Patents by Inventor Rohith Ashok
Rohith Ashok has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10805292Abstract: Methods and apparatuses are described for secure authentication and network access management for mobile computing devices. A server establishes a communications session with a mobile device. The server receives a network access request from the mobile device, the network access request including user access class data based upon authentication credentials provided by a user. The server determines a level of network access to provide to the mobile device based upon the user access class data. The server generates network configurations based upon the determined level of network access. The server applies the network configurations to the communications session with the mobile device. The server transmits an acknowledgment of the network access request to the mobile device. The mobile device routes network traffic originating from the mobile device to external network devices according to the applied network configurations.Type: GrantFiled: February 19, 2018Date of Patent: October 13, 2020Assignee: FMR LLCInventors: Rohith Ashok, Stein Eriksen
-
Patent number: 10503553Abstract: Methods and apparatuses are described for coordinated scaling of a cloud-based software application and a backend resource in a networked computing environment. A server captures resource usage metrics associated with cloud-based applications. The server captures resource usage metrics associated with backend resources that correspond to the cloud-based applications. The server aggregates the resource usage metrics to generate a set of integrated application-level resource usage metrics. The server determines a current resource consumption level based upon the integrated application-level resource usage metrics for the cloud-based software application. The server compares the current resource consumption level to a desired resource consumption level. The server computing device changes resource availability for the cloud-based software application, based upon a difference between the current resource consumption level and the desired resource consumption level.Type: GrantFiled: February 12, 2019Date of Patent: December 10, 2019Assignee: FMR LLCInventors: Rohith Ashok, Stein Eriksen
-
Publication number: 20190260741Abstract: Methods and apparatuses are described for secure authentication and network access management for mobile computing devices. A server establishes a communications session with a mobile device. The server receives a network access request from the mobile device, the network access request including user access class data based upon authentication credentials provided by a user. The server determines a level of network access to provide to the mobile device based upon the user access class data. The server generates network configurations based upon the determined level of network access. The server applies the network configurations to the communications session with the mobile device. The server transmits an acknowledgment of the network access request to the mobile device. The mobile device routes network traffic originating from the mobile device to external network devices according to the applied network configurations.Type: ApplicationFiled: February 19, 2018Publication date: August 22, 2019Inventors: Rohith Ashok, Stein Eriksen
-
Patent number: 8782640Abstract: At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines.Type: GrantFiled: March 30, 2012Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Rohith Ashok, Matt R. Hogstrom, Jose Ortiz, Ruth E. Willenborg
-
Patent number: 8539222Abstract: Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk.Type: GrantFiled: February 28, 2012Date of Patent: September 17, 2013Assignee: International Business Machines CorporationInventors: Rohith Ashok, Matthew R. Hogstrom, Ian N. Whalley
-
Patent number: 8495356Abstract: Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk.Type: GrantFiled: December 31, 2010Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventors: Rohith Ashok, Matthew R. Hogstrom, Ian N. Whalley
-
Patent number: 8381211Abstract: At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines.Type: GrantFiled: April 26, 2010Date of Patent: February 19, 2013Assignee: International Business Machines CorporationInventors: Rohith Ashok, Matt R. Hogstrom, Jose Ortiz, Ruth E. Willenborg
-
Publication number: 20120192185Abstract: At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines.Type: ApplicationFiled: March 30, 2012Publication date: July 26, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rohith Ashok, Matt R. Hogstrom, Jose Ortiz, Ruth E. Willenborg
-
Publication number: 20120173866Abstract: Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk.Type: ApplicationFiled: December 31, 2010Publication date: July 5, 2012Applicant: International Business Machines CorporationInventors: Rohith Ashok, Matthew R. Hogstrom, Ian N. Whalley
-
Publication number: 20120174099Abstract: Automatic optimization of application performance parameters is provided. This optimization may be provided by identifying the resource demands of applications using virtual resources, identifying the virtual resources that can be available to the applications, and allocating the virtual resources to the applications to be run on a virtual machine.Type: ApplicationFiled: March 7, 2012Publication date: July 5, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rohith Ashok, David B. Gilgen, Ruth E. Willenborg
-
Publication number: 20120173871Abstract: Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk.Type: ApplicationFiled: February 28, 2012Publication date: July 5, 2012Applicant: International Business Machines CorporationInventors: Rohith Ashok, Matthew R. Hogstrom, Ian N. Whalley
-
Publication number: 20110271276Abstract: Automatic optimization of application performance parameters is provided. This optimization may be provided by identifying the resource demands of applications using virtual resources, identifying the virtual resources that can be available to the applications, and allocating the virtual resources to the applications to be run on a virtual machine.Type: ApplicationFiled: April 28, 2010Publication date: November 3, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rohith Ashok, David B. Gilgen, Ruth E. Willenborg
-
Publication number: 20110265082Abstract: At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines.Type: ApplicationFiled: April 26, 2010Publication date: October 27, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rohith Ashok, Matt R. Hogstrom, Jose Ortiz, Ruth E. Willenborg
-
Publication number: 20060123018Abstract: A method of deploying enterprise applications or updates to data processing systems in a complex data processing environment. The enterprise applications or updates are phase deployed to the target data processing systems. Phased deployment includes the steps of preparing one affected node, quiescing all affected servers in the node, stopping all affected servers in the node, synchronizing the node, delivering the applications or updates, starting all affected servers, reactivating all affected servers, restoring the affected node, and repeating these steps for each affected node one at a time until all targeted data processing systems have been affected.Type: ApplicationFiled: December 3, 2004Publication date: June 8, 2006Applicant: International Business Machines CorporationInventors: Rohith Ashok, Charles Redlin, Barry Searle, Christopher Vignola, Leigh Williamson
-
Publication number: 20060123016Abstract: A meta-data driven method and apparatus to manage configurations of coexisting heterogeneous subsystems. The present invention recognizes that schemas evolve incrementally from version to version. In a preferred embodiment, the present invention employs two stages: an identification specification stage, to identify and/or specify any changes in a heterogeneous distributed system, and a configuration validation stage, to implement and/or validate the changes thus identified or specified. In the first stage, the identification specification stage, the present invention programmably compares the next version of the schema from its previous version. This allows meta-data to be created that describes how a schema component evolves from version to version. In addition, a user may specify what appears in the schema.Type: ApplicationFiled: December 2, 2004Publication date: June 8, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rohith Ashok, Michael Cheng, Vishwanath Venkataramappa, Qinhua Wang