Patents by Inventor Ravi Prasad

Ravi Prasad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11146454
    Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
    Type: Grant
    Filed: March 16, 2020
    Date of Patent: October 12, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Rohit Prasad, Shashi Gandham, Hoang Nguyen, Abhishek Singh, Shih-Chun Chang, Navindra Yadav, Ali Parandehgheibi, Paul Mach, Rachita Agasthy, Ravi Prasad, Varun Malhotra, Michael Watts, Sunil Gupta
  • Patent number: 11146574
    Abstract: A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.
    Type: Grant
    Filed: August 5, 2019
    Date of Patent: October 12, 2021
    Assignee: SPLUNK INC.
    Inventors: Sudhakar Muddu, Christos Tryfonas, Ravi Prasad Bulusu
  • Patent number: 11074268
    Abstract: The embodiments herein relate to operational data analysis (ODA) and, more particularly to automate operational data analysis and generate the analysis report for various products using a web-based multi-tenant product intelligence framework. The system allows the user to configure a data collection process, define schema structure, select a data storage for storing the collected data, select or create a data formatting algorithm, and generate a data report to perform the ODA process. Based on the ODA report, appropriate decisions can be taken by an organization.
    Type: Grant
    Filed: July 21, 2014
    Date of Patent: July 27, 2021
    Assignee: HCL TECHNOLOGIES LTD
    Inventors: Arvind Kumar Maurya, Dhanyamraju S U M Prasad, Yogesh Gupta, Ravi Prasad, Karuna Sharma
  • Publication number: 20210216923
    Abstract: A system and method for recommending demand-supply agent pairs for transactions uses a deep neural network on data of demand agents to produce a demand agent vector, which is used to select supply agents based on their likelihood of future transaction and to find k nearest neighbor demand agents for each of the demand agents. The candidate supply agents and the k nearest neighbor demand agents are then combined to produce candidate demand-supply agent pairs, which are used to find recommended demand-supply agent pairs by applying modeling using machine learning.
    Type: Application
    Filed: March 5, 2020
    Publication date: July 15, 2021
    Inventors: KIRAN RAMA, FRANCIS CHOW, RICKY HO, SAYAN PUTATUNDA, RAVI PRASAD KONDAPALLI, STEPHEN HARRIS
  • Patent number: 11019088
    Abstract: Techniques are described for processing anomalies detected using user-specified rules with anomalies detected using machine-learning based behavioral analysis models to identify threat indicators and security threats to a computer network. In an embodiment, anomalies are detected based on processing event data at a network security system that used rules-based anomaly detection. These rules-based detected anomalies are acquired by a network security system that uses machine-learning based anomaly detection. The rules-based detected anomalies are processed along with machine learning detected anomalies to detect threat indicators or security threats to the computer network. The threat indicators and security threats are output as alerts to the network security system that used rules-based anomaly detection.
    Type: Grant
    Filed: May 28, 2020
    Date of Patent: May 25, 2021
    Assignee: SPLUNK INC.
    Inventors: Robert Winslow Pratt, Ravi Prasad Bulusu
  • Publication number: 20210101340
    Abstract: A three-dimensional printing system may include a three-dimensional printer. The three-dimensional printer may include a station to receive and rotate a build material container having an axial port, an auger and at least one at least one actuator to move at least one of the build material container and the auger relative to one another to position the auger through the axial port into the build material container.
    Type: Application
    Filed: July 31, 2018
    Publication date: April 8, 2021
    Inventors: Adam Franks, Kevin E. Swier, Andrew L. Van Brockin, Ravi Prasad
  • Patent number: 10911468
    Abstract: A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.
    Type: Grant
    Filed: August 21, 2019
    Date of Patent: February 2, 2021
    Assignee: SPLUNK INC.
    Inventors: Sudhakar Muddu, Christos Tryfonas, Ravi Prasad Bulusu
  • Patent number: 10904270
    Abstract: A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: January 26, 2021
    Assignee: SPLUNK INC.
    Inventors: Sudhakar Muddu, Christos Tryfonas, Ravi Prasad Bulusu, Marios Iliofotou
  • Publication number: 20200311386
    Abstract: A method includes determining information indicative of at least one facial characteristic associated with at least one face in the source image, processing the source image using a filter based on the determined information, performing wavelet decomposition on each of the filtered image and the source image, determining weightage factors associated with the wavelet decomposition of each of the filtered image and the source image, based on the determined information, obtaining a wavelet image to generate a texture restored image from the wavelet decomposition of each of the filtered image and the source image based on the weightage factors.
    Type: Application
    Filed: March 25, 2020
    Publication date: October 1, 2020
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Sudha VELUSAMY, Rahul Varna, Ravi Prasad Mohan Kini, Aniket Devdatta Rege, Rishubh Parihar, Daeyoung Hyun
  • Publication number: 20200296124
    Abstract: Techniques are described for processing anomalies detected using user-specified rules with anomalies detected using machine-learning based behavioral analysis models to identify threat indicators and security threats to a computer network. In an embodiment, anomalies are detected based on processing event data at a network security system that used rules-based anomaly detection. These rules-based detected anomalies are acquired by a network security system that uses machine-learning based anomaly detection. The rules-based detected anomalies are processed along with machine learning detected anomalies to detect threat indicators or security threats to the computer network. The threat indicators and security threats are output as alerts to the network security system that used rules-based anomaly detection.
    Type: Application
    Filed: May 28, 2020
    Publication date: September 17, 2020
    Inventors: Robert Winslow Pratt, Ravi Prasad Bulusu
  • Publication number: 20200220780
    Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
    Type: Application
    Filed: March 16, 2020
    Publication date: July 9, 2020
    Inventors: Rohit Prasad, Shashi Gandham, Hoang Nguyen, Abhishek Singh, Shih-Chun Chang, Navindra Yadav, Ali Parandehgheibi, Paul Mach, Rachita Agasthy, Ravi Prasad, Varun Malhotra, Michael Watts, Sunil Gupta
  • Publication number: 20200192909
    Abstract: The embodiments herein relate to operational data analysis (ODA) and, more particularly to automate operational data analysis and generate the analysis report for various products using a web-based multi-tenant product intelligence framework. The system allows the user to configure a data collection process, define schema structure, select a data storage for storing the collected data, select or create a data formatting algorithm, and generate a data report to perform the ODA process. Based on the ODA report, appropriate decisions can be taken by an organization.
    Type: Application
    Filed: July 21, 2014
    Publication date: June 18, 2020
    Applicant: HCL Technologies Ltd.
    Inventors: Arvind Kumar Maurya, Dhanyamraju S U M Prasad, Yogesh Gupta, Ravi Prasad, Karuna Sharma
  • Patent number: 10673880
    Abstract: Techniques are described for processing anomalies detected using user-specified rules with anomalies detected using machine-learning based behavioral analysis models to identify threat indicators and security threats to a computer network. In an embodiment, anomalies are detected based on processing event data at a network security system that used rules-based anomaly detection. These rules-based detected anomalies are acquired by a network security system that uses machine-learning based anomaly detection. The rules-based detected anomalies are processed along with machine learning detected anomalies to detect threat indicators or security threats to the computer network. The threat indicators and security threats are output as alerts to the network security system that used rules-based anomaly detection.
    Type: Grant
    Filed: September 26, 2016
    Date of Patent: June 2, 2020
    Assignee: SPLUNK INC.
    Inventors: Robert Winslow Pratt, Ravi Prasad Bulusu
  • Patent number: 10666869
    Abstract: An image display method is provided. The image display method includes displaying a camera preview screen that provides an image of a subject in real time, capturing one or more images by capturing the camera preview screen, and displaying a photo reel on the camera preview screen, the photo reel being generated by arranging thumbnails of the captured one or more images in a row.
    Type: Grant
    Filed: October 5, 2018
    Date of Patent: May 26, 2020
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Debayan Mukherjee, Swadha Jaiswal, Saumitri Choudhury, Akhilesh Parmar, Anuj Kumar, Rahul Kumar Chaurasia, Ravi Prasad Mohan Kini, Sujata Prabhakar Shidhaye, Karishma Das
  • Publication number: 20200145291
    Abstract: The disclosed technology relates to a network agent for generating platform specific network policies. A network agent is configured to receive a platform independent network policy from a network policy system, determine implementation characteristics of the network entity, generate platform specific policies from the platform independent network policy based on the implementation characteristics of the network entity, and implement the platform specific policies on the network entity.
    Type: Application
    Filed: December 30, 2019
    Publication date: May 7, 2020
    Inventors: Rohit Prasad, Hai Vu, Shih-Chun Chang, Hoang Nguyen, Shashi Gandham, Navindra Yadav, Praneeth Vallem, Sunil Gupta, Ravi Prasad, Varun Malhotra
  • Publication number: 20200120284
    Abstract: A method for switching between a first lens and a second lens in an electronic device includes displaying, by the electronic device, a first frame showing a field of view (FOV) of the first lens; detecting, by the electronic device, an event that causes the electronic device to transition from displaying the first frame to displaying a second frame showing a FOV of the second lens; generating, by the electronic device and based on the detecting the event, at least one intermediate frame for transitioning from the first frame to the second frame; and switching, by the electronic device and based on the detecting the event, from the first lens to the second lens and displaying the second frame, wherein the at least one intermediate frame is displayed after the displaying the first frame and before the displaying the second frame while the switching is performed.
    Type: Application
    Filed: October 11, 2019
    Publication date: April 16, 2020
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Ravi Prasad Mohan KINI, Gururaj Bhat, Pavan Sudheendra, Girish Kulkarni, Vineeth Thanikonda Munirathnam, Sanjay Narasimha Murthy, Balvinder Singh
  • Patent number: 10594560
    Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
    Type: Grant
    Filed: March 27, 2017
    Date of Patent: March 17, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Rohit Prasad, Shashi Gandham, Hoang Nguyen, Abhishek Singh, Shih-Chun Chang, Navindra Yadav, Ali Parandehgheibi, Paul Mach, Rachita Agasthy, Ravi Prasad, Varun Malhotra, Michael Watts, Sunil Gupta
  • Publication number: 20200076718
    Abstract: A method of transmitting a data flow over a link aggregation group (LAG), including: comparing the bandwidth demand of the data flow with the capacity of a first link assigned to the flow in the LAG; identifying an underutilized second link in the LAG when the bandwidth demand of the flow is greater than the capacity of the link assigned to the flow resulting in excess packets; determining if the second link is available; determining the traffic type of the traffic flow; calculating a time delay and delaying excess packets of the traffic flow by the calculated time delay when the determined traffic type does not include a packet sequence number; and sending excess packets of the traffic flow on the second link.
    Type: Application
    Filed: August 31, 2018
    Publication date: March 5, 2020
    Inventors: Yusuf KHAN, Ravi Prasad RK, Siby MATHEW
  • Patent number: 10523512
    Abstract: The disclosed technology relates to a network agent for generating platform specific network policies. A network agent is configured to receive a platform independent network policy from a network policy system, determine implementation characteristics of the network entity, generate platform specific policies from the platform independent network policy based on the implementation characteristics of the network entity, and implement the platform specific policies on the network entity.
    Type: Grant
    Filed: March 24, 2017
    Date of Patent: December 31, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Rohit Prasad, Hai Vu, Shih-Chun Chang, Hoang Nguyen, Shashi Gandham, Navindra Yadav, Praneeth Vallem, Sunil Gupta, Ravi Prasad, Varun Malhotra
  • Patent number: 10522695
    Abstract: A multilayer stack is described. The multilayer stack includes: (i) one or more inorganic barrier layers for reducing transport of gas or vapor molecules therethrough; (ii) an inorganic reactive layer disposed adjacent to one or more of the inorganic barrier layers, and the reactive layer capable of reacting with the gas or the vapor molecules; and (iii) wherein, in an operational state of the multilayer stack, the vapor or the gas molecules that diffuse through one or more of the inorganic barrier layers react with the inorganic reactive layer, and thereby allow said multilayer stack to be substantially impervious to the gas or the vapor molecules.
    Type: Grant
    Filed: January 27, 2012
    Date of Patent: December 31, 2019
    Assignee: VITRIFLEX, INC.
    Inventors: Ravi Prasad, Dennis R. Hollars