Patents by Inventor Rohit Chandra

Rohit Chandra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190227681
    Abstract: A method, system, and service—using conventional web browsers with no software installation—for enabling a user to select portions of content are disclosed. The user selected portions of content, or references to them, are stored in a repository and are made available for subsequent viewing to a potentially larger universe of users. Neither group: the users selecting the portions of content, nor the users viewing the previously selected portions of content, need to install any special software to avail all these benefits.
    Type: Application
    Filed: April 3, 2019
    Publication date: July 25, 2019
    Inventor: ROHIT CHANDRA
  • Patent number: 10320630
    Abstract: Systems, methods, and computer-readable media for hierarchichal sharding of flows from sensors to collectors. A first collector can receive a first portion of a network flow from a first capturing agent and determine that a second portion of the network flow was not received from the first capturing agent. The first collector can then send the first portion of the network flow to a second collector. A third collector can receive the second portion of the network flow from a second capturing agent and determine that the third collector did not receive the first portion of the network flow. The third collector can then send the second portion of the network flow to the second collector. The second collector can then aggregate the first portion and second portion of the network flow to yield the entire portion of the network flow.
    Type: Grant
    Filed: June 2, 2016
    Date of Patent: June 11, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Navindra Yadav, Khawar Deen, Varun Sagar Malhotra
  • Patent number: 10289294
    Abstract: A method and system for enabling the display of user selected content-portions of internet documents that have been selected by users of a content-portion selection service are disclosed. Accordingly, a content-portion selection service includes a web portal with a web page providing users with a snippet of code, which, when inserted into an internet document, causes the internet document to display selected content-portions from the content-portion selection service. The snippet of code can be configured to query the content-portion selection service for selected content-portions that were made by certain users, or, selection content-portions made on documents from certain domains, and so forth. The code associated with the user interface object displaying the selected content-portions can be configured to periodically query the content-portion selection service to retrieve up-to-date content-portion selections, thereby dynamically changing the content-portions appearing on a web page or internet document.
    Type: Grant
    Filed: February 12, 2016
    Date of Patent: May 14, 2019
    Inventor: Rohit Chandra
  • Publication number: 20190081959
    Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
    Type: Application
    Filed: November 2, 2018
    Publication date: March 14, 2019
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, FNU Rachita Agasthy, Duane Thomas Barlow
  • Publication number: 20190080348
    Abstract: A system and method enable exploration of cold ads in an online information system. Cold ads are ads that are new to the system and do not yet have reliable click through rate (CTR) estimates or click probabilities. The method and system selectively boost the click probabilities of cold ads to increase their likelihood of participating in and winning an auction so that the cold ad get more impressions, but without adversely affecting revenue in a production environment when cold ads are introduced.
    Type: Application
    Filed: September 12, 2017
    Publication date: March 14, 2019
    Applicant: Yahoo Holdings, Inc.
    Inventors: Parikshit SHAH, Ming YANG, Sachidanand ALLE, Adwait RATNAPARKHI, Ben SHAHSHAHANI, Rohit CHANDRA
  • Patent number: 10181987
    Abstract: Systems, methods, and computer-readable media for collector high availability. In some embodiments, a system receives, from a first collector device, a first data report generated by a capturing agent deployed on a host system in a network. The system can also receive, from a second collector device, a second data report generated by the capturing agent deployed on the host system. The first and second data reports can include traffic data captured at the host system by the capturing agent during a period of time. The system can determine that the first data report and the second data report are both associated with the capturing agent, and identify duplicate data contained in the first data report and the second data report. The system can then deduplicate the first and second data reports to yield a deduplicated data report.
    Type: Grant
    Filed: June 2, 2016
    Date of Patent: January 15, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Navindra Yadav, Khawar Deen, Varun Sagar Malhotra
  • Patent number: 10142353
    Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
    Type: Grant
    Filed: April 20, 2016
    Date of Patent: November 27, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, Fnu Rachita Agasthy, Duane Thomas Barlow
  • Publication number: 20180336581
    Abstract: A marketplace diagnostics framework for analyzing and managing online marketplaces.
    Type: Application
    Filed: July 26, 2018
    Publication date: November 22, 2018
    Inventors: Tarun BHATIA, Prasad CHALASANI, Rohit CHANDRA
  • Publication number: 20180248844
    Abstract: The technologies described herein identify multiple electronic devices belonging to the same group. A computer system receives, from network accessing applications of a plurality of electronic devices, internet protocol (IP) trajectory information about the network accessing applications via a network. The IP trajectory information includes a user identifier, a list of IP addresses associated with each of the network accessing applications, and timestamps specifying times each of the network accessing applications accesses the network. The computer system identifies and removes commercial IP addresses from the list of IP addresses, analyzes IP trajectory information to retrieve a most commonly used IP address for each of the network accessing applications during a certain period, and determines that different network accessing applications belong to the same group if the most commonly used IP addresses for the different network accessing applications are the same.
    Type: Application
    Filed: December 28, 2017
    Publication date: August 30, 2018
    Applicant: Yahoo Holdings, Inc.
    Inventors: Hao Cheng, Rohit Chandra, Jimmy Yang
  • Patent number: 10037540
    Abstract: A marketplace diagnostics framework for analyzing and managing online marketplaces.
    Type: Grant
    Filed: November 9, 2015
    Date of Patent: July 31, 2018
    Assignee: OATH INC.
    Inventors: Tarun Bhatia, Prasad Chalasani, Rohit Chandra
  • Patent number: 9935851
    Abstract: Systems, methods, and computer-readable media for determining sensor placement and topology. In some embodiments, a system can receive messages from sensors deployed around a network, each of the messages reporting a respective flow captured by a reporting sensor from the sensors. Next, the system can identify flows reported in the messages and, for each of the flows, generate a respective list of sensors that reported that flow. Based on the respective list of sensors, the system can infer a respective placement of the sensors within the network and a topology of the sensors. For example, the system can determine that a first sensor is deployed in a virtual machine, a second sensor is deployed in a hypervisor hosting the virtual machine, and a third sensor is deployed in a network device configured to route traffic associated with the hypervisor.
    Type: Grant
    Filed: May 11, 2016
    Date of Patent: April 3, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Ashutosh Kulshreshtha, Supreeth Hosur Nagesh Rao, Khawar Deen, Navindra Yadav
  • Patent number: 9864999
    Abstract: The technologies described herein identify multiple electronic devices belonging to the same group. A computer system receives, from network accessing applications of a plurality of electronic devices, internet protocol (IP) trajectory information about the network accessing applications via a network. The IP trajectory information includes a user identifier, a list of IP addresses associated with each of the network accessing applications, and timestamps specifying times each of the network accessing applications accesses the network. The computer system identifies and removes commercial IP addresses from the list of IP addresses, analyzes IP trajectory information to retrieve a most commonly used IP address for each of the network accessing applications during a certain period, and determines that different network accessing applications belong to the same group if the most commonly used IP addresses for the different network accessing applications are the same.
    Type: Grant
    Filed: April 30, 2015
    Date of Patent: January 9, 2018
    Assignee: YAHOO HOLDINGS, INC.
    Inventors: Hao Cheng, Rohit Chandra, Jimmy Yang
  • Publication number: 20170109369
    Abstract: Methods and apparatus for managing file distribution between publishing and subscribing devices are provided. At a transporter system, a publish request for publishing a version of the dataset is received from a publisher device, wherein the publish request has a predefined format that includes an identity of the dataset, an identity of the version of the dataset, and an identity of a location for the version of the dataset. The transporter system updates a registry to associate the dataset with the identity of the dataset, version, and location, and the transporter system automatically publishes the dataset to any subscribers devices that have previously sent subscribe requests for such dataset to the transporter system.
    Type: Application
    Filed: October 26, 2016
    Publication date: April 20, 2017
    Inventors: Andrew An FENG, Rohit CHANDRA, Lakshmanan SURYANARAYANAN, Timothy R. CROWDER, Victor J. LAM
  • Publication number: 20160359878
    Abstract: An example method can include choosing a pattern or patterns of network traffic. This pattern can be representative of a certain type of traffic such as an attack. The pattern can be associated with various components of a network and can describe expected behavior of these various components. A system performing this method can then choose a nodes or nodes to generate traffic according to the pattern and send an instruction accordingly. After this synthetic traffic is generated, the system can compare the behavior of the components with the expected behavior. An alert can then be created to notify an administrator or otherwise remedy any problems.
    Type: Application
    Filed: May 17, 2016
    Publication date: December 8, 2016
    Inventors: Rohit Chandra Prasad, Bharathwaj Sankara Viswanathan, Hoang Viet Nguyen, Vimalkumar Jeyakumar, Roberto Fernando Spadaro, Varun Sagar Malhotra, Navindra Yadav
  • Publication number: 20160359872
    Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
    Type: Application
    Filed: April 20, 2016
    Publication date: December 8, 2016
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, Fnu Rachita Agasthy, Duane Thomas Barlow, Andrew Sloane
  • Publication number: 20160359880
    Abstract: The present technology is directed to mapping flow data and overlaying it on a geographic map. Furthermore the geographical map can also display attacks and the flow of an attack from the source to a logical entity. The map additionally can be accompanied with a pie chart relating to the attacks and intensity of attacks. Normal flows can also be displayed on the map along with the attack flows.
    Type: Application
    Filed: June 3, 2016
    Publication date: December 8, 2016
    Inventors: Jackson Ngoc Ki Pang, Michael Standish Watts, Ali Parandehgheibi, Rohit Chandra Prasad, Varun Sagar Malhotra, Hoang Viet Nguyen
  • Publication number: 20160357957
    Abstract: Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. A method includes determining a lineage for a process within the network and then evaluating, through knowledge of the lineage, the source of the command that initiated the process. The method includes capturing data from a plurality of capture agents at different layers of a network, each capture agent of the plurality of capture agents configured to observe network activity at a particular location in the network, developing, based on the data, a lineage for a process associated with the network activity and, based on the lineage, identifying an anomaly within the network.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 8, 2016
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
  • Publication number: 20160359703
    Abstract: Systems, methods, and computer-readable media for determining sensor placement and topology. In some embodiments, a system can receive messages from sensors deployed around a network, each of the messages reporting a respective flow captured by a reporting sensor from the sensors. Next, the system can identify flows reported in the messages and, for each of the flows, generate a respective list of sensors that reported that flow. Based on the respective list of sensors, the system can infer a respective placement of the sensors within the network and a topology of the sensors. For example, the system can determine that a first sensor is deployed in a virtual machine, a second sensor is deployed in a hypervisor hosting the virtual machine, and a third sensor is deployed in a network device configured to route traffic associated with the hypervisor.
    Type: Application
    Filed: May 11, 2016
    Publication date: December 8, 2016
    Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Ashutosh Kulshreshtha, Supreeth Hosur Nagesh Rao, Khawar Deen, Navindra Yadav
  • Publication number: 20160359890
    Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 8, 2016
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
  • Publication number: 20160359699
    Abstract: Systems, methods, and computer-readable media for identifying bogon addresses. A system can obtain an indication of address spaces in a network. The indication can be based on route advertisements transmitted by routers associated with the network. The system can receive a report generated by a capturing agent deployed on a host. The report can identify a flow captured by the capturing agent at the host. The system can identify a network address associated with the flow and, based on the indication of address spaces, the system can determine whether the network address is within the address spaces in the network. When the network address is not within the address spaces in the network, the system can determine that the network address is a bogon address. When the network address is within the address spaces in the network, the system can determine that the network address is not a bogon address.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 8, 2016
    Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Navindra Yadav, Khawar Deen, Varun Sagar Malhotra