Patents by Inventor Shiv Shankar
Shiv Shankar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11321461Abstract: Malware scan task processing in a data storage system is described herein. A method as described herein can include designating, by a device operatively coupled to a processor, a file stored by a primary cluster of a data storage system for a malware scan; locating, by the device, a secondary cluster of the data storage system having stored thereon a copy of the file, the secondary cluster being distinct from the primary cluster; and, in response to determining that the file stored by the primary cluster matches the copy of the file stored by the secondary cluster, causing, by the device, a second anti-malware server associated with the secondary cluster to perform the malware scan for the copy of the file instead of a first anti-malware server associated with the primary cluster.Type: GrantFiled: June 25, 2020Date of Patent: May 3, 2022Assignee: EMC IP Holding Company LLCInventors: Avadut Mungre, Shiv Shankar Kumar
-
Publication number: 20220129360Abstract: Systems and methods facilitating automated mocking of computer system deployments are described herein. A method as described herein can include associating, by a first system operatively coupled to a processor, respective properties of a first deployment of a second system on a first computing device with respective automation mapping functions; executing, by the first system, the automation mapping functions in an order defined by dependencies between respective ones of the automation mapping functions, resulting in a series of system modeling tasks and an order associated with the series of system modeling tasks; and performing, by the first system, the series of system modeling tasks in the order associated therewith, resulting in a second deployment of the second system being created on a second computing device that is distinct from the first computing device.Type: ApplicationFiled: October 23, 2020Publication date: April 28, 2022Inventors: Matthew Bryan, Shiv Shankar Kumar
-
Publication number: 20220121558Abstract: Systems and methods facilitating automated mocking of computer system deployments are described herein. A method as described herein can include associating, by a first system operatively coupled to a processor, respective properties of a first deployment of a second system on a first computing device with respective automation mapping functions; executing, by the first system, the automation mapping functions in an order defined by dependencies between respective ones of the automation mapping functions, resulting in a series of system modeling tasks and an order associated with the series of system modeling tasks; and performing, by the first system, the series of system modeling tasks in the order associated therewith, resulting in a second deployment of the second system being created on a second computing device that is distinct from the first computing device.Type: ApplicationFiled: October 19, 2020Publication date: April 21, 2022Inventors: Matthew Bryan, Shiv Shankar Kumar, Anurag Chandra, Shubham Patil
-
Patent number: 11288391Abstract: Filename-based malware pre-scanning is described herein. A method as described herein can include obtaining, by a device operatively coupled to a processor, a malware scan request for a first file in a directory of a file system, the first file having a first filename belonging to a filename sequence; appending, by the device, the first file to a first malware scan queue; and appending, by the device, respective second files in the directory to a second malware scan queue that is distinct from the first malware scan queue, wherein the respective second files are distinct from the first file and have respective second filenames belonging to the filename sequence.Type: GrantFiled: September 13, 2019Date of Patent: March 29, 2022Assignee: EMC IP Holding Company LLCInventors: Avadut Mungre, Jai Prakash Gahlot, Shiv Shankar Kumar
-
Publication number: 20220091940Abstract: Malware scan task processing in a data storage system is described herein. A method as described herein can include designating, by a device operatively coupled to a processor, a file stored by a primary cluster of a data storage system for a malware scan; locating, by the device, a secondary cluster of the data storage system having stored thereon a copy of the file, the secondary cluster being distinct from the primary cluster; and, in response to determining that the file stored by the primary cluster matches the copy of the file stored by the secondary cluster, causing, by the device, a second anti-malware server associated with the secondary cluster to perform the malware scan for the copy of the file instead of a first anti-malware server associated with the primary cluster.Type: ApplicationFiled: September 24, 2020Publication date: March 24, 2022Inventors: Shiv Shankar Kumar, Avadut Mungre, Krishna Maheshwari
-
Patent number: 11270509Abstract: The present disclosure provides a computer-implemented method and system for onboarding users for financial institutions using virtual reality and augmented reality. The computer-implemented method and system corresponds to a visualization based onboarding system. The visualization based onboarding system collects a first set of data. The visualization based onboarding system obtains a second set of data. The visualization based onboarding system receives a third set of data. The visualization based onboarding system maps the first set of data associated with one or more institution environment essentials, the second set of data associated with a plurality of architectural information, and the third set of data associated with a plurality of financial services. The visualization based onboarding system creates a virtual reality and augmented reality model.Type: GrantFiled: December 18, 2020Date of Patent: March 8, 2022Assignee: Signzy Technologies Private LimitedInventors: Aadalarasan Bhavani Saravanan, Shiv Shankar Subudhi, Chitrangada Patra, Dinesh Avula, Ankit Ratan, Arpit Ratan, Ankur Pandey
-
Publication number: 20220027924Abstract: The present disclosure provides a method and system for authentication of one or more identification documents for detecting potential variations in real-time. The system receives a user data from one or more users with facilitation of one or more communication devices in real-time. The system obtains the one or more identification documents associated with the one or more users with facilitation of the one or more communication devices in one or more forms. In addition, the system authenticates each of the one or more identification documents associated with the corresponding user of the one or more users. Further, the system detects potential variations in the one or more identification documents based on heat map analysis with facilitation of one or more hardware run-algorithms. Furthermore, the system alerts one or more organizations for potential fraud based on the heat map analysis.Type: ApplicationFiled: December 18, 2020Publication date: January 27, 2022Applicant: Signzy Technologies Private LimitedInventors: Pragati GARG, Shiv Shankar SUBUDHI, Aadalarasan Bhavani SARAVANAN, Christen MILLER, Chitrangada PATRA, Dinesh AVULA, Ankit RATAN, Arpit RATAN, Ankur PANDEY
-
Publication number: 20220027444Abstract: The present disclosure provides a method and system for automated user authentication based on video and audio feed in real-time. The system receives a user data from one or more users. In addition, the system analysis the user data. Further, the system matches lips movement of the one or more users for given text or phrase. Furthermore, the system syncs audio feed with video feed of the one or more users. Moreover, the system receives a response to captcha given to the one or more users. Also, the system performs facial matching of the one or more users based on the user data. Also, the system detects original user from the one or more users. Also, the system sends an outcome of the detected original user from the one or more users to one or more financial technology organizations.Type: ApplicationFiled: December 17, 2020Publication date: January 27, 2022Applicant: Signzy Technologies Private LimitedInventors: Aadalarasan Bhavani SARAVANAN, Shiv Shankar SUBUDHI, Sidharth PATTNAIK, Chitrangada PATRA, Dinesh AVULA, Ankit RATAN, Arpit RATAN, Ankur PANDEY
-
Publication number: 20220028167Abstract: The present disclosure provides a computer-implemented method and system for onboarding users for financial institutions using virtual reality and augmented reality. The computer-implemented method and system corresponds to a visualization based onboarding system. The visualization based onboarding system collects a first set of data. The visualization based onboarding system obtains a second set of data. The visualization based onboarding system receives a third set of data. The visualization based onboarding system maps the first set of data associated with one or more institution environment essentials, the second set of data associated with a plurality of architectural information, and the third set of data associated with a plurality of financial services. The visualization based onboarding system creates a virtual reality and augmented reality model.Type: ApplicationFiled: December 18, 2020Publication date: January 27, 2022Applicant: Signzy Technologies Private LimitedInventors: Aadalarasan Bhavani SARAVANAN, Shiv Shankar SUBUDHI, Chitrangada PATRA, Dinesh AVULA, Ankit RATAN, Arpit RATAN, Ankur PANDEY
-
Publication number: 20220029799Abstract: The present disclosure provides a method and system for creating one or more hashes for a user. The method includes a first step to collect biometric information associated with the user. The method includes another step to create one or more hashes based on the biometric information associated with the user. The method includes another step to scan the biometric information associated the user. The method includes another step to map the biometric information associated with the user scanned in real-time with the collected biometric information associated with the user. The method includes another step to authenticate the user in real-time.Type: ApplicationFiled: December 18, 2020Publication date: January 27, 2022Applicant: Signzy Technologies Private LimitedInventors: Shiv Shankar SUBUDHI, Pragati GARG, Aadalarasan Bhavani SARAVANAN, Chitrangada PATRA, Dinesh AVULA, Ankit RATAN, Arpit RATAN, Ankur PANDEY
-
Publication number: 20210405878Abstract: Archival task processing in a data storage system is described herein. A method as described herein can include designating, by a device operatively coupled to a processor, a file stored by a primary cluster of a data storage system for archival to a remote storage system; locating, by the device, a secondary cluster of the data storage system having stored thereon a copy of the file, the secondary cluster being distinct from the primary cluster; and, in response to determining that the file stored by the primary cluster matches the copy of the file stored by the secondary cluster, causing, by the device, the secondary cluster to archive the copy of the file to the remote storage system.Type: ApplicationFiled: June 25, 2020Publication date: December 30, 2021Inventors: Shiv Shankar Kumar, Avadut Mungre
-
Publication number: 20210406371Abstract: Malware scan task processing in a data storage system is described herein. A method as described herein can include designating, by a device operatively coupled to a processor, a file stored by a primary cluster of a data storage system for a malware scan; locating, by the device, a secondary cluster of the data storage system having stored thereon a copy of the file, the secondary cluster being distinct from the primary cluster; and, in response to determining that the file stored by the primary cluster matches the copy of the file stored by the secondary cluster, causing, by the device, a second anti-malware server associated with the secondary cluster to perform the malware scan for the copy of the file instead of a first anti-malware server associated with the primary cluster.Type: ApplicationFiled: June 25, 2020Publication date: December 30, 2021Inventors: Avadut Mungre, Shiv Shankar Kumar
-
Patent number: 11210395Abstract: Filename-based malware pre-scanning is described herein. A method as described herein can include establishing sequential malware scanning for respective files in a first directory of a file system according to filenames of the respective files; comparing an elapsed time since a previous malware scan for a first file of the respective files in the first directory having a first filename in a filename sequence to a scan age threshold associated with a scheduled malware scan task for the first directory; and, in response to the elapsed time since the previous malware scan for the first file being determined to be less than the scan age threshold, removing the scheduled malware scan task with respect to the first file and at least one second file of the respective files in the first directory having respective second filenames in the filename sequence.Type: GrantFiled: September 13, 2019Date of Patent: December 28, 2021Assignee: EMC IP Holding Company LLCInventors: Avadut Mungre, Jai Prakash Gahlot, Shiv Shankar Kumar
-
Patent number: 11200254Abstract: Efficient configuration replication using a configuration change log is described herein. A method as described herein can include identifying, by a device operatively coupled to a processor, modified configurations from among a group of configurations associated with a first computing cluster; fetching, by the device, the modified configurations from the first computing cluster; and replicating, by the device, the modified configurations from the first computing cluster to a second computing cluster that is distinct from the first computing cluster and omitting replication of one or more unmodified configurations from among the group of configurations associated with the first computing cluster.Type: GrantFiled: January 14, 2020Date of Patent: December 14, 2021Assignee: EMC IP Holding Company LLCInventors: Kaushik Gupta, Shiv Shankar Kumar, Jai Prakash Gahlot
-
Publication number: 20210374040Abstract: The technology disclosed relates to generating automated test plan scripts. A selection of a first test plan to automate is received. Test scripts and data from a repository are retrieved and the test scripts and the data correspond to the first test plan. Test steps of the first test plan are performed. A prediction of a reusable component for a particular test step or test validation is provided for each of the test steps. A selection of at least one prediction for at least one of the test steps is received. An automated test plan script corresponding to the selection of the at least one prediction is generated.Type: ApplicationFiled: June 1, 2020Publication date: December 2, 2021Inventors: Amit Amar Kumar, Chaithrika Rao, Shiv Shankar, Uttam Ramamurthy, Pratik Nath
-
Publication number: 20210248615Abstract: The present disclosure provides a method and system for onboarding a customer digitally for providing one or more solutions in real-time. The method focuses on receiving a first set of data associated with the customer. In addition, the method focuses on fetching one or more information available in the first set of data associated with the customer. Further, the method focuses on analyzing the first set of data associated with the customer in real-time. Furthermore, the analysis of the first set of data associated with the customer is performed based on one or more parameters. Moreover, the method focuses on authenticating the first set of data associated with the customer. Also, the authentication of the first set of data associated with the customer is performed based on combination of one or more pre-defined set of rules associated with a decision engine. Also, the method focuses on onboarding the customer digitally.Type: ApplicationFiled: December 18, 2020Publication date: August 12, 2021Applicant: Signzy Technologies Private LimitedInventors: Roopam SHUKLA, Sidharth PATTNAIK, Rajdeep SHARMA, Shiv Shankar SUBUDHI, Chitrangada PATRA, Dinesh AVULA, Ankit RATAN, Arpit RATAN, Ankur PANDEY
-
Patent number: 11086994Abstract: Priority scanning of files written by malicious users in a data storage system is described herein. A data storage system as described herein can include a user lookup component that obtains identities of users that have made at least one modification to a first file stored on the data storage system, resulting in a set of modifying users; a comparison component that compares respective modifying users of the set of modifying users to respective malicious users of a set of malicious users; and a scan priority component that, in response to the comparison component identifying at least one match between a modifying user of the set of modifying users and a malicious user of the set of malicious users, assigns a first scan priority to the first file that is higher than a second scan priority assigned to a second, different file stored on the data storage system.Type: GrantFiled: December 19, 2018Date of Patent: August 10, 2021Assignee: EMC IP HOLDING COMPANY LLCInventors: Jai Prakash Gahlot, Amit Kumar Chauhan, Shiv Shankar Kumar
-
Patent number: 11086995Abstract: Malware scanning for network-attached storage systems is provided herein. A data storage system as described herein can include a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can include a file identification component that obtains an identifier for a target file stored by the data storage system; a lookup component that searches a scan status data structure for a malware scan result corresponding to the identifier for the target file; and a file access component that grants access to the target file in response to the lookup component obtaining the malware scan result from the scan status data structure and the malware scan result indicating that the target file contains no malware.Type: GrantFiled: April 30, 2018Date of Patent: August 10, 2021Assignee: EMC IP HOLDING COMPANY LLCInventors: Shiv Shankar Kumar, Jai Prakash Gahlot, Amit Kumar Chauhan
-
Patent number: 11086726Abstract: User-based recovery point objectives (RPOs) for disaster recovery are described herein. A method as described herein can include obtaining, by a device operatively coupled to a processor, transient information associated with a file stored by a data storage system; determining, by the device, whether the transient information associated with the file indicates that a condition for replicating the file has been met; and inserting, by the device, the file into a replication queue associated with the data storage system in response to a positive result of the determining.Type: GrantFiled: December 11, 2019Date of Patent: August 10, 2021Assignee: EMC IP HOLDING COMPANY LLCInventors: Shiv Shankar Kumar, Jai Prakash Gahlot
-
Publication number: 20210216568Abstract: Efficient configuration replication using a configuration change log is described herein. A method as described herein can include identifying, by a device operatively coupled to a processor, modified configurations from among a group of configurations associated with a first computing cluster; fetching, by the device, the modified configurations from the first computing cluster; and replicating, by the device, the modified configurations from the first computing cluster to a second computing cluster that is distinct from the first computing cluster and omitting replication of one or more unmodified configurations from among the group of configurations associated with the first computing cluster.Type: ApplicationFiled: January 14, 2020Publication date: July 15, 2021Inventors: Kaushik Gupta, Shiv Shankar Kumar, Jai Prakash Gahlot