Patents by Inventor Somak Chattopadhyay

Somak Chattopadhyay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11799796
    Abstract: Systems and techniques are disclosed for generating a session identifier to be used when implementing changes in a complex system that facilitates identification and retrieval of data indicating the scope and impact of the changes. An execution identifier for a set of operations and a service identifier for a service performing the operations may be used as a basis for the session identifier. The session identifier may be provided to computing resources on which operations are performed and logged by the computing resources along with the results of the operations. This activity data associated with the particular set of operations can be retrieved using the session identifier to determine the scope and impact of the operations on the system.
    Type: Grant
    Filed: May 3, 2022
    Date of Patent: October 24, 2023
    Assignee: Amazon Technologies, Inc.
    Inventors: Gautham Atluri, Somak Chattopadhyay, Soniya Parmar, Pavan Kumar Adepu, Sreeram Krishna Sama, Jianhua Guo, Narayanan Lakshmanan, Adila Sadovic
  • Patent number: 10560463
    Abstract: Techniques allow DevOps personnel to perform incident management for cloud computing environments in a manner that maintains control over restricted data and the data plane. The DevOps personnel do not have access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. The incident management techniques include executing automatic operations to resolve an incident and allowing DevOps personnel to execute remote operations without providing the DevOps personnel access. A further incident management technique provides DevOps personnel with just-in-time (JIT) access that is limited to a certain level or type of access and limited in time. Still another technique for incident management is using an escort model, in which an escort session between operating personnel and DevOps personnel is established and connected to the cloud computing environment to allow the DevOps personnel access to the production environment while escorted by the operating personnel.
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: February 11, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Somak Chattopadhyay, Thomas Knudson, Chetan Shankar, Maisem Ali, Lilei Cui, Sandeep Kalarickal, Pradeep Ayyappan Nair, Tom Keane, Siddhartha Pasumarthy, Shont Miller, Lu Jin, Qin Zhou, Maria Black, Elaine Lu, Damien Gallot, Christopher Geisbush, David Sauntry, Peter Miller
  • Publication number: 20170134392
    Abstract: Techniques allow DevOps personnel to perform incident management for cloud computing environments in a manner that maintains control over restricted data and the data plane. The DevOps personnel do not have access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. The incident management techniques include executing automatic operations to resolve an incident and allowing DevOps personnel to execute remote operations without providing the DevOps personnel access. A further incident management technique provides DevOps personnel with just-in-time (JIT) access that is limited to a certain level or type of access and limited in time. Still another technique for incident management is using an escort model, in which an escort session between operating personnel and DevOps personnel is established and connected to the cloud computing environment to allow the DevOps personnel access to the production environment while escorted by the operating personnel.
    Type: Application
    Filed: November 5, 2015
    Publication date: May 11, 2017
    Inventors: Somak Chattopadhyay, Thomas Knudson, Chetan Shankar, Maisem Ali, Lilei Cui, Sandeep Kalarickal, Pradeep Ayyapan Nair, Tom Keane, Siddhartha Pasumarthy, Shont Miller, Lu Jin, Qin Zhou, Maria Black, Elaine Lu, Damien Gallot, Christopher Geisbush, David Sauntry, Peter Miller
  • Patent number: 9071535
    Abstract: Methods, systems, and computer storage media for detecting anomalies within nodes of a data center are provided. A self-learning system is employed to proactively and automatically detect the anomalies using one or more locally hosted agents for pulling information that describes states of a plurality of nodes (e.g., computing devices of a cloud-computing infrastructure), respectively, and using at least one early-warning mechanism for implementing a comparison technique. The comparison technique involves individually comparing the state information of the plurality of the nodes against one another and, based upon the comparison, grouping one or more nodes of the plurality of nodes into clusters that exhibit substantially similar state information. Upon identifying the clusters that include low number of nodes grouped therein, with respect to a remainder of the clusters of nodes, the members of the identified clusters are designated as anomalous machines.
    Type: Grant
    Filed: January 3, 2013
    Date of Patent: June 30, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Somak Chattopadhyay, Dong Wei, Suman Nath
  • Publication number: 20140189086
    Abstract: Methods, systems, and computer storage media for detecting anomalies within nodes of a data center are provided. A self-learning system is employed to proactively and automatically detect the anomalies using one or more locally hosted agents for pulling information that describes states of a plurality of nodes (e.g., computing devices of a cloud-computing infrastructure), respectively, and using at least one early-warning mechanism for implementing a comparison technique. The comparison technique involves individually comparing the state information of the plurality of the nodes against one another and, based upon the comparison, grouping one or more nodes of the plurality of nodes into clusters that exhibit substantially similar state information. Upon identifying the clusters that include low number of nodes grouped therein, with respect to a remainder of the clusters of nodes, the members of the identified clusters are designated as anomalous machines.
    Type: Application
    Filed: January 3, 2013
    Publication date: July 3, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: SOMAK CHATTOPADHYAY, DONG WEI, SUMAN NATH
  • Patent number: 7191248
    Abstract: A communication stack enables computers implementing it to send, receive, or route network communications. The communication stack includes a message layer, a communication layer, a security layer, and a transport protocol layer, with plug-in transport protocol modules and plug-in security protocol modules. Each of the origin computer, target computer, and routing computers involved in delivering a message implements the communication stack. An application on the origin computer calls the message layer of the computer to send messages to a target computer and identifies routing computers on the route for delivering the message to the target computer. The message layer calls the communication layer to establish a connection to the target computer. The communication layer uses the transport protocol layer to establish an initial connection with the target computer, and uses the security layer to negotiate security parameters and to handle secured communications between the origin and target computers.
    Type: Grant
    Filed: August 29, 2003
    Date of Patent: March 13, 2007
    Assignee: Microsoft Corporation
    Inventors: Somak Chattopadhyay, Trevor Gulick, Sivaprasad Padisetty
  • Publication number: 20050216727
    Abstract: A communication stack enables computers implementing it to send, receive, or route network communications. The communication stack includes a message layer, a communication layer, a security layer, and a transport protocol layer, with plug-in transport protocol modules and plug-in security protocol modules. Each of the origin computer, target computer, and routing computers involved in delivering a message implements the communication stack. An application on the origin computer calls the message layer of the computer to send messages to a target computer and identifies routing computers on the route for delivering the message to the target computer. The message layer calls the communication layer to establish a connection to the target computer. The communication layer uses the transport protocol layer to establish an initial connection with the target computer, and uses the security layer to negotiate security parameters and to handle secured communications between the origin and target computers.
    Type: Application
    Filed: May 23, 2005
    Publication date: September 29, 2005
    Applicant: Microsoft Corporation
    Inventors: Somak Chattopadhyay, Trevor Gulick, Sivaprasad Padisetty
  • Publication number: 20050050203
    Abstract: A communication stack enables computers implementing it to send, receive, or route network communications. The communication stack includes a message layer, a communication layer, a security layer, and a transport protocol layer, with plug-in transport protocol modules and plug-in security protocol modules. Each of the origin computer, target computer, and routing computers involved in delivering a message implements the communication stack. An application on the origin computer calls the message layer of the computer to send messages to a target computer and identifies routing computers on the route for delivering the message to the target computer. The message layer calls the communication layer to establish a connection to the target computer. The communication layer uses the transport protocol layer to establish an initial connection with the target computer, and uses the security layer to negotiate security parameters and to handle secured communications between the origin and target computers.
    Type: Application
    Filed: August 29, 2003
    Publication date: March 3, 2005
    Applicant: Microsoft Corporation
    Inventors: Somak Chattopadhyay, Trevor Gulick, Sivaprasad Padisetty
  • Publication number: 20030060810
    Abstract: An apparatus and method for treating an undesired presence on an individual includes a CPU coupled to a laser control unit and a robotic arm control unit. A scanning area or volume is defined on the individual that includes the undesired presence. The CPU controls the robotic arm to move the laser and camera about the scanning area or volume while the camera scans individual portions of the scanning area or volume. The CPU receives this information from the camera and determines, based on the scanning, whether a particular portion includes part of the undesired presence. When the particular portion includes part of the undesired presence, the CPU actuates the laser. This process continues for all portions of the scanning area or volume. In an alternative embodiment, the CPU controls the robotic arm control unit to scan the entire area or volume and determines locations where there is an undesired presence.
    Type: Application
    Filed: February 15, 2001
    Publication date: March 27, 2003
    Inventors: Diego Syrowicz, Somak Chattopadhyay, Ramon Rodriguez, Guillermo Oropeza, Jonathan Kisner, Hernan Mercado-Corujo