Patents by Inventor Anil Gupta
Anil Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250258909Abstract: DLL hooks are protected by mapping the starting address of the new executable to a sample of the former executable. Attempts to read the starting address are responded to with the sample of the former executable. Attempts to write to the starting address are responded to with confirmation of success without actually writing data. Debuggers are detected upon launch or by evaluating an operating system. A component executing in the kernel denies debugging privileges to prevent inspection and modification of DLL hooks.Type: ApplicationFiled: February 19, 2025Publication date: August 14, 2025Applicant: SentinelOne, Inc.Inventors: Anil Gupta, Harinath Vishwanath Ramchetty
-
SYSTEM AND METHOD FOR SEPARATING OR DISTRIBUTING DATABASE CALLS BETWEEN ACTIVE AND PASSIVE DATABASES
Publication number: 20250231964Abstract: Various methods and processes, apparatuses/systems, and media for separating or distributing database calls between active and passive databases are disclosed. A processor establishes a communication link between a passive database and an active database via a communication network; executes real-time syncing of data between the active database and the passive database by implementing a replication algorithm; receives a request from an application user to generate a report corresponding to the application; implements a batch processor, at an application level, to separate read-only operations from read and write operations associated the application; and separates or distributes database calls, at the application level, between the active database and the passive database in a manner such that the read-only operations are directed to the passive database and the read and write operations are directed to the active database.Type: ApplicationFiled: February 28, 2024Publication date: July 17, 2025Applicant: JPMorgan Chase Bank, N.A.Inventors: Jagdish MISHRA, Garima DOKANIA, Anil GUPTA, Nirav MEHTA, Umesh Payyan VALAPPIL -
System and method for separating or distributing database calls between active and passive databases
Patent number: 12361021Abstract: Various methods and processes, apparatuses/systems, and media for separating or distributing database calls between active and passive databases are disclosed. A processor establishes a communication link between a passive database and an active database via a communication network; executes real-time syncing of data between the active database and the passive database by implementing a replication algorithm; receives a request from an application user to generate a report corresponding to the application; implements a batch processor, at an application level, to separate read-only operations from read and write operations associated the application; and separates or distributes database calls, at the application level, between the active database and the passive database in a manner such that the read-only operations are directed to the passive database and the read and write operations are directed to the active database.Type: GrantFiled: February 28, 2024Date of Patent: July 15, 2025Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Jagdish Mishra, Garima Dokania, Anil Gupta, Nirav Mehta, Umesh Payyan Valappil -
Patent number: 12259967Abstract: DLL hooks are protected by mapping the starting address of the new executable to a sample of the former executable. Attempts to read the starting address are responded to with the sample of the former executable. Attempts to write to the starting address are responded to with confirmation of success without actually writing data. Debuggers are detected upon launch or by evaluating an operating system. A component executing in the kernel denies debugging privileges to prevent inspection and modification of DLL hooks.Type: GrantFiled: December 28, 2023Date of Patent: March 25, 2025Assignee: SentinelOne, Inc.Inventors: Anil Gupta, Harinath Vishwanath Ramchetty
-
Patent number: 12261884Abstract: Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application and the command is a write or delete command, the command is ignored and a simulated acknowledgment is sent. If the command is a read command, deception data is returned instead. In some embodiments, certain data is protected such that commands will be ignored or modified to refer to deception data where the source is not a sanctioned application. The source may be verified to be a sanctioned application by evaluating a certificate, hash, or path of the source. Responses from an active directory server may be intercepted and modified to reference a decoy server when not addressed to a sanctioned application.Type: GrantFiled: February 23, 2023Date of Patent: March 25, 2025Assignee: SentinelOne, Inc.Inventors: Venu Vissamsetty, Anil Gupta, Harinath Vishwanath Ramchetty
-
Publication number: 20240356971Abstract: Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application and the command is a write or delete command, the command is ignored and a simulated acknowledgment is sent. If the command is a read command, deception data is returned instead. In some embodiments, certain data is protected such that commands will be ignored or modified to refer to deception data where the source is not a sanctioned application. The source may be verified to be a sanctioned application by evaluating a certificate, hash, or path of the source. Responses from an active directory server may be intercepted and modified to reference a decoy server when not addressed to a sanctioned application. Requests to view network resources may be responded to with references to a decoy server.Type: ApplicationFiled: April 16, 2024Publication date: October 24, 2024Applicant: Sentinelone, Inc.Inventors: Venu Vissamsetty, Anil Gupta, Harinath Vishwanath Ramchetty
-
Publication number: 20240176874Abstract: DLL hooks are protected by mapping the starting address of the new executable to a sample of the former executable. Attempts to read the starting address are responded to with the sample of the former executable. Attempts to write to the starting address are responded to with confirmation of success without actually writing data. Debuggers are detected upon launch or by evaluating an operating system. A component executing in the kernel denies debugging privileges to prevent inspection and modification of DLL hooks.Type: ApplicationFiled: December 28, 2023Publication date: May 30, 2024Inventors: Anil Gupta, Harinath Vishwanath Ramchetty
-
Patent number: 11997139Abstract: Endpoints in a network execute a sensor module that intercepts commands to obtain information regarding a remote network resource. The sensor module compares a source of commands to a sanctioned list of applications. If the source is not sanctioned, then a simulated response can be provided to the source that references a decoy server.Type: GrantFiled: March 13, 2023Date of Patent: May 28, 2024Assignee: SENTINELONE, INC.Inventors: Venu Vissamsetty, Anil Gupta, Harinath Vishwanath Ramchetty
-
Patent number: 11899782Abstract: DLL hooks are protected by mapping the starting address of the new executable to a sample of the former executable. Attempts to read the starting address are responded to with the sample of the former executable. Attempts to write to the starting address are responded to with confirmation of success without actually writing data. Debuggers are detected upon launch or by evaluating an operating system. A component executing in the kernel denies debugging privileges to prevent inspection and modification of DLL hooks.Type: GrantFiled: July 13, 2021Date of Patent: February 13, 2024Assignee: SentinelOne, Inc.Inventors: Anil Gupta, Harinath Vishwanath Ramchetty
-
Publication number: 20240015555Abstract: A method and system to create personalized investor information packages, based on investor information, to be delivered to the investor to satisfy both compliance regulations and investor preferences. The method and system may deliver information in a paper or electronic format.Type: ApplicationFiled: June 6, 2023Publication date: January 11, 2024Inventors: Jeffrey B. Levering, Alex Magary, Craig LeClair, Larry Kunz, Anil Gupta, Brigitte Tuller, Garett Wiley, Patricia Rosch
-
Publication number: 20240007503Abstract: Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application and the command is a write or delete command, the command is ignored and a simulated acknowledgment is sent. If the command is a read command, deception data is returned instead. In some embodiments, certain data is protected such that commands will be ignored or modified to refer to deception data where the source is not a sanctioned application. The source may be verified to be a sanctioned application by evaluating a certificate, hash, or path of the source. Responses from an active directory server may be intercepted and modified to reference a decoy server when not addressed to a sanctioned application. Requests to view network resources may be responded to with references to a decoy server.Type: ApplicationFiled: June 30, 2023Publication date: January 4, 2024Inventors: Venu Vissamsetty, ANIL GUPTA, HARINATH VISHWANATH RAMCHETTY
-
Publication number: 20230388344Abstract: Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application and the command is a write or delete command, the command is ignored and a simulated acknowledgment is sent. If the command is a read command, deception data is returned instead. In some embodiments, certain data is protected such that commands will be ignored or modified to refer to deception data where the source is not a sanctioned application. The source may be verified to be a sanctioned application by evaluating a certificate, hash, or path of the source. Responses from an active directory server may be intercepted and modified to reference a decoy server when not addressed to a sanctioned application.Type: ApplicationFiled: February 23, 2023Publication date: November 30, 2023Inventors: Venu Vissamsetty, Anil Gupta, Harinath Vishwanath Ramchetty
-
Publication number: 20230319087Abstract: In some embodiments, a computer-implemented method for preventing credential passing attacks comprising: receiving an input; determining whether the input is a credential access command, wherein the determination comprises searching for occurrences of references to executables related to adding, reading, copying, or performing actions with respect to a credential, if the input is determined to be a credential access command, performing anomaly detection, wherein performing the anomaly detection comprises evaluating whether a user is a valid domain user, whether an elapsed time of the credential is greater than a maximum lifetime of the credential, and whether a privilege attribute certificate of the credential is valid, determining that an anomaly exists if the command was generated by an invalid domain user; an elapsed time of a credential is greater than a maximum lifetime, or the privilege attribute certificate of the credential is invalid, and performing mitigation of the anomaly.Type: ApplicationFiled: March 13, 2023Publication date: October 5, 2023Inventors: Harinath Vishwanath Ramchetty, Anil Gupta
-
Publication number: 20230283635Abstract: Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application and the command is a write or delete command, the command is ignored and a simulated acknowledgment is sent. If the command is a read command, deception data is returned instead. In some embodiments, certain data is protected such that commands will be ignored or modified to refer to deception data where the source is not a sanctioned application. The source may be verified to be a sanctioned application by evaluating a certificate, hash, or path of the source. Responses from an active directory server may be intercepted and modified to reference a decoy server when not addressed to a sanctioned application. Requests to view network resources may be responded to with references to a decoy server.Type: ApplicationFiled: March 13, 2023Publication date: September 7, 2023Inventors: Venu Vissamsetty, Anil Gupta, Harinath Vishwanath Ramchetty
-
Patent number: 11701364Abstract: The invention provides compounds having STimulator of INterferon Genes (STING) agonistic bioactivity that can be used in the treatment of tumors in patients afflicted therewith. The compounds are of formula (I): as defined herein. Compounds for practice of a method of the invention can be delivered via oral delivery for systemic exposure, as well as delivered intratumorally. Antitumor therapy using a compound of formula (I) can further comprise administration of an effective dose of an immune-checkpoint targeting drug.Type: GrantFiled: February 21, 2019Date of Patent: July 18, 2023Assignee: The Scripps Research InstituteInventors: Luke L. Lairson, Emily Chin, Arnab K. Chatterjee, Manoj Kumar, Ana Maria Gamo Albero, Hank Michael James Petrassi, Peter G. Schultz, Chenguang Yu, Junko Tamiya, William Vernier, Anil Gupta, Ramkumar Modukuri
-
Patent number: 11695800Abstract: Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application the command is ignored and a simulated acknowledgment is sent or, deception data is returned instead. In some embodiments, certain data is protected such that commands will be ignored or modified to refer to deception data where the source is not a sanctioned application. The source may be verified to be a sanctioned application by evaluating a certificate, hash, or path of the source. Responses from an active directory server may be intercepted and modified to reference a decoy server when not addressed to a sanctioned application. Requests to view network resources may be responded to with references to a decoy server.Type: GrantFiled: April 15, 2020Date of Patent: July 4, 2023Assignee: SENTINELONE, INC.Inventors: Venu Vissamsetty, Anil Gupta, Harinath Vishwanath Ramchetty
-
Patent number: 11616812Abstract: Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application and the command is a write or delete command, the command is ignored and a simulated acknowledgment is sent. If the command is a read command, deception data is returned instead. In some embodiments, certain data is protected such that commands will be ignored or modified to refer to deception data where the source is not a sanctioned application. The source may be verified to be a sanctioned application by evaluating a certificate, hash, or path of the source. Responses from an active directory server may be intercepted and modified to reference a decoy server when not addressed to a sanctioned application.Type: GrantFiled: August 16, 2019Date of Patent: March 28, 2023Assignee: Attivo Networks Inc.Inventors: Venu Vissamsetty, Anil Gupta, Harinath Vishwanath Ramchetty
-
Publication number: 20220288065Abstract: The invention provides compounds having STimulator of INterferon Genes (STING) agonistic bioactivity that can be used in the treatment of tumors inpatients afflicted therewith. The compounds are of formula (IA), formula (I), and formula (II): wherein the various substituents are as defined herein. Ring A is a 5- or 6-membered heteroaryl comprising 1, 2, or 3 N atoms, unsubstituted or substituted with 1, 2, or 3 groups as defined herein. Compounds for practice of a method of the invention can be delivered via oral delivery for systemic exposure, as well as delivered intratumorally. Antitumor therapy using a compound of formula (I) can further comprise administration of an effective dose of an immunecheckpoint targeting drug.Type: ApplicationFiled: August 21, 2020Publication date: September 15, 2022Inventors: H. Michael PETRASSI, Chenguang YU, Jie WANG, Arnab K. CHATTERJEE, Ana Maria Gamo ALBERO, Anil GUPTA, Junko TAMIYA, Peter G. SCHULTZ, Kristen JOHNSON, Alan CHU, Emily N. CHIN, Luke L. LAIRSON
-
Patent number: 11356932Abstract: Described herein are techniques for performing a channel scan based on a mobility state of a device. The mobility state of a device relative to an access point may be determined using time-of-flight information. A channel scan may be performed based on the mobility state determination.Type: GrantFiled: June 30, 2014Date of Patent: June 7, 2022Assignee: Hewlett Packard Enterprise Development LPInventors: Souvik Sen, Anil Gupta, Manfred R. Arndt, Jung Gun Lee
-
Publication number: 20220084116Abstract: A method and system to create personalized investor information packages, based on investor information, to be delivered to the investor to satisfy both compliance regulations and investor preferences. The method and system may deliver information in a paper or electronic format.Type: ApplicationFiled: November 23, 2021Publication date: March 17, 2022Inventors: Jeffrey B. Levering, Alex Magary, Craig LeClair, Larry Kunz, Anil Gupta, Brigitte Tuller, Garett Wiley, Patricia Rosch