Patents by Inventor Niranjan Koduri
Niranjan Koduri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250259425Abstract: Image fingerprints (embeddings) are generated by an image fingerprinting model and indexed with an approximate nearest neighbors (ANN) model trained to identify the most similar fingerprint based on a subject embedding. For image matching, a score is provided that indicates a similarity between the input embedding and the most similar identified embedding, which allows for matching even when an image has been distorted, rotated, cropped, or otherwise modified. For image classification, the embeddings in the index are clustered and the clusters are labeled. Users can provide just a few images to add to the index as a labeled cluster. The ANN model returns a score and label of the most similar identified embedding for labeling the subject image if the score exceeds a threshold. As improvements are made to the image fingerprinting model, a converter model is trained to convert the original embeddings to be compatible with the new embeddings.Type: ApplicationFiled: April 30, 2025Publication date: August 14, 2025Inventors: Yihua Liao, Niranjan Koduri, Emanoel Daryoush, Jason B. Bryslawskyj, Yi Zhang, Ari Azarafrooz, Wayne Xin
-
Patent number: 12266209Abstract: A system to generate an image classifier and test it nearly instantaneously is described herein. Image embeddings generated by an image fingerprinting model are indexed and an associated approximate nearest neighbors (ANN) model is generated. The embeddings in the index are clustered and the clusters are labeled. Users can provide just a few images to add to the index as a labeled cluster. The ANN model is trained to receive an image embedding as input and return a score and label of the most similar identified embedding. The label may be applied if the score exceeds a threshold value. The image classifier can be tested efficiently using Leave One Out Cross Validation (“LOOCV”) to provide near-instantaneous quality indications of the image classifier to the user. Near-instantaneous indications of outliers in the provided images can also be provided to the user using a distance to the centroid calculation.Type: GrantFiled: February 26, 2024Date of Patent: April 1, 2025Assignee: Netskope, Inc.Inventors: Jason B. Bryslawskyj, Yi Zhang, Emanoel Daryoush, Ari Azarafrooz, Wayne Xin, Yihua Liao, Niranjan Koduri
-
Patent number: 12243294Abstract: Image fingerprints (embeddings) are generated by an image fingerprinting model and indexed with an approximate nearest neighbors (ANN) model trained to identify the most similar fingerprint based on a subject embedding. For image matching, a score is provided that indicates a similarity between the input embedding and the most similar identified embedding, which allows for matching even when an image has been distorted, rotated, cropped, or otherwise modified. For image classification, the embeddings in the index are clustered and the clusters are labeled. Users can provide just a few images to add to the index as a labeled cluster. The ANN model returns a score and label of the most similar identified embedding for labeling the subject image if the score exceeds a threshold. As improvements are made to the image fingerprinting model, a converter model is trained to convert the original embeddings to be compatible with the new embeddings.Type: GrantFiled: August 16, 2023Date of Patent: March 4, 2025Assignee: Netskope, Inc.Inventors: Jason B. Bryslawskyj, Yi Zhang, Ari Azarafrooz, Wayne Xin, Yihua Liao, Niranjan Koduri, Emanoel Daryoush
-
Publication number: 20250061690Abstract: Image fingerprints (embeddings) are generated by an image fingerprinting model and indexed with an approximate nearest neighbors (ANN) model trained to identify the most similar fingerprint based on a subject embedding. For image matching, a score is provided that indicates a similarity between the input embedding and the most similar identified embedding, which allows for matching even when an image has been distorted, rotated, cropped, or otherwise modified. For image classification, the embeddings in the index are clustered and the clusters are labeled. Users can provide just a few images to add to the index as a labeled cluster. The ANN model returns a score and label of the most similar identified embedding for labeling the subject image if the score exceeds a threshold. As improvements are made to the image fingerprinting model, a converter model is trained to convert the original embeddings to be compatible with the new embeddings.Type: ApplicationFiled: August 16, 2023Publication date: February 20, 2025Inventors: Yihua Liao, Niranjan Koduri, Emanoel Daryoush, Jason B. Bryslawskyj, Yi Zhang, Ari Azarafrooz, Wayne Xin
-
Publication number: 20250061691Abstract: Image fingerprints (embeddings) are generated by an image fingerprinting model and indexed with an approximate nearest neighbors (ANN) model trained to identify the most similar fingerprint based on a subject embedding. For image matching, a score is provided that indicates a similarity between the input embedding and the most similar identified embedding, which allows for matching even when an image has been distorted, rotated, cropped, or otherwise modified. For image classification, the embeddings in the index are clustered and the clusters are labeled. Users can provide just a few images to add to the index as a labeled cluster. The ANN model returns a score and label of the most similar identified embedding for labeling the subject image if the score exceeds a threshold. As improvements are made to the image fingerprinting model, a converter model is trained to convert the original embeddings to be compatible with the new embeddings.Type: ApplicationFiled: August 16, 2023Publication date: February 20, 2025Inventors: Jason B. Bryslawskyj, Yi Zhang, Ari Azarafrooz, Wayne Xin, Yihua Liao, Niranjan Koduri, Emanoel Daryoush
-
Patent number: 11983955Abstract: Image fingerprints (embeddings) are generated by an image fingerprinting model and indexed with an approximate nearest neighbors (ANN) model trained to identify the most similar fingerprint based on a subject embedding. For image matching, a score is provided that indicates a similarity between the input embedding and the most similar identified embedding, which allows for matching even when an image has been distorted, rotated, cropped, or otherwise modified. For image classification, the embeddings in the index are clustered and the clusters are labeled. Users can provide just a few images to add to the index as a labeled cluster. The ANN model returns a score and label of the most similar identified embedding for labeling the subject image if the score exceeds a threshold. As improvements are made to the image fingerprinting model, a converter model is trained to convert the original embeddings to be compatible with the new embeddings.Type: GrantFiled: August 16, 2023Date of Patent: May 14, 2024Assignee: Netskope, Inc.Inventors: Emanoel Daryoush, Jason B. Bryslawskyj, Yi Zhang, Ari Azarafrooz, Wayne Xin, Yihua Liao, Niranjan Koduri
-
Patent number: 11574074Abstract: Provided herein are systems and methods for classifying content to prevent data breach or exfiltration. An entity engine may receive content for classification into a content type for preventing data breach or exfiltration. The entity engine may determine that secondary data, defined by an operand of an entity definition, is present in the content. Each entity definition may correspond to one content type and may include a Boolean expression of operands. Each operand may include a matching element to be used for matching against content undergoing classification into one of the content types, upon secondary data defined by the operand being present in the content. The entity engine may classify the content into a content type of the content types, corresponding to the entity definition, based on matching the matching element of the operand to the content, and matching other operands of the entity definition to the content.Type: GrantFiled: December 11, 2017Date of Patent: February 7, 2023Assignee: Digital Guardian LLCInventors: Niranjan Koduri, Richard Douglas LeCour, Emanoel Daryoush
-
Patent number: 11507697Abstract: Provided herein are systems and methods for defining and securely sharing objects for use in preventing data breach or exfiltration. Memory may be configured to store a plurality of objects for use in preventing data breach or exfiltration. A validation engine can validate the objects, incorporate into each object an object identifier and a signature, and generate a subset of the objects for use by a first user. The validation engine can store, in the memory, the plurality of objects as a superset of objects corresponding to the generated subset. An evaluation engine may, responsive to identifying that one or more object identifiers and signatures in a received set of objects belong to the subset corresponding to the stored superset, verify whether any object in the received set has been tampered with.Type: GrantFiled: October 12, 2020Date of Patent: November 22, 2022Assignee: Digital Guardian LLCInventors: Shreemathi Atreya, Niranjan Koduri, Wai Tung Yim, Emanoel Daryoush
-
Publication number: 20210026992Abstract: Provided herein are systems and methods for defining and securely sharing objects for use in preventing data breach or exfiltration. Memory may be configured to store a plurality of objects for use in preventing data breach or exfiltration. A validation engine can validate the objects, incorporate into each object an object identifier and a signature, and generate a subset of the objects for use by a first user. The validation engine can store, in the memory, the plurality of objects as a superset of objects corresponding to the generated subset. An evaluation engine may, responsive to identifying that one or more object identifiers and signatures in a received set of objects belong to the subset corresponding to the stored superset, verify whether any object in the received set has been tampered with.Type: ApplicationFiled: October 12, 2020Publication date: January 28, 2021Applicant: Digital Guardian, Inc.Inventors: Shreemathi Atreya, Niranjan Koduri, Wai Tung Yim, Emanoel Daryoush
-
Patent number: 10803204Abstract: Provided herein are systems and methods for defining and securely sharing objects for use in preventing data breach or exfiltration. Memory may be configured to store a plurality of objects for use in preventing data breach or exfiltration. A validation engine can validate the objects, incorporate into each object an object identifier and a signature, and generate a subset of the objects for use by a first user. The validation engine can store, in the memory, the plurality of objects as a superset of objects corresponding to the generated subset. An evaluation engine may, responsive to identifying that one or more object identifiers and signatures in a received set of objects belong to the subset corresponding to the stored superset, verify whether any object in the received set has been tampered with.Type: GrantFiled: January 25, 2018Date of Patent: October 13, 2020Assignee: Digital Guardian LLCInventors: Shreemathi Atreya, Niranjan Koduri, Wai Tung Yim, Emanoel Daryoush
-
Publication number: 20190228186Abstract: Provided herein are systems and methods for defining and securely sharing objects for use in preventing data breach or exfiltration. Memory may be configured to store a plurality of objects for use in preventing data breach or exfiltration. A validation engine can validate the objects, incorporate into each object an object identifier and a signature, and generate a subset of the objects for use by a first user. The validation engine can store, in the memory, the plurality of objects as a superset of objects corresponding to the generated subset. An evaluation engine may, responsive to identifying that one or more object identifiers and signatures in a received set of objects belong to the subset corresponding to the stored superset, verify whether any object in the received set has been tampered with.Type: ApplicationFiled: January 25, 2018Publication date: July 25, 2019Inventors: Shreemathi Atreya, Niranjan Koduri, Wai Tung Yim, Emanoel Daryoush
-
Publication number: 20190180048Abstract: Provided herein are systems and methods for classifying content to prevent data breach or exfiltration. An entity engine may receive content for classification into a content type for preventing data breach or exfiltration. The entity engine may determine that secondary data, defined by an operand of an entity definition, is present in the content. Each entity definition may correspond to one content type and may include a Boolean expression of operands. Each operand may include a matching element to be used for matching against content undergoing classification into one of the content types, upon secondary data defined by the operand being present in the content. The entity engine may classify the content into a content type of the content types, corresponding to the entity definition, based on matching the matching element of the operand to the content, and matching other operands of the entity definition to the content.Type: ApplicationFiled: December 11, 2017Publication date: June 13, 2019Inventors: Niranjan Koduri, Richard Douglas LeCour, Emanoel Daryoush
-
Patent number: 9306955Abstract: A policy is established comprising a condition having a multiphase attribute of a multiphase transaction. Phase specific policies are established for each phase in which the multiphase attribute may become known. The multiphase transaction is evaluated according to the phase specific policies at each phase of the multiphase transaction in which the multiphase attribute may become known until a policy decision of the policy is determined.Type: GrantFiled: June 29, 2015Date of Patent: April 5, 2016Assignee: Cisco Technology, Inc.Inventors: Haiyan Luo, Hari Shankar, Daryl Odnert, Niranjan Koduri
-
Patent number: 9237168Abstract: Traffic control techniques are provided for intercepting an initial message in a handshaking procedure for a secure communication between a first device and a second device at a proxy device. Identification information associated with the second device is extracted from the initial message. A policy is applied to communications between the first device and second device based on the identification information.Type: GrantFiled: May 17, 2012Date of Patent: January 12, 2016Assignee: Cisco Technology, Inc.Inventors: Jianxin Wang, Hari Shankar, Trevor Highland, Niranjan Koduri, Daryl Odnert
-
Publication number: 20150304340Abstract: A policy is established comprising a condition having a multiphase attribute of a multiphase transaction. Phase specific policies are established for each phase in which the multiphase attribute may become known. The multiphase transaction is evaluated according to the phase specific policies at each phase of the multiphase transaction in which the multiphase attribute may become known until a policy decision of the policy is determined.Type: ApplicationFiled: June 29, 2015Publication date: October 22, 2015Inventors: Haiyan Luo, Hari Shankar, Daryl Odnert, Niranjan Koduri
-
Patent number: 9100366Abstract: A policy is established comprising a condition having a multiphase attribute of a multiphase transaction. Phase specific policies are established for each phase in which the multiphase attribute may become known. The multiphase transaction is evaluated according to the phase specific policies at each phase of the multiphase transaction in which the multiphase attribute may become known until a policy decision of the policy is determined.Type: GrantFiled: September 13, 2012Date of Patent: August 4, 2015Assignee: Cisco Technology, Inc.Inventors: Haiyan Luo, Hari Shankar, Daryl Odnert, Niranjan Koduri
-
Publication number: 20140075497Abstract: A policy is established comprising a condition having a multiphase attribute of a multiphase transaction. Phase specific policies are established for each phase in which the multiphase attribute may become known. The multiphase transaction is evaluated according to the phase specific policies at each phase of the multiphase transaction in which the multiphase attribute may become known until a policy decision of the policy is determined.Type: ApplicationFiled: September 13, 2012Publication date: March 13, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Haiyan Luo, Hari Shankar, Daryl Odnert, Niranjan Koduri
-
Publication number: 20130312054Abstract: Traffic control techniques are provided for intercepting an initial message in a handshaking procedure for a secure communication between a first device and a second device at a proxy device. Identification information associated with the second device is extracted from the initial message. A policy is applied to communications between the first device and second device based on the identification information.Type: ApplicationFiled: May 17, 2012Publication date: November 21, 2013Applicant: CISCO TECHNOLOGY, INC.Inventors: Jianxin Wang, Hari Shankar, Trevor Highland, Niranjan Koduri, Daryl Odnert