Patents by Inventor Suresh Chari

Suresh Chari has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180359270
    Abstract: Detecting anomalous user behavior is provided. User activity is logged for a set of users. The user activity is divided into distinct time intervals. For each distinct time interval, logged user activity is converted to a numerical representation of each user's activities for that distinct time interval. A clustering process is used on the numerical representations of user activities to determine which users have similar activity patterns in each distinct time interval. A plurality of peer groups of users is generated based on determining the similar activity patterns in each distinct time interval. Anomalous user behavior is detected based on a user activity change in a respective peer group of users within a distinct time interval.
    Type: Application
    Filed: June 12, 2017
    Publication date: December 13, 2018
    Inventors: Suresh Chari, Benjamin Edwards, Taesung Lee, Ian M. Molloy
  • Publication number: 20180332023
    Abstract: Managing passwords is provided. A machine training process is performed using a set of existing passwords to train a machine learning component. Members of a set of semantic categories are used to categorize respective passwords in the set of existing passwords. Password strengths corresponding to a set of candidate passwords are evaluated using the machine learning component. A resource is secured with a candidate password having a password strength greater than or equal to a defined password strength threshold level.
    Type: Application
    Filed: May 10, 2017
    Publication date: November 15, 2018
    Inventors: Suresh Chari, Taesung Lee, Ian Michael Molloy, Youngja Park
  • Patent number: 9189649
    Abstract: A method, system and computer program product for security model for workflows aggregating third party secure services. In one embodiment, a workflow model described in a workflow language is provided and configured to declare security requirements of a composite application integrating protected data from two or more external network resources. The method also incorporates providing an authentication service executing on at least one secure server computer. The authentication service is configured to conduct user authentication and authorization to access the protected data at the external network resources on behalf of the composite application executing on at least one host server computer according to the workflow language.
    Type: Grant
    Filed: June 25, 2010
    Date of Patent: November 17, 2015
    Assignee: International Business Machines Corporation
    Inventors: Paula K Austel, Suresh Chari, Francisco Curbera, Matthew J. Duftler, Rania Y. Khalaf, Florian F. Rosenberg
  • Publication number: 20110321131
    Abstract: A method, system and computer program product for security model for workflows aggregating third party secure services. In one embodiment, a workflow model described in a workflow language is provided and configured to declare security requirements of a composite application integrating protected data from two or more external network resources. The method also incorporates providing an authentication service executing on at least one secure server computer. The authentication service is configured to conduct user authentication and authorization to access the protected data at the external network resources on behalf of the composite application executing on at least one host server computer according to the workflow language.
    Type: Application
    Filed: June 25, 2010
    Publication date: December 29, 2011
    Applicant: International Business Machines Corporation
    Inventors: Paula K. Austel, Suresh Chari, Francisco Curbera, Matthew J. Duftler, Rania Y. Khalaf, Florian F. Rosenberg
  • Publication number: 20060161982
    Abstract: An intrusion detection system (IDS), method of protecting computers against intrusions and program product therefor. The IDS determines which applications are to run in native environment (NE) and places the remaining applications in a sandbox. Some of the applications in sandboxes may be placed in a personalized virtual environment (PVE) in the sandbox. Upon detecting an attempted attack, a dynamic honeypot may be started for an application in a sandbox and not in a PVE. A virtualized copy of system resources may be created for each application in a sandbox and provided to the corresponding application in the respective sandbox.
    Type: Application
    Filed: January 18, 2005
    Publication date: July 20, 2006
    Inventors: Suresh Chari, Pau-Chen Cheng, Josyula Rao, Pankaj Rohatgi, Michael Steiner
  • Publication number: 20060104443
    Abstract: A random number generator (RNG) resistant to side channel attacks includes an activation pseudo random number generator (APRNG) having an activation output connected to an activation seed input to provide a next seed to the activation seed input. A second random number generator includes a second seed input, which receives the next seed and a random data output, which outputs random data in accordance with the next seed. An input seed memory is connected to the activation seed input and a feedback connection from the activation output so that the next seed is stored in the input seed memory to be used by the APRNG as the activation seed input at a next startup cycle.
    Type: Application
    Filed: November 12, 2004
    Publication date: May 18, 2006
    Inventors: Suresh Chari, Vincenzo Diluoffo, Paul Karger, Elaine Palmer, Tal Rabin, Josyula Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David Toll
  • Publication number: 20050257269
    Abstract: A response system which produces strategies to contain hosts compromised by a worm. One minimizes the damage so caused and the loss of business values induced by actions taken to protect a network. The approach uses logical representation of the target network. By abstracting low level information such as switches, routers and their connectivities, theoretical algorithms are used to find the optimal containment.
    Type: Application
    Filed: May 3, 2005
    Publication date: November 17, 2005
    Inventors: Suresh Chari, Pau-Chen Cheng, Pankaj Rohatgi, Charanjit Jutla, Josyula Rao, Michael Steiner