Patents by Inventor Vijay Desai

Vijay Desai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10127125
    Abstract: Data from an application is analyzed periodically in real-time using a predictive data model to predict potential application failures. Application logs are used to build the predictive data model. The predictive data model includes features created from the application logs which are good predictors of application failures. The predictive data model analyzes and provides anomaly scores for various anomalies for the real-time data collected over a time period. The anomaly scores are compared with a threshold score to predict the probability of occurrences of application failures. If there is a higher probability of occurrence of an incident of application failure, corrective actions to mitigate or reduce the probability of occurrence of the application failure are implemented.
    Type: Grant
    Filed: October 21, 2016
    Date of Patent: November 13, 2018
    Assignee: ACCENTURE GLOBAL SOLUTIONS LIMITED
    Inventors: Mythili Krishnan, Vijay Desai, Narayanaswamy Thimmappa, Mriga Bansal, Kunal Bhowmick
  • Publication number: 20180113773
    Abstract: Data from an application is analyzed periodically in real-time using a predictive data model to predict potential application failures. Application logs are used to build the predictive data model. The predictive data model includes features created from the application logs which are good predictors of application failures. The predictive data model analyzes and provides anomaly scores for various anomalies for the real-time data collected over a time period. The anomaly scores are compared with a threshold score to predict the probability of occurrences of application failures. If there is a higher probability of occurrence of an incident of application failure, corrective actions to mitigate or reduce the probability of occurrence of the application failure are implemented.
    Type: Application
    Filed: October 21, 2016
    Publication date: April 26, 2018
    Applicant: Accenture Global Solutions Limited
    Inventors: Mythili KRISHNAN, Vijay DESAI, Narayanaswamy THIMMAPPA, Mriga BANSAL, Kunal BHOWMICK
  • Publication number: 20140279527
    Abstract: Methods, systems, computer-readable media, and apparatuses for detecting unauthorized activity are disclosed. Detecting unauthorized activity is done by accessing first data that represents activity involving a first service provided to a customer, accessing second data that represents activity involving a second service provided to a customer. The activity involving the second service and the activity involving the first service both include authorized customer activity, and the activity associated with the second service further includes unauthorized activity. The first data is filtered using a filtering criteria and a portion of the first data is selected to be retained. The second data and the retained portion of the first data are analyzed, and the analysis includes classifying the activity associated with the second service in a way that distinguishes the unauthorized activity from the authorized activity associated with the second service.
    Type: Application
    Filed: October 24, 2013
    Publication date: September 18, 2014
    Applicant: SAS Institute Inc.
    Inventors: Brian Lee Duke, Paul C. Dulany, Vijay Desai, Kannan Shashank Shah
  • Publication number: 20090067625
    Abstract: As transmitted digital content is vulnerable commodity, its protection from piracy is receiving significant attention. It is possible today to extract the digital content from the temporary storage during processing and also form interfaces during transfer between blocks in a receiver system. When content is processed and frames are temporarily stored in external memory, when frames are transmitted to the display through a LVDS, or other screen/panel interface, they are transmitted non-secured. When captured at these points of vulnerability, the full resolution image is available for reproduction. According to the present invention additional security protection is enabled at these points of vulnerability. The disclosed practice of randomized scrambling of bits or groups of bits at the points of vulnerability in a digital transmit-receive system prevent pirating of useable content.
    Type: Application
    Filed: September 7, 2007
    Publication date: March 12, 2009
    Inventors: Pankaj Patel, Vijay Desai