Kapadia
Dipali Kapadia, Markham CA
Patent application number | Description | Published |
---|---|---|
20110066647 | Consolidating Related Task Data in Process Management Solutions - A computer implemented method, apparatus, and computer program product for managing task data. A task advisor identifies a set of queries and a set of data sources mapped to a task type in a mapping entry. The task type is associated with a selected task. The mapping entry maps the task type to the set of queries. The set of queries is mapped to the set of data sources. The task advisor sends each query in the set of queries to a corresponding data source in the set of data sources. The task advisor aggregates the data received from the set of data sources in response to the set of queries. A user may utilize the aggregated data to complete the selected task. | 03-17-2011 |
20120197935 | Consolidating Related Task Data in Process Management Solutions - A computer implemented method, apparatus, and computer program product for managing task data. A task advisor identifies a set of queries and a set of data sources mapped to a task type in a mapping entry. The task type is associated with a selected task. The mapping entry maps the task type to the set of queries. The set of queries is mapped to the set of data sources. The task advisor sends each query in the set of queries to a corresponding data source in the set of data sources. The task advisor aggregates the data received from the set of data sources in response to the set of queries. A user may utilize the aggregated data to complete the selected task. | 08-02-2012 |
Jaegarkumar Kapadia, Sydney AU
Patent application number | Description | Published |
---|---|---|
20140158131 | BLOWER - A blower includes a housing including an inlet and an outlet, a motor to drive a rotatable shaft, first and second impellers provided to the shaft, the first and second impellers each including a plurality of impeller blades, a first stationary component provided to the housing and including stator vanes downstream of the first impeller, and a second stationary component provided to the housing and including stator vanes downstream of the second impeller. A first set of stator vanes of the first stationary component is provided around the motor and are configured and arranged to direct airflow along the motor, to de-swirl the airflow and to decelerate air to increase pressure. A blower including a third impeller and third stationary component positioned above the first impeller is also described. | 06-12-2014 |
Kaushal K. Kapadia, Pune IN
Patent application number | Description | Published |
---|---|---|
20130067538 | Context Aware Recertification - Mechanisms are provided for facilitating recertification of a user access entitlement. These mechanisms collect, from a system resource of the data processing system, access information representative of accesses of the system resource by a user access entitlement. These mechanisms determine that recertification of the user access entitlement, with regard to the system resource, is to be performed and a pattern of access is determined based on the access information for the user access entitlement. A recertification request graphical user interface is output to a user based on the pattern of access. The graphical user interface includes the pattern of access and one or more graphical user interface elements for receiving a user input specifying acceptance or denial of the recertification of the user access entitlement. | 03-14-2013 |
20150178875 | RESOLVING ORPHAN OR INACTIVE ACCOUNTS - In a method for resolving orphan accounts, information about at least one account on a computing system is received. One or more processors determine, from the received information, that a first potential orphan account exists on the computing system. One or more processors notify a first potential account owner of the first potential orphan account about the existence of the first potential orphan account. One or more processors receive an ownership claim for the first potential orphan account, wherein the ownership claim indicates that the first potential account owner is an actual owner of the first potential orphan account, and the one or more processors determine whether the ownership claim is legitimate. | 06-25-2015 |
20150178876 | RESOLVING ORPHAN OR INACTIVE ACCOUNTS - In a method for resolving orphan accounts, information about at least one account on a computing system is received. One or more processors determine, from the received information, that a first potential orphan account exists on the computing system. One or more processors notify a first potential account owner of the first potential orphan account about the existence of the first potential orphan account. One or more processors receive an ownership claim for the first potential orphan account, wherein the ownership claim indicates that the first potential account owner is an actual owner of the first potential orphan account, and the one or more processors determine whether the ownership claim is legitimate. | 06-25-2015 |
Kaushal Kiran Kapadia, Ashok Nagar IN
Patent application number | Description | Published |
---|---|---|
20130232541 | Policy-driven approach to managing privileged/shared identity in an enterprise - Access to a privileged account is managed by first requiring authentication of a user logging into the account and then performing a policy evaluation to determine whether the identified user is allowed to log in using the privileged identity. Preferably, the authentication is a two factor authentication. The policy evaluation preferably enforces a policy, such as a role-based access control, and a context-based access control, a combination of such access controls, or the like. Thus, according to this approach, the entity is provided access to the privileged account if the user's identity is verified and a policy is met. In the alternative, the entity is denied access to the privileged account if either the authentication fails, or (assuming authentication does not fail) policy criteria for the user is not met. | 09-05-2013 |
Kaushal Kiran Kapadia, Pune IN
Patent application number | Description | Published |
---|---|---|
20140075492 | Identity context-based access control - Identity context-based access control is implemented by generating an identity context expression from user identity data. In particular, users are clustered based on combinations of one or more attributes. These clusters comprise one or more identity context(s). Preferably, an intersection of attribute sets of each user in the cluster is formed. In addition, an intersection of attribute sets of each user not in the cluster also is formed. If the attribute set that is common across the cluster of users is not a subset of the attribute set that is common across the rest of the users, then the attribute set forms a unique identity context expression. To reduce the number of roles used in role-based access control (RBAC), at least one role is replaced with an identity context expression. Run-time access control is then enabled. | 03-13-2014 |
Mihir Kapadia, Markham CA
Patent application number | Description | Published |
---|---|---|
20150312249 | PASSWORD RETRIEVAL SYSTEM AND METHOD INVOLVING TOKEN USAGE WITHOUT PRIOR KNOWLEDGE OF THE PASSWORD - A method for managing a master password on a network device, the method stored as a set of instructions executable by a computer processor to: store the master password in a first file in a memory of the network device; store the master password in a second file in the memory of the network device; encrypt access to the first file using a first password; encrypt access to the second file using a second password; send the second password and an identifier associated with the network device over a communications network to a registration server, the registration server configured for storing the second password for subsequent retrieval by the network device; when the first password is unavailable, send a password retrieval request including the identifier; receive the second password configured as a one-time use password; decrypt access to the second file to retrieve the master password; and, initiate a reset process for subsequent storage of the master password in the memory of the network device. | 10-29-2015 |
Roxna Kapadia, Leicester GB
Patent application number | Description | Published |
---|---|---|
20120273424 | METHODS OF PURIFYING VIRUSES USING GEL PERMEATION CHROMATOGRAPHY - Provided herein are elution buffers and methods for purifying viruses using gel permeation chromatography. The methods are useful, for example, in increasing recovery of a virus from a gel permeation chromatography column. The buffers for use in the methods include at least one excipient selected from histidine or sucrose, a divalent cation, a non-ionic detergent, and a phosphate buffered saline. | 11-01-2012 |
Salman Kapadia, Madhya Pradesh IN
Patent application number | Description | Published |
---|---|---|
20150034695 | SURGICAL FASTENER APPLYING APPARATUS - A surgical fastener applying apparatus ( | 02-05-2015 |
20150245839 | URETHRAL ANASTOMOSIS DEVICE AND METHOD - Provided herein is a two-part coupling assembly for re-connecting a first hollow body part to a second body part and an instrument ( | 09-03-2015 |
Salman Kapadia, Seoni IN
Patent application number | Description | Published |
---|---|---|
20130037597 | SURGICAL FASTENER APPLYING APPARATUS - A surgical fastener applying apparatus for applying fasteners to body tissue. The apparatus includes a cartridge receiving half-section defining an elongated channel member configured to releasably receive a stationary housing of a firing assembly. The stationary housing is dimensioned to releasably receive a single use loading unit therein, and includes a lockout structure that prevents insertion of the single use loading unit into the stationary housing after the stationary housing is mounted to the cartridge receiving half-section. | 02-14-2013 |