Patents by Inventor Ajaykumar Rajasekharan
Ajaykumar Rajasekharan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12137110Abstract: Disclosed in some examples are systems, methods, and machine readable mediums for identifying insider threats by determining file system element activity models that correlate to undesirable behavior and then utilizing the determined model to detect insider threats. Events involving file system elements of a client computing device (e.g., a network endpoint) may be monitored by a file system element monitoring application on the client computing device. The values of these signals are aggregated across all events of the same type that have occurred within a predetermined time window (e.g., an hour) for a particular client computing device. Each time an aggregated signal has a value over the threshold, an anomaly is recorded. Anomaly counts for each signal are then calculated as the aggregate number of anomalies for a particular signal over a second time period, the span of which is determined by the generation of first anomaly to the close of an alert by the network monitor.Type: GrantFiled: March 8, 2023Date of Patent: November 5, 2024Assignee: Code42 Software, Inc.Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel Louis Sullivan
-
Publication number: 20240346144Abstract: A method of detecting the onset of a ransomware attack is presented. In an example embodiment, file backup metadata for each of a plurality of computing devices is accessed and analyzed to detect anomalous file backup activity of individual ones of the computing devices. A determination is made as to whether the detected anomalous file backup activity of at least some of the computing devices is correlated in time. File description metadata for each of the computing devices is also accessed and analyzed to identify files in the computing devices that are anomalous to other files in the computing devices. A determination whether a ransomware attack has begun is based on a determination that the detected anomalous file backup activity of at least some of the computing devices is correlated in time, as well as on the identified anomalous files.Type: ApplicationFiled: April 22, 2024Publication date: October 17, 2024Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
-
Patent number: 11995186Abstract: A method of detecting the onset of a ransomware attack is presented. In an example embodiment, file backup metadata for each of a plurality of computing devices is accessed and analyzed to detect anomalous file backup activity of individual ones of the computing devices. A determination is made as to whether the detected anomalous file backup activity of at least some of the computing devices is correlated in time. File description metadata for each of the computing devices is also accessed and analyzed to identify files in the computing devices that are anomalous to other files in the computing devices. A determination whether a ransomware attack has begun is based on a determination that the detected anomalous file backup activity of at least some of the computing devices is correlated in time, as well as on the identified anomalous files.Type: GrantFiled: December 22, 2022Date of Patent: May 28, 2024Assignee: CrashPlan Group LLCInventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
-
Publication number: 20230259623Abstract: A method of detecting the onset of a ransomware attack is presented. In an example embodiment, file backup metadata for each of a plurality of computing devices is accessed and analyzed to detect anomalous file backup activity of individual ones of the computing devices. A determination is made as to whether the detected anomalous file backup activity of at least some of the computing devices is correlated in time. File description metadata for each of the computing devices is also accessed and analyzed to identify files in the computing devices that are anomalous to other files in the computing devices. A determination whether a ransomware attack has begun is based on a determination that the detected anomalous file backup activity of at least some of the computing devices is correlated in time, as well as on the identified anomalous files.Type: ApplicationFiled: December 22, 2022Publication date: August 17, 2023Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
-
Publication number: 20230224316Abstract: Disclosed in some examples are systems, methods, and machine readable mediums for identifying insider threats by determining file system element activity models that correlate to undesirable behavior and then utilizing the determined model to detect insider threats. Events involving file system elements of a client computing device (e.g., a network endpoint) may be monitored by a file system element monitoring application on the client computing device. The values of these signals are aggregated across all events of the same type that have occurred within a predetermined time window (e.g., an hour) for a particular client computing device. Each time an aggregated signal has a value over the threshold, an anomaly is recorded. Anomaly counts for each signal are then calculated as the aggregate number of anomalies for a particular signal over a second time period, the span of which is determined by the generation of first anomaly to the close of an alert by the network monitor.Type: ApplicationFiled: March 8, 2023Publication date: July 13, 2023Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel Louis Sullivan
-
Patent number: 11611574Abstract: Disclosed in some examples are systems, methods, and machine readable mediums for identifying insider threats by determining file system element activity models that correlate to undesirable behavior and then utilizing the determined model to detect insider threats. Events involving file system elements of a client computing device (e.g., a network endpoint) may be monitored by a file system element monitoring application on the client computing device. The values of these signals are aggregated across all events of the same type that have occurred within a predetermined time window (e.g., an hour) for a particular client computing device. Each time an aggregated signal has a value over the threshold, an anomaly is recorded. Anomaly counts for each signal are then calculated as the aggregate number of anomalies for a particular signal over a second time period, the span of which is determined by the generation of first anomaly to the close of an alert by the network monitor.Type: GrantFiled: August 2, 2017Date of Patent: March 21, 2023Assignee: Code42 Software, Inc.Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
-
Patent number: 11537713Abstract: A method of detecting the onset of a ransomware attack is presented. In an example embodiment, file backup metadata for each of a plurality of computing devices is accessed and analyzed to detect anomalous file backup activity of individual ones of the computing devices. A determination is made as to whether the detected anomalous file backup activity of at least some of the computing devices is correlated in time. File description metadata for each of the computing devices is also accessed and analyzed to identify files in the computing devices that are anomalous to other files in the computing devices. A determination whether a ransomware attack has begun is based on a determination that the detected anomalous file backup activity of at least some of the computing devices is correlated in time, as well as on the identified anomalous files.Type: GrantFiled: August 2, 2017Date of Patent: December 27, 2022Assignee: CRASHPLAN GROUP LLCInventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
-
Patent number: 11341527Abstract: Systems and methods are provided for determining the efficacy of digital assets provided to an audience. One embodiment is a system that includes a brand management server. The brand management server includes a memory that stores assets comprising digital media. The brand management server also includes a controller. The controller distributes the assets for consumption by members of an audience at remote devices. The controller also selects one of the assets, determines a look-back period, acquires metrics indicating at least two different types of consumption of the asset by the audience during the look-back period, and calculates an asset score for the asset that indicates a popularity of the asset and is based on the metrics indicating the at least two different types of consumption.Type: GrantFiled: July 23, 2021Date of Patent: May 24, 2022Assignee: Brandfolder, Inc.Inventors: Ajaykumar Rajasekharan, Logan Sears, Jim Hanifen, Brett Nekolny, Luke Butterfield Beatty
-
Publication number: 20210350408Abstract: Systems and methods are provided for determining the efficacy of digital assets provided to an audience. One embodiment is a system that includes a brand management server. The brand management server includes a memory that stores assets comprising digital media. The brand management server also includes a controller. The controller distributes the assets for consumption by members of an audience at remote devices. The controller also selects one of the assets, determines a look-back period, acquires metrics indicating at least two different types of consumption of the asset by the audience during the look-back period, and calculates an asset score for the asset that indicates a popularity of the asset and is based on the metrics indicating the at least two different types of consumption.Type: ApplicationFiled: July 23, 2021Publication date: November 11, 2021Inventors: Ajaykumar Rajasekharan, Logan Sears, Jim Hanifen, Brett Nekolny, Luke Butterfield Beatty
-
Patent number: 11107113Abstract: Systems and methods are provided for determining the efficacy of digital assets provided to an audience. One embodiment is a system that includes a brand management server. The brand management server includes a memory that stores assets comprising digital media. The brand management server also includes a controller. The controller distributes the assets for consumption by members of an audience at remote devices. The controller also selects one of the assets, determines a look-back period, acquires metrics indicating at least two different types of consumption of the asset by the audience during the look-back period, and calculates an asset score for the asset that indicates a popularity of the asset and is based on the metrics indicating the at least two different types of consumption.Type: GrantFiled: September 12, 2018Date of Patent: August 31, 2021Assignee: Brandfolder, Inc.Inventors: Ajaykumar Rajasekharan, Logan Sears, Jim Hanifen, Brett Nekolny, Luke Butterfield Beatty
-
Patent number: 10798156Abstract: Systems and methods are provided for distributing content. One embodiment includes a content management server. The content management server includes a memory that stores a library of assets comprising digital media, and that further stores scores that indicate popularity of the assets in the library. The content management server also includes an interface that receives a Hyper Text Transfer Protocol (HTTP) request that is sourced by a device remote from the content management server, and a controller that identifies a Uniform Resource Locator (URL) within the HTTP request, selects a group of assets for the URL from the library, identifies an asset that has a highest score within the group, and provides the asset in response to the HTTP request. The controller alters scores for assets in the library over time as assets in the library are provided, and selects different groups of assets for the URL over time.Type: GrantFiled: March 2, 2020Date of Patent: October 6, 2020Assignee: BRANDFOLDER, INC.Inventors: Jim Hanifen, Logan Sears, Ajaykumar Rajasekharan, Brett Nekolny, Luke Butterfield Beatty
-
Publication number: 20200204616Abstract: Systems and methods are provided for distributing content. One embodiment includes a content management server. The content management server includes a memory that stores a library of assets comprising digital media, and that further stores scores that indicate popularity of the assets in the library. The content management server also includes an interface that receives a Hyper Text Transfer Protocol (HTTP) request that is sourced by a device remote from the content management server, and a controller that identifies a Uniform Resource Locator (URL) within the HTTP request, selects a group of assets for the URL from the library, identifies an asset that has a highest score within the group, and provides the asset in response to the HTTP request. The controller alters scores for assets in the library over time as assets in the library are provided, and selects different groups of assets for the URL over time.Type: ApplicationFiled: March 2, 2020Publication date: June 25, 2020Inventors: Jim Hanifen, Logan Sears, Ajaykumar Rajasekharan, Brett Nekolny, Luke Butterfield Beatty
-
Patent number: 10623483Abstract: Systems and methods are provided for distributing content. One embodiment includes a content management server. The content management server includes a memory that stores a library of assets comprising digital media, and that further stores scores that indicate popularity of the assets in the library. The content management server also includes an interface that receives a Hyper Text Transfer Protocol (HTTP) request that is sourced by a device remote from the content management server, and a controller that identifies a Uniform Resource Locator (URL) within the HTTP request, selects a group of assets for the URL from the library, identifies an asset that has a highest score within the group, and provides the asset in response to the HTTP request. The controller alters scores for assets in the library over time as assets in the library are provided, and selects different groups of assets for the URL over time.Type: GrantFiled: November 19, 2019Date of Patent: April 14, 2020Assignee: Brandfolder, Inc.Inventors: Jim Hanifen, Logan Sears, Ajaykumar Rajasekharan, Brett Nekolny, Luke Butterfield Beatty
-
Publication number: 20200092356Abstract: Systems and methods are provided for distributing content. One embodiment includes a content management server. The content management server includes a memory that stores a library of assets comprising digital media, and that further stores scores that indicate popularity of the assets in the library. The content management server also includes an interface that receives a Hyper Text Transfer Protocol (HTTP) request that is sourced by a device remote from the content management server, and a controller that identifies a Uniform Resource Locator (URL) within the HTTP request, selects a group of assets for the URL from the library, identifies an asset that has a highest score within the group, and provides the asset in response to the HTTP request. The controller alters scores for assets in the library over time as assets in the library are provided, and selects different groups of assets for the URL over time.Type: ApplicationFiled: November 19, 2019Publication date: March 19, 2020Inventors: Jim Hanifen, Logan Sears, Ajaykumar Rajasekharan, Brett Nekolny, Luke Butterfield Beatty
-
Publication number: 20200082431Abstract: Systems and methods are provided for determining the efficacy of digital assets provided to an audience. One embodiment is a system that includes a brand management server. The brand management server includes a memory that stores assets comprising digital media. The brand management server also includes a controller. The controller distributes the assets for consumption by members of an audience at remote devices. The controller also selects one of the assets, determines a look-back period, acquires metrics indicating at least two different types of consumption of the asset by the audience during the look-back period, and calculates an asset score for the asset that indicates a popularity of the asset and is based on the metrics indicating the at least two different types of consumption.Type: ApplicationFiled: September 12, 2018Publication date: March 12, 2020Inventors: Ajaykumar Rajasekharan, Logan Sears, Jim Hanifen, Brett Nekolny, Luke Butterfield Beatty
-
Patent number: 10558517Abstract: Methods, systems, and devices are described for providing proactive cloud orchestration services for a cloud hardware infrastructure. A health management system may monitor component(s) of the cloud hardware infrastructure. The health management system may determine a failure probability metric for the component(s) based on the monitoring of the component and in consideration of historical information associated with the component, or similar components. The health management system may determine an optimization strategy for the component and, when an optimization decision has been reached, initiate a reconfiguration procedure to implement the optimization strategy. The optimization strategy may provide for mitigating or eliminating the consequences of the component failure associated with data loss, downtime, and the like.Type: GrantFiled: July 11, 2017Date of Patent: February 11, 2020Assignee: Seagate Technology LLCInventors: Ajaykumar Rajasekharan, Christian Brunn Madsen, Andrei Khurshudov
-
Publication number: 20200021642Abstract: Systems and methods are provided for distributing content. One embodiment includes a content management server. The content management server includes a memory that stores a library of assets comprising digital media, and that further stores scores that indicate popularity of the assets in the library. The content management server also includes an interface that receives a Hyper Text Transfer Protocol (HTTP) request that is sourced by a device remote from the content management server, and a controller that identifies a Uniform Resource Locator (URL) within the HTTP request, selects a group of assets for the URL from the library, identifies an asset that has a highest score within the group, and provides the asset in response to the HTTP request. The controller alters scores for assets in the library over time as assets in the library are provided, and selects different groups of assets for the URL over time.Type: ApplicationFiled: July 11, 2019Publication date: January 16, 2020Inventors: Jim Hanifen, Logan Sears, Ajaykumar Rajasekharan, Brett Nekolny, Luke Butterfield Beatty
-
Patent number: 10523742Abstract: Systems and methods are provided for distributing content. One embodiment includes a content management server. The content management server includes a memory that stores a library of assets comprising digital media, and that further stores scores that indicate popularity of the assets in the library. The content management server also includes an interface that receives a Hyper Text Transfer Protocol (HTTP) request that is sourced by a device remote from the content management server, and a controller that identifies a Uniform Resource Locator (URL) within the HTTP request, selects a group of assets for the URL from the library, identifies an asset that has a highest score within the group, and provides the asset in response to the HTTP request. The controller alters scores for assets in the library over time as assets in the library are provided, and selects different groups of assets for the URL over time.Type: GrantFiled: July 11, 2019Date of Patent: December 31, 2019Assignee: Brandfolder, Inc.Inventors: Jim Hanifen, Logan Sears, Ajaykumar Rajasekharan, Brett Nekolny, Luke Butterfield Beatty
-
Publication number: 20190044963Abstract: Disclosed in some examples are systems, methods, and machine readable mediums for identifying insider threats by determining file system element activity models that correlate to undesirable behavior and then utilizing the determined model to detect insider threats. Events involving file system elements of a client computing device (e.g., a network endpoint) may be monitored by a file system element monitoring application on the client computing device. The values of these signals are aggregated across all events of the same type that have occurred within a predetermined time window (e.g., an hour) for a particular client computing device. Each time an aggregated signal has a value over the threshold, an anomaly is recorded. Anomaly counts for each signal are then calculated as the aggregate number of anomalies for a particular signal over a second time period, the span of which is determined by the generation of first anomaly to the close of an alert by the network monitor.Type: ApplicationFiled: August 2, 2017Publication date: February 7, 2019Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
-
Publication number: 20190042744Abstract: A method of detecting the onset of a ransomware attack is presented. In an example embodiment, file backup metadata for each of a plurality of computing devices is accessed and analyzed to detect anomalous file backup activity of individual ones of the computing devices. A determination is made as to whether the detected anomalous file backup activity of at least some of the computing devices is correlated in time. File description metadata for each of the computing devices is also accessed and analyzed to identify files in the computing devices that are anomalous to other files in the computing devices. A determination whether a ransomware attack has begun is based on a determination that the detected anomalous file backup activity of at least some of the computing devices is correlated in time, as well as on the identified anomalous files.Type: ApplicationFiled: August 2, 2017Publication date: February 7, 2019Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan