Patents by Inventor Sudheer Thakur

Sudheer Thakur has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8042041
    Abstract: A method and apparatus for pipelined processing of data are described. In one embodiment, the method includes receiving a user request to process data, obtaining the data from a data storage based on the user request, grouping the set of data to create a hierarchical data, and paginating the hierarchical data to create a paginated result set. The pagination begins before the grouping is completed. The method further includes transferring one or more pages of the paginated result set to a client. The transferring begins before the pagination is completed.
    Type: Grant
    Filed: May 5, 2000
    Date of Patent: October 18, 2011
    Assignee: Pitney Bowes Software Inc.
    Inventors: David L. Fenn, Vladimir Gorelik, Stephen M. Sherman, Scott Willey, Sudheer Thakur, Robert E. Powers
  • Patent number: 7653742
    Abstract: Network applications are monitored by defining and detecting activities associated with the applications. Such activities are referred to as “business activities” in the sense that the activities are performed in the process of conducting business using applications. Each business activity of interest is associated with a unique “business signature” which can be used to identify the activity from streams or collections of information. In one embodiment, each business signature of interest to a business is defined as a set of one or more parameter name-value pairs. Once defined, network traffic to and from an application is monitored to detect business signatures, to detect that a corresponding business activity was started. Detecting an activity is based on real-time matching of business signature character patterns within a stream of characters with a repository of character patterns that each represents a business signature defined for the application.
    Type: Grant
    Filed: September 28, 2004
    Date of Patent: January 26, 2010
    Assignee: Entrust, Inc.
    Inventors: Sunil Bhargava, Sudheer Thakur
  • Patent number: 6651067
    Abstract: A method and apparatus for creating a data set with pending results are described. In one embodiment, the method includes receiving a user request to process data and processing the user request to begin creating a final result set with at least one field being identified as a pending result field. The processing, in turn, includes creating a portion of an initial result set containing the pending result field before a final value for the pending result field is determined, and transforming the portion of the initial result set to create a portion of the final result set before a final value for the pending result field is determined. The method further includes continuing processing the user request while the final value remains undetermined, and updating the final result set with the final value of the pending result field once the final value is determined.
    Type: Grant
    Filed: May 5, 2000
    Date of Patent: November 18, 2003
    Assignee: Sagent Technology
    Inventors: Vladimir Gorelik, Sudheer Thakur, Glenn A. Shapland, David L. Fenn, Scott Willey
  • Publication number: 20020107811
    Abstract: Techniques are provided for utilizing time-stamps and digital signatures to be sent with the messages communicated between partners of a trading community. In one embodiment, upon a transaction is initiated, a time-stamp is automatically embedded in a message of the transaction. A digital signature of the sender also accompanies the message for the message recipient to authenticate that the transaction is initiated by an authentic sender, and not an imposter. As soon as the message is propagated, a monitor process monitors activities acted upon the message. The monitor process receives receipt acknowledgement and consumption acknowledgment from each site that receives the message. Based on the initiated time-stamp and relevant times, the monitor process determines whether the message is received or consumed within a predetermined time limit.
    Type: Application
    Filed: January 5, 2001
    Publication date: August 8, 2002
    Inventors: Sandeep Jain, Sudheer Thakur, Yat-Chi (Andy) Yeung
  • Publication number: 20020106085
    Abstract: Techniques for handling a breach in security are disclosed. According to one technique, prior to the breach, a first party sends to a second party data that identifies a plurality of public keys, including a current public key that corresponds to a current private key. The second party uses the current public key and the first party uses the current private key to exchange electronic messages securely. Other keys, including a session key, may also be used to ensure the security of the exchange. According to one technique, digital signatures are attached to every outgoing message during the secure exchange, and verified on every incoming message. In response to a breach involving the current private key, (1) the first party invalidates the current private key, (2) the first party sends a message to the second party to instruct the second party to invalidate the current public key, and to establish another public key in the plurality of public keys as a new current public key.
    Type: Application
    Filed: January 5, 2001
    Publication date: August 8, 2002
    Inventors: Sandeep Jain, Sudheer Thakur, Kevin Darryl Jeu, Sanjay Ghatare
  • Publication number: 20020087862
    Abstract: Mechanism are provided for a trusted intermediary partner to mange the encryption/decryption keys of trading partners in a trading community. As the trusted intermediary manages the public signature decryption keys for each potential sender, the recipient does not have to manage these keys. In one embodiment, a recipient receives a message from a sender via the trusted intermediary, knowing that the message originates from an authentic sender, but not from an imposter. The sender sends the message together with a digital signature of the sender, which is created from the private signature creation key of the sender, to the trusted intermediary. The trusted intermediary, having the public signature decryption key associated with the private signature creation key of the sender, uses this public signature decryption key to authenticate the sender, i.e., verifying that the message originates from a real sender, and not an imposter.
    Type: Application
    Filed: January 4, 2001
    Publication date: July 4, 2002
    Inventors: Sandeep Jain, Sudheer Thakur, Kevin Darryl Jeu
  • Publication number: 20020073091
    Abstract: Techniques are provided for accessing data stored in XML documents using objects defined in object-oriented languages, such as Java. In one embodiment, a translation tool identifies the data nodes in an XML DTD associated with an XML document. The translation tool converts each of the identified nodes to a corresponding Java class in which a top-level data node in the XML DTD corresponds to a top-level Java class. From the Java classes and data in the XML document, a Java object is instantiated. The Java object thus can be used to advantageously access the data in the XML document in the Java language domain.
    Type: Application
    Filed: January 5, 2001
    Publication date: June 13, 2002
    Inventors: Sandeep Jain, Sudheer Thakur
  • Patent number: 6266673
    Abstract: A mechanism is described for processing requests to specify operations to database objects. A request to perform an action on a set of multiple objects is received by a database system. The request includes references to each object in the set, each reference indicating a table where the respective object resides. The reference is used to locate the object, and once located, the action is performed on the object. The reference may indicate a table using a unique table id not used in any of a plurality of databases to identify a table. The action request may be to modify the object, the references may include references to objects that reside in different database systems.
    Type: Grant
    Filed: June 7, 2000
    Date of Patent: July 24, 2001
    Assignee: Oracle Corporation
    Inventors: Chin-Heng Hong, Sudheer Thakur, Anil Nori, Joyo Wijaya
  • Patent number: 6134558
    Abstract: A method and apparatus for generating references to a set of objects which reside in a plurality databases is described. Each object is associated with a table from a plurality of tables that are contained in the plurality of databases. An object id is associated with each object; the object id uniquely identifies the object relative to the objects in the set of objects. A table id is associated with each table; the table id uniquely identifies the table relative to tables in the plurality of tables. A table containing an object is located based on the table id associated with the table, and the object is located in the table based on the object id associated with the object. A table mapping is generated. The table mapping maps a set of tables to databases associated with the set of tables. The set of tables are from the plurality of tables. References to objects from the set of object are generated. Each reference comprises data that identifies an object.
    Type: Grant
    Filed: October 31, 1997
    Date of Patent: October 17, 2000
    Assignee: Oracle Corporation
    Inventors: Chin-Heng Hong, Sudheer Thakur, Anil Nori, Joyo Wijaya