Patents by Inventor Sudhir Srinivas
Sudhir Srinivas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11934456Abstract: Certain aspects of the present disclosure provide techniques for generating a unified knowledge graph. In one example, a method includes receiving entity data from a data source comprising a plurality of entities; forming a plurality of type-specific groups of entity data based on the received entity data; for each respective type-specific group of entity data of the plurality of type-specific groups of entity data; disambiguating the entity data within the respective type-specific group of entity data; creating a plurality of entity relationships based on the disambiguated entity data; and exporting the plurality of entity relationships to a type-specific subgraph; and forming a unified knowledge graph based on a plurality of type-specific subgraphs, wherein each type-specific subgraph of the plurality of type-specific subgraphs is associated with a single type-specific group of entity data of the plurality of type-specific groups of entity data.Type: GrantFiled: February 8, 2019Date of Patent: March 19, 2024Assignee: Intuit, Inc.Inventors: Sudhir Srinivas, Kevin Geraghty
-
Patent number: 11522850Abstract: Cluster state information is generated in response to a request to establish a connection with a cloud service system. The cluster state information includes a first instance of a security token and host information. The cluster state information is provided to a web browser associated with a user. The web browser associated with the user is redirected to a cloud identity provider. The cloud identity provider is configured to provide to the cloud service system via the web browser associated with the user, the cluster state information that includes the first instance of the security token and the host information. A certificate is requested from the cloud service system. The cluster state information that includes a second instance of the security token is provided to the cloud service system. The cloud service system is configured to establish the connection based on comparison between the first instance of the security token and the second instance of the security token.Type: GrantFiled: January 22, 2021Date of Patent: December 6, 2022Assignee: Cohesity, Inc.Inventors: Anubhav Gupta, Mahesh Kumar, Samual Krish Ravichandran, Subramanian Sethumadhavan, Sudhir Srinivas
-
Patent number: 11379526Abstract: Certain aspects provide techniques for disambiguating graph data. In one example, a method includes receiving entity data from a data source in a first format; converting the entity data in the first format to a second format, wherein the second format is a standardized input format for a disambiguation pipeline; determining a blocked data set from the entity data in the second format based on a blocking parameter, wherein: the blocked data set comprises data regarding a first plurality of entities, and the first plurality of entities is a subset of a second plurality of entities represented in the entity data from the data source; matching at least two entities in the first plurality of entities in the blocked data set; merging the at least two entities into a single entity; generating a unique ID for the single entity; and importing the single entity into a graph database.Type: GrantFiled: February 8, 2019Date of Patent: July 5, 2022Assignee: INTUIT INC.Inventors: Sudhir Srinivas, Kevin Geraghty
-
Publication number: 20210240828Abstract: An amount of data change associated with a version of a content file with respect to one or more previous versions of the content file is determined. The amount of change associated with the version of the content file is determined using a tree data structure associated with the content file that is stored on a storage cluster. One or more statistics associated with backup snapshot are provided to a server. The server is configured to determine that the amount of data change associated with the version of the content file is anomalous based in part on the one or more statistics associated with the backup snapshot. A notification that data associated with the backup snapshot is potentially infected by malicious software is received from the server. The version of the content file is indicated as being potentially infected by malicious software.Type: ApplicationFiled: January 22, 2021Publication date: August 5, 2021Inventors: Prashant Gaurav, Sidharth Mishra, Karandeep Singh Chawla, Anubhav Gupta, Sudhir Srinivas, Apurv Gupta, Nagapramod Mandagere
-
Publication number: 20210224263Abstract: Certain aspects of the present disclosure provide techniques for interacting with a graph database structure. In one embodiment, a method includes receiving, at an application, information regarding a first entity; transmitting, to a graph database, a query regarding the first entity; receiving, at the application, query results based on one or more relationships between the first entity and other entities in the graph database; making, by the application, an inference based on the query results; modifying, by the application, a user interface of the application based on the inference by displaying at least one user interface element suggesting a selection of an application option; and receiving, by the application, a user selection of the suggested application option.Type: ApplicationFiled: April 8, 2021Publication date: July 22, 2021Inventors: Sudhir SRINIVAS, Kevin GERAGHTY
-
Publication number: 20210218729Abstract: Cluster state information is generated in response to a request to establish a connection with a cloud service system. The cluster state information includes a first instance of a security token and host information. The cluster state information is provided to a web browser associated with a user. The web browser associated with the user is redirected to a cloud identity provider. The cloud identity provider is configured to provide to the cloud service system via the web browser associated with the user, the cluster state information that includes the first instance of the security token and the host information. A certificate is requested from the cloud service system. The cluster state information that includes a second instance of the security token is provided to the cloud service system. The cloud service system is configured to establish the connection based on comparison between the first instance of the security token and the second instance of the security token.Type: ApplicationFiled: January 22, 2021Publication date: July 15, 2021Inventors: Anubhav Gupta, Mahesh Kumar, Samual Krish Ravichandran, Subramanian Sethumadhavan, Sudhir Srinivas
-
Patent number: 10984001Abstract: Certain aspects of the present disclosure provide techniques for interacting with a graph database structure. In one embodiment, a method includes receiving, at an application, information regarding a first entity; transmitting, to a graph database, a query regarding the first entity; receiving, at the application, query results based on one or more relationships between the first entity and other entities in the graph database; making, by the application, an inference based on the query results; modifying, by the application, a user interface of the application based on the inference by displaying at least one user interface element suggesting a selection of an application option; and receiving, by the application, a user selection of the suggested application option.Type: GrantFiled: February 8, 2019Date of Patent: April 20, 2021Assignee: Intuit Inc.Inventors: Sudhir Srinivas, Kevin Geraghty
-
Patent number: 10944740Abstract: Cluster state information is generated in response to a request to establish a connection with a cloud service system. The cluster state information includes a first instance of a security token and host information. The cluster state information is provided to a web browser associated with a user. The web browser associated with the user is redirected to a cloud identity provider. The cloud identity provider is configured to provide to the cloud service system via the web browser associated with the user, the cluster state information that includes the first instance of the security token and the host information. A certificate is requested from the cloud service system. The cluster state information that includes a second instance of the security token is provided to the cloud service system. The cloud service system is configured to establish the connection based on comparison between the first instance of the security token and the second instance of the security token.Type: GrantFiled: June 27, 2019Date of Patent: March 9, 2021Assignee: Cohesity, Inc.Inventors: Anubhav Gupta, Mahesh Kumar, Samual Krish Ravichandran, Subramanian Sethumadhavan, Sudhir Srinivas
-
Patent number: 10943011Abstract: An amount of data change associated with a version of a content file with respect to one or more previous versions of the content file is determined. The amount of change associated with the version of the content file is determined using a tree data structure associated with the content file that is stored on a storage cluster. One or more statistics associated with backup snapshot are provided to a server. The server is configured to determine that the amount of data change associated with the version of the content file is anomalous based in part on the one or more statistics associated with the backup snapshot. A notification that data associated with the backup snapshot is potentially infected by malicious software is received from the server. The version of the content file is indicated as being potentially infected by malicious software.Type: GrantFiled: March 27, 2020Date of Patent: March 9, 2021Assignee: Cohesity, Inc.Inventors: Prashant Gaurav, Sidharth Mishra, Karandeep Singh Chawla, Anubhav Gupta, Sudhir Srinivas, Apurv Gupta, Nagapramod Mandagere
-
Publication number: 20200257730Abstract: Certain aspects of the present disclosure provide techniques for generating a unified knowledge graph. In one example, a method includes receiving entity data from a data source comprising a plurality of entities; forming a plurality of type-specific groups of entity data based on the received entity data; for each respective type-specific group of entity data of the plurality of type-specific groups of entity data; disambiguating the entity data within the respective type-specific group of entity data; creating a plurality of entity relationships based on the disambiguated entity data; and exporting the plurality of entity relationships to a type-specific subgraph; and forming a unified knowledge graph based on a plurality of type-specific subgraphs, wherein each type-specific subgraph of the plurality of type-specific subgraphs is associated with a single type-specific group of entity data of the plurality of type-specific groups of entity data.Type: ApplicationFiled: February 8, 2019Publication date: August 13, 2020Inventors: Sudhir SRINIVAS, Kevin GERAGHTY
-
Publication number: 20200257683Abstract: Certain aspects of the present disclosure provide techniques for interacting with a graph database structure. In one embodiment, a method includes receiving, at an application, information regarding a first entity; transmitting, to a graph database, a query regarding the first entity; receiving, at the application, query results based on one or more relationships between the first entity and other entities in the graph database; making, by the application, an inference based on the query results; modifying, by the application, a user interface of the application based on the inference by displaying at least one user interface element suggesting a selection of an application option; and receiving, by the application, a user selection of the suggested application option.Type: ApplicationFiled: February 8, 2019Publication date: August 13, 2020Inventors: Sudhir SRINIVAS, Kevin GERAGHTY
-
Publication number: 20200257731Abstract: Certain aspects provide techniques for disambiguating graph data. In one example, a method includes receiving entity data from a data source in a first format; converting the entity data in the first format to a second format, wherein the second format is a standardized input format for a disambiguation pipeline; determining a blocked data set from the entity data in the second format based on a blocking parameter, wherein: the blocked data set comprises data regarding a first plurality of entities, and the first plurality of entities is a subset of a second plurality of entities represented in the entity data from the data source; matching at least two entities in the first plurality of entities in the blocked data set; merging the at least two entities into a single entity; generating a unique ID for the single entity; and importing the single entity into a graph database.Type: ApplicationFiled: February 8, 2019Publication date: August 13, 2020Inventors: Sudhir SRINIVAS, Kevin Geraghty
-
Publication number: 20200226256Abstract: An amount of data change associated with a version of a content file with respect to one or more previous versions of the content file is determined. The amount of change associated with the version of the content file is determined using a tree data structure associated with the content file that is stored on a storage cluster. One or more statistics associated with backup snapshot are provided to a server. The server is configured to determine that the amount of data change associated with the version of the content file is anomalous based in part on the one or more statistics associated with the backup snapshot. A notification that data associated with the backup snapshot is potentially infected by malicious software is received from the server. The version of the content file is indicated as being potentially infected by malicious software.Type: ApplicationFiled: March 27, 2020Publication date: July 16, 2020Inventors: Prashant Gaurav, Sidharth Mishra, Karandeep Singh Chawla, Anubhav Gupta, Sudhir Srinivas, Apurv Gupta, Nagapramod Mandagere
-
Patent number: 10650146Abstract: An amount of data change associated with a version of a content file with respect to one or more previous versions of the content file is determined. The amount of change associated with the version of the content file is determined using a tree data structure associated with the content file that is stored on a storage cluster. One or more statistics associated with backup snapshot are provided to a server. The server is configured to determine that the amount of data change associated with the version of the content file is anomalous based in part on the one or more statistics associated with the backup snapshot. A notification that data associated with the backup snapshot is potentially infected by malicious software is received from the server. The version of the content file is indicated as being potentially infected by malicious software.Type: GrantFiled: April 1, 2019Date of Patent: May 12, 2020Assignee: Cohesity, Inc.Inventors: Prashant Gaurav, Sidharth Mishra, Karandeep Singh Chawla, Anubhav Gupta, Sudhir Srinivas, Nagapramod Mandagere, Apurv Gupta
-
Publication number: 20200084203Abstract: Cluster state information is generated in response to a request to establish a connection with a cloud service system. The cluster state information includes a first instance of a security token and host information. The cluster state information is provided to a web browser associated with a user. The web browser associated with the user is redirected to a cloud identity provider. The cloud identity provider is configured to provide to the cloud service system via the web browser associated with the user, the cluster state information that includes the first instance of the security token and the host information. A certificate is requested from the cloud service system. The cluster state information that includes a second instance of the security token is provided to the cloud service system. The cloud service system is configured to establish the connection based on comparison between the first instance of the security token and the second instance of the security token.Type: ApplicationFiled: June 27, 2019Publication date: March 12, 2020Inventors: Anubhav Gupta, Mahesh Kumar, Samual Krish Ravichandran, Subramanian Sethumadhavan, Sudhir Srinivas
-
Patent number: 10523778Abstract: An identifier associated with a persistent connection virtualization container corresponding to a specified secondary storage system identifier associated with a secondary storage system is requested from a caching service virtualization container. The identifier associated with the persistent connection virtualization container corresponding to the specified secondary storage system identifier is received. One or more commands are provided to the persistent connection virtualization container associated with the secondary storage system.Type: GrantFiled: December 19, 2018Date of Patent: December 31, 2019Assignee: Cohesity, Inc.Inventors: Woojae Lee, Akshit Poddar, Suresh Bysani Venkata Naga, Sudhir Srinivas
-
Patent number: 10466933Abstract: A first persistent connection pipe is established from a node of a secondary storage system to an access service associated with a cloud service system. A second persistent connection pipe is established from the node of the secondary storage system to the access service. A communication direction role of the second persistent connection pipe is switched to enable the access service to initiate a communication to the node of the secondary storage system via the second persistent pipe.Type: GrantFiled: December 19, 2018Date of Patent: November 5, 2019Assignee: Cohesity, Inc.Inventors: Suresh Bysani Venkata Naga, Sudhir Srinivas, Anubhav Gupta
-
Patent number: 10389704Abstract: Cluster state information is generated in response to a request to establish a connection with a cloud service system. The cluster state information includes a first instance of a security token and host information. The cluster state information is provided to a web browser associated with a user. The web browser associated with the user is redirected to a cloud identity provider. The cloud identity provider is configured to provide to the cloud service system via the web browser associated with the user, the cluster state information that includes the first instance of the security token and the host information. A certificate is requested from the cloud service system. The cluster state information that includes a second instance of the security token is provided to the cloud service system. The cloud service system is configured to establish the connection based on a comparison between the first instance of the security token and the second instance of the security token.Type: GrantFiled: November 30, 2018Date of Patent: August 20, 2019Assignee: Cohesity, Inc.Inventors: Anubhav Gupta, Mahesh Kumar, Samual Krish Ravichandran, Subramanian Sethumadhavan, Sudhir Srinivas
-
Publication number: 20130234863Abstract: A system for mobile metering. The system comprises a plurality of white space meters, wherein the white space meters are not connected to a network and are communicatively coupled to each other, wherein a white space meter within the plurality of white space meters is designated a collector; and a field device connected to a mobile communication device for accessing at least one white space meter in the plurality of white space meters in order to perform at least one task, wherein the field device comprises a task list, the task list comprising the at least one task to be performed on at least one white space meter.Type: ApplicationFiled: March 8, 2013Publication date: September 12, 2013Applicant: TRILLIANT NETWORKS, INC.Inventors: Remko Vos, Sudhir Srinivas, Claudine Berard
-
Publication number: 20050059406Abstract: Measured data, such as WLAN data, are received. The measured data are compared with expected data, such as expected WLAN data. Expected WLAN data can be generated from various sources, for example floor plan data and access point data (e.g., quantity, placement, and/or configuration). Based on such measured data, WLAN features can be changed, such as floor plan and/or access point data (e.g., quantity, placement, and/or configuration).Type: ApplicationFiled: September 17, 2003Publication date: March 17, 2005Applicant: Trapeze Networks, Inc.Inventors: Allan Thomson, Sudhir Srinivas, Jamsheed Bugwadia, Pudumane Kishan