Patents by Inventor Nataraj Nagaratnam

Nataraj Nagaratnam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160139981
    Abstract: A technique for protecting stored information from read disturbance includes receiving a first write request to a solid-state device (SSD) in a storage pool that employs an erasure code. The first write request has an associated identifier and associated data. In response to receiving the first write request, the first write request is assigned to two or more SSD blocks of the SSD device based on the identifier. Pages of the associated data are then written to the assigned SSD blocks, such that each SSD block holds data associated with only a single identifier.
    Type: Application
    Filed: November 14, 2014
    Publication date: May 19, 2016
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: RAMAMOHAN CHENNAMSETTY, NATARAJ NAGARATNAM, SANDEEP P. PATIL, RIYAZAHAMAD M. SHIRAGUPPI
  • Publication number: 20160139821
    Abstract: A hierarchal storage management method is provided. The method includes detecting a first portion of a first file being deleted from a hybrid storage device including a hard disk drive (HDD) memory device, a solid state drive (SSD) memory device, and an archival storage memory device. A first set of memory blocks associated with the first portion of the first file is identified. The first set of memory blocks are determined to reside on the SSD memory device. In response, the first set of memory blocks are transferred from the SSD memory device to a first portion of the hybrid storage device.
    Type: Application
    Filed: November 19, 2014
    Publication date: May 19, 2016
    Inventors: Blaine H. Dolph, Nataraj Nagaratnam, Sandeep R. Patil, Riyazahamad M. Shiraguppi
  • Publication number: 20160142909
    Abstract: A method, system, and computer program product for dynamic password-less user verification in a mobile device are provided in the illustrative embodiments. Using a processor and a memory in the mobile device, a first portion of a call log stored in the mobile device is selected. Using a transformation function, a first transformed value corresponding to the first portion is obtained. A second portion of a call log stored in a repository of a service provider is obtained from the service provider, the service provider facilitating voice communications from the mobile device, and the second portion corresponding to the first portion. Using the transformation function, a second transformed value corresponding to the second portion is obtained. Responsive to the first transformed value matching the second transformed value within a tolerance limit, a conclusion is generated that the user verification is successful.
    Type: Application
    Filed: November 13, 2014
    Publication date: May 19, 2016
    Inventors: Corville O. Allen, Ramakrishna Boggarapu, Ravi K. Muthukrishnan, Nataraj Nagaratnam, Sherk L. Walker
  • Patent number: 9338652
    Abstract: A method, system, and computer program product for dynamic password-less user verification in a mobile device are provided in the illustrative embodiments. Using a processor and a memory in the mobile device, a first portion of a call log stored in the mobile device is selected. Using a transformation function, a first transformed value corresponding to the first portion is obtained. A second portion of a call log stored in a repository of a service provider is obtained from the service provider, the service provider facilitating voice communications from the mobile device, and the second portion corresponding to the first portion. Using the transformation function, a second transformed value corresponding to the second portion is obtained. Responsive to the first transformed value matching the second transformed value within a tolerance limit, a conclusion is generated that the user verification is successful.
    Type: Grant
    Filed: November 13, 2014
    Date of Patent: May 10, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Corville O. Allen, Ramakrishna Boggarapu, Ravi K. Muthukrishnan, Nataraj Nagaratnam, Sherk L. Walker
  • Patent number: 9292305
    Abstract: Embodiments of the present invention provide a method, system and computer program product for declarative instance based access control for persistent application resources in a multi-tier application. In one embodiment of the invention, a method for instance based access control in a persistent application resource can be provided. The method can include creating one or more instances of an persistent application resource for a particular user or based on attributes of the user, coupling the instance(s) of the persistent application resource to a database implementing row-level access control, initializing access to the database according to a role or attribute for the particular user, and accessing a restricted set of data in the database through the instance(s) of the persistent application resource.
    Type: Grant
    Filed: January 14, 2008
    Date of Patent: March 22, 2016
    Assignee: International Business Machines Corporation
    Inventors: Indrajit Poddar, Anthony J. Nadalin, Nataraj Nagaratnam
  • Publication number: 20160043894
    Abstract: According to one exemplary embodiment, a method for automatic network reconfiguration associated with a failover event is provided. The method may include instructing a file system to capture a plurality of attributes associated with a plurality of data following the failover event, whereby the plurality of attributes comprises a fileset identifier, a first gateway node identifier, and a second gateway node identifier. The method may include determining, based on the captured fileset identifier, a virtual local area network associated with the fileset, whereby the determined virtual area network includes at least one software defined network switch. The method may include reconfiguring the at least one software defined network switch to stop sending a plurality of network traffic to the first gateway node and to start sending the plurality of network traffic to the second gateway node, whereby the plurality of network traffic is associated with the fileset.
    Type: Application
    Filed: August 8, 2014
    Publication date: February 11, 2016
    Inventors: Ramamohan Chennamsetty, Vinit Jain, Nataraj Nagaratnam, Sandeep R. Patil, Riyazahamad M. Shiraguppi
  • Patent number: 9160752
    Abstract: Embodiments of the present invention provide a method, system and computer program product for aggregating database and component logic authorization rules in a multi-tier application. In an embodiment of the invention, a method for aggregating database and component logic authorization rules in a multi-tier application system can include aggregating role-based authorization rules for both a persistence layer and a logic layer of a multi-tier application in a unified policy, distributing the unified policy to both the persistence layer and the logic layer of the multi-tier application, transforming the unified policy into respectively a set of role based permissions for the persistence layer and a set of role based permissions for the logic layer, and applying the set of role based permissions for the persistence layer in the persistence layer, and the set of role based permissions for the logic layer in the logic layer of the multi-tier application.
    Type: Grant
    Filed: August 31, 2007
    Date of Patent: October 13, 2015
    Assignee: International Business Machines Corporation
    Inventors: German S. Goldszmidt, Dah-Haur H. Lin, Anthony J. Nadalin, Nataraj Nagaratnam, Indrajit Poddar
  • Publication number: 20150254269
    Abstract: A tool for providing access control for an application. The tool registers, by one or more computer processors, an application. The tool determines, by one or more computer processors, a social platform receives an access request. The tool determines, by one or more computer processors, an access determination for the access request. The tool sends, by one or more computer processors, the access determination for the access request.
    Type: Application
    Filed: March 6, 2014
    Publication date: September 10, 2015
    Applicant: International Business Machines Corporation
    Inventors: Alex Cherian, Sreekanth R. Iyer, Nataraj Nagaratnam, Rohit Shetty
  • Publication number: 20150200941
    Abstract: A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context.
    Type: Application
    Filed: January 16, 2014
    Publication date: July 16, 2015
    Applicant: International Business Machines Corporation
    Inventors: Sridhar R. Muppidi, William Alexander Bird, Sreekanth Ramakrishna Iyer, Archana Kumar, Nataraj Nagaratnam
  • Publication number: 20150200958
    Abstract: A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context.
    Type: Application
    Filed: September 30, 2014
    Publication date: July 16, 2015
    Inventors: Sridhar R. Muppidi, William Alexander Bird, Sreekanth Ramakrishna Iyer, Archana Kumar, Nataraj Nagaratnam
  • Patent number: 8745387
    Abstract: A system for security management for applications associated with multiple user registries can include an integrated console configured to host a one or more applications or resource objects in corresponding realms. The system also can include one or more roles mapped to different ones of the resource objects and also to different users permitted to access the integrated console. The system yet further can include a user relationship system having associations with multiple different ones of the roles. Finally, the system can include console security management logic programmed to manage authentication for the users using realm of the resource object while not requiring a separate user registry for the integrated console.
    Type: Grant
    Filed: April 23, 2012
    Date of Patent: June 3, 2014
    Assignee: International Business Machines Corporation
    Inventors: Samar Choudhary, Nataraj Nagaratnam, Naveenkumar V. Muguda
  • Patent number: 8683545
    Abstract: One aspect of the present invention can include a system, a method, a computer program product and an apparatus for federating policies from multiple policy providers. The aspect can identify a set of distinct policy providers, each maintaining at least one policy related to a service or a resource. A federated policy exchange service can be established that has a policy provider plug-in for each of the distinct policy providers. The federated policy exchange service can receive requests for policies from a set of policy requesters. Each request can include a resource_id or a service_id used to uniquely identify the service or resource. The federated policy exchange service can dynamically connect to a set of the policy providers to determine policies applicable to each request. For each request, results from the policy providers can be received and processed to generate a response. The federated policy exchange service can provide the response to each policy requestor responsive in response to each response.
    Type: Grant
    Filed: August 15, 2008
    Date of Patent: March 25, 2014
    Assignee: International Business Machines Corporation
    Inventors: Anthony J. Nadalin, Nataraj Nagaratnam, Sridhar R. Muppidi
  • Publication number: 20140075492
    Abstract: Identity context-based access control is implemented by generating an identity context expression from user identity data. In particular, users are clustered based on combinations of one or more attributes. These clusters comprise one or more identity context(s). Preferably, an intersection of attribute sets of each user in the cluster is formed. In addition, an intersection of attribute sets of each user not in the cluster also is formed. If the attribute set that is common across the cluster of users is not a subset of the attribute set that is common across the rest of the users, then the attribute set forms a unique identity context expression. To reduce the number of roles used in role-based access control (RBAC), at least one role is replaced with an identity context expression. Run-time access control is then enabled.
    Type: Application
    Filed: September 10, 2012
    Publication date: March 13, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kaushal Kiran Kapadia, Rahul Prabhakar Kulkarni, Nataraj Nagaratnam, Anindya Neogi, Magesh Rajamani
  • Publication number: 20130305058
    Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.
    Type: Application
    Filed: May 15, 2012
    Publication date: November 14, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
  • Publication number: 20130304702
    Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.
    Type: Application
    Filed: May 14, 2012
    Publication date: November 14, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
  • Patent number: 8560857
    Abstract: To provide an information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus, and an apparatus executable program. An information processing apparatus uses signed integrity values unique to software configuration and asserting integrity of initial codes of a networked server. The server apparatus generates keys used for certifying the server apparatus (S810, S820, S830). One of the keys are certified by a third party to generate a digital signature (S840). The digital signature is attached to the integrity values and the signed integrity values are transmitted to the information processing apparatus for allowing the information processing apparatus to have secure services through the network (S850, S860).
    Type: Grant
    Filed: March 28, 2012
    Date of Patent: October 15, 2013
    Assignee: International Business Machines Corporation
    Inventors: Seiji Munetoh, Hiroshi Maruyama, Frank Seliger, Nataraj Nagaratnam
  • Publication number: 20130067538
    Abstract: Mechanisms are provided for facilitating recertification of a user access entitlement. These mechanisms collect, from a system resource of the data processing system, access information representative of accesses of the system resource by a user access entitlement. These mechanisms determine that recertification of the user access entitlement, with regard to the system resource, is to be performed and a pattern of access is determined based on the access information for the user access entitlement. A recertification request graphical user interface is output to a user based on the pattern of access. The graphical user interface includes the pattern of access and one or more graphical user interface elements for receiving a user input specifying acceptance or denial of the recertification of the user access entitlement.
    Type: Application
    Filed: September 9, 2011
    Publication date: March 14, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Manjeri R. Dharmarajan, Kaushal K. Kapadia, Vigneshwarnath Miriyala, Nataraj Nagaratnam, Darshini G. Swamy, Suyesh R. Tiwari
  • Patent number: 8387111
    Abstract: A method and apparatus for type independent permission based access control are provided. The method and apparatus utilize object inheritance to provide a mechanism by which a large group of permissions may be assigned to a codesource without having to explicitly assign each individual permission to the codesource. A base permission, or superclass permission, is defined along with inherited, or subclass, permissions that fall below the base permission in a hierarchy of permissions. Having defined the permissions in such a hierarchy, a developer may assign a base permission to an installed class and thereby assign all of the inherited permissions of the base permission to the installed class. In this way, security providers need not know all the permission types defined in an application. In addition, security providers can seamlessly integrate with many applications without changing their access control and policy store semantics.
    Type: Grant
    Filed: November 1, 2001
    Date of Patent: February 26, 2013
    Assignee: International Business Machines Corporation
    Inventors: Lawrence Koved, Anthony Joseph Nadalin, Nataraj Nagaratnam, Marco Pistoia, Bruce Arland Rich
  • Patent number: 8261331
    Abstract: A system for security management for applications associated with multiple user registries can include an integrated console configured to host a one or more applications or resource objects in corresponding realms. The system also can include one or more roles mapped to different ones of the resource objects and also to different users permitted to access the integrated console. The system yet further can include a user relationship system having associations with multiple different ones of the roles. Finally, the system can include console security management logic programmed to manage authentication for the users using realm of the resource object while not requiring a separate user registry for the integrated console.
    Type: Grant
    Filed: January 17, 2006
    Date of Patent: September 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: Samar Choudhary, Nataraj Nagaratnam, Naveenkumar V. Mugada
  • Patent number: 8261329
    Abstract: In some embodiments, a system includes a database of trust information that internalizes security and trust relationships between a first entity and a second entity in regards to scheduling, and a central trust manager operable to determine from the database of trust information whether a trust relationship exists between a first organization and a second organization, the central trust manager also being operable to provide availability information of a user of the first organization to a second user of the second organization, the central trust manager also being operable to determine whether the second user of the second organization is granted access to requested calendar data and the central trust manager also being operable to provide the requested calendar data.
    Type: Grant
    Filed: May 27, 2009
    Date of Patent: September 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: Daniel C. Gurney, Carol A Jones, Anthony J Nadalin, Nataraj Nagaratnam, John J Rawls, Robert L. Yates, Alfred Zollar