Patents by Inventor Ajay Agrawal

Ajay Agrawal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240095011
    Abstract: Aspects of data management are described. A cluster-level state machine may be instantiated for an update procedure for updating software for a cluster of storage nodes, where the update procedure may be configured to serially update the plurality of storage nodes. The cluster-level state machine may be configured to monitor the update procedure at a cluster level. One or more node-level state machines may be instantiated for the update procedure, where the one or more node-level state machines may be configured to monitor the performance of the update procedure at a storage node level. During an update procedure, the state of the cluster-level state machine may reflect a state of the cluster of storage nodes and the state of a node-level state machine may reflect a state of a respective one or more storage nodes.
    Type: Application
    Filed: September 19, 2022
    Publication date: March 21, 2024
    Inventors: Muthugopalakrishnan Adiseshan, Sai Sandeep Moparthi, Ajay Shekar, Pankaj Kumar, Ravi C. Kondamuru, Smriti Agrawal, Srinivasan PS
  • Publication number: 20240095021
    Abstract: Aspects of data management are described. During an update procedure for serially updating a cluster of storage nodes, a storage node of the cluster of storage nodes may enter a quiescent state. While in the quiescent state, the storage node may refrain from obtaining new jobs and may continue to execute jobs that were initiated at the storage node prior to entering the quiescent state. The storage node may enter the quiescent state while another storage node enters an update state for installing the update version. The storage node may also post, to a job queue, jobs running at the storage node that are terminated at an end of the quiescent state.
    Type: Application
    Filed: September 19, 2022
    Publication date: March 21, 2024
    Inventors: Smriti Agrawal, Schuyler Merritt Smith, Patricia Ann Beekman, Pooja Sinha, Vabilisetti Monan Abhyas, Ajay Shekar
  • Patent number: 11886610
    Abstract: The technology disclosed relates to analysis of security posture of a cloud environment. In particular, the disclosed technology relates to a system and method that detects a triggering criterion and, in response to the triggering criterion, automatically discovers a plurality of databases in the cloud environment. An orchestration engine is configured to deploy a plurality of log analyzer microservices on the plurality of databases, each log analyzer microservice, of the plurality of log analyzer microservices, being configured to scan a respective database log that represents database activities on a respective database of the plurality of databases. Analysis results are received from the plurality of log analyzer microservices, the analysis results represent detection of at least one of a performance criterion or a security criterion in one or more databases of the plurality of databases. An action signal representing the analysis results is generated.
    Type: Grant
    Filed: June 8, 2023
    Date of Patent: January 30, 2024
    Assignee: Normalyze, Inc.
    Inventors: Ajay Agrawal, Yang Zhang
  • Patent number: 11451587
    Abstract: The technology disclosed presents an improved endpoint data loss prevention (DLP) solution, referred to herein as “small-footprint endpoint DLP (sf-EDLP),” which enforces security policies at endpoints by relying on previously generated sensitivity metadata, rather than by performing content sensitivity scans at the endpoints. Since content sensitivity scans are computationally intensive and time consuming, sf-EDLP leads to a significantly simpler implementation, reduced runtime computation, and a smaller memory footprint; making it suitable for computationally constrained environments such as modern mobile devices.
    Type: Grant
    Filed: January 8, 2020
    Date of Patent: September 20, 2022
    Assignee: Netskope, Inc.
    Inventors: Krishna Narayanaswamy, Ajay Agrawal
  • Publication number: 20220294831
    Abstract: The technology disclosed relates to endpoint data loss prevention (DLP). In particular, the technology disclosed relates to enforcing data loss prevention policies at an endpoint without needing to perform content sensitivity scan at the endpoint.
    Type: Application
    Filed: June 2, 2022
    Publication date: September 15, 2022
    Applicant: Netskope, Inc.
    Inventors: Krishna NARAYANASWAMY, Ajay AGRAWAL
  • Patent number: 11425169
    Abstract: The technology disclosed presents an improved endpoint data loss prevention (DLP) solution, referred to herein as “small-footprint endpoint DLP (sf-EDLP),” which enforces security policies at endpoints by relying on previously generated sensitivity metadata, rather than by performing content sensitivity scans at the endpoints. Since content sensitivity scans are computationally intensive and time consuming, sf-EDLP leads to a significantly simpler implementation, reduced runtime computation, and a smaller memory footprint; making it suitable for computationally constrained environments such as modern mobile devices.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: August 23, 2022
    Assignee: Netskope, Inc.
    Inventors: Krishna Narayanaswamy, Ajay Agrawal
  • Publication number: 20220114513
    Abstract: A method (200) for configuring a workflow is described. The method (200) comprises initiating (202), by a workflow engine (122), a task in the workflow and identifying (210), by a rule engine (124), at least one upcoming task in the workflow based on data associated with at least one parameter of the task. The method (200) further comprises determining (212), by a task engine (126), at least one additional parameter of the identified at least one upcoming task and obtaining (214), by the task engine (126), data associated with the at least one additional parameter. The method (200) further comprises completing (216), by the task engine (126), the task based on the data associated with the at least one additional parameter.
    Type: Application
    Filed: January 13, 2020
    Publication date: April 14, 2022
    Applicant: SIRIONLABS PTE. LTD.
    Inventors: Aditya Gupta, Neha Sharma, Ravi Verma, Rahul Raman, Ajay Agrawal
  • Publication number: 20200145463
    Abstract: The technology disclosed presents an improved endpoint data loss prevention (DLP) solution, referred to herein as “small-footprint endpoint DLP (sf-EDLP),” which enforces security policies at endpoints by relying on previously generated sensitivity metadata, rather than by performing content sensitivity scans at the endpoints. Since content sensitivity scans are computationally intensive and time consuming, sf-EDLP leads to a significantly simpler implementation, reduced runtime computation, and a smaller memory footprint; making it suitable for computationally constrained environments such as modern mobile devices.
    Type: Application
    Filed: January 8, 2020
    Publication date: May 7, 2020
    Applicant: Netskope, Inc.
    Inventors: Krishna NARAYANASWAMY, Ajay AGRAWAL
  • Publication number: 20190268379
    Abstract: The technology disclosed presents an improved endpoint data loss prevention (DLP) solution, referred to herein as “small-footprint endpoint DLP (sf-EDLP),” which enforces security policies at endpoints by relying on previously generated sensitivity metadata, rather than by performing content sensitivity scans at the endpoints. Since content sensitivity scans are computationally intensive and time consuming, sf-EDLP leads to a significantly simpler implementation, reduced runtime computation, and a smaller memory footprint; making it suitable for computationally constrained environments such as modern mobile devices.
    Type: Application
    Filed: May 9, 2019
    Publication date: August 29, 2019
    Applicant: Netskope, Inc.
    Inventors: Krishna NARAYANASWAMY, Ajay AGRAWAL
  • Publication number: 20140129276
    Abstract: A method for supplier management is described. The method includes storing metadata related to several executed contracts in a contract library, each contract having one or more deliverables. Further, the method involves normalizing the metadata into a predetermined form. Selecting a deliverable from a contract entered into the contract library, the method identifies one or more deliverables from the contract library that are similar to the selected deliverable. The method then compares the selected deliverable's metadata to the metadata of the identified deliverables and based on the comparison, determines whether the deliverable is likely to be missed. If the deliverable is likely to be missed, the method performs an appropriate action which can include one or more of sending a notification, arranging additional monitoring, modifying benchmarks/thresholds, or suggesting renegotiation of the deliverable. A system for supplier management is also described.
    Type: Application
    Filed: December 20, 2012
    Publication date: May 8, 2014
    Applicant: SIRION LABS
    Inventors: AJAY AGRAWAL, KANTI PRABHA, ADITYA GUPTA, ISHA JHA
  • Publication number: 20110202470
    Abstract: A system and methods for managing obligations. The system includes a database storage system including at least one contract, wherein a contract including a plurality of obligations. A data processing system, operatively coupled to the database storage system, manages the contracts and the obligations. The data processing system is configured to extract the plurality of obligations associated with the contract, and define relationships between these obligations. Upon computation of the defined relationships, the data processing system triggers corresponding actions, resulting in obligation compliance.
    Type: Application
    Filed: October 11, 2010
    Publication date: August 18, 2011
    Applicant: UNITEDLEX CORPORATION
    Inventors: AJAY AGRAWAL, KANTI PRABHA, ADITYA GUPTA
  • Publication number: 20110158149
    Abstract: Multimedia gateway for use in a networked home environment is disclosed. In one embodiment, in a method for delivering broadcast multimedia content in a networked home environment, a radio frequency (RF) signal is received. The RF signal is then converted into an IP stream. It is determined whether the IP stream is an IP data stream or an IP video stream and based on the outcome of the determination, the IP stream is sent to one or more televisions, one or more computing devices, and/or one or more telephones.
    Type: Application
    Filed: December 29, 2010
    Publication date: June 30, 2011
    Inventors: Satish Mugulavalli, Ajay Agrawal, Venkatesh Diwakar Tanjore
  • Patent number: 7930284
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Grant
    Filed: July 2, 2010
    Date of Patent: April 19, 2011
    Assignee: eBay Inc.
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley
  • Publication number: 20100269161
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Application
    Filed: July 2, 2010
    Publication date: October 21, 2010
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H. Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley
  • Patent number: 7769737
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Grant
    Filed: September 28, 2009
    Date of Patent: August 3, 2010
    Assignee: eBay Inc.
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley
  • Publication number: 20100017865
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Application
    Filed: September 28, 2009
    Publication date: January 21, 2010
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H. Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley
  • Patent number: 7606821
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Grant
    Filed: June 30, 2004
    Date of Patent: October 20, 2009
    Assignee: eBay Inc.
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley
  • Publication number: 20060021031
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 26, 2006
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin Embree, Jeffrey King, Andy Brown, Mathew Henley
  • Patent number: 6879812
    Abstract: Aspects of the invention are found in an apparatus for monitoring data on a wireless network. The data is transmitted according to a wireless data network protocol across the network. The apparatus is contained on a portable wireless network analysis device. The portable wireless network analysis device has a wireless network interface that communicatively couples the portable wireless network analysis device to the wireless network. This allows the portable wireless network analysis device to receive data from the wireless network. The portable wireless network analysis device also has a network traffic analyzer. The network traffic analyzer is communicatively coupled to the wireless network interface. The analyzer receives and analyzes the data received from the wireless network. The portable wireless network analysis device is capable of being operated by user at one location and transported to second location.
    Type: Grant
    Filed: September 17, 2002
    Date of Patent: April 12, 2005
    Assignee: Networks Associates Technology Inc.
    Inventors: Ajay Agrawal, Sriharsha Sathya, Yashovan Neelakantamurthy, Apurva Prakash, Raghavendra Malpani, Abhishek Saraswati, Suryaprashant Rao, Ashish Hate, Peter O. Schmitz
  • Patent number: 6801756
    Abstract: Aspects of the invention are found in an apparatus for monitoring data on a wireless network. The data is transmitted according to a wireless data network protocol across the network. The apparatus is contained on a portable wireless network analysis device. The portable wireless network analysis device has a wireless network interface that communicatively couples the portable wireless network analysis device to the wireless network. This allows the portable wireless network analysis device to receive data from the wireless network. The portable wireless network analysis device also has a network traffic analyzer. The network traffic analyzer is communicatively coupled to the wireless network interface. The analyzer receives and analyzes the data received from the wireless network. The portable wireless network analysis device is capable of being operated by user at one location and transported to second location.
    Type: Grant
    Filed: February 8, 2002
    Date of Patent: October 5, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Ajay Agrawal, Sriharsha Sathya, Yashovan Neelakantamurthy, Apurva Prakash, Raghavendra Malpani, Abhishek Saraswati, Suryaprashant Rao, Ashish Hate, Peter O. Schmitz