Patents by Inventor Vijay Erramilli

Vijay Erramilli has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11954189
    Abstract: A method and system of authenticating a user logon builds a user logon profile with a plurality of user logon features gathered during at least one successful attempted user logon, determines a logon feature novelty score for each feature, receives a user logon request for authentication and extracts current user logon features, retrieves corresponding logon feature novelty scores, determines a first distance function score for the corresponding logon feature novelty scores of the current user logon features, builds a failed logon attempt database, determines a failed logon feature novelty score, extracts the failed logon feature novelty scores corresponding to current user logon features, determines a second distance function score for the corresponding failed logon feature novelty scores of the current user logon features, and determining to one of allow or deny the user logon request based on at least one of the first distance function score and the second distance function score.
    Type: Grant
    Filed: January 31, 2022
    Date of Patent: April 9, 2024
    Assignee: Salesforce, Inc.
    Inventors: Vijay Erramilli, Regunathan Radhakrishnan, Anuj Gargeya Malkapuram
  • Publication number: 20240022604
    Abstract: Systems, devices, and techniques are disclosed for security configuration evaluation. A binary representation of a reference security configuration for an application may be generated. The binary representation of the reference security configuration for the application may be hashed to generate a reference hash for the application. Data for an instance security configuration for an instance of the application may be received. A binary representation of the instance security configuration may be generated from the received data for the instance security configuration. The binary representation of the instance security configuration may be hashed to generate an instance hash. The computing device may determine the distance between the reference hash and the instance hash. The instance security configuration may be determined to be secure if the distance is not greater than a threshold.
    Type: Application
    Filed: July 15, 2022
    Publication date: January 18, 2024
    Inventors: Regunathan Radhakrishnan, Vijay Erramilli, Anuj Gargeya Malkapuram
  • Publication number: 20230244766
    Abstract: A method and system of authenticating a user logon builds a user logon profile with a plurality of user logon features gathered during at least one successful attempted user logon, determines a logon feature novelty score for each feature, receives a user logon request for authentication and extracts current user logon features, retrieves corresponding logon feature novelty scores, determines a first distance function score for the corresponding logon feature novelty scores of the current user logon features, builds a failed logon attempt database, determines a failed logon feature novelty score, extracts the failed logon feature novelty scores corresponding to current user logon features, determines a second distance function score for the corresponding failed logon feature novelty scores of the current user logon features, and determining to one of allow or deny the user logon request based on at least one of the first distance function score and the second distance function score.
    Type: Application
    Filed: January 31, 2022
    Publication date: August 3, 2023
    Inventors: Vijay Erramilli, Regunathan Radhakrishnan, Anuj Gargeya Malkapuram
  • Publication number: 20230229763
    Abstract: Methods, computer readable media, and devices to automatically construct kill-chain from security alerts are disclosed. One method may include collecting a plurality of security alerts, receiving a selection of a high severity security alert associated with a node and a user from among the plurality of security alerts, creating a security narrative for the high severity security alert by providing a set of historical security alerts to a deep learning architecture, the set including security alerts selected based on a relation to the node and the user, and identifying a subset of the set of historical security alerts, including security alerts relevant to the high severity security alert, in a reverse time order by the deep learning architecture, and providing the security narrative as part of a response to the high severity security alert.
    Type: Application
    Filed: January 19, 2022
    Publication date: July 20, 2023
    Inventors: Regunathan Radhakrishnan, Vijay Erramilli, Anirudh Kondaveeti
  • Publication number: 20230118341
    Abstract: Methods, apparatuses, and computer readable media are disclosed. An application server may receive a dataset that includes records associated with user device interactions with a computer system. The application server may modify one or more records according to a data modification metric. The modifying may result in a modified dataset that satisfies a similarity metric defining a permissible deviation between the received dataset and the modified dataset according to a deviation threshold. The data modification metric may satisfy the similarity metric and may define a deviation in the modified dataset that results in an expected classification by the machine learning predictive model to classify the deviation in the modified dataset as an outlier event. The application server may process the modified dataset with the machine learning predictive model to produce a result. The application server may compare the expected classification to the classification to validate the model.
    Type: Application
    Filed: October 15, 2021
    Publication date: April 20, 2023
    Inventors: Vijay Erramilli, Regunathan Radhakrishnan, Prashant Agrawal
  • Publication number: 20150189096
    Abstract: Method for optimizing traffic volume caps in mobile cellular networks comprising: defining three traffic volume caps (x, y, z), wherein x indicates number of messages from mobile messaging services, y indicates bandwidth for mobile data and z indicates duration time of voice calls; computing initial user balance by subtracting total traffic cost generated by user for the mobile cellular network operator from total revenue paid by user to the mobile cellular network operator; obtaining total user balance for a range of caps (x, y, z) using the initial balance and at least a, net-oblivious or net-aware balance model which determines whether user is affected by the caps (x, y, z); selecting optimal traffic volume caps which maximize the total user balance. The method also computes social attraction parameters pk as a fraction of customers of the mobile cellular network operator having k contacts in the mobile cellular network operator.
    Type: Application
    Filed: December 27, 2013
    Publication date: July 2, 2015
    Applicant: TELEFONICA DIGITAL ESPANA, S.L.U.
    Inventors: Rade STANOJEVIC, Vijay ERRAMILLI
  • Patent number: 8713125
    Abstract: Method, system and computer program to provide transparent scalability to Online Social Networks and better performance of its back-end databases, by an efficient partitioning of the underlying community structure and replicating of user profiles, ensuring that every user has a master or slave replica of all his neighbors on the same partition where he is located.
    Type: Grant
    Filed: December 15, 2010
    Date of Patent: April 29, 2014
    Assignee: Telefonica, S.A.
    Inventors: Josep M. Pujol, Georgos Siganos, Vijay Erramilli, Xiaoyuan Yang, Nikolaos Laoutaris, Parminder Chabbra, Pablo Rodriguez
  • Publication number: 20130311555
    Abstract: A method for distributing long-tail content, including the steps of: a) loading, a first user, into a local PoP to which said first user is remotely connected an amount of long-tail content to be distributed and shared; and b) geo replicating, at selected times, the amount of long-tail content to a at least one remote PoP, to which at least a second user is remotely connected, by pushing said amount of content to be distributed and shared to the at least one remote PoP. The method including selecting, before performing steps a) and b), the at least second user, based on the probability that the amount of long-tail content generated by the first user will be requested by the at least second user, the probability being estimated by historical preference information generated between the first user and the at least second user.
    Type: Application
    Filed: May 18, 2012
    Publication date: November 21, 2013
    Applicant: TELEFONICA, S.A.
    Inventors: Nikolaos LAOUTARIS, Vijay ERRAMILLI
  • Publication number: 20130132549
    Abstract: The method comprises modelling a delay-tolerant dynamic network comprising time-varying links transforming it into a static time-expanded network graph, and managing bulk data transfer on the basis of said static time-expanded network graph. The device comprises a scheduler unit with processing capabilities implementing an algorithm which processes arc costs (cijt) and storage costs (pit) as per the method of the first aspect of the invention.
    Type: Application
    Filed: May 19, 2011
    Publication date: May 23, 2013
    Applicant: TELEFONICA, S.A.
    Inventors: Pablo Rodriguez, Parminder Chhabra, Vijay Erramilli, Nikolaos Laoutaris, Ravi Sundaram
  • Publication number: 20130097046
    Abstract: A user is prevented from being identified at each of a plurality of sites. An indication to sell access to the user at one of the plurality of sites is received. A personal information marketplace is provided to run an auction to sell the access to the user at the one of the plurality of sites. In response to a sale of the access to the user at the one of the plurality of sites to an aggregator, access to track the user at the one of the plurality of sites while maintaining anonymity of the user is provided to the aggregator.
    Type: Application
    Filed: October 10, 2012
    Publication date: April 18, 2013
    Inventors: Balachander Krishnamurthy, Vijay Erramilli, Pablo Rodriguez, Josep Maria Pujol
  • Publication number: 20110276649
    Abstract: Method, system and computer program to provide transparent scalability to Online Social Networks and better performance of its back-end databases, by an efficient partitioning of the underlying community structure and replicating of user profiles, ensuring that every user has a master or slave replica of all his neighbours on the same partition where he is located.
    Type: Application
    Filed: December 15, 2010
    Publication date: November 10, 2011
    Applicant: Telefonica, S.A.
    Inventors: Josep M. Pujol, Georgos Siganos, Vijay Erramilli, Xiaoyuan Yang, Nikolaos Laoutaris, Parminder Chabbra, Pablo Rodriquez