Patents by Inventor Sadanand Rajaram Bajekal
Sadanand Rajaram Bajekal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10389527Abstract: A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event management sub-system detects events. The asset/workload management sub-system correlates events (irrespective of type) with the assets that generate them, and the key management sub-system uses the event-asset associations determined by the asset/workload management sub-system to automatically orchestrate the necessary key management activities (e.g., key creation, revocation, refresh, etc.) across the impacted components in the information technology and operational realms to ensure data security. In one use case, a security event detected by the event management sub-system triggers one or more actions within the asset/workload management sub-system. Service configuration records are identified from this scan, and assets defined in those records are identified.Type: GrantFiled: February 28, 2017Date of Patent: August 20, 2019Assignee: International Business Machines CorporationInventors: Sadanand Rajaram Bajekal, Jai Singh Arun, Michael Delaine Nix, Krishna Kishore Yellepeddy
-
Publication number: 20170244559Abstract: A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event management sub-system detects events. The asset/workload management sub-system correlates events (irrespective of type) with the assets that generate them, and the key management sub-system uses the event-asset associations determined by the asset/workload management sub-system to automatically orchestrate the necessary key management activities (e.g., key creation, revocation, refresh, etc.) across the impacted components in the information technology and operational realms to ensure data security. In one use case, a security event detected by the event management sub-system triggers one or more actions within the asset/workload management sub-system. Service configuration records are identified from this scan, and assets defined in those records are identified.Type: ApplicationFiled: February 28, 2017Publication date: August 24, 2017Inventors: Sadanand Rajaram Bajekal, Jai Singh Arun, MIchael Delaine Nix, Krishna Kishore Yellepeddy
-
Patent number: 9584314Abstract: A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event management sub-system detects events. The asset/workload management sub-system correlates events (irrespective of type) with the assets that generate them, and the key management sub-system uses the event-asset associations determined by the asset/workload management sub-system to automatically orchestrate the necessary key management activities (e.g., key creation, revocation, refresh, etc.) across the impacted components in the information technology and operational realms to ensure data security. In one use case, a security event detected by the event management sub-system triggers one or more actions within the asset/workload management sub-system. Service configuration records are identified from this scan, and assets defined in those records are identified.Type: GrantFiled: August 21, 2013Date of Patent: February 28, 2017Assignee: International Business Machines CorporationInventors: Sadanand Rajaram Bajekal, Jai Singh Arun, Michael Delaine Nix, Krishna Kishore Yellepeddy
-
Publication number: 20150055780Abstract: A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event management sub-system detects events. The asset/workload management sub-system correlates events (irrespective of type) with the assets that generate them, and the key management sub-system uses the event-asset associations determined by the asset/workload management sub-system to automatically orchestrate the necessary key management activities (e.g., key creation, revocation, refresh, etc.) across the impacted components in the information technology and operational realms to ensure data security. In one use case, a security event detected by the event management sub-system triggers one or more actions within the asset/workload management sub-system. Service configuration records are identified from this scan, and assets defined in those records are identified.Type: ApplicationFiled: August 21, 2013Publication date: February 26, 2015Applicant: International Business Machines CorporationInventors: Sadanand Rajaram Bajekal, Jai Singh Arun, MIchael Delaine Nix, Krishna Kishore Yellepeddy
-
Patent number: 8886670Abstract: A method for securely accessing a number of computing systems within a remote facility includes, with a mobile computing system, checking out access data from a centralized database, the access data providing access to the computing systems within the remote facility. The mobile computing device then interfaces with a first computing system, the first computing system being unable to have access criteria changed from a remote location. The mobile computing system then provides a user with access to the first computing system using the checked out access data without revealing that checked out access data to the user.Type: GrantFiled: November 11, 2011Date of Patent: November 11, 2014Assignee: International Business Machines CorporationInventors: Sadanand Rajaram Bajekal, Luis B. Casco-Arias, Archit Suhas Lohokare
-
Patent number: 8650634Abstract: A method includes receiving, at a computing device, one or more replicated authorization databases. At least one of the one or more replicated authorization databases corresponds to a subscription to access selected data. The selected data is aggregated from a plurality of sources. The method also includes storing the one or more replicated authorization databases at the computing device. The method also includes determining, via the replicated authorization databases, user permission to access the selected data via the computing device. The method also includes enabling access to the selected data at the computing device after determining the user permission to access the selected data.Type: GrantFiled: January 14, 2009Date of Patent: February 11, 2014Assignee: International Business Machines CorporationInventor: Sadanand Rajaram Bajekal
-
Publication number: 20130124566Abstract: A method for securely accessing a number of computing systems within a remote facility includes, with a mobile computing system, checking out access data from a centralized database, the access data providing access to the computing systems within the remote facility. The mobile computing device then interfaces with a first computing system, the first computing system being unable to have access criteria changed from a remote location. The mobile computing system then provides a user with access to the first computing system using the checked out access data without revealing that checked out access data to the user.Type: ApplicationFiled: November 11, 2011Publication date: May 16, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sadanand Rajaram Bajekal, Luis B. Casco-Arias, Archit Suhas Lohokare
-
Patent number: 8132231Abstract: A computer implemented method, data processing system, and computer program product for logical management and provisioning of business applications within the framework of an identity management system. The illustrative embodiments providing an interface layer to map respective attributes, permissions, and resource accounts in a data repository needed to represent access to business applications via a managed service in the identity management system. The illustrative embodiments define user entitlements on a user account associated with the managed service. The illustrative embodiments provision user access to the business applications via the managed service in the identity management system upon user request.Type: GrantFiled: December 6, 2007Date of Patent: March 6, 2012Assignee: International Business Machines CorporationInventors: Alexander Phillip Amies, Sadanand Rajaram Bajekal, Christopher Michael Bauserman, Leanne L. Chen, Sridhar R. Muppidi
-
Publication number: 20100180337Abstract: A method includes receiving, at a computing device, one or more replicated authorization databases. At least one of the one or more replicated authorization databases corresponds to a subscription to access selected data. The selected data is aggregated from a plurality of sources. The method also includes storing the one or more replicated authorization databases at the computing device. The method also includes determining, via the replicated authorization databases, user permission to access the selected data via the computing device. The method also includes enabling access to the selected data at the computing device after determining the user permission to access the selected data.Type: ApplicationFiled: January 14, 2009Publication date: July 15, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Sadanand Rajaram Bajekal
-
Publication number: 20090150981Abstract: A computer implemented method, data processing system, and computer program product for logical management and provisioning of business applications within the framework of an identity management system. The illustrative embodiments providing an interface layer to map respective attributes, permissions, and resource accounts in a data repository needed to represent access to business applications via a managed service in the identity management system. The illustrative embodiments define user entitlements on a user account associated with the managed service. The illustrative embodiments provision user access to the business applications via the managed service in the identity management system upon user request.Type: ApplicationFiled: December 6, 2007Publication date: June 11, 2009Inventors: Alexander Phillip Amies, Sadanand Rajaram Bajekal, Christopher Michael Bauserman, Leanne L. Chen, Sridhar R. Muppidi