Amit Joshi - San Jose CA, US Ananta Iyengar - San Jose CA, US Anurag Sharma - Mountain View CA, US Finnur Thorarinsson - Stanford CA, US Johann Sigurdsson - Montreal, CA Sanjeev Radhakrishnan - San Jose CA, US Sigurdur Asgeirsson - Beaconsfield, CA Sunil Shilimkar - Pune, IN Tomas Gunnarsson - Montreal, CA Wayne Gray - Sunnyvale CA, US
Assignee:
Google Inc. - Mountain View CA
International Classification:
H04L 9/32
US Classification:
726 2
Abstract:
An innovative security solution which separates a client into a Protected Context, which is the real files and resources of the client, and an Isolated Context, which is a restricted execution environment which makes use of virtualized resources to execute applications and modify content in the Isolated Context, without allowing explicit access to the resources in the Protected Context. The solution further consolidates user interfaces to allow users to seamlessly work with content in both contexts, and provide a visual indication of which display windows are rendered from content executed in the Isolated Context.
Creating An Assured Execution Environment For At Least One Computer Program Executable On A Computer System
Anurag Sharma - Mountain View CA, US Amit Singh - Sunnyvale CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/45
US Classification:
717136
Abstract:
The present invention provides processor-implemented method and system of creating an assured execution environment for at least one computer program executable on a computer system. In an exemplary embodiment, the method and system include (1) converting the executable into a computer program targeted for the computer system, where the converting includes scrambling the executable by applying an encryption scheme to the executable and (2) executing the program on the computer system only if the program complies with a policy.
Reading A Locked Windows Nfts Efs Encrypted Computer File
Embodiments of the invention relate to reading at least one locked, encrypted computer file encrypted by an encryption filter driver running on an operating system of a computer system, with an added kernel driver, while the operating system is running and reading at least one locked, unencrypted computer file in a computer system with an operating system with an added kernel driver while the operating system is running. An exemplary embodiment includes getting the handle of the locked, encrypted computer file, causing encryption key information associated with the locked, encrypted computer file to be processed, and reading data from the locked, encrypted computer file by using the added kernel driver.
Handling Content Of A Read-Only File In A Computer's File System
Anurag Sharma - Mountain View CA, US Amit Singh - Sunnyvale CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30
US Classification:
707756, 707741, 707755, 707793, 707803
Abstract:
Embodiments of the invention relate to manipulating the original content of at least one original read-only computer file in a file-system of a computer system, where the computer system includes an operating system including a framework for in-line monitoring of accesses to the file-system. An exemplary embodiment, includes transforming the original content via a non-length-preserving data transformation algorithm, thereby resulting in transformed content, storing the transformed content in a transformed computer file, splitting the transformed computer tile into a first file and a second file, and associating the first file with the second file in the file-system. The non-length-preserving data transformation algorithm includes a length-increasing data transformation algorithm.
Jon E. Graham - San Jose CA, US Anurag Sharma - Mountain View CA, US Steven Welch - Gilroy CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 7/04
US Classification:
726 27, 713100, 717168
Abstract:
The present invention provides a processor-implemented method and system of updating an operating system of a computer system, where the operating system is subject to a system lockdown that does not allow changes to a list of approved executables of the operating system and that does not allow changes to a base system configuration of the operating system. In an exemplary embodiment, the method and system include, (1) identifying at least one trusted updater process in the operating system and (2) allowing the trusted updater process to make at least one change to the list of approved executables. In an exemplary embodiment, the method and system include, (1) identifying at least one trusted updater process in the operating system and (2) allowing the trusted updater process to make at least one change to the base system configuration.
Specifying And Enforcing Run-Time Policies For Application Processes Being Executed On A Computer
The present invention provides a method and system of specifying and enforcing at least one run-time policy for at least one computer process executing on a computer system, where the computer system includes a computer operating system. In an exemplary embodiment, the method and system include (1) relating the policy with an executable file of the process, (2) associating the policy with a running instance of the process, and (3) enforcing the policy on the running instance.
Smart Resync Of Data Between A Network Management System And A Network Element
Gilbert Levesque - Mountain View CA, US Drago Goricanec - San Jose CA, US Anurag Sharma - San Jose CA, US Ajay Singhani - Fremont CA, US Vijay Damojipurapu - Fremont CA, US
International Classification:
H04L 12/26
US Classification:
370229000
Abstract:
Network recovery of multiple NEs, such as at NMS restart, or at re-establishment of communication after loss of communication with the NMS that provides reduced cost and reduced the elapsed time before the NMS can start performing network monitoring. A method of recovering data from a network element at a network management system comprises the steps of determining whether a data buffer of the network element is valid, if the data buffer of the network element is valid, determining whether the data buffer of the network element contains a database change event not received by the network management system, if the data buffer of the network element is not valid or if the data buffer of the network element contains a database change event not received by the network management system, indicating that the data buffer of the network element is out-of-sync with the network management system, and if the data buffer of the network element is valid and if the data buffer of the network element does not contains a database change event not received by the network management system, indicating that the data buffer of the network element is in sync with the network management system.
Optimized Data Placement For Individual File Accesses On Deduplication-Enabled Sequential Storage Systems
MIHAIL C. CONSTANTINESCU - SAN JOSE CA, US ABDULLAH GHARAIBEH - VANCOUVER, CA MAOHUA LU - SAN JOSE CA, US DAVID A. PEASE - REDWOOD ESTATES CA, US ANURAG SHARMA - MOUNTAIN VIEW CA, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - ARMONK NY
International Classification:
G06F 17/30
US Classification:
707692, 707E17002
Abstract:
Data deduplication for data storage tapes comprises determining the read throughput of a deduplicated set of individual files on a single data storage tape, and determining a placement of deduplicated file data on a single data storage tape to reduce an average number of per-file gaps on the tape. Deduplicated file data is placed on the single data storage tape based on said placement to increase an average read throughput for a deduplicated set of individual files.
Isbn (Books And Publications)
Selected Papers from Photonics India '98: 14-18 December 1998, New Delhi, India
Top police officials, including director-general of police (DGP) Anurag Sharma, who was at the spot, immediately took stock of the situation and briefed the chief minister. "There were thousands of people, including several VVIPs at the venue, when the incident happened. So, we informed the Presiden
Date: Dec 27, 2015
Category: World
Source: Google
Police kill 5 prisoners on way to court in southern India
When the vehicle stopped, another suspect "tried to snatch a rifle from a policeman and tried to escape," said Anurag Sharma, the head of Telangana state police. "The police first warned them to stop and surrender, and when they did not listen, police opened fire."
The Chief Minister held a review meeting with Chief Secretary Rajiv Sharma and DGP Anurag Sharma on the accident. He later visited Yashoda Hospital where the children were being treated. Several State ministers and Janasena Party President Pawan Kalyan too visited the injured.
Date: Jul 24, 2014
Category: World
Source: Google
Telangana's Medak: Horror train-bus collision kills 12 school children
State Chief Minister K Chandrasekhar Rao reviewed the situation with Chief Secretary Rajiv Sharma and DGP Anurag Sharma. He ordered the officials to take necessary steps to extend all medical assistance to the injured.
Date: Jul 24, 2014
Category: World
Source: Google
In Telengana, 12 kids die as train hits school bus at unmanned rail crossing
Chief Minister K. Chandrasekhar Rao reviewed the situation with Chief Secretary Rajiv Sharma and DGP Anurag Sharma. He ordered the officials to take necessary steps to extend all medical assistance to the injured.
Date: Jul 24, 2014
Category: World
Source: Google
24 Indian Students Swept Into River and Feared Drowned
Search teams scoured the river on Monday for signs of the missing students but recovered only four bodies. Regional police chief Anurag Sharma told the Associated Press that officials feared the chances of finding survivors are slim.
Date: Jun 09, 2014
Source: Google
K Chandrashekhar Rao takes oath as first CM of Telangana; Modi assures support
The buzz is that senior IAS officer Rajiv Sharma, who is presently working in the Union home ministry, and incumbent Hyderabad police commissioner Anurag Sharma are likely to take over as the chief secretary and DGP of Telangana respectively.
Date: Jun 02, 2014
Category: World
Source: Google
Two-story hotel collapses in southern India, killing at least 10, injuring 12
Police official Anurag Sharma says more people are feared trapped in the debris of the City Light hotel, which fell Monday morning. Another 20 people have been rescued from the building, which is located in a suburb of the city of Hyderabad.