Patents by Inventor Vijaylaxmi Chakravarty
Vijaylaxmi Chakravarty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8150984Abstract: A software system for controlling the unauthorized transfer of data from a data processing system to a network is provided. A file monitor module monitors requests made by a process to access a data file within the computer system, and cross-checks the data file name against a protected file list database. If the file is listed in the protected file list database, the process name is added to a process list for the data file. A process monitor module monitors all processes contained in the process list, and if a process in the process list transfers the data file to another process, the receiving process is added to the process list. An upload monitor module searches the process list for any process that requests a network data transfer. The upload monitor module holds the transfer request for any process listed within the process list, and displays a warning message to the system user indicating that a process having had access to protected data is requesting network access to upload a data file.Type: GrantFiled: October 23, 2003Date of Patent: April 3, 2012Assignee: International Business Machines CorporationInventors: Shengdong Chen, Woodrow Wyatt Arkeketa, Vijaylaxmi Chakravarty, Dah-Haur Lin
-
Patent number: 7614007Abstract: A method and device for executing multiple operations on different files displayed on a graphical user interface. A pre-defined combination of keys is assigned a particular operation, such as “Delete,” “Copy,” “Move,” etc. As a first combination of keys is engaged, one or more files are selected, using a pointing device such as a mouse. The selected files are color-coded, indicating a first operation to be performed on the selected files. A second combination of keys is then engaged, and a second operation is assigned to other selected files. When satisfied that the selected operations are correct for all of the selected files, a user then executes the operations by depressing the “Enter” or similar key. By viewing different operations for different files before the operations are executed, a user is given an overview of all operations to be applied to all selected files, thus improving file management.Type: GrantFiled: January 16, 2004Date of Patent: November 3, 2009Assignee: International Business Machines CorporationInventors: Vijaylaxmi Chakravarty, Oltea Mihaela Herescu, Claudia Andrea Salzberg, Robert Lee Snider
-
Publication number: 20050165746Abstract: A system, apparatus and method of pre-fetching data are provided. When a first piece of information is being displayed to a user, the system, apparatus and method determine whether a second piece of information is data-intensive. If the second piece of information is data-intensive, it is pre-fetched into a cache. To implement the invention, however, the application program used to display the information to the user is first parsed for embedded database query calls. If the application program provides the information to the user in a number of succeeding panels, each piece of code representing a panel will be individually parsed. Each query call is identified as selectable or un-selectable. A selectable query call is a call that is used to fetch a piece of data-intensive information; whereas an un-selectable query call is a call that is used to fetch non-data-intensive information. Each selectable call is entered in its respective panel in a table, which is divided into the same number of panels.Type: ApplicationFiled: January 13, 2004Publication date: July 28, 2005Applicant: International Business Machines CorporationInventors: Vijaylaxmi Chakravarty, Oltea Herescu, Claudia Salzberg, Robert Snider
-
Publication number: 20050165717Abstract: A method, system and computer program product for improving efficiency of file receipt in a communication program by redirecting a file received as the result of a file request to a mail server is disclosed. A communication program sends a request for a first file to a file server. The communication program then waits a length of time to receive that first file. If the set length of time for waiting for the first file expires before the first file is received, the user interface of the communications program is released to request additional files while a background process waits for the first file. Then, once the background process receives the first file, the background process encapsulates the first file in a message and transmits the message to a target address.Type: ApplicationFiled: January 22, 2004Publication date: July 28, 2005Applicant: International Business Machines Corp.Inventors: Vijaylaxmi Chakravarty, Oltea Herescu, Claudia Salzberg, Robert Snider
-
Publication number: 20050160373Abstract: A method and device for executing multiple operations on different files displayed on a graphical user interface. A pre-defined combination of keys is assigned a particular operation, such as “Delete,” “Copy,” “Move,” etc. As a first combination of keys is engaged, one or more files are selected, using a pointing device such as a mouse. The selected files are color-coded, indicating a first operation to be performed on the selected files. A second combination of keys is then engaged, and a second operation is assigned to other selected files. When satisfied that the selected operations are correct for all of the selected files, a user then executes the operations by depressing the “Enter” or similar key. By viewing different operations for different files before the operations are executed, a user is given an overview of all operations to be applied to all selected files, thus improving file management.Type: ApplicationFiled: January 16, 2004Publication date: July 21, 2005Applicant: International Business Machines CorporationInventors: Vijaylaxmi Chakravarty, Oltea Herescu, Claudia Salzberg, Robert Snider
-
Publication number: 20050091182Abstract: A software system for controlling the unauthorized transfer of data from a data processing system to a network is provided. A file monitor module monitors requests made by a process to access a data file within the computer system, and cross-checks the data file name against a protected file list database. If the file is listed in the protected file list database, the process name is added to a process list for the data file. A process monitor module monitors all processes contained in the process list, and if a process in the process list transfers the data file to another process, the receiving process is added to the process list. An upload monitor module searches the process list for any process that requests a network data transfer. The upload monitor module holds the transfer request for any process listed within the process list, and displays a warning message to the system user indicating that a process having had access to protected data is requesting network access to upload a data file.Type: ApplicationFiled: October 23, 2003Publication date: April 28, 2005Applicant: International Business Machines CorporationInventors: Shengdong Chen, Woodrow Arkeketa, Vijaylaxmi Chakravarty, Dah-Haur Lin
-
Publication number: 20050060663Abstract: A method and system that enhances the functionality of a Task Manager with the capability to obtain and display information about specific services associated with a particular executable as well as the capability of obtaining and displaying information about what parameters have been utilized to launch an executable. The system user is provided with a single display by which to manage active programs/processes. Additionally, the user is able to quickly determine what the active programs are being utilized for, to locate the executable, and to see associated system usage attributes.Type: ApplicationFiled: August 28, 2003Publication date: March 17, 2005Applicant: International Business Machines CorporationInventors: Woodrow Arkeketa, Vijaylaxmi Chakravarty, Shengdong Chen
-
Publication number: 20040236760Abstract: A mechanism for extending user interfaces applied in conjunction with a data processing system platform is provided. In particular, mechanisms for extending such interfaces across software resources, or applications, is provided. A management agent is implemented to mediate actions supported by the user interface and the application functionality. The user interface communicates with the management agent to provide the parameters required by the application. The agent contacts the application which provides the required functionality, for example, a security context for a user. The agent may then perform other management related operations, for example, importing a management object into a management access system.Type: ApplicationFiled: May 22, 2003Publication date: November 25, 2004Applicant: International Business Machines CorporationInventors: Woodrow Wyatt Arkeketa, Dah-Haur Lin, Vijaylaxmi Chakravarty, Shengdong Chen
-
Publication number: 20040225690Abstract: A solution provided here comprises providing a dependency-aware mode, receiving a command to perform an operation on a target file, searching stored dependency information, for a subset of information that corresponds to the target file, and retrieving the subset of information if it is found. In some cases, such a solution might also comprise providing special delete, special rename, and special move operations, designating one or more protected programs, preserving access to files that are associated with a protected program, or choosing one or more additional files to be deleted.Type: ApplicationFiled: May 8, 2003Publication date: November 11, 2004Applicant: International Business Machines CorporationInventors: Woodrow Wyatt Arkeketa, Vijaylaxmi Chakravarty, Shengdong Chen
-
Publication number: 20040128545Abstract: A method, system, apparatus, and computer program product are presented for dynamically controlling a set of filtering-related operations at a firewall from one or more hosts. Instead of having a firewall monitor all of the command channels of different hosts within the protected domain, each host monitors its own command channels, and each host instructs the firewall as to which ports to open when communication protocol commands are detected. A host sends a command to the firewall to request the establishment of a filter rule at the firewall; these firewall operations may be secured through encryption, authentication, and authorization operations. Thereafter, the firewall allows data transfers that correspond to the detected protocol commands. The resulting firewall is much more lightweight and much faster than typical firewall implementations because the firewall neither has to monitor command channels nor parse differently formatted commands from different applications.Type: ApplicationFiled: December 31, 2002Publication date: July 1, 2004Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Vijaylaxmi Chakravarty