Patents by Inventor Venkata Subramanian Jayaraman

Venkata Subramanian Jayaraman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11768723
    Abstract: Method and system for predicting failures in interconnected systems based on quantum computing is disclosed. The method may include identifying a set of unique patterns from input data received from a plurality of input data sources, determining a correlation between at least two input data sources, creating a plurality of sets of clusters corresponding to the plurality of input data sources based on the correlation, extracting data associated with each of the set of unique patterns based on the plurality of sets of clusters, predicting, based on the extracted data, a failure of at least one interconnected system using a trained ML model, processing the extracted data associated with each of the set of unique patterns and information associated with the predicted failure through a quantum computing layer, and generating, through the quantum computing layer, at least one corrective action for the at least one interconnected system.
    Type: Grant
    Filed: March 27, 2020
    Date of Patent: September 26, 2023
    Assignee: Wipro Limited
    Inventors: Venkata Subramanian Jayaraman, Sumithra Sundaresan
  • Patent number: 11295602
    Abstract: The disclosure relates to a system and method for providing enhanced security of physical assets within a physical infrastructure. The method includes receiving an overall layout of the physical infrastructure and multi-modal input with respect to the physical asset from a plurality of sensors installed within the physical infrastructure. The multi-modal input includes acoustic signal generated by or reflected off the physical asset and captured by a set of acoustic sensors. The method further includes generating a digital asset corresponding to the physical asset by determining an identification, a location, a shape, a size, and a behavior of the physical asset based on the multi-modal input and the overall layout, detecting one or more events of interest involving the digital asset based on the behavior of the physical asset, and simulating the one or more events of interest to evaluate a possible fault or a possible security threat.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: April 5, 2022
    Assignee: Wipro Limited
    Inventor: Venkata Subramanian Jayaraman
  • Patent number: 11151019
    Abstract: Systems and methods for dynamically testing product and process of production environment in virtual testing environment are disclosed. A testing system may retrieve production data related to each production activity corresponding to events executing in real-time. Each production activity is related to product and process of production environment. Further, testing system generates each scenario of production environment in virtual testing environment in real-time, based on sequencing of each event and creates, in the virtual testing environment, virtual process and virtual product corresponding to process and product of production environment, based on at least the events, generated scenarios, and historical data. Finally, testing system re-plays each production activity in virtual testing environment for testing virtual process and virtual product.
    Type: Grant
    Filed: March 26, 2019
    Date of Patent: October 19, 2021
    Assignee: Wipro Limited
    Inventors: Venkata Subramanian Jayaraman, Preetha Bolar, Vijay Kalyan Nanduri
  • Publication number: 20210304587
    Abstract: The disclosure relates to a system and method for providing enhanced security of physical assets within a physical infrastructure. The method includes receiving an overall layout of the physical infrastructure and multi-modal input with respect to the physical asset from a plurality of sensors installed within the physical infrastructure. The multi-modal input includes acoustic signal generated by or reflected off the physical asset and captured by a set of acoustic sensors. The method further includes generating a digital asset corresponding to the physical asset by determining an identification, a location, a shape, a size, and a behavior of the physical asset based on the multi-modal input and the overall layout, detecting one or more events of interest involving the digital asset based on the behavior of the physical asset, and simulating the one or more events of interest to evaluate a possible fault or a possible security threat.
    Type: Application
    Filed: March 31, 2020
    Publication date: September 30, 2021
    Inventor: Venkata Subramanian JAYARAMAN
  • Publication number: 20210256411
    Abstract: Method and system for predicting failures in interconnected systems based on quantum computing is disclosed. The method may include identifying a set of unique patterns from input data received from a plurality of input data sources, determining a correlation between at least two input data sources, creating a plurality of sets of clusters corresponding to the plurality of input data sources based on the correlation, extracting data associated with each of the set of unique patterns based on the plurality of sets of clusters, predicting, based on the extracted data, a failure of at least one interconnected system using a trained ML model, processing the extracted data associated with each of the set of unique patterns and information associated with the predicted failure through a quantum computing layer, and generating, through the quantum computing layer, at least one corrective action for the at least one interconnected system.
    Type: Application
    Filed: March 27, 2020
    Publication date: August 19, 2021
    Inventors: Venkata Subramanian JAYARAMAN, Sumithra SUNDARESAN
  • Publication number: 20210202109
    Abstract: Disclosed herein is a method and system for real-time health data management and prediction of health trends for patients. The system receives patient data from patients, doctors treating patients and one or more external sources. Upon receiving the patient data, system generates three tables for storing, general information, health information and preference information of patients. Thereafter, the system generates a distributed ledger in real-time for each patient based on details of each patient from three tables. The distributed ledger comprises consolidated health data from all the three tables. The system provides a selectively authorized access to the distributed ledger based on biometric information of the patient. Further, based on the consolidated health data, the system manages health data of each of the one or more patients and predicts health trends of each of the one or more patients using Artificial Intelligence (AI) Machine Learning (ML) techniques.
    Type: Application
    Filed: February 20, 2020
    Publication date: July 1, 2021
    Inventors: Venkata Subramanian JAYARAMAN, Sumithra SUNDARESAN
  • Publication number: 20210099442
    Abstract: The present invention relates to a method of detecting false authentication of a user from a device connected to a network. The method includes receiving one or more parameters associated with the user while the user is logging in to at least one application in the device. Further, a score is generated by associating a binary value to the one or more parameters. Furthermore, reference parameters of the user is retrieved from a database and compared with the one or more parameters. Upon successful validation, the user may be allowed to access the device. Upon unsuccessful validation, one or more queries may be provided to the user. Based on a response received from the user, a false authentication of the user is determined and the user is denied access to the at least one application.
    Type: Application
    Filed: November 26, 2019
    Publication date: April 1, 2021
    Inventors: Venkata Subramanian JAYARAMAN, Sumithra SUNDARESAN, Shashi KUMAR
  • Patent number: 10965575
    Abstract: A method for providing lawful interception information for an Internet of Things network (IoT Network) is provided. The method is performed by a topology of probes and comprises: receiving, through an interface, a request for information about a lawful interception target, the request including a specification for the information to be tracked and reported; generating a hierarchy of information elements based on the specification; determining a set of data sources for providing the requested information according to the hierarchy of information elements; determining a hierarchy of probes based on the set of the data sources; configuring the topology of probes based on a set of configurations; activating LI operation in the topology of probes; performing LI operation by the topology of probes; verifying effectiveness of reporting conforming to reporting requirements and taking corrective action; and updating learning data in the historical database at the end of LI operation.
    Type: Grant
    Filed: March 30, 2017
    Date of Patent: March 30, 2021
    Assignee: Wipro Limited
    Inventors: Sudipta Ghosh, Swaminathan Seetharaman, Venkata Subramanian Jayaraman
  • Publication number: 20200285565
    Abstract: The present disclosure is related to field of software testing, disclosing method and system for dynamically testing product and process of production environment in virtual testing environment. Testing system retrieves production data related to each production activity corresponding to events executing in real-time. Each production activity is related to product and process of production environment. Further, testing system generates each scenario of production environment in virtual testing environment in real-time, based on sequencing of each event and creates, in the virtual testing environment, virtual process and virtual product corresponding to process and product of production environment, based on at least the events, generated scenarios, and historical data. Finally, testing system re-plays each production activity in virtual testing environment for testing virtual process and virtual product.
    Type: Application
    Filed: March 26, 2019
    Publication date: September 10, 2020
    Inventors: Venkata Subramanian Jayaraman, Preetha Bolar, Vijay Kalyan Nanduri
  • Publication number: 20200226222
    Abstract: The present disclosure is related to a method and a system for preventing failures of a product of real production environment in virtual testing environment. A virtual process corresponding to each physical process related to the product is created and replicated in real-time in the virtual testing environment based on input data related to each physical process. Further one or more errors that occurred during implementation of each virtual process and corresponding error pattern are detected and the error pattern corresponding to each of the one or more errors is analyzed with corresponding historical pattern to predict the failures of the product. Finally a solution for resolving the one or more errors is determined to prevent occurrence of the predicted failures in each physical process. The present disclosure provides accurate failure predictions and accurate remedies for preventing the predicted failures based on real-time data.
    Type: Application
    Filed: January 10, 2019
    Publication date: July 16, 2020
    Inventors: Venkata Subramanian Jayaraman, Kavitha Gopalakrishnan, Piyush Batwal
  • Patent number: 10630728
    Abstract: This disclosure relates generally to methods and systems for minimizing privacy intrusion during internet of things lawful interception. In one embodiment, a topology of probes system for providing lawful interception information for an internet of things network is provided. The topology of probes system may comprise a super-probe connected to a lawful interception gateway by a set of LI-interfaces and a hierarchy of probes connected to the super-probe. Further, the super-probe and the hierarchy-of-probes may be configured to perform LI operation according to one or more privacy requirement settings and to provide lawful interception information collected by the LI operation. Additionally, the privacy requirement settings may comprise rules that govern at least one of: content-based data exposure, prevention of access of information by predetermined users, and obfuscation of predetermined information.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: April 21, 2020
    Assignee: Wipro Limited
    Inventors: Sudipta Ghosh, Swaminathan Seetharaman, Venkata Subramanian Jayaraman
  • Patent number: 10514999
    Abstract: A method and a system are described for determining an effectiveness index of a software test environment. The method includes receiving a plurality of factors associated with a plurality of software modules of a plurality of software under test from a plurality of external systems. The method includes identifying the software test environment based on one or more values associated with each of the plurality of factors. The method includes collecting failure logs of each of the plurality of factors for the identified software test environment. The method includes assigning a score to each of the plurality of factors based on collected failure logs. The method includes determining an effectiveness index of the identified software test environment for each of the plurality of software modules based on the score.
    Type: Grant
    Filed: May 24, 2017
    Date of Patent: December 24, 2019
    Assignee: Wipro Limited
    Inventors: Venkata Subramanian Jayaraman, Sumithra Sunderasan
  • Patent number: 10380372
    Abstract: In one embodiment, a method for providing access to big data is disclosed. The method includes receiving biometric data of a user to provide access to columns of a table storing the big data, wherein one or more columns of the table are masked based on one or more data parameters and authenticating the user by comparing the biometric data of the user with pre-stored biometric data, wherein the pre-stored biometric data is retrieved from a biometric database. Further, the method includes providing upon the authentication, selective access to each column of the table based on a pre-defined user privilege for each column.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: August 13, 2019
    Assignee: Wipro Limited
    Inventors: Venkata Subramanian Jayaraman, Sumithra Sundaresan
  • Patent number: 10268824
    Abstract: The present disclosure relates to a method and a system for identifying one or more test cases for penetration testing of an application associated with an entity. An application testing system receives data related to application from one or more data sources and uses the data to determine threat score, vulnerability score, human error score, business impact score and popularity score. Further, application testing system identifies threat quantifier value based on threat score, vulnerability score and human error score. The application testing system also determines impact quantifier value based on business score and popularity score. The application testing system then determines threat severity level and impact severity level based on threat quantifier value and impact quantifier value. Based on the determined threat severity level and the impact severity level, the application testing system identifies the one or more test cases for performing penetration testing of the application.
    Type: Grant
    Filed: March 15, 2016
    Date of Patent: April 23, 2019
    Assignee: Wipro Limited
    Inventors: Venkata Subramanian Jayaraman, Sumithra Sundaresan
  • Publication number: 20190095635
    Abstract: A method and device are described for managing system access to a user. The method includes receiving at least one of user-profile parameters, work-profile parameters and health parameters associated with the user. The method includes determining, one or more patterns from the at least one of user-profile parameters, work-profile parameters and health parameters associated with the user. The method further includes determining a stress level of the user based on the one or more patterns. The method further includes, managing access to at least one of one or more devices, user accounts, or user access cards associated with the user based on the stress level.
    Type: Application
    Filed: November 21, 2017
    Publication date: March 28, 2019
    Inventors: Venkata Subramanian Jayaraman, Sumithra Sunderasan
  • Patent number: 10230614
    Abstract: A system and method for improving integration testing in a cloud computing environment includes collecting one or more input parameters associated with each of one or more products, deployed in cloud computing environment, from one or more external resources and test management systems. The input parameters include one or more defect parameters, user requirements, test parameters or performance parameters associated with the product. The integration testing improvement system determines one or more failure issues associated with the product and analyzes the behavior of the product over a predetermined time period to identify a failure pattern associated with the product. Each of the determined failure issues is mapped with the identified failure pattern to detect one or more critical scenarios in each of the products. Later the critical scenarios are automated by executing associated test scripts thereby improving the integration testing in the cloud computing environment.
    Type: Grant
    Filed: November 17, 2015
    Date of Patent: March 12, 2019
    Assignee: Wipro Limited
    Inventors: Venkata Subramanian Jayaraman, Sumithra Sundaresan
  • Patent number: 10218743
    Abstract: This disclosure relates to intent based Lawful Interception (LI) in a communication network. The method includes interpreting an LI intent of a Law Enforcement Agency (LEA) based on LI intent information provided by the LEA; determining LI content required by the LEA and at least one LI trigger associated with the LI content based on an analysis of the LI intent information; monitoring ongoing communication session associated with an LI target user to detect matching of the at least one LI trigger; processing duplicated LI content in response to matching of the at least one LI trigger; inserting at least one marker tag in the duplicated LI content to generate marked LI content; and sending the marked LI content and a notification comprising information associated with matching of the at least one LI trigger and the at least one marker tag to the LEA.
    Type: Grant
    Filed: February 24, 2017
    Date of Patent: February 26, 2019
    Assignee: Wipro Limited
    Inventors: Swaminathan Seetharaman, Venkata Subramanian Jayaraman
  • Patent number: 10127134
    Abstract: Devices and methods for identifying relevant features of software product are described. The system retrieves requirement data, test case data and defect data associated with plurality of features of the software product. The requirement data comprises de-scoped requirements which indicate those requirements which are not required for performing the regression testing. The device further computes an impact score, a test effort score, and a weightage factor for each of the plurality of features based on the requirement data, the test case data and the defect data respectively. Based on the computed impact score, the test effort score, and the weightage factor, the device further determines a regression factor for each of the plurality of features. Further, the device identifies one or more relevant features amongst the plurality of features based on the regression factor. This way, the device facilitates structured regression planning which optimizes the overall performance of the device.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: November 13, 2018
    Assignee: Wipro Limited
    Inventors: Venkata Subramanian Jayaraman, Sumithra Sundaresan
  • Publication number: 20180285244
    Abstract: A method and a system are described for determining an effectiveness index of a software test environment. The method includes receiving a plurality of factors associated with a plurality of software modules of a plurality of software under test from a plurality of external systems. The method includes identifying the software test environment based on one or more values associated with each of the plurality of factors. The method includes collecting failure logs of each of the plurality of factors for the identified software test environment. The method includes assigning a score to each of the plurality of factors based on collected failure logs. The method includes determining an effectiveness index of the identified software test environment for each of the plurality of software modules based on the score.
    Type: Application
    Filed: May 24, 2017
    Publication date: October 4, 2018
    Inventors: VENKATA SUBRAMANIAN JAYARAMAN, SUMITHRA SUNDERASAN
  • Publication number: 20180285589
    Abstract: In one embodiment, a method for providing access to big data is disclosed. The method includes receiving biometric data of a user to provide access to columns of a table storing the big data, wherein one or more columns of the table are masked based on one or more data parameters and authenticating the user by comparing the biometric data of the user with pre-stored biometric data, wherein the pre-stored biometric data is retrieved from a biometric database. Further, the method includes providing upon the authentication, selective access to each column of the table based on a pre-defined user privilege for each column.
    Type: Application
    Filed: March 28, 2017
    Publication date: October 4, 2018
    Inventors: Venkata Subramanian Jayaraman, Sumithra Sundaresan