Patents by Inventor Lakshmi Priya

Lakshmi Priya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240134777
    Abstract: Aspects of the disclosure relate to upgrading an application within a simulated version of an enterprise system to detect and correct potential errors as a result of the upgrade. A computing platform may create a simulated version of the enterprise system by receiving metadata associated with the enterprise system, and converting the metadata into system parameters. Virtual parameters may be created by the computing system based on upgrading an application within the simulated version of the enterprise system. The computing system may create system nodes and virtual nodes. The system nodes and virtual nodes may be dynamically linked in order to determine errors caused by the application upgrade within the simulated version of the enterprise system. The computing platform may determine actions to correct the errors and input the results and feedback into an AI engine to further refine the accuracy and reliability of the computing platform over time.
    Type: Application
    Filed: October 24, 2022
    Publication date: April 25, 2024
    Inventors: Sakshi Bakshi, Srinivasa Dhanwada, Sathya Thamilarasan, Siva Paini, Shyamala Manoharan, Nagalaxmi Sama, Sri Lakshmi Priya Doraiswamy
  • Patent number: 11916770
    Abstract: This disclosure describes methods to process timing information of flows in a network. One or more processors determine a latency associated with each of one or more packets of a flow passing through a device. The one or more processors determine that the latency is greater than a baseline latency, and the one or more processors provide a message indicating at least the flow and that the latency is greater than the baseline latency.
    Type: Grant
    Filed: October 20, 2020
    Date of Patent: February 27, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Padmanab Pathikonda, Rishi Chhibber, Roshan Lal, Lakshmi Priya Sarma, Vinay Narayana Rai, Akash Garg
  • Publication number: 20240029508
    Abstract: Disclosed are methods of operating a casino gaming system to establish a play session for an anonymous player in which the player voluntarily provides biometric information to link the player to a player tracking record in a database of the system. In some embodiments, the player grants permission for a camera integrated into an electronic gaming machine to capture a facial image to assist in the location of the record or creation of a new record associated with the player's biometric signature. In other embodiments, the player voluntarily uses a camera integrated into a personal electronic device, such as the player's smartphone, to capture the facial image. Once the player record to be used has been identified, the record is linked to the electronic gaming machine to create a play session from which player tracking data is collected and integrated into the database record associated with the anonymous player.
    Type: Application
    Filed: May 18, 2023
    Publication date: January 25, 2024
    Inventors: Praveen Kumar RAVI SINGARAVELU, Prashanth RAGHAVAN, Sushmitha BABU, Subbiah SHANMUGAM, Shubham VERMA, Srihari RAMAN, Gururaj RAIBAGI, Saranya THIAGARAJAN, Kumar VITTOBA, Gowrishankar PERIYASAMY, Senthil RAJAKKANNU, Paul Thilak ARUMUGAM, Karthicksundar KUMARASAMY, Mohammed Faiz ALAM, Felicita SILVESTER, Palani Sankar RAMALINGAM, Samudhiram LAKSHMIPATHY, Ameena BATHOOL, Janani KAMARAJ, Praveen Kumar KUMAR, Balram RAVI, Sharath SENBAGARAMAN, Rajeshwari SUBRAMANIAN, Brinda UGANATHAN, Naga Sudharsana Reddy GUJJALA, Manjari SAPRE, Jeffrey HANTIN, Michaelraj CHINNAKANI, Lakshmi Priya MURALIDHARAN, Sangeetha CHANDRASEKAR, Ajay CHANDRASEKARAN, Kumar VEERAIYAN, Padmanaban MADHAVAN, Baskaran SIVANESAN, Hemalatha MUMMUNDLU, Parameswaran PALANISAMY, Hariharan MURUGAN, Nataraj SELVARAJ, Shine Alex RAPEL RAJ, Manikandan KUMARESAN, Ashish GUPTA, Supraja POONAMALLEE MUTHUKUMAR, Aadharsh BABU
  • Publication number: 20230418242
    Abstract: Aspects of the disclosure relate to an intelligent resource evaluation engine. A computing platform may monitor the plurality of RPA machines to detect parameter information. The computing platform may store the parameter information along with corresponding RPA machines as a key value pairs in a database. The computing platform may identify first current parameter information for a first RPA machine using the key value pairs. The computing platform may input the first current parameter information into an intelligent resource evaluation model, which may output first machine selection information for the first RPA machine. Based on identifying that the first RPA machine is sufficient to execute the first robotic automation process, the computing platform may send direct the first RPA machine to execute the first robotic automation process.
    Type: Application
    Filed: June 24, 2022
    Publication date: December 28, 2023
    Inventors: Sudhakar Balu, Lakshmi Priya Doraiswamy, Siva Kumar Paini, Nagalaxmi Sama, Sathya Thamilarasan
  • Publication number: 20230301621
    Abstract: The present disclosure describes a unique method and system for combining 3D ONS modeling with an elastography measurement (shear wave pulse measurement at a fixed depth) to capture strain values within the ONS wall tissue giving a more reliable assessment of both prior and current TBI, preferably without maneuvers to artificially increase intracranial pressure (ICP). Imaging for the 3D modeling and the elastography utilizes he same H-transducer to obtain B-Mode and shear wave pulse images. The combined data is used in a discriminatory Machine Learning system to provide a discriminatory outcome of TBI.
    Type: Application
    Filed: March 27, 2023
    Publication date: September 28, 2023
    Applicant: UtopiaCompression Corporation
    Inventors: Priya Ganapathy, Lakshmi Priya Rangaraju, Jacob Yadegar
  • Publication number: 20230208779
    Abstract: In one embodiment, a method includes receiving a request to establish a path for a data stream from the first network apparatus to a second network apparatus, where the request is associated with a requested bandwidth for the data stream, and where the first network apparatus and the second network apparatus are connected by a link aggregation group including a number of physical Ethernet links, accessing bandwidth information representing a number of remaining bandwidths of the respective multiple of physical Ethernet links, determining that the requested bandwidth is not satisfied by any of the number of remaining bandwidths of the number of physical Ethernet links, and sending a response rejecting the request to establish the path.
    Type: Application
    Filed: March 3, 2023
    Publication date: June 29, 2023
    Inventors: Roshan Lal, Rishi Chhibber, Padmanab Pathikonda, Lakshmi Priya Sarma, Francesco Meo
  • Patent number: 11627096
    Abstract: In one embodiment, a method includes receiving a request to establish a path for a data stream from the first network apparatus to a second network apparatus, where the request is associated with a requested bandwidth for the data stream, and where the first network apparatus and the second network apparatus are connected by a link aggregation group including a number of physical links, accessing bandwidth information representing a number of remaining bandwidths of the respective multiple of physical links, determining that the requested bandwidth is not satisfied by any of the number of remaining bandwidths of the number of physical links, and sending a response rejecting the request to establish the path.
    Type: Grant
    Filed: June 4, 2019
    Date of Patent: April 11, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Roshan Lal, Rishi Chhibber, Padmanab Pathikonda, Lakshmi Priya Sarma, Francesco Meo
  • Patent number: 11397858
    Abstract: A computer-implemented method, system and computer program product for initiating a conversation by a virtual agent. The boundary of a widget of a webpage the user is utilizing is determined. The user's interactions or lack of interactions with the widget within the determined boundary of the widget of the webpage is then determined, such as based on tracking the eye gaze or focus of the user. If it is determined that the user is experiencing difficulty in utilizing the widget, then the content associated with the widget is extracted. The extracted widget content is then mapped to the virtual agent content. The virtual agent is instructed to initiate a conversation based on the extracted widget content. In this manner, the virtual agent will now be able to dynamically initiate a conversation with the user to assist the user in addressing a problem the user is currently experiencing with the widget.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: July 26, 2022
    Assignee: KYNDRYL, INC.
    Inventors: Garfield W. Vaughn, Vasanthi M. Gopal, Gandhi Sivakumar, Malar Kandasamy, Lakshmi Priya Shanmugam
  • Publication number: 20220120912
    Abstract: An apparatus receives a transaction request comprising a pair of latitude and longitude coordinates for where a transaction is being attempted by a user. The apparatus determines that the latitude and longitude coordinates from the transaction request are outside of a first region comprising a first plurality of points and outside of a second region comprising a second plurality of points. The points in the first and second regions comprise latitude and longitude coordinates for a location where a user visited. The second region does not overlap the first region. The apparatus tags the transaction request as anomalous. The apparatus generates an alert requesting that the user confirm whether the second transaction should be authenticated. The apparatus also transmits the alert to a first user device identified in a user account profile.
    Type: Application
    Filed: October 15, 2020
    Publication date: April 21, 2022
    Inventors: Lekha Bollinani, Lakshmi Priya, Ramya Gangathara Rao
  • Publication number: 20220124017
    Abstract: This disclosure describes methods to process timing information of flows in a network. One or more processors determine a latency associated with each of one or more packets of a flow passing through a device. The one or more processors determine that the latency is greater than a baseline latency, and the one or more processors provide a message indicating at least the flow and that the latency is greater than the baseline latency.
    Type: Application
    Filed: October 20, 2020
    Publication date: April 21, 2022
    Inventors: Padmanab Pathikonda, Rishi Chhibber, Roshan Lal, Lakshmi Priya Sarma, Vinay Narayana Rai, Akash Garg
  • Patent number: 11283796
    Abstract: Methods, systems, and computer program products are provided for real-time compromise detection based on behavioral analytics. The detection runs in real-time, during user authentication, for example, with respect to a resource. The probability that the authentication is coming from a compromised account is assessed. The features of the current authentication are compared with the features from past authentications of the user. After comparison, a match score is generated. The match score is indicative of the similarity of the authentication to the user's history of authentication. This score is then discretized into risk levels based on the empirical probability of compromise based on known past compromised user authentications. The risk levels may be used to detect whether user authentication is occurring via compromised credentials.
    Type: Grant
    Filed: September 24, 2019
    Date of Patent: March 22, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Maria Puertas Calvo, Lakshmi Priya Gopal, Laurentiu B. Cristofor, Pui-Yin Winfred Wong, Dana S. Kaufman
  • Patent number: 11075950
    Abstract: A computer-implemented method of generating a security policy for a microsegmented computing system is provided. The method includes generating a port service map that indicates inbound packet activity by port for a plurality of network addresses within the microsegmented computing system and a port distribution map that indicates inbound packet activity by port for a plurality of network addresses within the microsegmented computing system, and generating a list of security policy recommendations based on the port service map and/or the port distribution map.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: July 27, 2021
    Assignee: CA, Inc.
    Inventors: Krishna Kumar Yadav Nukala, Vikas Pullagura, Dharanidhar Sahu, Jagadishwara Chary Sriramoju, Lakshmi Priya Vennapusa
  • Publication number: 20210049238
    Abstract: A computer-implemented method, system and computer program product for initiating a conversation by a virtual agent. The boundary of a widget of a webpage the user is utilizing is determined. The user's interactions or lack of interactions with the widget within the determined boundary of the widget of the webpage is then determined, such as based on tracking the eye gaze or focus of the user. If it is determined that the user is experiencing difficulty in utilizing the widget, then the content associated with the widget is extracted. The extracted widget content is then mapped to the virtual agent content. The virtual agent is instructed to initiate a conversation based on the extracted widget content. In this manner, the virtual agent will now be able to dynamically initiate a conversation with the user to assist the user in addressing a problem the user is currently experiencing with the widget.
    Type: Application
    Filed: August 15, 2019
    Publication date: February 18, 2021
    Inventors: Garfield W. Vaughn, Vasanthi M. Gopal, Gandhi Sivakumar, Malar Kandasamy, Lakshmi Priya Shanmugam
  • Publication number: 20200412717
    Abstract: Methods, systems, and computer program products are provided for real-time compromise detection based on behavioral analytics. The detection runs in real-time, during user authentication, for example, with respect to a resource. The probability that the authentication is coming from a compromised account is assessed. The features of the current authentication are compared with the features from past authentications of the user. After comparison, a match score is generated. The match score is indicative of the similarity of the authentication to the user's history of authentication. This score is then discretized into risk levels based on the empirical probability of compromise based on known past compromised user authentications. The risk levels may be used to detect whether user authentication is occurring via compromised credentials.
    Type: Application
    Filed: September 24, 2019
    Publication date: December 31, 2020
    Inventors: Maria Puertas Calvo, Lakshmi Priya Gopal, Laurentiu B. Cristofor, Pui-Yin Winfred Wong, Dana S. Kaufman
  • Publication number: 20200389413
    Abstract: In one embodiment, a method includes receiving a request to establish a path for a data stream from the first network apparatus to a second network apparatus, where the request is associated with a requested bandwidth for the data stream, and where the first network apparatus and the second network apparatus are connected by a link aggregation group including a number of physical links, accessing bandwidth information representing a number of remaining bandwidths of the respective multiple of physical links, determining that the requested bandwidth is not satisfied by any of the number of remaining bandwidths of the number of physical links, and sending a response rejecting the request to establish the path.
    Type: Application
    Filed: June 4, 2019
    Publication date: December 10, 2020
    Inventors: Roshan Lal, Rishi Chhibber, Padmanab Pathikonda, Lakshmi Priya Sarma, Francesco Meo
  • Patent number: 10834056
    Abstract: Methods and devices for opening a firewall port for a specified time period are provided. A data packet having a source address and a destination address beyond a firewall transmitted from a process source is intercepted by an interceptor. Responsive to determining, based on the source address, that a firewall port is not open, buffering the data packet. A request comprising an identifier, a protocol identifier, and a time period the firewall port is to be open is transmitted to a firewall controller. The firewall controller authenticates the request based on the identifier and opens a firewall port determined based on the protocol identifier. The interceptor receives an open firewall port notification indicating that the firewall port has been opened and transmits the data packet through the firewall port to the destination address. The firewall controller closes the firewall port when the time period has expired.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: November 10, 2020
    Assignee: CA, Inc.
    Inventors: Krishna Kumar Yadav Nukala, Vikas Pullagura, Shamayel Mohammed Farooqui, Jagadishwara Chary Sriramoju, Lakshmi Priya Vennapusa, Dharanidhar Sahu, Ramana Naga Venkata Mittapalli
  • Publication number: 20200059491
    Abstract: A computer-implemented method of generating a security policy for a microsegmented computing system is provided. The method includes generating a port service map that indicates inbound packet activity by port for a plurality of network addresses within the microsegmented computing system and a port distribution map that indicates inbound packet activity by port for a plurality of network addresses within the microsegmented computing system, and generating a list of security policy recommendations based on the port service map and/or the port distribution map.
    Type: Application
    Filed: August 20, 2018
    Publication date: February 20, 2020
    Inventors: Krishna Kumar Yadav Nukala, Vikas Pullagura, Dharanidhar Sahu, Jagadishwara Chary Sriramoju, Lakshmi Priya Vennapusa
  • Publication number: 20200045015
    Abstract: Methods and devices for opening a firewall port for a specified time period are provided. A data packet having a source address and a destination address beyond a firewall transmitted from a process source is intercepted by an interceptor. Responsive to determining, based on the source address, that a firewall port is not open, buffering the data packet. A request comprising an identifier, a protocol identifier, and a time period the firewall port is to be open is transmitted to a firewall controller. The firewall controller authenticates the request based on the identifier and opens a firewall port determined based on the protocol identifier. The interceptor receives an open firewall port notification indicating that the firewall port has been opened and transmits the data packet through the firewall port to the destination address. The firewall controller closes the firewall port when the time period has expired.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Applicant: CA, Inc.
    Inventors: Krishna Kumar Yadav Nukala, Vikas Pullagura, Shamayel Mohammed Farooqui, Jagadishwara Chary Sriramoju, Lakshmi Priya Vennapusa, Dharanidhar Sahu, Ramana Naga Venkata Mittapalli
  • Patent number: 9471346
    Abstract: Embodiments of the present invention provide hints for page stealing by prioritizing pages based on the number of residences. Receiving a plurality of pages to be hinted to a hypervisor for page stealing. Determining at least two page types of the plurality of pages. Determining whether any of the at least two page types has a total number of residences less than a total number of potential residences in the virtual environment for all page types and have a total number of residences less than a threshold. Responsive to determining a first page type of the at least two page types has a total number of residences less than a total number of potential residences for all page types and has a total number of residences less than a threshold, notifying the hypervisor of at least one page from the plurality of pages that is the determined first page type.
    Type: Grant
    Filed: May 24, 2016
    Date of Patent: October 18, 2016
    Assignee: International Business Machines Corporation
    Inventors: Chetan L. Gaonkar, Chidambar Y. Kulkarni, Lakshmi Priya, Vamshi K. Thatikonda
  • Patent number: 9436601
    Abstract: Embodiments of the present invention provide hints for page stealing by prioritizing pages based on the number of residences. Receiving a plurality of pages to be hinted to a hypervisor for page stealing. Determining at least two page types of the plurality of pages. Determining whether any of the at least two page types has a total number of residences less than a total number of potential residences in the virtual environment for all page types and have a total number of residences less than a threshold. Responsive to determining a first page type of the at least two page types has a total number of residences less than a total number of potential residences for all page types and has a total number of residences less than a threshold, notifying the hypervisor of at least one page from the plurality of pages that is the determined first page type.
    Type: Grant
    Filed: September 15, 2014
    Date of Patent: September 6, 2016
    Assignee: International Business Machines Corporation
    Inventors: Chetan L. Gaonkar, Lakshmi Priya, Chidambar Y. Kulkarni, Vamshi K. Thatikonda