Patents by Inventor Anil Gupta

Anil Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10666686
    Abstract: According to one embodiment, a virtualized malware detection system is integrated with a virtual machine host including a plurality of virtual machines and a security virtual machine. Logic within the virtual machines are configured to perform a dynamic analysis of an object and monitor for the occurrence of a triggering event. Upon detection of a triggering event within a virtual machine, the logic within the virtual machine provides the security virtual machine with information associated with the triggering event for further analysis. Based on the further analysis, the object may then be classified as “non-malicious,” or “malicious.
    Type: Grant
    Filed: December 3, 2018
    Date of Patent: May 26, 2020
    Assignee: FireEye, Inc.
    Inventors: Japneet Singh, Harinath Ramchetty, Anil Gupta
  • Patent number: 10609572
    Abstract: Computer-implemented methods and systems are disclosed for optimizing the performance of wireless networks by automatically capturing wireless traffic and other radio frequency (RF) signal data in the network and analyzing the data to identify network anomalies and to determine one or more solutions, without human intervention.
    Type: Grant
    Filed: May 10, 2017
    Date of Patent: March 31, 2020
    Assignee: Wyebot, Inc.
    Inventors: Anil Gupta, Roger D. Sands, Hien Nguyen, Louis E. Pereira, John S. Balian, David V. Baker
  • Patent number: 10575192
    Abstract: Computer-implemented methods and systems are disclosed for optimizing the performance of wireless networks by automatically capturing wireless traffic and other radio frequency (RF) signal data in the network and analyzing the data to identify network anomalies and to determine one or more solutions, without human intervention.
    Type: Grant
    Filed: May 10, 2017
    Date of Patent: February 25, 2020
    Assignee: Wyebot, Inc.
    Inventors: Anil Gupta, Hien Nguyen, Roger D. Sands, Louis E. Pereira, John S. Balian, David V. Baker
  • Patent number: 10509905
    Abstract: Endpoints in a network environment include remote file systems mounted thereto that reference a file system generator that responds to file system commands with deception data. Requests to list the contents of a directory are intercepted, such as while a response is passed up through an IO stack. The response is modified to include references to deception files and directories that do not actually exist on the system hosting the file system generator. The number of the deception files and directories may be randomly selected. Requests to read deception files are answered by generating a file having a file type corresponding to the deception file. Deception files may be written back to the system by an attacker and then deleted.
    Type: Grant
    Filed: September 5, 2017
    Date of Patent: December 17, 2019
    Assignee: ATTIVO NETWORKS INC.
    Inventors: Anil Gupta, Harinath Vishwanath Ramchetty, Venu Vissamsetty
  • Publication number: 20190379697
    Abstract: Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application and the command is a write or delete command, the command is ignored and a simulated acknowledgment is sent. If the command is a read command, deception data is returned instead. In some embodiments, certain data is protected such that commands will be ignored or modified to refer to deception data where the source is not a sanctioned application. The source may be verified to be a sanctioned application by evaluating a certificate, hash, or path of the source. Responses from an active directory server may be intercepted and modified to reference a decoy server when not addressed to a sanctioned application.
    Type: Application
    Filed: August 16, 2019
    Publication date: December 12, 2019
    Inventors: Venu Vissamsetty, Anil Gupta, Harinath Vishwanath Ramchetty
  • Patent number: 10503904
    Abstract: A computerized method for detecting and mitigating a ransomware attack is described. The method features (i) a kernel mode agent that intercepts an initiation of a process, intercepts one or more system calls made by the process when the process is determined to be suspicious and copies at least a portion of a protected file to a secure storage location when a request to open a protected file by the process is intercepted when the process is determined to be suspicious, and (ii) a user mode agent that determines whether the process is a suspicious process, monitors processing of the suspicious process and determines whether the suspicious process is associated with a ransomware attack. Additionally, in order to mitigate effects of a ransomware attack, the kernel mode agent may restore the protected file with a copy stored in the secure storage location when a ransomware attack is detected.
    Type: Grant
    Filed: July 24, 2017
    Date of Patent: December 10, 2019
    Assignee: FireEye, Inc.
    Inventors: Japneet Singh, Anil Gupta
  • Patent number: 10492069
    Abstract: Described herein are techniques for selecting a subset of access points. In an example, a wireless access point stores a plurality of unique keys, each unique key being associated with a respective device. The access point advertises a first service set identifier, the first service set identifier requiring authentication of a device requesting connection at a remotely located authentication server. The access point monitors a connection to the remotely located authentication server, and, in response to the connection going down, advertising a second service set identifier, the second service set identifier requiring authentication of a device requesting connection using the unique key associated with the device requesting connection.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: November 26, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Anil Gupta, Mili Hoxha, Souvik Sen
  • Patent number: 10464933
    Abstract: The present invention provides crystalline form of (R)-propylene glycol solvate of dasatinib and crystalline form of (S)-propylene glycol solvate of dasatinib.
    Type: Grant
    Filed: February 3, 2017
    Date of Patent: November 5, 2019
    Assignee: DR. REDDY'S LABORATORIES LIMITED
    Inventors: Satyanarayana Thirunahari, Anish Anil Gupta, Srividya Ramakrishnan, Sonawane Swapnil, Rakeshwar Bandichhor, Srinivasula Reddy Lakkireddy
  • Publication number: 20190331288
    Abstract: An apparatus that at least stores objects of varying sizes, said apparatus includes adjustable trays configured to support the objects at bottom surfaces thereof and stationary or mobile panels for mounting the trays in a generally vertical plane. The panels can be provided as pegboard types or as slatwall types. The adjustable trays include a pair of brackets connected with a guide. A mounting portion of each bracket is adapted to mate with the corresponding panel type.
    Type: Application
    Filed: April 25, 2018
    Publication date: October 31, 2019
    Inventor: Anil Gupta
  • Publication number: 20190251636
    Abstract: A method and system to create personalized investor information packages, based on investor information, to be delivered to the investor to satisfy both compliance regulations and investor preferences. The method and system may deliver information in a paper or electronic format.
    Type: Application
    Filed: April 29, 2019
    Publication date: August 15, 2019
    Inventors: Jeffrey B. Levering, Alex Magary, Craig LeClair, Larry Kunz, Anil Gupta, Brigitte Tuller, Garett Wiley, Patricia Rosch
  • Patent number: 10271250
    Abstract: Described herein are techniques for selecting a subset of access points. In an example, time-of-flight information and signal strength information associated with a device may be received from multiple access points. A subset of the access points may be selected based on the time-of-flight information, signal strength information, and load information. The subset of access points may be instructed to respond to a probe request from the device.
    Type: Grant
    Filed: August 18, 2014
    Date of Patent: April 23, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Souvik Sen, Anil Gupta, Manfred R. Arndt
  • Publication number: 20190073475
    Abstract: Endpoints in a network environment include remote file systems mounted thereto that reference a file system generator that responds to file system commands with deception data. Requests to list the contents of a directory are intercepted, such as while a response is passed up through an IO stack. The response is modified to include references to deception files and directories that do not actually exist on the system hosting the file system generator. The number of the deception files and directories may be randomly selected. Requests to read deception files are answered by generating a file having a file type corresponding to the deception file. Deception files may be written back to the system by an attacker and then deleted.
    Type: Application
    Filed: September 5, 2017
    Publication date: March 7, 2019
    Inventors: Anil Gupta, Harinath Vishwanath Ramchetty, Venu Vissamsetty
  • Publication number: 20190040054
    Abstract: The present invention provides crystalline form of (R)-propylene glycol solvate of dasatinib and crystalline form of (S)-propylene glycol solvate of dasatinib.
    Type: Application
    Filed: February 3, 2017
    Publication date: February 7, 2019
    Inventors: Satyanarayana THIRUNAHARI, Anish ANIL GUPTA, Srividya RAMAKRISHNAN, Sonawane SWAPNIL, Rakeshwar BANDICHHOR, Srinivasula Reddy LAKKIREDDY
  • Patent number: 10148693
    Abstract: According to one embodiment, a virtualized malware detection system is integrated with a virtual machine host including a plurality of virtual machines and a security virtual machine. Logic within the virtual machines are configured to perform a dynamic analysis of an object and monitor for the occurrence of a triggering event. Upon detection of a triggering event within a virtual machine, the logic within the virtual machine provides the security virtual machine with information associated with the triggering event for further analysis. Based on the further analysis, the object may then be classified as “non-malicious,” or “malicious.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: December 4, 2018
    Assignee: FireEye, Inc.
    Inventors: Japneet Singh, Harinath Ramchetty, Anil Gupta
  • Publication number: 20180330445
    Abstract: A method and system to create personalized investor information packages, based on investor information, to be delivered to the investor to satisfy both compliance regulations and investor preferences. The method and system may deliver information in a paper or electronic format.
    Type: Application
    Filed: July 26, 2018
    Publication date: November 15, 2018
    Inventors: Jeffrey B. Levering, Alex Magary, Craig LeClair, Larry Kunz, Anil Gupta, Brigitte Tuller, Garett Wiley, Patricia Rosch
  • Patent number: 10027689
    Abstract: According to one embodiment, a malware detection and visualization system comprises one or more processors; and a storage module communicatively coupled to the one or more processors, the storage module comprises logic, upon execution by the one or more processors, that accesses a first set of information that comprises (i) information directed to a plurality of observed events and (ii) information directed to one or more relationships that identify an association between different observed events of the plurality of observed events; and generates a reference model based on the first set of information, the reference model comprises at least a first event of the plurality of observed events, a second event of the plurality of observed events, and a first relationship that identifies that the second event is based on the first event, wherein at least one of (i) the plurality of observed events or (ii) the one or more relationships constitutes an anomalous behavior is provided.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: July 17, 2018
    Assignee: FireEye, Inc.
    Inventors: Hirendra Rathor, Kaushal Dalal, Anil Gupta
  • Publication number: 20170332256
    Abstract: Computer-implemented methods and systems are disclosed for optimizing the performance of wireless networks by automatically capturing wireless traffic and other radio frequency (RF) signal data in the network and analyzing the data to identify network anomalies and to determine one or more solutions, without human intervention.
    Type: Application
    Filed: May 10, 2017
    Publication date: November 16, 2017
    Applicant: Wyebot, Inc.
    Inventors: Anil Gupta, Roger D. Sands, Hien Nguyen, Louis E. Pereira, John S. Balian, David V. Baker
  • Publication number: 20170332255
    Abstract: Computer-implemented methods and systems are disclosed for optimizing the performance of wireless networks by automatically capturing wireless traffic and other radio frequency (RF) signal data in the network and analyzing the data to identify network anomalies and to determine one or more solutions, without human intervention.
    Type: Application
    Filed: May 10, 2017
    Publication date: November 16, 2017
    Applicant: Wyebot, Inc.
    Inventors: Anil Gupta, Hien Nguyen, Roger D. Sands, Louis E. Pereira, John S. Balian, David V. Baker
  • Publication number: 20170223536
    Abstract: Described herein are techniques for selecting a subset of access points, In an example, a wireless access point stores a plurality of unique keys, each unique key being associated with a respective device. The access point advertises a first service set identifier, the first service set identifier requiring authentication of a device requesting connection at a remotely located authentication server. The access point monitors a connection to the remotely located authentication server, and, in response to the connection going down, advertising a second service set identifier, the second service set identifier requiring authentication of a device requesting connection using the unique key associated with the device requesting connection.
    Type: Application
    Filed: September 30, 2014
    Publication date: August 3, 2017
    Applicant: Hewlett Packard Enterprise Development LP
    Inventors: Anil Gupta, Mili Hoxha, Souvik Sen
  • Patent number: D811200
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: February 27, 2018
    Inventor: Anil Gupta