Patents by Inventor Prabhat Kumar Singh
Prabhat Kumar Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12282419Abstract: According to some embodiments, systems and methods are provided, including a memory storing processor-executable code; and a processing unit to execute the executable program code to: execute an automation test for a user interface application, wherein execution of the automation test includes accessing a web-object; determine whether the web-object is included in an object repository; in a case it is determined the web-object is not included in the object repository, create the web-object in the object repository; and in a case it is determined the web-object is included in the object repository: determine whether the accessed web-object includes at least one different property from the web-object included in the object repository; and update the web-object included in the object repository with the at least one different property in the accessed web-object. Numerous other aspects are provided.Type: GrantFiled: May 31, 2022Date of Patent: April 22, 2025Assignee: SAP SEInventors: Naveen V, Shanavas Madeen S, Ravikanth Malipeddu, Santhosh Reddy Mereddy, Ajith G, Prabhat Kumar Singh, Sushanth B R, Manu Jose Philip
-
Publication number: 20240354082Abstract: Techniques and solutions are provided for increasing the energy efficiency of computing code. Many computing operations can be implemented in a number of different ways. While the end result of each implementation may be the same, the energy efficiency of the implementations can vary dramatically. Disclosed techniques provide rules that can be used to analyze code for a particular implementation of an operation. If a rule is triggered, a recommendation to replace the implementation with a more energy efficiency implementation can be provided, or the code can automatically be changed to include the more energy efficient implementation. Techniques for defining rules are also provided, such as by measuring or estimating energy used by various ways of implementing an operation. Measurement or estimation of energy used during code execution can be performed in a containerized environment, such as to provide improved accuracy, and allow for parallelization.Type: ApplicationFiled: April 20, 2023Publication date: October 24, 2024Applicant: SAP SEInventors: Praveen Jha, Prakash Kumar, Prabhat Kumar Singh, Sushanth B R, Maruthi Srinivas Sigamsetty, Muhammed Bilal A
-
Publication number: 20230385181Abstract: According to some embodiments, systems and methods are provided, including a memory storing processor-executable code; and a processing unit to execute the executable program code to: execute an automation test for a user interface application, wherein execution of the automation test includes accessing a web-object; determine whether the web-object is included in an object repository; in a case it is determined the web-object is not included in the object repository, create the web-object in the object repository; and in a case it is determined the web-object is included in the object repository: determine whether the accessed web-object includes at least one different property from the web-object included in the object repository; and update the web-object included in the object repository with the at least one different property in the accessed web-object. Numerous other aspects are provided.Type: ApplicationFiled: May 31, 2022Publication date: November 30, 2023Inventors: Naveen V, Shanavas Madeen S, Ravikanth MALIPEDDU, Santhosh Reddy MEREDDY, Ajith G, Prabhat Kumar SINGH, Sushanth B. R, Manu Jose PHILIP
-
Publication number: 20220382236Abstract: According to some embodiments, a system and method comprising a plurality of automation tools; and a shared automation module, coupled to the plurality of automation tools including: a computer processor; a computer memory, coupled to the computer processor, storing instructions that, when executed by the computer processor cause the shared automation module to: receive a selection of a first automation tool of the plurality of automation tools; receive a selection of a second automation tool of the plurality of automation tools; execute the first automation tool to generate a first automation tool output; and execute the second automation tool using the stored first automation tool output to generate a second automation tool output. Numerous other aspects are provided.Type: ApplicationFiled: May 27, 2021Publication date: December 1, 2022Inventors: Santhosh Reddy MEREDDY, Prakash KUMAR, Ravikanth MALIPEDDU, Gaurav MAZUMDAR, Shrijan SHRIVASTAV, Prabhat Kumar SINGH, Praveen JHA, Madhurima CHOWDHURY, Sushanth B R
-
Patent number: 10706030Abstract: A device extracts data files from different data sources, and processes the data files to generate data from the data files. The device trains a first artificial intelligence model and a second artificial intelligence model based on historical data parameters, wherein the historical data parameters are associated with historical data previously processed by the device. The device utilizes the trained first artificial intelligence model and the data to generate data parameters for the data, and utilizes the trained second artificial intelligence model, the data, and the data parameters to generate a data structure configuration. The device generates a data structure for the data based on the data parameters and the data structure configuration, stores the data in the data structure, and provides a user interface for accessing the data structure.Type: GrantFiled: January 31, 2018Date of Patent: July 7, 2020Assignee: Accenture Global Solutions LimitedInventors: Prakash Ghatage, Nirav Sampat, Kumar Viswanathan, Naveen Kumar Thangaraj, Bhushan Ananda Patil, Prabhat Kumar Singh
-
Publication number: 20200019488Abstract: Data is received that encapsulate a test case document including a series of test instructions written in natural language for testing a software application. The software application includes a plurality of graphical user interface views (e.g., views in a web browser, etc.). Thereafter, the test case document is parsed using at least one natural language processing algorithm. This parsing includes tagging instructions in the test case document with one of a plurality of pre-defined sequence labels. Subsequently, a test automate is generated using at least one machine learning model trained using historical test case documents, corresponding automates, and their successful executions and based on the tagged instructions in the test case document. The generated test automate includes one or more test scripts which, when executed, perform a testing sequence of the software application according to the series of test instructions. Related apparatus, systems, techniques and articles are also described.Type: ApplicationFiled: July 12, 2018Publication date: January 16, 2020Inventors: Prabhat Kumar Singh, Alex Jude, Isha Gogia, Raaj Ahuja
-
Publication number: 20190236173Abstract: A device extracts data files from different data sources, and processes the data files to generate data from the data files. The device trains a first artificial intelligence model and a second artificial intelligence model based on historical data parameters, wherein the historical data parameters are associated with historical data previously processed by the device. The device utilizes the trained first artificial intelligence model and the data to generate data parameters for the data, and utilizes the trained second artificial intelligence model, the data, and the data parameters to generate a data structure configuration. The device generates a data structure for the data based on the data parameters and the data structure configuration, stores the data in the data structure, and provides a user interface for accessing the data structure.Type: ApplicationFiled: January 31, 2018Publication date: August 1, 2019Inventors: Prakash GHATAGE, Nirav SAMPAT, Kumar VISWANATHAN, Naveen Kumar THANGARAJ, Bhushan Ananda PATIL, Prabhat KUMAR SINGH
-
Patent number: 9852296Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: GrantFiled: September 25, 2015Date of Patent: December 26, 2017Assignee: McAfee, LLCInventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 9703958Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: GrantFiled: September 25, 2015Date of Patent: July 11, 2017Assignee: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 9639696Abstract: A method and apparatus for analyzing end user license agreements and taking action based on the analysis outcome. In one embodiment, the method includes sensing initialization of an installable software program installation, extracting a EULA from the installable during installation, pausing presentation of the EULA to a user, providing a database of suspect terms, analyzing whether a suspect term exists in the EULA, and presenting at least one of the EULA or a suspect term to the user.Type: GrantFiled: September 29, 2006Date of Patent: May 2, 2017Assignee: Symantec Operating CorporationInventors: Sree Hari Nagaralu, Prabhat Kumar Singh
-
Patent number: 9607150Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: GrantFiled: May 11, 2015Date of Patent: March 28, 2017Assignee: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 9323928Abstract: Systems and methods for detecting malicious processes in a non-signature based manner are disclosed. The system and method may include gathering features of processes running on an electronic device, applying a set of rules to the features, and applying a statistical analysis to the results of the rules application to determine whether a process should be classified into one or more of a plurality of process categories.Type: GrantFiled: June 1, 2011Date of Patent: April 26, 2016Assignee: McAfee, Inc.Inventors: Romanch Agarwal, Prabhat Kumar Singh, Nitin Jyoti, Harinath Ramachetty Vishwanath, Palasamudram Ramagopal Prashanth
-
Publication number: 20160021129Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: ApplicationFiled: September 25, 2015Publication date: January 21, 2016Applicant: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Publication number: 20160019392Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: ApplicationFiled: September 25, 2015Publication date: January 21, 2016Applicant: MCAFEE, INC.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Publication number: 20150347755Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: ApplicationFiled: May 11, 2015Publication date: December 3, 2015Applicant: MCAFEE, INC.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 9032523Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: GrantFiled: September 16, 2013Date of Patent: May 12, 2015Assignee: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 8677493Abstract: A method for providing malware cleaning includes detecting potential malware on a first device connected to a network. A request including information to allow a second device connected to the network to determine an appropriate cleaning response is sent from the first device to the second device over the network. Upon receiving the request, the second device attempts to identify an appropriate cleaning response and, if a response is identified, sends the cleaning response over the network to the first device. The cleaning response is usable by the first device to address the detected potential malware.Type: GrantFiled: September 7, 2011Date of Patent: March 18, 2014Assignee: McAfee, Inc.Inventors: Prabhat Kumar Singh, Palasamudram Ramagopal Prashanth, Nitin Jyoti
-
Publication number: 20140026218Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: ApplicationFiled: September 16, 2013Publication date: January 23, 2014Applicant: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 8539583Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for rolling back protection processes. In one aspect, a method includes determining that a file is a malicious file, storing a duplicate of the file in a quarantine area, performing one or more protection processes on the file, if the determination that the file is a malicious file is a false positive determination, restoring the file by a pre-boot rollback process to a state prior to the one or more protection processes performed on the file, and booting the computer with the restored file, and if the determination that the file is a malicious file is not a false positive determination, not restoring the file to a state prior to the one or more protection processes performed on the file, and booting the computer.Type: GrantFiled: November 3, 2009Date of Patent: September 17, 2013Assignee: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Publication number: 20130061325Abstract: A method for providing malware cleaning includes detecting potential malware on a first device connected to a network. A request including information to allow a second device connected to the network to determine an appropriate cleaning response is sent from the first device to the second device over the network. Upon receiving the request, the second device attempts to identify an appropriate cleaning response and, if a response is identified, sends the cleaning response over the network to the first device. The cleaning response is usable by the first device to address the detected potential malware.Type: ApplicationFiled: September 7, 2011Publication date: March 7, 2013Applicant: McAfee, Inc.Inventors: Prabhat Kumar Singh, Palasamudram Ramagopal Prashanth, Nitin Jyoti