Patents by Inventor Ram Shankar
Ram Shankar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240070270Abstract: A computer-implemented method of generating a security language query from a user input query includes receiving, at a computer system, an input security hunting user query indicating a user intention; selecting, using a trained machine learning model and based on the input security hunting query, an example user security hunting query and corresponding example security language query; generating, using the trained machine learning model, query metadata from the input security hunting query; generating a prompt, the prompt comprising: the input security hunting user query; the selected example user security hunting query and the corresponding example security language query; and the generated query metadata; inputting the prompt to a large language model; receiving a security language query from the large language model corresponding to the input security hunting query reflective of the user intention.Type: ApplicationFiled: August 31, 2022Publication date: February 29, 2024Inventors: Daniel Lee MACE, William BLUM, Jeremias EICHELBAUM, Amir RUBIN, Edir V. GARCIA LAZO, Nihal Irmak PAKIS, Yogesh K. ROY, Jugal PARIKH, Peter A. BRYAN, Benjamin Elliott NICK, Ram Shankar Siva KUMAR
-
Publication number: 20230325495Abstract: Techniques are described herein that are capable of detecting an algorithmic attack against a hosted artificial intelligence (AI) system based on inputs (e.g., queries) and outputs of the hosted AI system. In a first example, a feature-based classifier model is used to generate a classification score based on features that are derived from numerical representations of the queries and the outputs, and an algorithmic attack is detected based on the classification score being greater than or equal to a score threshold. In a second example, a transformer-based model is used to generate a vector by providing a multivariate time series, which is based on attribute(s) of the inputs and attribute(s) of the outputs, as an input to the transformer-based model, and an algorithmic attack is detected based on a distance between the vector and a point corresponding to a reference vector being less than or equal to a distance threshold.Type: ApplicationFiled: April 6, 2022Publication date: October 12, 2023Inventors: Hyrum Spencer ANDERSON, Raja Sekhar Rao DHEEKONDA, William PEARCE, Ricky Dee LOYND, James David MCCAFFREY, Ram Shankar SIVA KUMAR
-
Patent number: 11635448Abstract: The present document relates to a heterodyne scanning probe microscopy (SPM) method for subsurface imaging, and includes: applying an acoustic input signal to a sample and sensing an acoustic output signal using a probe. The acoustic input signal comprises a plurality of signal components at unique frequencies, including a carrier frequency and at least two excitation frequencies. The carrier frequency and the excitation frequencies form a group of frequencies, which are distributed with an equal difference frequency between each two subsequent frequencies of the group. The difference frequency is below a sensitivity threshold frequency of the cantilever for enabling sensing of the acoustic output signal. The document also describes an SPM system.Type: GrantFiled: May 22, 2020Date of Patent: April 25, 2023Assignee: Nederlandse Organisatie voor toegepast-natuurwetenschappelijk onderzoek TNOInventors: Sri Ram Shankar Rajadurai, Daniele Piras, Kodai Hatakeyama, Paul Louis Maria Joseph Van Neer, Maarten Hubertus Van Es, Hamed Sadeghian Marnani, Marcus Johannes Van Der Lans
-
Publication number: 20220315594Abstract: Embodiments of the invention include quinoline compounds and methods of synthesis. Ohm-581 has demonstrated dual inhibition of JAK2 and BET and acts as a therapeutic agent for micosis fungoides (MF) and other hematologic malignancies. Embodiments also include an efficient process for the preparation of Ohm-581 and pharmaceutically acceptable salts. The process is suited for large-scale production of quinoline compounds including Ohm-581.Type: ApplicationFiled: August 9, 2020Publication date: October 6, 2022Applicant: OHM ONCOLOGYInventors: Ram Shankar Upadhayaya, Murali Krishna Ukkalam, K Narasimha Sarma
-
Publication number: 20220229088Abstract: The present document relates to a heterodyne scanning probe microscopy (SPM) method for subsurface imaging, and includes: applying an acoustic input signal to a sample and sensing an acoustic output signal using a probe. The acoustic input signal comprises a plurality of signal components at unique frequencies, including a carrier frequency and at least two excitation frequencies. The carrier frequency and the excitation frequencies form a group of frequencies, which are distributed with an equal difference frequency between each two subsequent frequencies of the group. The difference frequency is below a sensitivity threshold frequency of the cantilever for enabling sensing of the acoustic output signal. The document also describes an SPM system.Type: ApplicationFiled: May 22, 2020Publication date: July 21, 2022Inventors: Sri Ram Shankar RAJADURAI, Daniele PIRAS, Kodai HATAKEYAMA, Paul Louis Maria Joseph VAN NEER, Maarten Hubertus VAN ES, Hamed SADEGHIAN MARNANI, Marcus Johannes VAN DER LANS
-
Publication number: 20220205953Abstract: The present document relates to a heterodyne scanning probe microscopy (SPM) method for subsurface imaging, and includes: applying, using a transducer, an acoustic input signal to the sample, wherein the acoustic input signal has a frequency of at least 1 gigahertz; sensing an acoustic output signal using a probe, the probe including a cantilever and a probe tip, wherein the probe tip is in contact with the surface, wherein the acoustic output signal is representative of acoustic waves responsive to the acoustic input signal that are measurable at the surface; wherein the acoustic input signal is applied to the sample comprising a distinct pulse of acoustic energy followed by a relaxation period, wherein an acoustic power of the acoustic input signal during the pulse is at least twice as large as an acoustic power during the relaxation period. The present document further relates to a scanning probe microscopy method.Type: ApplicationFiled: May 22, 2020Publication date: June 30, 2022Inventors: Daniele PIRAS, Paul Louis Maria Joseph VAN NEER, Benoit Andre Jacques QUESSON, Laurent FILLINGER, Kodai HATAKEYAMA, Sri Ram Shankar RAJADURAI, Maarten Hubertus VAN ES, Abbas MOHTASHAMI
-
Patent number: 11279703Abstract: The present invention relates to fused pyrimidine compounds, particularly pyrrolopyrimidine and thienopyrimidine compounds and derivatives thereof, pharmaceutical compositions thereof, and methods of inhibiting BRD4 and/or JAK2, as well as methods of treating various diseases and conditions, such as cancer and leukemia, with such compounds. Bromodomain binding and JAK activity are included.Type: GrantFiled: December 1, 2017Date of Patent: March 22, 2022Assignee: APTOSE BIOSCIENCES INC.Inventors: Ram Shankar Upadhayaya, Raghava Kethiri, Sachin Madan, Santosh Kumar Kotturi Rajaiah
-
Patent number: 11194910Abstract: Provided herein are methods, systems, and computer program products for intelligent detection of multistage attacks which may arise in computer environments. Embodiments herein leverage adaptive graph-based machine-learning solutions that can incorporate rules as well as supervised learning for detecting multistage attacks. Multistage attacks and attack chains may be detected or identified by collecting data representing events, detections, and behaviors, determining relationships among various data, and analyzing the data and associated relationships. A graph of events, detections, and behaviors which are connected by edges representing relationships between nodes of the graph may be constructed and then subgraphs of the possibly enormous initial graph may be identified which represent likely attacks.Type: GrantFiled: November 2, 2018Date of Patent: December 7, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Anisha Mazumder, Craig Henry Wittenberg, Daniel L. Mace, Haijun Zhai, Seetharaman Harikrishnan, Ram Shankar Siva Kumar, Yogesh K. Roy
-
Patent number: 11130741Abstract: The present invention relates to heterocyclic compounds of Formula I useful as anti-infective agents. The present invention further relates to a method of treating an infection by administering such compounds, and to pharmaceutical compositions comprising such compounds.Type: GrantFiled: June 22, 2017Date of Patent: September 28, 2021Assignee: Bioimics ABInventors: Leif Kirsebom, Ram Shankar Upadhayaya, Raghava Reddy Kethiri, Anders Virtanen
-
Publication number: 20210246115Abstract: The present invention relates to heterocyclic compounds of Formula F-I useful as anti-infective agents. The present invention further relates to a method of treating an infection by administering such compounds, and to pharmaceutical compositions comprising such compounds.Type: ApplicationFiled: November 5, 2018Publication date: August 12, 2021Inventors: Leif Kirsebom, Ram Shankar Upadhayaya, Raghava Reddy Kethiri, Anders Virtanen
-
Patent number: 10990677Abstract: In this disclosure, a number of ways that quantum information can be used to help make quantum classifiers more secure or private are disclosed. In particular embodiments, a form of robust principal component analysis is disclosed that can tolerate noise intentionally introduced to a quantum training set. Under some circumstances, this algorithm can provide an exponential speedup relative to other methods. Also disclosed is an example quantum approach for bagging and boosting that can use quantum superposition over the classifiers or splits of the training set to aggregate over many more models than would be possible classically. Further, example forms of k-means clustering are disclosed that can be used to prevent even a powerful adversary from even learning whether a participant even contributed data to the clustering algorithm.Type: GrantFiled: June 15, 2017Date of Patent: April 27, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Nathan O. Wiebe, Ram Shankar Siva Kumar
-
Publication number: 20200143052Abstract: Provided herein are methods, systems, and computer program products for intelligent detection of multistage attacks which may arise in computer environments. Embodiments herein leverage adaptive graph-based machine-learning solutions that can incorporate rules as well as supervised learning for detecting multistage attacks. Multistage attacks and attack chains may be detected or identified by collecting data representing events, detections, and behaviors, determining relationships among various data, and analyzing the data and associated relationships. A graph of events, detections, and behaviors which are connected by edges representing relationships between nodes of the graph may be constructed and then subgraphs of the possibly enormous initial graph may be identified which represent likely attacks.Type: ApplicationFiled: November 2, 2018Publication date: May 7, 2020Inventors: Anisha MAZUMDER, Craig Henry WITTENBERG, Daniel L. MACE, Haijun ZHAI, Seetharaman HARIKRISHNAN, Ram Shankar Siva KUMAR, Yogesh K. ROY
-
Publication number: 20200095252Abstract: The present invention relates to fused pyrimidine compounds, particularly pyrrolopyrimidine and thienopyrimidine compounds and derivatives thereof, pharmaceutical compositions thereof, and methods of inhibiting BRD4 and/or JAK2, as well as methods of treating various diseases and conditions, such as cancer and leukemia, with such compounds. Bromodomain binding and JAK activity are included.Type: ApplicationFiled: December 1, 2017Publication date: March 26, 2020Applicant: APTOSE BIOSCIENCES INC.Inventors: Ram Shankar Upadhayaya, Raghava Kethiri, Sachin Madan, Santosh Kumar Kotturi Rajaiah
-
Publication number: 20190233384Abstract: The present invention relates to heterocyclic compounds of Formula I useful as anti-infective agents. The present invention further relates to a method of treating an infection by administering such compounds, and to pharmaceutical compositions comprising such compounds.Type: ApplicationFiled: June 22, 2017Publication date: August 1, 2019Inventors: Leif Kirsebom, Ram Shankar Upadhayaya, Raghava Reddy Kethiri, Anders Virtanen
-
Publication number: 20180349605Abstract: In this disclosure, a number of ways that quantum information can be used to help make quantum classifiers more secure or private are disclosed. In particular embodiments, a form of robust principal component analysis is disclosed that can tolerate noise intentionally introduced to a quantum training set. Under some circumstances, this algorithm can provide an exponential speedup relative to other methods. Also disclosed is an example quantum approach for bagging and boosting that can use quantum superposition over the classifiers or splits of the training set to aggregate over many more models than would be possible classically. Further, example forms of k-means clustering are disclosed that can be used to prevent even a powerful adversary from even learning whether a participant even contributed data to the clustering algorithm.Type: ApplicationFiled: June 15, 2017Publication date: December 6, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Nathan O. Wiebe, Ram Shankar Siva Kumar
-
Publication number: 20180137401Abstract: A computing system for generating automated responses to improve response times for diagnosing security alerts includes a processor and a memory. An application is stored in the memory and executed by the processor. The application includes instructions for receiving a text phrase relating to a security alert; using a natural language interface with a natural language model to select one of a plurality of intents corresponding to the text phrase; and mapping the selected intent to one of a plurality of actions. Each of the plurality of actions includes at least one of a static response, a dynamic response, and a task. The application includes instructions for sending a response based on the at least one of the static response, the dynamic response, and the task.Type: ApplicationFiled: November 16, 2016Publication date: May 17, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Ram Shankar Siva KUMAR, Bryan Jeffrey SMITH, Andrew White WICKER, Daniel Lee MACE, David Charles LADD
-
Patent number: 9825978Abstract: Lateral movement detection may be performed by employing different detection models to score logon sessions. The different detection models may be implemented by and/or utilize counts computed from historical security event data. The different detection models may include probabilistic intrusion detection models for detecting compromised behavior based on logon behavior, a sequence of security events observed during a logon session, inter-event time between security events observed during a logon session, and/or an attempt to logon using explicit credentials. Scores for each logon session that are output by the different detection models may be combined to generate a ranking score for each logon session. A list of ranked alerts may be generated based on the ranking score for each logon session to identify compromised authorized accounts and/or compromised machines. An attack graph may be automatically generated based on compromised account-machine pairs to visually display probable paths of an attacker.Type: GrantFiled: January 16, 2017Date of Patent: November 21, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Ram Shankar Siva Kumar, Nguyen Song Khanh Vu, Marco DiPlacido, Vinod Nair, Aniruddha Das, Matt Swann, Keerthi Selvaraj, Sundararajan Sellamanickam
-
Publication number: 20170126717Abstract: Lateral movement detection may be performed by employing different detection models to score logon sessions. The different detection models may be implemented by and/or utilize counts computed from historical security event data. The different detection models may include probabilistic intrusion detection models for detecting compromised behavior based on logon behavior, a sequence of security events observed during a logon session, inter-event time between security events observed during a logon session, and/or an attempt to logon using explicit credentials. Scores for each logon session that are output by the different detection models may be combined to generate a ranking score for each logon session. A list of ranked alerts may be generated based on the ranking score for each logon session to identify compromised authorized accounts and/or compromised machines. An attack graph may be automatically generated based on compromised account-machine pairs to visually display probable paths of an attacker.Type: ApplicationFiled: January 16, 2017Publication date: May 4, 2017Inventors: Ram Shankar Siva Kumar, Nguyen Song Khanh Vu, Marco DiPlacido, Vinod Nair, Aniruddha Das, Matt Swann, Keerthi Selvaraj, Sundararajan Sellamanickam
-
Patent number: 9591006Abstract: Lateral movement detection may be performed by employing different detection models to score logon sessions. The different detection models may be implemented by and/or utilize counts computed from historical security event data. The different detection models may include probabilistic intrusion detection models for detecting compromised behavior based on logon behavior, a sequence of security events observed during a logon session, inter-event time between security events observed during a logon session, and/or an attempt to logon using explicit credentials. Scores for each logon session that are output by the different detection models may be combined to generate a ranking score for each logon session. A list of ranked alerts may be generated based on the ranking score for each logon session to identify compromised authorized accounts and/or compromised machines. An attack graph may be automatically generated based on compromised account-machine pairs to visually display probable paths of an attacker.Type: GrantFiled: September 18, 2014Date of Patent: March 7, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Ram Shankar Siva Kumar, Nguyen Song Khanh Vu, Marco DiPlacido, Vinod Nair, Aniruddha Das, Matt Swann, Keerthi Selvaraj, Sundararajan Sellamanickam
-
Patent number: 9479606Abstract: Mechanisms are provided to broker and control media resources. In particular, solutions are described which broker and control a media request sent from an application server. The media request is received at a device capable of brokering and controlling the media request such that a media server capable of providing the request may be selected. A screening functionality is also presented such that an optimal media server may be selected based on a comparison between information contained in an incoming media request and information contained in a previously provisioned Service Level Agreement; such information may relate to media service and capacity information. Further, solutions are presented to support providing media services in heterogeneous environments where an application server and a media server may communication using different media control protocols.Type: GrantFiled: September 30, 2012Date of Patent: October 25, 2016Assignee: Sheridan Ross P.C.Inventors: Manish Chatterjee, Biswajyoti Pal, Ram Shankar