Patents by Inventor Vinay Gupta
Vinay Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240113969Abstract: Techniques for EVPN Host Routed Bridging (HRB) and EVPN cloud-native data center with Host Routed Bridging (HRB) are described. A host computing device of a data center includes one or more containerized user-level applications. A cloud native virtual router is configured for dynamic deployment by the data center application orchestration engine and operable in a user space of the host computing device. Processing circuitry is configured for execution of the containerized user-level applications and the cloud native virtual router. The cloud native virtual router comprises a containerized routing protocol process configured to operate as a control plane, and a data plane for the containerized router. The data plane is configured to operate an ethernet virtual private network (EVPN) encapsulation/decapsulation data path of an overlay network for communicating layer two (L2) network traffic of the containerized user applications over a switch fabric of the data center.Type: ApplicationFiled: December 13, 2023Publication date: April 4, 2024Inventors: Wen Lin, Manish Gupta, Shivakumar Channalli, Vinay K. Nallamothu
-
SINGLE INPUT/OUTPUT WRITES IN A FILE SYSTEM HOSTED ON A CLOUD, VIRTUAL, OR COMMODITY-SERVER PLATFORM
Publication number: 20240111419Abstract: Systems and methods for performing single I/O writes are provided. According to one embodiment, responsive to receipt of a write operation from a client by a file system layer of a node of a distributed storage system and a data payload of the operation having been determined to meet a compressibility threshold, an intermediate storage layer of the node logically interposed between the file system layer and a block storage media is caused to perform a single input/output (I/O) write operation that persists the compressed data payload and corresponding metadata to support asynchronous journaling of the write operation. The single I/O write operation coupled with the use of a new pool file that maintains a list of available blocks for single I/O write operations and a modified node crash recovery approach allows the write operation to be acknowledged to the client while the journaling is performed asynchronously.Type: ApplicationFiled: November 29, 2023Publication date: April 4, 2024Applicant: NetApp, Inc.Inventors: Mrinal K. Bhattacharjee, Boopathy Krishnamoorthy, Vinay Kumar B C, Shivali Gupta, Saurabh Gupta -
Publication number: 20240106886Abstract: Described embodiments provide systems and methods for intelligent load balancing of hosted sessions. A processor can determine a plurality of metrics for each of a plurality of machines configured to connect client devices with hosted sessions. The processor can receive, from a client device, a request to establish a connection with one of the plurality of machines to access a hosted session. The processor can determine a score for each of the plurality of machines based at least on the plurality of metrics for each of the plurality of machines. The processor can select a machine from the plurality of machines as a function of the score and a resource cost of the machine. The processor can cause the client device to connect to the selected machine for the hosted session.Type: ApplicationFiled: September 28, 2022Publication date: March 28, 2024Inventors: Vinay George Roy, Mukesh Garg, Naman Dubey, Vikramjeet Singh Sandhu, Himanshu Pandey, Rahul Gupta
-
Publication number: 20240104083Abstract: Disclosed are various embodiments for data anomaly detection. A variable profile is generated for each variable in source data. Then, the variable profiles are provided to each of a plurality of machine learning models. Next, it is determined, with each of the plurality of machine learning models, whether each variable profile is anomalous. The determination, from each of the plurality of machine learning models, whether each variable profile is anomalous is provided to an ensemble model. The ensemble model then generates a final determination whether each variable profile is anomalous. The final determination is then reported to an analysis service.Type: ApplicationFiled: September 27, 2022Publication date: March 28, 2024Inventors: Vinay Dhingra, Agraj Gupta, Ashank Gupta, Vaibhav Gupta, Anam Hyderi, Sandeep Pattanayak, Purvi Shah, Shikha
-
Publication number: 20230379952Abstract: Channel assignment for wireless access networks is directed toward improved overall communication capability of the networks. A network is formed of wireless access points (APs) coupled via wired (and/or wireless) links and enabled to communicate with clients via radio channels of each of the APs. Local information is collected at each of the APs and processed to determine channel assignments according to a Neighbor Impact Metric (NIM) that accounts for one-hop and two-hop neighbors as well as neighbors not part of the network. Optionally, the NIM accounts for traffic load on the APs. The channel assignments are determined either on a centralized resource (such as a server or one of the APs) or via a distributed scheme across the APs. The local information includes how busy a channel is and local operating conditions such as error rate and interference levels.Type: ApplicationFiled: April 6, 2023Publication date: November 23, 2023Inventors: Jorjeta JETCHEVA, Ravi PRAKASH, Vinay GUPTA, Sachin KANODIA, Mohan NATARAJAN
-
Publication number: 20230247036Abstract: A cloud security system and method implements cloud activity threat detection using analysis of cloud usage user behavior. In particular, the cloud security system and method implements threat detection for users, cloud service providers, or tenants (enterprises) of the cloud security system who are new or unknown to the cloud security system and therefore lacking sufficient cloud activity data to generate an accurate behavior model for effective threat detection. In accordance with embodiments of the present invention, the cloud security system and method performs user behavior analysis to generate generalized user behavior models for user groups, where each user group includes users with similar cloud usage behavior. The user behavior models of the user groups are assigned to users with sparse cloud activity data. In this manner, the cloud security system and method of the present invention ensures effective threat detection by using accurate and reliable user behavior models.Type: ApplicationFiled: January 13, 2023Publication date: August 3, 2023Inventors: Sandeep Chandana, Santosh Raghuram Kumar, Sekhar Sarukkai, Satyanarayana Vummidi, Madhavi Kavathekar, Vinay Gupta
-
Patent number: 11659580Abstract: Channel assignment for wireless access networks is directed toward improved overall communication capability of the networks. A network is formed of wireless access points (APs) coupled via wired (and/or wireless) links and enabled to communicate with clients via radio channels of each of the APs. Local information is collected at each of the APs and processed to determine channel assignments according to a Neighbor Impact Metric (NIM) that accounts for one-hop and two-hop neighbors as well as neighbors not part of the network. Optionally, the NIM accounts for traffic load on the APs. The channel assignments are determined either on a centralized resource (such as a server or one of the APs) or via a distributed scheme across the APs. The local information includes how busy a channel is and local operating conditions such as error rate and interference levels.Type: GrantFiled: April 6, 2020Date of Patent: May 23, 2023Assignee: FIRETIDE, INC.Inventors: Jorjeta Jetcheva, Ravi Prakash, Vinay Gupta, Sachin Kanodia, Mohan Natarajan
-
Patent number: 11558411Abstract: A cloud security system and method implements cloud activity threat detection using analysis of cloud usage user behavior. In particular, the cloud security system and method implements threat detection for users, cloud service providers, or tenants (enterprises) of the cloud security system who are new or unknown to the cloud security system and therefore lacking sufficient cloud activity data to generate an accurate behavior model for effective threat detection. In accordance with embodiments of the present invention, the cloud security system and method performs user behavior analysis to generate generalized user behavior models for user groups, where each user group includes users with similar cloud usage behavior. The user behavior models of the user groups are assigned to users with sparse cloud activity data. In this manner, the cloud security system and method of the present invention ensures effective threat detection by using accurate and reliable user behavior models.Type: GrantFiled: December 22, 2020Date of Patent: January 17, 2023Assignee: Skyhigh Security LLCInventors: Sandeep Chandana, Santosh Raghuram Kumar, Sekhar Sarukkai, Satyanarayana Vummidi, Madhavi Kavathekar, Vinay Gupta
-
Publication number: 20210112086Abstract: A cloud security system and method implements cloud activity threat detection using analysis of cloud usage user behavior. In particular, the cloud security system and method implements threat detection for users, cloud service providers, or tenants (enterprises) of the cloud security system who are new or unknown to the cloud security system and therefore lacking sufficient cloud activity data to generate an accurate behavior model for effective threat detection. In accordance with embodiments of the present invention, the cloud security system and method performs user behavior analysis to generate generalized user behavior models for user groups, where each user group includes users with similar cloud usage behavior. The user behavior models of the user groups are assigned to users with sparse cloud activity data. In this manner, the cloud security system and method of the present invention ensures effective threat detection by using accurate and reliable user behavior models.Type: ApplicationFiled: December 22, 2020Publication date: April 15, 2021Inventors: Sandeep Chandana, Santosh Raghuram Kumar, Sekhar Sarukkai, Satyanarayana Vummidi, Madhavi Kavathekar, Vinay Gupta
-
Patent number: 10937300Abstract: A radio frequency transmission device that triggers electromechanical actions wirelessly using smart device electrical behavior is disclosed. This invention allows for the uninterrupted capture of electrical events while the smart device processes first trigger inside a software loop and can wirelessly create useful actions based on electrical events. It also allows for plug and play functionality of wireless RF repetitive functionality to smart device installations. This is best exemplified by a smart doorbell installation with our RF transmitter attached to a plug-in power supply that allows for continuous functionality and repeated ringing of a chime triggered by an RF signal.Type: GrantFiled: October 23, 2019Date of Patent: March 2, 2021Assignee: OhnKat Inc.Inventor: Vinay Gupta
-
Patent number: 10937301Abstract: Improvements in a circuit with a glanceable indicator(s) for power checking and short testing in electrical power supplies is disclosed. Providing a reliable, easily understandable indication of electrical integrity will save consumers time and money by allowing them to quickly and accurately determine whether a power supply is causing an issue or lack of function with their powered device. By eliminating (or identifying) the power supply as the cause of the issue, the consumer will be able to troubleshoot quicker and have a better experience with their devices.Type: GrantFiled: December 5, 2019Date of Patent: March 2, 2021Assignee: OhnKat Inc.Inventor: Vinay Gupta
-
Publication number: 20210058933Abstract: Channel assignment for wireless access networks is directed toward improved overall communication capability of the networks. A network is formed of wireless access points (APs) coupled via wired (and/or wireless) links and enabled to communicate with clients via radio channels of each of the APs. Local information is collected at each of the APs and processed to determine channel assignments according to a Neighbor Impact Metric (NIM) that accounts for one-hop and two-hop neighbors as well as neighbors not part of the network. Optionally, the NIM accounts for traffic load on the APs. The channel assignments are determined either on a centralized resource (such as a server or one of the APs) or via a distributed scheme across the APs. The local information includes how busy a channel is and local operating conditions such as error rate and interference levels.Type: ApplicationFiled: April 6, 2020Publication date: February 25, 2021Inventors: Jorjeta JETCHEVA, Ravi PRAKASH, Vinay GUPTA, Sachin KANODIA, Mohan NATARAJAN
-
Patent number: 10911474Abstract: A cloud security system and method implements cloud activity threat detection using analysis of cloud usage user behavior. In particular, the cloud security system and method implements threat detection for users, cloud service providers, or tenants (enterprises) of the cloud security system who are new or unknown to the cloud security system and therefore lacking sufficient cloud activity data to generate an accurate behavior model for effective threat detection. In accordance with embodiments of the present invention, the cloud security system and method performs user behavior analysis to generate generalized user behavior models for user groups, where each user group includes users with similar cloud usage behavior. The user behavior models of the user groups are assigned to users with sparse cloud activity data. In this manner, the cloud security system and method of the present invention ensures effective threat detection by using accurate and reliable user behavior models.Type: GrantFiled: May 13, 2019Date of Patent: February 2, 2021Assignee: Skyhigh Networks, LLCInventors: Sandeep Chandana, Santosh Raghuram Kumar, Sekhar Sarukkai, Satyanarayana Vummidi, Madhavi Kavathekar, Vinay Gupta
-
Publication number: 20200135007Abstract: A radio frequency transmission device that triggers electromechanical actions wirelessly using smart device electrical behavior is disclosed. This invention allows for the uninterrupted capture of electrical events while the smart device processes first trigger inside a software loop and can wirelessly create useful actions based on electrical events. It also allows for plug and play functionality of wireless RF repetitive functionality to smart device installations. This is best exemplified by a smart doorbell installation with our RF transmitter attached to a plug-in power supply that allows for continuous functionality and repeated ringing of a chime triggered by an RF signal.Type: ApplicationFiled: October 23, 2019Publication date: April 30, 2020Applicant: OhnKat Inc.Inventor: Vinay Gupta
-
Publication number: 20200134989Abstract: Improvements in a circuit with a glanceable indicator(s) for power checking and short testing in electrical power supplies is disclosed. Providing a reliable, easily understandable indication of electrical integrity will save consumers time and money by allowing them to quickly and accurately determine whether a power supply is causing an issue or lack of function with their powered device. By eliminating (or identifying) the power supply as the cause of the issue, the consumer will be able to troubleshoot quicker and have a better experience with their devices.Type: ApplicationFiled: December 5, 2019Publication date: April 30, 2020Applicant: OhnKat Inc.Inventor: Vinay Gupta
-
Patent number: 10616900Abstract: Channel assignment for wireless access networks is directed toward improved overall communication capability of the networks. A network is formed of wireless access points (APs) coupled via wired (and/or wireless) links and enabled to communicate with clients via radio channels of each of the APs. Local information is collected at each of the APs and processed to determine channel assignments according to a Neighbor Impact Metric (NIM) that accounts for one-hop and two-hop neighbors as well as neighbors not part of the network. Optionally, the NIM accounts for traffic load on the APs. The channel assignments are determined either on a centralized resource (such as a server or one of the APs) or via a distributed scheme across the APs. The local information includes how busy a channel is and local operating conditions such as error rate and interference levels.Type: GrantFiled: June 8, 2018Date of Patent: April 7, 2020Assignee: Firetide, Inc.Inventors: Jorjeta Jetcheva, Ravi Prakash, Vinay Gupta, Sachin Kanodia, Mohan Natarajan
-
Publication number: 20190373006Abstract: A cloud security system and method implements cloud activity threat detection using analysis of cloud usage user behavior. In particular, the cloud security system and method implements threat detection for users, cloud service providers, or tenants (enterprises) of the cloud security system who are new or unknown to the cloud security system and therefore lacking sufficient cloud activity data to generate an accurate behavior model for effective threat detection. In accordance with embodiments of the present invention, the cloud security system and method performs user behavior analysis to generate generalized user behavior models for user groups, where each user group includes users with similar cloud usage behavior. The user behavior models of the user groups are assigned to users with sparse cloud activity data. In this manner, the cloud security system and method of the present invention ensures effective threat detection by using accurate and reliable user behavior models.Type: ApplicationFiled: May 13, 2019Publication date: December 5, 2019Inventors: Sandeep Chandana, Santosh Raghuram Kumar, Sekhar Sarukkai, Satyanarayana Vummidi, Madhavi Kavathekar, Vinay Gupta
-
Patent number: 10291638Abstract: A cloud security system and method implements cloud activity threat detection using analysis of cloud usage user behavior. In particular, the cloud security system and method implements threat detection for users, cloud service providers, or tenants (enterprises) of the cloud security system who are new or unknown to the cloud security system and therefore lacking sufficient cloud activity data to generate an accurate behavior model for effective threat detection. In accordance with embodiments of the present invention, the cloud security system and method performs user behavior analysis to generate generalized user behavior models for user groups, where each user group includes users with similar cloud usage behavior. The user behavior models of the user groups are assigned to users with sparse cloud activity data. In this manner, the cloud security system and method of the present invention ensures effective threat detection by using accurate and reliable user behavior models.Type: GrantFiled: September 8, 2016Date of Patent: May 14, 2019Assignee: Skyhigh Networks, LLCInventors: Sandeep Chandana, Santosh Raghuram Kumar, Sekhar Sarukkai, Satyanarayana Vummidi, Madhavi Kavathekar, Vinay Gupta
-
Publication number: 20190141715Abstract: Channel assignment for wireless access networks is directed toward improved overall communication capability of the networks. A network is formed of wireless access points (APs) coupled via wired (and/or wireless) links and enabled to communicate with clients via radio channels of each of the APs. Local information is collected at each of the APs and processed to determine channel assignments according to a Neighbor Impact Metric (NIM) that accounts for one-hop and two-hop neighbors as well as neighbors not part of the network. Optionally, the NIM accounts for traffic load on the APs. The channel assignments are determined either on a centralized resource (such as a server or one of the APs) or via a distributed scheme across the APs. The local information includes how busy a channel is and local operating conditions such as error rate and interference levels.Type: ApplicationFiled: June 8, 2018Publication date: May 9, 2019Inventors: Jorjeta JETCHEVA, Ravi PRAKASH, Vinay GUPTA, Sachin KANODIA, Mohan NATARAJAN
-
Patent number: 10115456Abstract: The invention deals with multi-states nonvolatile opto-ferroelectric memory element and method of preparing the same thereof. This invention describes multi-states nonvolatile opto-ferroelectric memory element consisting of opto-ferroelectric memory material comprised of Pb1-x(Bi0.5Li0.5)x(Ti1-yZry)O3, wherein x=0.2 to 0.8 and y=0.2 to 0.6, said memory material (PBLZT) photovoltaic ferroelectric material is characterized by a single-phase opto-ferroelectric materials, photovoltaic and multi-states ferroelectric memory material. The invention relates to process of preparing multi-states nonvolatile opto-ferroelectric memory material by solid route, solution-gel process and pulsed laser process. It describes development of multi-states nonvolatile opto-ferroelectric memory material at room temperature. Invention describes a ferroelectric material whose polarization is switched by white light and low power LASER (10-50 mW) with wavelength (405 nm).Type: GrantFiled: January 13, 2017Date of Patent: October 30, 2018Assignee: Council of Scientific & Industrial ResearchInventors: Ashok Kumar, Hitesh Borkar, Vaibhav Rao, Monika Tomar, Vinay Gupta