Patents by Inventor Chandrasekhar A
Chandrasekhar A has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240144118Abstract: A computer-implemented system for real-time credible vetting of talents or candidates using blockchain is disclosed. The system comprises a computing device having a processor and a memory in communication with the processor, one or more databases in communication with the computing device via a network to store a plurality of candidate's information, and a user device associated with a user in communication with the computing device via the network configured to access one or more services provided by the system. The system enables the candidates to submit one or more candidate credentials on a user device. The candidate credentials are validated by a credible group of community members and are stored in the blockchain. The system matches the recruiters and candidates based on an assigned task and the candidate's expertise using artificial intelligence (AI) talent matching. Further, the system provides dynamic ratings or scores for candidates along with feedback.Type: ApplicationFiled: October 28, 2022Publication date: May 2, 2024Applicant: ECHELON EMERGING TECH GROUP LLCInventor: Chandrasekhar Gundlapalli
-
Publication number: 20240143763Abstract: A method of protecting an endpoint against a security threat detected at the endpoint, wherein the endpoint includes, in memory pages of the endpoint, an operating system (OS), a separate software entity, and remediation code, includes the steps of: transferring control of virtual CPUs (vCPUs) of the endpoint from the OS to the separate software entity; and while the separate software entity controls the vCPUs, storing, in an interrupt dispatch table, an instruction address corresponding to an interrupt, wherein the remediation code is stored at the instruction address, and replacing a next instruction to be executed by the OS, with an interrupt instruction, wherein the interrupt is raised when the OS executes the interrupt instruction, and the remediation code is executed as a result of handling of the interrupt that is raised.Type: ApplicationFiled: November 2, 2022Publication date: May 2, 2024Inventors: Mandar NANIVADEKAR, Sachin SHINDE, Bharath Kumar CHANDRASEKHAR
-
Patent number: 11973645Abstract: A controller device manages a plurality of network devices. The controller device includes one or more processing units configured to receive an indication of a stateful intent, the data structure including a plurality of nodes and a plurality of edges, each node of the plurality of nodes being representative of a respective network device of the plurality of network devices. The one or more processing units are configured to determine, using an abstract function configured at a node of the plurality of nodes, a stateless intent for implementing the stateful intent and generate low level configuration data for the plurality of network devices based on the stateless intent. The one or more processing units are configured to interface with one or more of the plurality of network devices to configure the one or more of the plurality of network devices with the low level configuration data.Type: GrantFiled: April 11, 2023Date of Patent: April 30, 2024Assignee: Juniper Networks, Inc.Inventors: Chandrasekhar A, Premchandar N, Jayanthi R
-
Publication number: 20240136323Abstract: Microelectronic assemblies, and related devices and methods, are disclosed herein. For example, in some embodiments, a microelectronic assembly may include a package substrate having a first surface and an opposing second surface, and a die secured to the package substrate, wherein the die has a first surface and an opposing second surface, the die has first conductive contacts at the first surface and second conductive contacts at the second surface, and the first conductive contacts are coupled to conductive pathways in the package substrate by first non-solder interconnects.Type: ApplicationFiled: January 3, 2024Publication date: April 25, 2024Applicant: Intel CorporationInventors: Shawna M. Liff, Adel A. Elsherbini, Johanna M. Swan, Arun Chandrasekhar
-
Patent number: 11965614Abstract: Apparatus and associated methods relate to a shapeable conduit. In an illustrative example, the shapeable conduit may have a circumferentially flexible wall extending along a longitudinal axis. The wall may, for example, define a lumen configured to receive one or more cables. Multiple longitudinally extendable manually deformable axial stiffening members may, for example, be circumferentially distributed in the wall. A releasable coupling mechanism may, for example, have at least two mating engagement members. The engagement members may, for example, releasably engage in an enclosed state such that the wall circumscribes the lumen. The engagement members may, for example, be tangentially separable into an open state such that the cables can be radially transferred between an interior and an exterior of the lumen. Various embodiments may advantageously be manipulated such that the axial stiffening members cause the flexible wall to retain cables enclosed within the lumen in a desired configuration.Type: GrantFiled: July 22, 2021Date of Patent: April 23, 2024Inventor: Eshwar Chandrasekhar
-
Patent number: 11967580Abstract: Microelectronic assemblies, and related devices and methods, are disclosed herein. For example, in some embodiments, a microelectronic assembly may include a package substrate, a first die coupled to the package substrate with first interconnects, and a second die coupled to the first die with second interconnects, wherein the second die is coupled to the package substrate with third interconnects, a communication network is at least partially included in the first die and at least partially included in the second die, and the communication network includes a communication pathway between the first die and the second die.Type: GrantFiled: September 29, 2022Date of Patent: April 23, 2024Assignee: Intel CorporationInventors: Adel A. Elsherbini, Amr Elshazly, Arun Chandrasekhar, Shawna M. Liff, Johanna M. Swan
-
Publication number: 20240128255Abstract: Microelectronic assemblies, and related devices and methods, are disclosed herein. For example, in some embodiments, a microelectronic assembly may include a package substrate having a first surface and an opposing second surface, and a die secured to the package substrate, wherein the die has a first surface and an opposing second surface, the die has first conductive contacts at the first surface and second conductive contacts at the second surface, and the first conductive contacts are coupled to conductive pathways in the package substrate by first non-solder interconnects.Type: ApplicationFiled: December 27, 2023Publication date: April 18, 2024Applicant: Intel CorporationInventors: Adel A. Elsherbini, Shawna M. Liff, Johanna M. Swan, Arun Chandrasekhar
-
Patent number: 11960943Abstract: Some implementations described herein relate to a system that is configured to obtain one or more event logs associated with a tenant of the system. The system may be configured to determine, based on the one or more event logs, an event rate associated with the tenant and thereby determine, based on the event rate, a rotation interval. The system may be configured to cause, based on the rotation interval, a data structure to be generated for storing event logs associated with the tenant that are obtained during a time window. The system may be configured to obtain, within the time window, one or more additional event logs associated with the tenant and to cause, based on obtaining the one or more additional event logs within the time window, the one or more additional event logs to be stored in the data structure.Type: GrantFiled: March 18, 2022Date of Patent: April 16, 2024Assignee: Juniper Networks, Inc.Inventors: Jayanthi R, Bhaskar T. Reddy, Chandrasekhar A
-
Patent number: 11954207Abstract: A system and method are disclosed for delegating, by a resource-constrained device, a privilege to a basic input/output system, wherein the privilege allows the basic input/output system to authenticate an endpoint device on behalf of the resource-constrained device. The system and method also includes generating an asymmetric security key that includes a private key and a public key and transmitting the public key to the basic input/output system, wherein the public key is included in a proxy certificate generated by the basic input/output system. In addition, the system and method includes establishing a secure session between the basic input/output system and the endpoint device using the private key and the proxy certificate, wherein the secure session is used by the basic input/output system to authenticate and verify that the endpoint device is authorized to perform an operation.Type: GrantFiled: September 17, 2021Date of Patent: April 9, 2024Assignee: Dell Products L.P.Inventors: Viswanath Ponnuru, Chandrashekar Nelogal, Chandrasekhar Mugunda, Dharma Bhushan Ramaiah, Shinose Abdul Rahiman, Vineeth Radharisknan, Rama Rao Bisa
-
Patent number: 11956116Abstract: Network management techniques are described. A controller device of this disclosure manages a device group of a network. The controller device includes processing circuitry in communication with the memory, the processing circuitry being configured to receive, using a programmable diagnosis service executed by the processing circuitry, a programming input, to form, using the programmable diagnosis service, based on the programming input, a resource definition graph that models interdependencies between a plurality of resources supported by the device group, to detect, using the programmable diagnosis service, an event affecting a first resource of the plurality of resources, and to identify, using the programmable diagnosis service, based on the interdependencies modeled in the resource definition graph formed based on the programming input, a root cause event that caused the event affecting the first resource, the root cause event occurring at a second resource of the plurality of resources.Type: GrantFiled: December 15, 2022Date of Patent: April 9, 2024Assignee: Juniper Networks, Inc.Inventors: Jayanthi R, Chandrasekhar A, Javier Antich, Sri Sampath Mallipudi, Premchandar N, Harsha Lakshmikanth, Gregory A. Sidebottom, Zhifei Fang
-
Publication number: 20240103849Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to receive a firmware update image associated with the firmware device, determine that the firmware update image possesses a critical sub-image portion, and schedule a firmware update to be performed in the future on the firmware device using the one firmware update image. The firmware update image conforms to a Platform Level Data Model (PLDM) protocol that is configured to perform rebootless firmware updates.Type: ApplicationFiled: September 27, 2022Publication date: March 28, 2024Applicant: Dell Products, L.P.Inventors: Manjunath Vishwanath, Rama Rao Bisa, Pavan Kumar Gavvala, Manjunath AM, Shantanu Kumar Pradhan, Chandrasekhar R
-
Publication number: 20240103844Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include first and second Remote Access Controllers (RACs) that each includes computer-executable instructions to receive a firmware update image associated with the firmware device, and gather data associated with a behavior of the firmware device following the firmware update after the firmware device is updated with the firmware update image. Using the data, the instructions generate a score for the firmware update based at least in part, on the behavior of the IHS following the firmware update.Type: ApplicationFiled: September 23, 2022Publication date: March 28, 2024Applicant: Dell Products, L.P.Inventors: Chandrasekhar R, Rochak Gupta, Rama Rao Bisa, Deepaganesh Paulraj, Sandesh Hadhimane Balakrishna
-
Publication number: 20240103846Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include first and second Remote Access Controllers (RACs) that each includes computer-executable instructions to receive, by the first RAC, a firmware update image associated with the firmware device, and commence transfer of the firmware update image to the firmware device to perform a firmware update on the firmware device using an update mode that restricts another update request to the firmware device until the first RAC finishes or cancels the firmware update. When the transfer is halted prior to completion, the program instructions cause the second RAC to determine where the firmware update image transfer was halted, and commence transferring the remainder of the firmware update image that has not yet been transferred to the firmware device.Type: ApplicationFiled: September 23, 2022Publication date: March 28, 2024Applicant: Dell Products, L.P.Inventors: Deepaganesh Paulraj, Rama Rao Bisa, Rajeshkumar Ichchhubhai Patel, Mahesh Babu Ramaiah, Pavan Kumar Gavvala, Naveen Karthick Chandrasekaran, Chandrasekhar R
-
Publication number: 20240103848Abstract: Embodiments of systems and methods to identify and remediate performance degradation during firmware update in a cluster environment are described. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to receive a request to perform a firmware update on a plurality of computing devices of a computing cluster, obtain an inventory of the computing cluster, and determine a scheduling sequence for updating the computing devices so that the performance of the cluster is optimally maintained. The instructions may then perform the firmware update on each of the computing devices according to the determined scheduling sequence.Type: ApplicationFiled: September 26, 2022Publication date: March 28, 2024Applicant: Dell Products, L.P.Inventors: Pavan Kumar Gavvala, Chandrasekhar R, Rama Rao Bisa, Shantanu Kumar Pradhan
-
Publication number: 20240106762Abstract: An example computing device includes: a wireless communications interface configured to connect to a network deployed by a plurality of access points; a controller for the wireless communications interface, the controller configured to: detect a roaming condition that initiates a roam from a home access point to a new access point; in response to the roaming condition, send a pause indicator to a second computing device, the pause indicator configured to cause the second computing device to pause a packet exchange with the computing device; roam to the new access point; and resume the packet exchange between the computing device and the second computing device via the new access point.Type: ApplicationFiled: September 28, 2022Publication date: March 28, 2024Inventors: Surya Kantha Rao Kandoti, Venkata Aneel Kumar Inuganti, Darpan Majumder, Mahesh Kumar Edar, Naga Babu Parsi, Mahendiran Balasubramaniyam, HariPrasad Mosuru Chandrasekhar, Phanindra Kumar Gollapudi
-
Publication number: 20240104527Abstract: A network-agnostic processor (NAP) is configured to receive, from a first account-holding institution (AHI), an alias request to initiate a transfer. The NAP queries directory servers to retrieve one or more account numbers associated with the alias, transmits a response to the first AHI including the one or more account numbers, receives a P2P transfer request specifying one of the account numbers, and transmits an approval to an originating institution. The approval specifies one or more payment networks capable of clearing and settling funds between an initiating account and the specified account number. The originating institution is one of the first AHI or a second AHI associated with the specified account number. The NAP causes initiation of clearing and settlement of a funds transfer between the initiating account and the specified account number via a designated settlement system network (DSSN) that is one of the specified payment networks.Type: ApplicationFiled: September 28, 2022Publication date: March 28, 2024Inventors: Elena Gladkaya, Michael Gradwell, Faizan Husain, Kuldeep Kumar, Arundhati Chandrasekhar
-
Publication number: 20240095351Abstract: In one set of embodiments, an enhanced next generation anti-virus (NGAV) system is provided. In certain embodiments, this system includes a hypervisor-level agent that backs up VM data only when an instance of a guest application running in the VM has been flagged by the NGAV system as being potentially malicious (rather than on a constant, proactive basis). Further, the hypervisor-level agent performs this backup only with respect to data modified by that specific guest application instance (rather than backing up all data modified by the VM) and writes the backed-up data to a secure storage location which is inaccessible to the guest. The combination of these features addresses many of the problems and inefficiencies of existing NGAV systems.Type: ApplicationFiled: September 19, 2022Publication date: March 21, 2024Inventors: Shirish VIJAYVARGIYA, Vasantha Kumar DHANASEKAR, Bidesh CHITNIS, Nakul Ranjan OGALE, Bharath Kumar CHANDRASEKHAR, Boris WEISSMAN, Robert James SPEAKER
-
Publication number: 20240097968Abstract: An example method includes obtaining, by one or more processors, data indicating resource dependencies between a plurality of resources in a network and event dependencies between a plurality of network events and one or more of the plurality of resources; generating a Bayesian model based on resource types of the plurality of resources and event types of the plurality of network events; receiving an indication of a fault in the network; collecting fault data and generating, based on the Bayesian model and the fault data, a plurality of root cause hypotheses for the fault; ordering the plurality of root cause hypotheses based on respective root cause probabilities associated with the plurality of root cause hypotheses; and outputting the ordered plurality of root cause hypotheses.Type: ApplicationFiled: November 29, 2023Publication date: March 21, 2024Inventors: Gert Grammel, Jayanthi R, Chandrasekhar A
-
Publication number: 20240095899Abstract: The present disclosure includes edge defect detection via image analytics. A method includes identifying an image of an edge of a susceptor pocket formed by a susceptor of a substrate processing system. The method further includes predicting, based on the image, whether property values of the edge of the susceptor meet threshold values. The method further includes, responsive to the property values of the edge meeting threshold values, causing performance of a corrective action associated with the susceptor.Type: ApplicationFiled: September 21, 2022Publication date: March 21, 2024Inventors: Yash Chhabra, Abyaya Dhar, Joseph Liu, Yi Nung Wu, Boon Sen Chan, Sidda Reddy Kurakula, Chandrasekhar Roy
-
Publication number: 20240097983Abstract: A system identifies a source intent policy model that is associated with a graph having a plurality of source nodes connected by a plurality of source edges, identifies a set of source nodes of the plurality of source nodes, and translates the set of source nodes to generate a set of target nodes. The system identifies a subset of target nodes, of the set of target nodes, that are not included in a target intent policy model that is associated with a graph having a plurality of target nodes connected by a plurality of target edges. The system determines a hierarchical order associated with the subset of target nodes and the plurality of target node, and causes the target intent policy model to be updated to include the subset of target nodes and the plurality of target nodes, such that the graph is ordered according to the hierarchical order.Type: ApplicationFiled: December 22, 2022Publication date: March 21, 2024Inventors: Chandrasekhar A, Jayanthi R, Premchandar N