Patents by Inventor Srinivas Chowdhury
Srinivas Chowdhury has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9860251Abstract: A system and computer program product for implementing a method for restricting access to information transmitted over a computing network. A computer receives a resource request for a resource to be located. The resource request contains a universal resource locator (URL). The computer determines that the requested resource is available and in response, the computer locates the requested resource contained in the resource request. The computer determines whether encryption of the contained. URL is required. The computer may determine whether encryption is required for a return URL of the requested resource that is to be returned to a location of the resource request. After the computer determines that the requested resource is available, the computer may: determine that encryption of the requested resource is required and in response, determine an encrypted value of the requested resource.Type: GrantFiled: January 30, 2017Date of Patent: January 2, 2018Assignee: International Business Machines CorporationInventors: Michael P. Carlson, Srinivas Chowdhury
-
Publication number: 20170142116Abstract: A system and computer program product for implementing a method for restricting access to information transmitted over a computing network. A computer receives a resource request for a resource to be located. The resource request contains a universal resource locator (URL). The computer determines that the requested resource is available and in response, the computer locates the requested resource contained in the resource request. The computer determines whether encryption of the contained. URL is required. The computer may determine whether encryption is required for a return URL of the requested resource that is to be returned to a location of the resource request. After the computer determines that the requested resource is available, the computer may: determine that encryption of the requested resource is required and in response, determine an encrypted value of the requested resource.Type: ApplicationFiled: January 30, 2017Publication date: May 18, 2017Inventors: Michael P. Carlson, Srinivas Chowdhury
-
Patent number: 9628453Abstract: A method and system for restricting access to information transmitted over a computing network. A computer receives a resource request for a resource to be located. The resource request contains a universal resource locator (URL). The computer determines that the requested resource is available and in response, the computer locates the requested resource contained in the resource request. The computer determines whether encryption of the contained URL is required. The computer may determine whether encryption is required for a return URL of the requested resource that is to be returned to a location of the resource request. After the computer determines that the requested resource is available, the computer may: determine that encryption of the requested resource is required and in response, determine an encrypted value of the requested resource.Type: GrantFiled: June 10, 2015Date of Patent: April 18, 2017Assignee: International Business Machines CorporationInventors: Michael P. Carlson, Srinivas Chowdhury
-
Publication number: 20150281192Abstract: A method and system for restricting access to information transmitted over a computing network. A computer receives a resource request for a resource to be located. The resource request contains a universal resource locator (URL). The computer determines that the requested resource is available and in response, the computer locates the requested resource contained in the resource request. The computer determines whether encryption of the contained URL is required. The computer may determine whether encryption is required for a return URL of the requested resource that is to be returned to a location of the resource request. After the computer determines that the requested resource is available, the computer may: determine that encryption of the requested resource is required and in response, determine an encrypted value of the requested resource.Type: ApplicationFiled: June 10, 2015Publication date: October 1, 2015Inventors: Michael P. Carlson, Srinivas Chowdhury
-
Patent number: 9118634Abstract: A system including a computer and a computer readable hardware storage device containing instructions which, upon being executed by the computer, implements a method for restricting access to information transmitted over a computing network. A resource request for a resource to be located is received. The resource request contains a universal resource locator (URL). The URL is evaluated to determine whether encryption of none, part, or all of the URL is required. It is determined that the requested resource is available and in response, the requested resource contained in the resource request is located. It is determined whether encryption is required for none, part, or all of a return URL of the requested resource that is to be returned to a location of the resource request.Type: GrantFiled: July 2, 2014Date of Patent: August 25, 2015Assignee: International Business Machines CorporationInventors: Michael P. Carlson, Srinivas Chowdhury
-
Publication number: 20140317404Abstract: A system including a computer and a computer readable hardware storage device containing instructions which, upon being executed by the computer, implements a method for restricting access to information transmitted over a computing network. A resource request for a resource to be located is received. The resource request contains a universal resource locator (URL). The URL is evaluated to determine whether encryption of none, part, or all of the URL is required. It is determined that the requested resource is available and in response, the requested resource contained in the resource request is located. It is determined whether encryption is required for none, part, or all of a return URL of the requested resource that is to be returned to a location of the resource request.Type: ApplicationFiled: July 2, 2014Publication date: October 23, 2014Inventors: Michael P. Carlson, Srinivas Chowdhury
-
Patent number: 8819419Abstract: The present invention provides a dynamic, easily configurable system, which can be used to encrypt or otherwise hide the internal structure of a network. The present invention protects access to computing systems via a URL by encrypting all or a portion of the URL during the transmission of information over a network. Prior to the actual transmission of the information, fields in the URL can be encrypted using conventional encryption techniques. The encryption will occur after the destination has been determined such that the encryption will not cause the information to be misdirected to a wrong destination. At the destination location, there is first a determination that this URL is an encrypted URL. At this point, a decryption technique is employed based on the predetermined encryption scheme to decrypt the URL. The full URL is now accessed only by the destination location and is not accessible during travel over the network between the originating and destination locations.Type: GrantFiled: April 3, 2003Date of Patent: August 26, 2014Assignee: International Business Machines CorporationInventors: Michael Pierre Carlson, Srinivas Chowdhury
-
Publication number: 20120265691Abstract: An approach is provided in which a project task is retrieved from a nonvolatile data store with the project task corresponding to a configuration change management project. A set of constraints that are retrieved from a change and configuration management database (CCMDB) are identified with each of the constraints being associated with the retrieved project task. A proposed time window is also retrieved with the proposed time window being a time period in which the retrieved task is tentatively scheduled to be performed. Constraint exception values are also retrieved with the exception values corresponding to some of the identified constraints. The constraint values are compared with the proposed time window and with the retrieved constraint exceptions resulting in a set of status values corresponding to the constraints. The constraints and their corresponding status values are then displayed to a user on a display device.Type: ApplicationFiled: April 18, 2011Publication date: October 18, 2012Applicant: International Business Machines CorporationInventors: Srinivas Chowdhury, Scott Stephen Dickerson, John Mark Hartel, Edward D. Whitehead
-
Patent number: 8195761Abstract: Web pages are prefetched upon activation of one of three server-side triggers: a service trigger, an access based trigger, and a timed trigger. The service trigger is a subscription service in which the web server agrees to notify the proxy when webpages in the web server are modified. The access based trigger uses logs/metrics to analyze a plurality of users' browsing habits. When the log/metrics database noticeS that a particular webpage experiences heavy requesting traffic during a particular time period, the log/metric creates an access based trigger to prefetch the requested webpage. The timed trigger is a prefetching mechanism that occurs on a regular interval. Configuration data instructs the timed trigger to prefetch a certain webpage a certain times throughout the day.Type: GrantFiled: January 13, 2004Date of Patent: June 5, 2012Assignee: International Business Machines CorporationInventors: Michael Pierre Carlson, Srinivas Chowdhury
-
Patent number: 7908336Abstract: Prefetch tags are embedded in the HTML of a user-requested webpage so that, after delivery of the user-requested webpage to the user, the proxy can cache webpages that the user is likely to request. After the browser issues a request for a webpage to the proxy, the proxy passes the request to the web server. The web server obtains the webpage and embeds prefetch tags into the HTML of the webpage. The selection of prefetch tags is determined by a personalization database or log/statistics database in the web server. The web server sends the user-requested webpage back to the user through the proxy. The proxy reads the prefetch tags and prefetches the webpages identified in the prefetch tags. The webpages identified in the prefetch tags are stored in the proxy cache memory so that they can be quickly sent to the user upon request.Type: GrantFiled: December 15, 2008Date of Patent: March 15, 2011Assignee: International Business Machines CorporationInventors: Michael Pierre Carlson, Srinivas Chowdhury
-
Patent number: 7752203Abstract: The present invention is a method and system for look ahead caching of personalized web content based upon resource capability. Personalized web content may be delivered to a cache before the web pages are accessed by the user by optimally using the application systems CPU cycles or optionally off-loading the caching to an external system. The system and method of the present invention may employ a resource manager to monitor server usage and off-load the caching process to another dedicated system that may be currently under utilized, while making use of the time period between server response and the actual time the response is seen by the user (network time) and the user think time available for the server.Type: GrantFiled: August 26, 2004Date of Patent: July 6, 2010Assignee: International Business Machines CorporationInventors: Srinivas Chowdhury, Pradeep Nambiar
-
Publication number: 20090094417Abstract: A method and system for embedding prefetch tags in the HTML of a user-requested webpage so that, after delivery of the user-requested webpage to the user, the proxy can cache webpages that the user is likely to request. After the browser issues a request for a webpage to the proxy, the proxy passes the request to the web server. The web server obtains the webpage and embeds prefetch tags into the HTML of the webpage. The selection of prefetch tags is determined by a personalization database or log/statistics database in the web server. The web server sends the user-requested webpage back to the user through the proxy. The proxy reads the prefetch tags and prefetches the webpages identified in the prefetch tags. The webpages identified in the prefetch tags are stored in the proxy cache memory so that they can be quickly sent to the user upon request.Type: ApplicationFiled: December 15, 2008Publication date: April 9, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Pierre Carlson, Srinivas Chowdhury
-
Patent number: 7483941Abstract: A method and system for embedding prefetch tags in the HTML of a user-requested webpage so that, after delivery of the user-requested webpage to the user, the proxy can cache webpages that the user is likely to request. After the browser issues a request for a webpage to the proxy, the proxy passes the request to the web server. The web server obtains the webpage and embeds prefetch tags into the HTML of the webpage. The selection of prefetch tags is determined by a personalization database or log/statistics database in the web server. The web server sends the user-requested webpage back to the user through the proxy. The proxy reads the prefetch tags and prefetches the webpages identified in the prefetch tags. The webpages identified in the prefetch tags are stored in the proxy cache memory so that they can be quickly sent to the user upon request.Type: GrantFiled: January 13, 2004Date of Patent: January 27, 2009Assignee: International Business Machines CorporationInventors: Michael Pierre Carlson, Srinivas Chowdhury
-
Publication number: 20080263453Abstract: A computer implemented method, apparatus, and computer-usable program product for process configuration are provided in the illustrative embodiments. A process that is to be configured is identified. A list of tasks associated with the identified process is displayed. A set of the tasks displayed in the task list are selected. The selected tasks are configured according to one or more task parameters. If the process that is being configured is already running, the process is suspended before the selected tasks are configured. If the process is suspended, the process is resumed after the selected tasks have been configured. The process is identified, the list of task is displayed, and the one or more tasks are selected and configured using a graphical user interface.Type: ApplicationFiled: April 20, 2007Publication date: October 23, 2008Inventors: VIJAY KUMAR AGGARWAL, Srinivas Chowdhury, Scott Stephen Dickerson, Adam Reudeau Holley, Arnaud Airy Mathieu, Chakkalamattam Jos Paul, Puthukode G. Ramachandran
-
Publication number: 20060047661Abstract: The present invention is a method and system for look ahead caching of personalized web content based upon resource capability. Personalized web content may be delivered to a cache before the web pages are accessed by the user by optimally using the application systems CPU cycles or optionally off-loading the caching to an external system. The system and method of the present invention may employ a resource manager to monitor server usage and off-load the caching process to another dedicated system that may be currently under utilized, while making use of the time period between server response and the actual time the response is seen by the user (network time) and the user think time available for the server.Type: ApplicationFiled: August 26, 2004Publication date: March 2, 2006Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Srinivas Chowdhury, Pradeep Nambiar
-
Publication number: 20050198191Abstract: A method for improving the time required for a user to request and receive a webpage. The present invention controls the prefetching mechanism in the proxy. The present invention prefetches webpages upon activation of one of three server-side triggers: a service trigger, an access based trigger, and a timed trigger. The service trigger is a subscription service in which the web server agrees to notify the proxy when webpages in the web server are modified. The access based trigger uses logs/metrics to analyze a plurality of users' browsing habits. When the log/metrics database notice that a particular webpage experiences heavy requesting traffic during a particular time period, the log/metric creates an access based trigger to prefetch the requested webpage. The timed trigger is a prefetching mechanism that occurs on a regular interval. Configuration data instructs the timed trigger to prefetch a certain webpage a certain times throughout the day.Type: ApplicationFiled: January 13, 2004Publication date: September 8, 2005Applicant: International Business Machines CorporationInventors: Michael Carlson, Srinivas Chowdhury
-
Publication number: 20050198146Abstract: An example of a solution provided here comprises parsing stored information, and automatically sending at least one customized message; components of the customized message are derived from the parsing. Another example comprises extracting message components from stored information, creating a customized message, based on a recipient's role in a project, and automatically sending the customized message to the recipient, wherein the customized message contains the message components, the stored information contains information concerning the project; and the recipient is a person responsible for at least part of the project.Type: ApplicationFiled: January 14, 2004Publication date: September 8, 2005Applicant: International Business Machines CorporationInventors: Srinivas Chowdhury, Joseph Samake
-
Publication number: 20050154781Abstract: A method and system for embedding prefetch tags in the HTML of a user-requested webpage so that, after delivery of the user-requested webpage to the user, the proxy can cache webpages that the user is likely to request. After the browser issues a request for a webpage to the proxy, the proxy passes the request to the web server. The web server obtains the webpage and embeds prefetch tags into the HTML of the webpage. The selection of prefetch tags is determined by a personalization database or log/statistics database in the web server. The web server sends the user-requested webpage back to the user through the proxy. The proxy reads the prefetch tags and prefetches the webpages identified in the prefetch tags. The webpages identified in the prefetch tags are stored in the proxy cache memory so that they can be quickly sent to the user upon request.Type: ApplicationFiled: January 13, 2004Publication date: July 14, 2005Applicant: International Business Machines CorporationInventors: Michael Carlson, Srinivas Chowdhury
-
Publication number: 20040199762Abstract: The present invention provides a dynamic, easily configurable system, which can be used to encrypt or otherwise hide the internal structure of a network. The present invention protects access to computing systems via a URL by encrypting all or a portion of the URL during the transmission of information over a network. Prior to the actual transmission of the information, fields in the URL can be encrypted using conventional encryption techniques. The encryption will occur after the destination has been determined such that the encryption will not cause the information to be misdirected to a wrong destination. At the destination location, there is first a determination that this URL is an encrypted URL. At this point, a decryption technique is employed based on the predetermined encryption scheme to decrypt the URL. The full URL is now accessed only by the destination location and is not accessible during travel over the network between the originating and destination locations.Type: ApplicationFiled: April 3, 2003Publication date: October 7, 2004Applicant: International Business Machines CorporationInventors: Michael Pierre Carlson, Srinivas Chowdhury
-
Publication number: 20040193659Abstract: An archive mechanism automatically archives or unarchives content files based upon how frequently or recently a file is accessed. A content manager keeps an access log and generates access statistics from the access log. When inspecting content for files to be archived, the archive mechanism identifies files that were least frequently and/or least recently accessed. These files are then compressed into one or more archive files and moved to archive storage. The archive mechanism may also identify archived files that are frequently and/or recently accessed. These files are candidates for unarchiving. The content manager may also indicate whether a content file is archived in an archive lookup table. The archive lookup table may also include reference to the archive file. When a request is received for an archived file, the archive mechanism retrieves the archive file and decompresses the archive file.Type: ApplicationFiled: March 27, 2003Publication date: September 30, 2004Applicant: International Business Machines CorporationInventors: Michael Pierre Carlson, Srinivas Chowdhury