Patents by Inventor Kannan Kumar
Kannan Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240144301Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to control auditing devices, comprising a communications interface to transmit first auditing instructions to the auditing devices, a sampling frequency determiner to collect sampling information corresponding to a first number of stores at a first time, a a sample size determiner to calculate a second number of stores to sample based on the sampling information, and when a difference between the first number of stores and the second number of stores satisfies a threshold, improve an accuracy in the sampling information by calculating second auditing instructions having an updated sampling frequency.Type: ApplicationFiled: October 2, 2023Publication date: May 2, 2024Inventors: Kannan Balaji, Srikanth R. Tiyyagura, Praveen Kumar Bala, Brahmanand Reddy Shivampet
-
Publication number: 20240119504Abstract: A system including one or more processors and one or more non-transitory computer-readable media storing computing instructions that, when executed on the one or more processors, cause the one or more processors to perform operations: training, using labeled training data and a list of substitutes for an item, a machine learning algorithm; determining, using the machine learning algorithm, as trained, a respective similarity score for each substitute of the list of substitutes; ranking each substitute of the list of substitutes based on its respective similarity score; and re-training the machine learning algorithm based on at least the labeled training data and a highest ranked substitute of the list of substitutes. Other embodiments are disclosed herein.Type: ApplicationFiled: December 18, 2023Publication date: April 11, 2024Applicant: Walmart Apollo, LLCInventors: Kamiya Motwani, Sushant Kumar, Kannan Achan, Vidya Sagar Kalidindi, Rahul Ramkumar, Derrick Lagomarsino
-
Publication number: 20240112234Abstract: A system including one or more processors and one or more non-transitory computer-readable media storing computing instruction that, when executed on the one or more processors, cause the one or more processors to perform operations: generating, using a training procedure, labels based at least in part on price band activity data from a time period; training, using the training procedure, an affinity prediction model of a machine learning architecture; analyzing, using the affinity prediction model of the machine learning architecture, as trained, the price band activity data indicating interactions of a user with items; and generating, using the labels and the affinity prediction model of the machine learning architecture, as trained, one or more price affinity predictions for one or more items for the user. Other embodiments are disclosed herein.Type: ApplicationFiled: December 11, 2023Publication date: April 4, 2024Applicant: WALMART APOLLO, LLCInventors: Soumya Wadhwa, Ashish Ranjan, Selene Xu, Hyun Duk Cho, Sushant Kumar, Kannan Achan
-
Patent number: 11948179Abstract: A system including one or more processors and one or more non-transitory computer-readable media storing computing instructions configured to run on the one or more processors and perform generating personalized product-type metrics for the user based at least in part on a user embedding for the user and product-type embedding Gaussian mixture distributions; determining top product types based at least in part on personalized product-type complementarity metrics generated using the personalized product-type metrics and cosine similarity measurements; generating a set of first items associated with the top product-types; ranking each respective item in the set of first items generated using an item-level embedding Gaussian distribution for the anchor item and a respective item-level embedding Gaussian distribution for the each respective item; and selecting a set of top items as the personalized complementary item recommendations based on the ranking. Other embodiments are disclosed.Type: GrantFiled: January 31, 2021Date of Patent: April 2, 2024Assignee: WALMART APOLLO, LLCInventors: Luyi Ma, Hyun Duk Cho, Sushant Kumar, Kannan Achan
-
Patent number: 11947548Abstract: This application relates to systems and methods for providing search results based on a primary intent. In some examples, a disclosed system includes a memory resource storing instructions; and one or more processors coupled to the memory resource. The one or more processors are configured to execute the instructions to: receive, from a user, a search query including a plurality of words, identify a plurality of intention terms from the words of the search query, compute, for each of the plurality of intention terms, a compatibility score between the intention term and a query context associated with the intention term, determine, from the plurality of intention terms, a primary intention term having a maximum compatibility score among the plurality of intention terms, and generate, based on the primary intention term, a set of intent-based search results in response to the search query, the set of intent-based search results identifying a set of items associated with the primary intention term.Type: GrantFiled: November 29, 2021Date of Patent: April 2, 2024Assignee: Walmart Apollo, LLCInventors: Rahul Radhakrishnan Iyer, Sushant Kumar, Kannan Achan
-
Publication number: 20240106855Abstract: This disclosure describes techniques and mechanisms for improving security within SDWAN fabric and utilizing telemetry data from non-enterprise providers to remediate compromised SDWAN site(s) and/or user(s). The techniques may implement an integration of non-enterprise application(s) and API(s) with an enterprise network, thereby enabling the enterprise network to identify compromised endpoint(s), identify user(s), group(s), site(s) that are impacted, and take a corrective action (by the enterprise network and/or the non-enterprise application(s) or API(s)) on the enterprise fabric.Type: ApplicationFiled: February 7, 2023Publication date: March 28, 2024Inventors: Balaji Sundararajan, Vivek Agarwal, Vishnuprasad Raghavan, Kannan Kumar, Chandra Balaji Rajaram
-
Patent number: 11941044Abstract: A method including training a recurrent neural network model to create a trained model based at least in part on: (a) first images associated with first items on a website, (b) first search terms used by users of the website to search for the first items on the website, and (c) personal features of the users. The method also can include receiving an input image that was uploaded by a current user. The method additionally can include obtaining a user encoded representation vector for the current user based on a set of personal features of the current user. The method further can include generating an image encoded representation vector for the input image. The method additionally can include deriving search terms that are personalized to the current user for the one or more items depicted in the input image, using the trained model and based on the user encoded representation vector for the current user and the image encoded representation vector for the input image. Other embodiments are disclosed.Type: GrantFiled: January 28, 2019Date of Patent: March 26, 2024Assignee: WALMART APOLLO, LLCInventors: Kannan Achan, Sushant Kumar, Kaushiki Nag, Venkata Syam Prakash Rapaka
-
Publication number: 20240080267Abstract: In one embodiment, a method includes receiving, by a first node of a node cluster in a software-defined wide area network (SD-WAN), traffic from a wide area network (WAN), assigning, by the first node of the node cluster, flow ownership of the traffic to the first node, and communicating, by the first node of the node cluster, the traffic to a local area network (LAN). The method also includes receiving, by the first node of the node cluster, return traffic from a second node of the node cluster and detecting, by the first node of the node cluster, a diversion of the return traffic. The method further includes relinquishing, by the first node of the node cluster, the flow ownership and assigning, by the first node of the node cluster, the flow ownership to the second node of the node cluster.Type: ApplicationFiled: November 8, 2023Publication date: March 7, 2024Inventors: Laxmikantha Reddy Ponnuru, Arul Murugan Manickam, Michael David Tracy, Kannan Kumar, Hamzah Kardame
-
Publication number: 20240039956Abstract: Techniques for user identity-based security policy enforcement. The techniques may include sending, to an edge device associated with a network, a networking policy associated with a user. The techniques may also include receiving, from an identity provider, an IP address associated with the user. Additionally, the techniques may include sending, to the edge device, an indication to associate the IP address with the user such that the edge device applies the networking policy to packets that include the IP address.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Inventors: Balaji Sundararajan, Vishnuprasad Raghavan, Kannan Kumar, Ramana Babu Polamarasetti, Mahalakshmi Rajaram
-
Patent number: 11824770Abstract: In one embodiment, a method includes receiving, by a first node of a node cluster in a software-defined wide area network (SD-WAN), traffic from a wide area network (WAN), assigning, by the first node of the node cluster, flow ownership of the traffic to the first node, and communicating, by the first node of the node cluster, the traffic to a local area network (LAN). The method also includes receiving, by the first node of the node cluster, return traffic from a second node of the node cluster and detecting, by the first node of the node cluster, a diversion of the return traffic. The method further includes relinquishing, by the first node of the node cluster, the flow ownership and assigning, by the first node of the node cluster, the flow ownership to the second node of the node cluster.Type: GrantFiled: March 8, 2022Date of Patent: November 21, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Laxmikantha Reddy Ponnuru, Arul Murugan Manickam, Michael David Tracy, Kannan Kumar, Hamzah Kardame
-
Publication number: 20230188461Abstract: In one embodiment, a method includes receiving, by a first node of a node cluster in a software-defined wide area network (SD-WAN), traffic from a wide area network (WAN), assigning, by the first node of the node cluster, flow ownership of the traffic to the first node, and communicating, by the first node of the node cluster, the traffic to a local area network (LAN). The method also includes receiving, by the first node of the node cluster, return traffic from a second node of the node cluster and detecting, by the first node of the node cluster, a diversion of the return traffic. The method further includes relinquishing, by the first node of the node cluster, the flow ownership and assigning, by the first node of the node cluster, the flow ownership to the second node of the node cluster.Type: ApplicationFiled: March 8, 2022Publication date: June 15, 2023Inventors: Laxmikantha Reddy Ponnuru, Arul Murugan Manickam, Michael David Tracy, Kannan Kumar, Hamzah Kardame
-
Patent number: 10601664Abstract: In one embodiment, a network controller for a computer network receives details of a provisioned device and policy requirements for the provisioned device. The network controller may then determine, based on the details and policy requirements for the provisioned device, a plurality of network devices that the provisioned device is configured to communicate through, and may then translate the details and policy requirements for the provisioned device into a plurality of network-device-specific policies, each respective network-device-specific policy corresponding to one of the plurality of network devices that the provisioned device is configured to communicate through. As such, the network controller may then transmit a respective network-device-specific policy of the plurality of network-device-specific policies to the plurality of network devices that the provisioned device is configured to communicate through.Type: GrantFiled: April 28, 2017Date of Patent: March 24, 2020Assignee: Cisco Technology, Inc.Inventors: Kannan Kumar, Brian E. Weis, Rashmikant B. Shah, Manoj Kumar Nayak
-
Patent number: 10298581Abstract: In one embodiment, an authorized signing authority server receives an authenticity request from a security registrar to vouch for authenticity of a particular device. Based on receiving the authenticity request, the authorized signing authority server may then determine an authenticity state of the particular device, and may also request a device provisioning file for the particular device from a device provisioning server, the device provisioning file defining one or more network security policies for the particular device. Upon receiving the device provisioning file from the device provisioning server, the authorized signing authority server may then return the authenticity state and the device provisioning file for the particular device to the security registrar, causing the security registrar to complete authentication of the particular device based on the authenticity state and the device provisioning file.Type: GrantFiled: April 28, 2017Date of Patent: May 21, 2019Assignee: Cisco Technology, Inc.Inventors: Rashmikant B. Shah, Brian E. Weis, Kannan Kumar, Manoj Kumar Nayak
-
Publication number: 20180316673Abstract: In one embodiment, an authorized signing authority server receives an authenticity request from a security registrar to vouch for authenticity of a particular device. Based on receiving the authenticity request, the authorized signing authority server may then determine an authenticity state of the particular device, and may also request a device provisioning file for the particular device from a device provisioning server, the device provisioning file defining one or more network security policies for the particular device. Upon receiving the device provisioning file from the device provisioning server, the authorized signing authority server may then return the authenticity state and the device provisioning file for the particular device to the security registrar, causing the security registrar to complete authentication of the particular device based on the authenticity state and the device provisioning file.Type: ApplicationFiled: April 28, 2017Publication date: November 1, 2018Applicant: Cisco Technology, Inc.Inventors: Rashmikant B. Shah, Brian E. Weis, Kannan Kumar, Manoj Kumar Nayak
-
Publication number: 20180316563Abstract: In one embodiment, a network controller for a computer network receives details of a provisioned device and policy requirements for the provisioned device. The network controller may then determine, based on the details and policy requirements for the provisioned device, a plurality of network devices that the provisioned device is configured to communicate through, and may then translate the details and policy requirements for the provisioned device into a plurality of network-device-specific policies, each respective network-device-specific policy corresponding to one of the plurality of network devices that the provisioned device is configured to communicate through. As such, the network controller may then transmit a respective network-device-specific policy of the plurality of network-device-specific policies to the plurality of network devices that the provisioned device is configured to communicate through.Type: ApplicationFiled: April 28, 2017Publication date: November 1, 2018Inventors: Kannan Kumar, Brian E. Weis, Rashmikant B. Shah, Manoj Kumar Nayak