Founder’s Patent Portfolio

Patents

Sl#Title Date
1High efficiency compilation framework for streamlining the execution of compiled codeIssued August 21, 2012
2Virtualization of file system encryptionIssued March 15, 2011
3Extensible access control list frameworkIssued Sep 16, 2014
4Domains based security for clustersIssued Nov 26, 2013
5Mathematical definition of roles and authorizations in RBAC systemIssued February 14, 2012
6Locking Access to Data Storage Shared By A Plurality Of Compute NodesIssued Feb 3, 2015
7System and computer program product for dynamically resizing file systemsIssued March 20, 2012
8System and computer program product for dynamically resizing file systemsIssued March 19, 2013
9Authorized authorization set in RBAC modelIssued June 5, 2012
10Domain based isolation of network portsIssued Jan 14, 2014
11Method and apparatus for threaded background function supportIssued March 5, 2013
12Extensible access control list frameworkIssued July 20, 2016
13Client based resource isolation with domainsIssued Nov 17, 2015
14Security key distribution in a clusterIssued Dec 2, 2014
15Domain aware time-based loginsIssued Feb 12, 2013
16Second failure data capture problem determination using user selective memory protection to trace application failuresPublished Apr 29 2010
17Domain-based isolation and access control on dynamic objectsIssued August 26, 2014
18Managing memory – Virtualization of kernel heap for virtual image – Managing memoryIssued August 28, 2012
19Managing access to class objects in a system utilizing a role-based access control frameworkIssued Sep 01, 2015
20Time-based control of user access in a data processing system incorporating a role-based access control modelPublished Nov 20 2008
21Managing access to class objects in a system utilizing a role-based access control frameworkIssued Feb 10, 2015
22System And Method For Security Levels With Cluster CommunicationsPublished Oct 04 2012
23Privilege managementIssued March 13, 2012
24Domain based isolation of objectsIssued April 23, 2013
25Role-based access control limited by application and hostnamePublished may 24 2012
26Domain based access control of physical memory spaceIssued Sep 9, 2014
27Security frameworkPending
28Providing programming support to debuggersIssued Sep 2, 2014
29Domain based user mapping of objectsPublished Feb 21 2013
30Reducing Application Downtime During FailoverIssued May 3, 2016
31Reducing Application Downtime During FailoverIssued May 3, 2016
32Domain based resource isolation in multi-core systemsIssued March 26, 2019
33Access Control ListsIssued Nov 17 2022
34Network securityPublished Jul 23 2020
** Holds 27 Granted and 6 Pending Patents

IEEE Papers by the Founder

IEEE Publication : Cloud Computing and Emerging Market – 2016

Title: Performance Boost Framework in UNIX Kernel for Cloud Applications

Abstract
Volcanic growth of expanding business and increasing market dimensions lead to need for high performing applications particularly in this internet era. Forrester predicts performance and availability should not to be taken lightly. To fight this onslaught, a business organisation no longer can just accelerate current practices and rely on human intelligence. The company’s software also needs to be autonomic. One key aspect for a software to be considered as autonomic is its ability to analyse the system conditions and invoke appropriate actions to optimise the performance and thereby maintaining user satisfaction. Gone are those days where a system would have about five or ten features embedded into the kernel which would have about few hundred services to serve the application requirements. With growing data center it will be impossible to maintain the performance of an application or a system one by one. This clearly dictates the need for automation. In this paper I will discuss about a performance boost framework in UNIX kernel which shall enable the applications take appropriate actions immediately. I shall also provide a demonstration of how this is achieved in a UNIX platform and deployed into distributed cloud environment.

Keywords– Performance, kernel, UNIX


IEEE Publication : Cloud Computing and Emerging Market – 2012

Title: Object Isolation for Cloud with Domain RBAC

Abstract— Cloud computing has taken technology into a mix of networking, virtualization and clustering environment which has opened up a new era with lots of opportunities thereby making business highly scalable. However there are several challenges that need to be addressed, in particular, security, which Forrester [1] has listed as being one of the most crucial concerns.

One of the most effective and time-tested ways to ensure security is via Role Based Access Control (RBAC) [2]; with emphasis in cloud computing environments on data protection, authentication and authorization. RBAC provides a policy framework to enable delegation of responsibilities of the super user permissions to other users. This framework helps define non-root users with proper authorizations to perform specific system administration tasks.

However it does not provide a mechanism to define the set of objects on which these roles could be exercised. By default, all Role based tasks can be performed on all objects of that type. Therefore to address this issue DOMAIN RBAC has been implemented, with object isolation feature included, as an extension of RBAC. Object Isolation marks a boundary across system resources and users by defining which users can access specified resources on the system while the RBAC roles would determine what operations can be performed on the accessible resources.

In this paper we present and describe a method by which object isolation has been implemented via DOMAIN RBAC along with a use case. We also illustrate our approach by showing how it is implemented on IBM’s AIX version 7 Operating System which can be leveraged in cloud environment.

Keywords– Domains, Resource Isolation, RBAC, AIX, Security