Patents by Inventor Sunil Kumar Gupta

Sunil Kumar Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160359673
    Abstract: An example method according to some embodiments includes receiving flow data for a packet traversing a network. The method continues by determining a source endpoint group and a destination endpoint group for the packet. The method continues by determining that a policy was utilized, the policy being applicable to the endpoint group. Finally, the method includes updating utilization data for the policy based on the flow data.
    Type: Application
    Filed: February 16, 2016
    Publication date: December 8, 2016
    Inventors: Sunil Kumar Gupta, Navindra Yadav, Michael Standish Watts, Ali Parandehgheibi, Shashidhar Gandham, Ashutosh Kulshreshtha, Khawar Deen
  • Publication number: 20160359891
    Abstract: An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.
    Type: Application
    Filed: June 3, 2016
    Publication date: December 8, 2016
    Inventors: Jackson Ngoc Ki Pang, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Supreeth Hosur Nagesh Rao, Sunil Kumar Gupta
  • Publication number: 20160359915
    Abstract: A network can achieve compliance by defining and enforcing a set of network policies to secure protected electronic information. The network can monitor network data, host/endpoint data, process data, and user data for traffic using a sensor network that provides multiple perspectives. The sensor network can include sensors for networking devices, physical servers, hypervisors or shared kernels, virtual partitions, and other network components. The network can analyze the network data, host/endpoint data, process data, and user data to determine policies for traffic. The network can determine expected network actions based on the policies, such as allowing traffic, denying traffic, configuring traffic for quality of service (QoS), or redirecting traffic along a specific route. The network can update policy data based on the expected network actions and actual network actions. The policy data can be utilized for compliance.
    Type: Application
    Filed: April 19, 2016
    Publication date: December 8, 2016
    Inventors: Sunil Kumar Gupta, Navindra Yadav, Michael Standish Watts, Ali Parandehgheibi, Shashidhar Gandham, Ashutosh Kulshreshtha, Khawar Deen
  • Publication number: 20160359888
    Abstract: A method provides for receiving network traffic from a host having a host IP address and operating in a data center, and analyzing a malware tracker for IP addresses of hosts having been infected by a malware to yield an analysis. When the analysis indicates that the host IP address has been used to communicate with an external host infected by the malware to yield an indication, the method includes assigning a reputation score, based on the indication, to the host. The method can further include applying a conditional policy associated with using the host based on the reputation score. The reputation score can include a reduced reputation score from a previous reputation score for the host.
    Type: Application
    Filed: June 2, 2016
    Publication date: December 8, 2016
    Inventors: Sunil Kumar Gupta, Navindra Yadav, Michael Standish Watts, Ali Parandehgheibi, Shashidhar Gandham, Ashutosh Kulshreshtha, Khawar Deen
  • Publication number: 20160359913
    Abstract: Conditional policies can be defined that change based on security measurements of network endpoints. In an example embodiment, a network traffic monitoring system can monitor network flows between the endpoints and quantify how secure those endpoints are based on analysis of the network flows and other data. A conditional policy may be created that establishes one or more first connectivity policies for handling a packet when a security measurement of an endpoint is a first value or first range values, and one or more second connectivity policies for handling the packet. The connectivity policies may include permitting connectivity, denying connectivity, redirecting the packet using a specific route, or other network action. When the network traffic monitoring system detects a change to the security measurement of the endpoint, one or more applicable policies can be determined and the system can update policy data for the network to enforce the policies.
    Type: Application
    Filed: February 16, 2016
    Publication date: December 8, 2016
    Inventors: Sunil Kumar Gupta, Navindra Yadav, Michael Standish Watts, Ali Parandehgheibi, Shashidhar Gandham, Ashutosh Kulshreshtha, Khawar Deen
  • Publication number: 20160359912
    Abstract: This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates techniques that enable simulation of a new network policy with regard to its effects on the network data flow. By enabling a simulation data flow that is parallel and independent from the regular data flow, the present technology can provide optimized network security management with improved efficiency.
    Type: Application
    Filed: February 16, 2016
    Publication date: December 8, 2016
    Inventors: Sunil Kumar Gupta, Navindra Yadav, Michael Standish Watts, Ali Parandehgheibi, Shashidhar Gandham, Ashutosh Kulshreshtha, Khawar Deen
  • Publication number: 20150310375
    Abstract: A computer implemented method of individual productivity measurement includes capturing a work output of an individual and tracking a net effort of the individual. Further, the method includes computing an individual productivity of the individual, calculating a mean of individual productivities of the individuals associated with a work sub-group, and defining one or more ranges of the individual productivities in the work sub-group. The individual productivity is compared with one of the mean and the one or more ranges.
    Type: Application
    Filed: April 9, 2015
    Publication date: October 29, 2015
    Applicant: Infosys Limited
    Inventors: Jayeeta Dutta, Nishikant Nigam, Pandiya Kumar Rajamony, Rohan Narayan Murty, Satyajit Mohanty, Shameek Dutta, Shishank Gupta, Sunil Kumar Gupta
  • Publication number: 20150242886
    Abstract: A system can provide ad impression availability for one or more audience segments or at least part of an ad campaign. The system can also adjust such ad impression availability at different stages of ad production, booking, and delivery, such as at a time immediately prior to serving an ad impression or at a time of presenting ad impression availability to an advertiser at booking of ad impressions. Adjustments can be based on attributes of the audience segment(s) or the at least part of an ad campaign. For example, ad impression availability can be adjusted according to breadth and/or popularity of the segment(s) or the at least part of an ad campaign.
    Type: Application
    Filed: February 25, 2014
    Publication date: August 27, 2015
    Applicant: YAHOO! INC.
    Inventors: Supreeth Rao, Sunil Kumar Gupta
  • Publication number: 20150227628
    Abstract: A system can provide unique user metrics associated with a node in a hierarchy and the node's decedents in real time. This can occur by merging sketches of the node and its decedents to form a merged sketch, and retrieving the unique user metrics from the merged sketch. The sketches and the merged sketch may each be a separate data form, such as a hash. The hierarchy may include an online content taxonomy and the sketches of each node may include unique user metrics associated with the node, such as user interaction metrics associated with a category of content of the node. The system may build sketches for the nodes of a hierarchy, associate each sketch with its ancestor sketches, invert the associations, tie corresponding descendant sketches of an ancestor sketch based on the inversions, and merge the descendant sketches with their ancestor sketches to generate the merged sketches.
    Type: Application
    Filed: February 7, 2014
    Publication date: August 13, 2015
    Applicant: Yahoo! Inc.
    Inventors: Supreeth Rao, Sunil Kumar Gupta, Chetan Nadgire
  • Patent number: 8645814
    Abstract: Methods, systems and computer program products are displaying one or more electronic messages on a user interface. In one method, the method records timestamps of one or more activities of a user in a first user session. Subsequently, the method compares the timestamp of an initialization of a second user session, with the recorded timestamp of the one or more events such as a last logout timestamp and/or a last activity timestamp of the first user session. Further, the method may mark one or more new electronic messages based on the comparison of the timestamps. The method may then display the status of the marked one or more new electronic messages on a user interface based on the markings applied on the one or more new electronics messages received.
    Type: Grant
    Filed: January 8, 2010
    Date of Patent: February 4, 2014
    Assignee: Yahoo! Inc.
    Inventor: Sunil Kumar Gupta
  • Publication number: 20110173522
    Abstract: Methods, systems and computer program products are displaying one or more electronic messages on a user interface. In one method, the method records timestamps of one or more activities of a user in a first user session. Subsequently, the method compares the timestamp of an initialization of a second user session, with the recorded timestamp of the one or more events such as a last logout timestamp and/or a last activity timestamp of the first user session. Further, the method may mark one or more new electronic messages based on the comparison of the timestamps. The method may then display the status of the marked one or more new electronic messages on a user interface based on the markings applied on the one or more new electronics messages received.
    Type: Application
    Filed: January 8, 2010
    Publication date: July 14, 2011
    Applicant: Yahoo! Inc.
    Inventor: Sunil Kumar Gupta