Patents by Inventor Udayan Kumar

Udayan Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240135323
    Abstract: Systems and methods for providing ticket support using a machine learning model trained using clusters of support tickets that are clustered based on similarity of resolution commands are provided. The system extracts commands used to resolve prior tickets and creates clusters of resolved tickets based on similarity of the commands. For each cluster, problem statements are extracted from the resolved tickets. The system trains a machine learning model with the extracted problem statements to identify a cluster number for each cluster. With a new support ticket, the system extracts a problem statement from the new ticket and identifies a predicted cluster number by applying the trained machine learning mode! to the problem statement from the new ticket. Based on the predicted cluster number, one or more commands used to resolve the prior tickets in the cluster corresponding to the predicted cluster number are accessed and provided to a requesting user.
    Type: Application
    Filed: February 21, 2022
    Publication date: April 25, 2024
    Inventors: Udayan KUMAR, Rakesh Jayadev NAMINENI
  • Publication number: 20230186052
    Abstract: A method for training a neural network for linking incident management tickets is provided. A first training set of linked pairs of incident management tickets is generated. Each pair is labeled as being linked and comprises first and second tickets having first text features and second features. A Siamese neural network model is trained using the first text features as inputs to an input layer of the model. The input layer is configured to generate first and second input embeddings for the first and second tickets, respectively. The model is trained using the first and second input embeddings and the second features as inputs to an output layer of the model. The output layer is configured to generate first and second output embeddings for the first and second tickets, respectively. The model is trained using a contrastive loss function between the first and second output embeddings.
    Type: Application
    Filed: December 15, 2021
    Publication date: June 15, 2023
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Jimmy Chi Kin WONG, Rakesh J. Namineni, Mohit Verma, Udayan Kumar
  • Patent number: 11218386
    Abstract: Techniques for managing support computing services in computing systems are disclosed. One example technique includes analyzing data representing a service ticket having data representing multiple messages exchanged between the user and a support entity of a support tier in the computing system. Based on the analysis, an interaction pattern in the multiple messages can be identified. The interaction pattern includes a sequence of words or phrases arranged in a chronological order. The method can further include determining whether the identified interaction pattern matches one or more interaction patterns corresponding to previously escalated service tickets and triggering a notification of the immediate escalation of the service ticket to another support entity in another support tier in response to determining that the interaction pattern matches one of the one or more interaction patterns corresponding to previously escalated service tickets.
    Type: Grant
    Filed: September 23, 2019
    Date of Patent: January 4, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Udayan Kumar, Nishant R. Bhatt, Rakesh Namineni, Manoj Kumar, Michael David Helm, Cole Robert Fornia, Chitra Mandyam, Ramanathan Muthiah
  • Patent number: 11099921
    Abstract: A system may include a processing unit; a storage device comprising instructions, which when executed by the processing unit, configure the processing unit to perform operations comprising: retrieving a meeting count of meetings scheduled during a future time period; generating a predicted usage level of a service during the future time period based on the meeting count; determining a resource modification for the service based on the predicted usage level; and implementing the resource modification prior to the future time period.
    Type: Grant
    Filed: July 9, 2019
    Date of Patent: August 24, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Udayan Kumar, Rakesh Jayadev Namineni
  • Publication number: 20210092029
    Abstract: Techniques for managing support computing services in computing systems are disclosed. One example technique includes analyzing data representing a service ticket having data representing multiple messages exchanged between the user and a support entity of a support tier in the computing system. Based on the analysis, an interaction pattern in the multiple messages can be identified. The interaction pattern includes a sequence of words or phrases arranged in a chronological order. The method can further include determining whether the identified interaction pattern matches one or more interaction patterns corresponding to previously escalated service tickets and triggering a notification of the immediate escalation of the service ticket to another support entity in another support tier in response to determining that the interaction pattern matches one of the one or more interaction patterns corresponding to previously escalated service tickets.
    Type: Application
    Filed: September 23, 2019
    Publication date: March 25, 2021
    Inventors: Udayan Kumar, Nishant R. Bhatt, Rakesh Namineni, Manoj Kumar, Michael David Helm, Cole Robert Fornia, Chitra Mandyam, Ramanathan Muthiah
  • Publication number: 20210011766
    Abstract: A system may include a processing unit; a storage device comprising instructions, which when executed by the processing unit, configure the processing unit to perform operations comprising: retrieving a meeting count of meetings scheduled during a future time period; generating a predicted usage level of a service during the future time period based on the meeting count; determining a resource modification for the service based on the predicted usage level; and implementing the resource modification prior to the future time period.
    Type: Application
    Filed: July 9, 2019
    Publication date: January 14, 2021
    Inventors: Udayan Kumar, Rakesh Jayadev Namineni
  • Publication number: 20210012639
    Abstract: A system may include a processing unit; a storage device comprising instructions, which when executed by the processing unit, configure the processing unit to perform operations comprising: receiving a service outage alert for a service used by an entity; retrieving a current count of non-recurring meetings for the entity; determining that the service outage alert is a false positive based on a current service load for the service and the current count; and based on the determining, suppressing the service outage alert.
    Type: Application
    Filed: July 9, 2019
    Publication date: January 14, 2021
    Inventors: Udayan Kumar, Rakesh Jayadev Namineni
  • Patent number: 10891849
    Abstract: A system may include a processing unit; a storage device comprising instructions, which when executed by the processing unit, configure the processing unit to perform operations comprising: receiving a service outage alert for a service used by an entity; retrieving a current count of non-recurring meetings for the entity; determining that the service outage alert is a false positive based on a current service load for the service and the current count; and based on the determining, suppressing the service outage alert.
    Type: Grant
    Filed: July 9, 2019
    Date of Patent: January 12, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Udayan Kumar, Rakesh Jayadev Namineni
  • Patent number: 9787718
    Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.
    Type: Grant
    Filed: January 13, 2015
    Date of Patent: October 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
  • Publication number: 20150163247
    Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.
    Type: Application
    Filed: January 13, 2015
    Publication date: June 11, 2015
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
  • Patent number: 8990883
    Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.
    Type: Grant
    Filed: January 2, 2013
    Date of Patent: March 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar
  • Publication number: 20140189783
    Abstract: A method, process, and associated systems for policy-based development and runtime control of mobile applications. Security objects that describe or enforce security policies are embedded into the source code of an enhanced application while the application is being developed. When a user attempts to launch the enhanced application on a mobile device, the security objects are updated to match a latest valid version of the objects stored on an enterprise server. The security objects may be further updated at other times. Global security policies, which affect the entire enterprise and which may deny the application permission to launch, are enforced by a global security policy stored within one of the updated security objects. If the application does run, application-specific security policies contained in the updated security objects modify application behavior at runtime in order to enforce application-specific security policies.
    Type: Application
    Filed: January 2, 2013
    Publication date: July 3, 2014
    Applicant: International Business Machines Corporation
    Inventors: Shalini Kapoor, Palanivel A. Kodeswaran, Udayan Kumar, Vikrant Nandakumar