Patents by Inventor Vijay Chauhan

Vijay Chauhan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250036250
    Abstract: The current document is directed to an infrastructure-as-code (“IaC”) cloud-infrastructure-management service or system including a graph-based user interface that displays, and that provides for generating and editing, cloud-infrastructure-specification-and-configuration files. The IaC cloud-infrastructure-management service or system processes a set of infrastructure-specification-and-configuration files to identify specified resources and relationships between resources. The resources and relationships are then stored as a graph, along with various indices that can be used for quickly searching the graph for relationships and resources of interest. A graph-based user interface allows users to view portions of the graph, navigate through the graph, search for particular resources and relationships, and edit the infrastructure-specification-and-configuration files.
    Type: Application
    Filed: October 20, 2023
    Publication date: January 30, 2025
    Inventors: PRIYANK AGARWAL, NITIN RAMACHANDRA, VALENTINA LEONIDOVNA REUTOVA, PRAVEEN KUMAR, VIJAY CHAUHAN
  • Publication number: 20250021370
    Abstract: The current document is directed to an infrastructure-as-code (“IaC”) cloud-infrastructure-management service or system that automatically generates a parameterized cloud template that represents an already deployed cloud-based infrastructure managed by a different cloud-infrastructure-management service or system and that uses the parameterized cloud template to assume management of the already deployed cloud-based infrastructure. The IaC cloud-infrastructure-management service or system uses an infrastructure-discovery service as well as data representations of the already deployed cloud-based infrastructure generated by the different cloud-infrastructure-management service or system to generate the parameterized cloud template and to detect drift in the already deployed cloud-based infrastructure.
    Type: Application
    Filed: October 17, 2023
    Publication date: January 16, 2025
    Inventors: PRIYANK AGARWAL, PRAVEEN KUMAR, VALENTINA LEONIDOVNA REUTOVA, VIJAY CHAUHAN, ASHMANTAK PANDEY
  • Publication number: 20250021540
    Abstract: The current document is directed to an infrastructure-as-code (“IaC”) cloud-infrastructure-management service or system that automatically segregates resource descriptors into category-associated files. In a first mode of operation, an automatic segregator receives one or more raw specification-and-configuration files and partitions the resources specified in the one or more raw specification-and-configuration files into category-associated resource groups. The specifications for the resources that are then stored in category-associated files that may, in turn, be stored in category-associated subdirectories of a file-system directory. In a second mode of operation, the automatic segregator transforms a first type of specification-and-configuration files within a first file-system directory into a second type of equivalent specification-and-configuration files within a second file-system directory.
    Type: Application
    Filed: October 19, 2023
    Publication date: January 16, 2025
    Inventors: PRIYANK AGARWAL, Deepansha Goyal, Praveen Kumar, Suchitha Shet, Vijay Chauhan
  • Publication number: 20250023771
    Abstract: The current document is directed to an infrastructure-as-code (“IaC”) cloud-infrastructure-management service or system that automatically compacts, and enhances the manageability of, IaC specification-and-configuration files. In a disclosed implementation, specification-and-configuration files used by a first cloud-infrastructure-management service or system to deploy cloud-based infrastructure in a cloud-computing facility are used by a different cloud-infrastructure-management service or system to compact and enhance a parameterized cloud template generated by the different cloud-infrastructure-management service or system to represent the already deployed cloud-based infrastructure. Compaction and manageability enhancement are implemented using control structures and constructs of a template language introduced into the parameterized cloud template.
    Type: Application
    Filed: October 19, 2023
    Publication date: January 16, 2025
    Inventors: VIJAY CHAUHAN, PRIYANK AGARWAL, PRAVEEN KUMAR, NITIN RAMACHANDRA, AAKASH DAS
  • Patent number: 12120170
    Abstract: Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.
    Type: Grant
    Filed: October 17, 2022
    Date of Patent: October 15, 2024
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Liu-Yuan Lai, Wenhui Yu, Luke Murphey, David Hazekamp
  • Patent number: 11641372
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: May 27, 2022
    Date of Patent: May 2, 2023
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 11477263
    Abstract: Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.
    Type: Grant
    Filed: July 6, 2020
    Date of Patent: October 18, 2022
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Liu-Yuan Lai, Wenhui Yu, Luke Murphey, David Hazekamp
  • Patent number: 11363047
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: September 11, 2020
    Date of Patent: June 14, 2022
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 11288283
    Abstract: A data intake and query system measures an amount of raw data ingested by the system during defined periods of time. As used herein, ingesting raw data generally refers to receiving the raw data from one or more computing devices and processing the data for storage and searchability. Processing the data may include, for example, parsing the raw data into “events,” where each event includes a portion of the received data and is associated with a timestamp. Based on a calculated number of events generated by the system during one or more defined time periods, the system may calculate various metrics including, but not limited to, a number of events generated during a particular day, a number of events generated per day over a period of time, a maximum number of events generated in a day over a period of time, an average number of events generated per day, etc.
    Type: Grant
    Filed: April 25, 2019
    Date of Patent: March 29, 2022
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Banipal Shahbaz, David Hazekamp
  • Patent number: 11132111
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: September 28, 2021
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey
  • Publication number: 20210067535
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Application
    Filed: September 11, 2020
    Publication date: March 4, 2021
    Applicant: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Publication number: 20210011932
    Abstract: In various implementations, a computer-implemented method for remotely managing settings of applications includes receiving a network communication from a managed device, the received network communication including a client-side hash value. The method further includes identifying settings for an application on the managed device in response to the receiving of the network communication, where the identified settings include configuration instructions for the application. Based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, at least some of the identified settings are transmitted to the managed device. The transmitting of the at least some of the identified settings can be based on the comparison indicating a mismatch between the received client-side hash value and the server-side hash value.
    Type: Application
    Filed: September 30, 2020
    Publication date: January 14, 2021
    Inventors: Vijay Chauhan, Banipal Shahbaz, David Hazekamp
  • Patent number: 10848510
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: November 24, 2020
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu
  • Patent number: 10817544
    Abstract: A data intake and query system measures an amount of raw data ingested by the system during defined periods of time. As used herein, ingesting raw data generally refers to receiving the raw data from one or more computing devices and processing the data for storage and searchability. Processing the data may include, for example, parsing the raw data into “events,” where each event includes a portion of the received data and is associated with a timestamp. Based on a calculated number of events generated by the system during one or more defined time periods, the system may calculate various metrics including, but not limited to, a number of events generated during a particular day, a number of events generated per day over a period of time, a maximum number of events generated in a day over a period of time, an average number of events generated per day, etc.
    Type: Grant
    Filed: April 30, 2015
    Date of Patent: October 27, 2020
    Assignee: SPLUNK INC.
    Inventors: Vijay Chauhan, Banipal Shahbaz, David Hazekamp
  • Publication number: 20200336532
    Abstract: Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.
    Type: Application
    Filed: July 6, 2020
    Publication date: October 22, 2020
    Inventors: Vijay Chauhan, Liu-Yuan Lai, Wenhui Yu, Luke Murphey, David Hazekamp
  • Patent number: 10812514
    Abstract: The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification mechanism for identifying a security risk from time-series event data generated from network packets captured by one or more remote capture agents distributed across a network. Next, the system provides a capture trigger for generating additional time-series event data from the network packets on the one or more remote capture agents based on the security risk, wherein the additional time-series event data includes one or more event attributes.
    Type: Grant
    Filed: December 20, 2018
    Date of Patent: October 20, 2020
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Devendra M. Badhani, Luke K. Murphey, David Hazekamp
  • Patent number: 10778712
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: September 15, 2020
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 10735492
    Abstract: Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.
    Type: Grant
    Filed: April 29, 2019
    Date of Patent: August 4, 2020
    Assignee: SPLUNK Inc.
    Inventors: Vijay Chauhan, Liu-Yuan Lai, Wenhui Yu, Luke Murphey, David Hazekamp
  • Publication number: 20200193020
    Abstract: Systems and methods are disclosed for associating an entity with a risk score that may indicate a security threat associated with the entity's activity. An exemplary method may involve monitoring the activity of a subset of the set of entities (e.g., entities included in a watch list) by executing a search query against events indicating the activity of the subset of entities. The events may be associated with timestamps and may include machine data. Executing the search query may produce search results that pertain to activity of a particular entity from the subset. The search results may be evaluated based on a triggering condition corresponding to the statistical baseline. When the triggering condition is met, a risk score for the particular entity may be updated. The updated risk score may be displayed to a user via a graphical user interface (GUI).
    Type: Application
    Filed: November 15, 2019
    Publication date: June 18, 2020
    Inventors: Ravi Iyer, Devendra Badhani, Vijay Chauhan
  • Patent number: 10496816
    Abstract: Systems and methods are disclosed for associating an entity with a risk score that may indicate a security threat associated with the entity's activity. An exemplary method may involve monitoring the activity of a subset of the set of entities (e.g., entities included in a watch list) by executing a search query against events indicating the activity of the subset of entities. The events may be associated with timestamps and may include machine data. Executing the search query may produce search results that pertain to activity of a particular entity from the subset. The search results may be evaluated based on a triggering condition corresponding to the statistical baseline. When the triggering condition is met, a risk score for the particular entity may be updated. The updated risk score may be displayed to a user via a graphical user interface (GUI).
    Type: Grant
    Filed: December 31, 2018
    Date of Patent: December 3, 2019
    Assignee: SPLUNK INC.
    Inventors: Ravi Iyer, Devendra Badhani, Vijay Chauhan