Patents by Inventor Manoj Khangaonkar
Manoj Khangaonkar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9514201Abstract: A system has a repository that stores a plurality of events. Each event requests to utilize one or more functions in a component. An event sequencing module analyzes an event sequencing key of the event if the event requests a function having a component definition that includes an event sequence qualifier. The event sequencing module grants a lock to the event for the function if no other event having the same value for the event sequencing key has the lock for the function. The event sequencing module prevents the event from being processed if another event having the same value for the event sequencing key has the lock for the function. The event sequencing key is composed of one or more object attributes. The system has a worker server that receives the event, if the event obtains the lock, and processes the function requested by the event.Type: GrantFiled: October 13, 2006Date of Patent: December 6, 2016Assignee: International Business Machines CorporationInventors: Atul R. Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Patent number: 9274857Abstract: A computer program product is disclosed. The computer program product includes a computer useable medium that has a computer readable program. The computer readable program when executive on a computer causes the computer to receive a request from a component to invoke a function. Further, the computer readable program, when executed on a computer, causes the computer to asynchronously perform the function according to the request. In addition, the computer readable program, when executed on a computer, causes the computer to provide, to one or more programs, an indication that the function has completed work according to the request.Type: GrantFiled: October 13, 2006Date of Patent: March 1, 2016Assignee: International Business Machines CorporationInventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Patent number: 9047144Abstract: A system and method for providing Quality-of-Service (QoS) functions to concurrent event-processing applications in a multi-processing database environment are described. The system includes an Event-Listener interface for determining the QoS functions applicable to the events being processed and an Event-Service interface for invoking the determined QoS functions. The Event-Service interface loads, initializes and activates the QoS functions. The QoS functions are based on service definitions. The Event-Service interface further initializes the service providers and sends the events that need QoS support to the respective service providers for processing. The QoS functions include the services commonly needed in a clustered event-processing database system like Event-Sequencing, Event-Isolation, High-Availability, Event-Filtering and Flow-Control. Other QoS functions might be added to the database system using the same interfaces provided by the invention.Type: GrantFiled: November 4, 2009Date of Patent: June 2, 2015Assignee: International Business Machines CorporationInventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Patent number: 8549144Abstract: Provided are a method, system, and article of manufacture for a common configuration framework for applications to configure database objects and resources. configuration interfaces are maintained for a plurality of different database types, wherein each configuration interface implements a database configuration operation with respect to a database of one database type. A configuration request is received from an application indicating a database type, database name, and a database configuration operation. A determination is made of one of the configuration interfaces for the requested database type to implement the requested configuration operation with respect to the database having the database name. The determined configuration interface is invoked with the requested database name to perform the requested configuration operation with respect to the database name.Type: GrantFiled: August 31, 2007Date of Patent: October 1, 2013Assignee: International Business Machines CorporationInventors: Manoj Khangaonkar, Wen Chao Li, Weixin Xu, Kai Mike Zhang
-
Patent number: 8392700Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: GrantFiled: July 2, 2008Date of Patent: March 5, 2013Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Patent number: 8032588Abstract: A method for hosting one or more versions of a service using a service proxy includes specifying an interface definition of a service which defines and uniquely identifies an interface version for the service, and an implementation definition of the service which uniquely identifies an implementation version for the service; generating one or more service proxies each representing an interface version of a service; providing a proxy configuration that contains entries for a plurality of service implementation versions, wherein each proxy utilizes the proxy configuration to access a certain one or more of the implementation versions which share the same or a compatible interface version of a service, and wherein the proxy configuration contains attributes that include information about each of the implementation versions; and wherein the proxy dynamically selects one of the implementation versions in the proxy configuration to route one or more client service requests to based on the attributes.Type: GrantFiled: June 23, 2008Date of Patent: October 4, 2011Assignee: International Business Machines CorporationInventors: Ru Fang, Liana L. Fong, David C. Frank, Manoj Khangaonkar, Linh H. Lam
-
Publication number: 20110107354Abstract: A system and method for providing Quality-of-Service (QoS) functions to concurrent event-processing applications in a multi-processing database environment are described. The system includes an Event-Listener interface for determining the QoS functions applicable to the events being processed and an Event-Service interface for invoking the determined QoS functions. The Event-Service interface loads, initializes and activates the QoS functions. The QoS functions are based on service definitions. The Event-Service interface further initializes the service providers and sends the events that need QoS support to the respective service providers for processing. The QoS functions include the services commonly needed in a clustered event-processing database system like Event-Sequencing, Event-Isolation, High-Availability, Event-Filtering and Flow-Control. Other QoS functions might be added to the database system using the same interfaces provided by the invention.Type: ApplicationFiled: November 4, 2009Publication date: May 5, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Publication number: 20100153164Abstract: A system and method for business calendar event modeling comprises receiving a plurality of events from a computerized calendar user wherein each event is classified as an OnTime, OffTime or OtherTime event. Wherein, an OnTime event is defined as a calendar period where the calendar user is available, an OffTime event is defined as a calendar period where the calendar user is unavailable; and an OtherTime event is defined as a calendar period unrelated to the calendar user's availability. Then, calculating the calendar user's net OnTime, wherein net OnTime is a sum of periods of a day wherein an OnTime event period does not overlap with an OffTime event period. Also, calculating user available days wherein a user available day is a day having net OnTime. Calculating the number of user available days, hours and minutes before an event.Type: ApplicationFiled: December 11, 2008Publication date: June 17, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Atul Ravindra DAHERKAR, Manoj KHANGAONKAR, Chidanandan THEYANCHERI, Kai Mike ZHANG
-
Patent number: 7644266Abstract: An apparatus, system, and method are disclosed for selective, end-to-end message level security. The apparatus includes a message class definition module, a security module, and a messaging module. The message class definition module identifies a predetermined message class of an internode message. The security module applies security to the message at an application layer. The security that is applied to the message corresponds to a security level, which depends on the message class of the message. The security may include encryption, authentication, and/or other security features. The messaging module communicates the message between a first node and a second node. A third node, such as a broker, may be interposed between the first and second nodes, in which case the security of the message is preserved at the third node.Type: GrantFiled: September 23, 2004Date of Patent: January 5, 2010Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Publication number: 20090319651Abstract: A method for hosting one or more versions of a service using a service proxy includes specifying an interface definition of a service which defines and uniquely identifies an interface version for the service, and an implementation definition of the service which uniquely identifies an implementation version for the service; generating one or more service proxies each representing an interface version of a service; providing a proxy configuration that contains entries for a plurality of service implementation versions, wherein each proxy utilizes the proxy configuration to access a certain one or more of the implementation versions which share the same or a compatible interface version of a service, and wherein the proxy configuration contains attributes that include information about each of the implementation versions; and wherein the proxy dynamically selects one of the implementation versions in the proxy configuration to route one or more client service requests to based on the attributes.Type: ApplicationFiled: June 23, 2008Publication date: December 24, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ru Fang, Liana L. Fong, David C. Frank, Manoj Khangaonkar, Linh H. Lam
-
Patent number: 7617500Abstract: A method, system, and computer program code for integrating components with different interfaces in an enterprise application integration environment. When an enterprise application is assembled, a user may try to wire a component to another component in the enterprise. However, if the reference on the source component does not match the interface on the target component, the components cannot be wired together. In this situation, the user is prompted to introduce an interface mediation component between the source and target application components. The mediation component comprises an interface matching the reference on the source component and a reference matching the interface on the target component. The mediation component mediates the different interfaces at runtime by binding an operation in the source component to an operation in the target component, and performing a parameter mediation of parameters in the first operation to parameters in the second operation.Type: GrantFiled: May 20, 2005Date of Patent: November 10, 2009Assignee: International Business Machines CorporationInventors: Kenneth Astl, Atul Ravindra Daherkar, Manoj Khangaonkar, Edwin V. Sapugay, Larry Hwang-Chi Tung
-
Patent number: 7607006Abstract: A method is disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The method includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: GrantFiled: September 23, 2004Date of Patent: October 20, 2009Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Publication number: 20090063563Abstract: Provided are a method, system, and article of manufacture for a common configuration framework for applications to configure database objects and resources. Configuration interfaces are maintained for a plurality of different database types, wherein each configuration interface implements a database configuration operation with respect to a database of one database type. A configuration request is received from an application indicating a database type, database name, and a database configuration operation. A determination is made of one of the configuration interfaces for the requested database type to implement the requested configuration operation with respect to the database having the database name. The determined configuration interface is invoked with the requested database name to perform the requested configuration operation with respect to the database name.Type: ApplicationFiled: August 31, 2007Publication date: March 5, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Manoj Khangaonkar, Wen Chao Li, Weixin Xu, Kai Mike Zhang
-
Publication number: 20080285752Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: ApplicationFiled: July 2, 2008Publication date: November 20, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Publication number: 20080148299Abstract: A computer program product is disclosed. The computer program product includes a computer useable medium that has a computer readable program. The computer readable program when executive on a computer causes the computer to receive a request from a component to invoke a function. Further, the computer readable program, when executed on a computer, causes the computer to asynchronously perform the function according to the request. In addition, the computer readable program, when executed on a computer, causes the computer to provide, to one or more programs, an indication that the function has completed work according to the request.Type: ApplicationFiled: October 13, 2006Publication date: June 19, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Publication number: 20080091712Abstract: A system has a repository that stores a plurality of events. Each event requests to utilize one or more functions in a component. An event sequencing module analyzes an event sequencing key of the event if the event requests a function having a component definition that includes an event sequence qualifier. The event sequencing module grants a lock to the event for the function if no other event having the same value for the event sequencing key has the lock for the function. The event sequencing module prevents the event from being processed if another event having the same value for the event sequencing key has the lock for the function. The event sequencing key is composed of one or more object attributes. The system has a worker server that receives the event, if the event obtains the lock, and processes the function requested by the event.Type: ApplicationFiled: October 13, 2006Publication date: April 17, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Atul R. Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Publication number: 20060265719Abstract: A method, system, and computer program code for integrating components with different interfaces in an enterprise application integration environment. When an enterprise application is assembled, a user may try to wire a component to another component in the enterprise. However, if the reference on the source component does not match the interface on the target component, the components cannot be wired together. In this situation, the user is prompted to introduce an interface mediation component between the source and target application components. The mediation component comprises an interface matching the reference on the source component and a reference matching the interface on the target component. The mediation component mediates the different interfaces at runtime by binding an operation in the source component to an operation in the target component, and performing a parameter mediation of parameters in the first operation to parameters in the second operation.Type: ApplicationFiled: May 20, 2005Publication date: November 23, 2006Applicant: International Business Machines CorporationInventors: Kenneth Astl, Atul Daherkar, Manoj Khangaonkar, Edwin Sapugay, Larry Tung
-
Publication number: 20060064736Abstract: An apparatus, system, and method are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: ApplicationFiled: September 23, 2004Publication date: March 23, 2006Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Zhang
-
Publication number: 20060064751Abstract: An apparatus, system, and method are disclosed for selective, end-to-end message level security. The apparatus includes a message class definition module, a security module, and a messaging module. The message class definition module identifies a predetermined message class of an internode message. The security module applies security to the message at an application layer. The security that is applied to the message corresponds to a security level, which depends on the message class of the message. The security may include encryption, authentication, and/or other security features. The messaging module communicates the message between a first node and a second node. A third node, such as a broker, may be interposed between the first and second nodes, in which case the security of the message is preserved at the third node.Type: ApplicationFiled: September 23, 2004Publication date: March 23, 2006Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Zhang
-
Publication number: 20050102500Abstract: A system for integrating applications in different enterprises separated by firewalls comprises: an input for receiving high level business data from a source application; an encryption engine for encrypting the business data to produce encrypted business data; a queue manager for receiving the encrypted business data and for storing the business data for delivery to a target application; and an output for transmitting the encrypted business data to the target application; wherein the system and the target application are separated by at least one firewall.Type: ApplicationFiled: November 12, 2003Publication date: May 12, 2005Inventors: Manoj Khangaonkar, Adwait Sathye