Patents by Inventor R. Kumar

R. Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140012906
    Abstract: Techniques are provided for a peer-to-peer web traffic management. A first mapping between identifiers and peers in a network is established. Upon receiving a first request associated with a first identifier and classifiers, based, at least in part, on the first identifier, a first peer retrieves a first global counter snapshot and a first local increment counter, and uses them to determine whether the first peer can service the first request. If the determination is positive, then the first peer services the first request, and updates the first local increment counter. If the first local increment counter exceeded a threshold value, then the first local increment counter is transmitted to a second peer, and then reset to zero. In response to the first peer receiving a first global counter associated with the first global counter snapshot, the first global counter snapshot is updated with the first global counter.
    Type: Application
    Filed: July 6, 2012
    Publication date: January 9, 2014
    Inventors: Aman Teja, Vineeth Chandran, Prashant R. Kumar, Sourav Chakraborty
  • Patent number: 8607191
    Abstract: A method for business process to customized program code mapping in a pre-packaged computing solution can include establishing a connection from a business process to code mapping module executing in memory by a processor of a computer to a source pre-packaged computing solution, extracting both a business process hierarchy (BPH) and customized program code from the source pre-packaged computing solution, storing the BPH and the extracted customized program code in storage coupled to the computer, selecting a business process in the BPH and mapping the selected business process to corresponding portions of the customized program code, and generating and displaying in the computer a dependency graph indicating dependency relationships of the mapped portions of the customized program code for the selected business process of the BPH of the source pre-packaged computing solution.
    Type: Grant
    Filed: June 30, 2010
    Date of Patent: December 10, 2013
    Assignee: International Business Machines Corporation
    Inventors: Julian T. Dolby, Richard T. Goodwin, Anca A. Ivan, Igor A. Naumov, Manas R. Kumar Singh
  • Patent number: 8558658
    Abstract: A method and apparatus is provided for configuring a security system. The method includes the steps of providing a plurality of configuration files on a computer readable medium where each configuration file defines an access control system or integrated security system and each configuration file is different than any other configuration file of the plurality of configuration files, presenting the plurality of configuration files to a person on a display, a configuration processor receiving a selection of a configuration file of the plurality of configuration files from the person and the processor automatically configuring an access control system or integrated security system in accordance with the selected configuration file.
    Type: Grant
    Filed: December 3, 2009
    Date of Patent: October 15, 2013
    Assignee: Honeywell International Inc.
    Inventors: Aneesh R Kumar, Arunachalam K Sundararaman, Nithyanandhan G Govindaraj, Vinay V Venkatesh
  • Patent number: 8560833
    Abstract: Providing secure network access in a networked client device. A client device is provided with a secure connection adapter. In operation, the secure connection adapter detects the network environment of the client device and determines of the network environment is trusted or untrusted. If the client device is operating in an untrusted network environment, the secure connection adapter establishes a secure connection to an enterprise host using a secure tunnel such as IPSec, SSL, or other secure connection. Programs executing on the client device now operate in the secure network environment, with all network activity routed through the secure connection to the enterprise. Optionally, a split tunnel mechanism may be used to direct some network traffic directly to the Internet from the client device.
    Type: Grant
    Filed: October 29, 2010
    Date of Patent: October 15, 2013
    Assignee: Aruba Networks, Inc.
    Inventors: Chetan R. Kumar, Charumathy Venkatraman, Suman Maradani
  • Patent number: 8549490
    Abstract: A method for static code analyzing customizations to a pre-packaged computing solution can include establishing a communicative connection from a recommendation generation module to a pre-packaged computing solution and authenticating into the pre-packaged computing solution. Customized program code can be extracted from the pre-packaged computing solution and a call graph of the customized program code can be constructed such that the call graph indicates method calls to different interfaces for program code of the pre-packaged computing solution. Finally, a report can be generated identifying customized program code to be adapted to a new version of the pre-packaged computing solution based upon changes in the different interfaces shown by the call graph to be used in the new version of the pre-packaged computing solution and modifications required for the customized program code to call the different interfaces in the new version of the pre-packaged computing solution.
    Type: Grant
    Filed: September 29, 2009
    Date of Patent: October 1, 2013
    Assignee: International Business Machines Corporation
    Inventors: Julian T. Dolby, Richard T. Goodwin, Anca Andreea Ivan, Manas R. Kumar Singh
  • Publication number: 20130227164
    Abstract: A computer-implemented method of providing distributed layer seven traffic shaping includes receiving one or more service requests from one or more clients. The one or more service requests include network usage information associated with the one or more clients. The computer-implemented method also includes aggregating the network usage information from the one or more clients across one or more data centers. Further, the computer-implemented method includes computing a delay required for throttling the service request based on data transferred. Furthermore, the computer-implemented method includes communicating the delay to the one or more clients. Moreover, the computer-implemented method includes throttling the one or more service requests based on the delay across the one or more data centers.
    Type: Application
    Filed: February 23, 2012
    Publication date: August 29, 2013
    Applicant: Yahoo! Inc.
    Inventors: Amit KUMAR, Aman TEJA, Pankaj KOTHARI, Prashant R. KUMAR
  • Patent number: 8414678
    Abstract: A method for generating metallic nanomaterials using acetylenic-bridged metal-carbonyl complexes as a precursor allows control of nanoparticle properties. The novel method produced metallic nanomaterials resistant to oxidation.
    Type: Grant
    Filed: September 14, 2007
    Date of Patent: April 9, 2013
    Assignee: Board of Supervisors of Lousiana State University And Agricultural and Mechanical College
    Inventors: Challa S. S. R. Kumar, Rohini M. de Silva, Josef Hormes
  • Publication number: 20130041704
    Abstract: Methods, computer readable media, and apparatuses for managing initiative consolidation are presented. According to one or more aspects, information about at least two new projects may be received. Subsequently, the information may be analyzed to identify one or more commonalities between the at least two new projects. Thereafter, it may be determined, based on the identified commonalities, to bundle the at least two new projects for one or more testing phases. In one or more arrangements, receiving information about the at least two new projects may include extracting, from one or more project design documents, a job listing for each project, where each job listing identifies one or more jobs included in each project. In some arrangements, a cost-benefit analysis may be generated to calculate potential savings associated with bundling the at least two new projects for the one or more testing phases.
    Type: Application
    Filed: August 11, 2011
    Publication date: February 14, 2013
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Claudette Girard, Ashwin B. R. Kumar, Sayee Ram Prasad Balasubramanian
  • Patent number: 8234570
    Abstract: Harvesting assets for packaged application practices, in one aspect, may include obtaining one or more work products associated with deployment of packaged software applications, extracting content and style, enhancing content and style with models of work products, and storing assets in asset repository.
    Type: Grant
    Filed: October 26, 2009
    Date of Patent: July 31, 2012
    Assignee: International Business Machines Corporation
    Inventors: Rema Ananthanarayanan, Kathleen Byrnes, Charbak Chatterjee, Maharshi Desai, Pankaj Dhoolia, Sweefen Goh, Richard T. Goodwin, Mangala Gowri, Anca A. Ivan, Juhnyoung Lee, Senthil Kk Mani, Pietro Mazzoleni, Rakesh Mohan, Debdoot Mukherjee, Aubrey J. Rembert, Gerhard Sigl, Manas R. Kumar Singh, Vibha S. Sinha, Biplav Srivastava
  • Publication number: 20120110320
    Abstract: Providing secure network access in a networked client device. A client device is provided with a secure connection adapter. In operation, the secure connection adapter detects the network environment of the client device and determines of the network environment is trusted or untrusted. If the client device is operating in an untrusted network environment, the secure connection adapter establishes a secure connection to an enterprise host using a secure tunnel such as IPSec, SSL, or other secure connection. Programs executing on the client device now operate in the secure network environment, with all network activity routed through the secure connection to the enterprise. Optionally, a split tunnel mechanism may be used to direct some network traffic directly to the Internet from the client device.
    Type: Application
    Filed: October 29, 2010
    Publication date: May 3, 2012
    Inventors: Chetan R. Kumar, Charumathy Venkatraman, Suman Maradani
  • Publication number: 20120071162
    Abstract: As dual-mode phones move within a wireless network, they track which cell tower they are associated with, reporting this information to a mobility controller. The mobility controller builds a list of cell tower identifiers which are associated with the wireless coverage, and makes this list available to subscribing dual-mode phones. Subscribing dual-mode phones can use this list to scan for network availability when they are associated with a cell tower which is on the list.
    Type: Application
    Filed: November 29, 2011
    Publication date: March 22, 2012
    Inventors: Chetan R. Kumar, Pradeep J. Iyer, Arun Mahajan
  • Publication number: 20120005647
    Abstract: Embodiments of the present invention provide a method, system and computer program product for business process to customized program code mapping in a pre-packaged computing solution. The method can include establishing a connection from a business process to code mapping module executing in memory by a processor of a computer to a source pre-packaged computing solution, extracting both a business process hierarchy (BPH) and customized program code from the source pre-packaged computing solution and storing the BPH and the extracted customized program code in storage coupled to the computer. The method further can include selecting a business process in the BPH and mapping the selected business process to corresponding portions of the customized program code.
    Type: Application
    Filed: June 30, 2010
    Publication date: January 5, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Julian T. Dolby, Richard T. Goodwin, Anca A. Ivan, Igor A. Naumov, Manas R. Kumar Singh
  • Publication number: 20110320456
    Abstract: The invention provides a method, a system, and a computer program product for managing and distributing knowledge tips in an organization. A member of the organization submits a knowledge tip and one or more data points corresponding to the knowledge tip in a Tips Management System (TiMS). The member associates the knowledge tip with at least one predefined category. A member selects knowledge tips by defining a criterion in TiMS. The member selects category(ies) and/or projects(s) and provides delivery parameters for planning the delivery of knowledge tips to the at least one member. The TiMS delivers the selected knowledge tips to the each member as per the delivery parameters.
    Type: Application
    Filed: September 30, 2010
    Publication date: December 29, 2011
    Applicant: INFOSYS TECHNOLOGIES LIMITED
    Inventors: Aparna HARISCHANDRAKAR, Ambreesh KUMAR, Shyam RAJADHYAX, Nikhil GORDIA, Chetan R. KUMAR
  • Patent number: 8068870
    Abstract: Enterprise location discovery in dual-mode phones. As dual-mode phones move within the enterprise Wi-Fi network, they track which cell tower they are associated with, reporting this information to an enterprise mobility controller. The enterprise mobility controller builds a list of cell tower identifiers which are associated with enterprise Wi-Fi coverage, and makes this list available to subscribing dual-mode phones. Subscribing dual-mode phones can use this list to only scan for Wi-Fi availability when they are associated with a cell tower which is on the list.
    Type: Grant
    Filed: April 14, 2008
    Date of Patent: November 29, 2011
    Assignee: Aruba Networks, Inc.
    Inventors: Chetan R. Kumar, Pradeep J. Iyer, Arun Mahajan
  • Publication number: 20110167070
    Abstract: Reusing assets for packaged software application configurations may include defining one or more query criteria based on information associated with a project, querying an asset repository stored in a storage device using the one or more query criteria, receiving a list of one or more assets from the asset repository in response to the querying, and using the one or more assets on the list to compose a document defining deployment procedures associated with deploying a packaged software application.
    Type: Application
    Filed: January 6, 2010
    Publication date: July 7, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rema Ananthanarayanan, Manisha D. Bhandar, Kathleen Byrnes, Charbak Chatterjee, Shyhkwei Chen, Maharshi Desai, Pankaj Dhoolia, Sweefen Goh, Richard T. Goodwin, Mangala Gowri, Anca A. Ivan, Juhnyoung Lee, Senthil Kk Mani, Pietro Mazzoleni, Rakesh Mohan, Debdoot Mukherjee, Aubrey J. Rembert, Gerhard Sigl, Manas R. Kumar Singh, Vibha S. Sinha, Biplav Srivastava
  • Publication number: 20110133884
    Abstract: A method and apparatus is provided for configuring a security system. The method includes the steps of providing a plurality of configuration files on a computer readable medium where each configuration file defines an access control system or integrated security system and each configuration file is different than any other configuration file of the plurality of configuration files, presenting the plurality of configuration files to a person on a display, a configuration processor receiving a selection of a configuration file of the plurality of configuration files from the person and the processor automatically configuring an access control system or integrated security system in accordance with the selected configuration file.
    Type: Application
    Filed: December 3, 2009
    Publication date: June 9, 2011
    Applicant: Honeywell International Inc.
    Inventors: Aneesh R. Kumar, Arunachalam K. Sundararaman, Nithyanandhan G. Govindaraj, Vinay V. Venkatesh
  • Publication number: 20110099470
    Abstract: Harvesting assets for packaged application practices, in one aspect, may include obtaining one or more work products associated with deployment of packaged software applications, extracting content and style, enhancing content and style with models of work products, and storing assets in asset repository.
    Type: Application
    Filed: October 26, 2009
    Publication date: April 28, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rema Ananthanarayanan, Kathleen Byrnes, Charbak Chatterjee, Maharshi H. Desai, Pankaj Dhoolia, Sweefen Goh, Richard T. Goodwin, Mangala Gowri, Anca A. Ivan, Juhnyoung Lee, Senthil Kk Mani, Pietro Mazzoleni, Rakesh Mohan, Debdoot Mukherjee, Aubrey J. Rembert, Gerhard Sigl, Manas R. Kumar Singh, Vibha S. Sinha, Biplav Srivastava
  • Publication number: 20110078667
    Abstract: A method for static code analyzing customizations to a pre-packaged computing solution can include establishing a communicative connection from a recommendation generation module to a pre-packaged computing solution and authenticating into the pre-packaged computing solution. Customized program code can be extracted from the pre-packaged computing solution and a call graph of the customized program code can be constructed such that the call graph indicates method calls to different interfaces for program code of the pre-packaged computing solution. Finally, a report can be generated identifying customized program code to be adapted to a new version of the pre-packaged computing solution based upon changes in the different interfaces shown by the call graph to be used in the new version of the pre-packaged computing solution and modifications required for the customized program code to call the different interfaces in the new version of the pre-packaged computing solution.
    Type: Application
    Filed: September 29, 2009
    Publication date: March 31, 2011
    Applicant: International Business Machines Corporation
    Inventors: Julian T. Dolby, Richard T. Goodwin, Anca Andreea Ivan, Manas R. Kumar Singh
  • Publication number: 20090258668
    Abstract: Enterprise location discovery in dual-mode phones. As dual-mode phones move within the enterprise Wi-Fi network, they track which cell tower they are associated with, reporting this information to an enterprise mobility controller. The enterprise mobility controller builds a list of cell tower identifiers which are associated with enterprise Wi-Fi coverage, and makes this list available to subscribing dual-mode phones. Subscribing dual-mode phones can use this list to only scan for Wi-FI availability when they are associated with a cell tower which is on the list.
    Type: Application
    Filed: April 14, 2008
    Publication date: October 15, 2009
    Applicant: ARUBA NETWORKS, INC.
    Inventors: Chetan R. Kumar, Pradeep J. Iyer, Arun Mahajan
  • Patent number: 7515972
    Abstract: An apparatus includes a memory capable of storing information defining multiple function block types. A combination of instances of one or more function block types is capable of implementing a control process in a controller within a process control system. The apparatus also includes a function block editor capable of allowing a user to dynamically create or modify one or more of the function block types using a graphical user interface. The function block editor is capable of allowing the user to define one or more parameters for a function block type being created or modified.
    Type: Grant
    Filed: October 28, 2005
    Date of Patent: April 7, 2009
    Assignee: Honeywell International Inc.
    Inventors: Ravi R. Kumar, Mohamed F. M. Saleem Jahaber, Cathleen F. Kilpatrick