Patents by Inventor Palanivel A. Kodeswaran

Palanivel A. Kodeswaran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9787718
    Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.
    Type: Grant
    Filed: January 13, 2015
    Date of Patent: October 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
  • Publication number: 20170278034
    Abstract: One embodiment provides a method for creating alternative wellness activities based on tracked worker activity, the method including: utilizing at least one processor to execute computer code that performs the steps of: receiving, from one or more device sensors, a user movement pattern; identifying, based on the user movement pattern, an activity; determining, using at least one other device sensor, an alternative user movement pattern to achieve the activity, wherein said alternative increases an activity level of a user; and communicating, over a network, a message suggesting the alternative user movement pattern. Other aspects are described and claimed.
    Type: Application
    Filed: March 24, 2016
    Publication date: September 28, 2017
    Inventors: Palanivel A. Kodeswaran, Ravindranath Kokku, Ramasuri Narayanam, Sayandeep Sen
  • Publication number: 20170201541
    Abstract: Methods, systems, and computer program products for securing deployments using command analytics are provided herein. A computer-implemented method includes collecting command sequences sent from one or more applications to one or more of a distributed group of multiple devices within a network; detecting one or more invalid command sequences and/or one or more out-of-sequence command sequences among the collected command sequences, wherein said detecting comprises comparing the collected command sequences against a repository of historical data of valid command sequences pertaining to the distributed group of multiple devices within the network; generating an alert upon a deteimination that one of the collected command sequences does not match an entry in the repository; and performing one or more remedial actions based on the generated alert.
    Type: Application
    Filed: January 13, 2016
    Publication date: July 13, 2017
    Inventors: Shalini Kapoor, Palanivel Kodeswaran, Amit A. Nanavati, Sayandeep Sen
  • Patent number: 9665577
    Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.
    Type: Grant
    Filed: May 15, 2012
    Date of Patent: May 30, 2017
    Assignee: International Business Machines Corporation
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
  • Patent number: 9665576
    Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.
    Type: Grant
    Filed: May 14, 2012
    Date of Patent: May 30, 2017
    Assignee: International Business Machines Corporation
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
  • Publication number: 20170109425
    Abstract: Methods and arrangements for associating physical activities and digital activities of a user. A plurality of physical attributes of the user are collected, via mining sensor data from at least one physical state associated with the user and a plurality of digital attributes relating to at least one digital activity of the user via mining the data from a digital presence of the user. A plurality of physical attributes and digital attributes are grouped based on a similarity measure. There are stored a grouping of the physical and digital attributes at a data storage location. Other variants and embodiments are broadly contemplated herein.
    Type: Application
    Filed: October 16, 2015
    Publication date: April 20, 2017
    Inventors: Dipyaman Banerjee, Prasenjit Dey, Palanivel A. Kodeswaran, Sheetal Manan Sureka
  • Publication number: 20170067763
    Abstract: Methods and arrangements for identifying failed sensors in a system of interconnected devices. A contemplated method includes: utilizing at least one processor to execute computer code that performs the steps of: receiving data from a first plurality of sensors, each sensor being operatively coupled to a device within a system of interconnected devices; associating the data received with an activity; comparing the data received with previously stored data associated with the activity; detecting, based on the comparing, an anomaly associated with at least one of the first plurality of sensors, wherein the anomaly indicates a problem with the at least one of the first plurality of sensors; and recording, at a data storage location, the anomaly, wherein the data storage location stores data associated with previously identified anomalies. Other variants and embodiments are broadly contemplated herein.
    Type: Application
    Filed: September 4, 2015
    Publication date: March 9, 2017
    Inventors: Palanivel A. Kodeswaran, Ravindranath Kokku, Sayandeep Sen, Mudhakar Srivatsa
  • Publication number: 20170017932
    Abstract: Methods and arrangements identifying sensors deployed in an internet of things to assist in determining a need for sensors. A plurality of sensors are connected with. A set of rules are inputted to at least one processor, wherein the rules associate particular sensors within the plurality of sensors with tasks associated with a plurality of activities of daily living. A quantitative utility value is assigned to each of the activities of daily living within the plurality of activities of daily living. The quantitative utility value of each of the activities of daily living and the tasks associated with the activities of daily living are utilized to identify those sensors within the plurality of sensors needed to identify each of the activities of daily living above a predetermined quantitative value. Other variants and embodiments are broadly contemplated herein.
    Type: Application
    Filed: July 17, 2015
    Publication date: January 19, 2017
    Inventors: Palanivel A. Kodeswaran, Ravindranath Kokku, Sayandeep Sen, Mudhakar Srivatsa
  • Patent number: 9516033
    Abstract: Methods, systems, and computer program products for providing restricted access to given devices by constructing abstract devices are provided herein. A method includes generating a virtual device based on one or more physical devices; mapping multiple device actions of the one or more physical devices to multiple device actions of the virtual device exposed by the virtual device; incorporating (i) discretionary access control techniques, (ii) policy-based access control techniques, and (iii) a physical device-level partial ordering of actions to determine a resolution in response to a set of multiple user access requests for two or more of the multiple device actions of the virtual device; and executing the two or more device actions of the virtual device on the virtual device for one or more given users in accordance with said resolution by coordinating the execution of two or more corresponding device actions of the one or more physical devices on the one or more physical devices based on said mapping.
    Type: Grant
    Filed: October 13, 2014
    Date of Patent: December 6, 2016
    Assignee: International Business Machines Corporation
    Inventors: Nilanjan Banerjee, Pralhad Deshpande, Shalini Kapoor, Palanivel Kodeswaran, Rajan Kumar, Amit M. Mangalvedkar, Amit A. Nanavati
  • Publication number: 20160267286
    Abstract: Methods and arrangements for protecting enterprise data with respect to a hybrid application in a mobile device that accesses a global computer information network using enterprise infrastructure. A hybrid application is recognized in a mobile device, the hybrid application being configured to communicate with an enterprise network and a non-enterprise network. There are provided, in communication with the hybrid application, controls for segregating data flows from the enterprise network and non-enterprise network. A policy service is provided, which applies a policy for the segregating and governed routing of data flows from the enterprise network and the non-enterprise network. Other variants and embodiments are broadly contemplated herein.
    Type: Application
    Filed: March 13, 2015
    Publication date: September 15, 2016
    Inventors: Palanivel A. Kodeswaran, Prasad G. Naldurg, Venkatraman Ramakrishna, Arvind Seshadri, Michael Steiner
  • Publication number: 20160105441
    Abstract: Methods, systems, and computer program products for providing restricted access to given devices by constructing abstract devices are provided herein. A method includes generating a virtual device based on one or more physical devices; mapping multiple device actions of the one or more physical devices to multiple device actions of the virtual device exposed by the virtual device; incorporating (i) discretionary access control techniques, (ii) policy-based access control techniques, and (iii) a physical device-level partial ordering of actions to determine a resolution in response to a set of multiple user access requests for two or more of the multiple device actions of the virtual device; and executing the two or more device actions of the virtual device on the virtual device for one or more given users in accordance with said resolution by coordinating the execution of two or more corresponding device actions of the one or more physical devices on the one or more physical devices based on said mapping.
    Type: Application
    Filed: October 13, 2014
    Publication date: April 14, 2016
    Inventors: Nilanjan Banerjee, Pralhad Deshpande, Shalini Kapoor, Palanivel Kodeswaran, Rajan Kumar, Amit M. Mangalvedkar, Amit A. Nanavati
  • Patent number: 9307451
    Abstract: Methods and arrangements for according access of a mobile device to an enterprise network. the presence of a mobile device relative to an enterprise network is detected, the enterprise network including a plurality of defined zones, wherein each zone is associated with a security level and with one or more resources. An agent of the mobile device is negotiated with to accord access to at least one of the defined zones. The negotiating includes: assessing at least one security constraint relative to the mobile device; and thereupon designating at least one zone to be accessible to the mobile device. Other variants and embodiments are broadly contemplated herein.
    Type: Grant
    Filed: December 2, 2014
    Date of Patent: April 5, 2016
    Assignee: International Business Machines Corporation
    Inventors: Palanivel Kodeswaran, Sougata Mukherjea, Prasad G. Naldurg, Venkatraman Ramakrishna, Arvind Seshadri
  • Publication number: 20150163247
    Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.
    Type: Application
    Filed: January 13, 2015
    Publication date: June 11, 2015
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
  • Patent number: 8990883
    Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.
    Type: Grant
    Filed: January 2, 2013
    Date of Patent: March 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
  • Publication number: 20140189783
    Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.
    Type: Application
    Filed: January 2, 2013
    Publication date: July 3, 2014
    Applicant: International Business Machines Corporation
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
  • Publication number: 20130304702
    Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.
    Type: Application
    Filed: May 14, 2012
    Publication date: November 14, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
  • Publication number: 20130305058
    Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.
    Type: Application
    Filed: May 15, 2012
    Publication date: November 14, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar