Patents by Inventor Sriram Gopalakrishnan
Sriram Gopalakrishnan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240086232Abstract: A method for managing memory for applications in a computing system includes receiving a selection of a preferred application. During user-controlled operation over the application, the transitions of selected application between foreground and background are monitored. A retention of the application in memory is triggered upon a transition of the application to background during the user operation. Retention of the application includes compressing memory portions of the application. Accordingly, the application is retained within the memory based on said compressed memory portions. A requirement to restore the retained application is sensed based on either a user selection or an automatically generated prediction and the application is restored from the retained state back to the foreground.Type: ApplicationFiled: November 21, 2023Publication date: March 14, 2024Inventors: Ganji Manoj KUMAR, Jaitirth Anthony JACOB, Rishabh RAJ, Vaisakh Punnekkattu Chirayil SUDHEESH BABU, Renju Chirakarotu NAIR, Hakryoul KIM, Shweta RATANPURA, Tarun GOPALAKRISHNAN, Sriram SHASHANK, Raju Suresh DIXIT, Youngjoo JUNG
-
Patent number: 11888899Abstract: Example methods are provided for flow-based forwarding element configuration in a network environment. An example method may comprise obtaining a set of security policies associated with the group of workloads; and based on the set of security policies, identifying an allowed forwarding path between a destination and a first workload. The method may also comprise configuring a whitelist set of flow entries and sending configuration information to the flow-based forwarding element to cause the flow-based forwarding element to apply the whitelist set. The whitelist set may include a first flow entry specifying match fields and a first action to allow communication over the allowed forwarding path, but excludes a second flow entry specifying a second action to block communication over a forbidden forwarding path between the destination and the second workload. The match fields may include transport layer information and network layer information.Type: GrantFiled: March 8, 2018Date of Patent: January 30, 2024Assignee: Nicira, Inc.Inventors: Vasantha Kumar, Sandeep Kasbe, Nidhi Sharma, Vaibhav Rekhate, Sriram Gopalakrishnan
-
Publication number: 20230328099Abstract: A method for opening unknown files in a malware detection system, is provided. The method generally includes receiving a request to open a file classified as an unknown file, opening the file in a container, collecting at least one of a log of events carried out by the file or observed behavior traces of the file while open in the container, transmitting, to a file analyzer, at least one of the file, the log of events, or the behavior traces for static analysis, determining, a final verdict for the file, based on at least one of the file, the log of events, or the behavior traces, wherein the final verdict for the file is based on the static analysis or dynamic analysis of the file, and taking one or more actions based on a policy configured for the first endpoint and the final verdict.Type: ApplicationFiled: April 8, 2022Publication date: October 12, 2023Inventors: Rayanagouda Bheemanagouda PATIL, Kedar Bhalchandra CHAUDHARI, Shivali SHARMA, Laxmikant Vithal GUNDA, Sriram GOPALAKRISHNAN
-
Publication number: 20230297685Abstract: A method for locating malware in a malware detection system, is provided. The method generally includes storing, at a first endpoint, a mapping of a first file hash and a first file path for a first file classified as an unknown file, opening, at the first endpoint, the first file prior to determining whether the first file is benign or malicious, determining, at the first endpoint, a first verdict for the first file, the first verdict indicating the first file is benign or malicious, locating the first file using the mapping of the first file hash and the first file path, and taking one or more actions based on a policy configured for the first endpoint and the first verdict indicating the first file is benign or malicious.Type: ApplicationFiled: March 15, 2022Publication date: September 21, 2023Inventors: Rayanagouda Bheemanagouda PATIL, Sriram GOPALAKRISHNAN, Pranav GOKHALE
-
Publication number: 20230232520Abstract: A load control system may comprise load control devices for controlling respective electrical loads, and a system controller operable to transmit digital messages including different commands to the load control devices in response to a selection of a preset. The different commands may include a preset command configured to identify preset data in a device database stored at the load control device and/or a multi-output command configured to define the preset data for being stored in the device database. The system controller may decide which of the commands to transmit to the load control devices in response to the selection of the preset.Type: ApplicationFiled: March 27, 2023Publication date: July 20, 2023Applicant: Lutron Technology CompanyInventors: Brian Michael Courtney, Timothy Gill, Sriram Gopalakrishnan, Roshni Ashwin Shah, Vidya Sukumar, Mark S. Taipale, Mark Yorgey
-
Publication number: 20230156018Abstract: Some embodiments of the invention provide a method of performing services on a host computer on which a machine executes. At a service engine executing on the host computer separately than the machine, the method receives a data message from the machine. The method determines that the data message is associated with a file (1) that is stored on the machine and (2) that stores confidential information. The method performs a service operation on the data message based on said determination.Type: ApplicationFiled: January 7, 2022Publication date: May 18, 2023Inventors: Sriram Gopalakrishnan, Hrishikesh Ghatnekar
-
Publication number: 20230153270Abstract: Some embodiments of the invention provide a method of performing services on a host computer on which a machine executes. The method sends, to a file inspector, a first set of data associated with an event detected on the machine that is associated with a file stored on the machine. The method receives, from the file inspector, indication that the file stores confidential information. The method sends, to a context engine executing on the host computer separately from the machine, a second set of data associated with the file, the context engine storing the second set of data for subsequent access by a service engine that executes on the host computer separately from the machine, the service engine using the second set of data to perform a service operation on data messages associated with the machine.Type: ApplicationFiled: January 7, 2022Publication date: May 18, 2023Inventors: Sriram Gopalakrishnan, Hrishikesh Ghatnekar
-
Patent number: 11617251Abstract: A load control system may comprise load control devices for controlling respective electrical loads, and a system controller operable to transmit digital messages including different commands to the load control devices in response to a selection of a preset. The different commands may include a preset command configured to identify preset data in a device database stored at the load control device and/or a multi-output command configured to define the preset data for being stored in the device database. The system controller may decide which of the commands to transmit to the load control devices in response to the selection of the preset.Type: GrantFiled: May 11, 2020Date of Patent: March 28, 2023Assignee: Lutron Technology CompanyInventors: Brian Michael Courtney, Timothy Gill, Sriram Gopalakrishnan, Roshni Ashwin Shah, Vidya Sukumar, Mark S. Taipale, Mark Yorgey
-
Patent number: 11532057Abstract: A system for updating a database comprises an input interface and a processor. The input interface is configured to receive image data. The processor is configured to determine from the image data one or more attributes of a database entry for real estate property and update the database entry for the real estate property.Type: GrantFiled: September 30, 2019Date of Patent: December 20, 2022Assignee: Zillow, Inc.Inventors: Shourabh Rawat, Jeff McConathy, Todd Holloway, Sriram Gopalakrishnan, Abhinav Kulkarni
-
Patent number: 11240204Abstract: Example methods and systems for score-based dynamic firewall rule enforcement in a software-defined networking (SDN) environment. One example method may comprise in response to detecting a first request to access a first resource, identifying a first score associated with the user, and a firewall rule that is applicable to the user based on information associated with the user. The firewall rule may be applied to allow access to the first resource. The method may further comprise adjusting the first score to a second score that represents a more restrictive access level compared to the first score. In response to detecting a second request to access the first resource, applying the firewall rule to block the second request based on the second score.Type: GrantFiled: April 15, 2019Date of Patent: February 1, 2022Assignee: VMWARE, INC.Inventors: Rayanagouda Bheemanagouda Patil, Vasantha Kumar, Sriram Gopalakrishnan, Mandar Barve
-
Publication number: 20210240149Abstract: A load control system may control an electrical load in a space of a building occupied by an occupant. The load control system may include a controller configured to determine the location of the occupant, and a load control device configured to automatically control the electrical load in response to the location of the occupant. The load control system may also include a mobile device adapted to be located on or immediately adjacent the occupant and configured to transmit and receive wireless signals. The load control device may be configured to automatically control the electrical load when the mobile device is located in the space. The load control system may further comprise an occupancy sensor and the load control device may automatically control the electrical load when the occupancy sensor indicates that the space is occupied and the mobile device is located in the space.Type: ApplicationFiled: April 21, 2021Publication date: August 5, 2021Applicant: Lutron Technology Company LLCInventors: Rhodes B. Baker, John H. Bull, William Bryce Fricke, Jason C. Killo, Galen Edgar Knode, Sanjeev Kumar, Sean R. Pearson, James Mathias Weber, Daniel L. Twaddell, Daniel Curtis Raneri, Timothy Mann, Sriram Gopalakrishnan, Jeffrey Karc, Greg Edward Sloan
-
Publication number: 20210028622Abstract: A load control system may comprise load control devices for controlling respective electrical loads, and a system controller operable to transmit digital messages including different commands to the load control devices in response to a selection of a preset. The different commands may include a preset command configured to identify preset data in a device database stored at the load control device and/or a multi-output command configured to define the preset data for being stored in the device database. The system controller may decide which of the commands to transmit to the load control devices in response to the selection of the preset.Type: ApplicationFiled: May 11, 2020Publication date: January 28, 2021Applicant: Lutron Technology CompanyInventors: Brian Michael Courtney, Timothy Gill, Sriram Gopalakrishnan, Roshni Ashwin Shah, Vidya Sukumar, Mark S. Taipale, Mark Yorgey
-
Publication number: 20200236086Abstract: Example methods and systems for score-based dynamic firewall rule enforcement in a software-defined networking (SDN) environment. One example method may comprise in response to detecting a first request to access a first resource, identifying a first score associated with the user, and a firewall rule that is applicable to the user based on information associated with the user. The firewall rule may be applied to allow access to the first resource. The method may further comprise adjusting the first score to a second score that represents a more restrictive access level compared to the first score. In response to detecting a second request to access the first resource, applying the firewall rule to block the second request based on the second score.Type: ApplicationFiled: April 15, 2019Publication date: July 23, 2020Inventors: RAYANAGOUDA BHEEMANAGOUDA PATIL, VASANTHA KUMAR, SRIRAM GOPALAKRISHNAN, MANDAR BARVE
-
Patent number: 10651653Abstract: A load control system may comprise load control devices for controlling respective electrical loads, and a system controller operable to transmit digital messages including different commands to the load control devices in response to a selection of a preset. The different commands may include a preset command configured to identify preset data in a device database stored at the load control device and/or a multi-output command configured to define the preset data for being stored in the device database. The system controller may decide which of the commands to transmit to the load control devices in response to the selection of the preset.Type: GrantFiled: May 25, 2018Date of Patent: May 12, 2020Assignee: Lutron Technology Company LLCInventors: Brian Michael Courtney, Timothy Gill, Sriram Gopalakrishnan, Roshni Ashwin Shah, Vidya Sukumar, Mark S. Taipale, Mark Yorgey
-
Patent number: 10645093Abstract: The technology disclosed herein enables reduction of secure protocol overhead when transferring packets between guest elements on different hosts. In a particular embodiment, the method provides, in a first virtual network interface of a first guest element, receiving one or more first packets from a first guest element directed to a second guest element. In response to determining that the first packets will be encapsulated in a secure protocol having a first integrity check procedure provided for by the secure protocol, the method provides refraining to perform a transmit-side portion of a second integrity check procedure on the first packets as provided for by a transport protocol. The method further provides passing the first packets to a first host of the first virtual network interface in the transport protocol.Type: GrantFiled: August 23, 2017Date of Patent: May 5, 2020Assignee: Nicira, Inc.Inventors: Vasantha Kumar, Vaibhav Rekhate, Nidhi Sharma, Sriram Gopalakrishnan
-
Patent number: 10587578Abstract: System and method for managing firewall rules for hierarchical entities modify a processing order of the firewall rules to be executed in a distributed computer system based on hit counts of the firewall rules and direct descendent relationships of destination entities of the firewall rules.Type: GrantFiled: April 27, 2017Date of Patent: March 10, 2020Assignee: NICIRA, INC.Inventors: Vasantha Kumar, Sriram Gopalakrishnan, Naveen Ramaswamy, Anil Kumar
-
Patent number: 10430902Abstract: A system for updating a database comprises an input interface and a processor. The input interface is configured to receive image data. The processor is configured to determine from the image data one or more attributes of a database entry for real estate property and update the database entry for the real estate property.Type: GrantFiled: July 7, 2014Date of Patent: October 1, 2019Assignee: Trulia, LLCInventors: Shourabh Rawat, Jeff McConathy, Todd Holloway, Sriram Gopalakrishnan, Abhinav Kulkarni
-
Publication number: 20190230126Abstract: Example methods are provided for flow-based forwarding element configuration in a network environment. An example method may comprise obtaining a set of security policies associated with the group of workloads; and based on the set of security policies, identifying an allowed forwarding path between a destination and a first workload. The method may also comprise configuring a whitelist set of flow entries and sending configuration information to the flow-based forwarding element to cause the flow-based forwarding element to apply the whitelist set. The whitelist set may include a first flow entry specifying match fields and a first action to allow communication over the allowed forwarding path, but excludes a second flow entry specifying a second action to block communication over a forbidden forwarding path between the destination and the second workload. The match fields may include transport layer information and network layer information.Type: ApplicationFiled: March 8, 2018Publication date: July 25, 2019Inventors: VASANTHA KUMAR, SANDEEP KASBE, NIDHI SHARMA, VAIBHAV REKHATE, SRIRAM GOPALAKRISHNAN
-
Publication number: 20190020662Abstract: The technology disclosed herein enables reduction of secure protocol overhead when transferring packets between guest elements on different hosts. In a particular embodiment, the method provides, in a first virtual network interface of a first guest element, receiving one or more first packets from a first guest element directed to a second guest element. In response to determining that the first packets will be encapsulated in a secure protocol having a first integrity check procedure provided for by the secure protocol, the method provides refraining to perform a transmit-side portion of a second integrity check procedure on the first packets as provided for by a transport protocol. The method further provides passing the first packets to a first host of the first virtual network interface in the transport protocol.Type: ApplicationFiled: August 23, 2017Publication date: January 17, 2019Inventors: VASANTHA KUMAR, VAIBHAV REKHATE, NIKHI SHARMA, SRIRAM GOPALAKRISHNAN
-
Publication number: 20180278056Abstract: A load control system may comprise load control devices for controlling respective electrical loads, and a system controller operable to transmit digital messages including different commands to the load control devices in response to a selection of a preset. The different commands may include a preset command configured to identify preset data in a device database stored at the load control device and/or a multi-output command configured to define the preset data for being stored in the device database. The system controller may decide which of the commands to transmit to the load control devices in response to the selection of the preset.Type: ApplicationFiled: May 25, 2018Publication date: September 27, 2018Applicant: Lutron Electronics Co., Inc.Inventors: Brian Michael Courtney, Timothy Gill, Sriram Gopalakrishnan, Roshni Ashwin Shah, Vidya Sukumar, Mark S. Taipale, Mark Yorgey