Patents by Inventor Shivakumara Venkateshamurthy

Shivakumara Venkateshamurthy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9003309
    Abstract: A computer implemented method and apparatus for customizing web page display by receiving a web page comprising content for display upon a display device and receiving a transformation file comprising information associated with transforming an object within the content with regard to at least one of position, scale or rotation. Based upon the information in the transformation file, the object is transformed with regard to at least one of position, scale or rotation, while not transforming content that is not part of the object. The web page is displayed having the object transformed in accordance with the transformation file.
    Type: Grant
    Filed: January 22, 2010
    Date of Patent: April 7, 2015
    Assignee: Adobe Systems Incorporated
    Inventor: Shivakumara Venkateshamurthy
  • Patent number: 8024306
    Abstract: Provided are methods, apparatus and computer programs for enhanced access to resources within a network, including for controlling use of bandwidth-sensitive connections within a network and/or for automated recovery. Hash values are used as ‘unique’ identifiers for resources distributed across a network, and each one of a set of pool servers store the hash values for a set of computers within a LAN. When a resource is required, a hash value representing the resource can be retrieved and compared with hash values stored at a pool server to determine whether the pool server holds a matching hash value. Any such matching hash value found on the pool server represents an identification of a local copy of the required resource, because of the uniqueness property of secure ash values. The information within the pool server can be used to access the required resource.
    Type: Grant
    Filed: May 16, 2007
    Date of Patent: September 20, 2011
    Assignee: International Business Machines Corporation
    Inventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Srinivas Belur Vijayaraghavan, Tejasvi Aswathanarayana
  • Patent number: 7752669
    Abstract: Provided are methods, apparatus and computer programs for identifying vulnerabilities to viruses of hacking. Hash values are computed and stored for resources stored on systems within a network. If a first resource or a collection of resources (such as files comprising an operating system, Web Browser or mail server) is associated with a vulnerability, hash values for the first resource or collection of resources are compared with the stored hash values to identify systems which have the vulnerability. Messages may be sent to the people responsible for the vulnerable systems, or the vulnerability may be removed by automatic downloading of patches or service packs.
    Type: Grant
    Filed: July 31, 2008
    Date of Patent: July 6, 2010
    Assignee: International Business Machines Corporation
    Inventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
  • Patent number: 7689835
    Abstract: Provided are methods, apparatus and computer programs for identifying matching resources (data files and executable files) within a data processing network, by comparison of hash values computed for each of a set of resources. A match between a newly computed hash value and a previously computed hash value for a resource indicates that the resource has not changed since the previous computation. A match between hash values for different resources indicates that they are identical. The result of the comparison can be used to determine whether a virus scan is currently required for a resource, on the basis that a resource which is unchanged since it was classified virus-free remains virus-free and a resource which is identical to a virus-scanned resource does not require duplication of the virus scan. The methods, apparatus and computer programs enable more efficient use of antivirus scanning or management of a backup copy process.
    Type: Grant
    Filed: May 6, 2008
    Date of Patent: March 30, 2010
    Assignee: International Business Machines Corporation
    Inventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
  • Patent number: 7519726
    Abstract: Provided are methods, apparatus and computer programs for enhanced access to resources within a network, including for controlling use of bandwidth-sensitive connections within a network and/or for automated recovery. Hash values are used as ‘unique’ identifiers for resources distributed across a network, and each one of a set of pool servers store the hash values for a set of computers within a LAN. When a resource is required, a hash value representing the resource can be retrieved and compared with hash values stored at a pool server to determine whether the pool server holds a matching hash value. Any such matching hash value found on the pool server represents an identification of a local copy of the required resource, because of the uniqueness property of secure ash values. The information within the pool server can be used to access the required resource.
    Type: Grant
    Filed: December 12, 2003
    Date of Patent: April 14, 2009
    Assignee: International Business Machines Corporation
    Inventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Srinivas Belur Vijayaraghavan, Tejasvi Aswathanarayana
  • Publication number: 20090019547
    Abstract: Provided are methods, apparatus and computer programs for identifying vulnerabilities to viruses of hacking. Hash values are computed and stored for resources stored on systems within a network. If a first resource or a collection of resources (such as files comprising an operating system, Web Browser or mail server) is associated with a vulnerability, hash values for the first resource or collection of resources are compared with the stored hash values to identify systems which have the vulnerability. Messages may be sent to the people responsible for the vulnerable systems, or the vulnerability may be removed by automatic downloading of patches or service packs.
    Type: Application
    Filed: July 31, 2008
    Publication date: January 15, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
  • Patent number: 7475427
    Abstract: Provided are methods, apparatus and computer programs for identifying vulnerabilities to viruses of hacking. Hash values are computed and stored for resources stored on systems within a network. If a first resource or a collection of resources (such as files comprising an operating system, Web Browser or mail server) is associated with a vulnerability, hash values for the first resource or collection of resources are compared with the stored hash values to identify systems which have the vulnerability. Messages may be sent to the people responsible for the vulnerable systems, or the vulnerability may be removed by automatic downloading of patches or service packs.
    Type: Grant
    Filed: December 12, 2003
    Date of Patent: January 6, 2009
    Assignee: International Business Machines Corporation
    Inventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
  • Publication number: 20080208935
    Abstract: Provided are methods, apparatus and computer programs for identifying matching resources (data files and executable files) within a data processing network, by comparison of hash values computed for each of a set of resources. A match between a newly computed hash value and a previously computed hash value for a resource indicates that the resource has not changed since the previous computation. A match between hash values for different resources indicates that they are identical. The result of the comparison can be used to determine whether a virus scan is currently required for a resource, on the basis that a resource which is unchanged since it was classified virus-free remains virus-free and a resource which is identical to a virus-scanned resource does not require duplication of the virus scan. The methods, apparatus and computer programs enable more efficient use of antivirus scanning or management of a backup copy process.
    Type: Application
    Filed: May 6, 2008
    Publication date: August 28, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
  • Patent number: 7398399
    Abstract: Provided are methods, apparatus and computer programs for identifying matching resources (data files and executable files) within a data processing network, by comparison of hash values computed for each of a set of resources. A match between a newly computed hash value and a previously computed hash value for a resource indicates that the resource has not changed since the previous computation. A match between hash values for different resources indicates that they are identical. The result of the comparison can be used to determine whether a virus scan is currently required for a resource, on the basis that a resource which is unchanged since it was classified virus-free remains virus-free and a resource which is identical to a virus-scanned resource does not require duplication of the virus scan. The methods, apparatus and computer programs enable more efficient use of antivirus scanning or management of a backup copy process.
    Type: Grant
    Filed: December 12, 2003
    Date of Patent: July 8, 2008
    Assignee: International Business Machines Corporation
    Inventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
  • Publication number: 20070244920
    Abstract: Provided are methods, apparatus and computer programs for enhanced access to resources within a network, including for controlling use of bandwidth-sensitive connections within a network and/or for automated recovery. Hash values are used as ‘unique’ identifiers for resources distributed across a network, and each one of a set of pool servers store the hash values for a set of computers within a LAN. When a resource is required, a hash value representing the resource can be retrieved and compared with hash values stored at a pool server to determine whether the pool server holds a matching hash value. Any such matching hash value found on the pool server represents an identification of a local copy of the required resource, because of the uniqueness property of secure ash values. The information within the pool server can be used to access the required resource.
    Type: Application
    Filed: May 16, 2007
    Publication date: October 18, 2007
    Inventors: SUDARSHAN PALLIYIL, Shivakumara Venkateshamurthy, Srinivas Vijayaraghavan, Tejasvi Aswathanarayana
  • Publication number: 20050132184
    Abstract: Provided are methods, apparatus and computer programs for identifying matching resources (data files and executable files) within a data processing network, by comparison of hash values computed for each of a set of resources. A match between a newly computed hash value and a previously computed hash value for a resource indicates that the resource has not changed since the previous computation. A match between hash values for different resources indicates that they are identical. The result of the comparison can be used to determine whether a virus scan is currently required for a resource, on the basis that a resource which is unchanged since it was classified virus-free remains virus-free and a resource which is identical to a virus-scanned resource does not require duplication of the virus scan. The methods, apparatus and computer programs enable more efficient use of antivirus scanning or management of a backup copy process.
    Type: Application
    Filed: December 12, 2003
    Publication date: June 16, 2005
    Applicant: International Business Machines Corporation
    Inventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana
  • Publication number: 20050131900
    Abstract: Provided are methods, apparatus and computer programs for enhanced access to resources within a network, including for controlling use of bandwidth-sensitive connections within a network and/or for automated recovery. Hash values are used as ‘unique’ identifiers for resources distributed across a network, and each one of a set of pool servers store the hash values for a set of computers within a LAN. When a resource is required, a hash value representing the resource can be retrieved and compared with hash values stored at a pool server to determine whether the pool server holds a matching hash value. Any such matching hash value found on the pool server represents an identification of a local copy of the required resource, because of the uniqueness property of secure ash values. The information within the pool server can be used to access the required resource.
    Type: Application
    Filed: December 12, 2003
    Publication date: June 16, 2005
    Applicant: International Business Machines Corporation
    Inventors: Sudarshan Palliyll, Shivakumara Venkateshamurthy, Srinivas Vijayaraghavan, Tejasvi Aswathanarayana
  • Publication number: 20050132206
    Abstract: Provided are methods, apparatus and computer programs for identifying vulnerabilities to viruses of hacking. Hash values are computed and stored for resources stored on systems within a network. If a first resource or a collection of resources (such as files comprising an operating system, Web Browser or mail server) is associated with a vulnerability, hash values for the first resource or collection of resources are compared with the stored hash values to identify systems which have the vulnerability. Messages may be sent to the people responsible for the vulnerable systems, or the vulnerability may be removed by automatic downloading of patches or service packs.
    Type: Application
    Filed: December 12, 2003
    Publication date: June 16, 2005
    Applicant: International Business Machines Corporation
    Inventors: Sudarshan Palliyil, Shivakumara Venkateshamurthy, Tejasvi Aswathanarayana