Patents by Inventor Ravi Shanker

Ravi Shanker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11924226
    Abstract: Systems, methods, and computer program products for identifying a fraudulent device. A device analytics engine receives device data from a computing device, the device data including parameters associated with the computing device. The device analytics engine selects a set of rules in a plurality of rules that indicate at least one parameter in the plurality of parameters in the device data for determining a device identifier. The set of rules are evaluated in an order until the device identifier is determined from the at least one parameter indicated in the set of rules, the device data, and previously stored data from multiple computing devices. A score is generated for the computing device using one or more of the device identifier, device data, a set of rules, and previously receive device data that corresponds to the device identifier. A computing device is identified as a fraudulent computing device based on the score.
    Type: Grant
    Filed: February 3, 2021
    Date of Patent: March 5, 2024
    Assignee: PayPal, Inc.
    Inventors: Anupam Tarsauliya, Ravi Shanker Sandepudi, Yugal Sharma, Sai Krishna Pinna
  • Publication number: 20240059303
    Abstract: One or more embodiments include techniques for automating vehicle routines. The techniques include receiving a rule that includes one or more deterministic elements and a machine learning element; collecting, during operation of the vehicle, a set of vehicle data based on the machine learning element; training a machine learning model that corresponds to the machine learning element using the set of vehicle data, wherein the machine learning model is used to process the machine learning element during execution of the rule.
    Type: Application
    Filed: August 15, 2023
    Publication date: February 22, 2024
    Inventors: Harinarayanan Kuruthikadavath KURUSSITHODI, Rajesh BISWAL, Ravi Shanker GUPTA
  • Patent number: 11763202
    Abstract: There are provided systems and methods for a shared prediction engine for machine learning model deployment. A service provider may provide AI hosting platforms that allow for clients, customers, and other end users to upload AI models for execution, such as machine learning models. A user may utilize one or more user interfaces provided to a client device by the service provider to select machine learning models to perform predictive services based on input features provided in an input string. Thereafter, a machine learning engine may host and execute the models during an instance of the engine provided to the client device. The engine may then process the input features in a processing thread remotely from the client device during the instance so that machine learning predictions may be determined. Thereafter, an output string for the predictions and model explanations may be provided to the client device.
    Type: Grant
    Filed: May 27, 2022
    Date of Patent: September 19, 2023
    Assignee: PAYPAL, INC.
    Inventors: Sriharsha Vogeti, Anupam Tarsauliya, Ayaz Ahmad, Ravi Shanker Sandepudi
  • Publication number: 20230018068
    Abstract: In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.
    Type: Application
    Filed: June 1, 2022
    Publication date: January 19, 2023
    Inventors: SUPREETH HOSUR NAGESH RAO, NAVINDRA YADAV, RAVI SANKURATRI, ALOK LALIT WADHWA, ARIA RAHADIAN, BRADY SCHULMAN, RAVI SHANKER PRASAD, VASIL DOCHKOV YORDANOV, YIWEI WANG, ZHIWEN ZHANG, UDAYAN JOSHI, SOUMYADEEP CHOUDHURY, MUHAMMADA FURQAN, DANESH IRANI
  • Publication number: 20220407883
    Abstract: In one aspect, a computerized method for locating one or more shadow vulnerable datastores for cloud-platform datastores includes the step of identifying a cloned data store of an original datastore in a cloud database instance. It includes the step of determining that the cloned datastore comprises a shadow vulnerable datastore. It includes the step of defining a security posture of the cloned datastore. It includes the step of publishing a digitized data clone security differential report comprising the security posture and one or more remediations to fix security posture issues.
    Type: Application
    Filed: April 1, 2022
    Publication date: December 22, 2022
    Inventors: SUPREETH HOSUR NAGESH RAO, NAVINDRA YADAV, RAVI SANKURATRI, ALOK LALIT WADHWA, ARIA RAHADIAN, BRADY SCHULMAN, RAVI SHANKER PRASAD, VASIL DOCHKOV YORDANOV, YIWEI WANG, ZHIWEN ZHANG, UDAYAN JOSHI, SOUMYADEEP CHOUDHURY, MUHAMMADA FURQAN, DANESH IRANI
  • Publication number: 20220398498
    Abstract: There are provided systems and methods for a shared prediction engine for machine learning model deployment. A service provider may provide AI hosting platforms that allow for clients, customers, and other end users to upload AI models for execution, such as machine learning models. A user may utilize one or more user interfaces provided to a client device by the service provider to select machine learning models to perform predictive services based on input features provided in an input string. Thereafter, a machine learning engine may host and execute the models during an instance of the engine provided to the client device. The engine may then process the input features in a processing thread remotely from the client device during the instance so that machine learning predictions may be determined. Thereafter, an output string for the predictions and model explanations may be provided to the client device.
    Type: Application
    Filed: May 27, 2022
    Publication date: December 15, 2022
    Inventors: Sriharsha Vogeti, Anupam Tarsauliya, Ayaz Ahmad, Ravi Shanker Sandepudi
  • Publication number: 20220269792
    Abstract: A computerized method for implementing risk discovery with a set of unified security and privacy policies, includes the step of discovering a set of data and a set of data accesses within an enterprise computing system. The method includes the step of classifying the set of discovered data and the set of data accesses with an identification that shows which of the data assets are important or critical for the enterprise. The method includes the step of determining which of the set of discovered data and the set of data accesses have or are associated with sensitive information. The method includes the step of placing the set of discovered data and the set of data accesses that are associated with sensitive information into a set of discovered information about the infrastructure. The method includes the step of determining which of the set of discovered data and the set of data accesses are relevant in the context of a specified governmental data privacy regulation.
    Type: Application
    Filed: March 18, 2021
    Publication date: August 25, 2022
    Inventors: SUPREETH HOSUR NAGESH RAO, NAVINDRA YADAV, RAVI SANKURATRI, ALOK LALIT WADHWA, ARIA RAHADIAN, BHARATHWAJ SANKARA VISWANATHAN, BRADY SCHULMAN, MATTHEW FINN, PAUL JOHN LESIAK, RAVI SHANKER PRASAD, VASIL DOCHKOV YORDANOV, YIWEI WANG, ZHIWEN ZHANG
  • Publication number: 20220272111
    Abstract: In one aspect, a method for implementing a cloud-platform push for one or more known data breaches includes the step of, for each data breach of the one or more known data breaches, providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability in the data breach. A step includes generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network. A step includes determining that the data breach can occur within the enterprise's cloud-based network.
    Type: Application
    Filed: November 16, 2021
    Publication date: August 25, 2022
    Inventors: SUPREETH HOSUR NAGESH RAO, NAVINDRA YADAV, RAVI SANKURATRI, ALOK LALIT WADHWA, ARIA RAHADIAN, BHARATHWAJ SANKARA VISWANATHAN, BRADY SCHULMAN, MATTHEW FINN, PAUL JOHN LESIAK, RAVI SHANKER PRASAD, VASIL DOCHKOV YORDANOV, YIWEI WANG, ZHIWEN ZHANG, UDAYAN JOSHI, SOUMYADEEP CHOUDHURY, MUHAMMADA FURQAN, MANISH ARIGALA
  • Publication number: 20220269815
    Abstract: In one aspect, a computerized method for automatically identifying and solving for vendor data abuse in an enterprise network, includes the step of implementing a vendor detection at one or more gateways of the enterprise network. The method includes the step of mapping a set of data along with any associated data attributes of the set of data that are being shared with a vendor via the one or more gateways. The method includes the step of detecting and identifying an access anomaly with respect to the set of data associated with a vendor access. The method includes the step of implementing a specified data minimization process to the access anomaly.
    Type: Application
    Filed: June 1, 2021
    Publication date: August 25, 2022
    Inventors: SUPREETH HOSUR NAGESH RAO, Navindra Yadav, Ravi Sankuratri, Alok Lalit Wadhwa, Aria Rahadian, Bharathwaj Sankara Viswanathan, Brady Schulman, Matthew Finn, Ravi Shanker Prasad, Vasil Dochkov Yordanov, Yiwei Wang, Zhiwen Zhang
  • Publication number: 20220222675
    Abstract: Techniques are disclosed relating to a graphical user interface (GUI) for editing classification rules. The graphical user interface may include a display of a modified threshold value for a classification rule, where values on one side (e.g. above) the threshold value indicate a first type of classification, and values on the other side (e.g. below) indicate a second type of classification. Machine learning techniques may be used to suggest a modified threshold value to the user, who may accept the modified value, or may provide, via the GUI, their own modified value, which can be different from a suggested value. Graphical indications of accuracy for the classification rule may be displayed.
    Type: Application
    Filed: March 31, 2022
    Publication date: July 14, 2022
    Inventors: Ravi Shanker Sandepudi, Ayez Ahmad
  • Publication number: 20220201010
    Abstract: Systems, methods, and computer program products for identifying a fraudulent device. A device analytics engine receives device data from a computing device, the device data including parameters associated with the computing device. The device analytics engine selects a set of rules in a plurality of rules that indicate at least one parameter in the plurality of parameters in the device data for determining a device identifier. The set of rules are evaluated in an order until the device identifier is determined from the at least one parameter indicated in the set of rules, the device data, and previously stored data from multiple computing devices. A score is generated for the computing device using one or more of the device identifier, device data, a set of rules, and previously receive device data that corresponds to the device identifier. A computing device is identified as a fraudulent computing device based on the score.
    Type: Application
    Filed: February 3, 2021
    Publication date: June 23, 2022
    Inventors: Anupam Tarsauliya, Ravi Shanker Sandepudi, Yugal Sharma, Sai Krishna Pinna
  • Patent number: 11348035
    Abstract: There are provided systems and methods for a shared prediction engine for machine learning model deployment. A service provider may provide AI hosting platforms that allow for clients, customers, and other end users to upload AI models for execution, such as machine learning models. A user may utilize one or more user interfaces provided to a client device by the service provider to select machine learning models to perform predictive services based on input features provided in an input string. Thereafter, a machine learning engine may host and execute the models during an instance of the engine provided to the client device. The engine may then process the input features in a processing thread remotely from the client device during the instance so that machine learning predictions may be determined. Thereafter, an output string for the predictions and model explanations may be provided to the client device.
    Type: Grant
    Filed: October 27, 2020
    Date of Patent: May 31, 2022
    Assignee: PAYPAL, INC.
    Inventors: Sriharsha Vogeti, Anupam Tarsauliya, Ayaz Ahmad, Ravi Shanker Sandepudi
  • Patent number: 11339108
    Abstract: Methods and systems for preparing acetone from cumene hydroperoxide (CHP) are disclosed. The disclosed methods involve cleaving CHP to form a cleavage product stream. In some embodiments, the cleavage product stream is separated into an overhead stream and a bottoms stream. The bottoms stream is neutralized, washed and then treated in a crude acetone column to provide a crude acetone stream. The overhead stream of the cleavage product is flashed forward in the process, bypassing the neutralization, washing, and crude acetone column and is then combined with the crude acetone stream. The combined acetone streams are provided to an acetone product column. According to some embodiments, the acetone product column comprises a side draw for obtaining a recycle acetone stream, which is recycled to the cleavage reactor(s). The recycle acetone side draw may be located lower on the acetone product column than the point from which product acetone is obtained.
    Type: Grant
    Filed: June 18, 2021
    Date of Patent: May 24, 2022
    Assignee: KELLOG BROWN & ROOT LLC
    Inventors: Truc Van Vu, Eric Wing-Tak Wong, Paul Isaac Damin, Ravi Shanker Sahu
  • Publication number: 20220129785
    Abstract: There are provided systems and methods for a shared prediction engine for machine learning model deployment. A service provider may provide AI hosting platforms that allow for clients, customers, and other end users to upload AI models for execution, such as machine learning models. A user may utilize one or more user interfaces provided to a client device by the service provider to select machine learning models to perform predictive services based on input features provided in an input string. Thereafter, a machine learning engine may host and execute the models during an instance of the engine provided to the client device. The engine may then process the input features in a processing thread remotely from the client device during the instance so that machine learning predictions may be determined. Thereafter, an output string for the predictions and model explanations may be provided to the client device.
    Type: Application
    Filed: October 27, 2020
    Publication date: April 28, 2022
    Inventors: Sriharsha Vogeti, Anupam Tarsauliya, Ayaz Ahmad, Ravi Shanker Sandepudi
  • Publication number: 20220083877
    Abstract: There are provided systems and methods for predictive data aggregations for real-time detection of anomalous data. A service provider, such as an electronic transaction processor for digital transactions, may access feature data for accounts prior to the feature data being used in a live risk analysis system, for example, at a designated time and/or for a designated time period. The service provider may predetermine data values from the feature data, such as aggregates of the feature data that are for certain time periods and utilized by the live risk analysis system. This processing may be done in a batch processing job in order to determine data values for multiple accounts. These data values are prestored in an available database for a distributed computing system of the service provider. Thereafter, when the live risk analysis system requires the data values, the data values may be immediately retrieved.
    Type: Application
    Filed: December 8, 2020
    Publication date: March 17, 2022
    Inventors: Anupam Tarsauliya, Ayaz Ahmad, Ravi Shanker Sandepudi, Uttam Phalnikar
  • Publication number: 20210395180
    Abstract: Methods and systems for preparing acetone from cumene hydroperoxide (CHP) are disclosed. The disclosed methods involve cleaving CHP to form a cleavage product stream. In some embodiments, the cleavage product stream is separated into an overhead stream and a bottoms stream. The bottoms stream is neutralized, washed and then treated in a crude acetone column to provide a crude acetone stream. The overhead stream of the cleavage product is flashed forward in the process, bypassing the neutralization, washing, and crude acetone column and is then combined with the crude acetone stream. The combined acetone streams are provided to an acetone product column. According to some embodiments, the acetone product column comprises a side draw for obtaining a recycle acetone stream, which is recycled to the cleavage reactor(s). The recycle acetone side draw may be located lower on the acetone product column than the point from which product acetone is obtained.
    Type: Application
    Filed: June 18, 2021
    Publication date: December 23, 2021
    Applicant: KELLOGG BROWN & ROOT LLC
    Inventors: Truc Van Vu, Eric Wing-Tak Wong, Paul Isaac Damin, Ravi Shanker Sahu
  • Patent number: 10956226
    Abstract: A computer implemented method for providing workload resource management to applications in an embedded system. The method includes receiving, by an application-specific basic runtime environment (BRE), workload resource requirements of an application installed on the embedded system. The method includes obtaining, by the application-specific BRE, the workload resource requirements from an operating system of the embedded system. The method includes providing, by the application-specific BRE, the workload resource requirements to the application. The method includes initiating, by the application-specific BRE, the execution of the application on the embedded system.
    Type: Grant
    Filed: July 19, 2018
    Date of Patent: March 23, 2021
    Assignee: Futurewei Technologies, Inc.
    Inventors: Ravi Shanker Chuppala, Jun Xu, Sheng Xu
  • Publication number: 20200387835
    Abstract: Pure machine learning classification approaches can result in a “black box” solution where it is impossible to understand why a classifier reached a decision. This disclosure describes generating new classification rules leveraging machine learning techniques. New rules may have to meet evaluation criteria. Legibility of those rules can be improved for understanding. A machine learning classifier can be created that is used to identify possible candidate classification rules (e.g. from a group of decision trees such as a random forest classifier). Classification rules generated with the assistance of machine learning may allow for identification of transaction fraud or other classifications that a human analyst would be unable to identify. A selection process can identify which possible candidate rules are effective. The legibility of those rules can then be improved so that they can be more easily understood by humans.
    Type: Application
    Filed: September 9, 2019
    Publication date: December 10, 2020
    Inventors: Ravi Shanker Sandepudi, Ayaz Ahmad, Charles Poli, Samira Golsefid
  • Publication number: 20200334679
    Abstract: Techniques are disclosed relating to tuning fraud-detection rules using machine learning. In some embodiments, a server system may maintain rule information indicative of a plurality of fraud-detection rules for a transaction system. For example, in some embodiments, the server system may implement a fraud-detection service for the transaction system. In some embodiments, the server system may select a first rule to update, where the first rule includes one or more evaluation criteria and one or more corresponding user-defined threshold values. The server system may apply a machine learning algorithm to training data associated with the transaction system to generate an updated version of the first rule. The server system may then compare a performance of the first rule and the updated version of the first rule and, based on that performance, determine whether to suggest the updated version of the first rule to the transaction system.
    Type: Application
    Filed: April 19, 2019
    Publication date: October 22, 2020
    Inventors: Ravi Shanker Sandepudi, Ayez Ahmad
  • Patent number: 10587526
    Abstract: Embodiments relate to systems and methods that facilitate coordination amongst host devices that share network resources in order to use available bandwidth effectively. Embodiments can ensure the host devices themselves take responsibility for sending their data via shared network bandwidth, keeping access to bandwidth fair to all the host devices. Embodiments also include adapting to a continuously changing network bandwidth allocation policy for the shared network resource. In one embodiment, this includes using tokens (e.g., small chunk messages) to represent a grant to a host device to send a specified number of bytes over the network. Using a token generator module and a distributed queue, embodiments provide a unique and adaptive way to manage data transmissions among host devices within available resources.
    Type: Grant
    Filed: September 1, 2016
    Date of Patent: March 10, 2020
    Assignee: Walmart Apollo, LLC
    Inventors: Ravi Shanker Kumar Sinha, Puneet Jolly, Parijat Bansal, Soumyajit Das, K Vamsi Krishna