Patents by Inventor Aditya Kapoor

Aditya Kapoor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11829304
    Abstract: Pairing of an external device using a random user action is disclosed herein. An example method includes restricting the external device from accessing a resource. A user input receivable from the external device is identified based on a type of the external device, the user input not included in a list of previously generated user actions. In response to receipt of the user input from the external device within a threshold time period, the external device is authorized to access the resource.
    Type: Grant
    Filed: December 21, 2017
    Date of Patent: November 28, 2023
    Assignee: MCAFEE, LLC
    Inventors: Cedric Cochin, Jonathan Edwards, Aditya Kapoor
  • Publication number: 20230376781
    Abstract: This disclosure relates generally to systems and methods for autonomous task composition of vision pipelines using an algorithm selection framework. The framework leverages transformer architecture along with deep reinforcement learning techniques to search an algorithmic space for unseen solution templates. In an embodiment, the present disclosure describes a two stage process of identifying the vision pipeline for a particular task. At first stage, a high-level sequence of the vision pipeline is provided by a symbolic planner to create the vision workflow. At second stage, suitable algorithms for each high-level task are selected. This is achieved by performing a graph search using a transformer architecture over an algorithmic space on each component of generated workflow. In order to make the system more robust, weights of embedding, key and query networks of a visual transformer are updated with a Deep Reinforcement Learning framework that uses Proximal Policy Optimization (PPO) as underlying algorithm.
    Type: Application
    Filed: May 19, 2023
    Publication date: November 23, 2023
    Applicant: Tata Consultancy Services Limited
    Inventors: Abhishek Roy Choudhury, Vighnesh Vatsal, Mehesh Rangarajan, Naveen Kumar Basa Anitha, Aditya Kapoor, Jayavardhana Rama Gubbi Lakshminarasimha, Aravindhan Saravanan, Vartika Sengar, Balamuralidhar Purushothaman, Arpan Pal, Nijil George
  • Publication number: 20230373096
    Abstract: Conventional task planners assume that the task-plans provided are executable, hence these are not task-aware. Present disclosure alleviates the downward refinability assumption, that is, planning can be decomposed separate symbolic and continuous planning steps by introducing bi-level planning, a plan which is a series of actions that the robot needs to take to achieve the goal task is curated. Firstly, abstract symbolic actions are converted to continuous vectors and used therein to enable interaction with an environment. Images of objects placed in the environment are captured and concepts are learnt from the captured images and attributes of objects are detected. A hierarchical scene graph is generated from the concepts and attributes wherein the graph includes interpretable sub-symbolic representations and from these interpretable symbolic representations are obtained for identifying goal task.
    Type: Application
    Filed: May 17, 2023
    Publication date: November 23, 2023
    Applicant: Tata Consultancy Services Limited
    Inventors: Jayavardhana Rama GUBBI LAKSHMINARASIMHA, Vartika SENGAR, Vighnesh VATSAL, Balamuralidhar PURUSHOTHAMAN, Arpan PAL, Nijil GEORGE, Aditya KAPOOR
  • Patent number: 11556648
    Abstract: In some implementations there may be provided a system. The system may include a processor and a memory. The memory may include program code which causes operations when executed by the processor. The operations may include analyzing a series of events contained in received data. The series of events may include events that occur during the execution of a data object. The series of events may be analyzed to at least extract, from the series of events, subsequences of events. A machine learning model may determine a classification for the received data. The machine learning model may classify the received data based at least on whether the subsequences of events are malicious. The classification indicative of whether the received data is malicious may be provided. Related methods and articles of manufacture, including computer program products, are also disclosed.
    Type: Grant
    Filed: May 5, 2020
    Date of Patent: January 17, 2023
    Assignee: Cylance Inc.
    Inventors: Xuan Zhao, Aditya Kapoor, Matthew Wolff, Andrew Davis, Derek A. Soeder, Ryan Permeh
  • Patent number: 11210394
    Abstract: In one respect, there is provided a system for training a neural network adapted for classifying one or more scripts. The system may include at least one processor and at least one memory. The memory may include program code that provides operations when executed by the at least one processor. The operations may include: reducing a dimensionality of a plurality of features representative of a file set; determining, based at least on a reduced dimensional representation of the file set, a distance between a file and the file set; and determining, based at least on the distance between the file and the file set, a classification for the file. Related methods and articles of manufacture, including computer program products, are also provided.
    Type: Grant
    Filed: October 23, 2019
    Date of Patent: December 28, 2021
    Assignee: Cylance Inc.
    Inventors: Michael Wojnowicz, Matthew Wolff, Aditya Kapoor
  • Patent number: 11032266
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to identifying a digital certificate associated with data and assigning a reputation to the digital certificate, where the digital certificate is classified as trusted if the digital certificate is included in an entry in a whitelist and the digital certificate is classified as untrusted if the digital certificate is included in an entry in a blacklist.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: June 8, 2021
    Assignee: McAfee, LLC
    Inventors: James Bean, Joel R. Spurlock, Cedric Cochin, Aditya Kapoor, Ramnath Venugopalan
  • Publication number: 20200265139
    Abstract: In some implementations there may be provided a system. The system may include a processor and a memory. The memory may include program code which causes operations when executed by the processor. The operations may include analyzing a series of events contained in received data. The series of events may include events that occur during the execution of a data object. The series of events may be analyzed to at least extract, from the series of events, subsequences of events. A machine learning model may determine a classification for the received data. The machine learning model may classify the received data based at least on whether the subsequences of events are malicious. The classification indicative of whether the received data is malicious may be provided. Related methods and articles of manufacture, including computer program products, are also disclosed.
    Type: Application
    Filed: May 5, 2020
    Publication date: August 20, 2020
    Inventors: Xuan Zhao, Aditya Kapoor, Matthew Wolff, Andrew Davis, Derek A. Soeder, Ryan Permeh
  • Patent number: 10726040
    Abstract: Techniques and solutions are described for facilitating the conversion of tables, having primary data and an append specifying a format of append data, from a first format to a second format. A runtime object and a data dictionary entry can be created for a primary table in the second format, and at least a portion of primary data transferred to the primary table in the second format. A database layer object corresponding to the first table in the first format can be associated with a temporary runtime object and a temporary data dictionary entry so that append data can be transferred to an append table in the second format. Operations directed to the primary table in the second format can be modified to also be directed to the append table, such as using a JOIN view.
    Type: Grant
    Filed: March 7, 2018
    Date of Patent: July 28, 2020
    Assignee: SAP SE
    Inventors: Aditya Kapoor, Manish Kumar Sinha, Vipul Khullar
  • Patent number: 10691476
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to monitor access to data in a secured area of memory at a hypervisor level, receive a request from a process to the data in the secured area, and deny the request if the process is not a trusted process. In an example, the electronic device is a point of sale device.
    Type: Grant
    Filed: June 27, 2015
    Date of Patent: June 23, 2020
    Assignee: McAfee, LLC
    Inventors: Aditya Kapoor, Jonathan L. Edwards
  • Patent number: 10685112
    Abstract: In some implementations there may be provided a system. The system may include a processor and a memory. The memory may include program code which causes operations when executed by the processor. The operations may include analyzing a series of events contained in received data. The series of events may include events that occur during the execution of a data object. The series of events may be analyzed to at least extract, from the series of events, subsequences of events. A machine learning model may determine a classification for the received data. The machine learning model may classify the received data based at least on whether the subsequences of events are malicious. The classification indicative of whether the received data is malicious may be provided. Related methods and articles of manufacture, including computer program products, are also disclosed.
    Type: Grant
    Filed: May 5, 2017
    Date of Patent: June 16, 2020
    Assignee: Cylance Inc.
    Inventors: Xuan Zhao, Aditya Kapoor, Matthew Wolff, Andrew Davis, Derek Soeder, Ryan Permeh
  • Patent number: 10579544
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to receive a request from a process to access data is a system, determine if the data is in a virtualized protected area of memory in the system, and allow access to the data if the data is in the virtualized protected area of memory and the process is a trusted process. The electronic device can also be configured to determine if new data should be protected, store the new data in the virtualized protected area of memory in the system if the new data should be protected, and store the new data in an unprotected area of memory in the system if the new data should not be protected.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: March 3, 2020
    Assignee: McAfee, LLC
    Inventors: Joel R. Spurlock, Zheng Zhang, Aditya Kapoor, Jonathan L. Edwards, Khai N. Pham
  • Publication number: 20200057854
    Abstract: In one respect, there is provided a system for training a neural network adapted for classifying one or more scripts. The system may include at least one processor and at least one memory. The memory may include program code that provides operations when executed by the at least one processor. The operations may include: reducing a dimensionality of a plurality of features representative of a file set; determining, based at least on a reduced dimensional representation of the file set, a distance between a file and the file set; and determining, based at least on the distance between the file and the file set, a classification for the file. Related methods and articles of manufacture, including computer program products, are also provided.
    Type: Application
    Filed: October 23, 2019
    Publication date: February 20, 2020
    Inventors: Michael Wojnowicz, Matthew Wolff, Aditya Kapoor
  • Patent number: 10489589
    Abstract: In one respect, there is provided a system for training a neural network adapted for classifying one or more scripts. The system may include at least one processor and at least one memory. The memory may include program code that provides operations when executed by the at least one processor. The operations may include: reducing a dimensionality of a plurality of features representative of a file set; determining, based at least on a reduced dimensional representation of the file set, a distance between a file and the file set; and determining, based at least on the distance between the file and the file set, a classification for the file. Related methods and articles of manufacture, including computer program products, are also provided.
    Type: Grant
    Filed: November 21, 2016
    Date of Patent: November 26, 2019
    Assignee: Cylance Inc.
    Inventors: Michael Wojnowicz, Matthew Wolff, Aditya Kapoor
  • Publication number: 20190278862
    Abstract: Techniques and solutions are described for facilitating the conversion of tables, having primary data and an append specifying a format of append data, from a first format to a second format. A runtime object and a data dictionary entry can be created for a primary table in the second format, and at least a portion of primary data transferred to the primary table in the second format. A database layer object corresponding to the first table in the first format can be associated with a temporary runtime object and a temporary data dictionary entry so that append data can be transferred to an append table in the second format. Operations directed to the primary table in the second format can be modified to also be directed to the append table, such as using a JOIN view.
    Type: Application
    Filed: March 7, 2018
    Publication date: September 12, 2019
    Applicant: SAP SE
    Inventors: Aditya Kapoor, Manish Kumar Sinha, Vipul Khullar
  • Publication number: 20190188381
    Abstract: In some implementations there may be provided a system. The system may include a processor and a memory. The memory may include program code which causes operations when executed by the processor. The operations may include analyzing a series of events contained in received data. The series of events may include events that occur during the execution of a data object. The series of events may be analyzed to at least extract, from the series of events, subsequences of events. A machine learning model may determine a classification for the received data. The machine learning model may classify the received data based at least on whether the subsequences of events are malicious. The classification indicative of whether the received data is malicious may be provided. Related methods and articles of manufacture, including computer program products, are also disclosed.
    Type: Application
    Filed: May 5, 2017
    Publication date: June 20, 2019
    Inventors: Xuan Zhao, Aditya Kapoor, Matthew Wolff, Andrew Davis, Derek Soeder, Ryan Permeh
  • Publication number: 20190155752
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to receive a request from a process to access data is a system, determine if the data is in a virtualized protected area of memory in the system, and allow access to the data if the data is in the virtualized protected area of memory and the process is a trusted process. The electronic device can also be configured to determine if new data should be protected, store the new data in the virtualized protected area of memory in the system if the new data should be protected, and store the new data in an unprotected area of memory in the system if the new data should not be protected.
    Type: Application
    Filed: December 12, 2018
    Publication date: May 23, 2019
    Applicant: McAfee, LLC
    Inventors: Joel R. Spurlock, Zheng Zhang, Aditya Kapoor, Jonathan L. Edwards, Khai N. Pham
  • Patent number: 10176344
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to receive untrusted input data at an enclave in an electronic device, isolate the untrusted input data from at least a portion of the enclave, communicate at least a portion of the untrusted data to an integrity verification module using an attestation channel, and receive data integrity verification of the untrusted input data from the integrity verification module. The integrity verification module can perform data integrity attestation functions to verify the untrusted data and the data integrity attestation functions include a data attestation policy and a whitelist.
    Type: Grant
    Filed: July 24, 2017
    Date of Patent: January 8, 2019
    Assignee: McAfee, LLC
    Inventors: Ned Smith, Esteban Gutierrez, Andrew Woodruff, Aditya Kapoor
  • Patent number: 10162767
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to receive a request from a process to access data is a system, determine if the data is in a virtualized protected area of memory in the system, and allow access to the data if the data is in the virtualized protected area of memory and the process is a trusted process. The electronic device can also be configured to determine if new data should be protected, store the new data in the virtualized protected area of memory in the system if the new data should be protected, and store the new data in an unprotected area of memory in the system if the new data should not be protected.
    Type: Grant
    Filed: June 27, 2015
    Date of Patent: December 25, 2018
    Assignee: McAfee, LLC
    Inventors: Joel R. Spurlock, Zheng Zhang, Aditya Kapoor, Jonathan L. Edwards, Khai N. Pham
  • Patent number: 10127118
    Abstract: A method for backing up and restoring search service applications (SSAs) is provided that backs up an SSA topology extensible markup language (XML) file to a backup system. The method then backs up an SSA search topology XML file to the backup system and backs up SSA databases to the backup system. An application programming interface (API) is queried to discover internet information services (IIS) virtual directories associated with the SSA. Discovered IIS virtual directories associated with the SSA are backed up to the backup system IIS configuration data, IIS metabase data and registry data for the SSA are also backed up to the backup system. A similar process is utilized to restore this data to enable the recovery of an SSA.
    Type: Grant
    Filed: December 27, 2013
    Date of Patent: November 13, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Anupam Chakraborty, Tushar Dethe, Sunil K. Yadav, Pradeep Anappa, Amarendra Behera, Aditya Kapoor
  • Publication number: 20180322287
    Abstract: In some implementations there may be provided a system. The system may include a processor and a memory. The memory may include program code which causes operations when executed by the processor. The operations may include analyzing a series of events contained in received data. The series of events may include events that occur during the execution of a data object. The series of events may be analyzed to at least extract, from the series of events, subsequences of events. A machine learning model may determine a classification for the received data. The machine learning model may classify the received data based at least on whether the subsequences of events are malicious. The classification indicative of whether the received data is malicious may be provided. Related methods and articles of manufacture, including computer program products, are also disclosed.
    Type: Application
    Filed: May 5, 2017
    Publication date: November 8, 2018
    Inventors: Xuan Zhao, Aditya Kapoor, Matthew Wolff, Andrew Davis, Derek Soeder, Ryan Permeh