Patents by Inventor Ramamohan Chennamsetty
Ramamohan Chennamsetty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11689523Abstract: Techniques are described with respect to facilitating password creation via a secure device in a defined corporate environment. An associated method includes receiving an authentication request associated with an authorized client of a client system in the defined corporate environment and initializing the secure device with respect to the client system responsive to validating the authentication request. The method further includes creating a password for the client system in compliance with policy criteria associated with the defined corporate environment, encrypting the password, and distributing the password via at least one predetermined technique. In an embodiment, the method further includes creating access control credentials for the client system in compliance with the policy criteria associated with the defined corporate environment.Type: GrantFiled: March 13, 2020Date of Patent: June 27, 2023Assignee: Kyndryl, Inc.Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Ramamohan Chennamsetty, Mauro Marzorati
-
Patent number: 11288234Abstract: A file division and erasure code application executing in a controlling computational device generates data fragments and parity fragments of a file. Each of the generated data fragments and parity fragments are distributed in a different distributed computational device of a plurality of distributed computational devices, where distributing of a generated data fragment comprises determining whether any distributed computational device already stores a duplicate copy of the generated data fragment, and if any distributed computational device already stores the duplicate copy of the generated data fragment, placing the generated data fragment in the distributed computational device if no other data or parity fragment of the file has already been placed in the distributed computational device.Type: GrantFiled: February 26, 2019Date of Patent: March 29, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ramamohan Chennamsetty, Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi
-
Publication number: 20210288950Abstract: Techniques are described with respect to facilitating password creation via a secure device in a defined corporate environment. An associated method includes receiving an authentication request associated with an authorized client of a client system in the defined corporate environment and initializing the secure device with respect to the client system responsive to validating the authentication request. The method further includes creating a password for the client system in compliance with policy criteria associated with the defined corporate environment, encrypting the password, and distributing the password via at least one predetermined technique. In an embodiment, the method further includes creating access control credentials for the client system in compliance with the policy criteria associated with the defined corporate environment.Type: ApplicationFiled: March 13, 2020Publication date: September 16, 2021Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Ramamohan Chennamsetty, Mauro Marzorati
-
Patent number: 10963580Abstract: Embodiments for rendering content by a processor are provided. A request to render content is received. A score is assigned to each of a plurality of rendering browsers based on a plurality of factors associated with the content and the plurality of rendering browsers, the score used in determining a selection of the rendering browser and weighted according to each of the plurality of factors which include: a security risk of the content, and language support, performance characteristics and a user preference of the plurality of rendering browsers. The selected rendering browser is automatically instantiated and the content is rendered by the selected rendering browser on the computing device.Type: GrantFiled: August 7, 2019Date of Patent: March 30, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ramamohan Chennamsetty, Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt
-
Patent number: 10635794Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.Type: GrantFiled: November 13, 2017Date of Patent: April 28, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
-
Publication number: 20190362084Abstract: Embodiments for rendering content by a processor are provided. A request to render content is received. A score is assigned to each of a plurality of rendering browsers based on a plurality of factors associated with the content and the plurality of rendering browsers, the score used in determining a selection of the rendering browser and weighted according to each of the plurality of factors which include: a security risk of the content, and language support, performance characteristics and a user preference of the plurality of rendering browsers. The selected rendering browser is automatically instantiated and the content is rendered by the selected rendering browser on the computing device.Type: ApplicationFiled: August 7, 2019Publication date: November 28, 2019Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ramamohan CHENNAMSETTY, Charles K. DAVIS, III, Christopher R. DOTSON, Charles S. LINGAFELT
-
Patent number: 10430595Abstract: Embodiments for rendering content by a processor are provided. A request to render content is received. A rendering browser to render the content on a computing device is selected from a plurality of rendering browsers. The selecting of the rendering browser is based on security information associated with at least one of the content and the plurality of rendering browsers.Type: GrantFiled: September 22, 2016Date of Patent: October 1, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ramamohan Chennamsetty, Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt
-
Publication number: 20190197023Abstract: A file division and erasure code application executing in a controlling computational device generates data fragments and parity fragments of a file. Each of the generated data fragments and parity fragments are distributed in a different distributed computational device of a plurality of distributed computational devices, where distributing of a generated data fragment comprises determining whether any distributed computational device already stores a duplicate copy of the generated data fragment, and if any distributed computational device already stores the duplicate copy of the generated data fragment, placing the generated data fragment in the distributed computational device if no other data or parity fragment of the file has already been placed in the distributed computational device.Type: ApplicationFiled: February 26, 2019Publication date: June 27, 2019Inventors: Ramamohan Chennamsetty, Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi
-
Patent number: 10303243Abstract: Embodiments are directed to a computer-implemented method of controlling an electronic device. The method includes detecting, using a processor, a user using one or more sensors. The method further includes selecting one table from a set of tables, wherein each table includes a set of rules to be followed depending on the detecting step. The method further includes measuring changes in a position of the user that are detected by the one or more sensors. The method further includes comparing the changes in the position of the user to one or more rules in the selected table. The method further includes controlling the electronic device based on the comparison.Type: GrantFiled: January 26, 2017Date of Patent: May 28, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ramamohan Chennamsetty, Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt
-
Patent number: 10242020Abstract: A file division and erasure code application executing in a controlling computational device generates data fragments and parity fragments of a file. Each of the generated data fragments and parity fragments are distributed in a different distributed computational device of a plurality of distributed computational devices, where distributing of a generated data fragment comprises determining whether any distributed computational device already stores a duplicate copy of the generated data fragment, and if any distributed computational device already stores the duplicate copy of the generated data fragment, placing the generated data fragment in the distributed computational device if no other data or parity fragment of the file has already been placed in the distributed computational device.Type: GrantFiled: June 17, 2014Date of Patent: March 26, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ramamohan Chennamsetty, Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi
-
Publication number: 20180210543Abstract: Embodiments are directed to a computer-implemented method of controlling an electronic device. The method includes detecting, using a processor, a user using one or more sensors. The method further includes selecting one table from a set of tables, wherein each table includes a set of rules to be followed depending on the detecting step. The method further includes measuring changes in a position of the user that are detected by the one or more sensors. The method further includes comparing the changes in the position of the user to one or more rules in the selected table. The method further includes controlling the electronic device based on the comparison.Type: ApplicationFiled: January 26, 2017Publication date: July 26, 2018Inventors: Ramamohan Chennamsetty, Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt
-
Patent number: 10002048Abstract: In accordance with one embodiment of the present description, a logical file unit containing a set of data stored in cache or other memory and mapped by a reference pointer to a physical file unit in a storage, may be overwritten with new data in the memory without first read/write copying the data in memory to a new logical file unit in the file system. Instead, the original physical file unit of data in the storage is preserved and the original reference pointer for the original physical file unit of data may be used to map a new logical file unit in the file system to the original physical file unit storing the original set of data. Other aspects are described.Type: GrantFiled: May 15, 2014Date of Patent: June 19, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ramamohan Chennamsetty, Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi
-
Publication number: 20180082070Abstract: Embodiments for rendering content by a processor are provided. A request to render content is received. A rendering browser to render the content on a computing device is selected from a plurality of rendering browsers. The selecting of the rendering browser is based on security information associated with at least one of the content and the plurality of rendering browsers.Type: ApplicationFiled: September 22, 2016Publication date: March 22, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ramamohan CHENNAMSETTY, Charles K. DAVIS, III, Christopher R. DOTSON, Charles S. LINGAFELT
-
Publication number: 20180068099Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.Type: ApplicationFiled: November 13, 2017Publication date: March 8, 2018Inventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
-
Patent number: 9870454Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.Type: GrantFiled: December 16, 2015Date of Patent: January 16, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
-
Publication number: 20170177845Abstract: Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present disclosure, a computer-implemented method is provided. The method may comprise performing a trust evaluation to calculate a trust penalty value for a user based on a plurality of measured user attributes. The method may further comprise determining, by a processing device, a security access level based on a predefined trust threshold and the trust penalty value for the user. The method may also comprise applying the security access level to the user.Type: ApplicationFiled: December 16, 2015Publication date: June 22, 2017Inventors: Derek W. Botti, Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek
-
Publication number: 20170149828Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.Type: ApplicationFiled: November 24, 2015Publication date: May 25, 2017Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
-
Publication number: 20170149834Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.Type: ApplicationFiled: November 4, 2016Publication date: May 25, 2017Inventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
-
Patent number: 9654514Abstract: A computer establishes normal activity levels of a factor associated with an application, system, network, or computing environment. The computer receives rules prescribing the trust levels assigned to users or devices during normal and abnormal activity levels exhibited by the factor. The computer monitors the activity level exhibited by the factor and determines whether the activity is normal or abnormal. If the computer determines that the factor is exhibiting abnormal activity, the computer modifies the trust level of associated users and devices according to the rules. The computer continues to monitor the activity of the factor until the computer determines that normal activity levels of the factor have returned, at which point the computer modifies the trust level of associated users or devices according to the rules.Type: GrantFiled: November 4, 2016Date of Patent: May 16, 2017Assignee: International Business Machines CorporationInventors: Derek Botti, Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek
-
Patent number: 9645806Abstract: A system and method for deploying a software application to a hosting environment that considers the development environment, and bases any decision on data about the development environment to make a selection of hosting environment and/or operational attributes. The system and methods determines and attaches metadata describing the development environment to an application, then uses that metadata to select a deployment model, and to select an operational model. The method assigns a security risk score to a developed application which may be hosted in a virtual hosting environment or a physical hosting environment. The system and method considers security issues in its scoring and focuses on the security risk associated with an application that would be deployed. The method steps convey the application attributes, such as complexity, robustness, likelihood of operational issued, likelihood of compromise, etc. to the deployment and operating entities.Type: GrantFiled: September 30, 2014Date of Patent: May 9, 2017Assignee: International Business Machines CorporationInventors: Derek W. Botti, Ramamohan Chennamsetty, Anji D. Greene, Charles S. Lingafelt, William H. Tworek