Patents by Inventor Lakshmi Priya
Lakshmi Priya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240134777Abstract: Aspects of the disclosure relate to upgrading an application within a simulated version of an enterprise system to detect and correct potential errors as a result of the upgrade. A computing platform may create a simulated version of the enterprise system by receiving metadata associated with the enterprise system, and converting the metadata into system parameters. Virtual parameters may be created by the computing system based on upgrading an application within the simulated version of the enterprise system. The computing system may create system nodes and virtual nodes. The system nodes and virtual nodes may be dynamically linked in order to determine errors caused by the application upgrade within the simulated version of the enterprise system. The computing platform may determine actions to correct the errors and input the results and feedback into an AI engine to further refine the accuracy and reliability of the computing platform over time.Type: ApplicationFiled: October 24, 2022Publication date: April 25, 2024Inventors: Sakshi Bakshi, Srinivasa Dhanwada, Sathya Thamilarasan, Siva Paini, Shyamala Manoharan, Nagalaxmi Sama, Sri Lakshmi Priya Doraiswamy
-
Patent number: 11916770Abstract: This disclosure describes methods to process timing information of flows in a network. One or more processors determine a latency associated with each of one or more packets of a flow passing through a device. The one or more processors determine that the latency is greater than a baseline latency, and the one or more processors provide a message indicating at least the flow and that the latency is greater than the baseline latency.Type: GrantFiled: October 20, 2020Date of Patent: February 27, 2024Assignee: Cisco Technology, Inc.Inventors: Padmanab Pathikonda, Rishi Chhibber, Roshan Lal, Lakshmi Priya Sarma, Vinay Narayana Rai, Akash Garg
-
Publication number: 20240029508Abstract: Disclosed are methods of operating a casino gaming system to establish a play session for an anonymous player in which the player voluntarily provides biometric information to link the player to a player tracking record in a database of the system. In some embodiments, the player grants permission for a camera integrated into an electronic gaming machine to capture a facial image to assist in the location of the record or creation of a new record associated with the player's biometric signature. In other embodiments, the player voluntarily uses a camera integrated into a personal electronic device, such as the player's smartphone, to capture the facial image. Once the player record to be used has been identified, the record is linked to the electronic gaming machine to create a play session from which player tracking data is collected and integrated into the database record associated with the anonymous player.Type: ApplicationFiled: May 18, 2023Publication date: January 25, 2024Inventors: Praveen Kumar RAVI SINGARAVELU, Prashanth RAGHAVAN, Sushmitha BABU, Subbiah SHANMUGAM, Shubham VERMA, Srihari RAMAN, Gururaj RAIBAGI, Saranya THIAGARAJAN, Kumar VITTOBA, Gowrishankar PERIYASAMY, Senthil RAJAKKANNU, Paul Thilak ARUMUGAM, Karthicksundar KUMARASAMY, Mohammed Faiz ALAM, Felicita SILVESTER, Palani Sankar RAMALINGAM, Samudhiram LAKSHMIPATHY, Ameena BATHOOL, Janani KAMARAJ, Praveen Kumar KUMAR, Balram RAVI, Sharath SENBAGARAMAN, Rajeshwari SUBRAMANIAN, Brinda UGANATHAN, Naga Sudharsana Reddy GUJJALA, Manjari SAPRE, Jeffrey HANTIN, Michaelraj CHINNAKANI, Lakshmi Priya MURALIDHARAN, Sangeetha CHANDRASEKAR, Ajay CHANDRASEKARAN, Kumar VEERAIYAN, Padmanaban MADHAVAN, Baskaran SIVANESAN, Hemalatha MUMMUNDLU, Parameswaran PALANISAMY, Hariharan MURUGAN, Nataraj SELVARAJ, Shine Alex RAPEL RAJ, Manikandan KUMARESAN, Ashish GUPTA, Supraja POONAMALLEE MUTHUKUMAR, Aadharsh BABU
-
Publication number: 20230418242Abstract: Aspects of the disclosure relate to an intelligent resource evaluation engine. A computing platform may monitor the plurality of RPA machines to detect parameter information. The computing platform may store the parameter information along with corresponding RPA machines as a key value pairs in a database. The computing platform may identify first current parameter information for a first RPA machine using the key value pairs. The computing platform may input the first current parameter information into an intelligent resource evaluation model, which may output first machine selection information for the first RPA machine. Based on identifying that the first RPA machine is sufficient to execute the first robotic automation process, the computing platform may send direct the first RPA machine to execute the first robotic automation process.Type: ApplicationFiled: June 24, 2022Publication date: December 28, 2023Inventors: Sudhakar Balu, Lakshmi Priya Doraiswamy, Siva Kumar Paini, Nagalaxmi Sama, Sathya Thamilarasan
-
Publication number: 20230301621Abstract: The present disclosure describes a unique method and system for combining 3D ONS modeling with an elastography measurement (shear wave pulse measurement at a fixed depth) to capture strain values within the ONS wall tissue giving a more reliable assessment of both prior and current TBI, preferably without maneuvers to artificially increase intracranial pressure (ICP). Imaging for the 3D modeling and the elastography utilizes he same H-transducer to obtain B-Mode and shear wave pulse images. The combined data is used in a discriminatory Machine Learning system to provide a discriminatory outcome of TBI.Type: ApplicationFiled: March 27, 2023Publication date: September 28, 2023Applicant: UtopiaCompression CorporationInventors: Priya Ganapathy, Lakshmi Priya Rangaraju, Jacob Yadegar
-
Publication number: 20230208779Abstract: In one embodiment, a method includes receiving a request to establish a path for a data stream from the first network apparatus to a second network apparatus, where the request is associated with a requested bandwidth for the data stream, and where the first network apparatus and the second network apparatus are connected by a link aggregation group including a number of physical Ethernet links, accessing bandwidth information representing a number of remaining bandwidths of the respective multiple of physical Ethernet links, determining that the requested bandwidth is not satisfied by any of the number of remaining bandwidths of the number of physical Ethernet links, and sending a response rejecting the request to establish the path.Type: ApplicationFiled: March 3, 2023Publication date: June 29, 2023Inventors: Roshan Lal, Rishi Chhibber, Padmanab Pathikonda, Lakshmi Priya Sarma, Francesco Meo
-
Patent number: 11627096Abstract: In one embodiment, a method includes receiving a request to establish a path for a data stream from the first network apparatus to a second network apparatus, where the request is associated with a requested bandwidth for the data stream, and where the first network apparatus and the second network apparatus are connected by a link aggregation group including a number of physical links, accessing bandwidth information representing a number of remaining bandwidths of the respective multiple of physical links, determining that the requested bandwidth is not satisfied by any of the number of remaining bandwidths of the number of physical links, and sending a response rejecting the request to establish the path.Type: GrantFiled: June 4, 2019Date of Patent: April 11, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Roshan Lal, Rishi Chhibber, Padmanab Pathikonda, Lakshmi Priya Sarma, Francesco Meo
-
Patent number: 11397858Abstract: A computer-implemented method, system and computer program product for initiating a conversation by a virtual agent. The boundary of a widget of a webpage the user is utilizing is determined. The user's interactions or lack of interactions with the widget within the determined boundary of the widget of the webpage is then determined, such as based on tracking the eye gaze or focus of the user. If it is determined that the user is experiencing difficulty in utilizing the widget, then the content associated with the widget is extracted. The extracted widget content is then mapped to the virtual agent content. The virtual agent is instructed to initiate a conversation based on the extracted widget content. In this manner, the virtual agent will now be able to dynamically initiate a conversation with the user to assist the user in addressing a problem the user is currently experiencing with the widget.Type: GrantFiled: August 15, 2019Date of Patent: July 26, 2022Assignee: KYNDRYL, INC.Inventors: Garfield W. Vaughn, Vasanthi M. Gopal, Gandhi Sivakumar, Malar Kandasamy, Lakshmi Priya Shanmugam
-
Publication number: 20220120912Abstract: An apparatus receives a transaction request comprising a pair of latitude and longitude coordinates for where a transaction is being attempted by a user. The apparatus determines that the latitude and longitude coordinates from the transaction request are outside of a first region comprising a first plurality of points and outside of a second region comprising a second plurality of points. The points in the first and second regions comprise latitude and longitude coordinates for a location where a user visited. The second region does not overlap the first region. The apparatus tags the transaction request as anomalous. The apparatus generates an alert requesting that the user confirm whether the second transaction should be authenticated. The apparatus also transmits the alert to a first user device identified in a user account profile.Type: ApplicationFiled: October 15, 2020Publication date: April 21, 2022Inventors: Lekha Bollinani, Lakshmi Priya, Ramya Gangathara Rao
-
Publication number: 20220124017Abstract: This disclosure describes methods to process timing information of flows in a network. One or more processors determine a latency associated with each of one or more packets of a flow passing through a device. The one or more processors determine that the latency is greater than a baseline latency, and the one or more processors provide a message indicating at least the flow and that the latency is greater than the baseline latency.Type: ApplicationFiled: October 20, 2020Publication date: April 21, 2022Inventors: Padmanab Pathikonda, Rishi Chhibber, Roshan Lal, Lakshmi Priya Sarma, Vinay Narayana Rai, Akash Garg
-
Patent number: 11283796Abstract: Methods, systems, and computer program products are provided for real-time compromise detection based on behavioral analytics. The detection runs in real-time, during user authentication, for example, with respect to a resource. The probability that the authentication is coming from a compromised account is assessed. The features of the current authentication are compared with the features from past authentications of the user. After comparison, a match score is generated. The match score is indicative of the similarity of the authentication to the user's history of authentication. This score is then discretized into risk levels based on the empirical probability of compromise based on known past compromised user authentications. The risk levels may be used to detect whether user authentication is occurring via compromised credentials.Type: GrantFiled: September 24, 2019Date of Patent: March 22, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Maria Puertas Calvo, Lakshmi Priya Gopal, Laurentiu B. Cristofor, Pui-Yin Winfred Wong, Dana S. Kaufman
-
Patent number: 11075950Abstract: A computer-implemented method of generating a security policy for a microsegmented computing system is provided. The method includes generating a port service map that indicates inbound packet activity by port for a plurality of network addresses within the microsegmented computing system and a port distribution map that indicates inbound packet activity by port for a plurality of network addresses within the microsegmented computing system, and generating a list of security policy recommendations based on the port service map and/or the port distribution map.Type: GrantFiled: August 20, 2018Date of Patent: July 27, 2021Assignee: CA, Inc.Inventors: Krishna Kumar Yadav Nukala, Vikas Pullagura, Dharanidhar Sahu, Jagadishwara Chary Sriramoju, Lakshmi Priya Vennapusa
-
Publication number: 20210049238Abstract: A computer-implemented method, system and computer program product for initiating a conversation by a virtual agent. The boundary of a widget of a webpage the user is utilizing is determined. The user's interactions or lack of interactions with the widget within the determined boundary of the widget of the webpage is then determined, such as based on tracking the eye gaze or focus of the user. If it is determined that the user is experiencing difficulty in utilizing the widget, then the content associated with the widget is extracted. The extracted widget content is then mapped to the virtual agent content. The virtual agent is instructed to initiate a conversation based on the extracted widget content. In this manner, the virtual agent will now be able to dynamically initiate a conversation with the user to assist the user in addressing a problem the user is currently experiencing with the widget.Type: ApplicationFiled: August 15, 2019Publication date: February 18, 2021Inventors: Garfield W. Vaughn, Vasanthi M. Gopal, Gandhi Sivakumar, Malar Kandasamy, Lakshmi Priya Shanmugam
-
Publication number: 20200412717Abstract: Methods, systems, and computer program products are provided for real-time compromise detection based on behavioral analytics. The detection runs in real-time, during user authentication, for example, with respect to a resource. The probability that the authentication is coming from a compromised account is assessed. The features of the current authentication are compared with the features from past authentications of the user. After comparison, a match score is generated. The match score is indicative of the similarity of the authentication to the user's history of authentication. This score is then discretized into risk levels based on the empirical probability of compromise based on known past compromised user authentications. The risk levels may be used to detect whether user authentication is occurring via compromised credentials.Type: ApplicationFiled: September 24, 2019Publication date: December 31, 2020Inventors: Maria Puertas Calvo, Lakshmi Priya Gopal, Laurentiu B. Cristofor, Pui-Yin Winfred Wong, Dana S. Kaufman
-
Publication number: 20200389413Abstract: In one embodiment, a method includes receiving a request to establish a path for a data stream from the first network apparatus to a second network apparatus, where the request is associated with a requested bandwidth for the data stream, and where the first network apparatus and the second network apparatus are connected by a link aggregation group including a number of physical links, accessing bandwidth information representing a number of remaining bandwidths of the respective multiple of physical links, determining that the requested bandwidth is not satisfied by any of the number of remaining bandwidths of the number of physical links, and sending a response rejecting the request to establish the path.Type: ApplicationFiled: June 4, 2019Publication date: December 10, 2020Inventors: Roshan Lal, Rishi Chhibber, Padmanab Pathikonda, Lakshmi Priya Sarma, Francesco Meo
-
Patent number: 10834056Abstract: Methods and devices for opening a firewall port for a specified time period are provided. A data packet having a source address and a destination address beyond a firewall transmitted from a process source is intercepted by an interceptor. Responsive to determining, based on the source address, that a firewall port is not open, buffering the data packet. A request comprising an identifier, a protocol identifier, and a time period the firewall port is to be open is transmitted to a firewall controller. The firewall controller authenticates the request based on the identifier and opens a firewall port determined based on the protocol identifier. The interceptor receives an open firewall port notification indicating that the firewall port has been opened and transmits the data packet through the firewall port to the destination address. The firewall controller closes the firewall port when the time period has expired.Type: GrantFiled: July 31, 2018Date of Patent: November 10, 2020Assignee: CA, Inc.Inventors: Krishna Kumar Yadav Nukala, Vikas Pullagura, Shamayel Mohammed Farooqui, Jagadishwara Chary Sriramoju, Lakshmi Priya Vennapusa, Dharanidhar Sahu, Ramana Naga Venkata Mittapalli
-
Publication number: 20200059491Abstract: A computer-implemented method of generating a security policy for a microsegmented computing system is provided. The method includes generating a port service map that indicates inbound packet activity by port for a plurality of network addresses within the microsegmented computing system and a port distribution map that indicates inbound packet activity by port for a plurality of network addresses within the microsegmented computing system, and generating a list of security policy recommendations based on the port service map and/or the port distribution map.Type: ApplicationFiled: August 20, 2018Publication date: February 20, 2020Inventors: Krishna Kumar Yadav Nukala, Vikas Pullagura, Dharanidhar Sahu, Jagadishwara Chary Sriramoju, Lakshmi Priya Vennapusa
-
Publication number: 20200045015Abstract: Methods and devices for opening a firewall port for a specified time period are provided. A data packet having a source address and a destination address beyond a firewall transmitted from a process source is intercepted by an interceptor. Responsive to determining, based on the source address, that a firewall port is not open, buffering the data packet. A request comprising an identifier, a protocol identifier, and a time period the firewall port is to be open is transmitted to a firewall controller. The firewall controller authenticates the request based on the identifier and opens a firewall port determined based on the protocol identifier. The interceptor receives an open firewall port notification indicating that the firewall port has been opened and transmits the data packet through the firewall port to the destination address. The firewall controller closes the firewall port when the time period has expired.Type: ApplicationFiled: July 31, 2018Publication date: February 6, 2020Applicant: CA, Inc.Inventors: Krishna Kumar Yadav Nukala, Vikas Pullagura, Shamayel Mohammed Farooqui, Jagadishwara Chary Sriramoju, Lakshmi Priya Vennapusa, Dharanidhar Sahu, Ramana Naga Venkata Mittapalli
-
Patent number: 9471346Abstract: Embodiments of the present invention provide hints for page stealing by prioritizing pages based on the number of residences. Receiving a plurality of pages to be hinted to a hypervisor for page stealing. Determining at least two page types of the plurality of pages. Determining whether any of the at least two page types has a total number of residences less than a total number of potential residences in the virtual environment for all page types and have a total number of residences less than a threshold. Responsive to determining a first page type of the at least two page types has a total number of residences less than a total number of potential residences for all page types and has a total number of residences less than a threshold, notifying the hypervisor of at least one page from the plurality of pages that is the determined first page type.Type: GrantFiled: May 24, 2016Date of Patent: October 18, 2016Assignee: International Business Machines CorporationInventors: Chetan L. Gaonkar, Chidambar Y. Kulkarni, Lakshmi Priya, Vamshi K. Thatikonda
-
Patent number: 9436601Abstract: Embodiments of the present invention provide hints for page stealing by prioritizing pages based on the number of residences. Receiving a plurality of pages to be hinted to a hypervisor for page stealing. Determining at least two page types of the plurality of pages. Determining whether any of the at least two page types has a total number of residences less than a total number of potential residences in the virtual environment for all page types and have a total number of residences less than a threshold. Responsive to determining a first page type of the at least two page types has a total number of residences less than a total number of potential residences for all page types and has a total number of residences less than a threshold, notifying the hypervisor of at least one page from the plurality of pages that is the determined first page type.Type: GrantFiled: September 15, 2014Date of Patent: September 6, 2016Assignee: International Business Machines CorporationInventors: Chetan L. Gaonkar, Lakshmi Priya, Chidambar Y. Kulkarni, Vamshi K. Thatikonda