Patents by Inventor Deepak Gupta

Deepak Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170004308
    Abstract: A technique for detecting malware in an executable allows unpacking of a packed executable before determining whether the executable is malware. In systems with hardware assisted virtualization, hardware virtualization features may be used to iteratively unpack a packed executable in a controlled manner without needing knowledge of a packing technique. Once the executable is completely unpacked, malware detection techniques, such as signature scanning, may be employed to determine whether the executable contains malware. Hardware assisted virtualization may be used to facilitate the scanning of the run-time executable in memory.
    Type: Application
    Filed: September 16, 2016
    Publication date: January 5, 2017
    Inventor: Deepak Gupta
  • Publication number: 20160366628
    Abstract: Systems and methods for a cell change based on target cell performance are disclosed. In some embodiments, a method of operation of a network node in a cellular communications network comprises receiving a measurement report from a wireless device having a serving cell, the measurement report comprising an indication that another cell is better than the serving cell such that the other cell is identified as a target cell for a cell change and the serving cell is identified as a source cell for the cell change. The method further comprises determining whether to perform the cell change from the source cell to the target cell based on one or more parameters indicative of a performance of the target cell. The method further comprises performing the cell change upon determining that the cell change from the source cell to the target cell should be performed.
    Type: Application
    Filed: June 10, 2015
    Publication date: December 15, 2016
    Inventors: Debasish Sarkar, Deepak Gupta, Ayan Sen, Ganesh Kumar
  • Patent number: 9471783
    Abstract: A technique for detecting malware in an executable allows unpacking of a packed executable before determining whether the executable is malware. In systems with hardware assisted virtualization, hardware virtualization features may be used to iteratively unpack a packed executable in a controlled manner without needing knowledge of a packing technique. Once the executable is completely unpacked, malware detection techniques, such as signature scanning, may be employed to determine whether the executable contains malware. Hardware assisted virtualization may be used to facilitate the scanning of the run-time executable in memory.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: October 18, 2016
    Assignee: McAfee, Inc.
    Inventor: Deepak Gupta
  • Publication number: 20160159070
    Abstract: A master used for micro contact printing and methods of creating thereof are disclosed. The master may include a permeable membrane removed from a surface of a media plate having one or more microbial nutrients. The master may also include a plurality of microbes positioned upon at least a portion of the permeable membrane. The microbes may be grown in a vertical direction to form a patterned surface.
    Type: Application
    Filed: March 14, 2014
    Publication date: June 9, 2016
    Inventors: Deepak GUPTA, Balaji PRAKASH, Sunita MEHTA, Saravanan MURUGESON
  • Patent number: 9245097
    Abstract: A system and method for locking an application to specific hardware device without storing device or user information on server. A lock registration is performed during the first usage of the application where the application sends a unique value to the server through secured channel. This unique value is combination of user specific information and device information. The server receives the unique value, and sends the encrypted value to the device, which is stored in predefined location of device. During lock validation, which is initiated during every request to the server or on every session creation, the device unique value and encrypted value is sent to the server. The server receives it, decrypts the encrypted value, and compares with the received unique value. If both the values are same, the server validates application instance by sending the response to the device else error message is sent to the device.
    Type: Grant
    Filed: September 17, 2014
    Date of Patent: January 26, 2016
    Assignee: Infosys Limited
    Inventor: Deepak Gupta
  • Patent number: 9230028
    Abstract: A platform independent system for performing a search request provided by a user. The platform independent system includes a consuming application executing on a first computer that handles the search request provided by a user. The search request includes instructions to retrieve selected data from a second application. A web interface module executing on a second computer receives the search request and formulates search routines regardless of the search engine logic or infrastructure of the consuming application to connect to a data model that contains the selected data for retrieval. The web interface module structures data associated with the search request to be compatible for searching with the data model.
    Type: Grant
    Filed: June 18, 2014
    Date of Patent: January 5, 2016
    Assignee: FMR LLC
    Inventors: Deepak Gupta, Sathish Kumar Chellan, Kannan Ponnusamy, Srikara Uplady Manjunatha, Anoop Athreyasa Lakshmisha, Edward L. Francis, III, Christopher Gardiner
  • Publication number: 20150370894
    Abstract: A platform independent system for performing a search request provided by a user. The platform independent system includes a consuming application executing on a first computer that handles the search request provided by a user. The search request includes instructions to retrieve selected data from a second application. A web interface module executing on a second computer receives the search request and formulates search routines regardless of the search engine logic or infrastructure of the consuming application to connect to a data model that contains the selected data for retrieval. The web interface module structures data associated with the search request to be compatible for searching with the data model.
    Type: Application
    Filed: June 18, 2014
    Publication date: December 24, 2015
    Inventors: Deepak Gupta, Sathish Kumar Chellan, Kannan Ponnusamy, Srikara Uplady Manjunatha, Anoop Athreyasa Lakshmisha, Edward L. Francis, III, Christopher Gardiner
  • Publication number: 20150184131
    Abstract: Human somatic cells are reprogrammed to become induced pluripotent stem cells (iPS cells) by the introduction of a minicircle DNA vector. Cells of interest include adipose stem cells.
    Type: Application
    Filed: January 6, 2015
    Publication date: July 2, 2015
    Inventors: Joseph Wu, Michael T. Longaker, Mark A. Kay, Ning Sung, FangJun Jia, Zhi-Ying Chen, Nicholas Panetta, Deepak Gupta
  • Publication number: 20150082026
    Abstract: A system and method for locking an application to specific hardware device without storing device or user information on server. A lock registration is performed during the first usage of the application where the application sends a unique value to the server through secured channel. This unique value is combination of user specific information and device information. The server receives the unique value, and sends the encrypted value to the device, which is stored in predefined location of device. During lock validation, which is initiated during every request to the server or on every session creation, the device unique value and encrypted value is sent to the server. The server receives it, decrypts the encrypted value, and compares with the received unique value. If both the values are same, the server validates application instance by sending the response to the device else error message is sent to the device.
    Type: Application
    Filed: September 17, 2014
    Publication date: March 19, 2015
    Applicant: INFOSYS LIMITED
    Inventor: Deepak Gupta
  • Publication number: 20150074318
    Abstract: In certain embodiments, methods and systems for multimedia data processing are provided. In an embodiment, a method for processing multimedia data includes defining one or more pixel block regions in a first cache so as to cache a plurality of reference pixel blocks corresponding to reference data. A reference pixel block from among the plurality of reference pixel blocks is assigned to a pixel block region from among the one or more pixel block regions based on a predetermined criterion. The reference pixel block is associated with a tag based on the pixel block region so as to facilitate a search of the reference data in order to process a plurality of pixel blocks associated with a multimedia frame of the multimedia data.
    Type: Application
    Filed: November 12, 2014
    Publication date: March 12, 2015
    Inventors: Hetul Sanghvi, Mullangi Venkata Ratna Reddy, Ajit Deepak Gupta, Arindam Basak
  • Patent number: 8962331
    Abstract: Human somatic cells are reprogrammed to become induced pluripotent stem cells (iPS cells) by the introduction of a minicircle DNA vector. Cells of interest include adipose stem cells.
    Type: Grant
    Filed: February 1, 2011
    Date of Patent: February 24, 2015
    Assignee: The Board of Trustees of the Leland Stanford Junior University
    Inventors: Joseph Wu, Michael T. Longaker, Mark A. Kay, Ning Sung, FangJun Jia, Zhi-Ying Chen, Nicholas Panetta, Deepak Gupta
  • Publication number: 20140283058
    Abstract: A technique for detecting malware in an executable allows unpacking of a packed executable before determining whether the executable is malware. In systems with hardware assisted virtualization, hardware virtualization features may be used to iteratively unpack a packed executable in a controlled manner without needing knowledge of a packing technique. Once the executable is completely unpacked, malware detection techniques, such as signature scanning, may be employed to determine whether the executable contains malware. Hardware assisted virtualization may be used to facilitate the scanning of the run-time executable in memory.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Inventor: Deepak Gupta
  • Patent number: 8429237
    Abstract: A method, a system and a computer program product for managing an electronic mail in a communication network is disclosed. A plurality of recursive parameters in a command list of a communication protocol associated with the electronic mail is provided. At least one of the recursive parameters is a DATA parameter specifying information of the electronic mail. The command list is partitioned into a plurality of command sub-lists using the plurality of recursive parameters. At least one property corresponding to each of the command sub-lists is preserved. An interface for selecting each of the command sub-lists is provided and at least one of the command sub-lists is selected. At least one property corresponding to each of the command sub-lists is identified.
    Type: Grant
    Filed: May 25, 2010
    Date of Patent: April 23, 2013
    Assignee: International Business Machines Corporation
    Inventor: Deepak Gupta
  • Publication number: 20110296316
    Abstract: A method, a system and a computer program product for managing an electronic mail in a communication network is disclosed. A plurality of recursive parameters in a command list of a communication protocol associated with the electronic mail is provided. At least one of the recursive parameters is a DATA parameter specifying information of the electronic mail. The command list is partitioned into a plurality of command sub-lists using the plurality of recursive parameters. At least one property corresponding to each of the command sub-lists is preserved. An interface for selecting each of the command sub-lists is provided and at least one of the command sub-lists is selected. At least one property corresponding to each of the command sub-lists is identified.
    Type: Application
    Filed: May 25, 2010
    Publication date: December 1, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Deepak Gupta
  • Publication number: 20110244566
    Abstract: Human somatic cells are reprogrammed to become induced pluripotent stem cells (iPS cells) by the introduction of a minicircle DNA vector. Cells of interest include adipose stem cells.
    Type: Application
    Filed: February 1, 2011
    Publication date: October 6, 2011
    Inventors: Joseph Wu, Michael T. Longaker, Mark A. Kay, Ning Sung, FangJun Jia, Zhi-Ying Chen, Nicholas Panetta, Deepak Gupta
  • Patent number: 7971253
    Abstract: A method for detecting address rotation by a device in a communication network includes receiving, at a first time, a first message transmitted by the device, receiving, at a second time, a second message transmitted by the device, and processing the first message to determine a first sequence number and a first transmitter address. The method also includes processing the second message to determine a second sequence number and a second transmitter address, determining that the second transmitter address is different from the first transmitter address, determining a time gap between the first time and the second time, and determining, based, in part, on the time gap, a sequence threshold value. The method further includes determining a sequence difference between the first sequence number and the second sequence number, determining that the sequence difference is less than the sequence threshold value, and providing an indication of address rotation by the device.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: June 28, 2011
    Assignee: AirTight Networks, Inc.
    Inventor: Deepak Gupta
  • Patent number: 7953805
    Abstract: A method for creating an electronic mailing group. The method is implemented via execution of computer readable program code on a processor of a computer system. A first input is stored in a computer-readable storage medium. The first input includes a first group name for distributing a first electronic mail message. The first group name is associated with a plurality of electronic mail addresses, based on a first set of received instructions. The first group name represents the addresses. After associating, information associated with the first group name is stored in the storage medium. The information is associated with each address of the addresses and designates each address of the addresses as a first recipient type selected from: To recipient, Carbon Copy recipient, and Blind Carbon Copy recipient. At least one address of the addresses is designated as a Carbon Copy recipient or a Blind Carbon Copy recipient.
    Type: Grant
    Filed: March 20, 2007
    Date of Patent: May 31, 2011
    Assignee: International Business Machines Corporation
    Inventors: Deepak Gupta, Namita Gupta
  • Patent number: 7930415
    Abstract: A system for enabling the use of valid authentication certificates when the public key and private keys of any of the certifying authority have expired. The enabling by the system includes obtaining a server certifying authority chain (SCAC) certificate by the server from the certifying authority, presenting the original valid authentication certificate along with the said server certifying authority chain certificate by the server to the browser during the SSL handshake, accepting the transaction by the browser after verification of the original authentication certificate using the expired public key of the certifying authority, and verifying the said SCAC certificate using the new public key of the said certifying authority.
    Type: Grant
    Filed: May 1, 2008
    Date of Patent: April 19, 2011
    Assignee: International Business Machines Corporation
    Inventors: Deepak Gupta, Vamsavardhana Reddy Chillakuru
  • Patent number: 7770011
    Abstract: The present invention provides in a method for providing secure authentication using digital certificates, an improvement to enable the selective transfer of authentication data. The said method comprises presentation of basic authentication data certified by an accepted certifying authority, at the commencement of a secure transaction and transfer of additional individual authentication data units against specific requests, as and when required, thereby eliminating the risks associated with providing any authentication data that is not required for a particular transaction. The instant invention also provides a system and configured computer program product for carrying out the above method.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: August 3, 2010
    Assignee: International Business Machines Corporation
    Inventor: Deepak Gupta
  • Patent number: 7770012
    Abstract: The present invention provides in a method for providing secure authentication using digital certificates, an improvement to enable the selective transfer of authentication data. The said method comprises presentation of basic authentication data certified by an accepted certifying authority, at the commencement of a secure transaction and transfer of additional individual authentication data units against specific requests, as and when required, thereby eliminating the risks associated with providing any authentication data that is not required for a particular transaction. The instant invention also provides a system and configured computer program product for carrying out the above method.
    Type: Grant
    Filed: November 27, 2007
    Date of Patent: August 3, 2010
    Assignee: International Business Machines Corporation
    Inventor: Deepak Gupta