Patents by Inventor Anubhav Gupta

Anubhav Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200142865
    Abstract: A virtual machine container file is analyzed to determine which portion of the virtual machine container file corresponds to a virtual machine file system metadata of the virtual machine container file. One or more differences between a first version of a virtual machine container file and a second version of the virtual machine container file are determined at least in part by traversing a snapshot structure associated with the virtual machine container file. The determined one or more differences that corresponds to the virtual machine file system metadata portion of the virtual machine container file are identified based at least in part on the analysis of the virtual machine container file.
    Type: Application
    Filed: December 5, 2019
    Publication date: May 7, 2020
    Inventors: Chinmaya Manjunath, Anirvan Duttagupta, Anubhav Gupta, Sidharth Mishra, Zhihuan Qiu
  • Patent number: 10623282
    Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.
    Type: Grant
    Filed: June 2, 2016
    Date of Patent: April 14, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
  • Publication number: 20200112493
    Abstract: Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.
    Type: Application
    Filed: December 5, 2019
    Publication date: April 9, 2020
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
  • Publication number: 20200110550
    Abstract: A method and system for managing a storage cluster is described. An identification of a plurality of nodes of a storage cluster to be removed from the storage cluster is received. It is determined whether to allow the removal of the plurality of nodes. In response to a determination that the removal of the plurality of nodes is allowed, identifications are made of data migrations to be performed to rebalance the data among nodes remaining in the storage cluster after removal of the plurality of nodes. The data migrations are performed. The plurality of nodes are removed from the storage cluster.
    Type: Application
    Filed: October 9, 2018
    Publication date: April 9, 2020
    Inventors: Sharath Naeni, Anirvan Duttagupta, Anubhav Gupta, Ganesha Shanmuganathan, Zhihuan Qiu
  • Patent number: 10613780
    Abstract: A method and system for managing a storage cluster is described. An identification of a plurality of nodes of a storage cluster to be removed from the storage cluster is received. It is determined whether to allow the removal of the plurality of nodes. In response to a determination that the removal of the plurality of nodes is allowed, identifications are made of data migrations to be performed to rebalance the data among nodes remaining in the storage cluster after removal of the plurality of nodes. The data migrations are performed. The plurality of nodes are removed from the storage cluster.
    Type: Grant
    Filed: October 9, 2018
    Date of Patent: April 7, 2020
    Assignee: Cohesity, Inc.
    Inventors: Sharath Naeni, Anirvan Duttagupta, Anubhav Gupta, Ganesha Shanmuganathan, Zhihuan Qiu
  • Publication number: 20200084203
    Abstract: Cluster state information is generated in response to a request to establish a connection with a cloud service system. The cluster state information includes a first instance of a security token and host information. The cluster state information is provided to a web browser associated with a user. The web browser associated with the user is redirected to a cloud identity provider. The cloud identity provider is configured to provide to the cloud service system via the web browser associated with the user, the cluster state information that includes the first instance of the security token and the host information. A certificate is requested from the cloud service system. The cluster state information that includes a second instance of the security token is provided to the cloud service system. The cloud service system is configured to establish the connection based on comparison between the first instance of the security token and the second instance of the security token.
    Type: Application
    Filed: June 27, 2019
    Publication date: March 12, 2020
    Inventors: Anubhav Gupta, Mahesh Kumar, Samual Krish Ravichandran, Subramanian Sethumadhavan, Sudhir Srinivas
  • Patent number: 10567247
    Abstract: An example method can include receiving a traffic report from a sensor and using the traffic report to detect intra-datacenter flows. These intra-datacenter flows can then be compared with a description of historical flows. The description of historical flows can identify characteristics of normal and malicious flows. Based on the comparison, the flows can be classified and tagged as normal, malicious, or anomalous. If the flows are tagged as malicious or anomalous, corrective action can be taken with respect to the flows. A description of the flows can then be added to the description of historical flows.
    Type: Grant
    Filed: May 3, 2016
    Date of Patent: February 18, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Ashutosh Kulshreshtha, Supreeth Hosur Nagesh Rao, Navindra Yadav, Anubhav Gupta, Sunil Kumar Gupta, Varun Sagar Malhorta, Shashidhar Gandham
  • Publication number: 20200052984
    Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.
    Type: Application
    Filed: October 21, 2019
    Publication date: February 13, 2020
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
  • Patent number: 10536357
    Abstract: Systems, methods, and non-transitory computer-readable storage media for synchronizing timestamps of a sensor report to the clock of a device. In one embodiment, the device receives a report from a sensor of a node. The report can include a network activity of the node captured by the sensor and a first timestamp relative to the clock of the node. The device can then determine a second timestamp relative to the clock of the collector indicating receipt of the report by the device and from the sensor at the node. The device can also determine a delta between the first timestamp and the second timestamp, and a communication latency associated with a communication channel between the device and the sensor. Next, the device can adjust the delta based on the communication latency, and generate a third timestamp based on the adjusted delta.
    Type: Grant
    Filed: February 10, 2016
    Date of Patent: January 14, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
  • Patent number: 10534759
    Abstract: A virtual machine container file is analyzed to determine which portion of the virtual machine container file corresponds to a virtual machine file system metadata of the virtual machine container file. One or more differences between a first version of a virtual machine container file and a second version of the virtual machine container file are determined at least in part by traversing a snapshot structure associated with the virtual machine container file. The determined one or more differences that corresponds to the virtual machine file system metadata portion of the virtual machine container file are identified based at least in part on the analysis of the virtual machine container file.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: January 14, 2020
    Assignee: Cohesity, Inc.
    Inventors: Chinmaya Manjunath, Anirvan Duttagupta, Anubhav Gupta, Sidharth Mishra, Zhihuan Qiu
  • Patent number: 10505828
    Abstract: Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.
    Type: Grant
    Filed: June 2, 2016
    Date of Patent: December 10, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
  • Patent number: 10466933
    Abstract: A first persistent connection pipe is established from a node of a secondary storage system to an access service associated with a cloud service system. A second persistent connection pipe is established from the node of the secondary storage system to the access service. A communication direction role of the second persistent connection pipe is switched to enable the access service to initiate a communication to the node of the secondary storage system via the second persistent pipe.
    Type: Grant
    Filed: December 19, 2018
    Date of Patent: November 5, 2019
    Assignee: Cohesity, Inc.
    Inventors: Suresh Bysani Venkata Naga, Sudhir Srinivas, Anubhav Gupta
  • Patent number: 10454793
    Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.
    Type: Grant
    Filed: June 2, 2016
    Date of Patent: October 22, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
  • Patent number: 10439904
    Abstract: Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. A method includes determining a lineage for a process within the network and then evaluating, through knowledge of the lineage, the source of the command that initiated the process. The method includes capturing data from a plurality of capture agents at different layers of a network, each capture agent of the plurality of capture agents configured to observe network activity at a particular location in the network, developing, based on the data, a lineage for a process associated with the network activity and, based on the lineage, identifying an anomaly within the network.
    Type: Grant
    Filed: June 2, 2016
    Date of Patent: October 8, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
  • Patent number: 10389704
    Abstract: Cluster state information is generated in response to a request to establish a connection with a cloud service system. The cluster state information includes a first instance of a security token and host information. The cluster state information is provided to a web browser associated with a user. The web browser associated with the user is redirected to a cloud identity provider. The cloud identity provider is configured to provide to the cloud service system via the web browser associated with the user, the cluster state information that includes the first instance of the security token and the host information. A certificate is requested from the cloud service system. The cluster state information that includes a second instance of the security token is provided to the cloud service system. The cloud service system is configured to establish the connection based on a comparison between the first instance of the security token and the second instance of the security token.
    Type: Grant
    Filed: November 30, 2018
    Date of Patent: August 20, 2019
    Assignee: Cohesity, Inc.
    Inventors: Anubhav Gupta, Mahesh Kumar, Samual Krish Ravichandran, Subramanian Sethumadhavan, Sudhir Srinivas
  • Publication number: 20190215253
    Abstract: Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.
    Type: Application
    Filed: December 31, 2018
    Publication date: July 11, 2019
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
  • Publication number: 20190122153
    Abstract: In some examples, artificial intelligence and machine learning based project management assistance may include ascertaining an inquiry by a user. The inquiry may be related to a project. An attribute associated with the user and an attribute associated with the project may be ascertained. The inquiry may be analyzed based on the ascertained attributes associated with the user and the project. A predictor category may be identified, based on the analyzed inquiry, from a plurality of predictor categories that include a performance predictor category, a quality predictor category, a retrospect predictor category, and a planning predictor category. A predictor from a plurality of predictors may be identified based on the identified predictor category. A response to the inquiry may be generated based on execution of the identified predictor. Further, a display responsive to the inquiry may be generated based on the generated response.
    Type: Application
    Filed: December 8, 2017
    Publication date: April 25, 2019
    Applicant: ACCENTURE GLOBAL SOLUTIONS LIMITED
    Inventors: Raghavendra MEHARWADE, Jeffson Dsouza, Anubhav Gupta, Niju Prabha, Aruna Sivakumar, Geeta Sarlashkar, Lavanya Keechaneri, Bontha Pratap, Avinash Mutyala, Shankaranand Mallapur, Nisha M
  • Publication number: 20190081959
    Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
    Type: Application
    Filed: November 2, 2018
    Publication date: March 14, 2019
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, FNU Rachita Agasthy, Duane Thomas Barlow
  • Publication number: 20190050771
    Abstract: In some examples, artificial intelligence and machine learning based product development may include ascertaining an inquiry, by a user, related to a product that is to be developed or that is under development, and ascertaining an attribute associated with the user. The inquiry may be analyzed to determine at least one virtual assistant from a set of virtual assistants to respond to the inquiry. The determined at least one virtual assistant may be invoked based on an authorization by the user. Further, development of the product may be controlled based on the invocation of the determined at least one virtual assistant.
    Type: Application
    Filed: August 14, 2018
    Publication date: February 14, 2019
    Applicant: ACCENTURE GLOBAL SOLUTIONS LIMITED
    Inventors: Raghavendra MEHARWADE, Jeffson FELIX DSOUZA, Pratap VENKA NAGA POORNA BONTHA, Anubhav GUPTA, Aruna SIVAKUMAR, Muthalanghat NISHA, Janagi MADHANKUMAR, Roopalaxmi MANJUNATH, Purnima JAGANNATHAN, Nevis Ravi KUMAR RODRIGUEZ, Rajesh NAGARAJAN, Koushik M. VIJAYARAGHAVAN, Rajendra T. PRASAD, Mohan SEKHAR
  • Patent number: 10171319
    Abstract: Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.
    Type: Grant
    Filed: May 11, 2016
    Date of Patent: January 1, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu