Patents by Inventor Manish Shukla

Manish Shukla has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11960549
    Abstract: Data is collected from a network graph, wherein the collected data is useful for training a machine learning model on a query domain. A domain-specific template corresponding to the query domain is received, the domain-specific template defining one or more classifiers to guide collection of content relevant to the query domain from the network graph. A collection starting point is analyzed based on the one or more classifiers of the domain-specific template to identify one or more relevant instances of the content. The one or more identified relevant instances of the content are added to a contextual protocol package. Each identified relevant instance of the content is analyzed based on the one or more classifiers of the domain-specific template to identify one or more additional relevant instances of the content. The one or more identified additional relevant instances of the content are added to the contextual protocol package.
    Type: Grant
    Filed: March 29, 2022
    Date of Patent: April 16, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yu Zhang, Pankaj Sharma, Manish Shukla, Grigoriy A Orlov
  • Publication number: 20240098549
    Abstract: Aspects of the present disclosure allow for improving E2E mesh throughput by applying transmission (TX) biasing on the Wi-Fi mesh backhaul. Aspects of the disclosure are directed to solutions for reducing traffic load in Wi-Fi mesh networks by applying TX biasing on the Wi-Fi mesh backhaul. Certain aspects are directed to selectively transmitting or preventing transmission of data over the first backhaul link to the first MLD based at least in part on a fronthaul airtime utilization, a first backhaul airtime utilization, or a second backhaul airtime utilization. Doing so allows a root access point or a network controller to apply TX biasing between multi-link operation links towards each repeater so that traffic load on a backhaul-link would not overly occupy the front-haul link because of common channel use by selectively transmitting or preventing transmission of data on the backhaul links.
    Type: Application
    Filed: September 21, 2022
    Publication date: March 21, 2024
    Inventors: Xiaolong HUANG, Manish Shukla, Srinivas Katar, Sandip Homchaudhuri, Simon Jan Brand, Harinder Singh, Tejaswini Gollamudi, Qinfang Sun
  • Publication number: 20240098560
    Abstract: This disclosure provides methods, devices and systems for load balancing access points (APs) in a mesh network. Certain aspects are directed to obtaining load information from each wireless device of a set of wireless devices, the load information being indicative of resource availability for each band available to each wireless device of the set. In some examples, the disclosure is directed to identifying a first band and a first wireless device of the set of wireless devices associated with the first band based on the first band having a highest level of traffic among bands available to the set of wireless devices.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 21, 2024
    Inventors: Xiaolong HUANG, Srinivas KATAR, Manish SHUKLA, Sandip HOMCHAUDHURI
  • Publication number: 20240098811
    Abstract: A first Multi-AP device configured as a Multi-AP Agent transmits, to a second Multi-AP device configured as a Multi-AP Controller over a first communication link, a Device Provisioning Protocol (DPP) Configuration Request Message indicating multi-link operation (MLO) capabilities of the first Multi-AP device. The first Multi-AP device receives, from the second Multi-AP device over the first communication link, a DPP Configuration Response Message indicating MLO association information responsive to the indicated MLO capabilities, and establishes a backhaul path with a third Multi-AP device, configured as a second Multi-AP Agent, on the first communication link and one or more second communication links according to the MLO association information.
    Type: Application
    Filed: September 16, 2022
    Publication date: March 21, 2024
    Inventors: Xiaolong HUANG, Sai Yiu Duncan HO, Srinivas KATAR, Mughilan RAMAJAYAM, Sandip HOMCHAUDHURI, Manish SHUKLA
  • Patent number: 11936677
    Abstract: This disclosure relates generally to system and method for assessing insider influence on enterprise assets. Existing work focuses on the detection of insider threat and does not consider the influence of an insider on their peers and subordinates. The present disclosure aggregates and preprocesses the enterprise data specific to the individuals received from various sources, and further creates an enterprise graph between entities. Weights of every edge connected between any two entities in the enterprise graph is then calculated. Community of the individuals are detected wherein, relevant insider(s) are identified, and susceptibility of the individuals for probable influence by relevant insider(s) based on the analysis scenarios(s) is calculated. Paths taken by the relevant insider(s) is calculated for estimating probability of data loss.
    Type: Grant
    Filed: October 25, 2021
    Date of Patent: March 19, 2024
    Assignee: Tata Consultancy Limited Services
    Inventors: Manish Shukla, Sachin Premsukh Lodha
  • Publication number: 20240086718
    Abstract: This disclosure relates generally to system and method for classification of sensitive date using federated semi-supervised learning. Federated learning has emerged as a privacy-preserving technique to learn one or more machine learning (ML) models without requiring users to share their data. In federated learning, data distribution among clients is imbalanced resulting with limited data in some clients. The method includes extracting a training dataset from one or more data sources and pre-processing the training dataset into a machine readable form based on associated data type. Further, a federated semi-supervised learning model is iteratively trained based on a model contrastive and distillation learning to classify sensitive data from the unlabeled dataset. Then, sensitive data from a user query is received as input which are classified using the federated semi-supervised learning model.
    Type: Application
    Filed: August 18, 2023
    Publication date: March 14, 2024
    Applicant: Tata Consultancy Services Limited
    Inventors: Shubham Mukeshbhai MALAVIYA, Manish SHUKLA, Sachin Premsukh LODHA
  • Patent number: 11907907
    Abstract: A system and method for implementing a centralized innovation framework module are disclosed. A processor is operatively connected to one or more memories via a communication network. The processor creates a centralized web-based collaborative platform hub for collection of innovation ideas data from end users within an operation space and causes the centralized web-based collaborative platform hub to receive innovation ideas data from an end user related to development of an application. The processor also analyzes the received innovation ideas data establishes, based on analyzing, a connection between the centralized web-based collaborative platform hub and a development platform; migrates the received innovation ideas data onto the development platform; and creates a workflow on the development platform for tracking and managing development processes of the application.
    Type: Grant
    Filed: April 19, 2021
    Date of Patent: February 20, 2024
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Manish Shukla, Brian Clawson, Vidhya Rao, Peter Antony Hangal Jeorge, Abraham McCauley, Mark Osman, Pranjal K Tiwari, Arvind Bhanushali, Tancy Chiu Yang Tan, Cheryl Tanaja, Raj Solanki, Kanako Minami Redhead
  • Patent number: 11829193
    Abstract: This disclosure relates generally to online learning against data poisoning attack. Conventional methods used data sanitization techniques for online learning against data poisoning attack. However, these methods do not remove poisoned data points from training dataset completely. Embodiments of the present disclosure method provide an influence based defense method for secure online learning against data poisoning attack. The method initially filters a subset of poisoned data points in the training dataset for training a machine learning model using data sanitization technique. Further the method computes an influence of the data points and performs an influence minimization based on a predefined threshold. Updated data points for the learning model are generated and used for training the machine learning model. The disclosed method can be used against data poisoning attacks in applications such as spam filtering, malware detection, recommender system and so on.
    Type: Grant
    Filed: August 12, 2021
    Date of Patent: November 28, 2023
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Manish Shukla, Rosni Kottekulam Vasu, Sachin Premsukh Lodha, Sanjay Seetharaman
  • Patent number: 11805137
    Abstract: Data-driven applications depend on training data obtained from multiple internal and external data sources. Hence poisoning of the training data can cause adverse effects in the data driven applications. Conventional methods identifies contaminated test samples and avert them from entering into the training. A generic approach covering all data-driven applications and all types of data poisoning attacks in an efficient manner is challenging. Initially, data aggregation is performed after receiving a ML application for testing. A plurality of feature vectors are extracted from the aggregated data and a poisoned data set is generated. A plurality of personas are generated and are further prioritized to obtain a plurality of attack personas. Further, a plurality of security assessment vectors are computed for each of the plurality of attack personas. A plurality of preventive measures are recommended for each of the plurality of attack personas based on the corresponding security assessment vector.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: October 31, 2023
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Manish Shukla, Rosni Kottekulam Vasu, Sachin Premsukh Lodha, Sanjay Seetharaman
  • Publication number: 20230315792
    Abstract: Data is collected from a network graph, wherein the collected data is useful for training a machine learning model on a query domain. A domain-specific template corresponding to the query domain is received, the domain-specific template defining one or more classifiers to guide collection of content relevant to the query domain from the network graph. A collection starting point is analyzed based on the one or more classifiers of the domain-specific template to identify one or more relevant instances of the content. The one or more identified relevant instances of the content are added to a contextual protocol package. Each identified relevant instance of the content is analyzed based on the one or more classifiers of the domain-specific template to identify one or more additional relevant instances of the content. The one or more identified additional relevant instances of the content are added to the contextual protocol package.
    Type: Application
    Filed: March 29, 2022
    Publication date: October 5, 2023
    Inventors: Yu ZHANG, Pankaj SHARMA, Manish SHUKLA, Grigoriy A. ORLOV
  • Publication number: 20230009039
    Abstract: Techniques for managing an access privilege for users of an organization having first and second tenants includes storing, at a data storage, first user account data of a first user account associated with a first user of the first tenant, the first user account data including a first object identifier, a first tenant identifier and first access privilege information including access privileges granted to the first user account of the first tenant to access one or more resources; creating, for the first user associated with the first tenant, a second user account of the second tenant and second user account data of the second user account; setting the second user account data to include linked account information including the first object identifier and the first tenant identifier of the first user account data; and storing, at the data storage, the second user account data including the linked account information.
    Type: Application
    Filed: September 13, 2022
    Publication date: January 12, 2023
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Ariel GORDON, Somak BHATTACHARYYA, Manish SHUKLA
  • Patent number: 11503037
    Abstract: Techniques for managing access to content are provided that include receiving a first signal requesting an indication whether a user has an access privilege to access to a resource associated with a first tenant of an access management service or perform an operation by a data processing system using the resource, determining that a first user account associated with the user does not have an access privilege to access the resource; performing a nested access privilege check to determine whether the user is associated with a second user account that has the access privilege to access the resource; and granting via the communication network access to the resource responsive to the nested access privilege check determining that the user is associated with the second user account and the second user account is associated with the access privilege to access the resource.
    Type: Grant
    Filed: November 4, 2019
    Date of Patent: November 15, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ariel Gordon, Somak Bhattacharyya, Manish Shukla
  • Publication number: 20220284398
    Abstract: A system and method for implementing a centralized innovation framework module are disclosed. A processor is operatively connected to one or more memories via a communication network. The processor creates a centralized web-based collaborative platform hub for collection of innovation ideas data from end users within an operation space and causes the centralized web-based collaborative platform hub to receive innovation ideas data from an end user related to development of an application. The processor also analyzes the received innovation ideas data establishes, based on analyzing, a connection between the centralized web-based collaborative platform hub and a development platform; migrates the received innovation ideas data onto the development platform; and creates a workflow on the development platform for tracking and managing development processes of the application.
    Type: Application
    Filed: April 19, 2021
    Publication date: September 8, 2022
    Applicant: JPMorgan Chase Bank, N.A.
    Inventors: Manish SHUKLA, Brian CLAWSON, Vidhya RAO, Peter ANTONY HANGAL JEORGE, Abraham MCCAULEY, Mark OSMAN, Pranjal K TIWARI, Arvind BHANUSHALI, Tancy Chiu Yang TAN, Cheryl TANAJA, Raj SOLANKI, Kanako Minami REDHEAD
  • Publication number: 20220131890
    Abstract: This disclosure relates generally to system and method for assessing insider influence on enterprise assets. Existing work focuses on the detection of insider threat and does not consider the influence of an insider on their peers and subordinates. The present disclosure aggregates and preprocesses the enterprise data specific to the individuals received from various sources, and further creates an enterprise graph between entities. Weights of every edge connected between any two entities in the enterprise graph is then calculated. Community of the individuals are detected wherein, relevant insider(s) are identified, and susceptibility of the individuals for probable influence by relevant insider(s) based on the analysis scenarios(s) is calculated. Paths taken by the relevant insider(s) is calculated for estimating probability of data loss.
    Type: Application
    Filed: October 25, 2021
    Publication date: April 28, 2022
    Applicant: Tata Consultancy Services Limited
    Inventors: Manish SHUKLA, Sachin Premsukh LODHA
  • Publication number: 20220050928
    Abstract: This disclosure relates generally to online learning against data poisoning attack. Conventional methods used data sanitization techniques for online learning against data poisoning attack. However, these methods do not remove poisoned data points from training dataset completely. Embodiments of the present disclosure method provide an influence based defense method for secure online learning against data poisoning attack. The method initially filters a subset of poisoned data points in the training dataset for training a machine learning model using data sanitization technique. Further the method computes an influence of the data points and performs an influence minimization based on a predefined threshold. Updated data points for the learning model are generated and used for training the machine learning model. The disclosed method can be used against data poisoning attacks in applications such as spam filtering, malware detection, recommender system and so on.
    Type: Application
    Filed: August 12, 2021
    Publication date: February 17, 2022
    Applicant: Tata Consultancy Services Limited
    Inventors: Manish SHUKLA, Rosni Kottekulam VASU, Sachin Premsukh LODHA, Sanjay SEETHARAMAN
  • Publication number: 20210377286
    Abstract: Data-driven applications depend on training data obtained from multiple internal and external data sources. Hence poisoning of the training data can cause adverse effects in the data driven applications. Conventional methods identifies contaminated test samples and avert them from entering into the training. A generic approach covering all data-driven applications and all types of data poisoning attacks in an efficient manner is challenging. Initially, data aggregation is performed after receiving a ML application for testing. A plurality of feature vectors are extracted from the aggregated data and a poisoned data set is generated. A plurality of personas are generated and are further prioritized to obtain a plurality of attack personas. Further, a plurality of security assessment vectors are computed for each of the plurality of attack personas. A plurality of preventive measures are recommended for each of the plurality of attack personas based on the corresponding security assessment vector.
    Type: Application
    Filed: February 1, 2021
    Publication date: December 2, 2021
    Applicant: Tata Consultancy Services Limited
    Inventors: Manish SHUKLA, Rosni Kottekulam VASU, Sachin Premsukh LODHA, Sanjay SEETHARAMAN
  • Publication number: 20210136083
    Abstract: Techniques for managing access to content are provided that include receiving a first signal requesting an indication whether a user has an access privilege to access to a resource associated with a first tenant of an access management service or perform an operation by a data processing system using the resource, determining that a first user account associated with the user does not have an access privilege to access the resource; performing a nested access privilege check to determine whether the user is associated with a second user account that has the access privilege to access the resource; and granting via the communication network access to the resource responsive to the nested access privilege check determining that the user is associated with the second user account and the second user account is associated with the access privilege to access the resource.
    Type: Application
    Filed: November 4, 2019
    Publication date: May 6, 2021
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Ariel GORDON, Somak BHATTACHARYYA, Manish SHUKLA
  • Patent number: 10979237
    Abstract: A computer system tracks and analyzes activity data, notifications, and user interactions with activity data and notifications. By analyzing this information, the computer system can identify, for individual users and across a set of users, which activity data and notifications are most relevant. Such activity data and notifications are most relevant when they result in the end user having further user interaction through the electronic document. The information about the relevance of the activity data and notifications can be used for managing sending of notifications and presenting activity data in end user applications.
    Type: Grant
    Filed: October 28, 2016
    Date of Patent: April 13, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Douglas Milvaney, Hoi Mei Wong, Andrew Harris, Manish Shukla, Taili Feng
  • Patent number: 10791133
    Abstract: This disclosure relates generally to malware detection, and more particularly to system and method for detecting and mitigating ransomware threats. For a User Equipment being monitored, the system performs a behavior analysis of corresponding file system to determine whether any anomalous behavior that would amount to a ransomware threat is associated with flies associated with the file system change, if present, then the system virtualizes the file system on the fly. If information pertaining to the identified anomalous behavior is present in any of the reference databases in the system, then all the I/O calls are terminated or the file system is virtualized for rest of the session. If data pertaining to the identified anomalous behavior is not found in any of the associated databases, then new behavioral features and structural patterns of the identified anomalous behavior and the associated processes are extracted, and the reference databases are updated accordingly.
    Type: Grant
    Filed: October 23, 2017
    Date of Patent: September 29, 2020
    Assignee: Tata Consultancy Services Limited
    Inventors: Manish Shukla, Sutapa Mondal, Sachin Premsukh Lodha
  • Patent number: 10715999
    Abstract: Authentication keys are selectively cached locally for faster roaming of wireless stations in a communication network. An attempt by a station to reassociate with an access point is detected. Responsive to identifying a key corresponding to the station as evidence of a previous association, the key is retrieved from the key cache without contracting a controller or an authentication server, for faster responses. At least one modified response frame is generated to include the identified key along with an approval of the association between the access point and the station. The at least one modified response is sent from the access point to the station. An attempt to roam to a station for a first time is detected responsive to a key cache miss at the access point. If the station has previously associated with an access point under purview of the controller, keys are located and sent back to the access point without contacting an authentication server as an improvement over IEEE 802.11r.
    Type: Grant
    Filed: November 9, 2015
    Date of Patent: July 14, 2020
    Assignee: Fortinet, Inc.
    Inventors: Manas Sharma, Manish Shukla, Ligeo George