Patents by Inventor Pratima Ahuja
Pratima Ahuja has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8392700Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: GrantFiled: July 2, 2008Date of Patent: March 5, 2013Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Patent number: 7650606Abstract: Disclosed is a technique for system recovery. Information identifying one or more work requests is retrieved, along with an order of the work requests, for a business process. If the business process is non-transactional, an in-memory structure is created for the business process, a recovery stub is created for each work request, and the recovery stub for each work request is placed into the in-memory structure based on the order.Type: GrantFiled: January 30, 2004Date of Patent: January 19, 2010Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Ramani Mathrubutham, Adwait Sathye, Chendong Zou
-
Patent number: 7644266Abstract: An apparatus, system, and method are disclosed for selective, end-to-end message level security. The apparatus includes a message class definition module, a security module, and a messaging module. The message class definition module identifies a predetermined message class of an internode message. The security module applies security to the message at an application layer. The security that is applied to the message corresponds to a security level, which depends on the message class of the message. The security may include encryption, authentication, and/or other security features. The messaging module communicates the message between a first node and a second node. A third node, such as a broker, may be interposed between the first and second nodes, in which case the security of the message is preserved at the third node.Type: GrantFiled: September 23, 2004Date of Patent: January 5, 2010Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Patent number: 7607006Abstract: A method is disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The method includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: GrantFiled: September 23, 2004Date of Patent: October 20, 2009Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Patent number: 7546604Abstract: The present invention provides a method for remotely activating application programs and adapters including a queue manager (QM) that monitors for predetermined trigger events (e.g., time out for messages in an application queue) and, when such events occur, generates a trigger message. The trigger message includes process information associated with the application which is used by a trigger monitor application to issue an appropriate command to the application.Type: GrantFiled: November 26, 2003Date of Patent: June 9, 2009Assignee: International Business Machines CorporationInventors: Weixin Xu, Pratima Ahuja, Adwait B. Sathye, Chengdong Zou
-
Publication number: 20080285752Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: ApplicationFiled: July 2, 2008Publication date: November 20, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Publication number: 20060064736Abstract: An apparatus, system, and method are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: ApplicationFiled: September 23, 2004Publication date: March 23, 2006Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Zhang
-
Publication number: 20060064751Abstract: An apparatus, system, and method are disclosed for selective, end-to-end message level security. The apparatus includes a message class definition module, a security module, and a messaging module. The message class definition module identifies a predetermined message class of an internode message. The security module applies security to the message at an application layer. The security that is applied to the message corresponds to a security level, which depends on the message class of the message. The security may include encryption, authentication, and/or other security features. The messaging module communicates the message between a first node and a second node. A third node, such as a broker, may be interposed between the first and second nodes, in which case the security of the message is preserved at the third node.Type: ApplicationFiled: September 23, 2004Publication date: March 23, 2006Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Zhang
-
Publication number: 20050172288Abstract: Disclosed is a technique for system recovery. Information identifying one or more work requests is retrieved, along with an order of the work requests, for a business process. If the business process is non-transactional, an in-memory structure is created for the business process, a recovery stub is created for each work request, and the recovery stub for each work request is placed into the in-memory structure based on the order. Also disclosed is a technique for system recovery in which, if the business process is transactional, an in-memory structure is created for the business process, a recovery stub is created for each work request that indicates that rollback is to be performed, and the recovery stub is placed for each work request into the in-memory structure based on the order.Type: ApplicationFiled: January 30, 2004Publication date: August 4, 2005Inventors: Pratima Ahuja, Ramani Mathrubutham, Adwait Sathye, Chendong Zou
-
Publication number: 20050114867Abstract: The present invention provides a method, apparatus, and computer instructions for activating application programs and adapters. In an exemplary embodiment, a reactivation program is provided that includes a queue manager (QM) that operates to monitor for predetermined trigger events (e.g., time out for messages in an application queue) and, when such events occur, to generate a trigger message. The trigger message includes process information associated with the crashed application which is used by a trigger monitor application to issue an appropriate command to the application. In a preferred embodiment, the trigger message is placed in an initiation queue, read out by a trigger monitor, and a restart command message, according to the predetermined parameters, sent to the application. More than one process definition can be used by the initiation queue.Type: ApplicationFiled: November 26, 2003Publication date: May 26, 2005Inventors: Weixin Xu, Pratima Ahuja, Adwait Sathye, Chengdong Zou