Patents by Inventor Ravi Prasad
Ravi Prasad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240114528Abstract: The disclosure relates to an apparatus comprising: means for receiving (800) sidelink control information sent from a relay user equipment; and means for performing (802) flow control for ingress data sent from the apparatus to the relay user equipment to be relayed to a destination user equipment paired with the apparatus based on the sidelink control information sent from the relay user equipment.Type: ApplicationFiled: September 22, 2023Publication date: April 4, 2024Applicant: Nokia Technologies OyInventors: Vinh VAN PHAN, Ling YU, Faranaz SABOURI-SICHANI, Stepan KUCERA, Berthold PANZNER, Ravi Prasad R K, György Tamás WOLFNER, Hannu Petri HIETALAHTI
-
Publication number: 20240083846Abstract: The present invention relates to novel SMAC mimetic peptidomimetics useful for the treatment of proliferative diseases including cancer in mammals The novel SMAC mimetics are prepared by incorporating (2S,5R)-5-(5-methylfuran-2-yl)pyrrolidine-2-carboxylic acid, a novel unnatural amino acid that imparts exclusively trans amide bond geometry favourable for target protein binding. Here, the novel SMAC mimetic molecule(s) not only show its efficacy in varied cancer types but also demonstrate in vitro and in vivo efficacy against therapy resistant cancer as a single agent. The novel SMAC mimetics disclosed in the present invention binds to BIR-2 and BIR-3 domains of the XIAP and exhibit high anti-proliferative activity against variety of mammalian cancer cell lines that include but not limited to chemotherapy and TRAIL resistant cell lines.Type: ApplicationFiled: December 17, 2021Publication date: March 14, 2024Inventors: Wahajul HAQ, Rafat ALI, Akhilesh SINGH, Mushtaq Ahmad NENGROO, Roshan KATEKAR, Gajendra SINGH, Jayanti VAISHNAV, Mohammad AFSAR, Manohar SINGH, Srikanta Kumar RATH, Dipankar KOLEY, Durga Prasad MISHRA, Ravishankar RAMACHANDRAN, Ravi Sankar AMPAPATHI, Jiaur Rahaman GAYEN, Dipak DATTA
-
Publication number: 20240037197Abstract: Systems, computer program products, and methods are described herein for identification and verification of brute force attacks using hash signature segmentation and behavior clustering analysis. The present invention is configured to receive a plurality of access attempts and an associated plurality of hash values; determine a failure request load based on the plurality of access attempts; determine whether the failure request load meets a failure threshold, wherein, in an instance where the failure request load meets the failure threshold, separating the plurality of access attempts associated with the failure request load into a plurality of hash clusters; generate a behavior cluster for each hash cluster based on shared behavior data of the plurality of access attempts; and determine, based on the behavior cluster for each hash cluster, a likelihood of misappropriation for each access attempt of the plurality of access attempts.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Applicant: BANK OF AMERICA CORPORATIONInventors: Vijay Kumar Yarabolu, Ravi Prasad Challagulla, Usha Kiran Maddela
-
Publication number: 20240023188Abstract: An apparatus may be configured to: connect to a first base station with one of: a direct connection, or an indirect connection via a first relay user equipment; determine at least one second relay user equipment for receiving a reconfiguration message for path switching to a second base station; establish a sidelink connection with the at least one second relay user equipment; and receive, via the sidelink connection from the at least one second relay user equipment, the reconfiguration message for the path switching to the second base station. An apparatus may be configured to: receive, from a second base station, a reconfiguration message, wherein the received reconfiguration message comprises a reconfiguration message for a remote user equipment; establish a sidelink connection with the remote user equipment; and forward, to the remote user equipment, the reconfiguration message for the remote user equipment.Type: ApplicationFiled: July 13, 2023Publication date: January 18, 2024Inventors: Ling YU, Vinh VAN PHAN, Stepan KUCERA, Faranaz SABOURI-SICHANI, György Tamás WOLFNER, Berthold PANZNER, Ravi Prasad R K
-
Patent number: 11876821Abstract: First event data, indicative of a first activity on a computer network and second event data indicative of a second activity on the computer network, is received. A first machine learning anomaly detection model is applied to the first event data, by a real-time analysis engine operated by the threat indicator detection system in real time, to detect first anomaly data. A second machine learning anomaly detection model is applied to the first anomaly data and the second event data, by a batch analysis engine operated by the threat indicator detection system in a batch mode, to detect second anomaly data. A third anomaly is detected using an anomaly detection rule. The threat indictor system processes the first anomaly data, the second anomaly data, and the third anomaly data using a threat indicator model to identify a threat indicator associated with a potential security threat to the computer network.Type: GrantFiled: February 9, 2023Date of Patent: January 16, 2024Assignee: SPLUNK INC.Inventors: Robert Winslow Pratt, Ravi Prasad Bulusu
-
Patent number: 11829921Abstract: A system and method for recommending demand-supply agent pairs for transactions uses a deep neural network on data of demand agents to produce a demand agent vector, which is used to select supply agents based on their likelihood of future transaction and to find k nearest neighbor demand agents for each of the demand agents. The candidate supply agents and the k nearest neighbor demand agents are then combined to produce candidate demand-supply agent pairs, which are used to find recommended demand-supply agent pairs by applying modeling using machine learning.Type: GrantFiled: March 5, 2020Date of Patent: November 28, 2023Assignee: VMWARE, INC.Inventors: Kiran Rama, Francis Chow, Ricky Ho, Sayan Putatunda, Ravi Prasad Kondapalli, Stephen Harris
-
Publication number: 20230283520Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.Type: ApplicationFiled: May 8, 2023Publication date: September 7, 2023Inventors: Rohit Prasad, Shashi Gandham, Hoang Nguyen, Abhishek Singh, Shih-Chun Chang, Navindra Yadav, Ali Parandehgheibi, Paul Mach, Rachita Agasthy, Ravi Prasad, Varun Malhotra, Michael Watts, Sunil Gupta
-
Publication number: 20230262333Abstract: A method for switching between a first lens and a second lens in an electronic device includes displaying, by the electronic device, a first frame showing a field of view (FOV) of the first lens; detecting, by the electronic device, an event that causes the electronic device to transition from displaying the first frame to displaying a second frame showing a FOV of the second lens; generating, by the electronic device and based on the detecting the event, at least one intermediate frame for transitioning from the first frame to the second frame; and switching, by the electronic device and based on the detecting the event, from the first lens to the second lens and displaying the second frame, wherein the at least one intermediate frame is displayed after the displaying the first frame and before the displaying the second frame while the switching is performed.Type: ApplicationFiled: April 24, 2023Publication date: August 17, 2023Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Ravi Prasad Mohan KINI, Gururaj BHAT, Pavan SUDHEENDRA, Girish KULKARNI, Vineeth Thanikonda MUNIRATHNAM, Sanjay Narasimha MURTHY, Balvinder SINGH
-
Patent number: 11653097Abstract: A method for switching between a first lens and a second lens in an electronic device includes displaying, by the electronic device, a first frame showing a field of view (FOV) of the first lens; detecting, by the electronic device, an event that causes the electronic device to transition from displaying the first frame to displaying a second frame showing a FOV of the second lens; generating, by the electronic device and based on the detecting the event, at least one intermediate frame for transitioning from the first frame to the second frame; and switching, by the electronic device and based on the detecting the event, from the first lens to the second lens and displaying the second frame, wherein the at least one intermediate frame is displayed after the displaying the first frame and before the displaying the second frame while the switching is performed.Type: GrantFiled: August 10, 2021Date of Patent: May 16, 2023Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Ravi Prasad Mohan Kini, Gururaj Bhat, Pavan Sudheendra, Girish Kulkarni, Vineeth Thanikonda Munirathnam, Sanjay Narasimha Murthy, Balvinder Singh
-
Patent number: 11646940Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.Type: GrantFiled: September 22, 2021Date of Patent: May 9, 2023Assignee: Cisco Technology, Inc.Inventors: Rohit Prasad, Shashi Gandham, Hoang Nguyen, Abhishek Singh, Shih-Chun Chang, Navindra Yadav, Ali Parandehgheibi, Paul Mach, Rachita Agasthy, Ravi Prasad, Varun Malhotra, Michael Watts, Sunil Gupta
-
Patent number: 11637957Abstract: A method for switching between a first lens and a second lens in an electronic device includes displaying, by the electronic device, a first frame showing a field of view (FOV) of the first lens; detecting, by the electronic device, an event that causes the electronic device to transition from displaying the first frame to displaying a second frame showing a FOV of the second lens; generating, by the electronic device and based on the detecting the event, at least one intermediate frame for transitioning from the first frame to the second frame; and switching, by the electronic device and based on the detecting the event, from the first lens to the second lens and displaying the second frame, wherein the at least one intermediate frame is displayed after the displaying the first frame and before the displaying the second frame while the switching is performed.Type: GrantFiled: October 11, 2019Date of Patent: April 25, 2023Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Ravi Prasad Mohan Kini, Gururaj Bhat, Pavan Sudheendra, Girish Kulkarni, Vineeth Thanikonda Munirathnam, Sanjay Narasimha Murthy, Balvinder Singh
-
Patent number: 11606379Abstract: Techniques are described for processing anomalies detected using user-specified rules with anomalies detected using machine-learning based behavioral analysis models to identify threat indicators and security threats to a computer network. In an embodiment, anomalies are detected based on processing event data at a network security system that used rules-based anomaly detection. These rules-based detected anomalies are acquired by a network security system that uses machine-learning based anomaly detection. The rules-based detected anomalies are processed along with machine learning detected anomalies to detect threat indicators or security threats to the computer network. The threat indicators and security threats are output as alerts to the network security system that used rules-based anomaly detection.Type: GrantFiled: April 21, 2021Date of Patent: March 14, 2023Assignee: SPLUNK INC.Inventors: Robert Winslow Pratt, Ravi Prasad Bulusu
-
Patent number: 11575693Abstract: A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.Type: GrantFiled: December 17, 2020Date of Patent: February 7, 2023Assignee: SPLUNK INC.Inventors: Sudhakar Muddu, Christos Tryfonas, Ravi Prasad Bulusu, Marios Iliofotou
-
Patent number: 11335122Abstract: A method includes determining information indicative of at least one facial characteristic associated with at least one face in the source image, processing the source image using a filter based on the determined information, performing wavelet decomposition on each of the filtered image and the source image, determining weightage factors associated with the wavelet decomposition of each of the filtered image and the source image, based on the determined information, obtaining a wavelet image to generate a texture restored image from the wavelet decomposition of each of the filtered image and the source image based on the weightage factors.Type: GrantFiled: March 25, 2020Date of Patent: May 17, 2022Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Sudha Velusamy, Rahul Varna, Ravi Prasad Mohan Kini, Aniket Devdatta Rege, Rishubh Parihar, Daeyoung Hyun
-
Publication number: 20220086352Abstract: A method for switching between a first lens and a second lens in an electronic device includes displaying, by the electronic device, a first frame showing a field of view (FOV) of the first lens; detecting, by the electronic device, an event that causes the electronic device to transition from displaying the first frame to displaying a second frame showing a FOV of the second lens; generating, by the electronic device and based on the detecting the event, at least one intermediate frame for transitioning from the first frame to the second frame; and switching, by the electronic device and based on the detecting the event, from the first lens to the second lens and displaying the second frame, wherein the at least one intermediate frame is displayed after the displaying the first frame and before the displaying the second frame while the switching is performed.Type: ApplicationFiled: October 11, 2019Publication date: March 17, 2022Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Ravi Prasad Mohan KINI, Gururaj Bhat, Pavan Sudheendra, Girish Kulkarni, Vineeth Thanikonda Munirathnam, Sanjay Narasimha Murthy, Balvinder Singh
-
Patent number: 11252038Abstract: The disclosed technology relates to a network agent for generating platform specific network policies. A network agent is configured to receive a platform independent network policy from a network policy system, determine implementation characteristics of the network entity, generate platform specific policies from the platform independent network policy based on the implementation characteristics of the network entity, and implement the platform specific policies on the network entity.Type: GrantFiled: December 30, 2019Date of Patent: February 15, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Rohit Prasad, Hai Vu, Shih-Chun Chang, Hoang Nguyen, Shashi Gandham, Navindra Yadav, Praneeth Vallem, Sunil Gupta, Ravi Prasad, Varun Malhotra
-
Publication number: 20220027901Abstract: A credential security tool may avoid storing payment credentials at online services. Generally, the credential security tool issues authorization tokens to merchants when users attempt to store payment credentials with the merchants. The merchants store these authorization tokens rather than the payment credentials. When a user initiates a transaction with a merchant, the merchant can present the authorization token to receive a masked card that can be used to complete the transaction. When the merchant presents the masked card for payment, the credential security tool can use the actual card information to complete the transaction.Type: ApplicationFiled: July 21, 2020Publication date: January 27, 2022Inventors: Vijay Kumar Yarabolu, Ravi Prasad Challagulla, Durga Prasad Patro
-
Publication number: 20220027907Abstract: A credential security tool may avoid storing payment credentials at online services. Generally, the credential security tool issues authorization tokens to merchants when users attempt to store payment credentials with the merchants. The merchants store these authorization tokens rather than the payment credentials. When a user initiates a transaction with a merchant, the merchant can present the authorization token to receive a masked card that can be used to complete the transaction. When the merchant presents the masked card for payment, the credential security tool can use the actual card information to complete the transaction.Type: ApplicationFiled: July 21, 2020Publication date: January 27, 2022Inventors: Vijay Kumar Yarabolu, Ravi Prasad Challagulla, Durga Prasad Patro
-
Publication number: 20220014436Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.Type: ApplicationFiled: September 22, 2021Publication date: January 13, 2022Inventors: Rohit Prasad, Shashi Gandham, Hoang Nguyen, Abhishek Singh, Shih-Chun Chang, Navindra Yadav, Ali Parandehgheibi, Paul Mach, Rachita Agasthy, Ravi Prasad, Varun Malhotra, Michael Watts, Sunil Gupta
-
Publication number: 20210331246Abstract: In an example implementation, a 3D printing system to remove components of a liquid agent includes a permeable surface. Build material formed on the permeable surface can be heated to generate vapor from a component of the liquid agent. The vapor can be drawn out of the build material through the permeable surface.Type: ApplicationFiled: June 5, 2018Publication date: October 28, 2021Inventors: Jason Hower, Michael G. Monroe, James E Fischer, Andrew L Van Brocklin, Ravi Prasad