Patents by Inventor Shivakumara Venkateshamurthy
Shivakumara Venkateshamurthy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9003309Abstract: A computer implemented method and apparatus for customizing web page display by receiving a web page comprising content for display upon a display device and receiving a transformation file comprising information associated with transforming an object within the content with regard to at least one of position, scale or rotation. Based upon the information in the transformation file, the object is transformed with regard to at least one of position, scale or rotation, while not transforming content that is not part of the object. The web page is displayed having the object transformed in accordance with the transformation file.Type: GrantFiled: January 22, 2010Date of Patent: April 7, 2015Assignee: Adobe Systems IncorporatedInventor: Shivakumara Venkateshamurthy
-
Patent number: 8024306Abstract: Provided are methods, apparatus and computer programs for enhanced access to resources within a network, including for controlling use of bandwidth-sensitive connections within a network and/or for automated recovery. Hash values are used as ‘unique’ identifiers for resources distributed across a network, and each one of a set of pool servers store the hash values for a set of computers within a LAN. When a resource is required, a hash value representing the resource can be retrieved and compared with hash values stored at a pool server to determine whether the pool server holds a matching hash value. Any such matching hash value found on the pool server represents an identification of a local copy of the required resource, because of the uniqueness property of secure ash values. The information within the pool server can be used to access the required resource.Type: GrantFiled: May 16, 2007Date of Patent: September 20, 2011Assignee: International Business Machines CorporationInventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Srinivas Belur Vijayaraghavan, Tejasvi Aswathanarayana
-
Patent number: 7752669Abstract: Provided are methods, apparatus and computer programs for identifying vulnerabilities to viruses of hacking. Hash values are computed and stored for resources stored on systems within a network. If a first resource or a collection of resources (such as files comprising an operating system, Web Browser or mail server) is associated with a vulnerability, hash values for the first resource or collection of resources are compared with the stored hash values to identify systems which have the vulnerability. Messages may be sent to the people responsible for the vulnerable systems, or the vulnerability may be removed by automatic downloading of patches or service packs.Type: GrantFiled: July 31, 2008Date of Patent: July 6, 2010Assignee: International Business Machines CorporationInventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
-
Patent number: 7689835Abstract: Provided are methods, apparatus and computer programs for identifying matching resources (data files and executable files) within a data processing network, by comparison of hash values computed for each of a set of resources. A match between a newly computed hash value and a previously computed hash value for a resource indicates that the resource has not changed since the previous computation. A match between hash values for different resources indicates that they are identical. The result of the comparison can be used to determine whether a virus scan is currently required for a resource, on the basis that a resource which is unchanged since it was classified virus-free remains virus-free and a resource which is identical to a virus-scanned resource does not require duplication of the virus scan. The methods, apparatus and computer programs enable more efficient use of antivirus scanning or management of a backup copy process.Type: GrantFiled: May 6, 2008Date of Patent: March 30, 2010Assignee: International Business Machines CorporationInventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
-
Patent number: 7519726Abstract: Provided are methods, apparatus and computer programs for enhanced access to resources within a network, including for controlling use of bandwidth-sensitive connections within a network and/or for automated recovery. Hash values are used as ‘unique’ identifiers for resources distributed across a network, and each one of a set of pool servers store the hash values for a set of computers within a LAN. When a resource is required, a hash value representing the resource can be retrieved and compared with hash values stored at a pool server to determine whether the pool server holds a matching hash value. Any such matching hash value found on the pool server represents an identification of a local copy of the required resource, because of the uniqueness property of secure ash values. The information within the pool server can be used to access the required resource.Type: GrantFiled: December 12, 2003Date of Patent: April 14, 2009Assignee: International Business Machines CorporationInventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Srinivas Belur Vijayaraghavan, Tejasvi Aswathanarayana
-
Publication number: 20090019547Abstract: Provided are methods, apparatus and computer programs for identifying vulnerabilities to viruses of hacking. Hash values are computed and stored for resources stored on systems within a network. If a first resource or a collection of resources (such as files comprising an operating system, Web Browser or mail server) is associated with a vulnerability, hash values for the first resource or collection of resources are compared with the stored hash values to identify systems which have the vulnerability. Messages may be sent to the people responsible for the vulnerable systems, or the vulnerability may be removed by automatic downloading of patches or service packs.Type: ApplicationFiled: July 31, 2008Publication date: January 15, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
-
Patent number: 7475427Abstract: Provided are methods, apparatus and computer programs for identifying vulnerabilities to viruses of hacking. Hash values are computed and stored for resources stored on systems within a network. If a first resource or a collection of resources (such as files comprising an operating system, Web Browser or mail server) is associated with a vulnerability, hash values for the first resource or collection of resources are compared with the stored hash values to identify systems which have the vulnerability. Messages may be sent to the people responsible for the vulnerable systems, or the vulnerability may be removed by automatic downloading of patches or service packs.Type: GrantFiled: December 12, 2003Date of Patent: January 6, 2009Assignee: International Business Machines CorporationInventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
-
Publication number: 20080208935Abstract: Provided are methods, apparatus and computer programs for identifying matching resources (data files and executable files) within a data processing network, by comparison of hash values computed for each of a set of resources. A match between a newly computed hash value and a previously computed hash value for a resource indicates that the resource has not changed since the previous computation. A match between hash values for different resources indicates that they are identical. The result of the comparison can be used to determine whether a virus scan is currently required for a resource, on the basis that a resource which is unchanged since it was classified virus-free remains virus-free and a resource which is identical to a virus-scanned resource does not require duplication of the virus scan. The methods, apparatus and computer programs enable more efficient use of antivirus scanning or management of a backup copy process.Type: ApplicationFiled: May 6, 2008Publication date: August 28, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
-
Patent number: 7398399Abstract: Provided are methods, apparatus and computer programs for identifying matching resources (data files and executable files) within a data processing network, by comparison of hash values computed for each of a set of resources. A match between a newly computed hash value and a previously computed hash value for a resource indicates that the resource has not changed since the previous computation. A match between hash values for different resources indicates that they are identical. The result of the comparison can be used to determine whether a virus scan is currently required for a resource, on the basis that a resource which is unchanged since it was classified virus-free remains virus-free and a resource which is identical to a virus-scanned resource does not require duplication of the virus scan. The methods, apparatus and computer programs enable more efficient use of antivirus scanning or management of a backup copy process.Type: GrantFiled: December 12, 2003Date of Patent: July 8, 2008Assignee: International Business Machines CorporationInventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
-
Publication number: 20070244920Abstract: Provided are methods, apparatus and computer programs for enhanced access to resources within a network, including for controlling use of bandwidth-sensitive connections within a network and/or for automated recovery. Hash values are used as ‘unique’ identifiers for resources distributed across a network, and each one of a set of pool servers store the hash values for a set of computers within a LAN. When a resource is required, a hash value representing the resource can be retrieved and compared with hash values stored at a pool server to determine whether the pool server holds a matching hash value. Any such matching hash value found on the pool server represents an identification of a local copy of the required resource, because of the uniqueness property of secure ash values. The information within the pool server can be used to access the required resource.Type: ApplicationFiled: May 16, 2007Publication date: October 18, 2007Inventors: SUDARSHAN PALLIYIL, Shivakumara Venkateshamurthy, Srinivas Vijayaraghavan, Tejasvi Aswathanarayana
-
Publication number: 20050132184Abstract: Provided are methods, apparatus and computer programs for identifying matching resources (data files and executable files) within a data processing network, by comparison of hash values computed for each of a set of resources. A match between a newly computed hash value and a previously computed hash value for a resource indicates that the resource has not changed since the previous computation. A match between hash values for different resources indicates that they are identical. The result of the comparison can be used to determine whether a virus scan is currently required for a resource, on the basis that a resource which is unchanged since it was classified virus-free remains virus-free and a resource which is identical to a virus-scanned resource does not require duplication of the virus scan. The methods, apparatus and computer programs enable more efficient use of antivirus scanning or management of a backup copy process.Type: ApplicationFiled: December 12, 2003Publication date: June 16, 2005Applicant: International Business Machines CorporationInventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
-
Publication number: 20050131900Abstract: Provided are methods, apparatus and computer programs for enhanced access to resources within a network, including for controlling use of bandwidth-sensitive connections within a network and/or for automated recovery. Hash values are used as ‘unique’ identifiers for resources distributed across a network, and each one of a set of pool servers store the hash values for a set of computers within a LAN. When a resource is required, a hash value representing the resource can be retrieved and compared with hash values stored at a pool server to determine whether the pool server holds a matching hash value. Any such matching hash value found on the pool server represents an identification of a local copy of the required resource, because of the uniqueness property of secure ash values. The information within the pool server can be used to access the required resource.Type: ApplicationFiled: December 12, 2003Publication date: June 16, 2005Applicant: International Business Machines CorporationInventors: Sudarshan Palliyll, Shivakumara Venkateshamurthy, Srinivas Vijayaraghavan, Tejasvi Aswathanarayana
-
Publication number: 20050132206Abstract: Provided are methods, apparatus and computer programs for identifying vulnerabilities to viruses of hacking. Hash values are computed and stored for resources stored on systems within a network. If a first resource or a collection of resources (such as files comprising an operating system, Web Browser or mail server) is associated with a vulnerability, hash values for the first resource or collection of resources are compared with the stored hash values to identify systems which have the vulnerability. Messages may be sent to the people responsible for the vulnerable systems, or the vulnerability may be removed by automatic downloading of patches or service packs.Type: ApplicationFiled: December 12, 2003Publication date: June 16, 2005Applicant: International Business Machines CorporationInventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana