Patents by Inventor Tarun Gupta

Tarun Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250150327
    Abstract: In general, this disclosure describes techniques that enable a network system to perform application-aware active measurement for monitoring network health. The network system includes memory that stores a topology graph for a network. The network system includes processing circuitry that may receive an identifier associated with an application utilizing the network for communications, and determine, based on the topology graph and the identifier, a subgraph of the topology graph based on a location, in the topology graph, of a node representing a compute node that is a host of the application. The processing circuitry may next determine, based on the subgraph, a probe module to measure performance metrics associated with the application, and for the probe module, generate configuration data corresponding to the probe module. The processing circuitry may output, to the probe module, the configuration data.
    Type: Application
    Filed: January 13, 2025
    Publication date: May 8, 2025
    Inventors: Tarun Banka, Rahul Gupta, Ciante Jordon Jones, Prashant Lnu, Thayumanavan Sridhar, Raj Yavatkar
  • Publication number: 20250150326
    Abstract: A computing device may implement the techniques described in this disclosure. The computing device may include processing circuitry configured to execute an analysis framework system, and memory configured to store time series data. The analysis framework system may create, based on the time series data, a knowledge graph comprising a plurality of first nodes in the network system referenced in the time series data interconnected by edges. The analysis framework system may cause a graph analytics service of the analysis framework system to receive a graph analysis request comprising a request to determine a fault propagation path, a request to determine changes in the knowledge graph, a request to determine an impact of an emulated fault, or a request to determine an application-to-network path. The analysis framework system may also cause the graph analytics service to determine a response to the graph analysis request, and output the response.
    Type: Application
    Filed: January 13, 2025
    Publication date: May 8, 2025
    Inventors: Tarun Banka, Rahul Gupta, Yuyun Xia, Thayumanavan Sridhar, Raj Yavatkar
  • Patent number: 12288406
    Abstract: The present disclosure relates to systems, methods, and non-transitory computer readable media for accurately enhancing optical character recognition with a machine learning approach for determining words from reverse text, vertical text, and atypically-sized text. For example, the disclosed systems segment a digital image into text regions and non-text regions utilizing an object detection machine learning model. Within the text regions, the disclosed systems can determine reverse text glyphs, vertical text glyphs, and/or atypically-sized text glyphs utilizing an edge based adaptive binarization model. Additionally, the disclosed systems can utilize respective modification techniques to manipulate reverse text glyphs, vertical text glyphs, and/or atypically-sized glyphs for analysis by an optical character recognition model.
    Type: Grant
    Filed: September 30, 2021
    Date of Patent: April 29, 2025
    Assignee: Adobe Inc.
    Inventors: Ankit Bal, Mohit Gupta, Ram Bhushan Agrawal, Tarun Verma, Uttam Dwivedi
  • Publication number: 20250111208
    Abstract: The disclosed concepts relate to implementation of application and application engine functionality using machine learning. One example method involves obtaining a seed image representing a seeded application state and mapping the seed image to at least one seed image token using an image encoder. The example method also involves inputting the at least one seed image token as a prompt to a neural dreaming model that has been trained to predict training sequences obtained from one or more executions of one or more applications, the training sequences including images output by the one more applications during the one or more executions and inputs to the one or more applications during the one or more executions. The example method also involves generating subsequent image tokens with the neural dreaming model, and decoding the subsequent image tokens with an image decoder to obtain subsequent images.
    Type: Application
    Filed: September 28, 2023
    Publication date: April 3, 2025
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Katja HOFMANN, Anssi Samuli KANERVISTO, Sam Michael DEVLIN, Tabish RASHID, Tarun GUPTA, Timothy PEARCE, Ryen W. WHITE
  • Publication number: 20250112851
    Abstract: In general, techniques are described for managing a distributed application based on call paths among the multiple services of the distributed application that traverse underlying network infrastructure. In an example, a method comprises determining, by a computing system, and for a distributed application implemented with a plurality of services, a call path from an entry endpoint service of the plurality of services to a terminating endpoint service of the plurality of services; determining, by the computing system, a corresponding network path for each pair of adjacent services from a plurality of pairs of services that communicate for the call path; and based on a performance indicator for a network device of the corresponding network path meeting a threshold, performing, by the computing system, one or more of: reconfiguring the network; or redeploying one of the plurality of services to a different compute node of the compute nodes.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Inventors: Tarun Banka, Rahul Gupta, Mithun Chakaravarrti Dharmaraj, Amandeep Chauhan, Thayumanavan Sridhar, Raj Yavatkar
  • Patent number: 12267300
    Abstract: An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which cause the system to obtain telemetry data, the telemetry data being associated with a plurality of applications running on a plurality of hosts. The instructions cause the system to, based on the telemetry data, determine a subset of applications of the plurality of applications that run on a first host of the plurality of hosts. The instructions cause the system to determine a subset of firewall policies of a plurality of firewall polices, each of the subset of firewall policies applying to at least one respective application of the subset of applications. The instructions cause the system to generate an indication of the subset of firewall policies and send the indication to a management plane of a distributed firewall.
    Type: Grant
    Filed: September 21, 2023
    Date of Patent: April 1, 2025
    Assignee: Juniper Networks, Inc.
    Inventors: Raja Kommula, Rahul Gupta, Ganesh Byagoti Matad Sunkada, Tarun Banka, Thayumanavan Sridhar, Raj Yavatkar
  • Publication number: 20250086145
    Abstract: A repository of replicated chunk files is analyzed to identify chunk files that meet at least a portion of combination criteria. Selected chunk files are associated together under a data protection grouping container. Erasure coding is applied to the data protection grouping container including by utilizing the selected chunk files as different data stripes of the erasure coding and generating one or more parity stripes based on the different data stripes.
    Type: Application
    Filed: November 22, 2024
    Publication date: March 13, 2025
    Inventors: Apurv Gupta, Akshat Agarwal, Manvendra Singh Tomar, Donthula Akshith Reddy, Kushal Singh, Tarun Kumar Yadav, Mandar Suresh Naik
  • Publication number: 20250086664
    Abstract: A system and a method to determine a technology used by a user is disclosed. The system receives user data comprising job titles, skills, and job summaries. Further, technology categorization data is generated based on the user data. The technology categorization data comprises technology category and technology subcategory mapped to a user department and a user division. The system further extracts a keyword and a set of buffer keywords from the user data. Subsequently, the system determines a context of the user data based on the set of buffer keywords of the keyword. The technology used by the user may be determined upon comparing the keyword and the context with a predefined pattern sheet. The system validates the technology with the technology categorization data.
    Type: Application
    Filed: September 9, 2024
    Publication date: March 13, 2025
    Inventors: Tarun Bansal, Anurag Bhatt, Rahul Bhattacharya, Deepak Anchala, Gajanan Sabhahit, Sarthak Gupta, Shubham Gupta, Rahul Kumar Singh, Tanuj Prakash
  • Patent number: 12244566
    Abstract: An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which, when executed by the processing circuitry, cause the network system to receive connection data related to an egress connection of an application service of an application. The instructions cause the network system to analyze the connection data to determine that the egress connection is an anomalous connection. The instructions cause the network system to generate a notification indicative of the egress connection being an anomalous connection and send the notification to a computing device.
    Type: Grant
    Filed: September 21, 2023
    Date of Patent: March 4, 2025
    Assignee: Juniper Networks, Inc.
    Inventors: Raja Kommula, Rahul Gupta, Ganesh Byagoti Matad Sunkada, Tarun Banka, Thayumanavan Sridhar, Raj Yavatkar
  • Patent number: 12238069
    Abstract: Example systems, methods, and storage media are described. An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which, when executed by the processing circuitry, cause the network system to obtain telemetry data. The instructions cause the network system to determine, based on the telemetry data, that an application running on server processing circuitry does not meet at least one service level agreement (SLA) requirement, the server processing circuitry not including processing circuitry resident on a network interface card (NIC). The instructions cause the network system to, based on the application not meeting the at least one SLA requirement, determine to offload at least one component of the application from the server processing circuitry to the processing circuitry resident on the NIC.
    Type: Grant
    Filed: September 21, 2023
    Date of Patent: February 25, 2025
    Assignee: Juniper Networks, Inc.
    Inventors: Raja Kommula, Rahul Gupta, Ganesh Byagoti Matad Sunkada, Tarun Banka, Thayumanavan Sridhar, Raj Yavatkar
  • Patent number: 12232264
    Abstract: In an embodiment, an apparatus and system comprising a first inductor with a first diameter; and a switched inductor including a metal layer and a switch; wherein when the switch is closed the switch connects the metal layer of the switched inductor to form an inductor with a parallel circuit enabling current to flow through the switched conductor; and wherein when the switch is open, current is not enabled to flow through the switched conductor. In another embodiment, a method for tuning a high-Q inductor, the method comprising closing a switch of a switched inductor, wherein the switch connects the switched inductor to a first inductor; wherein closing the switch enables current to flow though the switched inductor as well as the first inductor to change the inductance of the high Q inductor.
    Type: Grant
    Filed: September 9, 2019
    Date of Patent: February 18, 2025
    Assignee: ACACIA COMMUNICATIONS, INC.
    Inventors: Ian Dedic, David Enright, Darren Walker, Tarun Gupta
  • Patent number: 12212592
    Abstract: Various embodiments of the present disclosure are directed to automatic improved network architecture generation. In this regard, embodiments may process data representing a network architecture to generate an improved network architecture that resolves one or more vulnerabilities associated with the network architecture.
    Type: Grant
    Filed: May 1, 2023
    Date of Patent: January 28, 2025
    Assignee: HONEYWELL INTERNATIONAL INC.
    Inventors: Tarun Gupta, Anusha Challa, Chetan Siddapura Kallappa
  • Patent number: 12137111
    Abstract: Various embodiments described herein relate to an asset discovery engine with a deep vulnerabilities scanner with respect to assets in an industrial network. In an embodiment, a request to perform an asset vulnerability assessment of one or more assets within a network is received, the request comprising an asset descriptor describing the one or more assets. In response to the request, aggregated asset property data associated with the one or more assets is obtained based on the asset descriptor. Furthermore, the asset vulnerability assessment is performed based on the aggregated asset property data and asset vulnerability signature data stored in an asset vulnerability signature repository. In response to determining that the asset vulnerability assessment satisfies a defined criterion, one or more actions associated with the network are performed.
    Type: Grant
    Filed: August 31, 2022
    Date of Patent: November 5, 2024
    Assignee: Honeywell International Inc.
    Inventors: Atul Bassi, Tarun Gupta, Rohit Jain, Anusha C, Israel Rozenblit
  • Publication number: 20240333638
    Abstract: Various embodiments described herein relate to providing unidirectional communication of data via a data diode between distinct networks. In an embodiment, an operational technology (OT) data packet associated with one or more asset devices connected to a first network with a first classification is received. Additionally, one or more attributes of the OT data packet are compared to a set of flow rules associated with a flow table for a network switch of the first network. Based at least in part on whether a match is identified between the one or more attributes of the OT data packet and at least one flow rule of the set of flow rules, the OT data packet is transmitted to a second network associated with a second classification.
    Type: Application
    Filed: March 31, 2023
    Publication date: October 3, 2024
    Inventors: Tarun Gupta, Atul Bassi, Anubhav Misra
  • Publication number: 20240323199
    Abstract: Embodiments of the present disclosure provide for remote access of a device, for example an operational technology device or an information technology device, in a manner with improved cybersecurity. Some embodiments receive remote action data from a client device in response to an initiated remote access action of the remote action data from the client device to a remotely accessible device, quarantine the remote action data from the client device, generate malicious determination data indicating whether the remote action data is determined as malicious by processing the remote action data, and determine whether to block transfer of the remote action data to the remotely accessible device based at least in part on the malicious determination data.
    Type: Application
    Filed: March 21, 2023
    Publication date: September 26, 2024
    Inventors: Atul BASSI, Tarun GUPTA, Eli ABRAMSON
  • Patent number: 12058162
    Abstract: A method of cybersecurity performance analyzing for customer site(s) including assets in a networked system including different asset types, and a virtual security engine (VSE) server. The customer site is coupled to a Security Center (SC) including a SC server, and a cybersecurity hardening compliance engine (CHCE). The VSE server collects identification data and security configuration data from the asset types, and transfers the data to a SC database. Responsive to a user request to generate a cybersecurity hardening compliance report, the CHCE sends a query to the SC database to retrieve at least a portion of the data, uploads a cybersecurity benchmark including cybersecurity configuration rules (CCRs) for least a selected asset type, compares the data of the assets to the CCRs, and generates from results of the comparing a cybersecurity report including a quantitative measure of cybersecurity performance for the assets of the selected asset type.
    Type: Grant
    Filed: June 30, 2021
    Date of Patent: August 6, 2024
    Assignee: Honeywell International Inc.
    Inventors: Sagi Barzilay, Israel Rozenblit, Avishay Mezeg, Tarun Gupta, Atul Bassi, Anusha C.
  • Patent number: 12038820
    Abstract: Embodiments of the present disclosure generally provide for control system configuration error processing. At least some example embodiments identify a configuration error set associated with one or more subcomponents of a control system, and providing enhanced processing tools and/or insight with respect to the identified configuration error(s). Example embodiments are configured for collecting a configuration log set associated with a control system; identifying, based on at least the configuration log set and an standard configuration data object, a configuration error set associated with at least one subcomponent device of the control system; generating a configuration report data object based on the identified configuration error set; and causing rendering of a configuration action playback interface, wherein the configuration action playback interface configured based on at least the configuration error set, and wherein the configuration action playback interface is configured for user interaction.
    Type: Grant
    Filed: February 21, 2020
    Date of Patent: July 16, 2024
    Assignee: HONEYWELL INTERNATIONAL INC.
    Inventors: Chetan Siddapura Kallappa, Tarun Gupta, Manjunath Basavaraj Kama
  • Publication number: 20240214863
    Abstract: A method for wireless communication by a first user equipment (UE) includes receiving, from a second UE, a codec mode request (CMR) for a new bit rate. The method also includes transmitting, to a network device, a recommended bit rate (RBR) query in response to the new bit rate exceeding a current bit rate. The method still further includes communicating with the second UE using the new bit rate or the current bit rate. A method of wireless communication by a network device includes transmitting, to an originating UE, an RBR for a new bit rate. The method also includes receiving, from a terminating UE, an RBR query in response to the new bit rate exceeding a current bit rate. The method further includes transmitting, to the terminating UE, a response to the RBR query.
    Type: Application
    Filed: December 22, 2022
    Publication date: June 27, 2024
    Inventors: Tarun GUPTA, Rajan KUMAR, Hemanth Kumar MASARAPU, Pankaj BANSAL, Jitender Reddy ANUGU
  • Publication number: 20240160730
    Abstract: Embodiments of the present disclosure provide for improved methodologies for managing initiation of an automated healing process for operational technology devices in a network. Some embodiments include identifying at least one operational technology (OT) device connected to a network that is vulnerable to at least one cybersecurity risk, where the at least one OT device is wirelessly connected to the network, identifying at least one computer-executable resolution to the at least one cybersecurity risk, executing a simulation that tests performance of the network with resolution of the at least one cybersecurity risk utilizing the at least one computer-executable resolution, generating a solution implementation report based at least in part on the simulation, and determining whether to automatically initiate the at least one computer-executable resolution based at least in part on the solution implementation report.
    Type: Application
    Filed: November 14, 2022
    Publication date: May 16, 2024
    Inventors: Atul BASSI, Tarun GUPTA, Anubhav MISRA
  • Publication number: 20240163300
    Abstract: In various embodiments, network traffic data associated with an industrial network is monitored based on a networking event rule set related to defined networking events. The network traffic data is related to a set of asset devices in communication via the industrial network, and the networking event rule set is used to determine a networking event associated with the set of asset devices. A cybersecurity event level for the networking event is determined based on a comparison between a networking event feature set for the networking event and a predefined cybersecurity event feature set for a set of predefined cybersecurity events. In response to a determination that the cybersecurity event level for the networking event satisfies a predefined cybersecurity threat level threshold, a modification is made to one or more configuration parameters for one or more asset devices from the set of asset devices associated with the networking event.
    Type: Application
    Filed: November 14, 2022
    Publication date: May 16, 2024
    Inventors: Punith KUMAR, Atul BASSI, Chetan Siddapura KALLAPPA, Tarun GUPTA