Patents by Inventor Chandra Prasad

Chandra Prasad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160359880
    Abstract: The present technology is directed to mapping flow data and overlaying it on a geographic map. Furthermore the geographical map can also display attacks and the flow of an attack from the source to a logical entity. The map additionally can be accompanied with a pie chart relating to the attacks and intensity of attacks. Normal flows can also be displayed on the map along with the attack flows.
    Type: Application
    Filed: June 3, 2016
    Publication date: December 8, 2016
    Inventors: Jackson Ngoc Ki Pang, Michael Standish Watts, Ali Parandehgheibi, Rohit Chandra Prasad, Varun Sagar Malhotra, Hoang Viet Nguyen
  • Publication number: 20160359709
    Abstract: Managing a network environment to identify spoofed packets is disclosed. A method includes analyzing, via a first capture agent, packets processed by a first environment in a network associated with a first host, and analyzing, via a second capture agent, packets processed by a second environment in the network associated with a second host. The method includes collecting the first data and the second data at a collector and generating a topological map of the network and a history of network activity associated with the first environment and the second environment. The method includes extracting network data from a packet and comparing the extracted network data with stored network data in the database. When the comparison indicates that the extracted network data does not match the stored network data (i.e., the reported source does not match an expected source for the packet), determining that the packet is a spoofed packet.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 8, 2016
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
  • Publication number: 20160359698
    Abstract: A method includes analyzing, via a first capturing agent, packets processed in a first environment associated with a first host to yield first data. The method includes analyzing, via a second capturing agent, packets processed by a second environment associated with a second host to yield second data, collecting the first data and the second data at a collector to yield aggregated data, transmitting the aggregated data to an analysis engine which analyzes the aggregated data to yield an analysis. Based on the analysis, the method includes identifying first packet loss at the first environment and second packet loss at the second environment.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 8, 2016
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
  • Publication number: 20160359890
    Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 8, 2016
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
  • Publication number: 20160359879
    Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 8, 2016
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
  • Patent number: 9441250
    Abstract: Provided herein are glycerol-3-phosphate dehydrogenase (GPD) enzymes with increased KM for NADH and GPD enzymes with substantially the same affinity for NADH and NADPH and/or are feedback inhibited by glycerol-3-phosphate. Also provided herein are recombinant microorganisms comprising a heterologous gene encoding GPD and a deletion or disruption in an endogenous gene encoding GPD. Also provided are recombinant microorganisms comprising a heterologous gene encoding GPD and a butanol biosynthetic pathway. Further provided are methods of producing butanol comprising providing the recombinant microorganisms described herein and contacting the recombinant microorganism with at least one fermentable carbon substrate under conditions wherein butanol is produced.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: September 13, 2016
    Assignee: Butamax Advanced Biofuels LLC
    Inventors: Ritu Bhalla, Gopal K Chotani, Michael Dauner, Mark J Nelson, Daniel P O'Keefe, Caroline M Peres, Jahnavi Chandra Prasad, Jean-Francois Tomb
  • Publication number: 20160235236
    Abstract: In one embodiment, a controller determines a particular compartment of a smart postal box in which a package is to be delivered. The controller associates the particular compartment with an authorized entity. The controller provides the authorized entity access to the particular compartment by aligning rolling doors of the smart postal box with the particular compartment.
    Type: Application
    Filed: February 13, 2015
    Publication date: August 18, 2016
    Inventors: Charles Calvin Byers, Gonzalo Salgueiro, Aparna Vellala, Salini Kumar Bogadapati, Jagadish Chandra Prasad Mynampati
  • Publication number: 20150213079
    Abstract: Systems and methods for verifiable, private and secure omic analysis are provided. Secure multiparty computation techniques can be utilized to enable two parties to perform an omic transaction, such as determining genetic compatibility with one another, by jointly computing a result without either party disclosing their genetic information to the other. Privacy-preserving techniques to ensure authenticity of each party's omic data and metadata are also provided. Personalized matching scores can be computed, in which each party's score is weighted to reflect user preferences associated with the matching analysis.
    Type: Application
    Filed: January 26, 2015
    Publication date: July 30, 2015
    Inventors: Sachet Ashok Shukla, Madhukar Anand, Jahnavi Chandra Prasad
  • Patent number: 8966081
    Abstract: An automated, policy-based system and method provides information security at various levels in the network, including at the baseline inventory, device, network frame, and command level. This approach improves over the conventional distributed security model by centralizing security in one multi-level management structure. Embodiments of the present invention may also provide a scheme for mapping vendor-unique opcodes to access rights.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: February 24, 2015
    Assignee: NetApp, Inc.
    Inventors: Richard Meyers, Kumar Gajjar, Rahim Ibrahim, Nghiep Tran, Chandra Prasad
  • Publication number: 20140273129
    Abstract: Provided herein are glycerol-3-phosphate dehydrogenase (GPD) enzymes with increased KM for NADH and GPD enzymes with substantially the same affinity for NADH and NADPH and/or are feedback inhibited by glycerol-3-phosphate. Also provided herein are recombinant microorganisms comprising a heterologous gene encoding GPD and a deletion or disruption in an endogenous gene encoding GPD. Also provided are recombinant microorganisms comprising a heterologous gene encoding GPD and a butanol biosynthetic pathway. Further provided are methods of producing butanol comprising providing the recombinant microorganisms described herein and contacting the recombinant microorganism with at least one fermentable carbon substrate under conditions wherein butanol is produced.
    Type: Application
    Filed: March 13, 2014
    Publication date: September 18, 2014
    Applicant: BUTAMAX ADVANCED BIOFUELS LLC
    Inventors: Ritu Bhalla, Gopal K. Chotani, Michael Dauner, Mark J. Nelson, Daniel P. O'keefe, Caroline M. Peres, Jahnavi Chandra Prasad, Jean-Francois Tomb
  • Publication number: 20130297902
    Abstract: A system and method are provided for securely sharing storage resources in a storage network. One or more organizations are modeled in a structure where each organization includes one or more units. Users are assigned to a unit and are also assigned a command access level. The command access level grants access to certain management commands that may be performed on storage resources. Storage resources are then bound to units in the organization and may be accessed by users in the unit. Once command access levels are assigned and storage resources are bound, access for a user in the unit is restricted to the command access level assigned to the user and the storage resources bound to the user's unit. When a command from a user is received, the command access level of the user and the bound storage resources for the unit of the user is determined. Then, a management command is performed using the bound storage for the user's unit if the command is available for the command access level.
    Type: Application
    Filed: April 26, 2013
    Publication date: November 7, 2013
    Inventors: Jim Collins, Chandra Prasad, Ranjit Ghate, Brian Stevens
  • Publication number: 20130160115
    Abstract: Systems and methods according to various embodiments disclose a worker process manager adapted to spawn one or more worker processes on a server and to load an application on each of the worker processes. The worker process manager is adapted to isolate the one or more worker processes from each other and to control resource usage by the worker processes. A resource manager is adapted to detect applications that overuse system resources. The worker process manager is adapted to isolate worker processes and to control resource usage using one or more of the following techniques: least-privilege execution, messaging isolation, credentials isolation, data isolation, network isolation, fair share resource usage, and managed runtime security. Heuristic algorithms are used to detect applications that frequently overuse system resources that are unchargeable and that cause system unresponsiveness.
    Type: Application
    Filed: December 20, 2011
    Publication date: June 20, 2013
    Applicant: Microsoft Corporation
    Inventors: Girish Mittur Venkataramanappa, Mandyam Kishore, Andreas Ulbrich, Aarthi Rajmohan Saravanakumar, Chandra Prasad, Yann Christensen, Dharma Shukla, Amol Kulkarni
  • Patent number: 8468548
    Abstract: A container service is capable of hosting large numbers of middleware components for multiple tenants. A central container manager controls a plurality of compute nodes. The central container manager receives middleware components from external devices or services and assigns the components to containers on one or more designated compute nodes. Each compute node has a container management agent and one or more containers. The container management agents activate and manage the appropriate number of containers to run the assigned middleware components. The container management agent assigns each container on its compute node a limited set of privileges to control access to shared resources. The central container manager and each node's container management agent monitor container load levels and dynamically adjust the placement of the middleware components to maintain balanced operation. The compute nodes are grouped into clusters based upon the type of middleware components hosted on each compute node.
    Type: Grant
    Filed: December 17, 2010
    Date of Patent: June 18, 2013
    Assignee: Microsoft Corporation
    Inventors: Amol Kulkarni, Girish Mittur Venkataramanappa, Yann Christensen, Chandra Prasad, Dharma Shukla, Sumit Mohanty, Vinod Shanbhag, Andreas Ulbrich, Mandyam Kishore, Aditya Bhandarkar
  • Publication number: 20120159523
    Abstract: A container service is capable of hosting large numbers of middleware components for multiple tenants. A central container manager controls a plurality of compute nodes. The central container manager receives middleware components from external devices or services and assigns the components to containers on one or more designated compute nodes. Each compute node has a container management agent and one or more containers. The container management agents activate and manage the appropriate number of containers to run the assigned middleware components. The container management agent assigns each container on its compute node a limited set of privileges to control access to shared resources. The central container manager and each node's container management agent monitor container load levels and dynamically adjust the placement of the middleware components to maintain balanced operation. The compute nodes are grouped into clusters based upon the type of middleware components hosted on each compute node.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Amol Kulkarni, Girish Mittur Venkataramanappa, Yann Christensen, Chandra Prasad, Dharma Shukla, Sumit Mohanty, Vinod Shanbhag, Andreas Ulbrich, Mandyam Kishore, Aditya Bhandarkar
  • Patent number: 7415506
    Abstract: In a storage server on a storage area network, a media unit manager manages disk space in a manner transparent to the host computers. The media unit manager uses media units corresponding to the physical storage devices on the storage area network to build higher-level media units. The higher level media units can have the attributes of being sliced, concatenated, mirrored, striped, etc. Thus, the host computers need not be aware of the specific physical storage devices themselves, reducing the management and reconfiguration burden on the host computers when storage devices are added to or removed from the storage area network.
    Type: Grant
    Filed: February 13, 2002
    Date of Patent: August 19, 2008
    Assignee: NetApp, Inc.
    Inventors: Kumar Gajjar, Jim Collins, Dipam Patel, Richard Meyer, Chandra Prasad
  • Patent number: 7370172
    Abstract: A method and system for provisioning storage from a storage area network is provided. The provisioning includes receiving a request for a storage size and storage configuration from a storage area network according to a storage profile, identifying a storage device pool of storage devices according to a storage device candidate strategy, selecting a media unit provisioning strategy based upon the type of storage configuration specified in the storage request, generating media unit solutions using the media unit provisioning strategy and sequence of storage devices in the storage pool, determining if the media unit provisioning strategy produced a solution for the requested storage configuration and provisioning a media unit solution in response to the determination.
    Type: Grant
    Filed: May 31, 2006
    Date of Patent: May 6, 2008
    Assignee: NetApp, Inc.
    Inventors: Rush Manbert, Dipam Patel, Chandra Prasad
  • Patent number: 7272848
    Abstract: An automated, policy-based system and method provides information security at various levels in the network, including at the baseline inventory, device, network frame, and command level. This approach improves over the conventional distributed security model by centralizing security in one multi-level management structure. Embodiments of the present invention may also provide a scheme for mapping vendor-unique opcodes to access rights.
    Type: Grant
    Filed: February 13, 2002
    Date of Patent: September 18, 2007
    Assignee: Network Appliance, Inc.
    Inventors: Richard Meyer, Kumar Gajjar, Rahim Ibrahim, Nghiep Tran, Chandra Prasad
  • Publication number: 20060206682
    Abstract: A method and system for provisioning storage from a storage area network is provided. The provisioning includes receiving a request for a storage size and storage configuration from a storage area network according to a storage profile, identifying a storage device pool of storage devices according to a storage device candidate strategy, selecting a media unit provisioning strategy based upon the type of storage configuration specified in the storage request, generating media unit solutions using the media unit provisioning strategy and sequence of storage devices in the storage pool, determining if the media unit provisioning strategy produced a solution for the requested storage configuration and provisioning a media unit solution in response to the determination.
    Type: Application
    Filed: May 31, 2006
    Publication date: September 14, 2006
    Inventors: Rush Manbert, Dipam Patel, Chandra Prasad
  • Patent number: 7080229
    Abstract: A method and system for provisioning storage from a storage area network is provided. The provisioning includes receiving a request for a storage size and storage configuration from a storage area network according to a storage profile, identifying a storage device pool of storage devices according to a storage device candidate strategy, selecting a media unit provisioning strategy based upon the type of storage configuration specified in the storage request, generating media unit solutions using the media unit provisioning strategy and sequence of storage devices in the storage pool, determining if the media unit provisioning strategy produced a solution for the requested storage configuration and provisioning a media unit solution in response to the determination.
    Type: Grant
    Filed: October 28, 2003
    Date of Patent: July 18, 2006
    Assignee: Network Appliance Inc.
    Inventors: Rush Manbert, Dipam Patel, Chandra Prasad
  • Patent number: 7065616
    Abstract: A storage provisioning policy is created by specifying storage heuristics for storage attributes using storage heuristic metadata. Storage attributes characterize a storage device and storage heuristic metadata describe how to specify a storage heuristic. Using the storage heuristic metadata, storage heuristics are defined to express a rule or constraint as a function of a storage attribute. In addition, the storage provisioning policy may also specify mapping rules for exporting the storage to a consumer of the storage, such as the server or server cluster.
    Type: Grant
    Filed: August 26, 2004
    Date of Patent: June 20, 2006
    Assignee: Network Appliance, Inc.
    Inventors: Kumar Gajjar, Jim Collins, Richard Meyer, Chandra Prasad, Dipam Patel