Patents by Inventor Ravi Kiran Reddy
Ravi Kiran Reddy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250053910Abstract: The disclosure is directed to systems, methods, and computer storage media, for, among other things, employing nested model structures to enforce compliance, within a computational system, to at least one policy. One method includes receiving a digital record that encodes content. A plurality of models (e.g., integrated models and/or model droplets) is employed to analyze the records. The plurality of models is configured and arranged within a nested structure of a hierarchy of models. Each of the plurality of models analyzes at least a portion of the record. Based on the nested structure, the hierarchy combines the analysis from each of the plurality of models to determine that the content violates a policy of a system. In response to determining that the content violates the policy, at least one mitigation (or intervention) action are performed. The at least one mitigation action may alter subsequent transmissions of the record.Type: ApplicationFiled: October 28, 2024Publication date: February 13, 2025Inventors: Mohit SEWAK, Ravi Kiran Reddy POLURI
-
Patent number: 12197486Abstract: The technology described herein determines whether a candidate text is in a requested class by using a generative model that may not be trained on the requested class. The present technology may use of a model trained primarily in an unsupervised mode, without requiring a large number of manual user-input examples of a label class. The may produce a semantically rich positive example of label text from a candidate text and label. Likewise, the technology may produce from the candidate text and the label a semantically rich negative example of label text. The labeling service makes use of a generative model to produce a generative result, which estimates the likelihood that the label properly applies to the candidate text. In another aspect, the technology is directed toward a method for obtaining a semantically rich example that is similar to a candidate text.Type: GrantFiled: April 1, 2022Date of Patent: January 14, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Mohit Sewak, Ravi Kiran Reddy Poluri, William Blum, Pak On Chan, Weisheng Li, Sharada Shirish Acharya, Christian Rudnick, Michael Abraham Betser, Milenko Drinic, Sihong Liu
-
Publication number: 20240396201Abstract: A mounting bracket for an antenna includes clamp jaws that are adapted to be arranged around a monopole and are adjustably couplable with each other to clamp the monopole. Each clamp jaw comprises a first plate, a second plate, and a backplate that couples the first plate to the second plate and defines holes therein. The mounting bracket further comprises at least two mounting fasteners, and each mounting fastener is adapted to extend through corresponding holes of the adjacent clamp jaws and is configured to be tightened or loosened to move the clamp jaws toward or away from each other, respectively. The mounting bracket furthermore comprises adaptor bodies having a first plate and a second plate. The first plate defines first apertures therein and is couplable to a corresponding clamp jaw via fasteners inserted through the first apertures in the first plate.Type: ApplicationFiled: May 15, 2024Publication date: November 28, 2024Inventors: Chaitanya Modak, Madivalappa Sogalad, Venkateswara Rao Polineni, Ravi Kiran Reddy Tadiparthi
-
Patent number: 12154056Abstract: The disclosure is directed to systems, methods, and computer storage media, for, among other things, employing nested model structures to enforce compliance, within a computational system, to at least one policy. One method includes receiving a digital record that encodes content. A plurality of models (e.g., integrated models and/or model droplets) is employed to analyze the records. The plurality of models is configured and arranged within a nested structure of a hierarchy of models. Each of the plurality of models analyzes at least a portion of the record. Based on the nested structure, the hierarchy combines the analysis from each of the plurality of models to determine that the content violates a policy of a system. In response to determining that the content violates the policy, at least one mitigation (or intervention) action are performed. The at least one mitigation action may alter subsequent transmissions of the record.Type: GrantFiled: March 30, 2022Date of Patent: November 26, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Mohit Sewak, Ravi Kiran Reddy Poluri
-
Publication number: 20240370484Abstract: The technology described herein determines whether a candidate text is in a requested class by using a generative model that may not be trained on the requested class. The present technology may use of a model trained primarily in an unsupervised mode, without requiring a large number of manual user-input examples of a label class. The may produce a semantically rich positive example of label text from a candidate text and label. Likewise, the technology may produce from the candidate text and the label a semantically rich negative example of label text. The labeling service makes use of a generative model to produce a generative result, which estimates the likelihood that the label properly applies to the candidate text. In another aspect, the technology is directed toward a method for obtaining a semantically rich example that is similar to a candidate text.Type: ApplicationFiled: July 19, 2024Publication date: November 7, 2024Inventors: Mohit SEWAK, Ravi Kiran Reddy Poluri, William Blum, Pak On Chan, Weisheng Li, Sharada Shirish Acharya, Christian Rudnick, Michael Abraham Betser, Milenko Drinic, Sihong Liu
-
Patent number: 12113808Abstract: Methods, systems, and computer storage media for providing a multi-attribute cluster-identifier that supports identifying malicious activity in computing environments. An instance of an activity having an attribute set can be assessed. The attribute set of the instance of the activity is analyzed to determine whether the instance of the activity is a malicious activity. The attribute set of the instance of the activity is compared to a plurality of multi-attribute cluster-identifiers of previous instances of the activity, such that, a determination that the instance of the activity is a malicious activity is made when the attribute set of the instance of the activity corresponds to an identified multi-attribute cluster-identifier. The identified multi-attribute cluster-identifier has a risk score and an attribute set that indicate a likelihood that the instance of the activity is a malicious activity. A visualization that identifies the instance of the activity as a malicious activity is generated.Type: GrantFiled: November 3, 2020Date of Patent: October 8, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Mihai Costea, Michael Abraham Betser, Ravi Kiran Reddy Poluri, Hua Ding, Weisheng Li, Phanindra Pampati, David Nicholas Yost
-
Publication number: 20240232626Abstract: A multi-label ranking method includes receiving, at a processor and from a first set of artificial neural networks (ANNs), multiple signals representing a first set of ANN output pairs for a first label. A signal representing a second set of ANN output pairs for a second label different from the first label is received at the processor from a second set of ANNs different from the first set of ANNs, substantially concurrently with the first set of ANN output pairs. A first activation function is solved based on the first set of ANN output pairs, and a second activation function is solved based on the second set of ANN output pairs. Loss values are calculated based on the solved activations, and a mask is generated based on at least one ground truth label. A signal, including a representation of the mask, is sent from the processor to each of the sets of ANNs.Type: ApplicationFiled: February 21, 2024Publication date: July 11, 2024Inventors: Vincent POON, Nigel Paul DUFFY, Ravi Kiran Reddy PALLA
-
Publication number: 20240187425Abstract: Methods, systems, and computer storage media for providing a multi-attribute cluster-identifier that supports identifying malicious activity in computing environments. An instance of an activity having an attribute set can be assessed. The attribute set of the instance of the activity is analyzed to determine whether the instance of the activity is a malicious activity. The attribute set of the instance of the activity is compared to a plurality of multi-attribute cluster-identifiers of previous instances of the activity, such that, a determination that the instance of the activity is a malicious activity is made when the attribute set of the instance of the activity corresponds to an identified multi-attribute cluster-identifier. The identified multi-attribute cluster-identifier has a risk score and an attribute set that indicate a likelihood that the instance of the activity is a malicious activity. A visualization that identifies the instance of the activity as a malicious activity is generated.Type: ApplicationFiled: January 22, 2024Publication date: June 6, 2024Inventors: Mihai COSTEA, Michael Abraham Betser, Ravi Kiran Reddy Poluri, Hua Ding, Weisheng Li, Phanindra Pampati, David Nicholas Yost
-
Patent number: 11972345Abstract: A multi-label ranking method includes receiving, at a processor and from a first set of artificial neural networks (ANNs), multiple signals representing a first set of ANN output pairs for a first label. A signal representing a second set of ANN output pairs for a second label different from the first label is received at the processor from a second set of ANNs different from the first set of ANNs, substantially concurrently with the first set of ANN output pairs. A first activation function is solved based on the first set of ANN output pairs, and a second activation function is solved based on the second set of ANN output pairs. Loss values are calculated based on the solved activations, and a mask is generated based on at least one ground truth label. A signal, including a representation of the mask, is sent from the processor to each of the sets of ANNs.Type: GrantFiled: April 11, 2019Date of Patent: April 30, 2024Inventors: Vincent Poon, Nigel Paul Duffy, Ravi Kiran Reddy Palla
-
Patent number: 11902299Abstract: Methods, systems, and computer storage media for providing a multi-attribute cluster-identifier that supports identifying malicious activity in computing environments. An instance of an activity having an attribute set can be assessed. The attribute set of the instance of the activity is analyzed to determine whether the instance of the activity is a malicious activity. The attribute set of the instance of the activity is compared to a plurality of multi-attribute cluster-identifiers of previous instances of the activity, such that, a determination that the instance of the activity is a malicious activity is made when the attribute set of the instance of the activity corresponds to an identified multi-attribute cluster-identifier. The identified multi-attribute cluster-identifier has a risk score and an attribute set that indicate a likelihood that the instance of the activity is a malicious activity. A visualization that identifies the instance of the activity as a malicious activity is generated.Type: GrantFiled: November 3, 2020Date of Patent: February 13, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Mihai Costea, Michael Abraham Betser, Ravi Kiran Reddy Poluri, Hua Ding, Weisheng Li, Phanindra Pampati, David Nicholas Yost
-
Publication number: 20230316196Abstract: The disclosure is directed to systems, methods, and computer storage media, for, among other things, employing nested model structures to enforce compliance, within a computational system, to at least one policy. One method includes receiving a digital record that encodes content. A plurality of models (e.g., integrated models and/or model droplets) is employed to analyze the records. The plurality of models is configured and arranged within a nested structure of a hierarchy of models. Each of the plurality of models analyzes at least a portion of the record. Based on the nested structure, the hierarchy combines the analysis from each of the plurality of models to determine that the content violates a policy of a system. In response to determining that the content violates the policy, at least one mitigation (or intervention) action are performed. The at least one mitigation action may alter subsequent transmissions of the record.Type: ApplicationFiled: March 30, 2022Publication date: October 5, 2023Inventors: Mohit SEWAK, Ravi Kiran Reddy POLURI
-
Publication number: 20230214707Abstract: The disclosure is directed to systems, methods, and computer storage media, for, among other things, generating, training, and tuning lexicon-based classifier models. The models may be employed in various compliance enforcement applications and/or tasks. The tradeoff between the model's false positive error rate (FPR) and the model's false negative rate (FNR) may be “tuned” via a balance parameter supplied by the user. The classifier model may classify content (e.g., text records) as either belonging to a “positive” class or a “negative” class. The positive class may be associated with non-compliance, while the negative class may be associated with compliance (or vice-versa). In some embodiments, the classifier model may be a probabilistic probability model that provides a probability (or degree of belief) that the content is associated with the positive and/or negative class.Type: ApplicationFiled: December 31, 2021Publication date: July 6, 2023Inventors: Mohit SEWAK, Ravi Kiran Reddy POLURI
-
Publication number: 20230077990Abstract: Emails or other communications are labeled with a category label such as “spam” or “good” without using confidential or Personally Identifiable Information (PII). The category label is based on features of the emails such as metadata that do not contain PII. Graphs of inferred relationships between email features and category labels are used to assign labels to emails and to features of the emails. The labeled emails are used as a training dataset for training a machine learning model (“MLM”). The MLM model identifies unwanted emails such as spam, bulk email, phishing email, and emails that contain malware.Type: ApplicationFiled: October 31, 2022Publication date: March 16, 2023Inventors: Yi LUO, Weigsheng LI, Sharada Shirish ACHARYA, Mainak SEN, Ravi Kiran Reddy POLURI, Christian RUDNICK
-
Publication number: 20220414137Abstract: The technology described herein determines whether a candidate text is in a requested class by using a generative model that may not be trained on the requested class. The present technology may use of a model trained primarily in an unsupervised mode, without requiring a large number of manual user-input examples of a label class. The may produce a semantically rich positive example of label text from a candidate text and label. Likewise, the technology may produce from the candidate text and the label a semantically rich negative example of label text. The labeling service makes use of a generative model to produce a generative result, which estimates the likelihood that the label properly applies to the candidate text. In another aspect, the technology is directed toward a method for obtaining a semantically rich example that is similar to a candidate text.Type: ApplicationFiled: April 1, 2022Publication date: December 29, 2022Inventors: Mohit SEWAK, Ravi Kiran Reddy POLURI, William BLUM, Pak On CHAN, Weisheng LI, Sharada Shirish ACHARYA, Christian RUDNICK, Michael Abraham BETSER, Milenko DRINIC, Sihong LIU
-
Patent number: 11521108Abstract: Emails or other communications are labeled with a category label such as “spam” or “good” without using confidential or Personally Identifiable Information (PII). The category label is based on features of the emails such as metadata that do not contain PII. Graphs of inferred relationships between email features and category labels are used to assign labels to emails and to features of the emails. The labeled emails are used as a training dataset for training a machine learning model (“MLM”). The MLM model identifies unwanted emails such as spam, bulk email, phishing email, and emails that contain malware.Type: GrantFiled: July 30, 2018Date of Patent: December 6, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Yi Luo, Weigsheng Li, Sharada Shirish Acharya, Mainak Sen, Ravi Kiran Reddy Poluri, Christian Rudnick
-
Patent number: 11069960Abstract: Multiband base station antennas include first and second arrays. The first array has a plurality of radiating elements that are arranged in a plurality of columns and rows, where both an uppermost and a lowermost of the rows of the first array include a first number of radiating elements, and at least one of the other rows of the first array includes a second, larger number of radiating elements. The second array includes a plurality of radiating elements that are vertically offset from each other. At least one of the radiating elements in the uppermost of the rows of the first array is not vertically aligned with any of the radiating elements in the lowermost of the rows of the first array.Type: GrantFiled: October 2, 2020Date of Patent: July 20, 2021Assignee: CommScope Technologies LLCInventors: Tamilarasan Sundara Raj, Krisen James, Kumara Swamy Kasani, Lenin Naragani, Ligang Wu, Ravi Kiran Reddy Tadiparthi, Yateen Sutar, Venkateswara Rao Polineni, HongHui Li
-
Publication number: 20210166074Abstract: An object-extraction method includes generating multiple partition objects based on an electronic document, and receiving a first user selection of a data element via a user interface of a compute device. In response to the first user selection, and using a machine learning model, a first subset of partition objects from the multiple partition objects is detected and displayed via the user interface. A user interaction, via the user interface, with one of the partition objects is detected, and in response, a weight of the machine learning model is modified, to produce a modified machine learning model. A second user selection of the data element is received via the user interface, and in response and using the modified machine learning model, a second subset of partition objects from the multiple partition objects is detected and displayed via the user interface, the second subset different from the first subset.Type: ApplicationFiled: February 8, 2021Publication date: June 3, 2021Applicant: Ernst & Young U.S. LLPInventors: Dan G. TECUCI, Ravi Kiran Reddy PALLA, Hamid Reza Motahari NEZHAD, Vincent POON, Nigel Paul DUFFY, Joseph NIPKO
-
Publication number: 20210136089Abstract: Methods, systems, and computer storage media for providing a multi-attribute cluster-identifier that supports identifying malicious activity in computing environments. An instance of an activity having an attribute set can be assessed. The attribute set of the instance of the activity is analyzed to determine whether the instance of the activity is a malicious activity. The attribute set of the instance of the activity is compared to a plurality of multi-attribute cluster-identifiers of previous instances of the activity, such that, a determination that the instance of the activity is a malicious activity is made when the attribute set of the instance of the activity corresponds to an identified multi-attribute cluster-identifier. The identified multi-attribute cluster-identifier has a risk score and an attribute set that indicate a likelihood that the instance of the activity is a malicious activity. A visualization that identifies the instance of the activity as a malicious activity is generated.Type: ApplicationFiled: November 3, 2020Publication date: May 6, 2021Inventors: Mihai COSTEA, Michael Abraham BETSER, Ravi Kiran Reddy POLURI, Hua DING, Weisheng LI, Phanindra PAMPATI, David Nicholas YOST
-
Publication number: 20210111482Abstract: Multiband base station antennas include first and second arrays. The first array has a plurality of radiating elements that are arranged in a plurality of columns and rows, where both an uppermost and a lowermost of the rows of the first array include a first number of radiating elements, and at least one of the other rows of the first array includes a second, larger number of radiating elements. The second array includes a plurality of radiating elements that are vertically offset from each other. At least one of the radiating elements in the uppermost of the rows of the first array is not vertically aligned with any of the radiating elements in the lowermost of the rows of the first array.Type: ApplicationFiled: October 2, 2020Publication date: April 15, 2021Inventors: Tamilarasan Sundara Raj, Krisen James, Kumara Swamy Kasani, Lenin Naragani, Ligang Wu, Ravi Kiran Reddy Tadiparthi, Yateen Sutar, Venkateswara Rao Polineni, HongHui Li
-
Patent number: 10956786Abstract: An object-extraction method includes generating multiple partition objects based on an electronic document, and receiving a first user selection of a data element via a user interface of a compute device. In response to the first user selection, and using a machine learning model, a first subset of partition objects from the multiple partition objects is detected and displayed via the user interface. A user interaction, via the user interface, with one of the partition objects is detected, and in response, a weight of the machine learning model is modified, to produce a modified machine learning model. A second user selection of the data element is received via the user interface, and in response and using the modified machine learning model, a second subset of partition objects from the multiple partition objects is detected and displayed via the user interface, the second subset different from the first subset.Type: GrantFiled: February 14, 2020Date of Patent: March 23, 2021Inventors: Dan G. Tecuci, Ravi Kiran Reddy Palla, Hamid Reza Motahari Nezhad, Vincent Poon, Nigel Paul Duffy, Joseph Nipko