Patents by Inventor Palanivel A. Kodeswaran
Palanivel A. Kodeswaran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9787718Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.Type: GrantFiled: January 13, 2015Date of Patent: October 10, 2017Assignee: International Business Machines CorporationInventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
-
Publication number: 20170278034Abstract: One embodiment provides a method for creating alternative wellness activities based on tracked worker activity, the method including: utilizing at least one processor to execute computer code that performs the steps of: receiving, from one or more device sensors, a user movement pattern; identifying, based on the user movement pattern, an activity; determining, using at least one other device sensor, an alternative user movement pattern to achieve the activity, wherein said alternative increases an activity level of a user; and communicating, over a network, a message suggesting the alternative user movement pattern. Other aspects are described and claimed.Type: ApplicationFiled: March 24, 2016Publication date: September 28, 2017Inventors: Palanivel A. Kodeswaran, Ravindranath Kokku, Ramasuri Narayanam, Sayandeep Sen
-
Publication number: 20170201541Abstract: Methods, systems, and computer program products for securing deployments using command analytics are provided herein. A computer-implemented method includes collecting command sequences sent from one or more applications to one or more of a distributed group of multiple devices within a network; detecting one or more invalid command sequences and/or one or more out-of-sequence command sequences among the collected command sequences, wherein said detecting comprises comparing the collected command sequences against a repository of historical data of valid command sequences pertaining to the distributed group of multiple devices within the network; generating an alert upon a deteimination that one of the collected command sequences does not match an entry in the repository; and performing one or more remedial actions based on the generated alert.Type: ApplicationFiled: January 13, 2016Publication date: July 13, 2017Inventors: Shalini Kapoor, Palanivel Kodeswaran, Amit A. Nanavati, Sayandeep Sen
-
Patent number: 9665577Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.Type: GrantFiled: May 15, 2012Date of Patent: May 30, 2017Assignee: International Business Machines CorporationInventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
-
Patent number: 9665576Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.Type: GrantFiled: May 14, 2012Date of Patent: May 30, 2017Assignee: International Business Machines CorporationInventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
-
Publication number: 20170109425Abstract: Methods and arrangements for associating physical activities and digital activities of a user. A plurality of physical attributes of the user are collected, via mining sensor data from at least one physical state associated with the user and a plurality of digital attributes relating to at least one digital activity of the user via mining the data from a digital presence of the user. A plurality of physical attributes and digital attributes are grouped based on a similarity measure. There are stored a grouping of the physical and digital attributes at a data storage location. Other variants and embodiments are broadly contemplated herein.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Inventors: Dipyaman Banerjee, Prasenjit Dey, Palanivel A. Kodeswaran, Sheetal Manan Sureka
-
Publication number: 20170067763Abstract: Methods and arrangements for identifying failed sensors in a system of interconnected devices. A contemplated method includes: utilizing at least one processor to execute computer code that performs the steps of: receiving data from a first plurality of sensors, each sensor being operatively coupled to a device within a system of interconnected devices; associating the data received with an activity; comparing the data received with previously stored data associated with the activity; detecting, based on the comparing, an anomaly associated with at least one of the first plurality of sensors, wherein the anomaly indicates a problem with the at least one of the first plurality of sensors; and recording, at a data storage location, the anomaly, wherein the data storage location stores data associated with previously identified anomalies. Other variants and embodiments are broadly contemplated herein.Type: ApplicationFiled: September 4, 2015Publication date: March 9, 2017Inventors: Palanivel A. Kodeswaran, Ravindranath Kokku, Sayandeep Sen, Mudhakar Srivatsa
-
Publication number: 20170017932Abstract: Methods and arrangements identifying sensors deployed in an internet of things to assist in determining a need for sensors. A plurality of sensors are connected with. A set of rules are inputted to at least one processor, wherein the rules associate particular sensors within the plurality of sensors with tasks associated with a plurality of activities of daily living. A quantitative utility value is assigned to each of the activities of daily living within the plurality of activities of daily living. The quantitative utility value of each of the activities of daily living and the tasks associated with the activities of daily living are utilized to identify those sensors within the plurality of sensors needed to identify each of the activities of daily living above a predetermined quantitative value. Other variants and embodiments are broadly contemplated herein.Type: ApplicationFiled: July 17, 2015Publication date: January 19, 2017Inventors: Palanivel A. Kodeswaran, Ravindranath Kokku, Sayandeep Sen, Mudhakar Srivatsa
-
Patent number: 9516033Abstract: Methods, systems, and computer program products for providing restricted access to given devices by constructing abstract devices are provided herein. A method includes generating a virtual device based on one or more physical devices; mapping multiple device actions of the one or more physical devices to multiple device actions of the virtual device exposed by the virtual device; incorporating (i) discretionary access control techniques, (ii) policy-based access control techniques, and (iii) a physical device-level partial ordering of actions to determine a resolution in response to a set of multiple user access requests for two or more of the multiple device actions of the virtual device; and executing the two or more device actions of the virtual device on the virtual device for one or more given users in accordance with said resolution by coordinating the execution of two or more corresponding device actions of the one or more physical devices on the one or more physical devices based on said mapping.Type: GrantFiled: October 13, 2014Date of Patent: December 6, 2016Assignee: International Business Machines CorporationInventors: Nilanjan Banerjee, Pralhad Deshpande, Shalini Kapoor, Palanivel Kodeswaran, Rajan Kumar, Amit M. Mangalvedkar, Amit A. Nanavati
-
Publication number: 20160267286Abstract: Methods and arrangements for protecting enterprise data with respect to a hybrid application in a mobile device that accesses a global computer information network using enterprise infrastructure. A hybrid application is recognized in a mobile device, the hybrid application being configured to communicate with an enterprise network and a non-enterprise network. There are provided, in communication with the hybrid application, controls for segregating data flows from the enterprise network and non-enterprise network. A policy service is provided, which applies a policy for the segregating and governed routing of data flows from the enterprise network and the non-enterprise network. Other variants and embodiments are broadly contemplated herein.Type: ApplicationFiled: March 13, 2015Publication date: September 15, 2016Inventors: Palanivel A. Kodeswaran, Prasad G. Naldurg, Venkatraman Ramakrishna, Arvind Seshadri, Michael Steiner
-
Publication number: 20160105441Abstract: Methods, systems, and computer program products for providing restricted access to given devices by constructing abstract devices are provided herein. A method includes generating a virtual device based on one or more physical devices; mapping multiple device actions of the one or more physical devices to multiple device actions of the virtual device exposed by the virtual device; incorporating (i) discretionary access control techniques, (ii) policy-based access control techniques, and (iii) a physical device-level partial ordering of actions to determine a resolution in response to a set of multiple user access requests for two or more of the multiple device actions of the virtual device; and executing the two or more device actions of the virtual device on the virtual device for one or more given users in accordance with said resolution by coordinating the execution of two or more corresponding device actions of the one or more physical devices on the one or more physical devices based on said mapping.Type: ApplicationFiled: October 13, 2014Publication date: April 14, 2016Inventors: Nilanjan Banerjee, Pralhad Deshpande, Shalini Kapoor, Palanivel Kodeswaran, Rajan Kumar, Amit M. Mangalvedkar, Amit A. Nanavati
-
Patent number: 9307451Abstract: Methods and arrangements for according access of a mobile device to an enterprise network. the presence of a mobile device relative to an enterprise network is detected, the enterprise network including a plurality of defined zones, wherein each zone is associated with a security level and with one or more resources. An agent of the mobile device is negotiated with to accord access to at least one of the defined zones. The negotiating includes: assessing at least one security constraint relative to the mobile device; and thereupon designating at least one zone to be accessible to the mobile device. Other variants and embodiments are broadly contemplated herein.Type: GrantFiled: December 2, 2014Date of Patent: April 5, 2016Assignee: International Business Machines CorporationInventors: Palanivel Kodeswaran, Sougata Mukherjea, Prasad G. Naldurg, Venkatraman Ramakrishna, Arvind Seshadri
-
Publication number: 20150163247Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.Type: ApplicationFiled: January 13, 2015Publication date: June 11, 2015Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
-
Patent number: 8990883Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.Type: GrantFiled: January 2, 2013Date of Patent: March 24, 2015Assignee: International Business Machines CorporationInventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
-
Publication number: 20140189783Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.Type: ApplicationFiled: January 2, 2013Publication date: July 3, 2014Applicant: International Business Machines CorporationInventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
-
Publication number: 20130304702Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.Type: ApplicationFiled: May 14, 2012Publication date: November 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
-
Publication number: 20130305058Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.Type: ApplicationFiled: May 15, 2012Publication date: November 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar