Patents by Inventor Nataraj Nagaratnam
Nataraj Nagaratnam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160139981Abstract: A technique for protecting stored information from read disturbance includes receiving a first write request to a solid-state device (SSD) in a storage pool that employs an erasure code. The first write request has an associated identifier and associated data. In response to receiving the first write request, the first write request is assigned to two or more SSD blocks of the SSD device based on the identifier. Pages of the associated data are then written to the assigned SSD blocks, such that each SSD block holds data associated with only a single identifier.Type: ApplicationFiled: November 14, 2014Publication date: May 19, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: RAMAMOHAN CHENNAMSETTY, NATARAJ NAGARATNAM, SANDEEP P. PATIL, RIYAZAHAMAD M. SHIRAGUPPI
-
Publication number: 20160139821Abstract: A hierarchal storage management method is provided. The method includes detecting a first portion of a first file being deleted from a hybrid storage device including a hard disk drive (HDD) memory device, a solid state drive (SSD) memory device, and an archival storage memory device. A first set of memory blocks associated with the first portion of the first file is identified. The first set of memory blocks are determined to reside on the SSD memory device. In response, the first set of memory blocks are transferred from the SSD memory device to a first portion of the hybrid storage device.Type: ApplicationFiled: November 19, 2014Publication date: May 19, 2016Inventors: Blaine H. Dolph, Nataraj Nagaratnam, Sandeep R. Patil, Riyazahamad M. Shiraguppi
-
Publication number: 20160142909Abstract: A method, system, and computer program product for dynamic password-less user verification in a mobile device are provided in the illustrative embodiments. Using a processor and a memory in the mobile device, a first portion of a call log stored in the mobile device is selected. Using a transformation function, a first transformed value corresponding to the first portion is obtained. A second portion of a call log stored in a repository of a service provider is obtained from the service provider, the service provider facilitating voice communications from the mobile device, and the second portion corresponding to the first portion. Using the transformation function, a second transformed value corresponding to the second portion is obtained. Responsive to the first transformed value matching the second transformed value within a tolerance limit, a conclusion is generated that the user verification is successful.Type: ApplicationFiled: November 13, 2014Publication date: May 19, 2016Inventors: Corville O. Allen, Ramakrishna Boggarapu, Ravi K. Muthukrishnan, Nataraj Nagaratnam, Sherk L. Walker
-
Patent number: 9338652Abstract: A method, system, and computer program product for dynamic password-less user verification in a mobile device are provided in the illustrative embodiments. Using a processor and a memory in the mobile device, a first portion of a call log stored in the mobile device is selected. Using a transformation function, a first transformed value corresponding to the first portion is obtained. A second portion of a call log stored in a repository of a service provider is obtained from the service provider, the service provider facilitating voice communications from the mobile device, and the second portion corresponding to the first portion. Using the transformation function, a second transformed value corresponding to the second portion is obtained. Responsive to the first transformed value matching the second transformed value within a tolerance limit, a conclusion is generated that the user verification is successful.Type: GrantFiled: November 13, 2014Date of Patent: May 10, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Corville O. Allen, Ramakrishna Boggarapu, Ravi K. Muthukrishnan, Nataraj Nagaratnam, Sherk L. Walker
-
Patent number: 9292305Abstract: Embodiments of the present invention provide a method, system and computer program product for declarative instance based access control for persistent application resources in a multi-tier application. In one embodiment of the invention, a method for instance based access control in a persistent application resource can be provided. The method can include creating one or more instances of an persistent application resource for a particular user or based on attributes of the user, coupling the instance(s) of the persistent application resource to a database implementing row-level access control, initializing access to the database according to a role or attribute for the particular user, and accessing a restricted set of data in the database through the instance(s) of the persistent application resource.Type: GrantFiled: January 14, 2008Date of Patent: March 22, 2016Assignee: International Business Machines CorporationInventors: Indrajit Poddar, Anthony J. Nadalin, Nataraj Nagaratnam
-
Publication number: 20160043894Abstract: According to one exemplary embodiment, a method for automatic network reconfiguration associated with a failover event is provided. The method may include instructing a file system to capture a plurality of attributes associated with a plurality of data following the failover event, whereby the plurality of attributes comprises a fileset identifier, a first gateway node identifier, and a second gateway node identifier. The method may include determining, based on the captured fileset identifier, a virtual local area network associated with the fileset, whereby the determined virtual area network includes at least one software defined network switch. The method may include reconfiguring the at least one software defined network switch to stop sending a plurality of network traffic to the first gateway node and to start sending the plurality of network traffic to the second gateway node, whereby the plurality of network traffic is associated with the fileset.Type: ApplicationFiled: August 8, 2014Publication date: February 11, 2016Inventors: Ramamohan Chennamsetty, Vinit Jain, Nataraj Nagaratnam, Sandeep R. Patil, Riyazahamad M. Shiraguppi
-
Patent number: 9160752Abstract: Embodiments of the present invention provide a method, system and computer program product for aggregating database and component logic authorization rules in a multi-tier application. In an embodiment of the invention, a method for aggregating database and component logic authorization rules in a multi-tier application system can include aggregating role-based authorization rules for both a persistence layer and a logic layer of a multi-tier application in a unified policy, distributing the unified policy to both the persistence layer and the logic layer of the multi-tier application, transforming the unified policy into respectively a set of role based permissions for the persistence layer and a set of role based permissions for the logic layer, and applying the set of role based permissions for the persistence layer in the persistence layer, and the set of role based permissions for the logic layer in the logic layer of the multi-tier application.Type: GrantFiled: August 31, 2007Date of Patent: October 13, 2015Assignee: International Business Machines CorporationInventors: German S. Goldszmidt, Dah-Haur H. Lin, Anthony J. Nadalin, Nataraj Nagaratnam, Indrajit Poddar
-
Publication number: 20150254269Abstract: A tool for providing access control for an application. The tool registers, by one or more computer processors, an application. The tool determines, by one or more computer processors, a social platform receives an access request. The tool determines, by one or more computer processors, an access determination for the access request. The tool sends, by one or more computer processors, the access determination for the access request.Type: ApplicationFiled: March 6, 2014Publication date: September 10, 2015Applicant: International Business Machines CorporationInventors: Alex Cherian, Sreekanth R. Iyer, Nataraj Nagaratnam, Rohit Shetty
-
Publication number: 20150200941Abstract: A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context.Type: ApplicationFiled: January 16, 2014Publication date: July 16, 2015Applicant: International Business Machines CorporationInventors: Sridhar R. Muppidi, William Alexander Bird, Sreekanth Ramakrishna Iyer, Archana Kumar, Nataraj Nagaratnam
-
Publication number: 20150200958Abstract: A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context.Type: ApplicationFiled: September 30, 2014Publication date: July 16, 2015Inventors: Sridhar R. Muppidi, William Alexander Bird, Sreekanth Ramakrishna Iyer, Archana Kumar, Nataraj Nagaratnam
-
Patent number: 8745387Abstract: A system for security management for applications associated with multiple user registries can include an integrated console configured to host a one or more applications or resource objects in corresponding realms. The system also can include one or more roles mapped to different ones of the resource objects and also to different users permitted to access the integrated console. The system yet further can include a user relationship system having associations with multiple different ones of the roles. Finally, the system can include console security management logic programmed to manage authentication for the users using realm of the resource object while not requiring a separate user registry for the integrated console.Type: GrantFiled: April 23, 2012Date of Patent: June 3, 2014Assignee: International Business Machines CorporationInventors: Samar Choudhary, Nataraj Nagaratnam, Naveenkumar V. Muguda
-
Patent number: 8683545Abstract: One aspect of the present invention can include a system, a method, a computer program product and an apparatus for federating policies from multiple policy providers. The aspect can identify a set of distinct policy providers, each maintaining at least one policy related to a service or a resource. A federated policy exchange service can be established that has a policy provider plug-in for each of the distinct policy providers. The federated policy exchange service can receive requests for policies from a set of policy requesters. Each request can include a resource_id or a service_id used to uniquely identify the service or resource. The federated policy exchange service can dynamically connect to a set of the policy providers to determine policies applicable to each request. For each request, results from the policy providers can be received and processed to generate a response. The federated policy exchange service can provide the response to each policy requestor responsive in response to each response.Type: GrantFiled: August 15, 2008Date of Patent: March 25, 2014Assignee: International Business Machines CorporationInventors: Anthony J. Nadalin, Nataraj Nagaratnam, Sridhar R. Muppidi
-
Publication number: 20140075492Abstract: Identity context-based access control is implemented by generating an identity context expression from user identity data. In particular, users are clustered based on combinations of one or more attributes. These clusters comprise one or more identity context(s). Preferably, an intersection of attribute sets of each user in the cluster is formed. In addition, an intersection of attribute sets of each user not in the cluster also is formed. If the attribute set that is common across the cluster of users is not a subset of the attribute set that is common across the rest of the users, then the attribute set forms a unique identity context expression. To reduce the number of roles used in role-based access control (RBAC), at least one role is replaced with an identity context expression. Run-time access control is then enabled.Type: ApplicationFiled: September 10, 2012Publication date: March 13, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kaushal Kiran Kapadia, Rahul Prabhakar Kulkarni, Nataraj Nagaratnam, Anindya Neogi, Magesh Rajamani
-
Publication number: 20130305058Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.Type: ApplicationFiled: May 15, 2012Publication date: November 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
-
Publication number: 20130304702Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.Type: ApplicationFiled: May 14, 2012Publication date: November 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
-
Patent number: 8560857Abstract: To provide an information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus, and an apparatus executable program. An information processing apparatus uses signed integrity values unique to software configuration and asserting integrity of initial codes of a networked server. The server apparatus generates keys used for certifying the server apparatus (S810, S820, S830). One of the keys are certified by a third party to generate a digital signature (S840). The digital signature is attached to the integrity values and the signed integrity values are transmitted to the information processing apparatus for allowing the information processing apparatus to have secure services through the network (S850, S860).Type: GrantFiled: March 28, 2012Date of Patent: October 15, 2013Assignee: International Business Machines CorporationInventors: Seiji Munetoh, Hiroshi Maruyama, Frank Seliger, Nataraj Nagaratnam
-
Publication number: 20130067538Abstract: Mechanisms are provided for facilitating recertification of a user access entitlement. These mechanisms collect, from a system resource of the data processing system, access information representative of accesses of the system resource by a user access entitlement. These mechanisms determine that recertification of the user access entitlement, with regard to the system resource, is to be performed and a pattern of access is determined based on the access information for the user access entitlement. A recertification request graphical user interface is output to a user based on the pattern of access. The graphical user interface includes the pattern of access and one or more graphical user interface elements for receiving a user input specifying acceptance or denial of the recertification of the user access entitlement.Type: ApplicationFiled: September 9, 2011Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Manjeri R. Dharmarajan, Kaushal K. Kapadia, Vigneshwarnath Miriyala, Nataraj Nagaratnam, Darshini G. Swamy, Suyesh R. Tiwari
-
Patent number: 8387111Abstract: A method and apparatus for type independent permission based access control are provided. The method and apparatus utilize object inheritance to provide a mechanism by which a large group of permissions may be assigned to a codesource without having to explicitly assign each individual permission to the codesource. A base permission, or superclass permission, is defined along with inherited, or subclass, permissions that fall below the base permission in a hierarchy of permissions. Having defined the permissions in such a hierarchy, a developer may assign a base permission to an installed class and thereby assign all of the inherited permissions of the base permission to the installed class. In this way, security providers need not know all the permission types defined in an application. In addition, security providers can seamlessly integrate with many applications without changing their access control and policy store semantics.Type: GrantFiled: November 1, 2001Date of Patent: February 26, 2013Assignee: International Business Machines CorporationInventors: Lawrence Koved, Anthony Joseph Nadalin, Nataraj Nagaratnam, Marco Pistoia, Bruce Arland Rich
-
Patent number: 8261331Abstract: A system for security management for applications associated with multiple user registries can include an integrated console configured to host a one or more applications or resource objects in corresponding realms. The system also can include one or more roles mapped to different ones of the resource objects and also to different users permitted to access the integrated console. The system yet further can include a user relationship system having associations with multiple different ones of the roles. Finally, the system can include console security management logic programmed to manage authentication for the users using realm of the resource object while not requiring a separate user registry for the integrated console.Type: GrantFiled: January 17, 2006Date of Patent: September 4, 2012Assignee: International Business Machines CorporationInventors: Samar Choudhary, Nataraj Nagaratnam, Naveenkumar V. Mugada
-
Patent number: 8261329Abstract: In some embodiments, a system includes a database of trust information that internalizes security and trust relationships between a first entity and a second entity in regards to scheduling, and a central trust manager operable to determine from the database of trust information whether a trust relationship exists between a first organization and a second organization, the central trust manager also being operable to provide availability information of a user of the first organization to a second user of the second organization, the central trust manager also being operable to determine whether the second user of the second organization is granted access to requested calendar data and the central trust manager also being operable to provide the requested calendar data.Type: GrantFiled: May 27, 2009Date of Patent: September 4, 2012Assignee: International Business Machines CorporationInventors: Daniel C. Gurney, Carol A Jones, Anthony J Nadalin, Nataraj Nagaratnam, John J Rawls, Robert L. Yates, Alfred Zollar