Patents by Inventor Vikrant Nandakumar

Vikrant Nandakumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150269267
    Abstract: Methods and arrangements for rendering social proximity networks for mobile phones. A contemplated method includes: obtaining communication data for a mobile phone; deriving from the communication data a social proximity score with respect to at least one individual associated with at least one device that has communicated with the mobile phone; and storing the social proximity score. Other variants and embodiments are broadly contemplated herein.
    Type: Application
    Filed: March 24, 2014
    Publication date: September 24, 2015
    Applicant: International Business Machines Corporation
    Inventors: Vijay Ekambaram, Vikas Joshi, Vikrant Nandakumar, Ramasuri Narayanam
  • Publication number: 20150193091
    Abstract: A method, system, and computer program product for evaluating compliance of a user interface design are provided in the illustrative embodiments. a hierarchy of elements of a user interface is received from a first application executing in a client data processing system. A second application presents the user interface including a set of user interface elements at the client data processing system. A compliance rule is selected from a set of compliance rules. An evaluation is made whether an attribute associated with a user interface element meets a condition specified in the compliance rule. Responsive to the evaluating being negative, the user interface element is reported as being non-compliant with the compliance rule.
    Type: Application
    Filed: January 8, 2014
    Publication date: July 9, 2015
    Applicant: International Business Machines Corporation
    Inventors: Brian J. Cragun, Vikrant Nandakumar, Nitendra Rajput, Puthukode G. Ramachandran, Vivek Sharma, Shunguo Yan
  • Publication number: 20150163247
    Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.
    Type: Application
    Filed: January 13, 2015
    Publication date: June 11, 2015
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
  • Patent number: 8990883
    Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.
    Type: Grant
    Filed: January 2, 2013
    Date of Patent: March 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
  • Publication number: 20140214832
    Abstract: Methods and arrangements for gathering and managing crowd-sourced information. An event is identified using crowd-sourced information, and component parts of the event are identified using the crowd-sourced information. Information missing from the event is identified using the crowd-sourced information. Individuals associated with the event are identified, and additional crowd-sourced information on the event is harvested from the individuals.
    Type: Application
    Filed: January 31, 2013
    Publication date: July 31, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vikrant Nandakumar, Naveen K. Prathapaneni, Nithya Rajamani, L. Venkata Subramaniam
  • Publication number: 20140189783
    Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.
    Type: Application
    Filed: January 2, 2013
    Publication date: July 3, 2014
    Applicant: International Business Machines Corporation
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
  • Publication number: 20130304702
    Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.
    Type: Application
    Filed: May 14, 2012
    Publication date: November 14, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
  • Publication number: 20130305058
    Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.
    Type: Application
    Filed: May 15, 2012
    Publication date: November 14, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
  • Publication number: 20130291055
    Abstract: A method for securing data on a mobile device that supports both enterprise and personal applications. According to the method, information flows and data accesses are tracked on the device at run-time to enable access control decisions to be performed based on a policy, such as an enterprise privacy policy that has been distributed to the device from an enterprise server. The policy may be updated by events at the device as well as at the enterprise server.
    Type: Application
    Filed: March 1, 2013
    Publication date: October 31, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sridhar R. Muppidi, Palanivel Andiappan Kodeswaran, Sougata Mukherjea, Vikrant Nandakumar, Kapoor Shalini
  • Publication number: 20130290709
    Abstract: A method and system are provided for securing data on a mobile device that supports both enterprise and personal applications. According to the method, information flows and data accesses are tracked on the device at run-time to enable access control decisions to be performed based on a policy, such as an enterprise privacy policy that has been distributed to the device from an enterprise server. The policy may be updated by events at the device as well as at the enterprise server.
    Type: Application
    Filed: April 26, 2012
    Publication date: October 31, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sridhar R. Muppidi, Palanivel Andiappan Kodeswaran, Sougata Mukherjea, Vikrant Nandakumar, Shalini Kapoor