Patents by Inventor Prateek GOEL
Prateek GOEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11949665Abstract: A device may receive, from a network device in near-real time, a packet of data associated with network traffic of a network, wherein the packet includes privacy-related data and network-related data. The device may read the privacy-related data from the packet. The device may generate anonymous data based on the privacy-related data, wherein the anonymous data obscures the privacy-related data. The device may generate a mapping between the anonymous data and the privacy-related data. The device may combine the anonymous data and the network-related data to generate a masked packet. The device may provide the masked packet to a server device. The device may receive, from the server device, data identifying a recommendation that is generated by processing the masked packet with an artificial intelligence model. The device may perform one or more actions based on the recommendation.Type: GrantFiled: October 3, 2022Date of Patent: April 2, 2024Assignee: Juniper Networks, Inc.Inventor: Prateek Goel
-
Patent number: 11836135Abstract: Roughly described, a database accelerator is installed in a network having client systems which makes database queries to a particular IP address and port, and database servers which accept queries received at an IP address and port. The accelerator includes a cache, and is arranged to receive, through a network port, a database query made by a client system and directed to the particular IP address and port, return response data from the cache if available there, and if not, then forward the query through a network port to the database servers. Upon receipt of response data from the servers, the accelerator can retain it in its cache in addition to forwarding it back to the client. By installing the accelerator transparently in the network, no changes are required to either the client or server software in order to add query caching functionality to an existing client/server database arrangement.Type: GrantFiled: June 9, 2021Date of Patent: December 5, 2023Assignee: Ignite ScalArc Solutions, Inc.Inventors: Varun Singh, Uday V. Sawant, Prateek Goel, Naresh G. Deshaveni
-
Publication number: 20230094033Abstract: An example method includes receiving, by a control system for a software upgrade image, respective characterization data for network devices of a network; generating, by the control system and based on the characterization data for the network devices, an image map that indicates, for each portion of a plurality of different portions of the software upgrade image, an image proxy network device selected by the control system from among the network devices to store the portion based on the characterization data; and outputting, by the control system, the image map to a network device of the network devices to cause the network device to obtain each portion of the plurality of different portions of the software upgrade image from the corresponding image proxy network device selected by the control system to store the portion.Type: ApplicationFiled: September 30, 2021Publication date: March 30, 2023Inventors: Prateek Goel, Rahamath Sharif
-
Publication number: 20220417044Abstract: A computer implemented method for managing large and sensitive data in a blockchain includes determining a master block store node from a plurality of block store nodes to add large and sensitive data to the blockchain after validation, and generating a block including the large and sensitive data that is validated and its metadata. If the block store nodes, a plurality of block verifier nodes and a plurality of block backup nodes of the blockchain are in synchronization, the method adds, using the master block store node, the block to its chain and generates a synchronization request to the block store nodes, the block verifier nodes and the block backup nodes of the blockchain. Based on assigned roles, the method performs enabling the block store nodes to store the block, enabling the block verifier nodes to store only the metadata, and enabling the block backup nodes to store the block.Type: ApplicationFiled: June 25, 2022Publication date: December 29, 2022Inventor: Prateek Goel
-
Patent number: 11503002Abstract: A device may receive, from a network device in near-real time, a packet of data associated with network traffic of a network, wherein the packet includes privacy-related data and network-related data. The device may read the privacy-related data from the packet. The device may generate anonymous data based on the privacy-related data, wherein the anonymous data obscures the privacy-related data. The device may generate a mapping between the anonymous data and the privacy-related data. The device may combine the anonymous data and the network-related data to generate a masked packet. The device may provide the masked packet to a server device. The device may receive, from the server device, data identifying a recommendation that is generated by processing the masked packet with an artificial intelligence model. The device may perform one or more actions based on the recommendation.Type: GrantFiled: July 14, 2020Date of Patent: November 15, 2022Assignee: Juniper Networks, Inc.Inventor: Prateek Goel
-
Publication number: 20220021659Abstract: A device may receive, from a network device in near-real time, a packet of data associated with network traffic of a network, wherein the packet includes privacy-related data and network-related data. The device may read the privacy-related data from the packet. The device may generate anonymous data based on the privacy-related data, wherein the anonymous data obscures the privacy-related data. The device may generate a mapping between the anonymous data and the privacy-related data. The device may combine the anonymous data and the network-related data to generate a masked packet. The device may provide the masked packet to a server device. The device may receive, from the server device, data identifying a recommendation that is generated by processing the masked packet with an artificial intelligence model. The device may perform one or more actions based on the recommendation.Type: ApplicationFiled: July 14, 2020Publication date: January 20, 2022Inventor: Prateek GOEL
-
Patent number: 11182482Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: GrantFiled: July 18, 2019Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Prateek Goel, Brahadambal Srinivasan
-
Patent number: 11061917Abstract: Roughly described, a database accelerator is installed in a network having client systems which makes database queries to a particular IP address and port, and database servers which accept queries received at an IP address and port. The accelerator includes a cache, and is arranged to receive, through a network port, a database query made by a client system and directed to the particular IP address and port, return response data from the cache if available there, and if not, then forward the query through a network port to the database servers. Upon receipt of response data from the servers, the accelerator can retain it in its cache in addition to forwarding it back to the client. By installing the accelerator transparently in the network, no changes are required to either the client or server software in order to add query caching functionality to an existing client/server database arrangement.Type: GrantFiled: August 8, 2019Date of Patent: July 13, 2021Assignee: Ignite ScalArc Solutions, Inc.Inventors: Varun Singh, Uday V. Sawant, Prateek Goel, Naresh G. Deshavini
-
Publication number: 20210095403Abstract: A method for modeling textile structures using bicontinuous surfaces includes selecting a virtual scaffold of bicontinuous surfaces defining textile fabrication pathways to model spatial relationships between the pathways and yarns in a desired yarn pattern of a textile fabric design. The method further includes constructing a yarn pathway across the bicontinuous surfaces that form the virtual scaffold. The method further includes removing or releasing tension from the virtual scaffold, thereby allowing yarns to relax and determining a physical property of the textile fabric design.Type: ApplicationFiled: March 18, 2019Publication date: April 1, 2021Inventors: Genevieve Eugenie Dion, Randall Kamien, Michael David Tanis, Amy Lynne Stoltzfus, Chelsea E. Amanatides, Toen Castle, David Edward Breen, Paras Wadekar, Prateek Goel
-
Publication number: 20190340358Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: ApplicationFiled: July 18, 2019Publication date: November 7, 2019Inventors: Prateek Goel, Brahadambal Srinivasan
-
Patent number: 10417243Abstract: Roughly described, a database accelerator is installed in a network having client systems which makes database queries to a particular IP address and port, and database servers which accept queries received at an IP address and port. The accelerator includes a cache, and is arranged to receive, through a network port, a database query made by a client system and directed to the particular IP address and port, return response data from the cache if available there, and if not, then forward the query through a network port to the database servers. Upon receipt of response data from the servers, the accelerator can retain it in its cache in addition to forwarding it back to the client. By installing the accelerator transparently in the network, no changes are required to either the client or server software in order to add query caching functionality to an existing client/server database arrangement.Type: GrantFiled: August 29, 2013Date of Patent: September 17, 2019Assignee: IGNITE SCALARC SOLUTIONS, INC.Inventors: Varun Singh, Uday V. Sawant, Prateek Goel, Naresh G. Deshaveni
-
Patent number: 10395034Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: GrantFiled: June 13, 2017Date of Patent: August 27, 2019Assignee: International Business Machines CorporationInventors: Prateek Goel, Brahadambal Srinivasan
-
Patent number: 9910747Abstract: A method, computer program product and/or system for facilitating data access that performs the following steps (not necessarily in the following order): (i) generating a Mirror Write Consistency (MWC) record associated with a data portion stored on a data storage device (ii) saving a dynamic copy of the MWC record in a manner such that the MWC record is more readily accessible for read and write operations than the data portion stored on the data storage device. At least the generating and making step is performed by computer software running on computer hardware.Type: GrantFiled: September 12, 2014Date of Patent: March 6, 2018Assignee: International Business Machines CorporationInventors: Anushka Dwivedi, Prateek Goel
-
Patent number: 9852029Abstract: A method, system and a computer program product for managing a computing system crash. Memory of the computing system is separated into at least two classifications, referred to herein as a dumpable area and a non-dumpable area. Upon detection of an operating system crash in the computing system, an operating system module prevents a dumping operation of the memory, including preventing access to the dumpable memory area, and divides the non-dumpable area into a new dumpable area and a new non-dumpable area. At such time as the operating system is rebooted, the dumping operation is initiated and completed in the dumpable area, and resumed operations use the non-dumpable area.Type: GrantFiled: June 4, 2015Date of Patent: December 26, 2017Assignee: International Business Machines CorporationInventor: Prateek Goel
-
Patent number: 9852028Abstract: A system and a computer program product for managing a computing system crash. Memory of the computing system is separated into at least two classifications, referred to herein as a dumpable area and a non-dumpable area. Upon detection of an operating system crash in the computing system, an operating system module prevents a dumping operation of the memory, including preventing access to the dumpable memory area, and divides the non-dumpable area into a new dumpable area and a new non-dumpable area. At such time as the operating system is rebooted, the dumping operation is initiated and completed in the dumpable area, and resumed operations use the non-dumpable area.Type: GrantFiled: April 21, 2015Date of Patent: December 26, 2017Assignee: International Business Machines CorporationInventor: Prateek Goel
-
Publication number: 20170277893Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: ApplicationFiled: June 13, 2017Publication date: September 28, 2017Inventors: Prateek Goel, Brahadambal Srinivasan
-
Patent number: 9734334Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: GrantFiled: September 10, 2014Date of Patent: August 15, 2017Assignee: International Business Machines CorporationInventors: Prateek Goel, Brahadambal Srinivasan
-
Patent number: 9734335Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: GrantFiled: October 13, 2014Date of Patent: August 15, 2017Assignee: International Business Machines CorporationInventors: Prateek Goel, Brahadambal Srinivasan
-
Patent number: 9720804Abstract: Embodiments of the present invention provide a system and method for a dynamic tracing framework for debugging in a virtualized environment. Embodiment of the present invention can include selecting a home node and a set of remote nodes to which apply a set of probes. Data collection is performed by a tracing agent of each node and the collection of data is shared across multiple software systems.Type: GrantFiled: September 1, 2016Date of Patent: August 1, 2017Assignee: International Business Machines CorporationInventors: Kavana N. Bhat, Shajith Chandran, Prateek Goel, Sivakumar Krishnasamy
-
Patent number: 9658942Abstract: Embodiments of the present invention provide a system and method for a dynamic tracing framework for debugging in a virtualized environment. Embodiment of the present invention can include selecting a home node and a set of remote nodes to which apply a set of probes. Data collection is performed by a tracing agent of each node and the collection of data is shared across multiple software systems.Type: GrantFiled: April 2, 2015Date of Patent: May 23, 2017Assignee: International Business Machines CorporationInventors: Kavana N. Bhat, Shajith Chandran, Prateek Goel, Sivakumar Krishnasamy