Patents by Inventor Vishal Bajpai

Vishal Bajpai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11790518
    Abstract: Current inspection processes employed for pipeline networks data acquisition aided with manually locating and recording defects/observations, thus leading labor intensive, prone to error and a time-consuming task thereby resulting in process inefficiencies. Embodiments of the present disclosure provide systems and methods for that leverage artificial intelligence/machine learning models and image processing techniques to automate log and data processing, reports and insights generation thereby reduce dependency on manual analysis, improve annual productivity of survey meterage and bring in process and cost efficiencies into overall asset health management for utilities, thereby enhancing accuracy in defect identification, analysis, classification thereof.
    Type: Grant
    Filed: June 24, 2021
    Date of Patent: October 17, 2023
    Assignee: Tata Consultancy Services Limited
    Inventors: Jayavardhana Rama Gubbi Lakshminarasimha, Mahesh Rangarajan, Rishin Raj, Vishnu Hariharan Anand, Vishal Bajpai, Vishwa Chethan Dandenahalli Venkatappa, Pradeep Kumar Mishra, Gourav Singh Jat, Meghala Mani, Gangadhar Shankarappa, Dinesh Sasidharan Nair, Shashank Lipate, Vineet Lall, Kavita Sara Mathew, Karthik Seemakurthy, Balamuralidhar Purushothaman
  • Publication number: 20220036541
    Abstract: Current inspection processes employed for pipeline networks data acquisition aided with manually locating and recording defects/observations, thus leading labor intensive, prone to error and a time-consuming task thereby resulting in process inefficiencies. Embodiments of the present disclosure provide systems and methods for that leverage artificial intelligence/machine learning models and image processing techniques to automate log and data processing, reports and insights generation thereby reduce dependency on manual analysis, improve annual productivity of survey meterage and bring in process and cost efficiencies into overall asset health management for utilities, thereby enhancing accuracy in defect identification, analysis, classification thereof.
    Type: Application
    Filed: June 24, 2021
    Publication date: February 3, 2022
    Applicant: Tata Consultancy Services Limited
    Inventors: Jayavardhana Rama Gubbi Lakshminarasimha, Mahesh Rangarajan, Rishin Raj, Vishnu Hariharan Anand, Vishal Bajpai, Vishwa Chethan Dandenahalli Venkatappa, Pradeep Kumar Mishra, Gourav Singh Jat, Meghala Mani, Gangadhar Shankarappa, Dinesh Sasidharan Nair, Shashank Lipate, Vineet Lall, Kavita Sara Mathew, Karthik Seemakurthy, Balamuralidhar Purushothaman
  • Patent number: 11098455
    Abstract: This disclosure relates generally to systems and methods for data acquisition and asset inspection in presence of magnetic interference. Data acquisition and assets inspection systems in many infrastructures such as railway, power line, and bridges provide inaccurate results in presence of magnetic interference. The proposed system and method proposes UAV based navigation through a dynamic correction path to inspect one or more assets in one or more infrastructures. A plurality of sensors are integrated with the UAV to acquire images of the one or more assets in presence of magnetic field. The acquired images are further processed to segment and detect anomalies in one or more parts of the one or more assets. The detected anomalies are further classified as potential anomalies and non-potential anomalies. The proposed method provides accurate results with reduced processing time.
    Type: Grant
    Filed: June 5, 2019
    Date of Patent: August 24, 2021
    Assignee: Tata Consultancy Services Limited
    Inventors: Sunil Dattatraya Joshi, Mayank Mishra, Vaibhav Vyawahare, Shripad Salsingikar, Jayavardhana Rama Gubbi Lakshminarasimha, Srinivas Kotamraju, Sreehari Kumar Bhogineni, Rishin Raj, Vishnu Hariharan Anand, Vishal Bajpai, Jegan Mohan Ponraj, Mahesh Rangarajan, Balamuralidhar Purushothaman, Gopi Kandaswamy
  • Publication number: 20210203682
    Abstract: Cybersecurity on a Controller Area Network (CAN) in a vehicle. In an embodiment, electronic control units (ECUs), connected to a CAN bus, each comprise a hacking detection system, which, during an initialization stage, transmits a message comprising a CAN identifier, used by the respective ECU, to at least one other hacking detection system, receives a message comprising a CAN identifier, used by at least one other ECU, from the other hacking detection system, monitors one or more parameters, including at least one parameter of CAN messages received by the respective ECU and transmitted by the respective ECU, and generates a pattern-detection mechanism based on the monitored one or more parameters. Then, during a detection stage, each hacking detection system monitors the one or more parameters, and detects malicious activity based on the generated pattern-detection mechanism and the one or more parameters monitored during the detection stage.
    Type: Application
    Filed: May 24, 2019
    Publication date: July 1, 2021
    Inventor: Vishal BAJPAI
  • Publication number: 20190368133
    Abstract: This disclosure relates generally to systems and methods for data acquisition and asset inspection in presence of magnetic interference. Data acquisition and assets inspection systems in many infrastructures such as railway, power line, and bridges provide inaccurate results in presence of magnetic interference. The proposed system and method proposes UAV based navigation through a dynamic correction path to inspect one or more assets in one or more infrastructures. A plurality of sensors are integrated with the UAV to acquire images of the one or more assets in presence of magnetic field. The acquired images are further processed to segment and detect anomalies in one or more parts of the one or more assets. The detected anomalies are further classified as potential anomalies and non-potential anomalies. The proposed method provides accurate results with reduced processing time.
    Type: Application
    Filed: June 5, 2019
    Publication date: December 5, 2019
    Applicant: Tata Consultancy Services Limited
    Inventors: Sunil Dattatraya JOSHI, Mayank MISHRA, Vaibhav VYAWAHARE, Shripad SALSINGIKAR, Jayavardhana Rama GUBBI LAKSHMINARASIMHA, Srinivas KOTAMRAJU, Sreehari Kumar BHOGINENI, Rishin RAJ, Vishnu HARIHARAN ANAND, Vishal BAJPAI, Jegan MOHAN PONRAJ, Mahesh RANGARAJAN, Balamuralidhar PURUSHOTHAMAN, Gopi KANDASWAMY
  • Patent number: 10326788
    Abstract: The disclosed computer-implemented method for identifying suspicious controller area network messages may include (i) monitoring, for a predetermined period of time, messages sent by an electronic control unit that comprise a controller area network identifier for at least one controller area network device, (ii) observing, in the messages, a set of corresponding patterns that each comprise a content pattern and a timing pattern, (v) detecting a message that comprises the controller area network identifier, wherein a content pattern of the message and a timing pattern of the message do not match any pair of corresponding patterns in the set of corresponding patterns, and (vi) determining that the message is suspicious based at least in part on content pattern of the message and the timing pattern of the message not matching any pair of corresponding patterns in the set. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 5, 2017
    Date of Patent: June 18, 2019
    Assignee: Symantec Corporation
    Inventors: Vishal Bajpai, Michael Pukish, Venkatesh Chakravarthy
  • Patent number: 10193903
    Abstract: The disclosed computer-implemented method for detecting suspicious microcontroller messages may include (1) observing a typical interval at which messages are sent over a network by a microcontroller, (2) identifying a message sent over the network by the microcontroller, (3) determining that the interval between the message and the previous message sent by the microcontroller does not comprise the typical interval, and (4) categorizing the message as a suspicious message in response to determining that the interval does not comprise the typical interval. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: January 29, 2019
    Assignee: Symantec Corporation
    Inventors: Vishal Bajpai, Preeti Agarwal
  • Patent number: 10142358
    Abstract: A system and method for detecting an invalid packet on a Controller Area Network (CAN) bus having a plurality of CAN nodes coupled thereto is provided. The method may include monitoring a CAN identifier (CAN ID) of each packet sent by each CAN node. The method may also include determining whether to detect the validity using a time threshold, historical data, or an acknowledgement (ACK) bit. For example, when the CAN ID is unknown, the method may include the use of validity detection process based upon the ACK Slot bit. Accordingly, the method may include detecting the validity of each packet using the selected method determined. In addition, the method may include storing the detected validity in a database having a listing for valid packets (white list) and a listing for invalid packets (black list). Moreover, the method may include disabling the invalid packets.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: November 27, 2018
    Assignee: SYMANTEC CORPORATION
    Inventors: Vishal Bajpai, Preeti Agarwal
  • Patent number: 10049116
    Abstract: Various systems and methods precalculate client-side deduplication signatures. For example, one method can identify a data object to be included in a backup and then calculate a signature of a data object prior to the start of a backup operation to create the backup. The signature identifies the data object within a deduplicated data store configured to store a backup of the data object. The signature can be calculated in response to detecting that a current usage level of system resources (e.g., such as a current processor utilization) of a client computing device is less than a threshold usage level.
    Type: Grant
    Filed: December 31, 2010
    Date of Patent: August 14, 2018
    Assignee: Veritas Technologies LLC
    Inventors: Vishal Bajpai, Preeti Agarwal
  • Patent number: 9785643
    Abstract: A computer-implemented method for reclaiming storage space in deduplicating data systems may include (1) storing at least one non-synthesized backup image within a deduplicating data system by storing at least one data segment of the non-synthesized backup image within a container of deduplicated data segments that is used by the deduplicating data system, (2) storing at least one synthesized backup image within the deduplicating data system by referencing at least one previously stored data segment within the container that is also referenced by a previous backup image within the deduplicating data system, (3) determining that no non-synthesized backup images still reference the container, and (4) removing the data segment of the non-synthesized backup image from the container of deduplicated data segments in response to determining that no non-synthesized backup images still reference the container. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 6, 2013
    Date of Patent: October 10, 2017
    Assignee: Veritas Technologies LLC
    Inventors: Deepak Patil, Vishal Bajpai
  • Patent number: 9734156
    Abstract: A computer-implemented method for leveraging data-deduplication capabilities of file systems may include (1) detecting a backup operation that backs up at least one data segment maintained by a file system capable of performing data deduplication on a computing device, (2) querying the file system for file-system data that includes (i) the data segment to be backed up during the backup operation, (ii) at least one unique identifier that identifies the data segment, and (iii) at least one file-specific segment map that identifies a position of the data segment relative to at least one other data segment within a file, (3) receiving the file-system data from the file system in response to the query, and then (4) providing the file-system data to a deduplication server to facilitate backing up the file based at least in part on the file-system data. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 13, 2013
    Date of Patent: August 15, 2017
    Assignee: Veritas Technologies
    Inventors: Vishal Bajpai, Preeti Agarwal
  • Patent number: 9734195
    Abstract: Various automated data flow tracking techniques can involve obtaining metadata identifying the data items from multiple data sources and using that information to identify the relationships among the data items. This information can then be provided to users. For example, a method can involve receiving a query; accessing metadata, which identifies data items generated by multiple data sources; identifying a set of responsive data items from among the available data items; identifying one or more relationships between the data items in the set of responsive data items, and responding to the query with information identifying the set of responsive data items and the one or more relationships.
    Type: Grant
    Filed: May 16, 2013
    Date of Patent: August 15, 2017
    Assignee: Veritas Technologies LLC
    Inventors: Bhushan Pandit, Wasim Ilkal, Namita S. Agrawal, Vishal Bajpai
  • Patent number: 9495057
    Abstract: A computer-implemented method for accessing multiple data-protection applications from a single interface. The method may include providing, in a portion of a web browser, a graphical toolbar interface for interfacing with a plurality of data-protection applications. The graphical toolbar interface may comprise at least one user input region for receiving input from a user and at least one data-display region for displaying representations of data received from the plurality of data-protection applications. The method may also include receiving, at the user input region, a request directed to at least one data-protection application of the plurality of data-protection applications and sending the request to the at least one data-protection application.
    Type: Grant
    Filed: February 5, 2010
    Date of Patent: November 15, 2016
    Assignee: Veritas Technologies LLC
    Inventors: Vishal Bajpai, Ajit Hanumant Kirkole
  • Patent number: 9436697
    Abstract: Techniques for detecting advanced security threats may be realized as a method for detecting a security threat including generating a resource at a client, implementing the resource on the client, monitoring system behavior of the client having the resource implemented thereon, determining whether a security event involving the implemented resource has occurred based on the monitored system behavior, and generating a report when it has been determined that the security event has occurred.
    Type: Grant
    Filed: January 8, 2013
    Date of Patent: September 6, 2016
    Assignee: Veritas Technologies LLC
    Inventors: Pradip Madhukar Kulkarni, Vishal Bajpai
  • Patent number: 9298724
    Abstract: A computer-implemented method for preserving deduplication efforts after backup-job failures may include (1) identifying a deduplicated data system that reduces redundant data storage by storing and referencing a plurality of deduplicated data segments and reclaims storage space by deleting unreferenced data segments from the deduplicated data system, (2) identifying a backup job that backs up data to the deduplicated data system, causes the deduplicated data system to store at least one new data segment available to be referenced within the deduplicated data system, and fails after the deduplicated data system stores the new data segment within the deduplicated data system causing the new data segment to be unreferenced within the deduplicated data system, and (3) causing the deduplicated data system to retain the new data segment until the backup job is retried despite the new data segment being unreferenced. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 14, 2013
    Date of Patent: March 29, 2016
    Assignee: Symantec Corporation
    Inventors: Deepak Patil, Vishal Bajpai