Patents by Inventor Gaurav Gupta

Gaurav Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10298576
    Abstract: A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device. The device may obtain a file key for encrypting the file and a security key for encrypting the file key. The security key may be obtained based on the unique identifier. The device may encrypt the file, using the file key, to create an encrypted file. The device may encrypt the file key, using the security key, to create an encrypted file key. The device may provide the encrypted file and the encrypted file key for storage by a storage device.
    Type: Grant
    Filed: October 6, 2017
    Date of Patent: May 21, 2019
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Guanqun Bao, Manish Sharma, Devin Blong, Kevin Flores, Tushar Chaudhary, Gaurav Gupta
  • Publication number: 20190149415
    Abstract: Systems, methods, and computer-readable media for validating routing table information in a network. A network assurance appliance may be configured to retrieve implemented MP-BGP configuration data from a plurality of nodes in a network fabric and reference MP-BGP configuration data from a network controller. The network assurance appliance compares the implemented MP-BGP configuration data with the reference MP-BGP configuration data and determines that there is a MP-BGP misconfiguration of the implemented MP-BGP configuration data based on differences in the implemented MP-BGP configuration data and the reference MP-BGP configuration data.
    Type: Application
    Filed: January 9, 2019
    Publication date: May 16, 2019
    Inventors: Ayas Pani, Sanchay, Gaurav Gupta
  • Patent number: 10282458
    Abstract: An event-notification system provides for monitoring resource-status parameters so as to repeatedly generate resource-status values for each of N resource-status parameters applicable to the resources. Each datapoint specifies a resource, a time of collection, and the values of parameters for the resource at the time. The datapoints are represented in an N-dimensional space, including N dimensions corresponding to the resource-status parameters and one dimension devoted to time. The datapoints are clustered on a proximity basis. The clusters are manually classified as Normal or Ack-Abnormal. A machine-learning engine develops a model that allows the classifications to be automated. Alerts are sent for respective Abnormal clusters rather than for each abnormal datapoint, thus reducing the amount of data an administrator must deal with to address potential problems.
    Type: Grant
    Filed: September 7, 2015
    Date of Patent: May 7, 2019
    Assignee: VMWARE, INC.
    Inventors: Gaurav Gupta, Mohak Rajendra, Arunvijai Sridharan, Vibhu Rastogi
  • Publication number: 20190124088
    Abstract: Techniques for ensuring verification before transmission of electronic messages are disclosed herein. In some embodiments, a computer-implemented method comprises: transmitting a confirmation request message to an e-mail address stored in a database of an online service in association with a digital representation of a first user of the online service; subsequent to transmitting the confirmation request message, causing a selectable option to send a user-to-user message to a second user via the online service to be displayed on the computing device of the first user; receiving, from the computing device of the first user, a selection of the option to send the user-to-user message to the second user; determining that the confirmation of the e-mail address has not been received; and preventing a transmission of the user-to-user message to the second user based on the determining that the confirmation of the e-mail address has not been received.
    Type: Application
    Filed: October 25, 2017
    Publication date: April 25, 2019
    Inventors: Ajay Datta, Shrinivas Rameshrao Devshatwar, Neena Teresa Jose, Gaurav Gupta
  • Patent number: 10271303
    Abstract: Aspects of the subject disclosure may include, for example, determining a request to transfer data to a group of wireless communication devices within an area. Wireless base stations of a wireless mobility network are identified, responsive to the request, wherein the wireless base stations provide wireless communication services within the area, including a Multimedia Broadcast Multicast Service (MBMS) service. A wireless transmission is facilitated of a first broadcast message by the wireless base stations, wherein the first broadcast message identifies the group of wireless communication devices. The broadcast message is transmitted by way of the MBMS service of the wireless communication services. The first broadcast message initiates a state transition to an active state for a plurality of wireless communication devices of the group of wireless communication devices configured in an idle state. Other embodiments are disclosed.
    Type: Grant
    Filed: January 18, 2018
    Date of Patent: April 23, 2019
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Gaurav Gupta, Rajendra Prasad Kodaypak, Vivek Mhatre
  • Publication number: 20190113889
    Abstract: A wearable device and a method for performing one or more actions using a wearable device are disclosed. The wearable device includes a bezel ring, a watch dial a flexible ring, and a plurality of springs. The bezel ring includes a plurality of holes along a circumference of the bezel ring for placement of a plurality of magnets. The watch dial includes an outer periphery with another plurality of holes at a uniform distance. The watch dial also includes an inner periphery to house inertial sensors at a predetermined position. The flexible ring placed in between an inner surface of the bezel ring and the watch dial. A plurality of springs are placed within the other plurality of holes of the outer periphery of the watch dial. The bezel ring is configured to support at least one of tilting, shifting and rotation over the watch dial.
    Type: Application
    Filed: September 20, 2018
    Publication date: April 18, 2019
    Inventors: Kapil Kumar, Arindam Mondal, Gaurav Gupta
  • Publication number: 20190087419
    Abstract: Some examples relate to updating of metadata of objects in a file system. In an example, in response to an invocation by an application to update metadata related to a plurality of objects of a file system, an API may initialize a new metadata deduplication database based on an active metadata deduplication database that includes the metadata related to the plurality of objects and a deduplication key linked with the metadata. API may add new metadata to the new metadata deduplication database. API may associate a new deduplication key with the new metadata in the new metadata deduplication database. API may initialize a new translation database. API may add the new deduplication key to the new translation database. API may associate the respective object IDs of the plurality of objects with the new deduplication key in the new translation database.
    Type: Application
    Filed: September 21, 2017
    Publication date: March 21, 2019
    Inventors: Venkataraman Kamalaksha, Manoj Thankappan Varadamma, Anand Satish Phatak, Gaurav Gupta
  • Publication number: 20190081850
    Abstract: Systems, methods, and computer-readable media for aggregating and presenting network events in a network environment. In some embodiments, a system can maintain event correlation rules for aggregating \network events occurring in a network based on characteristics of previously occurring network events. Network events occurring in the specific network environment can be identified. The network events can be aggregated to form an aggregated network event using the event correlation rules maintained based on the characteristics of previously occurring network events. The aggregated network event can subsequently be presented to a user.
    Type: Application
    Filed: September 13, 2017
    Publication date: March 14, 2019
    Inventors: Shadab Nazar, Navneet Yadav, Azeem Suleman, Pavan Mamillapalli, John Thomas Monk, Chetan Narsude, Navjyoti Sharma, Gaurav Gupta
  • Patent number: 10218572
    Abstract: Systems, methods, and computer-readable media for validating routing table information in a network. A network assurance appliance may be configured to retrieve implemented MP-BGP configuration data from a plurality of nodes in a network fabric and reference MP-BGP configuration data from a network controller. The network assurance appliance compares the implemented MP-BGP configuration data with the reference MP-BGP configuration data and determines that there is a MP-BGP misconfiguration of the implemented MP-BGP configuration data based on differences in the implemented MP-BGP configuration data and the reference MP-BGP configuration data.
    Type: Grant
    Filed: July 27, 2017
    Date of Patent: February 26, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Ayas Pani, Sanchay Harneja, Gaurav Gupta
  • Publication number: 20190057046
    Abstract: An electronic device is described that includes: a host processor comprising at least one input port configured to receive a plurality of data signals on a plurality of virtual channels; and a memory operably coupled to the host processor and configured to receive and store data. The host processor is configured to enable and disable individual virtual channels from the plurality of virtual channels and is configured to only store data in memory associated with enabled virtual channels, and discard data from disabled channels.
    Type: Application
    Filed: May 17, 2018
    Publication date: February 21, 2019
    Inventors: Stephan Matthias HERRMANN, Gaurav GUPTA, Naveen Kumar JAIN, Shreya SINGH
  • Publication number: 20190052731
    Abstract: A device may receive a request for a mobile device to obtain an application. The request may include a mobile device identifier for the mobile device. The device may send, to the mobile device, a link to a web page. The device may receive, from the mobile device, a request for the web page. The device may send, to the mobile device, a redirect to a software distribution platform to obtain the application from the software distribution platform. The device may receive a registration identifier for the mobile device after the mobile device obtains the application from the software distribution platform. The device may send, to a message server, a request for a message to be sent to the mobile device. The request may be based on the registration identifier and the application.
    Type: Application
    Filed: October 12, 2018
    Publication date: February 14, 2019
    Inventors: Guanqun BAO, Okeno R. PALMER, Saumitra KUMAR, Harsha Vardhana Reddy HARDHAGARI, Gaurav GUPTA
  • Patent number: 10187251
    Abstract: Disclosed are various embodiments for event processing architecture for real-time user engagement. Events that describe user interactions with client applications are analyzed in real-time when received in a data stream. The events are compared to patterns specified, for example, by administrators. If a pattern is matched based on a comparison to events received in the data stream, a predetermined action may be performed. The processing of events may be performed by a compute engine, which may include a virtual machine or a thread implemented in a parallel computing arrangement.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: January 22, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Raghunathan Kothandaraman, Mark Aran Aiken, Sasanka Rajaram, Deep Dixit, Gaurav Gupta, Ankit Kumar, Dhaval Parmar
  • Publication number: 20180373555
    Abstract: Specialized, service optimized virtual machines are assigned to handle specific types of Internet of Things (IoT) devices. An IoT context mapping policy engine within the context of a virtualized network function manages IoT context mapping policy functions in load balancers. The IoT context mapping policy functions select service optimized virtual machines based on IoT device IDs, and assign those virtual machines to handle the devices. The IoT context mapping policy functions provide load data to the IoT context mapping policy engine. Based on the load data, the IoT context mapping policy engine maintains appropriate scaling by creating or tearing down instances of the virtual machines.
    Type: Application
    Filed: August 4, 2018
    Publication date: December 27, 2018
    Inventors: Gaurav Gupta, Vivek Mhatre
  • Publication number: 20180367411
    Abstract: Aspects of the technology provide solutions for determining a time period (“epoch”) required to monitor or analyze a tenant network. Some implementations of the technology include a process for making automatic epoch determinations, which includes steps for identifying one or more network parameters for a tenant network, analyzing the tenant network using the network parameters to discover one or more configuration settings of the tenant network, and determining a first epoch for the tenant network, the first epoch corresponding with a period of time to complete analysis of the tenant network using the network parameters. In some aspects, the process can further include steps for generating a tenant profile for the tenant network, the tenant profile based on the network parameters, the first epoch, and the one or more configuration settings of the tenant network. Systems and machine-readable media are also provided.
    Type: Application
    Filed: October 24, 2017
    Publication date: December 20, 2018
    Inventors: Chetan Narsude, Gaurav Gupta, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
  • Publication number: 20180367412
    Abstract: Systems, methods, and computer-readable media for discovering a network's topology and health. In some examples, a system can obtain, from at least one of a plurality of controllers on a network, a logical model of the network, the logical model including configurations of one or more objects defined for the network. Based on the logical model, the system can identify a respective location of the plurality of controllers in the network and a plurality of nodes in a fabric of the network. Based on the respective location of the plurality of controllers and plurality of nodes, the system can poll the plurality of controllers and plurality of nodes for respective status information, and determine a health and topology of the network based on the logical model, the respective location, and respective status information.
    Type: Application
    Filed: October 23, 2017
    Publication date: December 20, 2018
    Inventors: Divjyot Sethi, Chandra Nagarajan, Ramana Rao Kompella, Gaurav Gupta, Sundar Iyer
  • Publication number: 20180365061
    Abstract: Aspects of the technology provide systems and methods for interleaving a processing task in a network monitoring appliance. A process of the technology could include steps for identifying operators in the network monitoring appliance, wherein the operators are sequentially arranged to form a processing pipeline, determining an epoch for the processing pipeline, wherein the epoch corresponds with a time duration required for a processing task to traverse the pipeline, and determining a time window in which a supplemental processing task can be interleaved into the processing pipeline, wherein the time window is based on the epoch. Machine-readable media are also provided.
    Type: Application
    Filed: October 27, 2017
    Publication date: December 20, 2018
    Inventors: Chetan Narsude, Gaurav Gupta, Azeem Suleman, Shadab Nazar, Pavan Mamillapalli, Sundar Iyer
  • Publication number: 20180367388
    Abstract: Systems, methods, and computer-readable media for validating routing table information in a network. A network assurance appliance may be configured to retrieve implemented MP-BGP configuration data from a plurality of nodes in a network fabric and reference MP-BGP configuration data from a network controller. The network assurance appliance compares the implemented MP-BGP configuration data with the reference MP-BGP configuration data and determines that there is a MP-BGP misconfiguration of the implemented MP-BGP configuration data based on differences in the implemented MP-BGP configuration data and the reference MP-BGP configuration data.
    Type: Application
    Filed: July 27, 2017
    Publication date: December 20, 2018
    Inventors: Ayas Pani, Sanchay Harneja, Gaurav Gupta
  • Publication number: 20180365096
    Abstract: Aspects of the technology provide methods for aggregating error log data between multiple devices in a network monitoring appliance. A method of the technology can include steps for identifying a plurality of operators running in a network monitoring appliance, instantiating a plurality of sensors, wherein each of the plurality of sensors is associated with a respective one of the plurality of operators, and wherein each sensor is configured to capture error log data of its corresponding operator. In some aspects, the method can further include steps for aggregating error log data from two or more of the plurality of sensors. Systems and machine-readable media are also provided.
    Type: Application
    Filed: October 23, 2017
    Publication date: December 20, 2018
    Inventors: Pavan Mamillapalli, Shadab Nazar, Chetan Narsude, Gaurav Gupta, Azeem Suleman, Jagdev Singh Tur, Navjyoti Sharma
  • Publication number: 20180367435
    Abstract: Aspects of the technology provide methods for simulating a failure in a tenant network. In some aspects, a monitoring appliance of the disclosed technology can be configured to carry out operations for receiving packets at a virtual device in the monitoring appliance, from a corresponding network device in the tenant network, and instantiating a firewall at the virtual device, wherein the firewall is configured to selectively block traffic routed from the network device to the virtual device in the monitoring appliance. The monitoring appliance can simulate failure of the network device by blocking traffic from the network device to the virtual device using the firewall, and analyze the tenant network to determine a predicted impact a failure of the network device would have on the tenant network. Systems and machine-readable media are also provided.
    Type: Application
    Filed: September 22, 2017
    Publication date: December 20, 2018
    Inventors: Shadab Nazar, Pavan Mamillapalli, Chetan Narsude, Gaurav Gupta, Azeem Suleman, Sravya Boggavarapu, Jose Delgado
  • Publication number: 20180338720
    Abstract: A method for performing actions by a wearable device is provided. The method includes detecting at least one signal indicating a movement of a muscle of the wrist, via an array of biometric sensors exposed through an inner peripheral surface of a substantially circular band of the wearable device, identifying an orientation of the wearable device corresponding to the at least one signal, and providing, based at least in part on the identification, a function corresponding to the orientation of the wearable device. The method further includes detecting, by the wearable device, an absolute orientation of the wearable device using at least one of an inertial sensor and the one or more body sensors. The method further includes dynamically performing an action, by the wearable device, based on a pre-stored mapping of the at least one physiological parameter and the absolute orientation of the wearable device.
    Type: Application
    Filed: May 25, 2018
    Publication date: November 29, 2018
    Inventors: Gaurav GUPTA, Sonu AGARWAL