Patents by Inventor Sastry Duri

Sastry Duri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10896260
    Abstract: A system for determining vulnerability of an application container is provided. The system receives a report associating a first version of a software package with a vulnerability and a second version of the software package as being an update that fixes the vulnerability. The system receives the first version and the second version of the software package. The second version has one or more files that correspond to files in the first version. The system identifies a changed file in the first version of the software package that is different from a corresponding file in the second version of the software package. The system identifies a container file in an application container that matches the changed file in the first version of the software package. The system associates the identified container file with the vulnerability.
    Type: Grant
    Filed: October 16, 2018
    Date of Patent: January 19, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shripad Nadgowda, Sastry Duri
  • Publication number: 20200117807
    Abstract: A system for determining vulnerability of an application container is provided. The system receives a report associating a first version of a software package with a vulnerability and a second version of the software package as being an update that fixes the vulnerability. The system receives the first version and the second version of the software package. The second version has one or more files that correspond to files in the first version. The system identifies a changed file in the first version of the software package that is different from a corresponding file in the second version of the software package. The system identifies a container file in an application container that matches the changed file in the first version of the software package. The system associates the identified container file with the vulnerability.
    Type: Application
    Filed: October 16, 2018
    Publication date: April 16, 2020
    Inventors: Shripad Nadgowda, Sastry Duri
  • Publication number: 20080045240
    Abstract: Techniques are presented for identifying mobile devices within a coverage legion of a wireless station Positions for mobile devices, if any, within the coverage region are determined. It is then determined whether the positions are within one or more defined areas, called “notification areas” herein. Additionally, selected mobile devices within notification areas are sent messages. The selected mobile devices ale selected via certain criteria, including, for instance, campaign specifications and subscriber information A message can be sent to a mobile device if the subscriber corresponding to the mobile device has indicated an acceptance of a category of notifications for the message and for the publisher who is publishing the notifications. The category could be traffic conditions and the publisher could be a Department of transportation having responsibility for a particular freeway. These are two examples of multiple criteria for selecting mobile devices to which messages could be sent.
    Type: Application
    Filed: October 24, 2007
    Publication date: February 21, 2008
    Applicant: International Business Machines Corporation
    Inventors: Alan Cole, Sastry Duri, Vineet Gupta, Jonathan Munson, David Wood
  • Publication number: 20070281701
    Abstract: It is determined whether a location of a mobile device is within a coverage region of a first information service. Communications for the first information service ate redirected to a second information service when the location of the mobile device is not within a coverage region of the first information service The second information service generally has a coverage region encompassing the location of the mobile device. Communications between a mobile device and a first information service ate redirected to another information service when properties of the new information service ale determined to meet predetermined criteria set by a user of the mobile device, by an application, or both. In yet another aspect of the invention, Replacement of information services can be “aggressive” or “non-aggressive.” Communications between a mobile device and an original information service are redirected to another information service when the original information service fails.
    Type: Application
    Filed: August 15, 2007
    Publication date: December 6, 2007
    Applicant: International Business Machines Corporation
    Inventors: Alan Cole, Sastry Duri, Jonathan Munson, John Murdock
  • Publication number: 20070194879
    Abstract: For detecting an invalid RFID tag, an identifier and authentication information is read from a given RFID tag. The authentication information is then verified dependent on at least a given part (IDP_TAG) of the identifier (ID_TAG) and it is determined that the given RFID tag is the invalid RFID tag if the verification was negative. Accordingly, an RFID tag is manufactured by determining an identifier (ID), determining an authentication information dependent on at least a given part (IDP) of the identifier (ID) and storing the identifier (ID) and the authentication information on or in the RFID tag.
    Type: Application
    Filed: May 2, 2006
    Publication date: August 23, 2007
    Applicant: International Business Machines Corporation
    Inventors: Michael Backes, Christian Cachin, Sastry Duri, Guenter Karjoth, Luke O'Connor
  • Publication number: 20070021128
    Abstract: Techniques are presented for identifying mobile devices within a coverage region of a wireless station. Positions for mobile devices, if any, within the coverage region are determined. It is then determined whether the positions are within one or more defined areas, called “notification areas” herein. Additionally, selected mobile devices within notification areas are sent messages. The selected mobile devices are selected via certain criteria, including, for instance, campaign specifications and subscriber information. A message can be sent to a mobile device if the subscriber corresponding to the mobile device has indicated an acceptance of a category of notifications for the message and for the publisher who is publishing the notifications. The category could be traffic conditions and the publisher could be a Department of Transportation having responsibility for a particular freeway. These are two examples of multiple criteria for selecting mobile devices to which messages could be sent.
    Type: Application
    Filed: September 25, 2006
    Publication date: January 25, 2007
    Applicant: International Business Machines Corporation
    Inventors: Alan Cole, Sastry Duri, Vineet Gupta, Jonathan Munson, David Wood
  • Publication number: 20060264222
    Abstract: It is determined whether a location of a mobile device is within a coverage region of a first information service. Communications for the first information service are redirected to a second information service when the location of the mobile device is not within a coverage region of the first information service. The second information service generally has a coverage region encompassing the location of the mobile device. Communications between a mobile device and a first information service are redirected to another information service when properties of the new information service are determined to meet predetermined criteria set by a user of the mobile device, by an application, or both. In yet another aspect of the invention, Replacement of information services can be “aggressive” or “non-aggressive.” Communications between a mobile device and an original information service are redirected to another information service when the original information service fails.
    Type: Application
    Filed: January 27, 2006
    Publication date: November 23, 2006
    Applicant: International Business Machines Corporation
    Inventors: Alan Cole, Sastry Duri, Jonathan Munson, John Murdock
  • Publication number: 20060036485
    Abstract: Methods and apparatus are provided for presenting personalized information to consumers in a retail environment. A personalized price is determined for at least one product that is in physical proximity to the customer. The physical proximity may be determined, for example, by evaluating identifiers, such as RFID tags, associated with each customer and product. A personalized message can be also presented to a customer regarding at least one product that is in physical proximity to the customer. The personalized message can provide, for example, dietary or safety information relevant to the customer and at least one product in the proximity of the customer. The personalized information may be determined based on one or more personalized message rules.
    Type: Application
    Filed: August 13, 2004
    Publication date: February 16, 2006
    Applicant: International Business Machines Corporation
    Inventors: Sastry Duri, Jeffrey Elliott, Jennifer Lai, Xuan Liu, Paul Moskowitz, Jung-Mu Tang, Todd Werden, Danny Wong
  • Publication number: 20050216583
    Abstract: Spatial rules involve locations of entities, such as wireless devices, from a mobile population. When evaluating rules in a communication network, attributes of an entity are determined, where one of the attributes comprises location of the entity. Rules are evaluated to produce one or more results, each of the rules operating on the attributes of the entity. Specified actions for the rules are performed, based on the evaluation of the rules. At least one of the specified actions comprises communicating a result to an application. The communication network may have a portion that is wireless. An attribute of the entity can include subscriber information and an entity generally corresponds to a particular subscriber in the communication network, but the entity may also correspond to multiple subscribers. An entity may be a wireless device, which can subscribe to a network. Rules can apply to particular geographical regions, to particular subscribers, to both, or to additional criteria.
    Type: Application
    Filed: March 12, 2004
    Publication date: September 29, 2005
    Applicant: International Business Machines Corporation
    Inventors: Alan Cole, Sastry Duri, Jonathan Munson, David Wood