Patents by Inventor Prabhat Kumar Singh

Prabhat Kumar Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230385181
    Abstract: According to some embodiments, systems and methods are provided, including a memory storing processor-executable code; and a processing unit to execute the executable program code to: execute an automation test for a user interface application, wherein execution of the automation test includes accessing a web-object; determine whether the web-object is included in an object repository; in a case it is determined the web-object is not included in the object repository, create the web-object in the object repository; and in a case it is determined the web-object is included in the object repository: determine whether the accessed web-object includes at least one different property from the web-object included in the object repository; and update the web-object included in the object repository with the at least one different property in the accessed web-object. Numerous other aspects are provided.
    Type: Application
    Filed: May 31, 2022
    Publication date: November 30, 2023
    Inventors: Naveen V, Shanavas Madeen S, Ravikanth MALIPEDDU, Santhosh Reddy MEREDDY, Ajith G, Prabhat Kumar SINGH, Sushanth B. R, Manu Jose PHILIP
  • Publication number: 20220382236
    Abstract: According to some embodiments, a system and method comprising a plurality of automation tools; and a shared automation module, coupled to the plurality of automation tools including: a computer processor; a computer memory, coupled to the computer processor, storing instructions that, when executed by the computer processor cause the shared automation module to: receive a selection of a first automation tool of the plurality of automation tools; receive a selection of a second automation tool of the plurality of automation tools; execute the first automation tool to generate a first automation tool output; and execute the second automation tool using the stored first automation tool output to generate a second automation tool output. Numerous other aspects are provided.
    Type: Application
    Filed: May 27, 2021
    Publication date: December 1, 2022
    Inventors: Santhosh Reddy MEREDDY, Prakash KUMAR, Ravikanth MALIPEDDU, Gaurav MAZUMDAR, Shrijan SHRIVASTAV, Prabhat Kumar SINGH, Praveen JHA, Madhurima CHOWDHURY, Sushanth B R
  • Patent number: 10706030
    Abstract: A device extracts data files from different data sources, and processes the data files to generate data from the data files. The device trains a first artificial intelligence model and a second artificial intelligence model based on historical data parameters, wherein the historical data parameters are associated with historical data previously processed by the device. The device utilizes the trained first artificial intelligence model and the data to generate data parameters for the data, and utilizes the trained second artificial intelligence model, the data, and the data parameters to generate a data structure configuration. The device generates a data structure for the data based on the data parameters and the data structure configuration, stores the data in the data structure, and provides a user interface for accessing the data structure.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: July 7, 2020
    Assignee: Accenture Global Solutions Limited
    Inventors: Prakash Ghatage, Nirav Sampat, Kumar Viswanathan, Naveen Kumar Thangaraj, Bhushan Ananda Patil, Prabhat Kumar Singh
  • Publication number: 20200019488
    Abstract: Data is received that encapsulate a test case document including a series of test instructions written in natural language for testing a software application. The software application includes a plurality of graphical user interface views (e.g., views in a web browser, etc.). Thereafter, the test case document is parsed using at least one natural language processing algorithm. This parsing includes tagging instructions in the test case document with one of a plurality of pre-defined sequence labels. Subsequently, a test automate is generated using at least one machine learning model trained using historical test case documents, corresponding automates, and their successful executions and based on the tagged instructions in the test case document. The generated test automate includes one or more test scripts which, when executed, perform a testing sequence of the software application according to the series of test instructions. Related apparatus, systems, techniques and articles are also described.
    Type: Application
    Filed: July 12, 2018
    Publication date: January 16, 2020
    Inventors: Prabhat Kumar Singh, Alex Jude, Isha Gogia, Raaj Ahuja
  • Publication number: 20190236173
    Abstract: A device extracts data files from different data sources, and processes the data files to generate data from the data files. The device trains a first artificial intelligence model and a second artificial intelligence model based on historical data parameters, wherein the historical data parameters are associated with historical data previously processed by the device. The device utilizes the trained first artificial intelligence model and the data to generate data parameters for the data, and utilizes the trained second artificial intelligence model, the data, and the data parameters to generate a data structure configuration. The device generates a data structure for the data based on the data parameters and the data structure configuration, stores the data in the data structure, and provides a user interface for accessing the data structure.
    Type: Application
    Filed: January 31, 2018
    Publication date: August 1, 2019
    Inventors: Prakash GHATAGE, Nirav SAMPAT, Kumar VISWANATHAN, Naveen Kumar THANGARAJ, Bhushan Ananda PATIL, Prabhat KUMAR SINGH
  • Patent number: 9852296
    Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: December 26, 2017
    Assignee: McAfee, LLC
    Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
  • Patent number: 9703958
    Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: July 11, 2017
    Assignee: McAfee, Inc.
    Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
  • Patent number: 9639696
    Abstract: A method and apparatus for analyzing end user license agreements and taking action based on the analysis outcome. In one embodiment, the method includes sensing initialization of an installable software program installation, extracting a EULA from the installable during installation, pausing presentation of the EULA to a user, providing a database of suspect terms, analyzing whether a suspect term exists in the EULA, and presenting at least one of the EULA or a suspect term to the user.
    Type: Grant
    Filed: September 29, 2006
    Date of Patent: May 2, 2017
    Assignee: Symantec Operating Corporation
    Inventors: Sree Hari Nagaralu, Prabhat Kumar Singh
  • Patent number: 9607150
    Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.
    Type: Grant
    Filed: May 11, 2015
    Date of Patent: March 28, 2017
    Assignee: McAfee, Inc.
    Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
  • Patent number: 9323928
    Abstract: Systems and methods for detecting malicious processes in a non-signature based manner are disclosed. The system and method may include gathering features of processes running on an electronic device, applying a set of rules to the features, and applying a statistical analysis to the results of the rules application to determine whether a process should be classified into one or more of a plurality of process categories.
    Type: Grant
    Filed: June 1, 2011
    Date of Patent: April 26, 2016
    Assignee: McAfee, Inc.
    Inventors: Romanch Agarwal, Prabhat Kumar Singh, Nitin Jyoti, Harinath Ramachetty Vishwanath, Palasamudram Ramagopal Prashanth
  • Publication number: 20160019392
    Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.
    Type: Application
    Filed: September 25, 2015
    Publication date: January 21, 2016
    Applicant: MCAFEE, INC.
    Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
  • Publication number: 20160021129
    Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.
    Type: Application
    Filed: September 25, 2015
    Publication date: January 21, 2016
    Applicant: McAfee, Inc.
    Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
  • Publication number: 20150347755
    Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.
    Type: Application
    Filed: May 11, 2015
    Publication date: December 3, 2015
    Applicant: MCAFEE, INC.
    Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
  • Patent number: 9032523
    Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.
    Type: Grant
    Filed: September 16, 2013
    Date of Patent: May 12, 2015
    Assignee: McAfee, Inc.
    Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
  • Patent number: 8677493
    Abstract: A method for providing malware cleaning includes detecting potential malware on a first device connected to a network. A request including information to allow a second device connected to the network to determine an appropriate cleaning response is sent from the first device to the second device over the network. Upon receiving the request, the second device attempts to identify an appropriate cleaning response and, if a response is identified, sends the cleaning response over the network to the first device. The cleaning response is usable by the first device to address the detected potential malware.
    Type: Grant
    Filed: September 7, 2011
    Date of Patent: March 18, 2014
    Assignee: McAfee, Inc.
    Inventors: Prabhat Kumar Singh, Palasamudram Ramagopal Prashanth, Nitin Jyoti
  • Publication number: 20140026218
    Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.
    Type: Application
    Filed: September 16, 2013
    Publication date: January 23, 2014
    Applicant: McAfee, Inc.
    Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
  • Patent number: 8539583
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for rolling back protection processes. In one aspect, a method includes determining that a file is a malicious file, storing a duplicate of the file in a quarantine area, performing one or more protection processes on the file, if the determination that the file is a malicious file is a false positive determination, restoring the file by a pre-boot rollback process to a state prior to the one or more protection processes performed on the file, and booting the computer with the restored file, and if the determination that the file is a malicious file is not a false positive determination, not restoring the file to a state prior to the one or more protection processes performed on the file, and booting the computer.
    Type: Grant
    Filed: November 3, 2009
    Date of Patent: September 17, 2013
    Assignee: McAfee, Inc.
    Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
  • Publication number: 20130061325
    Abstract: A method for providing malware cleaning includes detecting potential malware on a first device connected to a network. A request including information to allow a second device connected to the network to determine an appropriate cleaning response is sent from the first device to the second device over the network. Upon receiving the request, the second device attempts to identify an appropriate cleaning response and, if a response is identified, sends the cleaning response over the network to the first device. The cleaning response is usable by the first device to address the detected potential malware.
    Type: Application
    Filed: September 7, 2011
    Publication date: March 7, 2013
    Applicant: McAfee, Inc.
    Inventors: Prabhat Kumar Singh, Palasamudram Ramagopal Prashanth, Nitin Jyoti
  • Publication number: 20130031111
    Abstract: A system, method, and computer program product are provided for segmenting a database based, at least in part, on a prevalence associated with known objects included in the database. In operation, a database including a plurality of known objects is identified. Additionally, the database is segmented into a plurality of segments. Furthermore, each of the plurality of known objects are assigned to one of the plurality of segments, based at least in part on a prevalence associated with each of the plurality of known objects.
    Type: Application
    Filed: October 4, 2012
    Publication date: January 31, 2013
    Inventors: Nitin Jyoti, Prabhat Kumar Singh, Zhenyu Zhong, Guy William Welch Roberts, Jeffrey Martin Green, Sven Krasser
  • Publication number: 20120311708
    Abstract: Systems and methods for detecting malicious processes in a non-signature based manner are disclosed. The system and method may include gathering features of processes running on an electronic device, applying a set of rules to the features, and applying a statistical analysis to the results of the rules application to determine whether a process should be classified into one or more of a plurality of process categories.
    Type: Application
    Filed: June 1, 2011
    Publication date: December 6, 2012
    Applicant: MCAFEE, INC.
    Inventors: Romanch Agarwal, Prabhat Kumar Singh, Nitin Jyoti, Harinath Ramachetty Vishwanath, Palasamudram Ramagopal Prashanth