Patents by Inventor Rajendra Kumar

Rajendra Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12278747
    Abstract: A system obtains a graph representing a set of resources of a distributed system. At least one node of the graph represents a resource-metric pair. The system further obtains time series data that indicates anomalies from the system. Then, the system determines a root cause anomaly that caused other anomalies based at least in part on the graph and the time series data.
    Type: Grant
    Filed: September 30, 2022
    Date of Patent: April 15, 2025
    Assignee: Amazon Technologies, Inc.
    Inventors: Rajendra Kumar Vippagunta, Syed Furqhan Ulla, Sunayana Vempati, Yekesa Srinivasa Kosuru, Namita Das, Devesh Ratho, Shashwat Srijan, Lenon Alexander Minorics, Patrick Bloebaum, David Kernert
  • Patent number: 12254180
    Abstract: Disclosed is a storage system comprising: receiving a first data segment and first metadata associated with the first data segment to be stored in the storage system; storing the first data segment and the first metadata in a persistent storage device of the storage system; compressing the first data segment using a predetermined compression algorithm to generate a first compressed data segment; and storing the first metadata and the first compressed data segment in a solid state drive (SSD) cache device of the storage system, including aligning the first metadata and the first compressed data segment to a page boundary of the SSD device to reduce a number of input and output (IO) operations required for accessing the first metadata and the first compressed data segment from the SSD cache device.
    Type: Grant
    Filed: January 25, 2022
    Date of Patent: March 18, 2025
    Assignee: DELL PRODUCTS L.P.
    Inventors: Nitin Madan, Kedar Godbole, Sandeep Nirmale, Rajendra Kumar Bhairy Raj
  • Patent number: 12242397
    Abstract: Disclosed herein is a computerized method for emulating processing of a peripheral device including operations of providing an insertion emulation signal to a computing device emulating insertion of the peripheral device to a port of the computing device, intercepting a request for a device descriptor of the peripheral device from a PnP manager operating on the computing device, providing a device descriptor of the peripheral device to the PnP manager, wherein the PnP manager is configured to enumerate the emulated peripheral device, intercepting one or more universal serial bus (USB) request blocks (URBs) from the PnP manager, and responsive to each of the one or more URBs, providing a response to the PnP manager. The insertion emulation signal may emulate a voltage transition on a data line of the port of the computing device. The peripheral device may adhere to a USB standard.
    Type: Grant
    Filed: November 17, 2022
    Date of Patent: March 4, 2025
    Assignee: Musarubra US LLC
    Inventors: John Teddy, Imityaz Yunus Pathan, Raja Kannan, Vinoo Thomas, Rajendra Kumar Sharma
  • Publication number: 20250045125
    Abstract: A method to generate sustainability metric for nodes that are configured to potentially execute a network function such as an application programming interface, and to use the sustainability metric to select one of the nodes to execute the network function. The method includes receiving sustainability information for a first node and a second node in a plurality of nodes configured to execute at least part of a predetermined network function, receiving sustainability information for a location at which the first node and the second node are respectively disposed, for a given workload to be executed by the predetermined network function, generating a sustainability metric for the first node and the second node, and selecting, based on the sustainability metric, one of the first node and the second node to execute the predetermined network function.
    Type: Application
    Filed: August 4, 2023
    Publication date: February 6, 2025
    Inventors: Praveen Iyengar, Alhad Shrikant Rajurwar, Tejasvi Kashyap, Rajendra Kumar Thirumurthi
  • Patent number: 12206709
    Abstract: A method of managing security rules may include extracting metadata from a data packet received at a first network device. The metadata including network metadata and network system metadata. The method may further include distributing the metadata to at least one service endpoint registered with the first network device, receiving from the at least one service endpoint, an indication as to how traffic associated with the data packet is to be handled, and enabling the traffic based at least in part on feedback received from the at least one service endpoint and creating a first service flow hash entry of a hash table associated with the data packet at the first network device. The first service flow hash entry identified each of a number of services using a unique number. The method may further include distributing the hash table including the first service flow hash entry across a fabric to at least a second network device.
    Type: Grant
    Filed: July 29, 2022
    Date of Patent: January 21, 2025
    Assignee: Cisco Technology, Inc.
    Inventors: Rajendra Kumar Thirumurthi, Praveen parthasarathy Iyengar
  • Publication number: 20240398898
    Abstract: Methods, compositions and kits for regulating complement activity or treating a complement activity disorder in a subject using soluble, membrane-independent CD59 protein, methods of assaying human macular degeneration (MD), and methods and kits for assaying potential therapeutic agents for treatment of human MD are provided herein.
    Type: Application
    Filed: May 31, 2024
    Publication date: December 5, 2024
    Inventors: Rajendra Kumar-Singh, Siobhan M. Cashman, Kasmir Ramo
  • Publication number: 20240356869
    Abstract: In an example, a network switch is configured to natively act as a high-speed load balancer. Numerous load-balancing techniques may be used, including one that bases the traffic “bucket” on a source IP address of an incoming packet. This particular technique provides a network administrator a powerful tool for shaping network traffic. For example, by assigning certain classes of computers on the network particular IP addresses, the network administrator can ensure that the traffic is load balanced in a desirable fashion. To further increase flexibility, the network administrator may apply a bit mask to the IP address, and expose only a portion, selected from a desired octet of the address.
    Type: Application
    Filed: June 27, 2024
    Publication date: October 24, 2024
    Inventors: Rajendra Kumar Thirumurthi, Samar Sharma, Mouli Vytla
  • Publication number: 20240354376
    Abstract: Methods, systems, and apparatuses include receiving input of a selection from a client device providing a graphical user interface and a recommendation interface, where the input of the selection includes an explicit attribute. Implicit attribute suggestions are generated based on the explicit attribute. The implicit attribute suggestions are sent to the client device. Attribute selections including at least one implicit attribute suggestion are received from the client device. Prompts are created based on the attribute selections. A generative language model is applied to the prompts. Content including a suggested user recommendation for the first user profile is output by the generative language model based on the prompts. The suggested user recommendation is sent to the client device to cause the suggested user recommendation to be presented on the recommendation interface.
    Type: Application
    Filed: June 12, 2023
    Publication date: October 24, 2024
    Inventors: Abhas Tandon, Priyanka Jain Rajendra Kumar, Ashish Kumar, Rakhi Kumari, Kartikeya Shivanand Puri
  • Publication number: 20240346496
    Abstract: A method of constructing a set of motifs for use in detecting messages of interest in a network of nodes is provided, the method comprising controlling circuitry to: acquire target data, the target data comprising a set of messages which have been exchanged between nodes in the network, the set of messages including a number of messages of interest; acquire control data, the control data comprising a set of messages which have been produced based on a random exchange of messages between nodes in the network; detect motifs within the target data and the control data, each motif being a repeated pattern of messages appearing within either the target data and/or the control data; generate a set of values indicative of a significance of the motifs which have been detected in the target data and the motifs which have been detected in the control data using a frequency with which these motifs have been detected; and construct a set of motifs for use in detecting messages of interest in the network using the set of
    Type: Application
    Filed: August 2, 2022
    Publication date: October 17, 2024
    Inventors: Prina Rajendra Kumar Patel, Michael Alan Dewer
  • Publication number: 20240340293
    Abstract: The present disclosure concerns a computer-implemented method for reconstructing a dataset after detection of a network security threat in a network. The method comprises: determining a maximum flow for returning data associated with the network security threat to a source dataset via each of a plurality of paths through which the data has passed from the source dataset to the destination dataset; starting from the destination dataset, determining the data to be transferred to each dataset in the plurality of paths between the destination dataset and the one or more source datasets such that the data can be returned to the one or more source datasets, the data transferred in each path not exceeding the determined maximum flow for the path; adding the details of the determined amount of data to be transferred to a forensic report; and outputting the forensic report.
    Type: Application
    Filed: June 17, 2024
    Publication date: October 10, 2024
    Inventors: Prina Rajendra Kumar Patel, David William Divitt, James Hogan, Szymon Nikodem Prajs
  • Patent number: 12107776
    Abstract: In an example, a network switch is configured to natively act as a high-speed load balancer. Numerous load-balancing techniques may be used, including one that bases the traffic “bucket” on a source IP address of an incoming packet. This particular technique provides a network administrator a powerful tool for shaping network traffic. For example, by assigning certain classes of computers on the network particular IP addresses, the network administrator can ensure that the traffic is load balanced in a desirable fashion. To further increase flexibility, the network administrator may apply a bit mask to the IP address, and expose only a portion, selected from a desired octet of the address.
    Type: Grant
    Filed: July 11, 2022
    Date of Patent: October 1, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Rajendra Kumar Thirumurthi, Samar Sharma, Mouli Vytla
  • Patent number: 12067532
    Abstract: A system and method for configuring an application is described. The system identifies user collaboration data of users of an application. The user collaboration data indicates durations of collaborations between one or more users using the application. The system computes an influencer score of a first user based on the duration of collaborations between the first user and the other users. The system determines that the influencer score of the first user exceeds an influencer score threshold and generates a configuration setting of the application for the first user. The system applies the configuration setting to the application for the first user.
    Type: Grant
    Filed: May 21, 2020
    Date of Patent: August 20, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sanjay Hemmige Ramaswamy, Jagadeesh Virupaksha Huliyar, Sreeram Nivarthi, Ritu Lakhotia, Vindana Madhuwantha, Apurva Bharatkumar Shah, Ganesh Jaiswal, Siddarth Rajendra Kumar, V. S. Srujana Oruganti, Vishnu Gajendran, Sai Sumana Pagidipalli, Sunil Kumar, Nimesh Ravindra Desai, Nishtha Mehrotra, Diego Fernando Suarez Castillo, Neha Parikh Shah, Aaron James Harrison, Tannaz Sattari Tabrizi, Aleksey Y. Ashikhmin, Carlos Andres Morales Torrado, Amit Prem Manghani, Sida Peng
  • Patent number: 12015620
    Abstract: The present disclosure concerns a computer-implemented method for reconstructing a dataset after detection of a network security threat in a network. The method comprises: determining a maximum flow for returning data associated with the network security threat to a source dataset via each of a plurality of paths through which the data has passed from the source dataset to the destination dataset; starting from the destination dataset, determining the data to be transferred to each dataset in the plurality of paths between the destination dataset and the one or more source datasets such that the data can be returned to the one or more source datasets, the data transferred in each path not exceeding the determined maximum flow for the path; adding the details of the determined amount of data to be transferred to a forensic report; and outputting the forensic report.
    Type: Grant
    Filed: June 25, 2021
    Date of Patent: June 18, 2024
    Assignee: VOCALINK LIMITED
    Inventors: Prina Rajendra Kumar Patel, David William Divitt, James Hogan, Szymon Nikodem Prajs
  • Publication number: 20240094696
    Abstract: A building controller includes a housing and a plurality of wiring terminals that are secured relative to the housing and are physically accessible from outside of the housing. A controller is housed by the housing and is operatively coupled to the plurality of wiring terminals. The controller is field programmable to set each of two or more of the plurality of wiring terminals to a particular one of a plurality of wiring terminal types including an input wiring terminal type, an output wiring terminal type, and a communication wiring terminal type where the communication wiring terminal type operates in accordance with a predetermined communication protocol.
    Type: Application
    Filed: September 20, 2022
    Publication date: March 21, 2024
    Inventors: Prashanth Nadesan, Rajendra Kumar S, Suresh Vemuri
  • Publication number: 20240039957
    Abstract: A method of managing security rules may include extracting metadata from a data packet received at a first network device. The metadata including network metadata and network system metadata. The method may further include distributing the metadata to at least one service endpoint registered with the first network device, receiving from the at least one service endpoint, an indication as to how traffic associated with the data packet is to be handled, and enabling the traffic based at least in part on feedback received from the at least one service endpoint and creating a first service flow hash entry of a hash table associated with the data packet at the first network device. The first service flow hash entry identified each of a number of services using a unique number. The method may further include distributing the hash table including the first service flow hash entry across a fabric to at least a second network device.
    Type: Application
    Filed: July 29, 2022
    Publication date: February 1, 2024
    Applicant: Cisco Technology, Inc.
    Inventors: Rajendra Kumar Thirumurthi, Praveen parthasarathy Iyengar
  • Publication number: 20240005177
    Abstract: Monitoring may be performed for time series prediction models. Data to generate a new time series forecast may be received. A determination may be made that the data is associated with a previously generated time series forecast by a machine learning model. Performance metrics may be generated for the machine learning model according to a comparison of the data with the previously generated time series forecast. The performance metrics can then be provided for further analysis and action.
    Type: Application
    Filed: June 30, 2022
    Publication date: January 4, 2024
    Applicant: Amazon Technologies, Inc.
    Inventors: Adarsh Singh, Rajendra Kumar Vippagunta, Jitendra Bangani, Namita Das, Xiufeng Zhao, Narayan Agrawal
  • Publication number: 20230414714
    Abstract: Compositions, methods and kits are provided for treating complement related disorders in a subject with protein in combination having protein fusions of at least two of a CD46 protein, a CD55 protein and a CD59 protein or with a recombinant chimeric protein having at least two of a CD46 protein, a CD55 protein and a CD59 protein or with nucleic acids encoding these proteins. The composition negatively modulates classical and alternative complement pathways thereby treating complement related disorder such as macular degeneration, age-related macular degeneration, diabetic retinopathy, inflammatory bowel disease, thyroiditis, cryoglobulinaemia, fetal loss, organ graft rejection, cancer, etc.
    Type: Application
    Filed: May 19, 2023
    Publication date: December 28, 2023
    Inventors: Rajendra Kumar-Singh, Derek Leaderer, Siobhan Cashman
  • Patent number: 11843658
    Abstract: In one embodiment, load balancing criteria and an indication of a plurality of network nodes is received. A plurality of forwarding entries are created based on the load balancing criteria and the indication of the plurality of nodes. A content addressable memory of a network element is programmed with the plurality of forwarding entries. The network element selectively load balances network traffic by applying the plurality of forwarding entries to the network traffic, wherein network traffic meeting the load balancing criteria is load balanced among the plurality of network nodes.
    Type: Grant
    Filed: September 9, 2021
    Date of Patent: December 12, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Samar Sharma, Mouli Vytla, Rajendra Kumar Thirumurthi
  • Publication number: 20230387969
    Abstract: Systems, methods, and devices select antennas to enhance the range and throughput of wireless communications devices. Methods include identifying a plurality of combinations of antennas based on a plurality of available antennas for a wireless communications device, and generating, using a processing device included in a multiple-input-multiple-output (MIMO) device, a plurality of quality metrics including at least one quality metric for each of the identified combinations of antennas, where each of the at least one quality metrics represents a signal quality of a signal associated with each of the plurality of antennas, and wherein the signal is a spatial stream. Methods further include selecting at least two antennas from the plurality of combinations of antennas based, at least in part, on the plurality of quality metrics, where the at least two antennas are selected for use by the wireless communications device during a transmitting or receiving operation.
    Type: Application
    Filed: May 26, 2023
    Publication date: November 30, 2023
    Applicant: Cypress Semiconductor Corporation
    Inventors: Prasanna Sethuraman, Visakh Asok, Paul Strauch, Rajendra Kumar Gundu Rao, Ayush Sood
  • Patent number: 11823014
    Abstract: A method for machine learning based database management is provided. The method may include training a machine learning model to detect an anomaly that is present and/or developing in a database system. The anomaly in the database system may be detected by at least processing, with a trained machine learning model, one or more performance metrics for the database system. In response to detecting the presence of the anomaly at the database system, one or more remedial actions may be determined for correcting and/or preventing the anomaly at the database system. The one or more remedial actions may further be sent to a database management system associated with the database system. Related systems and articles of manufacture are also provided.
    Type: Grant
    Filed: November 21, 2018
    Date of Patent: November 21, 2023
    Assignee: SAP SE
    Inventors: Rajendra Kumar, Heinz Wolf, Lohit Kumar A. P, Venkatesh R