Patents by Inventor Sandeep N
Sandeep N has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240427579Abstract: A method, computer program product, and computer system for building container images comprise a base container image control agent associated with a base container image and a build system control agent associated with a build system. A mutual negotiation protocol is facilitated between the base container image control agent and the build system control agent. A set of operation parameters is determined in response to facilitating the mutual negotiation protocol. Identified from the set of operation parameters a set of requirements for a new container image control agent. A new container image is generated based on the operation parameters to which the new container image control agent is associated.Type: ApplicationFiled: June 20, 2023Publication date: December 26, 2024Inventors: Timo Kussmaul, Elton de Souza, Sandeep N. Batta, Peter Phillip Lundgren Szmrecsanyi, Robert Avill
-
Patent number: 11310247Abstract: A machine-readable medium may store instructions executable by a processing resource to access log data of an enterprise and extract time-series data of an enterprise entity from the log data. The time-series data may include measured feature values of a set of selected features over a series of time periods. The instructions may be further executable to train a predictive model specific to the enterprise entity using the time-series data, wherein the predictive model is to generate, for a particular time period, a predicted feature value for each of the selected features; access actual feature values of the enterprise entity for the particular time period; apply first-level deviation criteria to the actual feature value and the predicted feature value of each selected feature to identify deviant features of the enterprise entity; and apply second-level deviation criteria to the identified deviant features to identify the enterprise entity as behaving abnormally.Type: GrantFiled: December 21, 2016Date of Patent: April 19, 2022Assignee: Micro Focus LLCInventors: Pratyusa K Manadhata, Sandeep N Bhatt, Tomas Sander
-
Publication number: 20210312362Abstract: The disclosure herein describes providing action item information for a current activity based on similarity with past activities. Activity attributes indicative of an activity outcome are identified, and a random forest classifier based on the identified activity attributes is generated. The random forest classifier classifies an activity based on the activity attributes. Similarity factors associated with the current activity and past activities are calculated based on the random forest classifier. Based on the similarity factors, data value ranges of performance indicators of past activities associated with the activity outcome are determined. Based on comparing the determined data value ranges to performance indicator data values of the current activity, action item information associated with the performance indicator data values of the current activity is provided.Type: ApplicationFiled: April 7, 2020Publication date: October 7, 2021Inventors: Royi RONEN, Abedelkader ASI, Arshdeep SINGH, Sandeep N. MENON, Inbar OREN
-
Publication number: 20210220443Abstract: Disclosed is a method of controlling postprandial blood glucose levels in a subject. The method includes orally administering to a subject an orally administrable oligoethylene glycol conjugate of insulin or an orally administrable insulin fusion protein. Oral administration is done during a time period from about 5 to 25 minutes prior to a meal.Type: ApplicationFiled: June 17, 2019Publication date: July 22, 2021Inventors: SANDEEP N. ATHALYE, ANAND KHEDKAR, ALEXAMDER FLEMING, ALAN CHERRINGTON, ASHWINI VISHWESWARAMURTHY, HAROLD E. LEBOVITZ
-
Patent number: 10728264Abstract: A technique includes receiving data identifying behavior anomalies that are exhibited by entities that are associated with a computer system. The technique includes associating the behavior anomalies with contexts based at least in part on threat intelligence to provide modified anomalies. The threat intelligence associates the contexts with indicators of potential breach. The technique includes characterizing the behavior anomaly identification based at least in part on the threat intelligence. The characterization includes applying machine learning to features of the modified anomalies to classify the identified behavior anomalies.Type: GrantFiled: February 15, 2017Date of Patent: July 28, 2020Assignee: Micro Focus LLCInventors: Sandeep N. Bhatt, Pratyusa K. Manadhata, Tomas Sander
-
Patent number: 10686817Abstract: Examples determine a number of hosts, within an enterprise, which are resolving a particular domain. Based on the number of hosts within the enterprise resolving the particular domain, the examples identify whether the particular domain is benign.Type: GrantFiled: September 21, 2015Date of Patent: June 16, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Prasad V. Rao, Sandeep N. Bhatt, William G. Horne, Pratyusa K. Manadhata, Miranda Jane Felicity Mowbray
-
Publication number: 20180255083Abstract: Examples determine a number of hosts, within an enterprise, which are resolving a particular domain. Based on the number of hosts within the enterprise resolving the particular domain, the examples identify whether the particular domain is benign.Type: ApplicationFiled: September 21, 2015Publication date: September 6, 2018Inventors: Prasad V. Rao, Sandeep N. Bhatt, William G. Home, Pratyusa K. Manadhata, Miranda Jane Felicity Mowbray
-
Publication number: 20180234445Abstract: A technique includes receiving data identifying behavior anomalies that are exhibited by entities that are associated with a computer system. The technique includes associating the behavior anomalies with contexts based at least in part on threat intelligence to provide modified anomalies. The threat intelligence associates the contexts with indicators of potential breach. The technique includes characterizing the behavior anomaly identification based at least in part on the threat intelligence. The characterization includes applying machine learning to features of the modified anomalies to classify the identified behavior anomalies.Type: ApplicationFiled: February 15, 2017Publication date: August 16, 2018Inventors: Sandeep N. Bhatt, Pratyusa K. Manadhata, Tomas Sander
-
Publication number: 20180176241Abstract: A machine-readable medium may store instructions executable by a processing resource to access log data of an enterprise and extract time-series data of an enterprise entity from the log data. The time-series data may include measured feature values of a set of selected features over a series of time periods. The instructions may be further executable to train a predictive model specific to the enterprise entity using the time-series data, wherein the predictive model is to generate, for a particular time period, a predicted feature value for each of the selected features; access actual feature values of the enterprise entity for the particular time period; apply first-level deviation criteria to the actual feature value and the predicted feature value of each selected feature to identify deviant features of the enterprise entity; and apply second-level deviation criteria to the identified deviant features to identify the enterprise entity as behaving abnormally.Type: ApplicationFiled: December 21, 2016Publication date: June 21, 2018Inventors: Pratyusa K Manadhata, Sandeep N Bhatt, Tomas Sander
-
Patent number: 9456001Abstract: Systems, methods, and machine-readable and executable instructions are provided for attack notification. Attack notification can include receiving security-related data from a number of computing devices that are associated with a number of entities through a communication link and analyzing a first portion of the security-related data that is associated with a first entity from the number of entities to determine whether the first entity has experienced an attack. Attack notification can include analyzing a second portion of the security-related data that is associated with a second entity from the number of entities and the first portion of the security-related data that is associated with the first entity to determine whether the second entity is experiencing the attack. Attack notification can include notifying, through the communication link, the second entity that the second entity is experiencing the attack if it is determined that the second entity is experiencing the attack.Type: GrantFiled: January 31, 2013Date of Patent: September 27, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Sandeep N. Bhatt, Tomas Sander, Anurag Singla
-
Patent number: 9275348Abstract: Identifying participants for collaboration in a threat exchange community can include receiving security data from a plurality of participants at a threat exchange server within the threat exchange community; and in response to receiving from a first participant from the plurality of participants security data associated with a security occurrence, identifying at the threat exchange server the first participant and a second participant from the plurality of participants for collaboration based on characteristics of the first participant and the second participant.Type: GrantFiled: January 31, 2013Date of Patent: March 1, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Sandeep N. Bhatt, William G. Horne, Daniel L. Moor, Suranjan Pramanik, Tomas Sander
-
Patent number: 9253038Abstract: Instances of router models and filter models respectively are populated with configuration data from routers and filters in a network. A route advertising graph is derived from the router model instances. The route advertising graph indicates propagation of routes between the ones of the real-world devices serving as routers according to routing protocols implemented by the ones of the real-world devices serving as routers. Consolidated routing data is determined for the ones of the real-world devices serving as routers. In this process, the propagation of routes indicated by the route advertising graph is iterated to stability. For a destination node in the network, a respective route graph indicating available paths to the destination node from each source node in the network is constructed from the consolidated routing data. Services between each source node and the destination node are classified based on a full traversal of the route advertising graph.Type: GrantFiled: August 4, 2009Date of Patent: February 2, 2016Assignee: Hewlett-Packard Development Company, L.P.Inventors: Sandeep N Bhatt, Prasad V Rao, Cat Okita
-
Publication number: 20160014041Abstract: In one implementation, a resource reference classification system includes a selection engine and a classification engine. The selection engine is to access a plurality of resource request records based on resource requests intercepted from a plurality of clients, and to select resource request records from the plurality of resource request records intercepted from a client from the plurality of clients. Each resource request record from the plurality of resource request records includes a resource reference. The classification engine is to identify, independent of the client, a root resource reference and a plurality of child resource references of the root resource reference from the resource request records.Type: ApplicationFiled: February 28, 2013Publication date: January 14, 2016Inventors: Pratyusa K Manadhata, Sandeep N Bhatt, William G Home, Prasad V Rao
-
Patent number: 9143517Abstract: Threat exchange information protection can include receiving security information from a number of participants of a threat exchange community, wherein a portion of the received security information is encoded with pseudonyms by each of the number of participants, analyzing the security information collectively from the number of participants, wherein the portion of the received security information remains encoded, and sending analysis results to each of the number of participants, wherein the analysis results include information relating to the portion.Type: GrantFiled: January 31, 2013Date of Patent: September 22, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: William G. Horne, Daniel L. Moor, Richard D. Austin, Tomas Sander, Prasad V. Rao, Sandeep N. Bhatt
-
Patent number: 9092848Abstract: In one embodiment, a method of detecting centerline of a vessel is provided. The method comprises steps of acquiring a 3D image volume, initializing a centerline, initializing a Kalman filter, predicting a next center point using the Kalman filter, checking validity of the prediction made using the Kalman filter, performing template matching, updating the Kalman filter based on the template matching and repeating the steps of predicting, checking, performing and updating for a predetermined number of times. Methods of automatic vessel segmentation and temporal tracking of the segmented vessel is further described with reference to the method of detecting centerline.Type: GrantFiled: June 5, 2013Date of Patent: July 28, 2015Assignee: General Electric CompanyInventors: Kedar Anil Patwardhan, Sandeep N. Gupta, David M. Mills, Aaron M. Dentinger, Yongjian Yu
-
Patent number: 8942423Abstract: In one embodiment, a method of detecting centerline of a vessel is provided. The method comprises steps of acquiring a 3D image volume, initializing a centerline, initializing a Kalman filter, predicting a next center point using the Kalman filter, checking validity of the prediction made using the Kalman filter, performing template matching, updating the Kalman filter based on the template matching and repeating the steps of predicting, checking, performing, and updating for a predetermined number of times. Methods of automatic vessel segmentation and temporal tracking of the segmented vessel is further described with reference to the method of detecting centerline.Type: GrantFiled: June 5, 2013Date of Patent: January 27, 2015Assignee: General Electric CompanyInventors: Kedar Anil Patwardhan, Sandeep N. Gupta, David M. Mills, Aaron M. Dentinger, Yongjian Yu
-
Publication number: 20140215616Abstract: Systems, methods, and machine-readable and executable instructions are provided for attack notification. Attack notification can include receiving security-related data from a number of computing devices that are associated with a number of entities through a communication link and analyzing a first portion of the security-related data that is associated with a first entity from the number of entities to determine whether the first entity has experienced an attack. Attack notification can include analyzing a second portion of the security-related data that is associated with a second entity from the number of entities and the first portion of the security-related data that is associated with the first entity to determine whether the second entity is experiencing the attack. Attack notification can include notifying, through the communication link, the second entity that the second entity is experiencing the attack if it is determined that the second entity is experiencing the attack.Type: ApplicationFiled: January 31, 2013Publication date: July 31, 2014Applicant: Hewlett-Packard Development Company, L.P.Inventors: Sandeep N. Bhatt, Tomas Sander, Anurag Singla
-
Publication number: 20140214938Abstract: Identifying participants for collaboration in a threat exchange community can include receiving security data from a plurality of participants at a threat exchange server within the threat exchange community; and in response to receiving from a first participant from the plurality of participants security data associated with a security occurrence, identifying at the threat exchange server the first participant and a second participant from the plurality of participants for collaboration based on characteristics of the first participant and the second participant.Type: ApplicationFiled: January 31, 2013Publication date: July 31, 2014Applicant: Hewlett-Packard Development Company, L.P.Inventors: Sandeep N. Bhatt, William G. Horne, Daniel I. Moor, Suranjan Pramanik, Tomas Sander
-
Publication number: 20140215607Abstract: Threat exchange information protection can include receiving security information from a number of participants of a threat exchange community, wherein a portion of the received security information is encoded with pseudonyms by each of the number of participants, analyzing the security information collectively from the number of participants, wherein the portion of the received security information remains encoded, and sending analysis results to each of the number of participants, wherein the analysis results include information relating to the portion.Type: ApplicationFiled: January 31, 2013Publication date: July 31, 2014Applicant: Hewlett-Packard Development Company, L.P.Inventors: William G. Horne, Daniel L. Moor, Richard D. Austin, Tomas Sander, Prasad V. Rao, Sandeep N. Bhatt
-
Consistent Interface for Brazilian Boleto Receivable and Brazilian Nota Fiscal Authorisation Request
Publication number: 20140006258Abstract: A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to a BR boleto receivable and a BR nota fiscal authorisation request business object.Type: ApplicationFiled: June 28, 2012Publication date: January 2, 2014Inventors: Sandeep Joseph, Sandeep N, Holger Gerbert, Lilian Tagawa, Robert Doerner, Andrea Nemes Salgueiro, Robert Reiner, Yashu Liang, Elaine Hiromi, Peter Latocha