Patents by Inventor Shivanna

Shivanna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200394196
    Abstract: The disclosed embodiments provide a system for processing data. During operation, the system receives records of activity within a stream-processing system over a set of event streams, wherein each event stream in the set of event streams contains events related to a corresponding job in the stream-processing system. Next, the system indexes data in the records under a set of keys that include a first key related to jobs in the stream-processing system and a second key related to errors in the stream-processing system. The system then outputs the indexed data for use in analyzing the execution of the stream-processing system.
    Type: Application
    Filed: June 11, 2019
    Publication date: December 17, 2020
    Inventors: Abhishek Shivanna, Kartik Paramasivam, Ray Manpreet Singh Matharu, Samarth Shetty, Srinivasulu Punuru, Yi Pan, Prateek Maheshwari
  • Publication number: 20200320193
    Abstract: Examples disclosed herein relate to performing a security action based on a comparison of digital signatures. An intrusion detection mode is initiated by a baseboard management controller. A first digital signature of hardware devices is calculated during the activation of the intrusion detection mode. The first digital signature is stored. Upon detection of a trigger, a second digital signature is calculated for the current hardware devices. The digital signatures are compared. A security action is performed based on the comparison.
    Type: Application
    Filed: June 17, 2020
    Publication date: October 8, 2020
    Inventor: Suhas Shivanna
  • Patent number: 10771488
    Abstract: In one embodiment, a device receives sensor data from a plurality of nodes in a computer network. The device uses the sensor data and a graph that represents a topology of the nodes in the network as input to a graph convolutional neural network. The device provides an output of the graph convolutional neural network as input to a convolutional long short-term memory recurrent neural network. The device detects an anomaly in the computer network by comparing a reconstruction error associated with an output of the convolutional long short-term memory recurrent neural network to a defined threshold. The device initiates a mitigation action in the computer network for the detected anomaly.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: September 8, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Saurabh Verma, Manjula Shivanna, Gyana Ranjan Dash, Antonio Nucci
  • Publication number: 20200272739
    Abstract: Examples disclosed herein relate to performing an action based on a pre-boot measurement of a firmware image. In an example, at a firmware component in a system, a measurement of a firmware image may be determined prior to booting of the system, beginning from a hardware root of trust boot block, by a Trusted Platform Module (TPM) emulator engine that emulates a hardware-based TPM. A pre-determined measurement of the firmware image may be retrieved from a storage location within the system. The measurement of the firmware image may be compared with the pre-determined measurement of the firmware image prior to booting of the system. In response to a determination that the measurement of the firmware image is different from the pre-determined measurement of the firmware image, performing an action.
    Type: Application
    Filed: May 14, 2020
    Publication date: August 27, 2020
    Inventors: Suhas Shivanna, Shiva R. Dasari
  • Patent number: 10749858
    Abstract: An example device includes a processor coupled to a network and a memory coupled to the processor. The memory includes computer code for causing the processor to establish a secure connection between a manageability application and an interconnect device, the interconnect device being in communication with a newly connected networked device; and securely communicate, from the manageability application to the interconnect device, temporary login information for the networked device.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: August 18, 2020
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Alan Goodrum, Suhas Shivanna, David Koenen, Patrick Schoeller
  • Patent number: 10740468
    Abstract: An example computing system in accordance with an aspect of the present disclosure includes a first controller and a second controller. The first controller is to verify integrity of a first root of trust (ROT), and generate an integrity signal indicating the results. The second controller is to verify integrity of a second ROT, write the firmware image to the first controller, and verify integrity of the written firmware image.
    Type: Grant
    Filed: September 25, 2017
    Date of Patent: August 11, 2020
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Suhas Shivanna, Patrick L Gibbons, Shiva R Dasari, Luis E Luciani, Jr., Kevin G Depew
  • Publication number: 20200250340
    Abstract: In an example, a first metadata tag and a second metadata tag are added to first Personally Identifiable Information (PII) of a first user handled by a first application. The first PII is to be part of call home data captured from a hosting system. The first metadata tag may be indicative of security rules to be complied with for the first application and the second metadata tag may be indicative of security rules to be complied with for the first user. The first PII, the first metadata tag, and the second metadata tag may be protected and transmitted to a data processing center. The transmission may be in response to a determination to transmit the call home data.
    Type: Application
    Filed: January 23, 2020
    Publication date: August 6, 2020
    Inventors: Mashood Abdulla Kodavanji, Srinivasan Varadarajan Sahasranamam, Suhas Shivanna
  • Publication number: 20200250334
    Abstract: A technique includes, in response to an exception occurring in the execution of a process on a computer, invoking an operating system service. The operating system service is used to sanitize data that is associated with the process and is stored in a memory of the computer. The data is associated with sensitive information.
    Type: Application
    Filed: January 31, 2019
    Publication date: August 6, 2020
    Inventors: Sridhar Bandi, Suhas Shivanna
  • Patent number: 10719604
    Abstract: Examples disclosed herein relate to performing a security action based on a comparison of digital signatures. An intrusion detection mode is initiated by a baseboard management controller. A first digital signature of hardware devices is calculated during the activation of the intrusion detection mode. The first digital signature is stored. Upon detection of a trigger, a second digital signature is calculated for the current hardware devices. The digital signatures are compared. A security action is performed based on the comparison.
    Type: Grant
    Filed: January 30, 2018
    Date of Patent: July 21, 2020
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventor: Suhas Shivanna
  • Publication number: 20200163186
    Abstract: A power supply system for a lighting unit, comprises a driver, a local energy storage device and a converter. The converter implements a first, charging mode, mode by connecting to the output of said driver for diverting at least a part of the driving current from the lighting unit to charge the energy storage device, a second, battery driving, mode by connecting to the lighting unit for converting the local energy storage device power supply to drive the lighting unit, and a third, grid driving, mode to neither charge the energy storage device nor convert the secondary power supply. The converter and the driver are controlled actively and synchronously to maintain the current through the lighting unit when switching the converter between modes.
    Type: Application
    Filed: June 22, 2018
    Publication date: May 21, 2020
    Inventors: Vasu POOJARY, Lei HAN, Yuhong FANG, Mark CIOLEK, Venkata Sriram PULLELA, Mahadev CHOLACHAGUDDA, Vikram SHIVANNA, Anil Shivram RAIKER
  • Publication number: 20200159460
    Abstract: Various aspects of the subject technology relate to methods, systems, and machine-readable media for selective erase of persistent and non-volatile memory (NVM) devices. The method includes receiving a notification of a deleted block, the deleted block including sensitive data located in a memory block of an NVM device. The method also includes marking an address of the deleted block as read protected to prevent reading of the deleted block. The method also includes assigning a criticality ranking and a wear out level to the deleted block. The method also includes prioritizing write commands to the deleted block based on the criticality ranking and the wear out level of the deleted block. The method also includes overwriting the deleted block with zeroes or a specific pattern to permanently erase the sensitive data.
    Type: Application
    Filed: November 15, 2019
    Publication date: May 21, 2020
    Inventors: Suhas Shivanna, Clarete Riana Crasta, Sumangala Bannur Subraya
  • Publication number: 20200143047
    Abstract: Examples disclosed herein relate to approaches for securing a computing system. A management controller is to monitor a plurality of parameters of monitored controllers. The management controller provides each of the controllers a key to update the parameters. The management controller includes a representation of the parameters. A current version of one of the parameters is received from one of the monitored controllers. It is determined whether an unauthorized modification occurred to the current version of the first parameter using the representation.
    Type: Application
    Filed: September 11, 2019
    Publication date: May 7, 2020
    Inventor: Suhas Shivanna
  • Publication number: 20200122339
    Abstract: A modular gripper has a body with a trident section and cylindrical section. A powering assembly is positioned in the cylindrical section. A pair of oppositing jaws is pivotally secured between a center wall and a pair of side wall, respectively, of the trident section. The piston rod moves a cam assembly on the center wall. The cam assembly passes through a body having a trident section and cylindrical section. The trident section comprises a trident structure that includes, at one end, a pair of side walls along with a center wall. The cylindrical section includes a fluid driven powering assembly. A pair of opposing jaw member are pivotally secured to the trident portion about separate pivot pins. A cam assembly is operatively connected to a piston rod of the fluid driven powering assembly. The cam assembly extends laterally outward with respect to a cylinder bore axis to receive a cam bush that engages with a through slot on each of the pair of opposing jaw members.
    Type: Application
    Filed: December 17, 2019
    Publication date: April 23, 2020
    Inventors: Shashikumar BETTAIAH, Ravi Kumar SHIVANNA
  • Publication number: 20200122340
    Abstract: A modular gripper has a body with a trident section and cylindrical section. A powering assembly is positioned in the cylindrical section. A pair of oppositing jaws is pivotally secured between a center wall and a pair of side wall, respectively, of the trident section. The clevis cam driver with piston rod moves a cam assembly on the centre wall slot. The cam assembly passes through a body having a trident section and cylindrical section. The trident section comprises a trident structure that includes, at one end, a pair of side walls along with a center wall. The cylindrical section includes a fluid driven powering assembly. A pair of opposing jaw member are pivotally secured to the trident portion about separate pivot pins. A cam assembly is operatively connected to a piston rod of the fluid driven powering assembly. The cam assembly extends laterally outward with respect to a cylinder bore axis to receive a cam bush that engages with a through slot on each of the pair of opposing jaw members.
    Type: Application
    Filed: December 17, 2019
    Publication date: April 23, 2020
    Inventors: Shashikumar Bettaiah, Ravi Kumar SHIVANNA
  • Patent number: 10608891
    Abstract: Predicting data throughput with a user device comprises a wireless system supported by wireless access points receiving signals from the user device. A wireless prediction system receives data from the wireless system, where the data comprises characteristics of the wireless access point, characteristics of communications with user computing devices, and data throughput statistics. The prediction system categorizes the received data based on one or more of a set of characteristics and determines a maximum data throughput capacity for each of the one or more wireless access points for each of the one or more set of characteristics. The system receives a request for a prediction of data throughput capacity for a particular wireless access point and, based on the characteristics of the particular wireless access point, determines an estimated data throughput capacity based on data throughputs of wireless access points having similar characteristics.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: March 31, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Sujit Biswas, Aleksandar Miodrag Ivanovic, Waseem A. Siddiqi, Rajesh S. Pazhyannur, Manjula Shivanna, Kedar Krishnanand Gaonkar
  • Patent number: 10549431
    Abstract: A modular gripper has a body with a trident section and cylindrical section. A powering assembly is positioned in the cylindrical section. A pair of oppositing jaws is pivotally secured between a center wall and a pair of side wall, respectively, of the trident section. The piston rod moves a cam assembly on the center wall. The cam assembly passes through a body having a trident section and cylindrical section. The trident section comprises a trident structure that includes, at one end, a pair of side walls along with a center wall. The cylindrical section includes a fluid driven powering assembly. A pair of opposing jaw member are pivotally secured to the trident portion about separate pivot pins. A cam assembly is operatively connected to a piston rod of the fluid driven powering assembly. The cam assembly extends laterally outward with respect to a cylinder bore axis to receive a cam bush that engages with a through slot on each of the pair of opposing jaw members.
    Type: Grant
    Filed: October 13, 2018
    Date of Patent: February 4, 2020
    Assignee: Delaware Capital Formation, Inc.
    Inventors: ShashiKumar Bettaiah, Ravi Kumar Shivanna
  • Publication number: 20200007381
    Abstract: A network monitor may receive network log events and identify: a first set of network devices that have reported a target network log event, a second set of network devices that have not reported the target network log event, a first set of network log events reported by the first set of network devices, and a second set of network log events reported by the second set of network devices. The network monitor may determine which network log events are legitimate, and filter the legitimate network log events from the first set of network log events or the second set of network log events to produce a group of suspicious network log events that may be correlated with the target network log event. The network monitor may predict future suspicious network log events that may be correlated with the target network log event in order to predict equipment failures.
    Type: Application
    Filed: September 3, 2019
    Publication date: January 2, 2020
    Inventors: Antonio Nucci, Sujit Biswas, Manjula Shivanna, Amod Augustin
  • Publication number: 20190381676
    Abstract: A modular gripper has a body with a trident section and cylindrical section. A powering assembly is positioned in the cylindrical section. A pair of opposing jaws is pivotally secured between a center wall and a pair of side wall, respectively, of the trident section. The piston rod moves a cam assembly on the center wall. The cam assembly passes through a body having a trident section and cylindrical section. The trident section comprises a trident structure that includes, at one end, a pair of side walls along with a center wall. The cylindrical section includes a fluid driven powering assembly. A pair of opposing jaw member are pivotally secured to the trident portion about separate pivot pins. A cam assembly is operatively connected to a piston rod of the fluid driven powering assembly. The cam assembly extends laterally outward with respect to a cylinder bore axis to receive a cam bush that engages with a through slot on each of the pair of opposing jaw members.
    Type: Application
    Filed: October 13, 2018
    Publication date: December 19, 2019
    Inventors: ShashiKumar Bettaiah, Ravi Kumar Shivanna
  • Patent number: 10496495
    Abstract: Techniques for on-demand remote diagnostics for hardware component/device failure and disk drive data recovery using embedded media are described. In one example embodiment, a hardware device failure event alert along with a unique ID and a hardware device configuration fingerprint is sent upon detecting a hardware component failure event associated with the hardware device in a datacenter to an image management framework. A recovery image associated with the hardware device failure event is then obtained using the unique ID and the hardware device configuration fingerprint. The recovery image is then stored in an embedded storage media associated with the failed hardware device. The embedded storage media is then configured as a bootable hardware device. The hardware component failure is then diagnosed using the stored recovery image and the bootable hardware device upon hardware device boot-up. Recovering from the hardware device failure based on diagnosing the hardware component failure.
    Type: Grant
    Filed: April 30, 2014
    Date of Patent: December 3, 2019
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Suhas Shivanna, Sandeep Bangalore Harshavardhana, Raghunandan Chikkaramaiah
  • Patent number: 10489145
    Abstract: Example implementations relate to secure update of firmware and software. For example, a method for providing secure firmware and software updates to a computing system includes receiving, by a management processor, an update request from a management station for the computing system, where the update request comprises update parameters indicative of components to be updated within the computing system. Further, the method includes storing details of the update request including the update parameters at a pre-defined memory location, where the update parameters include at least one certificate associated with the update request. The method also includes accessing, at least one of a firmware image and a software patch corresponding to the update request based on identification of the update parameters stored at the pre-defined memory location by an update manager, where the update manager has predefined access rights and privileges within an Operating System (OS) of the computing system.
    Type: Grant
    Filed: November 14, 2014
    Date of Patent: November 26, 2019
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Suhas Shivanna, Sandeep B H, Neena M S, Tom L Vaden