Patents by Inventor Jayanta Basak
Jayanta Basak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240022597Abstract: A method, a computing device, and a non-transitory machine-readable medium for detecting malware attacks. In one example, an agent implemented in an operating system detects an overwrite in which an original data component is overwritten with a new data component. The agent computes a plurality of features associated with the overwrite, the plurality of features including an original entropy corresponding to the original data component, a new entropy corresponding to the new data component, an overwrite fraction, and a set of divergence features. The agent determines whether the new data component is encrypted using the plurality of features.Type: ApplicationFiled: September 29, 2023Publication date: January 18, 2024Inventors: Prateeksha Varshney, Siddhartha Nandi, Jayanta Basak
-
Publication number: 20240007527Abstract: Methods and systems for a networked storage system is provided. One method includes transforming by a processor, performance parameters associated with storage volumes of a storage system for representing each storage volume as a data point in a parametric space; generating by the processor, a plurality of bins in the parametric space using the transformed performance parameters; adjusting by the processor, bin boundaries for the plurality of bins for defining a plurality of service levels for the storage system based on the performance parameters; and using the defined plurality of service levels for operating the storage system.Type: ApplicationFiled: September 12, 2023Publication date: January 4, 2024Inventors: Jayanta Basak, Ameet Deulgaonkar, Siddhartha Nandi
-
Patent number: 11863576Abstract: A system, method, and machine-readable storage medium for detecting an anomaly are provided. In some embodiments, the method includes computing an access rate of a set of entities for each user of a plurality of users. The access rate may refer to data operations for the set of entities stored by a storage system. The method also includes normalizing the access rates for a subset of the plurality of users, the subset belonging to a community. The method further includes determining whether a normalized access rate from among the access rates satisfies a threshold. The method also includes detecting an anomaly in response to a determination that the normalized access rate satisfies the threshold.Type: GrantFiled: June 7, 2022Date of Patent: January 2, 2024Assignee: NETAPP, INC.Inventors: Omri Kessel, Shailaja Kamila, Pratyush Uppuluri, Jayanta Basak
-
Patent number: 11792223Abstract: A method, a computing device, and a non-transitory machine-readable medium for detecting malware attacks. In one example, an agent implemented in an operating system detects an overwrite in which an original data component is overwritten with a new data component. The agent computes a plurality of features associated with the overwrite, the plurality of features including an original entropy corresponding to the original data component, a new entropy corresponding to the new data component, an overwrite fraction, and a set of divergence features. The agent determines whether the new data component is encrypted using the plurality of features.Type: GrantFiled: October 5, 2020Date of Patent: October 17, 2023Assignee: NETAPP, INC.Inventors: Prateeksha Varshney, Siddhartha Nandi, Jayanta Basak
-
Patent number: 11785084Abstract: Methods and systems for a networked storage system is provided. One method includes transforming by a processor, performance parameters associated with storage volumes of a storage system for representing each storage volume as a data point in a parametric space; generating by the processor, a plurality of bins in the parametric space using the transformed performance parameters; adjusting by the processor, bin boundaries for the plurality of bins for defining a plurality of service levels for the storage system based on the performance parameters; and using the defined plurality of service levels for operating the storage system.Type: GrantFiled: November 16, 2018Date of Patent: October 10, 2023Assignee: NETAPP, INC.Inventors: Jayanta Basak, Ameet Deulgaonkar, Siddhartha Nandi
-
Patent number: 11645320Abstract: An embodiment of the invention provides an apparatus and method for classifying a workload of a computing entity. In an embodiment, the computing entity samples a plurality of values for a plurality of parameters of the workload. Based on the plurality of values of each parameter, the computing entity determines a parameter from the plurality of parameters that the computing entity's response time is dependent on. Here, the computing entity's response time is indicative of a time required by the computing entity to respond to a service request from the workload. Further, based on the identified significant parameter, the computing entity classifies the workload of the computing entity by selecting a workload classification from a plurality of predefined workload classifications.Type: GrantFiled: September 26, 2017Date of Patent: May 9, 2023Assignee: NETAPP, INC.Inventors: Jayanta Basak, Kushal Wadhwani, Kaladhar Voruganti
-
Publication number: 20230066617Abstract: Methods and systems for securing unstructured data are provided. One method includes generating, by a processor, a schema from unstructured data, the schema including one or more relationships between named entities of the unstructured data; identifying, by the processor, a plurality of semantic relationships between the named entities; determining, by the processor, a sensitive relationship from the plurality of semantic relationships; and anonymizing, by the processor, sensitive data associated with the sensitive relationship by replacing, a first portion of the sensitive data with generalized information.Type: ApplicationFiled: November 3, 2022Publication date: March 2, 2023Inventors: Deepti Aggarwal, Jayanta Basak
-
Publication number: 20220414154Abstract: A system, method, and machine-readable storage medium for forming a community based on a common set of attributes are provided. In some embodiments, the method includes creating a list of entities associated with a plurality of users, each entity included in the list of entities being accessed by a user of the plurality of users. The method also includes identifying a first entity accessed by a group of users of the plurality of users. The method further includes determining a first set of entities accessed by each user of the group of users, the first set of entities being included in the list of entities. The method also includes removing the first entity and the first set of entities from the list of entities. The method further includes forming a first community including the group of users, the first entity, and the first set of entities.Type: ApplicationFiled: September 1, 2022Publication date: December 29, 2022Inventors: OMRI KESSEL, Shailaja Kamila, Pratyush Uppuluri, Jayanta Basak
-
Publication number: 20220391370Abstract: A system, method, and machine-readable storage medium for resolving a candidate community are provided. In some embodiments, a method includes obtaining a candidate community and a neighbor set for the candidate community, the neighbor set including zero or more stable communities. The method also includes resolving the candidate community as being a new stable community if the neighbor set is empty. The method further includes resolving the candidate community as being part of a matching stable community if a hash value of the candidate community matches a hash value of one or more stable communities included in the neighbor set. The method also includes resolving the candidate community as being a new stable community if an entropy value is greater than a threshold, the entropy value being based on the candidate community and the neighbor set.Type: ApplicationFiled: August 22, 2022Publication date: December 8, 2022Inventors: Omri Kessel, IV, Shailaja Kamila, Pratyush Uppuluri, Jayanta Basak
-
Patent number: 11520929Abstract: Methods and systems for securing unstructured data are provided. One method includes generating, by a processor, a schema from unstructured data, the schema including one or more relationships between named entities of the unstructured data; identifying, by the processor, a plurality of semantic relationships between the named entities; determining, by the processor, a sensitive relationship from the plurality of semantic relationships; and anonymizing, by the processor, sensitive data associated with the sensitive relationship by replacing, a first portion of the sensitive data with generalized information.Type: GrantFiled: December 15, 2020Date of Patent: December 6, 2022Assignee: NETAPP, INC.Inventors: Deepti Aggarwal, Jayanta Basak
-
Patent number: 11468029Abstract: A system, method, and machine-readable storage medium for resolving a candidate community are provided. In some embodiments, a method includes obtaining a candidate community and a neighbor set for the candidate community, the neighbor set including zero or more stable communities. The method also includes resolving the candidate community as being a new stable community if the neighbor set is empty. The method further includes resolving the candidate community as being part of a matching stable community if a hash value of the candidate community matches a hash value of one or more stable communities included in the neighbor set. The method also includes resolving the candidate community as being a new stable community if an entropy value is greater than a threshold, the entropy value being based on the candidate community and the neighbor set.Type: GrantFiled: March 8, 2019Date of Patent: October 11, 2022Assignee: NETAPP, INC.Inventors: Omri Kessel, Shailaja Kamila, Pratyush Uppuluri, Jayanta Basak
-
Patent number: 11468124Abstract: A system, method, and machine-readable storage medium for forming a community based on a common set of attributes are provided. In some embodiments, the method includes creating a list of entities associated with a plurality of users, each entity included in the list of entities being accessed by a user of the plurality of users. The method also includes identifying a first entity accessed by a group of users of the plurality of users. The method further includes determining a first set of entities accessed by each user of the group of users, the first set of entities being included in the list of entities. The method also includes removing the first entity and the first set of entities from the list of entities. The method further includes forming a first community including the group of users, the first entity, and the first set of entities.Type: GrantFiled: March 8, 2019Date of Patent: October 11, 2022Assignee: NETAPP, INC.Inventors: Omri Kessel, Shailaja Kamila, Pratyush Uppuluri, Jayanta Basak
-
Publication number: 20220303297Abstract: A system, method, and machine-readable storage medium for detecting an anomaly are provided. In some embodiments, the method includes computing an access rate of a set of entities for each user of a plurality of users. The access rate may refer to data operations for the set of entities stored by a storage system. The method also includes normalizing the access rates for a subset of the plurality of users, the subset belonging to a community. The method further includes determining whether a normalized access rate from among the access rates satisfies a threshold. The method also includes detecting an anomaly in response to a determination that the normalized access rate satisfies the threshold.Type: ApplicationFiled: June 7, 2022Publication date: September 22, 2022Inventors: Omri Kessel, Shailaja Kamila, Pratyush Uppuluri, Jayanta Basak
-
Publication number: 20220188454Abstract: Methods and systems for securing unstructured data are provided. One method includes generating, by a processor, a schema from unstructured data, the schema including one or more relationships between named entities of the unstructured data; identifying, by the processor, a plurality of semantic relationships between the named entities; determining, by the processor, a sensitive relationship from the plurality of semantic relationships; and anonymizing, by the processor, sensitive data associated with the sensitive relationship by replacing, a first portion of the sensitive data with generalized information.Type: ApplicationFiled: December 15, 2020Publication date: June 16, 2022Applicant: NETAPP, INC.Inventors: Deepti Aggarwal, Jayanta Basak
-
Patent number: 11363042Abstract: A system, method, and machine-readable storage medium for detecting an anomaly are provided. In some embodiments, the method includes computing an access rate of a set of entities for each user of a plurality of users. The access rate may refer to data operations for the set of entities stored by a storage system. The method also includes normalizing the access rates for a subset of the plurality of users, the subset belonging to a community. The method further includes determining whether a normalized access rate from among the access rates satisfies a threshold. The method also includes detecting an anomaly in response to a determination that the normalized access rate satisfies the threshold.Type: GrantFiled: March 8, 2019Date of Patent: June 14, 2022Assignee: NETAPP, INC.Inventors: Omri Kessel, Shailaja Kamila, Pratyush Uppuluri, Jayanta Basak
-
Publication number: 20220171741Abstract: Methods and apparatuses for performing selective deduplication in a storage system are introduced here. Techniques are provided for determining a probability of deduplication for a data object based on a characteristic of the data object and performing a deduplication operation on the data object in the storage system prior to the data object being stored in persistent storage of the storage system if the probability of deduplication for the data object has a specified relationship to a specified threshold.Type: ApplicationFiled: November 8, 2021Publication date: June 2, 2022Inventors: Damarugendra Mallaiah, Jayanta Basak
-
Publication number: 20210409425Abstract: A method, a computing device, and a non-transitory machine-readable medium for detecting malware attacks. In one example, an agent implemented in an operating system detects an overwrite in which an original data component is overwritten with a new data component. The agent computes a plurality of features associated with the overwrite, the plurality of features including an original entropy corresponding to the original data component, a new entropy corresponding to the new data component, an overwrite fraction, and a set of divergence features. The agent determines whether the new data component is encrypted using the plurality of features.Type: ApplicationFiled: October 5, 2020Publication date: December 30, 2021Inventors: Prateeksha Varshney, Siddhartha Nandi, Jayanta Basak
-
Patent number: 11169967Abstract: Methods and apparatuses for performing selective deduplication in a storage system are introduced here. Techniques are provided for determining a probability of deduplication for a data object based on a characteristic of the data object and performing a deduplication operation on the data object in the storage system prior to the data object being stored in persistent storage of the storage system if the probability of deduplication for the data object has a specified relationship to a specified threshold.Type: GrantFiled: December 17, 2019Date of Patent: November 9, 2021Assignee: NetApp Inc.Inventors: Damarugendra Mallaiah, Jayanta Basak
-
Patent number: 10984345Abstract: Methods and systems for managing energy sources and energy consumers in an integrated system are provided. Certain subject matter presented herein relates to automatically scheduling jobs and their sub-tasks to maximize profit by comparing power source configurations and determining the best job schedule for the power source configurations. This system broadly involves two sub-problems: determining the best power source configuration and determining the best job schedule for the given power source configuration.Type: GrantFiled: June 1, 2010Date of Patent: April 20, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jayanta Basak, Venkatesan Chakaravarthy, Vinayaka Pandit, Yogish Sabharwal, Devasenapathi P. Seetharamakrishnan
-
Patent number: 10970595Abstract: Methods and systems for document classification are provided. One method includes generating by a processor, a plurality of topics using content of a plurality of electronic documents, where each topic includes a plurality of words associated with the plurality of electronic documents; reducing by the processor, the plurality of topics to a subset of topics to represent the plurality of electronic documents based on a parameter indicating a property of each subset topic and separation between the subset topics; automatically generating by the processor, a tag for each subset topic, based on the tag's position within the subset topic; wherein each tag is an attribute of each subset topic; storing by the processor, the subset of topics with corresponding tags in a model data structure; and updating the model data structure by the processor based on one of a new topic and a new tag associated with an electronic document.Type: GrantFiled: February 21, 2019Date of Patent: April 6, 2021Assignee: NETAPP, INC.Inventors: Deepti Aggarwal, Jayanta Basak, Siddhartha Nandi