Patents by Inventor Rajarshi Gupta
Rajarshi Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240257255Abstract: Methods and systems are described herein for predicting cryptographic asset distributions for a future period of time using artificial intelligence and/or machine learning (AI/ML) models. A system may receive a first dataset comprising time-series data over a past period of time. The cryptographic asset may be used to secure a blockchain. The system may determine, using AI/ML models with the first dataset, a prediction of the cryptographic asset distributions for the future period of time, wherein a cryptographic asset distribution occurs in response to a respective cryptographic asset being used to secure a respective blockchain. The system may also determine characteristics about a user and generate a recommendation to secure the blockchain based on the prediction and the one or more characteristics about the user.Type: ApplicationFiled: February 1, 2023Publication date: August 1, 2024Applicant: Coinbase, Inc.Inventors: Rajarshi GUPTA, Bhaskar KRISHNAMACHARI
-
Patent number: 12008140Abstract: Systems and methods receive a form having one or more fields for receiving personally identifying information (PII). Input data that includes PII is received for the form. The system and methods model the characteristics of true PII to generate a model associated with the form. Synthetic PII is generated based, at least in part, the true PII and the model. The synthetic PII is provided to the one or more fields of the form.Type: GrantFiled: September 27, 2019Date of Patent: June 11, 2024Assignee: Avast S oftware s.r.o.Inventors: Armin Wasicek, Juyong Do, Rajarshi Gupta
-
Publication number: 20240104173Abstract: Methods and systems are described herein for performing privacy-preserving operation of a system for acquiring non-fungible tokens (NFTs) using on-chain data. In particular, a user feed initialization system may determine that a privacy-preserving login is requested and may receive an on-chain address associated with a cryptography-based storage application (e.g., an address associated with a crypto wallet of a user) and determine, based on the on-chain address, NFTs that the user's cryptography-based storage application controls (e.g., NFTs that the user owns). The user feed initialization system may use on-chain data associated with the NFTs (e.g., via interrogating the on-chain programs associated with the NFTs that the user owns) to identify (e.g., via a machine learning model) other NFTs that the user may desire to acquire.Type: ApplicationFiled: September 23, 2022Publication date: March 28, 2024Applicant: Coinbase, Inc.Inventors: Catalin TISEANU, Chaoqing LU, Rajarshi GUPTA
-
Patent number: 11704423Abstract: A data managing method. Metadata including a sharing policy is applied to a data file on a computing device. A sharing of the data file from the computing device via a network to a platform hosted by a computing system is detected. It is determined whether the platform is in compliance with the sharing policy, and it is reported whether the platform is in compliance with the sharing policy.Type: GrantFiled: December 28, 2020Date of Patent: July 18, 2023Assignee: Avast Software s.r.o.Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
-
Patent number: 11689388Abstract: A method for enabling secure communication. The method includes providing a first virtual network function (“VNF”) at a first network location and providing a second VNF at a second network location. A first Layer 3 virtual private network (“L3 VPN”) tunnel is constructed by the first VNF and the second VNF between the first network location and the second network location, and a first local area network (“LAN”) at the first network location and a second LAN at the second network location are connected by the first L3 VPN tunnel. Further provided is a method for establishing a secure communication environment.Type: GrantFiled: September 28, 2020Date of Patent: June 27, 2023Assignee: Avast Software s.r.o.Inventors: Bin Hu, Rajarshi Gupta
-
Patent number: 11599661Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.Type: GrantFiled: February 7, 2022Date of Patent: March 7, 2023Assignee: Smith Micro Software, Inc.Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
-
Patent number: 11586962Abstract: Systems and methods for device type classification system include a rules engine and a machine learning engine. The machine learning engine can be trained using device type data from multiple networks. The machine learning engine and the rules engine can receive data for devices on a network at a first point in time. The data can be submitted to a rules engine and the machine learning engine, which each produce device type probabilities for devices on the network. The device type probabilities from the rules engine and the machine learning engine can be processed to determine device types for one or more devices on the network. As more data becomes available at later points in time, the additional data can be provided to the rules engine and the machine learning engine to update the device type determinations for the network.Type: GrantFiled: December 23, 2019Date of Patent: February 21, 2023Assignee: Avast Software s.r.o.Inventors: Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta
-
Patent number: 11568024Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.Type: GrantFiled: April 12, 2021Date of Patent: January 31, 2023Assignee: Avast Software s.r.o.Inventors: Rajarshi Gupta, Juyong Do
-
Patent number: 11496479Abstract: A method for controlling application enabling includes receiving from a user an indication of data for sharing and an indication of one or more recipients with which to share the data. A multidimensional zone is determined based on the indication of the data and the indication of the one or more recipients. A request from the user to enable an application via a computing device is detected. Data permission requirements of the application are accessed, and a multidimensional coordinate is determined based on the data permission requirements of the application. The multidimensional zone is compared to the multidimensional coordinate, and the user is notified via the computing device of the comparing of the multidimensional zone to the multidimensional coordinate. An affirmation of the request is received from the user via the computing device, and the application is enabled responsive to the affirmation of the request.Type: GrantFiled: December 13, 2019Date of Patent: November 8, 2022Assignee: Avast Software, s.r.o.Inventor: Rajarshi Gupta
-
Patent number: 11477721Abstract: Methods and apparatus for controlling transmission of a base station, such as a Femto cell, based on the determined quality of a backhaul connection to a network are disclosed. In particular, a quality of a backhaul connection of a base station to a node in a communication network is determined. Based on this quality determination, transmission from the base station is either limited or stopped when the determined quality fails to meet a predefined condition. The degradation in quality of the backhaul connection, for example, affects the ability of the base station to offer sufficient service to access terminals. By limiting or stopping wireless transmission of the base station when the backhaul quality is degraded, access terminals either currently accessing the base station or attempting to connect to the base station can then more efficaciously hand off to another base station or access point.Type: GrantFiled: January 13, 2009Date of Patent: October 18, 2022Assignee: QUALCOMM IncorporatedInventors: Rajarshi Gupta, Fatih Ulupinar, Gavin B. Horn, Parag A. Agashe
-
Publication number: 20220239657Abstract: A method for controlling application enabling includes receiving from a particular user an indication of data for sharing and an indication of one or more recipients with which to share the data. A multidimensional zone is determined based on the indication of the data and the indication of the one or more recipients. A request from the particular user to enable a particular application via a computing device is detected. Data permission requirements of the particular application are accessed, and a multidimensional coordinate is determined based on the data permission requirements of the particular application. The multidimensional zone is compared to the multidimensional coordinate, and the particular user is notified via the computing device of the comparing of the multidimensional zone to the multidimensional coordinate. An affirmation of the request is received from the particular user via the computing device, and the particular application is enabled responsive to the affirmation of the request.Type: ApplicationFiled: March 4, 2022Publication date: July 28, 2022Applicant: Avast Software s.r.o.Inventor: Rajarshi Gupta
-
Publication number: 20220207170Abstract: A data managing method. Metadata including a sharing policy is applied to a data file on a computing device. A sharing of the data file from the computing device via a network to a platform hosted by a computing system is detected. It is determined whether the platform is in compliance with the sharing policy, and it is reported whether the platform is in compliance with the sharing policy.Type: ApplicationFiled: December 28, 2020Publication date: June 30, 2022Applicant: Avast Software s.r.o.Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
-
Publication number: 20220156400Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.Type: ApplicationFiled: February 7, 2022Publication date: May 19, 2022Applicant: SMITH MICRO SOFTWARE, INC.Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
-
Patent number: 11316861Abstract: A method of selecting devices on a private network for security protection via a network security device comprises classifying devices on the private network into devices that are sometimes protected and devices that are always either protected or not protected. Threats are monitored, the threats comprising at least one of a macro security event and a local security event, the macro security event detected by one or more external systems and the local security event detected by one or more devices local to the private network. When a threat is detected, it is determined whether the detected threat is a threat to one or more devices on the private network classified as devices that are sometimes protected, and if the detected threat is determined to be a threat to the one or more devices that are sometimes protected the one or more devices are protected.Type: GrantFiled: June 27, 2019Date of Patent: April 26, 2022Assignee: Avast Software s.r.o.Inventor: Rajarshi Gupta
-
Publication number: 20220103398Abstract: A method for enabling secure communication. The method includes providing a first virtual network function (“VNF”) at a first network location and providing a second VNF at a second network location. A first Layer 3 virtual private network (“L3 VPN”) tunnel is constructed by the first VNF and the second VNF between the first network location and the second network location, and a first local area network (“LAN”) at the first network location and a second LAN at the second network location are connected by the first L3 VPN tunnel. Further provided is a method for establishing a secure communication environment.Type: ApplicationFiled: September 28, 2020Publication date: March 31, 2022Applicant: Avast Software s.r.o.Inventors: Bin Hu, Rajarshi Gupta
-
Patent number: 11258812Abstract: A method of identifying malicious activity in a sequence of computer instructions includes monitoring data flows from a public network to one or more networked devices on a private network and to one or more honeypots that appear to the public network to be devices on the private network, representing each such data flow as a word, and the sequence of data flows as comprising an n-gram of two or more words. The data flows are characterized with a likelihood of being malicious based on their statistical association with the one or more honeypots relative to their statistical association with one or more networked devices. Identified malicious activity is used to train a network device to identify malicious data flows and prevent them from reaching devices on the private network.Type: GrantFiled: June 24, 2019Date of Patent: February 22, 2022Assignee: Avast Software s.r.o.Inventor: Rajarshi Gupta
-
Patent number: 11244065Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.Type: GrantFiled: July 23, 2019Date of Patent: February 8, 2022Assignee: Smith Micro Software, Inc.Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
-
Publication number: 20220012365Abstract: A method for applying electronic data sharing settings. The method includes determining a first image or a first plurality of images shared by a user to a first network-enabled application. A first plurality of image components are extracted from the first image or the first plurality of images, and access by the first network-enabled application to a second image or a second plurality of images stored on a computing device of the user is enabled based on the first plurality of image components extracted from the first image or the first plurality of images. A method for controlling internet browsing is further provided.Type: ApplicationFiled: July 11, 2020Publication date: January 13, 2022Applicant: Avast Software s.r.o.Inventors: Deepali Garg, Rajarshi Gupta
-
Patent number: 11222377Abstract: A recommendation engine can provide recommendations with respect to an application and can provide insights to a user of a computing device. The recommendation engine can receive a prediction based on user engagement with the application during an initial period of time (e.g., a trial period) as to whether the user will convert use of the application to a paid basis (e.g., a subscription or license to the application). An action can be recommended based on the prediction. The recommendation engine can provide insights to a user based on a score associated with the insight. The score can be determined by measuring previous user interactions with the insight over a period of time.Type: GrantFiled: September 28, 2018Date of Patent: January 11, 2022Assignee: Avast Software s.r.o.Inventor: Rajarshi Gupta
-
Patent number: 11206543Abstract: A method includes monitoring data security events on mobile computing devices and positions of the mobile computing devices when the plurality of data security events occurred. A plurality of demographic information of the plurality of geographic positions are determined and a classifier is trained based on the data security events and demographic information. A particular mobile computing device is determined to be located at a particular geographic location and particular demographic information of the particular geographic location is determined. The classifier is applied to the particular demographic information and a particular security risk prediction of the particular geographic location is generated. A particular security measure is activated on the particular mobile computing device based on the particular security risk prediction.Type: GrantFiled: March 5, 2019Date of Patent: December 21, 2021Assignee: Avast Software s.r.o.Inventors: Juyong Do, Rajarshi Gupta, Ond{hacek over (r)}ej Vl{hacek over (c)}ek