Patents by Inventor Suresh Sabarathinam
Suresh Sabarathinam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9177296Abstract: The present invention provides a computer implemented method for communicating a signature in a received email. Initially, a server receives a source email from a source client, the source email comprising a signature index entry, and a body. The server determines for a first recipient that a first associated destination client is capable of rendering a signature of the signature index entry in response to a selection of an indexed signature. The server, responsive to a determination that the destination client is capable of rendering the signature index entry, forwards the source email to the first recipient as a delivered email using the body of the source email such that an indexed signature is present in the body of the delivered email. In addition, a method for generating a signature header is shown that provides a many to one correspondence between indexed signatures and a signature index entry.Type: GrantFiled: March 31, 2008Date of Patent: November 3, 2015Assignee: International Business Machines CorporationInventors: Eric Philip Fried, Vijayasekhar Mekala, Rajeev Mishra, Suresh Sabarathinam
-
Patent number: 8819808Abstract: Disclosed is a computer implemented method to report a bad host. A receiver host receives a packet from a sender host. The receiver host detects that the packet contains suspect hostile content. The receiver host transmits a negative trust report.Type: GrantFiled: September 14, 2012Date of Patent: August 26, 2014Assignee: International Business Machines CorporationInventors: Eric P. Fried, Anand Goyal, Sipla Kosanam, Suresh Sabarathinam
-
Patent number: 8699723Abstract: An audio system includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device.Type: GrantFiled: July 20, 2010Date of Patent: April 15, 2014Assignee: International Business Machines CorporationInventors: Eric P Fried, Suresh Sabarathinam
-
Patent number: 8670556Abstract: A communication system includes a local communication device that communicates with a remote communication device via a wired or wireless communication link between the devices. The local communication device and the remote communication device are each capable of switching between a multiple user mode and a single user private mode in response to a mode change request. The local and remote communication devices include respective profiles that include profile attributes that define how the respective communication device responds to a mode change request. A user of one communication device may send a mode change request to the other communication device. In response to the mode change request, the other communication device changes mode between multiple participant mode and single participant mode if the profile of that communication device permits the mode change.Type: GrantFiled: July 6, 2010Date of Patent: March 11, 2014Assignee: International Business Machines CorporationInventors: Eric P Fried, Priyanka Jade, Suresh Sabarathinam, Silpa Kosanam
-
Patent number: 8549543Abstract: A WPAR is migrated. Responsive to starting a checkpoint process, data and control information is collected and stored for IPC objects in the WPAR. Responsive to receiving a request to restart the WPAR, a type of IPC object is determined. Responsive to a determination that the IPC object is not an IPC shared memory object, a kernel handle that a process wants to be used for a new IPC object is registered. A request to create a new IPC object comprising a name uniquely associated with the IPC object and a WPAR identifier is issued. An entry that matches the name and WPAR identifier is identified and a virtual kernel handle is retrieved. The new IPC object is created. The virtual kernel handle is mapped to a real kernel handle and returned to the process. Data and control information is retrieved and overlaid onto the new IPC object.Type: GrantFiled: September 30, 2008Date of Patent: October 1, 2013Assignee: International Business Machines CorporationInventors: Satish Narayan Kharat, Rajeev Mishra, Lance Warren Russell, Suresh Sabarathinam
-
Publication number: 20130247170Abstract: Disclosed is a computer implemented method to report a bad host. A receiver host receives a packet from a sender host. The receiver host detects that the packet contains suspect hostile content. The receiver host transmits a negative trust report.Type: ApplicationFiled: September 14, 2012Publication date: September 19, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric P. Fried, Anand Goyal, Sipla Kosanam, Suresh Sabarathinam
-
Patent number: 8375435Abstract: Disclosed is a computer implemented method and computer program product to throttle traffic from a source internet protocol address. The reverse firewall inspects payloads of a plurality of packets each packet having a source address identical to the source internet protocol address and a target address corresponding to a receiver host. Responsive to detecting purported good content within at least one of the plurality of packets, the reverse firewall forwards packets having the source address. The reverse firewall determines whether a count of packets having the source address exceeds a safe threshold. The reverse firewall requests a demanded positive trust report from the receiver host, responsive to a determination that the count of packets having the source address exceeds the safe threshold. The reverse firewall determines whether a positive trust report is received from the receiver host that indicates that the source internet protocol address is good.Type: GrantFiled: December 19, 2008Date of Patent: February 12, 2013Assignee: International Business Machines CorporationInventors: Eric P. Fried, Anand Goyal, Silpa Kosanam, Suresh Sabarathinam
-
Patent number: 8266636Abstract: Migrating a workload partition (WPAR) is provided. Responsive to receiving a request to checkpoint the WPAR, a list of virtual identifiers used by the WPAR to refer to IPC objects is generated and stored. Each virtual identifier corresponds to an IPC object and to a real identifier used by a kernel that corresponds to the IPC object. IPC object data and control information is collected and stored. Each process in the WPAR stores per process data. Responsive to receiving a request to restart the WPAR, the virtual identifier that the WPAR wants to be used is registered. A new IPC object is created by a kernel. The kernel maps a real identifier used by the kernel for the new IPC object to the registered virtual identifier. The restart process retrieves IPC data and control information and overlays it on the new IPC object. The per process data is restored.Type: GrantFiled: September 30, 2008Date of Patent: September 11, 2012Assignee: International Business Machines CorporationInventors: Satish Narayan Kharat, Rajeev Mishra, Lance Warren Russell, Suresh Sabarathinam
-
Patent number: 8260289Abstract: The present invention provides a mobile station implemented method for managing a requested name and phone record. The method comprises steps of the requester associated device receiving a user's identification from a mobile station phonebook owner and a search term. The requester associated device transmits the user identification of the mobile station phonebook owner and the search term. Receiving at least one matching name and phone record, the requester associated device presents the at least one matching name and phone record to a user. The requester associated device receives a user management command to perform an action on the name and phone record. The method may complete when the requester associated device performs the action on the name and phone record.Type: GrantFiled: June 11, 2008Date of Patent: September 4, 2012Assignee: International Business Machines CorporationInventors: Eric P. Fried, Vijayasekhar Mekala, Rajeev Mishra, Suresh Sabarathinam
-
Publication number: 20120207329Abstract: An audio volume control method employs an audio system that includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The audio system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device.Type: ApplicationFiled: April 19, 2012Publication date: August 16, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: ERIC P. FRIED, SURESH SABARATHINAM
-
Publication number: 20120201394Abstract: An audio volume control method employs an audio system that includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device. To determine the perceived loudness of the second audio device as perceived at the first audio device, the audio volume manager may measure the current distance between the first and second audio devices.Type: ApplicationFiled: April 21, 2012Publication date: August 9, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: ERIC P. FRIED, SURESH SABARATHINAM
-
Patent number: 8140856Abstract: The present invention provides a computer implemented method, data processing system, and computer program product to selectively extracts compressed-encrypted files from an archive. The data processing system receives a command to preprocess the archive from an authenticated user, wherein the authenticated user is associated with at least one fingerprint. The data processing system determines that the at least one fingerprint fails to match all fingerprints in metadata of a first compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint fails to match all fingerprints, deletes the compressed-encrypted file. The data processing system determines that the fingerprint matches a second fingerprint in metadata of a second compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint matches the second fingerprint, avoids deleting the second compressed-encrypted file.Type: GrantFiled: November 6, 2007Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventors: Eric P. Fried, Rajeev Mishra, Konagalli N. Rajesh, Suresh Sabarathinam
-
Publication number: 20120020487Abstract: An audio system includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device. To determine the perceived loudness of the second audio device as perceived at the first audio device, the audio volume manager may measure the current distance between the first and second audio devices.Type: ApplicationFiled: July 20, 2010Publication date: January 26, 2012Applicant: International Business Machines CorporationInventors: Eric P. Fried, Suresh Sabarathinam
-
Publication number: 20120020486Abstract: An audio system includes a first audio device and a second audio device. A communications link connects the first and second audio devices together so that each may communicate with the other. The system includes an audio volume manager that varies the audio output level of the second audio device as a function of the perceived loudness of the second audio device as perceived at the first audio device.Type: ApplicationFiled: July 20, 2010Publication date: January 26, 2012Applicant: International Business Machines CorporationInventors: Eric P. Fried, Suresh Sabarathinam
-
Publication number: 20120008757Abstract: A communication system includes a local communication device that communicates with a remote communication device via a wired or wireless communication link between the devices. The local communication device and the remote communication device are each capable of switching between a multiple user mode and a single user private mode in response to a mode change request. The local and remote communication devices include respective profiles that include profile attributes that define how the respective communication device responds to a mode change request. A user of one communication device may send a mode change request to the other communication device. In response to the mode change request, the other communication device changes mode between multiple participant mode and single participant mode if the profile of that communication device permits the mode change.Type: ApplicationFiled: July 6, 2010Publication date: January 12, 2012Applicant: International Business Machines CorporationInventors: Eric P. Fried, Priyanka Jade, Suresh Sabarathinam, Silpa Kosanam
-
Patent number: 8001604Abstract: The present invention provides a computer implemented method, data processing system, and computer program product to protect a first user from authorization limitation by a second user. The computer may receive an authorization command from the second user, wherein the authorization command targets the first user, and the second user is at least partially authorized to operate the authorization command. The computer determines that the first user is an ancestor user of the second user. In addition, the computer, responsive to a determination that the first user is an ancestor user of the second user, prevents operation of code of the authorization command to change an authorization of the first user.Type: GrantFiled: November 6, 2007Date of Patent: August 16, 2011Assignee: International Business Machines CorporationInventors: Eric P. Fried, Vijayasekhar Mekala, Rajeev Mishra, Manjunath A. Pattanshetti, Suresh Sabarathinam
-
Patent number: 7921170Abstract: A method and system creates virtual email identifications and dynamically map the virtual email-ids to the real email identities. A virtual email identify will be described in a specific fixed syntax that is easy for the users to remember and implement. The virtual email-id is dynamically mapped to one or more real email-ids by using a database of employees or other personnel maintained by the organization. The database can have various configurations that will be a function of the organization of the entity and the relationships of the persons in the entity.Type: GrantFiled: September 12, 2008Date of Patent: April 5, 2011Assignee: International Business Machines CorporationInventors: Eric Philip Fried, Rajeev Mirsha, Suresh Sabarathinam
-
Publication number: 20100162381Abstract: Disclosed is a computer implemented method and computer program product to throttle traffic from a source internet protocol address. The reverse firewall inspects payloads of a plurality of packets each packet having a source address identical to the source internet protocol address and a target address corresponding to a receiver host. Responsive to detecting purported good content within at least one of the plurality of packets, the reverse firewall forwards packets having the source address. The reverse firewall determines whether a count of packets having the source address exceeds a safe threshold. The reverse firewall requests a demanded positive trust report from the receiver host, responsive to a determination that the count of packets having the source address exceeds the safe threshold. The reverse firewall determines whether a positive trust report is received from the receiver host that indicates that the source internet protocol address is good.Type: ApplicationFiled: December 19, 2008Publication date: June 24, 2010Applicant: International Business Machines CorporationInventors: Eric P. Fried, Anand Goyal, Silpa Kosanam, Suresh Sabarathinam
-
Publication number: 20100083283Abstract: Migrating a workload partition (WPAR) is provided. Responsive to receiving a request to checkpoint the WPAR, a list of virtual identifiers used by the WPAR to refer to IPC objects is generated and stored. Each virtual identifier corresponds to an IPC object and to a real identifier used by a kernel that corresponds to the IPC object. IPC object data and control information is collected and stored. Each process in the WPAR stores per process data. Responsive to receiving a request to restart the WPAR, the virtual identifier that the WPAR wants to be used is registered. A new IPC object is created by a kernel. The kernel maps a real identifier used by the kernel for the new IPC object to the registered virtual identifier. The restart process retrieves IPC data and control information and overlays it on the new IPC object. The per process data is restored.Type: ApplicationFiled: September 30, 2008Publication date: April 1, 2010Applicant: International Business Machines CorporationInventors: Satish Narayan Kharat, Rajeev Mishra, Lance Warren Russell, Suresh Sabarathinam
-
Publication number: 20100082816Abstract: A WPAR is migrated. Responsive to starting a checkpoint process, data and control information is collected and stored for IPC objects in the WPAR. Responsive to receiving a request to restart the WPAR, a type of IPC object is determined. Responsive to a determination that the IPC object is not an IPC shared memory object, a kernel handle that a process wants to be used for a new IPC object is registered. A request to create a new IPC object comprising a name uniquely associated with the IPC object and a WPAR identifier is issued. An entry that matches the name and WPAR identifier is identified and a virtual kernel handle is retrieved. The new IPC object is created. The virtual kernel handle is mapped to a real kernel handle and returned to the process. Data and control information is retrieved and overlaid onto the new IPC object.Type: ApplicationFiled: September 30, 2008Publication date: April 1, 2010Applicant: International Business Machines CorporationInventors: Satish Narayan Kharat, Rajeev Mishra, Lance Warren Russell, Suresh Sabarathinam