization. A professional-social network can be comprised of nodes representing the member's contacts that can be connected to the member by relationships that express an interaction context. In response to a change from a currently-held first organizational position to a second organizational position for a specified member, the specified member can be dissociated from the professional-social network of the first organizational position. The specified member can then be associated with the professional-social network of the second organizational position.
    Type: Application
    Filed: March 21, 2012
    Publication date: September 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: CHIRAG K. BARHATE, MAHESH S. PARADKAR
  • Patent number: 7165194
    Abstract: A computer software program is used to capture configuration values of predetermined parameters of vendor software and an operating system on which the vendor software is installed. Configuration values of predetermined parameters can be collected from more than one computer in a networked environment. A collated report of configuration values from the customer computer systems is sent to the vendor for diagnosis of the technical problem experienced by the customer.
    Type: Grant
    Filed: December 9, 2002
    Date of Patent: January 16, 2007
    Assignee: International Business Machines Corporation
    Inventor: Mahesh S. Paradkar
  • Publication number: 20040153764
    Abstract: A computer software program is used to capture configuration values of predetermined parameters of vendor software and an operating system on which the vendor software is installed. Configuration values of predetermined parameters can be collected from more than one computer in a networked environment. A collated report of configuration values from the customer computer systems is sent to the vendor for diagnosis of the technical problem experienced by the customer.
    Type: Application
    Filed: December 9, 2002
    Publication date: August 5, 2004
    Applicant: International Business Machines Corporation
    Inventor: Mahesh S. Paradkar