Patents by Inventor Somak Chattopadhyay
Somak Chattopadhyay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11799796Abstract: Systems and techniques are disclosed for generating a session identifier to be used when implementing changes in a complex system that facilitates identification and retrieval of data indicating the scope and impact of the changes. An execution identifier for a set of operations and a service identifier for a service performing the operations may be used as a basis for the session identifier. The session identifier may be provided to computing resources on which operations are performed and logged by the computing resources along with the results of the operations. This activity data associated with the particular set of operations can be retrieved using the session identifier to determine the scope and impact of the operations on the system.Type: GrantFiled: May 3, 2022Date of Patent: October 24, 2023Assignee: Amazon Technologies, Inc.Inventors: Gautham Atluri, Somak Chattopadhyay, Soniya Parmar, Pavan Kumar Adepu, Sreeram Krishna Sama, Jianhua Guo, Narayanan Lakshmanan, Adila Sadovic
-
Patent number: 10560463Abstract: Techniques allow DevOps personnel to perform incident management for cloud computing environments in a manner that maintains control over restricted data and the data plane. The DevOps personnel do not have access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. The incident management techniques include executing automatic operations to resolve an incident and allowing DevOps personnel to execute remote operations without providing the DevOps personnel access. A further incident management technique provides DevOps personnel with just-in-time (JIT) access that is limited to a certain level or type of access and limited in time. Still another technique for incident management is using an escort model, in which an escort session between operating personnel and DevOps personnel is established and connected to the cloud computing environment to allow the DevOps personnel access to the production environment while escorted by the operating personnel.Type: GrantFiled: November 5, 2015Date of Patent: February 11, 2020Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Somak Chattopadhyay, Thomas Knudson, Chetan Shankar, Maisem Ali, Lilei Cui, Sandeep Kalarickal, Pradeep Ayyappan Nair, Tom Keane, Siddhartha Pasumarthy, Shont Miller, Lu Jin, Qin Zhou, Maria Black, Elaine Lu, Damien Gallot, Christopher Geisbush, David Sauntry, Peter Miller
-
Publication number: 20170134392Abstract: Techniques allow DevOps personnel to perform incident management for cloud computing environments in a manner that maintains control over restricted data and the data plane. The DevOps personnel do not have access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. The incident management techniques include executing automatic operations to resolve an incident and allowing DevOps personnel to execute remote operations without providing the DevOps personnel access. A further incident management technique provides DevOps personnel with just-in-time (JIT) access that is limited to a certain level or type of access and limited in time. Still another technique for incident management is using an escort model, in which an escort session between operating personnel and DevOps personnel is established and connected to the cloud computing environment to allow the DevOps personnel access to the production environment while escorted by the operating personnel.Type: ApplicationFiled: November 5, 2015Publication date: May 11, 2017Inventors: Somak Chattopadhyay, Thomas Knudson, Chetan Shankar, Maisem Ali, Lilei Cui, Sandeep Kalarickal, Pradeep Ayyapan Nair, Tom Keane, Siddhartha Pasumarthy, Shont Miller, Lu Jin, Qin Zhou, Maria Black, Elaine Lu, Damien Gallot, Christopher Geisbush, David Sauntry, Peter Miller
-
Patent number: 9071535Abstract: Methods, systems, and computer storage media for detecting anomalies within nodes of a data center are provided. A self-learning system is employed to proactively and automatically detect the anomalies using one or more locally hosted agents for pulling information that describes states of a plurality of nodes (e.g., computing devices of a cloud-computing infrastructure), respectively, and using at least one early-warning mechanism for implementing a comparison technique. The comparison technique involves individually comparing the state information of the plurality of the nodes against one another and, based upon the comparison, grouping one or more nodes of the plurality of nodes into clusters that exhibit substantially similar state information. Upon identifying the clusters that include low number of nodes grouped therein, with respect to a remainder of the clusters of nodes, the members of the identified clusters are designated as anomalous machines.Type: GrantFiled: January 3, 2013Date of Patent: June 30, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Somak Chattopadhyay, Dong Wei, Suman Nath
-
Publication number: 20140189086Abstract: Methods, systems, and computer storage media for detecting anomalies within nodes of a data center are provided. A self-learning system is employed to proactively and automatically detect the anomalies using one or more locally hosted agents for pulling information that describes states of a plurality of nodes (e.g., computing devices of a cloud-computing infrastructure), respectively, and using at least one early-warning mechanism for implementing a comparison technique. The comparison technique involves individually comparing the state information of the plurality of the nodes against one another and, based upon the comparison, grouping one or more nodes of the plurality of nodes into clusters that exhibit substantially similar state information. Upon identifying the clusters that include low number of nodes grouped therein, with respect to a remainder of the clusters of nodes, the members of the identified clusters are designated as anomalous machines.Type: ApplicationFiled: January 3, 2013Publication date: July 3, 2014Applicant: MICROSOFT CORPORATIONInventors: SOMAK CHATTOPADHYAY, DONG WEI, SUMAN NATH
-
Patent number: 7191248Abstract: A communication stack enables computers implementing it to send, receive, or route network communications. The communication stack includes a message layer, a communication layer, a security layer, and a transport protocol layer, with plug-in transport protocol modules and plug-in security protocol modules. Each of the origin computer, target computer, and routing computers involved in delivering a message implements the communication stack. An application on the origin computer calls the message layer of the computer to send messages to a target computer and identifies routing computers on the route for delivering the message to the target computer. The message layer calls the communication layer to establish a connection to the target computer. The communication layer uses the transport protocol layer to establish an initial connection with the target computer, and uses the security layer to negotiate security parameters and to handle secured communications between the origin and target computers.Type: GrantFiled: August 29, 2003Date of Patent: March 13, 2007Assignee: Microsoft CorporationInventors: Somak Chattopadhyay, Trevor Gulick, Sivaprasad Padisetty
-
Publication number: 20050216727Abstract: A communication stack enables computers implementing it to send, receive, or route network communications. The communication stack includes a message layer, a communication layer, a security layer, and a transport protocol layer, with plug-in transport protocol modules and plug-in security protocol modules. Each of the origin computer, target computer, and routing computers involved in delivering a message implements the communication stack. An application on the origin computer calls the message layer of the computer to send messages to a target computer and identifies routing computers on the route for delivering the message to the target computer. The message layer calls the communication layer to establish a connection to the target computer. The communication layer uses the transport protocol layer to establish an initial connection with the target computer, and uses the security layer to negotiate security parameters and to handle secured communications between the origin and target computers.Type: ApplicationFiled: May 23, 2005Publication date: September 29, 2005Applicant: Microsoft CorporationInventors: Somak Chattopadhyay, Trevor Gulick, Sivaprasad Padisetty
-
Publication number: 20050050203Abstract: A communication stack enables computers implementing it to send, receive, or route network communications. The communication stack includes a message layer, a communication layer, a security layer, and a transport protocol layer, with plug-in transport protocol modules and plug-in security protocol modules. Each of the origin computer, target computer, and routing computers involved in delivering a message implements the communication stack. An application on the origin computer calls the message layer of the computer to send messages to a target computer and identifies routing computers on the route for delivering the message to the target computer. The message layer calls the communication layer to establish a connection to the target computer. The communication layer uses the transport protocol layer to establish an initial connection with the target computer, and uses the security layer to negotiate security parameters and to handle secured communications between the origin and target computers.Type: ApplicationFiled: August 29, 2003Publication date: March 3, 2005Applicant: Microsoft CorporationInventors: Somak Chattopadhyay, Trevor Gulick, Sivaprasad Padisetty
-
Method and apparatus for treating and/or removing an undesired presence on the skin of an individual
Publication number: 20030060810Abstract: An apparatus and method for treating an undesired presence on an individual includes a CPU coupled to a laser control unit and a robotic arm control unit. A scanning area or volume is defined on the individual that includes the undesired presence. The CPU controls the robotic arm to move the laser and camera about the scanning area or volume while the camera scans individual portions of the scanning area or volume. The CPU receives this information from the camera and determines, based on the scanning, whether a particular portion includes part of the undesired presence. When the particular portion includes part of the undesired presence, the CPU actuates the laser. This process continues for all portions of the scanning area or volume. In an alternative embodiment, the CPU controls the robotic arm control unit to scan the entire area or volume and determines locations where there is an undesired presence.Type: ApplicationFiled: February 15, 2001Publication date: March 27, 2003Inventors: Diego Syrowicz, Somak Chattopadhyay, Ramon Rodriguez, Guillermo Oropeza, Jonathan Kisner, Hernan Mercado-Corujo