Patents by Inventor Rohit A. Shetty

Rohit A. Shetty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160285728
    Abstract: Embodiments of the present invention provide methods, computer program products, and systems for optimizing log analysis, such as in SaaS environments. Embodiments of the present invention can be used to determine an optimal log analysis location and ensure that the log file is processed at the optimal location based, at least in part, on the log file size and available network bandwidth.
    Type: Application
    Filed: March 25, 2015
    Publication date: September 29, 2016
    Inventors: Albee Jhoney, Hariharan Krishna, Rohit Shetty
  • Publication number: 20160246768
    Abstract: A computer-implemented method, carried out by one or more processors, for managing product configuration files. In an embodiment, the method comprises the steps of receiving, by one or more processors, a document containing one or more annotations, wherein the one or more annotations are associated with one or more files; determining, by one or more processors, an annotation has been selected from the one or more annotations to access a particular file associated with the selected annotation; linking, by one or more processors, a storage location for the particular file associated with the selected annotation to the received document; and displaying, by one or more processors, content of the particular file associated with the selected annotation in the received document.
    Type: Application
    Filed: May 12, 2016
    Publication date: August 25, 2016
    Inventors: Gaurav Nigam, Arun Ramakrishnan, Rohit Shetty
  • Patent number: 9417995
    Abstract: Embodiments of the present invention enable users to extract knowledge from testing scenarios performed during application development, and later employ that knowledge to interpret application usage scenarios to enhance serviceability of applications by expediting identification and solving of problems. In an exemplary embodiment, log data generated during simulation of test cases is analyzed to create one or more rules based on patterns in which one or more log entries appear in the log data. Later, log data may be analyzed to look for a pattern of log entries that matches a pattern-based rule, thereby facilitating faster identification and resolution of the problem.
    Type: Grant
    Filed: March 16, 2016
    Date of Patent: August 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Hariharan Krishna, Arun Ramakrishnan, Rohit Shetty
  • Publication number: 20160224401
    Abstract: An expert system extracts events associated with executing an application from log files generated by various topological resources in a distributed computing environment. The events are plotted as plot points on a time series graph. Patterns are identified in the plot points that are associated with application problems, along with the computing environment configurations both before the problem and after the problem was resolved. The difference in the configurations represents a corrective action for the application problem, and the expert system links the corrective action to the pattern. When a pattern repeats in conjunction with another application problem, the corrective action is identified as a possible solution to the new problem. A confidence level associated with the pattern/corrective action may be increased when a user accepts the corrective action and may be decreased when a user rejects the corrective action.
    Type: Application
    Filed: February 2, 2015
    Publication date: August 4, 2016
    Inventors: Geetha Adinarayan, Anindya Neogi, Vinay G. Rajagopal, Rohit Shetty
  • Publication number: 20160196203
    Abstract: Embodiments of the present invention enable users to extract knowledge from testing scenarios performed during application development, and later employ that knowledge to interpret application usage scenarios to enhance serviceability of applications by expediting identification and solving of problems. In an exemplary embodiment, log data generated during simulation of test cases is analyzed to create one or more rules based on patterns in which one or more log entries appear in the log data. Later, log data may be analyzed to look for a pattern of log entries that matches a pattern-based rule, thereby facilitating faster identification and resolution of the problem.
    Type: Application
    Filed: March 16, 2016
    Publication date: July 7, 2016
    Inventors: Hariharan Krishna, Arun Ramakrishnan, Rohit Shetty
  • Patent number: 9380056
    Abstract: A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method comprises the steps of determining, by one or more processors, one or more input methods supported for a password entry, wherein the password entry verifies a user's credentials; receiving, by one or more processors, a candidate password through the one or more input methods, wherein each character of the candidate password has an associated input method; and storing, by one or more processors, the candidate password as the password entry, along with the associated input method for each character of the candidate password.
    Type: Grant
    Filed: January 12, 2016
    Date of Patent: June 28, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anuj Dubey, Maruthi Latha, Rohit Shetty, Anurag A. Sinha
  • Patent number: 9372845
    Abstract: A computer-implemented method, carried out by one or more processors, for managing product configuration files. In an embodiment, the method comprises the steps of receiving, by one or more processors, a document containing one or more annotations, wherein the one or more annotations are associated with one or more files; determining, by one or more processors, an annotation has been selected from the one or more annotations to access a particular file associated with the selected annotation; linking, by one or more processors, a storage location for the particular file associated with the selected annotation to the received document; and displaying, by one or more processors, content of the particular file associated with the selected annotation in the received document.
    Type: Grant
    Filed: December 21, 2015
    Date of Patent: June 21, 2016
    Assignee: International Business Machines Corporation
    Inventors: Gaurav Nigam, Arun Ramakrishnan, Rohit Shetty
  • Patent number: 9348739
    Abstract: Embodiments of the present invention enable users to extract knowledge from testing scenarios performed during application development, and later employ that knowledge to interpret application usage scenarios to enhance serviceability of applications by expediting identification and solving of problems. In an exemplary embodiment, log data generated during simulation of test cases is analyzed to create one or more rules based on patterns in which one or more log entries appear in the log data. Later, log data may be analyzed to look for a pattern of log entries that matches a pattern-based rule, thereby facilitating faster identification and resolution of the problem.
    Type: Grant
    Filed: July 10, 2014
    Date of Patent: May 24, 2016
    Assignee: International Business Machines Corporation
    Inventors: Hariharan Krishna, Arun Ramakrishnan, Rohit Shetty
  • Patent number: 9336188
    Abstract: A method and apparatus for generating a statistical tree representing an extensible markup language Schema (XSD) is disclosed. Components of the XSD are prioritized according to predefined rules. A root node representing said XSD is created. Pairs of child nodes are generated from the root node. Each pair comprises at least one genuine node, and each pair of generated child nodes is appended to a parent node which is a genuine node. The path to each of said child nodes from a respective parent genuine node is represented with a binary sequence. At least one genuine node is allocated to a corresponding component of said XSD, the allocation being based on the prioritization of the component.
    Type: Grant
    Filed: January 21, 2011
    Date of Patent: May 10, 2016
    Assignee: International Business Machines Corporation
    Inventors: Rohit Shetty, Umesh Kumar Balaraj
  • Patent number: 9338127
    Abstract: Communication between (at least) two domains where domain name resolution for the first domain is not going to be available to clients in the second domain “as a service” but more as a “capability” available inherently in web containers. This can be accomplished as follows: (i) connecting a first server computer in direct data communication with a first domain and a second domain; (ii) storing domain name system (DNS) mapping information for the second domain on the first server computer; (iii) storing a first network page related to a network application on the first server computer; and (iv) sending, from the first server computer to a client computer on the first domain, the first network page and the DNS mapping information for the second domain.
    Type: Grant
    Filed: September 11, 2013
    Date of Patent: May 10, 2016
    Assignee: International Business Machines Corparation
    Inventors: Logeswaran T. Rajamanickam, Rohit Shetty
  • Publication number: 20160127350
    Abstract: A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method comprises the steps of determining, by one or more processors, one or more input methods supported for a password entry, wherein the password entry verifies a user's credentials; receiving, by one or more processors, a candidate password through the one or more input methods, wherein each character of the candidate password has an associated input method; and storing, by one or more processors, the candidate password as the password entry, along with the associated input method for each character of the candidate password.
    Type: Application
    Filed: January 12, 2016
    Publication date: May 5, 2016
    Inventors: Anuj Dubey, Maruthi Latha, Rohit Shetty, Anurag A. Sinha
  • Publication number: 20160103818
    Abstract: A computer-implemented method, carried out by one or more processors, for managing product configuration files. In an embodiment, the method comprises the steps of receiving, by one or more processors, a document containing one or more annotations, wherein the one or more annotations are associated with one or more files; determining, by one or more processors, an annotation has been selected from the one or more annotations to access a particular file associated with the selected annotation; linking, by one or more processors, a storage location for the particular file associated with the selected annotation to the received document; and displaying, by one or more processors, content of the particular file associated with the selected annotation in the received document.
    Type: Application
    Filed: December 21, 2015
    Publication date: April 14, 2016
    Inventors: Gaurav Nigam, Arun Ramakrishnan, Rohit Shetty
  • Patent number: 9298903
    Abstract: Provided are techniques for transmitting a lightweight domain access protocol (LDAP) request from an user interface application (UIA) to a LDAP server, receiving, at the UIA, a LTPA token in response to the transmitting of the LDAP request; transmitting, from the UIA, to a command line interface associated with an application, the LTPA token in conjunction with a command to be executed by the application; verifying by the application the LTPA token; and in response to the verifying, executing, by the application the command. The techniques also include transmitting, from the application, to a second command line interface associated with a second application, the LTPA token in conjunction with a second command to be executed by the second application; verifying by the second application the LTPA token; and in response to the verifying by the second application, executing, by the second application the second command.
    Type: Grant
    Filed: March 16, 2013
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventors: Gaurav Gupta, Logeswaram T. Rajamanickam, Arun Ramakrishnan, Rohit Shetty
  • Patent number: 9288203
    Abstract: A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method comprises the steps of determining, by one or more processors, one or more input methods supported for a password entry, wherein the password entry verifies a user's credentials; receiving, by one or more processors, a candidate password through the one or more input methods, wherein each character of the candidate password has an associated input method; and storing, by one or more processors, the candidate password as the password entry, along with the associated input method for each character of the candidate password.
    Type: Grant
    Filed: September 8, 2014
    Date of Patent: March 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: Anuj Dubey, Maruthi Latha, Rohit Shetty, Anurag A. Sinha
  • Patent number: 9275220
    Abstract: A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method comprises the steps of determining, by one or more processors, one or more input methods supported for a password entry, wherein the password entry verifies a user's credentials; receiving, by one or more processors, a candidate password through the one or more input methods, wherein each character of the candidate password has an associated input method; and storing, by one or more processors, the candidate password as the password entry, along with the associated input method for each character of the candidate password.
    Type: Grant
    Filed: June 16, 2014
    Date of Patent: March 1, 2016
    Assignee: International Business Machines Corporation
    Inventors: Anuj Dubey, Maruthi Latha, Rohit Shetty, Anurag A. Sinha
  • Publication number: 20160020963
    Abstract: An approach is provided for consolidating cross product contextual help. The approach responds when a help request is received at a computer system from a user. The computer system has a number of installed software products. Software services that have been installed on the computer system by the software products are identified along with a number of relationships between the software products. The software services and relationships are retrieved from a registry. Help contents data are retrieved from the software products based on the identified software services. The approach generates a consolidated help contents from the help contents data retrieved from the software products with the generated consolidated including a topology based on the relationships between the software products. The approach presents the consolidated help contents with topology to the user.
    Type: Application
    Filed: August 11, 2015
    Publication date: January 21, 2016
    Inventors: Albee Jhoney, Christopher Lazzaro, Arun Ramakrishnan, Rohit Shetty, Nalini Vidapankal
  • Publication number: 20160019187
    Abstract: An approach is provided for consolidating cross product contextual help. The approach responds when a help request is received at a computer system from a user. The computer system has a number of installed software products. Software services that have been installed on the computer system by the software products are identified along with a number of relationships between the software products. The software services and relationships are retrieved from a registry. Help contents data are retrieved from the software products based on the identified software services. The approach generates a consolidated help contents from the help contents data retrieved from the software products with the generated consolidated including a topology based on the relationships between the software products. The approach presents the consolidated help contents with topology to the user.
    Type: Application
    Filed: July 16, 2014
    Publication date: January 21, 2016
    Inventors: Albee Jhoney, Christopher V. Lazzaro, Arun Ramakrishnan, Rohit Shetty, Nalini Vidapankal
  • Publication number: 20160011960
    Abstract: Embodiments of the present invention enable users to extract knowledge from testing scenarios performed during application development, and later employ that knowledge to interpret application usage scenarios to enhance serviceability of applications by expediting identification and solving of problems. In an exemplary embodiment, log data generated during simulation of test cases is analyzed to create one or more rules based on patterns in which one or more log entries appear in the log data. Later, log data may be analyzed to look for a pattern of log entries that matches a pattern-based rule, thereby facilitating faster identification and resolution of the problem.
    Type: Application
    Filed: July 10, 2014
    Publication date: January 14, 2016
    Inventors: Hariharan Krishna, Arun Ramakrishnan, Rohit Shetty
  • Publication number: 20150363592
    Abstract: A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method comprises the steps of determining, by one or more processors, one or more input methods supported for a password entry, wherein the password entry verifies a user's credentials; receiving, by one or more processors, a candidate password through the one or more input methods, wherein each character of the candidate password has an associated input method; and storing, by one or more processors, the candidate password as the password entry, along with the associated input method for each character of the candidate password.
    Type: Application
    Filed: June 16, 2014
    Publication date: December 17, 2015
    Inventors: Anuj Dubey, Maruthi Latha, Rohit Shetty, Anurag A. Sinha
  • Publication number: 20150365396
    Abstract: A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method comprises the steps of determining, by one or more processors, one or more input methods supported for a password entry, wherein the password entry verifies a user's credentials; receiving, by one or more processors, a candidate password through the one or more input methods, wherein each character of the candidate password has an associated input method; and storing, by one or more processors, the candidate password as the password entry, along with the associated input method for each character of the candidate password.
    Type: Application
    Filed: September 8, 2014
    Publication date: December 17, 2015
    Inventors: Anuj Dubey, Maruthi Latha, Rohit Shetty, Anurag A. Sinha