Patents by Inventor Manoj Khangaonkar

Manoj Khangaonkar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9514201
    Abstract: A system has a repository that stores a plurality of events. Each event requests to utilize one or more functions in a component. An event sequencing module analyzes an event sequencing key of the event if the event requests a function having a component definition that includes an event sequence qualifier. The event sequencing module grants a lock to the event for the function if no other event having the same value for the event sequencing key has the lock for the function. The event sequencing module prevents the event from being processed if another event having the same value for the event sequencing key has the lock for the function. The event sequencing key is composed of one or more object attributes. The system has a worker server that receives the event, if the event obtains the lock, and processes the function requested by the event.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: December 6, 2016
    Assignee: International Business Machines Corporation
    Inventors: Atul R. Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
  • Patent number: 9274857
    Abstract: A computer program product is disclosed. The computer program product includes a computer useable medium that has a computer readable program. The computer readable program when executive on a computer causes the computer to receive a request from a component to invoke a function. Further, the computer readable program, when executed on a computer, causes the computer to asynchronously perform the function according to the request. In addition, the computer readable program, when executed on a computer, causes the computer to provide, to one or more programs, an indication that the function has completed work according to the request.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: March 1, 2016
    Assignee: International Business Machines Corporation
    Inventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
  • Patent number: 9047144
    Abstract: A system and method for providing Quality-of-Service (QoS) functions to concurrent event-processing applications in a multi-processing database environment are described. The system includes an Event-Listener interface for determining the QoS functions applicable to the events being processed and an Event-Service interface for invoking the determined QoS functions. The Event-Service interface loads, initializes and activates the QoS functions. The QoS functions are based on service definitions. The Event-Service interface further initializes the service providers and sends the events that need QoS support to the respective service providers for processing. The QoS functions include the services commonly needed in a clustered event-processing database system like Event-Sequencing, Event-Isolation, High-Availability, Event-Filtering and Flow-Control. Other QoS functions might be added to the database system using the same interfaces provided by the invention.
    Type: Grant
    Filed: November 4, 2009
    Date of Patent: June 2, 2015
    Assignee: International Business Machines Corporation
    Inventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
  • Patent number: 8549144
    Abstract: Provided are a method, system, and article of manufacture for a common configuration framework for applications to configure database objects and resources. configuration interfaces are maintained for a plurality of different database types, wherein each configuration interface implements a database configuration operation with respect to a database of one database type. A configuration request is received from an application indicating a database type, database name, and a database configuration operation. A determination is made of one of the configuration interfaces for the requested database type to implement the requested configuration operation with respect to the database having the database name. The determined configuration interface is invoked with the requested database name to perform the requested configuration operation with respect to the database name.
    Type: Grant
    Filed: August 31, 2007
    Date of Patent: October 1, 2013
    Assignee: International Business Machines Corporation
    Inventors: Manoj Khangaonkar, Wen Chao Li, Weixin Xu, Kai Mike Zhang
  • Patent number: 8392700
    Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
    Type: Grant
    Filed: July 2, 2008
    Date of Patent: March 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
  • Patent number: 8032588
    Abstract: A method for hosting one or more versions of a service using a service proxy includes specifying an interface definition of a service which defines and uniquely identifies an interface version for the service, and an implementation definition of the service which uniquely identifies an implementation version for the service; generating one or more service proxies each representing an interface version of a service; providing a proxy configuration that contains entries for a plurality of service implementation versions, wherein each proxy utilizes the proxy configuration to access a certain one or more of the implementation versions which share the same or a compatible interface version of a service, and wherein the proxy configuration contains attributes that include information about each of the implementation versions; and wherein the proxy dynamically selects one of the implementation versions in the proxy configuration to route one or more client service requests to based on the attributes.
    Type: Grant
    Filed: June 23, 2008
    Date of Patent: October 4, 2011
    Assignee: International Business Machines Corporation
    Inventors: Ru Fang, Liana L. Fong, David C. Frank, Manoj Khangaonkar, Linh H. Lam
  • Publication number: 20110107354
    Abstract: A system and method for providing Quality-of-Service (QoS) functions to concurrent event-processing applications in a multi-processing database environment are described. The system includes an Event-Listener interface for determining the QoS functions applicable to the events being processed and an Event-Service interface for invoking the determined QoS functions. The Event-Service interface loads, initializes and activates the QoS functions. The QoS functions are based on service definitions. The Event-Service interface further initializes the service providers and sends the events that need QoS support to the respective service providers for processing. The QoS functions include the services commonly needed in a clustered event-processing database system like Event-Sequencing, Event-Isolation, High-Availability, Event-Filtering and Flow-Control. Other QoS functions might be added to the database system using the same interfaces provided by the invention.
    Type: Application
    Filed: November 4, 2009
    Publication date: May 5, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
  • Publication number: 20100153164
    Abstract: A system and method for business calendar event modeling comprises receiving a plurality of events from a computerized calendar user wherein each event is classified as an OnTime, OffTime or OtherTime event. Wherein, an OnTime event is defined as a calendar period where the calendar user is available, an OffTime event is defined as a calendar period where the calendar user is unavailable; and an OtherTime event is defined as a calendar period unrelated to the calendar user's availability. Then, calculating the calendar user's net OnTime, wherein net OnTime is a sum of periods of a day wherein an OnTime event period does not overlap with an OffTime event period. Also, calculating user available days wherein a user available day is a day having net OnTime. Calculating the number of user available days, hours and minutes before an event.
    Type: Application
    Filed: December 11, 2008
    Publication date: June 17, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Atul Ravindra DAHERKAR, Manoj KHANGAONKAR, Chidanandan THEYANCHERI, Kai Mike ZHANG
  • Patent number: 7644266
    Abstract: An apparatus, system, and method are disclosed for selective, end-to-end message level security. The apparatus includes a message class definition module, a security module, and a messaging module. The message class definition module identifies a predetermined message class of an internode message. The security module applies security to the message at an application layer. The security that is applied to the message corresponds to a security level, which depends on the message class of the message. The security may include encryption, authentication, and/or other security features. The messaging module communicates the message between a first node and a second node. A third node, such as a broker, may be interposed between the first and second nodes, in which case the security of the message is preserved at the third node.
    Type: Grant
    Filed: September 23, 2004
    Date of Patent: January 5, 2010
    Assignee: International Business Machines Corporation
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
  • Publication number: 20090319651
    Abstract: A method for hosting one or more versions of a service using a service proxy includes specifying an interface definition of a service which defines and uniquely identifies an interface version for the service, and an implementation definition of the service which uniquely identifies an implementation version for the service; generating one or more service proxies each representing an interface version of a service; providing a proxy configuration that contains entries for a plurality of service implementation versions, wherein each proxy utilizes the proxy configuration to access a certain one or more of the implementation versions which share the same or a compatible interface version of a service, and wherein the proxy configuration contains attributes that include information about each of the implementation versions; and wherein the proxy dynamically selects one of the implementation versions in the proxy configuration to route one or more client service requests to based on the attributes.
    Type: Application
    Filed: June 23, 2008
    Publication date: December 24, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ru Fang, Liana L. Fong, David C. Frank, Manoj Khangaonkar, Linh H. Lam
  • Patent number: 7617500
    Abstract: A method, system, and computer program code for integrating components with different interfaces in an enterprise application integration environment. When an enterprise application is assembled, a user may try to wire a component to another component in the enterprise. However, if the reference on the source component does not match the interface on the target component, the components cannot be wired together. In this situation, the user is prompted to introduce an interface mediation component between the source and target application components. The mediation component comprises an interface matching the reference on the source component and a reference matching the interface on the target component. The mediation component mediates the different interfaces at runtime by binding an operation in the source component to an operation in the target component, and performing a parameter mediation of parameters in the first operation to parameters in the second operation.
    Type: Grant
    Filed: May 20, 2005
    Date of Patent: November 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: Kenneth Astl, Atul Ravindra Daherkar, Manoj Khangaonkar, Edwin V. Sapugay, Larry Hwang-Chi Tung
  • Patent number: 7607006
    Abstract: A method is disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The method includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
    Type: Grant
    Filed: September 23, 2004
    Date of Patent: October 20, 2009
    Assignee: International Business Machines Corporation
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
  • Publication number: 20090063563
    Abstract: Provided are a method, system, and article of manufacture for a common configuration framework for applications to configure database objects and resources. Configuration interfaces are maintained for a plurality of different database types, wherein each configuration interface implements a database configuration operation with respect to a database of one database type. A configuration request is received from an application indicating a database type, database name, and a database configuration operation. A determination is made of one of the configuration interfaces for the requested database type to implement the requested configuration operation with respect to the database having the database name. The determined configuration interface is invoked with the requested database name to perform the requested configuration operation with respect to the database name.
    Type: Application
    Filed: August 31, 2007
    Publication date: March 5, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Manoj Khangaonkar, Wen Chao Li, Weixin Xu, Kai Mike Zhang
  • Publication number: 20080285752
    Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
    Type: Application
    Filed: July 2, 2008
    Publication date: November 20, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
  • Publication number: 20080148299
    Abstract: A computer program product is disclosed. The computer program product includes a computer useable medium that has a computer readable program. The computer readable program when executive on a computer causes the computer to receive a request from a component to invoke a function. Further, the computer readable program, when executed on a computer, causes the computer to asynchronously perform the function according to the request. In addition, the computer readable program, when executed on a computer, causes the computer to provide, to one or more programs, an indication that the function has completed work according to the request.
    Type: Application
    Filed: October 13, 2006
    Publication date: June 19, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
  • Publication number: 20080091712
    Abstract: A system has a repository that stores a plurality of events. Each event requests to utilize one or more functions in a component. An event sequencing module analyzes an event sequencing key of the event if the event requests a function having a component definition that includes an event sequence qualifier. The event sequencing module grants a lock to the event for the function if no other event having the same value for the event sequencing key has the lock for the function. The event sequencing module prevents the event from being processed if another event having the same value for the event sequencing key has the lock for the function. The event sequencing key is composed of one or more object attributes. The system has a worker server that receives the event, if the event obtains the lock, and processes the function requested by the event.
    Type: Application
    Filed: October 13, 2006
    Publication date: April 17, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Atul R. Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
  • Publication number: 20060265719
    Abstract: A method, system, and computer program code for integrating components with different interfaces in an enterprise application integration environment. When an enterprise application is assembled, a user may try to wire a component to another component in the enterprise. However, if the reference on the source component does not match the interface on the target component, the components cannot be wired together. In this situation, the user is prompted to introduce an interface mediation component between the source and target application components. The mediation component comprises an interface matching the reference on the source component and a reference matching the interface on the target component. The mediation component mediates the different interfaces at runtime by binding an operation in the source component to an operation in the target component, and performing a parameter mediation of parameters in the first operation to parameters in the second operation.
    Type: Application
    Filed: May 20, 2005
    Publication date: November 23, 2006
    Applicant: International Business Machines Corporation
    Inventors: Kenneth Astl, Atul Daherkar, Manoj Khangaonkar, Edwin Sapugay, Larry Tung
  • Publication number: 20060064736
    Abstract: An apparatus, system, and method are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
    Type: Application
    Filed: September 23, 2004
    Publication date: March 23, 2006
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Zhang
  • Publication number: 20060064751
    Abstract: An apparatus, system, and method are disclosed for selective, end-to-end message level security. The apparatus includes a message class definition module, a security module, and a messaging module. The message class definition module identifies a predetermined message class of an internode message. The security module applies security to the message at an application layer. The security that is applied to the message corresponds to a security level, which depends on the message class of the message. The security may include encryption, authentication, and/or other security features. The messaging module communicates the message between a first node and a second node. A third node, such as a broker, may be interposed between the first and second nodes, in which case the security of the message is preserved at the third node.
    Type: Application
    Filed: September 23, 2004
    Publication date: March 23, 2006
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Zhang
  • Publication number: 20050102500
    Abstract: A system for integrating applications in different enterprises separated by firewalls comprises: an input for receiving high level business data from a source application; an encryption engine for encrypting the business data to produce encrypted business data; a queue manager for receiving the encrypted business data and for storing the business data for delivery to a target application; and an output for transmitting the encrypted business data to the target application; wherein the system and the target application are separated by at least one firewall.
    Type: Application
    Filed: November 12, 2003
    Publication date: May 12, 2005
    Inventors: Manoj Khangaonkar, Adwait Sathye