Patents by Inventor Ajoy Kumar

Ajoy Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250077331
    Abstract: A plurality of textual log records characterizing operations occurring within a technology landscape may be received and converted into numerical log record vectors. For a current log record vector and a preceding set of log record vectors of the numerical log record vectors, a similarity series may be computed that includes a similarity measure for each of a set of log record vector pairs, with each log record vector pair including the current log record vector and one of the preceding set of log record vectors. A similarity distribution of the similarity series may be generated, and an anomaly in the operations occurring within the technology landscape may be detected, based on the similarity distribution.
    Type: Application
    Filed: August 31, 2023
    Publication date: March 6, 2025
    Inventors: Vikas Prasad, Ajoy Kumar
  • Publication number: 20240330143
    Abstract: A plurality of log records characterizing operations occurring within a technology landscape may be received. The plurality of log records may be clustered into at least a first cluster of log records and a second cluster of log records, using at least one similarity algorithm. A first dissimilar subset of log records within the first cluster of log records, and a second dissimilar subset of log records within the second cluster of log record may be identified, using the at least one similarity algorithm. At least one machine learning model may be trained to process new log records characterizing the operations occurring within the technology landscape, using the first dissimilar subset and the second dissimilar subset.
    Type: Application
    Filed: March 31, 2023
    Publication date: October 3, 2024
    Inventors: Vikas Prasad, Rakesh Tiwari, Sameer Mardhekar, Ajoy Kumar
  • Publication number: 20240330755
    Abstract: An incident ticket having a worklog field for a resolution field and a worklog providing a history of actions taken during attempts to resolve an incident may be received. The incident ticket may be processed using a domain-specific machine learning model trained using training data that includes a plurality of resolved incident tickets, to thereby generate at least one resolution statement. Source data used by the domain-specific machine learning model in providing the at least one resolution statement may be determined, the source data including one of the worklog and the training data. A hallucination score may be assigned to the at least one resolution statement, based on the source data, to identify hallucinated content within the at least one resolution statement. The at least one resolution statement may be modified to remove the hallucinated content and thereby obtain a resolution for inclusion in the resolution field.
    Type: Application
    Filed: March 31, 2023
    Publication date: October 3, 2024
    Inventors: Ajoy Kumar, Himanshu Singhvi, Priya Saurabh Talwalkar
  • Publication number: 20240330479
    Abstract: Systems and techniques for implementing a change to a plurality of devices in a computing infrastructure include generating a risk prediction model, where the risk prediction model is trained using a combination of supervised learning and unsupervised learning and identifying, using the risk prediction model, a first set of devices from the plurality of devices having a low risk of failure due to implementing the change and a second set of devices from the plurality of devices having a high risk of failure due to implementing the change. A schedule is automatically generated for implementing the change to the first set of devices. The change is implemented on a portion of the first set of devices according to the schedule. The risk prediction model is updated using data obtained from implementing the change on the portion of the first set of devices.
    Type: Application
    Filed: March 31, 2023
    Publication date: October 3, 2024
    Inventors: Vikram Kamate, Ajoy Kumar
  • Patent number: 11855860
    Abstract: A plurality of resolved incident tickets may each include a worklog providing a history of actions taken during attempts to resolve a corresponding resolved incident and a resolution having at least one resolution statement. An iterative processing of the plurality of resolved incident tickets may include processing each resolution statement of the resolution with at least one domain-specific statement classifier specific to the incident domain to either discard or retain a classified resolution statement; processing each retained classified resolution statement in conjunction with the worklog to determine whether to discard or retain the resolved incident; providing an updated resolution for the resolved incident when the resolved incident is retained, and adding the resolved incident with the updated resolution to the processed incident tickets. Then, at least one machine learning model may be trained to process a new incident ticket, using the processed incident tickets.
    Type: Grant
    Filed: March 31, 2023
    Date of Patent: December 26, 2023
    Assignee: BMC Software, Inc.
    Inventors: Ajoy Kumar, Himanshu Singhvi, Priya Saurabh Talwalkar
  • Publication number: 20230401141
    Abstract: Described systems and techniques enable prediction of a state of an application at a future time, with high levels of accuracy and specificity. Accordingly, operators may be provided with sufficient warning to avert poor user experiences. Unsupervised machine learning techniques may be used to characterize current states of applications and underlying components in a standardized manner. The resulting data effectively provides labelled training data that may then be used by supervised machine learning algorithms to build state prediction models. Resulting state prediction models may then be deployed and used to predict an application state of an application at a specified future time.
    Type: Application
    Filed: June 9, 2023
    Publication date: December 14, 2023
    Inventors: Ajoy Kumar, Mantinder Jit Singh, Smijith Pichappan
  • Patent number: 11677773
    Abstract: A method for securing a service implemented on a computer network includes identifying network assets in the computer network used by the service. The method further includes identifying vulnerabilities in one or more of the network assets, determining an asset risk score for each of the network assets, and determining a service risk score for the service. The method involves implementing one or more vulnerability remediation actions on the computer network to reduce the service risk score and secure the service.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: June 13, 2023
    Assignee: BMC Software, Inc.
    Inventors: G S Narayan Iyer, Ajoy Kumar, Amit Gupta
  • Patent number: 11675687
    Abstract: Described systems and techniques enable prediction of a state of an application at a future time, with high levels of accuracy and specificity. Accordingly, operators may be provided with sufficient warning to avert poor user experiences. Unsupervised machine learning techniques may be used to characterize current states of applications and underlying components in a standardized manner. The resulting data effectively provides labelled training data that may then be used by supervised machine learning algorithms to build state prediction models. Resulting state prediction models may then be deployed and used to predict an application state of an application at a specified future time.
    Type: Grant
    Filed: September 1, 2020
    Date of Patent: June 13, 2023
    Assignee: BMC Software, Inc.
    Inventors: Ajoy Kumar, Mantinder Jit Singh, Smijith Pichappan
  • Publication number: 20230132465
    Abstract: A system, method, and computer program product for intelligent-skills-matching includes receiving a plurality of tickets, where each ticket in the plurality of tickets includes a plurality of fields and at least one agent who resolved the ticket is identified. A clustering algorithm is used on one or more of the plurality of fields to determine skills from the plurality of tickets. A taxonomy of the skills is generated using a taxonomy-construction algorithm. Using the taxonomy of the skills, a skills matrix or a skills knowledge graph is created with agents assigned to the skills.
    Type: Application
    Filed: October 31, 2021
    Publication date: May 4, 2023
    Inventors: Ajoy Kumar, Priya Saurabh Talwalkar, Mantinder Jit Singh
  • Patent number: 11637861
    Abstract: A method for securing a networked computer system executing an application includes identifying a vulnerable computer resource in the networked computer system, determining all computer resources in the networked computer system that are accessible from, or are accessed by, the vulnerable computer resource, and prioritizing implementation of a remediation action to secure the vulnerable computer resource if a vulnerability path extends from the vulnerable computer resource to a critical computer resource that contains sensitive information. The remediation action to secure the vulnerable computer resource is a safe remediation action that does not impact availability of the application executing on the networked computer system.
    Type: Grant
    Filed: January 23, 2020
    Date of Patent: April 25, 2023
    Assignee: BMC Software, Inc.
    Inventors: Siddharth Sukumar Burle, Ajoy Kumar, Manish Jain
  • Patent number: 11625280
    Abstract: A cloud-native proxy gateway is reachable from a central server and from an isolated cloud VM. A method allows legacy (non-cloud native) solutions to establish a secure connection to the isolated cloud VM, even when incoming port flows are not enabled. The method involves transforming a TCP/IP network connection request into a cloud API call, ignoring IP addresses, and instead using a unique cloud resource identifier as the primary network routing methodology. In response to a communication connection request by the central server, the isolated VM establishes a reverse tunnel to the cloud-native proxy gateway. Communication flow initiated by the central server proceeds through the reverse tunnel to the isolated VM, avoiding an issue of duplicate IP addresses in the cloud.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: April 11, 2023
    Assignee: BMC Software, Inc.
    Inventors: Eric Michael Anderson, Brendan Farrell, Saifuddin Fazlehusen Rangwala, Ajoy Kumar
  • Publication number: 20230100716
    Abstract: Information technology service management (ITSM) incident reports are converted from textual data to multiple vectors using an encoder and parameters are selected, where the parameters include a base cluster number and a threshold value. A base group of clusters is generated using an unsupervised machine learning clustering algorithm with the vectors and the parameters as input. A cluster quality score is computed for each of the base group of clusters. Each cluster from the base group of clusters with the cluster quality score above the threshold value is recursively split into new clusters until the cluster quality score for each cluster in the new clusters is below the threshold value. A final group of clusters is output, where each cluster from the final group of clusters represents ITSM incident reports related to a same problem.
    Type: Application
    Filed: September 30, 2021
    Publication date: March 30, 2023
    Inventors: Mantinder Jit Singh, Somesh Kumar Srivastava, Ajoy Kumar
  • Patent number: 11561766
    Abstract: A data management system includes a data reconciliation engine that identifies data sources that contain data records referencing a resource and determines whether each of the identified data sources is a creative data source or an additive data source. When all of the identified data sources are additive data sources, the reconciliation engine terminates a data reconciliation process. When all of the identified data sources are not additive data sources, the reconciliation engine finds a first creative data source from among the identified data sources, and initiates the data reconciliation process by merging data from the identified data sources including the first creative data source, one data source-by-one data source, into a reconciled data record.
    Type: Grant
    Filed: February 28, 2019
    Date of Patent: January 24, 2023
    Assignee: BMC Software, Inc.
    Inventors: Douglas Mueller, Duncan Paul Grisby, Ajoy Kumar
  • Patent number: 11514076
    Abstract: A first datastore discovers a configuration item (CI), without a persistent unique identifier in a distributed datastores environment. When the first datastore has authoritative naming rights, it determines an authoritative identification for the CI. When the first datastore has advisory naming rights, it suggests a name for the CI to a second datastore having authoritative naming rights. The second datastore determines that a pre-existing identification for the CI in the second datastore is the authoritative identification for the CI. If there is no pre-existing identification for the CI in the second data store, the second data store accepts the suggested name as the authoritative identification for the CI. When the first datastore has no naming rights for the CI, it sends the CI to a third data store having authoritative naming rights for the CI to get an authoritative identification for the CI.
    Type: Grant
    Filed: June 26, 2020
    Date of Patent: November 29, 2022
    Assignee: BMC Software, Inc.
    Inventors: Govindarajan Rangarajan, Ajoy Kumar, Narayan Kumar, Douglas Mueller, Matthew D. Connors, Darius Wallace
  • Patent number: 11386170
    Abstract: A content engine may utilize a configuration management database (CMDB) to manage a configuration of a technology landscape. A curation manager 102 may utilize a plurality of article sources to provide, in collaboration with the content engine, a plurality of enriched articles that are specific to the technology landscape. The enriched articles enable an IT administrator using the content engine to execute IT administration duties in a fast, efficient, reliable, and timely manner.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: July 12, 2022
    Assignee: BMC Software, Inc.
    Inventors: Eric Michael Anderson, G S Narayan Iyer, Ajoy Kumar
  • Publication number: 20220066906
    Abstract: Described systems and techniques enable prediction of a state of an application at a future time, with high levels of accuracy and specificity. Accordingly, operators may be provided with sufficient warning to avert poor user experiences. Unsupervised machine learning techniques may be used to characterize current states of applications and underlying components in a standardized manner. The resulting data effectively provides labelled training data that may then be used by supervised machine learning algorithms to build state prediction models. Resulting state prediction models may then be deployed and used to predict an application state of an application at a specified future time.
    Type: Application
    Filed: September 1, 2020
    Publication date: March 3, 2022
    Inventors: Ajoy Kumar, Mantinder Jit Singh, Smijith Pichappan
  • Publication number: 20210303645
    Abstract: A content engine may utilize a configuration management database (CMDB) to manage a configuration of a technology landscape. A curation manager 102 may utilize a plurality of article sources to provide, in collaboration with the content engine, a plurality of enriched articles that are specific to the technology landscape. The enriched articles enable an IT administrator using the content engine to execute IT administration duties in a fast, efficient, reliable, and timely manner.
    Type: Application
    Filed: March 31, 2020
    Publication date: September 30, 2021
    Inventors: Eric Michael Anderson, G S Narayan Iyer, Ajoy Kumar
  • Publication number: 20210303366
    Abstract: A cloud-native proxy gateway is reachable from a central server and from an isolated cloud VM. A method allows legacy (non-cloud native) solutions to establish a secure connection to the isolated cloud VM, even when incoming port flows are not enabled. The method involves transforming a TCP/IP network connection request into a cloud API call, ignoring IP addresses, and instead using a unique cloud resource identifier as the primary network routing methodology. In response to a communication connection request by the central server, the isolated VM establishes a reverse tunnel to the cloud-native proxy gateway. Communication flow initiated by the central server proceeds through the reverse tunnel to the isolated VM, avoiding an issue of duplicate IP addresses in the cloud.
    Type: Application
    Filed: March 31, 2020
    Publication date: September 30, 2021
    Inventors: Eric Michael Anderson, Brendan Farrell, Saifuddin Fazlehusen Rangwala, Ajoy Kumar
  • Patent number: 11131863
    Abstract: A method of forming an optical device in a body (32), comprises performing a plurality of laser scans (34,36) to form the optical device, each scan comprising relative movement of a laser beam and the body thereby to scan the laser beam along a respective path (34a, 34b 34f; 36a, 36b 36f) through the body to alter the refractive index of material of that path, wherein the paths are arranged to provide in combination a route for propagation of light through the optical device in operation that is larger in a direction substantially perpendicular to the route for propagation of light than any one of the paths individually.
    Type: Grant
    Filed: February 1, 2019
    Date of Patent: September 28, 2021
    Assignee: Optoscribe Limited
    Inventors: Nicholas D. Psaila, Ajoy Kumar Kar, Henry Thomas Gibson Bookey, Robert R. Thomson, Graeme Brown
  • Publication number: 20210234889
    Abstract: A method for securing a networked computer system executing an application includes identifying a vulnerable computer resource in the networked computer system, determining all computer resources in the networked computer system that are accessible from, or are accessed by, the vulnerable computer resource, and prioritizing implementation of a remediation action to secure the vulnerable computer resource if a vulnerability path extends from the vulnerable computer resource to a critical computer resource that contains sensitive information. The remediation action to secure the vulnerable computer resource is a safe remediation action that does not impact availability of the application executing on the networked computer system.
    Type: Application
    Filed: January 23, 2020
    Publication date: July 29, 2021
    Inventors: Siddharth Sukumar Burle, Ajoy Kumar, Manish Jain