Patents by Inventor Rohith Ashok

Rohith Ashok has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10805292
    Abstract: Methods and apparatuses are described for secure authentication and network access management for mobile computing devices. A server establishes a communications session with a mobile device. The server receives a network access request from the mobile device, the network access request including user access class data based upon authentication credentials provided by a user. The server determines a level of network access to provide to the mobile device based upon the user access class data. The server generates network configurations based upon the determined level of network access. The server applies the network configurations to the communications session with the mobile device. The server transmits an acknowledgment of the network access request to the mobile device. The mobile device routes network traffic originating from the mobile device to external network devices according to the applied network configurations.
    Type: Grant
    Filed: February 19, 2018
    Date of Patent: October 13, 2020
    Assignee: FMR LLC
    Inventors: Rohith Ashok, Stein Eriksen
  • Patent number: 10503553
    Abstract: Methods and apparatuses are described for coordinated scaling of a cloud-based software application and a backend resource in a networked computing environment. A server captures resource usage metrics associated with cloud-based applications. The server captures resource usage metrics associated with backend resources that correspond to the cloud-based applications. The server aggregates the resource usage metrics to generate a set of integrated application-level resource usage metrics. The server determines a current resource consumption level based upon the integrated application-level resource usage metrics for the cloud-based software application. The server compares the current resource consumption level to a desired resource consumption level. The server computing device changes resource availability for the cloud-based software application, based upon a difference between the current resource consumption level and the desired resource consumption level.
    Type: Grant
    Filed: February 12, 2019
    Date of Patent: December 10, 2019
    Assignee: FMR LLC
    Inventors: Rohith Ashok, Stein Eriksen
  • Publication number: 20190260741
    Abstract: Methods and apparatuses are described for secure authentication and network access management for mobile computing devices. A server establishes a communications session with a mobile device. The server receives a network access request from the mobile device, the network access request including user access class data based upon authentication credentials provided by a user. The server determines a level of network access to provide to the mobile device based upon the user access class data. The server generates network configurations based upon the determined level of network access. The server applies the network configurations to the communications session with the mobile device. The server transmits an acknowledgment of the network access request to the mobile device. The mobile device routes network traffic originating from the mobile device to external network devices according to the applied network configurations.
    Type: Application
    Filed: February 19, 2018
    Publication date: August 22, 2019
    Inventors: Rohith Ashok, Stein Eriksen
  • Patent number: 8782640
    Abstract: At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines.
    Type: Grant
    Filed: March 30, 2012
    Date of Patent: July 15, 2014
    Assignee: International Business Machines Corporation
    Inventors: Rohith Ashok, Matt R. Hogstrom, Jose Ortiz, Ruth E. Willenborg
  • Patent number: 8539222
    Abstract: Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: September 17, 2013
    Assignee: International Business Machines Corporation
    Inventors: Rohith Ashok, Matthew R. Hogstrom, Ian N. Whalley
  • Patent number: 8495356
    Abstract: Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk.
    Type: Grant
    Filed: December 31, 2010
    Date of Patent: July 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Rohith Ashok, Matthew R. Hogstrom, Ian N. Whalley
  • Patent number: 8381211
    Abstract: At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines.
    Type: Grant
    Filed: April 26, 2010
    Date of Patent: February 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Rohith Ashok, Matt R. Hogstrom, Jose Ortiz, Ruth E. Willenborg
  • Publication number: 20120192185
    Abstract: At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines.
    Type: Application
    Filed: March 30, 2012
    Publication date: July 26, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith Ashok, Matt R. Hogstrom, Jose Ortiz, Ruth E. Willenborg
  • Publication number: 20120173866
    Abstract: Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk.
    Type: Application
    Filed: December 31, 2010
    Publication date: July 5, 2012
    Applicant: International Business Machines Corporation
    Inventors: Rohith Ashok, Matthew R. Hogstrom, Ian N. Whalley
  • Publication number: 20120174099
    Abstract: Automatic optimization of application performance parameters is provided. This optimization may be provided by identifying the resource demands of applications using virtual resources, identifying the virtual resources that can be available to the applications, and allocating the virtual resources to the applications to be run on a virtual machine.
    Type: Application
    Filed: March 7, 2012
    Publication date: July 5, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith Ashok, David B. Gilgen, Ruth E. Willenborg
  • Publication number: 20120173871
    Abstract: Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk.
    Type: Application
    Filed: February 28, 2012
    Publication date: July 5, 2012
    Applicant: International Business Machines Corporation
    Inventors: Rohith Ashok, Matthew R. Hogstrom, Ian N. Whalley
  • Publication number: 20110271276
    Abstract: Automatic optimization of application performance parameters is provided. This optimization may be provided by identifying the resource demands of applications using virtual resources, identifying the virtual resources that can be available to the applications, and allocating the virtual resources to the applications to be run on a virtual machine.
    Type: Application
    Filed: April 28, 2010
    Publication date: November 3, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith Ashok, David B. Gilgen, Ruth E. Willenborg
  • Publication number: 20110265082
    Abstract: At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines.
    Type: Application
    Filed: April 26, 2010
    Publication date: October 27, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith Ashok, Matt R. Hogstrom, Jose Ortiz, Ruth E. Willenborg
  • Publication number: 20060123018
    Abstract: A method of deploying enterprise applications or updates to data processing systems in a complex data processing environment. The enterprise applications or updates are phase deployed to the target data processing systems. Phased deployment includes the steps of preparing one affected node, quiescing all affected servers in the node, stopping all affected servers in the node, synchronizing the node, delivering the applications or updates, starting all affected servers, reactivating all affected servers, restoring the affected node, and repeating these steps for each affected node one at a time until all targeted data processing systems have been affected.
    Type: Application
    Filed: December 3, 2004
    Publication date: June 8, 2006
    Applicant: International Business Machines Corporation
    Inventors: Rohith Ashok, Charles Redlin, Barry Searle, Christopher Vignola, Leigh Williamson
  • Publication number: 20060123016
    Abstract: A meta-data driven method and apparatus to manage configurations of coexisting heterogeneous subsystems. The present invention recognizes that schemas evolve incrementally from version to version. In a preferred embodiment, the present invention employs two stages: an identification specification stage, to identify and/or specify any changes in a heterogeneous distributed system, and a configuration validation stage, to implement and/or validate the changes thus identified or specified. In the first stage, the identification specification stage, the present invention programmably compares the next version of the schema from its previous version. This allows meta-data to be created that describes how a schema component evolves from version to version. In addition, a user may specify what appears in the schema.
    Type: Application
    Filed: December 2, 2004
    Publication date: June 8, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith Ashok, Michael Cheng, Vishwanath Venkataramappa, Qinhua Wang