Patents by Inventor Subhash Sankuratripati
Subhash Sankuratripati has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240160604Abstract: Systems and methods are disclosed for implementing an event based retention schedule for a read only file. When a regular file is to be converted to an event based retention read only file, an “event-retain” property may be enabled on the file allowing the feature to be implemented. Then, that file may have its permissions changed to read only. This will allow the file to be changed to a read only file without using a default retention time. Then, once the event is triggered, the retention time may be set so the file can be scheduled for automatic deletion.Type: ApplicationFiled: January 22, 2024Publication date: May 16, 2024Inventors: Akshatha GANGADHARAIAH, Balamurugan Ramajeyam, Raman Madaan, Subhash A. Sankuratripati, Aftab Ahmad Ansari, Vaiapuri Ramasubramaniam
-
Patent number: 11880335Abstract: Systems and methods are disclosed for implementing an event based retention schedule for a read only file. When a regular file is to be converted to an event based retention read only file, an “event-retain” property may be enabled on the file allowing the feature to be implemented. Then, that file may have its permissions changed to read only. This will allow the file to be changed to a read only file without using a default retention time. Then, once the event is triggered, the retention time may be set so the file can be scheduled for automatic deletion.Type: GrantFiled: July 31, 2020Date of Patent: January 23, 2024Assignee: NetApp, Inc.Inventors: Akshatha Gangadharaiah, Balamurugan Ramajeyam, Raman Madaan, Subhash A. Sankuratripati, Aftab Ahmad Ansari, Vaiapuri Ramasubramaniam
-
Publication number: 20230418976Abstract: Methods and systems for identifying personally identifiable information (PII) are disclosed. In some aspects, frequency maps of fields storing known PII information are generated. The frequency maps may count occurrences of unique bigrams in the PII fields. A field of interest may then be analyzed to generate a second frequency map. Correlations between the first frequency maps and the second frequency map may be generated. If one of the correlations meets certain criterion, the disclosed embodiments may determine that the field of interest does or does not include PII. Access control for the field of interest may then be based on whether the field includes PII. In some aspects, a storage location of data included in the field of interest may be based on whether the field includes PII.Type: ApplicationFiled: September 11, 2023Publication date: December 28, 2023Inventors: Vasyl Pihur, Subhash Sankuratripati, Dachuan Huang, Leah Fortier
-
Patent number: 11809972Abstract: Methods, computer readable media, devices, and systems provide for distributed machine learning. In one aspect, a method of training a model is disclosed. The method includes receiving, by a client device, from one or more servers, an intermediate model, training, by the client device, the intermediate model based on private data, and transmitting, by the client device, to the one or more servers, the trained intermediate model.Type: GrantFiled: April 21, 2022Date of Patent: November 7, 2023Assignee: Snap Inc.Inventors: Vasyl Pihur, Subhash Sankuratripati, Dachuan Huang, Antonio Marcedone, Frederick Liu, Ruogu Zeng
-
Patent number: 11797709Abstract: Methods and systems for identifying personally identifiable information (PII) are disclosed. In some aspects, frequency maps of fields storing known PII information are generated. The frequency maps may count occurrences of unique bigrams in the PII fields. A field of interest may then be analyzed to generate a second frequency map. Correlations between the first frequency maps and the second frequency map may be generated. If one of the correlations meets certain criterion, the disclosed embodiments may determine that the field of interest does or does not include PII. Access control for the field of interest may then be based on whether the field includes PII. In some aspects, a storage location of data included in the field of interest may be based on whether the field includes PII.Type: GrantFiled: January 25, 2022Date of Patent: October 24, 2023Assignee: Snap Inc.Inventors: Vasyl Pihur, Subhash Sankuratripati, Dachuan Huang, Leah Fortier
-
Publication number: 20230328074Abstract: Systems and methods for end to end encryption are provided. In example embodiments, a computer accesses an image including a geometric shape. The computer determines that the accessed image includes a candidate shape inside the geometric shape. The computer determines, using the candidate shape, an orientation of the geometric shape. The computer determines a public key of a communication partner device by decoding, based on the determined orientation, data encoded within the geometric shape. The computer receives a message. The computer verifies, based on the public key of the communication partner device, whether the message is from the communication partner device. The computer provides an output including the message and an indication of the communication partner device if the message is verified to be from the communication partner device. The computer provides an output indicating an error if the message is not verified to be from the communication partner device.Type: ApplicationFiled: June 14, 2023Publication date: October 12, 2023Inventor: Subhash Sankuratripati
-
Patent number: 11714868Abstract: Disclosed are methods and systems for generating a suggestion inventory that provides improved user engagement while ensuring privacy of relationships on a social network. The methods and systems include accessing an entity graph that specifies connections between a plurality of users on the social network; identifying a first candidate user of the plurality of users that is indirectly connected to a given user of the plurality of users; computing a number of unique paths on the entity graph between the first candidate user and the given user; determining that the number of unique paths exceeds a first threshold and includes a minimum number of friends of the given user that are directly connected to the given user on the entity graph; and adding the first candidate friend to a friend suggestion inventory for the given user in response to the determination.Type: GrantFiled: July 8, 2019Date of Patent: August 1, 2023Assignee: Snap Inc.Inventors: Amit Datta, Aleksandra Korolova, Vasyl Pihur, Subhash Sankuratripati, Balamurugan Anandan
-
Patent number: 11716336Abstract: Systems and methods for end to end encryption are provided. In example embodiments, a computer accesses an image including a geometric shape. The computer determines that the accessed image includes a candidate shape inside the geometric shape. The computer determines, using the candidate shape, an orientation of the geometric shape. The computer determines a public key of a communication partner device by decoding, based on the determined orientation, data encoded within the geometric shape. The computer receives a message. The computer verifies, based on the public key of the communication partner device, whether the message is from the communication partner device. The computer provides an output including the message and an indication of the communication partner device if the message is verified to be from the communication partner device. The computer provides an output indicating an error if the message is not verified to be from the communication partner device.Type: GrantFiled: August 20, 2021Date of Patent: August 1, 2023Assignee: Snap Inc.Inventor: Subhash Sankuratripati
-
Patent number: 11537746Abstract: Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing a program and a method for determining whether data utilization is privacy compliant. The program and method includes receiving input, via a graphical user interface, that includes identification of an application feature that utilizes user data collected from a plurality of users of the application; generating, for display in the graphical user interface, a plurality of fields that characterize utilization of user data; receiving, via the graphical user interface, a selection of one or more fields, the selected one or more fields characterize the utilization of the user data by the application feature; determining, based on the selected one or more fields, whether the utilization of the user data is privacy compliant; and generating, for display, an approval status indicating whether the utilization of the user data is privacy compliant.Type: GrantFiled: August 31, 2021Date of Patent: December 27, 2022Assignee: Snap Inc.Inventors: Subhash Sankuratripati, Dhanuja Shaji, Masoud Akhoondi, Amit Datta
-
Publication number: 20220303250Abstract: Systems, devices, media, and methods are presented for device independent secure messaging. The systems and methods generate an encrypted message by encrypting message content, designated for a specified recipient, with an encryption key. The systems and methods select a set of recipient keys, associated with the specified recipient, from a plurality of member keys. For each recipient key, the systems and methods encrypt the encryption key to generate a set of encrypted keys and transmit the encrypted message and an encrypted key of the set of encrypted keys to one or more client devices associated with the specified recipient. The systems and methods then receive an acknowledgement indicating a termination status of the encrypted message.Type: ApplicationFiled: June 1, 2022Publication date: September 22, 2022Inventors: Michael Duong, Anirudh Garg, Subhash Sankuratripati, Edward Chenhui Xue, Marcel M. Yung
-
Patent number: 11411932Abstract: Systems, devices, media, and methods are presented for device independent secure messaging. The systems and methods generate an encrypted message by encrypting message content, designated for a specified recipient, with an encryption key. The systems and methods select a set of recipient keys, associated with the specified recipient, from a plurality of member keys. For each recipient key, the systems and methods encrypt the encryption key to generate a set of encrypted keys and transmit the encrypted message and an encrypted key of the set of encrypted keys to one or more client devices associated with the specified recipient. The systems and methods then receive an acknowledgement indicating a termination status of the encrypted message.Type: GrantFiled: November 20, 2017Date of Patent: August 9, 2022Assignee: Snap Inc.Inventors: Michael Duong, Anirudh Garg, Subhash Sankuratripati, Edward Chenhui Xue, Marcel M. Yung
-
Publication number: 20220245524Abstract: Methods, computer readable media, devices, and systems provide for distributed machine learning. In one aspect, a method of training a model is disclosed. The method includes receiving, by a client device, from one or more servers, an intermediate model, training, by the client device, the intermediate model based on private data, and transmitting, by the client device, to the one or more servers, the trained intermediate model.Type: ApplicationFiled: April 21, 2022Publication date: August 4, 2022Inventors: Vasyl Pihur, Subhash Sankuratripati, Dachuan Huang, Antonio Marcedone, Frederick Liu, Ruogu Zeng
-
Patent number: 11341429Abstract: Methods, computer readable media, devices, and systems provide for distributed machine learning. In one aspect, a method of training a model is disclosed. The method includes receiving, by a client device, from one or more servers, an intermediate model, training, by the client device, the intermediate model based on private data, and transmitting, by the client device, to the one or more servers, the trained intermediate model.Type: GrantFiled: October 11, 2018Date of Patent: May 24, 2022Assignee: Snap Inc.Inventors: Vasyl Pihur, Subhash Sankuratripati, Dachuan Huang, Antonio Marcedone, Frederick Liu, Ruogu Zeng
-
Publication number: 20220147653Abstract: Methods and systems for identifying personally identifiable information (PII) are disclosed. In some aspects, frequency maps of fields storing known PII information are generated. The frequency maps may count occurrences of unique bigrams in the PII fields. A field of interest may then be analyzed to generate a second frequency map. Correlations between the first frequency maps and the second frequency map may be generated. If one of the correlations meets certain criterion, the disclosed embodiments may determine that the field of interest does or does not include PII. Access control for the field of interest may then be based on whether the field includes PII. In some aspects, a storage location of data included in the field of interest may be based on whether the field includes PII.Type: ApplicationFiled: January 25, 2022Publication date: May 12, 2022Inventors: Vasyl Pihur, Subhash Sankuratripati, Dachuan Huang, Leah Fortier
-
Patent number: 11263341Abstract: Methods and systems for identifying personally identifiable information (PII) are disclosed. In some aspects, frequency maps of fields storing known PII information are generated. The frequency maps may count occurrences of unique bigrams in the PII fields. A field of interest may then be analyzed to generate a second frequency map. Correlations between the first frequency maps and the second frequency map may be generated. If one of the correlations meets certain criterion, the disclosed embodiments may determine that the field of interest does or does not include PII. Access control for the field of interest may then be based on whether the field includes PII. In some aspects, a storage location of data included in the field of interest may be based on whether the field includes PII.Type: GrantFiled: October 11, 2018Date of Patent: March 1, 2022Assignee: Snap Inc.Inventors: Vasyl Pihur, Subhash Sankuratripati, Dachuan Huang, Leah Fortier
-
Publication number: 20220046029Abstract: Systems and methods for end to end encryption are provided. In example embodiments, a computer accesses an image including a geometric shape. The computer determines that the accessed image includes a candidate shape inside the geometric shape. The computer determines, using the candidate shape, an orientation of the geometric shape. The computer determines a public key of a communication partner device by decoding, based on the determined orientation, data encoded within the geometric shape. The computer receives a message. The computer verifies, based on the public key of the communication partner device, whether the message is from the communication partner device. The computer provides an output including the message and an indication of the communication partner device if the message is verified to be from the communication partner device. The computer provides an output indicating an error if the message is not verified to be from the communication partner device.Type: ApplicationFiled: August 20, 2021Publication date: February 10, 2022Inventor: Subhash Sankuratripati
-
Publication number: 20210397741Abstract: Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing a program and a method for determining whether data utilization is privacy compliant. The program and method includes receiving input, via a graphical user interface, that includes identification of an application feature that utilizes user data collected from a plurality of users of the application; generating, for display in the graphical user interface, a plurality of fields that characterize utilization of user data; receiving, via the graphical user interface, a selection of one or more fields, the selected one or more fields characterize the utilization of the user data by the application feature; determining, based on the selected one or more fields, whether the utilization of the user data is privacy compliant; and generating, for display, an approval status indicating whether the utilization of the user data is privacy compliant.Type: ApplicationFiled: August 31, 2021Publication date: December 23, 2021Inventors: Subhash Sankuratripati, Dhanuja Shaji, Masoud Akhoondi, Amit Datta
-
Patent number: 11128640Abstract: Systems and methods for end to end encryption are provided. In example embodiments, a computer accesses an image including a geometric shape. The computer determines that the accessed image includes a candidate shape inside the geometric shape. The computer determines, using the candidate shape, an orientation of the geometric shape. The computer determines a public key of a communication partner device by decoding, based on the determined orientation, data encoded within the geometric shape. The computer receives a message. The computer verifies, based on the public key of the communication partner device, whether the message is from the communication partner device. The computer provides an output including the message and an indication of the communication partner device if the message is verified to be from the communication partner device. The computer provides an output indicating an error if the message is not verified to be from the communication partner device.Type: GrantFiled: April 22, 2020Date of Patent: September 21, 2021Assignee: Snap Inc.Inventor: Subhash Sankuratripati
-
Patent number: 11126745Abstract: Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing a program and a method for determining whether data utilization is privacy compliant. The program and method includes receiving input, via a graphical user interface, that includes identification of an application feature that utilizes user data collected from a plurality of users of the application; generating, for display in the graphical user interface, a plurality of fields that characterize utilization of user data; receiving, via the graphical user interface, a selection of one or more fields, the selected one or more fields characterize the utilization of the user data by the application feature; determining, based on the selected one or more fields, whether the utilization of the user data is privacy compliant; and generating, for display, an approval status indicating whether the utilization of the user data is privacy compliant.Type: GrantFiled: March 15, 2019Date of Patent: September 21, 2021Assignee: Snap Inc.Inventors: Subhash Sankuratripati, Dhanuja Shaji, Masoud Akhoondi, Amit Datta
-
Publication number: 20200389466Abstract: Systems and methods for end to end encryption are provided. In example embodiments, a computer accesses an image including a geometric shape. The computer determines that the accessed image includes a candidate shape inside the geometric shape. The computer determines, using the candidate shape, an orientation of the geometric shape. The computer determines a public key of a communication partner device by decoding, based on the determined orientation, data encoded within the geometric shape. The computer receives a message. The computer verifies, based on the public key of the communication partner device, whether the message is from the communication partner device. The computer provides an output including the message and an indication of the communication partner device if the message is verified to be from the communication partner device. The computer provides an output indicating an error if the message is not verified to be from the communication partner device.Type: ApplicationFiled: April 22, 2020Publication date: December 10, 2020Inventor: Subhash Sankuratripati