Patents by Inventor Sachin Chandrakant Punadikar

Sachin Chandrakant Punadikar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11575657
    Abstract: A method for mitigating misinformation in encrypted messaging environments includes receiving content from an originating user, encrypting the content into an originating message using a first encrypting key, appending an originating message identifier to the originating message, storing the originating message identifier on a messaging server in conjunction with transmitting the originating message to a first device corresponding to a first recipient, decrypting the originating message using a first decrypting key, storing the content on the first device to produce locally stored content and inserting the originating message identifier within metadata for the locally stored content. The method may also include encrypting the locally stored content into a new message intended for a second recipient, detecting the originating message identifier within the metadata for the locally stored content, and appending the originating message identifier to the new message.
    Type: Grant
    Filed: February 25, 2020
    Date of Patent: February 7, 2023
    Assignee: International Business Machines Corporation
    Inventors: Sachin Chandrakant Punadikar, Sasikanth Eda, Abhishek Jain, Sandeep Ramesh Patil
  • Publication number: 20230018707
    Abstract: A method includes adding new storage capacity to a data storage system, which has a pre-existing storage capacity. The method further includes rebalancing data from the pre-existing storage capacity to the new storage capacity in connection with a non-rebalancing operation performed on the pre-existing storage capacity.
    Type: Application
    Filed: July 16, 2021
    Publication date: January 19, 2023
    Inventors: Shankar Tukaram More, Ujjwal Lanjewar, Sachin Chandrakant Punadikar
  • Patent number: 11526584
    Abstract: Methods that can assign access permission to social media are disclosed herein. One method includes determining, by a processor, an impact of a plurality of impacts on an owner of a social media post, the impact based on a follower of the social media post, and assigning a permission of a plurality of permissions to the follower for accessing the social media post based on the determined impact. Apparatus, systems, and computer program products that can include, perform, and/or implement the methods are also disclosed herein.
    Type: Grant
    Filed: October 14, 2019
    Date of Patent: December 13, 2022
    Assignee: International Business Machines Corporation
    Inventors: Abhishek Jain, Sasikanth Eda, Sandeep Ramesh Patil, Sachin Chandrakant Punadikar
  • Publication number: 20220124961
    Abstract: An approach to the prediction of soil density and subsoil crop growth may be provided. The approach may include subsoil sensor which can monitor changes in soil pressure and moisture conditions. The sensor data can be sent to a computer module which can process the data using a machine learning model predicting the soil density around a subsoil crop and the yield of the subsoil crop. A soil maintenance plan can be generated from the soil density prediction and/or the crop yield prediction. The soil maintenance plan can be sent to soil management robots, which can execute the soil maintenance plan.
    Type: Application
    Filed: October 28, 2020
    Publication date: April 28, 2022
    Inventors: Sasikanth Eda, Sarbajit K. Rakshit, Sachin Chandrakant Punadikar, Sandeep Ramesh Patil
  • Patent number: 11132230
    Abstract: A computer-implemented method according to one embodiment includes partitioning resources of a network file system (NFS) platform into a plurality of zones, based on a number of exports within the NFS platform; receiving, at one of the exports within the NFS platform, a request from a first application to utilize the resources of the NFS platform; and allocating a predetermined portion of the resources to the first application within one of the plurality of zones, based on information included within the request.
    Type: Grant
    Filed: July 15, 2019
    Date of Patent: September 28, 2021
    Assignee: International Business Machines Corporation
    Inventors: Sachin Chandrakant Punadikar, Sasikanth Eda, Abhishek Jain, Sandeep Ramesh Patil
  • Publication number: 20210266298
    Abstract: A method for mitigating misinformation in encrypted messaging environments includes receiving content from an originating user, encrypting the content into an originating message using a first encrypting key, appending an originating message identifier to the originating message, storing the originating message identifier on a messaging server in conjunction with transmitting the originating message to a first device corresponding to a first recipient, decrypting the originating message using a first decrypting key, storing the content on the first device to produce locally stored content and inserting the originating message identifier within metadata for the locally stored content. The method may also include encrypting the locally stored content into a new message intended for a second recipient, detecting the originating message identifier within the metadata for the locally stored content, and appending the originating message identifier to the new message.
    Type: Application
    Filed: February 25, 2020
    Publication date: August 26, 2021
    Inventors: Sachin Chandrakant Punadikar, Sasikanth Eda, Abhishek Jain, Sandeep Ramesh Patil
  • Patent number: 11074186
    Abstract: A computer-implemented method according to one embodiment includes managing a cache in a tiered data storage system. The cache is configured to be powered by a temporary power source during a power loss event. The managing includes determining an amount of time that the temporary power source is capable of powering the cache before the temporary power source is depleted, and maintaining a dynamic cache size. The maintaining includes dynamically selecting the cache size based on the amount of time that the temporary power source is capable of powering the cache before the temporary power source is depleted, and based on a latency of destaging extents of data in the cache.
    Type: Grant
    Filed: January 14, 2020
    Date of Patent: July 27, 2021
    Assignee: International Business Machines Corporation
    Inventors: Ganesh Govindrao Chaudhari, Kushal Patel, Sachin Chandrakant Punadikar, Sarvesh S. Patel
  • Publication number: 20210216463
    Abstract: A computer-implemented method according to one embodiment includes managing a cache in a tiered data storage system. The cache is configured to be powered by a temporary power source during a power loss event. The managing includes determining an amount of time that the temporary power source is capable of powering the cache before the temporary power source is depleted, and maintaining a dynamic cache size. The maintaining includes dynamically selecting the cache size based on the amount of time that the temporary power source is capable of powering the cache before the temporary power source is depleted, and based on a latency of destaging extents of data in the cache.
    Type: Application
    Filed: January 14, 2020
    Publication date: July 15, 2021
    Inventors: Ganesh Govindrao Chaudhari, Kushal Patel, Sachin Chandrakant Punadikar, Sarvesh S. Patel
  • Patent number: 11010091
    Abstract: Embodiments are disclosed for a multi-tier storage system. The techniques include identifying a candidate extent stored in a first tier of a first storage pool of a multi-tier storage system (MTSS). The candidate extent is blocked from promotion because of a space constraint on a second tier. The techniques also include identifying a second tier of a second storage pool. The second tier provides faster input-output (I/O) access than the first tier provides. Additionally, the second pool includes available space to store the candidate extent. The techniques further include copying the candidate extent to the second tier of the second storage pool. The techniques also include generating a cross-pool mapping. The cross-pool mapping maps from a first address of the candidate extent in the first tier of the first storage pool to a second address of the copied candidate extent in the second tier of the second storage pool.
    Type: Grant
    Filed: August 29, 2019
    Date of Patent: May 18, 2021
    Assignee: International Business Machines Corporation
    Inventors: Kushal Patel, Pardeep Singh, Sarvesh S. Patel, Sachin Chandrakant Punadikar
  • Publication number: 20210110003
    Abstract: Methods that can assign access permission to social media are disclosed herein. One method includes determining, by a processor, an impact of a plurality of impacts on an owner of a social media post, the impact based on a follower of the social media post, and assigning a permission of a plurality of permissions to the follower for accessing the social media post based on the determined impact. Apparatus, systems, and computer program products that can include, perform, and/or implement the methods are also disclosed herein.
    Type: Application
    Filed: October 14, 2019
    Publication date: April 15, 2021
    Inventors: Abhishek Jain, Sasikanth Eda, Sandeep Ramesh Patil, Sachin Chandrakant Punadikar
  • Publication number: 20210064272
    Abstract: Embodiments are disclosed for a multi-tier storage system. The techniques include identifying a candidate extent stored in a first tier of a first storage pool of a multi-tier storage system (MTSS). The candidate extent is blocked from promotion because of a space constraint on a second tier. The techniques also include identifying a second tier of a second storage pool. The second tier provides faster input-output (I/O) access than the first tier provides. Additionally, the second pool includes available space to store the candidate extent. The techniques further include copying the candidate extent to the second tier of the second storage pool. The techniques also include generating a cross-pool mapping. The cross-pool mapping maps from a first address of the candidate extent in the first tier of the first storage pool to a second address of the copied candidate extent in the second tier of the second storage pool.
    Type: Application
    Filed: August 29, 2019
    Publication date: March 4, 2021
    Inventors: Kushal Patel, Pardeep Singh, Sarvesh S. Patel, Sachin Chandrakant Punadikar
  • Publication number: 20210019190
    Abstract: A computer-implemented method according to one embodiment includes partitioning resources of a network file system (NFS) platform into a plurality of zones, based on a number of exports within the NFS platform; receiving, at one of the exports within the NFS platform, a request from a first application to utilize the resources of the NFS platform; and allocating a predetermined portion of the resources to the first application within one of the plurality of zones, based on information included within the request.
    Type: Application
    Filed: July 15, 2019
    Publication date: January 21, 2021
    Inventors: Sachin Chandrakant Punadikar, Sasikanth Eda, Abhishek Jain, Sandeep Ramesh Patil
  • Patent number: 8495366
    Abstract: A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session ticket from the client that includes a security protocol mounting selection. The file server decrypts the client's user's encrypted private key, and then decrypts the requested encrypted file system using the private key. In turn, the file server sends the decrypted file system to the client over a secure channel, which is based upon the security protocol mounting selection. In one embodiment, a key distribution center server receives a request from the client for the client's user to access the encrypted file system at the file server. The key distribution center server retrieves an intermediate key; includes the intermediate key in a session ticket; and sends the session ticket to the client.
    Type: Grant
    Filed: April 18, 2012
    Date of Patent: July 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Dwip N. Banerjee, Sachin Chandrakant Punadikar, Sandeep Ramesh Patil, Ravi A. Shankar
  • Patent number: 8478996
    Abstract: A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session ticket from the client that includes a security protocol mounting selection. The file server decrypts the client's user's encrypted private key, and then decrypts the requested encrypted file system using the private key. In turn, the file server sends the decrypted file system to the client over a secure channel, which is based upon the security protocol mounting selection. In one embodiment, a key distribution center server receives a request from the client for the client's user to access the encrypted file system at the file server. The key distribution center server retrieves an intermediate key; includes the intermediate key in a session ticket; and sends the session ticket to the client.
    Type: Grant
    Filed: December 21, 2009
    Date of Patent: July 2, 2013
    Assignee: International Business Machines Corporation
    Inventors: Dwip N. Banerjee, Sachin Chandrakant Punadikar, Sandeep Ramesh Patil, Ravi A. Shankar
  • Publication number: 20120204028
    Abstract: A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session ticket from the client that includes a security protocol mounting selection. The file server decrypts the client's user's encrypted private key, and then decrypts the requested encrypted file system using the private key. In turn, the file server sends the decrypted file system to the client over a secure channel, which is based upon the security protocol mounting selection. In one embodiment, a key distribution center server receives a request from the client for the client's user to access the encrypted file system at the file server. The key distribution center server retrieves an intermediate key; includes the intermediate key in a session ticket; and sends the session ticket to the client.
    Type: Application
    Filed: April 18, 2012
    Publication date: August 9, 2012
    Applicant: International Business Machines Corporation
    Inventors: Dwip N. Banerjee, Sachin Chandrakant Punadikar, Sandeep Ramesh Patil, Ravi A. Shankar
  • Publication number: 20110154031
    Abstract: A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session ticket from the client that includes a security protocol mounting selection. The file server decrypts the client's user's encrypted private key, and then decrypts the requested encrypted file system using the private key. In turn, the file server sends the decrypted file system to the client over a secure channel, which is based upon the security protocol mounting selection. In one embodiment, a key distribution center server receives a request from the client for the client's user to access the encrypted file system at the file server. The key distribution center server retrieves an intermediate key; includes the intermediate key in a session ticket; and sends the session ticket to the client.
    Type: Application
    Filed: December 21, 2009
    Publication date: June 23, 2011
    Applicant: International Business Machines Corporation
    Inventors: Dwip N. Banerjee, Sachin Chandrakant Punadikar, Sandeep Ramesh Patil, Ravi A. Shankar