Patents by Inventor Ankit Kumar

Ankit Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11113393
    Abstract: A security client can provide security features in write filter environments. To prevent improper modifications to a protected volume, the security client can be employed to differentiate between direct I/O requests and reparsed I/O requests that are directed to a shadow volume and to block any direct I/O requests. Alternatively or additionally, the security client can be configured to determine whether an I/O request that is directed to the shadow volume targets an artifact in the write filter's exclusion list, and if not, block the I/O request. Alternatively or additionally, the security client can be configured to monitor registry operations to determine whether a modifying registry operation targets the write filter's persistent shadow registry hive, and if so, allow the modifying registry operation only if it targets a registry key in the write filter's exclusion list.
    Type: Grant
    Filed: November 4, 2019
    Date of Patent: September 7, 2021
    Assignee: Dell Products L.P.
    Inventors: Gokul Thiruchengode Vajravel, Ankit Kumar, Abhishek Mathur
  • Publication number: 20210240816
    Abstract: A security client can efficiently authenticate an application during I/O request handling by maintaining a white list that identifies processes that have been created for authenticated applications. The security client can register to be notified when a process is being created. When such a notification is received, the security client can authenticate the application for which the process is being created and then add an entry to the white list that includes the process identifier of the process being created. Then, when the process subsequently generates I/O requests, the security client can use the white list to quickly determine that the process pertains to an authenticated application and allow the I/O requests to modify protected artifacts.
    Type: Application
    Filed: February 3, 2020
    Publication date: August 5, 2021
    Inventors: Ankit Kumar, Gokul Thiruchengode Vajravel, Abhishek Mathur
  • Publication number: 20210179229
    Abstract: This disclosed embodiments of this invention relate to a semi-submersible vessel. The semi-submersible vessel includes a deck, at least four columns supporting the deck, a first pontoon, a second pontoon, a first brace and a second brace. Each column comprises an outer skin, an inner skin, and a number of reinforcing plates spaced apart from each other and connecting the inner skin to the outer skin, forming a double skin arrangement. The first pontoon is connectable to a first pair of columns and the second pontoon is connectable to a second pair of columns. The first brace is connectable to the first of each of the two pairs of columns and the second brace connects the second of each of the two pairs of columns.
    Type: Application
    Filed: March 3, 2016
    Publication date: June 17, 2021
    Applicant: Keppel Offshore & Marine Technology Centre Pte Ltd.
    Inventors: Aziz Amirali Merchant, Anis Altaf Hussain, Ankit Kumar Choudhary, Wenping Wang, Zhuo Chen
  • Publication number: 20210165761
    Abstract: An overlay optimizer can enhance the functionality of a write filter using an auxiliary overlay. An overlay optimizer can be loaded above a write filter. Based on the configuration of the write filter's overlay, the overlay optimizer can be configured to implement a volatile or persistent auxiliary overlay and then use the auxiliary overlay to selectively cache artifacts. To minimize the likelihood that the consumption of the write filter's overlay will exceed a critical threshold, the overly optimizer can be provided a list of monitored artifacts. The overlay optimizer can employ the list to selectively move monitored artifacts from the write filter's overlay to the auxiliary overlay when the overlay's consumption reaches a threshold. The overlay optimizer may also selectively allow I/O requests generated by particular applications while redirecting I/O requests generated by other applications.
    Type: Application
    Filed: December 2, 2019
    Publication date: June 3, 2021
    Inventors: Gokul Thiruchengode Vajravel, Jyothi Bandakka, Ankit Kumar
  • Publication number: 20210165840
    Abstract: Systems and techniques are described herein for tiered storage of customer data accessed by a search service of a computing resource service provider. In some aspects, customer data may be received by a search instance executed across a plurality of compute nodes and provisioned by a search service. The customer data may be indexed and the data and resulting index may be stored locally by a first pool of hot compute nodes of the search instance. The customer data and index may be migrated and stored remotely by a data storage service. Metadata associated with the customer data and/or index may be stored in a second pool of warm compute nodes of the search instance. The warm compute nodes, upon receiving a request to access the customer data, may identify a location of the customer data and retrieve the customer data from the data storage service according to the metadata.
    Type: Application
    Filed: April 27, 2020
    Publication date: June 3, 2021
    Inventors: Ramakrishna Kotla, Eli R Fisher, Min Zhou, Ankit Malpani, Ankit Kumar Jain, Andi Gutmans, Bhaven Avalani
  • Publication number: 20210144619
    Abstract: There are provided measures for enabling/realizing network slice discovery in an overlapping network slice deployment. Such measures exemplarily comprise registration of a network slice mapping between a network slice identification information and a network slice type information for at least one service-related network slice in an overlapping network slice deployment, said network slice type information being indicative of a service-related capability of the at least one service-related network slice, and identification of a service-related network slice in the overlapping network slice deployment on the basis of the registered network slice mapping and a service.
    Type: Application
    Filed: March 15, 2018
    Publication date: May 13, 2021
    Inventors: D PRAKASH, Ankit KUMAR
  • Publication number: 20210133316
    Abstract: A security client can provide security features in write filter environments. To prevent improper modifications to a protected volume, the security client can be employed to differentiate between direct I/O requests and reparsed I/O requests that are directed to a shadow volume and to block any direct I/O requests. Alternatively or additionally, the security client can be configured to determine whether an I/O request that is directed to the shadow volume targets an artifact in the write filter's exclusion list, and if not, block the I/O request. Alternatively or additionally, the security client can be configured to monitor registry operations to determine whether a modifying registry operation targets the write filter's persistent shadow registry hive, and if so, allow the modifying registry operation only if it targets a registry key in the write filter's exclusion list.
    Type: Application
    Filed: November 4, 2019
    Publication date: May 6, 2021
    Inventors: Gokul Thiruchengode Vajravel, Ankit Kumar, Abhishek Mathur
  • Publication number: 20210117332
    Abstract: The amount of data that is written to disk is minimized when an overlay optimizer is used in conjunction with a write filter to prevent the overlay from becoming full. An overlay optimizer minifilter can be used to intercept writes that were initiated by the overlay optimizer's request to commit files cached in the write filter's overlay to thereby extract only the modified portions of the files that are actually stored in the overlay. The overlay optimizer minifilter can then write these modified portions of the files, as opposed to the entire files, in the overlay cache. Directory change notifications are also enabled when a write filter is employed as well as in other multi-volume filter environments.
    Type: Application
    Filed: October 18, 2019
    Publication date: April 22, 2021
    Inventors: Gokul Thiruchengode Vajravel, Jyothi Bandakka, Ankit Kumar
  • Patent number: 10902150
    Abstract: In an embodiment, a method includes accessing one or more digital applications by a server system. Each of the one or more digital applications is configured to be accessed by a plurality of users. The method also includes determining, by the server system, compliance content in each of the one or more digital applications. The method further includes removing the compliance content determined from each of the one or more digital applications. The method further includes storing the compliance content in a central repository. Thereafter, the method includes facilitating integration of one or more widgets into each of the one or more digital applications to access the compliance content stored in the central repository. The one or more widgets integrated into a digital application of the one or more digital applications enable a user of the digital application to access the compliance content from the central repository.
    Type: Grant
    Filed: December 4, 2018
    Date of Patent: January 26, 2021
    Assignee: Mastercard International Incorporated
    Inventors: Rajesh Pralhadrao Mahalle, Ankit Kumar Binnani, Thrilok Lingappa Kotian
  • Patent number: 10897468
    Abstract: Techniques for region management for distributed services in provider networks are described. A region management service (RMS) receives requests to enable or disable regions a provider network for users. The RMS identifies what services operate within the involved regions and transmits requests to configure resources within the regions that are specific to the users to the services. The RMS also receives messages indicating whether the transmitting services have successfully configured user resources pertaining to the services for the region.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: January 19, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Jasmeet Chhabra, Ankit Kumar, Dan Popick
  • Publication number: 20200412470
    Abstract: A method and system for enhanced time synchronization with lesser delay and jitter, from a gateway of a network or an external standard time source, over the internet, in a traditional network, including SDN, by NTP clients like newly added devices, spawned VMs and the like, by automatic deployment of the distributed NTP service through DHCP and DNS servers by spawning NTP demons (ntpd), according to the time synchronization requests received, thereby offloading the NTP functionality of the gateway and decreasing NTP traffic.
    Type: Application
    Filed: September 11, 2020
    Publication date: December 31, 2020
    Inventors: Vikram Choudhary, Ankit Kumar Sinha, Hui Ni
  • Patent number: 10824598
    Abstract: File commit and commit-delete operations can be successfully completed in environments that employ an overlay optimizer to enhance the performance of a write filter. The overlay optimizer can be structured into upper and lower instances relative to the write filter. The upper instance can cause files to be moved from the write filter's overlay into an overlay cache to thereby optimize the performance of the overlay. To prevent the failure of commit and commit-delete operations that target files that have been moved to the overlay cache, the lower instance can be configured to detect when the write filter is attempting to perform a commit or commit-delete operation and can modify the processing of such operations to cause them to be completed successfully even though the files targeted by the operations do not exist in the write filter's overlay.
    Type: Grant
    Filed: August 7, 2018
    Date of Patent: November 3, 2020
    Assignee: Dell Products L.P.
    Inventors: Gokul Thiruchengode Vajravel, Ankit Kumar
  • Patent number: 10819817
    Abstract: HTML5 multimedia redirection is implemented. When a multimedia application is started, a hooking library can be injected to enable the hooking library to modify the application's interactions with the Microsoft Media Foundation multimedia platform. These modifications include causing only a redirecting MFT to be enumerated so that the application will employ the redirecting MFT in the topology of a media pipeline created to play HTML5 video and/or audio. These modifications also include handling playback controls to synchronize the playback that is occurring on the client with the media session on the server.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: October 27, 2020
    Assignee: Dell Products L.P.
    Inventors: Ankit Kumar, Ramanujam Kaniyar Venkatesh
  • Patent number: 10798097
    Abstract: Authentication devices can be intelligently redirected in a VDI environment to thereby ensure that the redirected authentication devices remain available for authentication even after a remote session has been locked. This intelligent redirection of authentication devices can be accomplished in a way that only requires server-side modifications and that is agnostic to the remoting protocol used to establish the remote session.
    Type: Grant
    Filed: August 7, 2018
    Date of Patent: October 6, 2020
    Assignee: Dell Products L.P.
    Inventors: Gokul Thiruchengode Vajravel, Ankit Kumar
  • Publication number: 20200311887
    Abstract: The present invention relates to the field of dynamic content creation and management and more particularly to dynamically create and insert immersive promotional content in a multimedia. The multimedia requested by a user is procured from a media server (105) and the one or more objects present in the multimedia is determined. The content of the multimedia is analyzed, and a decision is taken to immerse the promotional content in the multimedia based on the analysis of the multimedia. Further, a promotional content is created in real time using the components present in the asset database (106) based on the personalized user profile. The created promotional content is overlaid and blended with a at least one object from the one or more objects in the multimedia. The created promotional content and the multimedia is joined to form a composite media and is streamed to the user device.
    Type: Application
    Filed: December 6, 2019
    Publication date: October 1, 2020
    Inventors: Sibsambhu Kar, Ankit Kumar Singh, Manjunath Ramachandra Iyer
  • Patent number: 10789014
    Abstract: An overlay optimizer can prevent cross-volume moves to optimize the performance of a write filter. The overlay optimizer can be configured to detect when a file move is being attempted and can modify the handling of the file move so that a cross-volume move is not performed. In the case where the file move would result in a file being moved from the volume where the overlay cache is implemented, the overlay optimizer can create a copy of the target directory tree in the overlay cache and redirect the move to the newly created directory. In the case where the file move would result in a file being moved to the volume where the overlay cache is implemented, the overlay optimizer can forgo redirection so that the file will be moved within the same volume.
    Type: Grant
    Filed: August 7, 2018
    Date of Patent: September 29, 2020
    Assignee: Dell Products L.P.
    Inventors: Gokul Thiruchengode Vajravel, Ankit Kumar, Puneet Kaushik
  • Publication number: 20200285932
    Abstract: A method and system are described for generating structured relations between words in sentences. The method includes generating encoded hidden state vectors using a single layer bi-directional Long Short Term Memory (LSTM) neural network. The method includes generating current hidden state vectors based on word embedding associated with each word at a time stamp ‘t’. The method includes computing attention distribution of each word based on encoded hidden state vectors and current hidden state vectors. The method includes computing context vector of sentences based on attention distribution of each word and the encoded hidden state vectors. The method includes computing vocabulary distribution at time stamp “t” based on context vector and current hidden state vectors. The method includes computing probability distribution of words based on encoded hidden state vectors, current hidden state vectors, and vocabulary distribution.
    Type: Application
    Filed: March 19, 2019
    Publication date: September 10, 2020
    Inventors: Ankit Kumar Singh, Amrit Bhaskar, Parul Chopra, Sibsambhu Kar
  • Patent number: 10742776
    Abstract: Isochronous endpoints of a redirected USB device can be accelerated. When a USB device is redirected, each of the device's endpoints can be identified. A UDP socket can then be created between the client-side proxy and the server-side agent for each isochronous endpoint, while a TCP socket can be created for each other endpoint. A lookup table can also be created which maps pipe handles to socket IDs. The lookup table can be employed to route USB request blocks pertaining to a particular endpoint over the corresponding socket. In this way, USB request blocks pertaining to an isochronous endpoint will be transferred over the network using UDP while USB request blocks pertaining to non-isochronous endpoints will be transferred using TCP.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: August 11, 2020
    Assignee: Dell Products L.P.
    Inventors: Gokul Thiruchengode Vajravel, Ankit Kumar
  • Publication number: 20200252473
    Abstract: HTML5 multimedia redirection is implemented. When a multimedia application is started, a hooking library can be injected to enable the hooking library to modify the application's interactions with the Microsoft Media Foundation multimedia platform. These modifications include causing only a redirecting MFT to be enumerated so that the application will employ the redirecting MFT in the topology of a media pipeline created to play HTML5 video and/or audio. These modifications also include handling playback controls to synchronize the playback that is occurring on the client with the media session on the server.
    Type: Application
    Filed: February 4, 2019
    Publication date: August 6, 2020
    Inventors: Ankit Kumar, Ramanujam Kaniyar Venkatesh
  • Publication number: 20200252485
    Abstract: Isochronous endpoints of a redirected USB device can be accelerated. When a USB device is redirected, each of the device's endpoints can be identified. A UDP socket can then be created between the client-side proxy and the server-side agent for each isochronous endpoint, while a TCP socket can be created for each other endpoint. A lookup table can also be created which maps pipe handles to socket IDs. The lookup table can be employed to route USB request blocks pertaining to a particular endpoint over the corresponding socket. In this way, USB request blocks pertaining to an isochronous endpoint will be transferred over the network using UDP while USB request blocks pertaining to non-isochronous endpoints will be transferred using TCP.
    Type: Application
    Filed: February 4, 2019
    Publication date: August 6, 2020
    Inventors: Gokul Thiruchengode Vajravel, Ankit Kumar