Satya P Gupta

age ~89

from Conyers, GA

Also known as:
  • Satya Prakash Gupta
  • Fadya B Gupta
Phone and address:
2602 Carrington Way, Conyers, GA 30094
7707618959

Satya Gupta Phones & Addresses

  • 2602 Carrington Way, Conyers, GA 30094 • 7707618959
  • 9125 184Th St, Hollis, NY 11423 • 7184545751
  • San Mateo, CA
  • Califon, NJ
  • Atherton, CA
  • Brooklyn, NY
  • Stockbridge, GA
  • 9125 184Th St, Jamaica, NY 11423 • 6317642377

Work

  • Position:
    Sales Occupations

Education

  • Degree:
    Associate degree or higher

Isbn (Books And Publications)

Textbook of Pediatrics

view source

Author
Satya Gupta

ISBN #
0706905822

Globilization, Growth and Sustainability

view source

Author
Satya D. Gupta

ISBN #
0792399617

Globalization and the Dilemmas of the State in the South

view source

Author
Satya Dev Gupta

ISBN #
0312222637

Dynamics of Globalization and Development

view source

Author
Satya Dev Gupta

ISBN #
0792399773

The Agrarian System of Eastern Rajasthan, C. 1650-C. 1750

view source

Author
Satya Prakash Gupta

ISBN #
8185054118

Us Patents

  • Automated Interpreted Application Control For Workloads

    view source
  • US Patent:
    20220391506, Dec 8, 2022
  • Filed:
    May 18, 2022
  • Appl. No.:
    17/664009
  • Inventors:
    - San Jose CA, US
    Satya V. Gupta - Dublin CA, US
  • International Classification:
    G06F 21/56
  • Abstract:
    Embodiments provide functionality to protect computing workloads from script-based attacks. Upon receipt, at a workload, of a command to commence execution of code of a script, an embodiment determines whether (i) permissions of a user issuing the command comply with a permissions security standard, (ii) an identifier of an interpreter supporting the script is included in an approved interpreter list, (iii) an identifier of a selected parameter of the interpreter is included in an approved parameter list, and (iv) an identifier of the script is included in an approved list of executables. If all of the aforementioned checks pass, such an embodiment allows execution of the code of the script; otherwise, execution is denied, thereby protecting the workload in an event of a script-based attack.
  • Runtime Memory Protection (Rmp) Engine

    view source
  • US Patent:
    20220222338, Jul 14, 2022
  • Filed:
    Dec 17, 2021
  • Appl. No.:
    17/645040
  • Inventors:
    - San Jose CA, US
    Satya V. Gupta - Dublin CA, US
  • International Classification:
    G06F 21/54
    G06F 21/55
    G06F 21/56
  • Abstract:
    Embodiments protect computer applications from code injection attacks. An example embodiment includes a runtime memory protection (RMP) user endpoint agent and an RMP kernel driver component. The RMP user endpoint agent receives, from the RMP kernel driver component, representations of events occurring with respect to memory locations associated with a computer application and processes the received representations to determine if a given event includes at least one of a memory permissions change request, a memory write request, and a thread create request. If the given event is determined to include at least one of a memory permissions change request, a memory write request, and a thread create request, the RMP user endpoint agent declares a code injection attack and sends an alarm indication to the RMP kernel driver component. In response to receiving the alarm indication, the RMP kernel driver component implements a protection action.
  • Protecting Against Memory Deserialization Attacks

    view source
  • US Patent:
    20220215094, Jul 7, 2022
  • Filed:
    Dec 30, 2021
  • Appl. No.:
    17/646511
  • Inventors:
    - San Jose CA, US
    Satya V. Gupta - Dublin CA, US
  • International Classification:
    G06F 21/56
  • Abstract:
    Embodiments protect computer applications from memory deserialization attacks. An example embodiment receives a data object at a server hosting a software application. In turn, an aspect of the received data object is compared with a representation of an expected data object. If the comparison identifies a difference between the aspect of the received data object and the representation of the expected data object, a protection action is executed to limit a property of the received data object, thus protecting the software application from a memory deserialization attack.
  • Zero Dwell Time Process Library And Script Monitoring

    view source
  • US Patent:
    20220207142, Jun 30, 2022
  • Filed:
    Dec 30, 2021
  • Appl. No.:
    17/646555
  • Inventors:
    - San Jose CA, US
    Satya V. Gupta - Dublin CA, US
  • International Classification:
    G06F 21/56
    G06F 21/52
    G06F 21/64
  • Abstract:
    Embodiments provide improved functionality to monitor processes. One such embodiment is directed to a system that includes a centralized database storing approved file signatures. The system also includes a processor that is configured, in response to a user request to run an executable file, to suspend a process implementing execution of the executable file. In turn, the processor determines a signature of the executable file and compares the determined signature of the executable file to the approved file signatures stored in the centralized database. Then, the processor maintains or stops suspension of the process based on the comparison. In an embodiment, the processor stops suspension if the signatures match and takes a protection action if the signatures do not match.
  • Application Aware Software Asset Inventory

    view source
  • US Patent:
    20220207151, Jun 30, 2022
  • Filed:
    Dec 30, 2021
  • Appl. No.:
    17/646622
  • Inventors:
    - San Jose CA, US
    Satya V. Gupta - Dublin CA, US
  • International Classification:
    G06F 21/57
  • Abstract:
    Embodiments create application-aware software asset inventories for software assets deployed upon computer networks associated with organizations. An example embodiment extracts configuration information pertaining to an application installed on a workload deployed upon a network. In turn, an application topology file is constructed from the extracted configuration information. The constructed application topology file serves as an application-aware software asset inventory wherein information pertaining to identities, locations, and configurations of such software assets is organized and stored.
  • Automated Detection Of Cross Site Scripting Attacks

    view source
  • US Patent:
    20220210180, Jun 30, 2022
  • Filed:
    Dec 30, 2021
  • Appl. No.:
    17/646611
  • Inventors:
    - San Jose CA, US
    Satya V. Gupta - Dublin CA, US
  • International Classification:
    H04L 9/40
  • Abstract:
    Embodiments detect cross site scripting attacks. An embodiment captures a web request and captures a response to the captured web request. In turn, it is determined if one or more elements associated with the captured web request and one or more elements of the captured response, in combination, cause a malicious action. A cross site scripting attack is then declared in response to determining the one or more elements associated with the captured web request and the one or more elements of the captured response, in combination, cause a malicious action. Embodiments can take one or more protection actions in response to declaring a cross site scripting attack.
  • Software Build System Protection Engine

    view source
  • US Patent:
    20220188408, Jun 16, 2022
  • Filed:
    Dec 16, 2021
  • Appl. No.:
    17/644706
  • Inventors:
    - San Jose CA, US
    Satya V. Gupta - Dublin CA, US
  • International Classification:
    G06F 21/54
    G06F 21/55
    G06F 8/73
  • Abstract:
    Embodiments detect security vulnerabilities, e.g., backdoors, in applications. An embodiment reverses object code of a computer application to generate source code of the computer application. In turn, the generated source code is compared to trusted source code of the computer application to detect a security vulnerability in the object code of the computer application. Embodiments can take one or more protection actions, e.g., sending a notification or preventing execution of the object code, amongst other examples, in response to detecting the security vulnerability.
  • Quantification Of Cyber Risk In Application Workloads

    view source
  • US Patent:
    20230004652, Jan 5, 2023
  • Filed:
    May 18, 2022
  • Appl. No.:
    17/664011
  • Inventors:
    - San Jose CA, US
    Satya V. Gupta - Dublin CA, US
  • International Classification:
    G06F 21/57
    G06F 21/56
  • Abstract:
    Embodiments assess security vulnerability of an application. An embodiment identifies one or more executables associated with an application and identifies one or more libraries associated with the application. In turn, based on the identified one or more executables and identified one or more libraries, static vulnerability of the application and dynamic vulnerability of the application are determined. Then, an indication of security vulnerability of the application is generated based on the determined static vulnerability and the determined dynamic vulnerability.
Name / Title
Company / Classification
Phones & Addresses
Satya Gupta
Vice President
Open-Silicon, Inc.
Semiconductors · Whol Electronic Parts/Equipment
490 N Mccarthy Blvd SUITE 220, Milpitas, CA 95035
4082405700

Resumes

Satya Gupta Photo 1

Satya Gupta

view source
Location:
United States
Satya Gupta Photo 2

Satya Gupta

view source
Location:
United States
Satya Gupta Photo 3

Satya Gupta

view source
Location:
United States

Facebook

Satya Gupta Photo 4

Amar Satya Gupta

view source
Satya Gupta Photo 5

Satya Gupta Gupta

view source
Satya Gupta Photo 6

Gupta Satya

view source
Satya Gupta Photo 7

Satya Prakash Gupta

view source
Satya Gupta Photo 8

Satya Prakash Gupta

view source
Satya Gupta Photo 9

Satya Prakash Gupta

view source
Satya Gupta Photo 10

Satya Prakash Gupta

view source
Satya Gupta Photo 11

Satya Prakash Gupta

view source

Youtube

Epic Conversations : Episode 1 - Satya Gupta ...

EPIC Conversations - The Legend Series Courtesy: EPIC Foundation Episo...

  • Duration:
    1h 7m 54s

DR SATYA GUPTA

The heart valves (four of them)work such that blood flows in a forward...

  • Duration:
    20m 28s

BJP fields Rekha Gupta as mayor candidate. U ...

  • Duration:
    54m 2s

satya gupta

  • Duration:
    4m 24s

10 Tips to Keep Heart Healthy on World Heart ...

On the occasion of World Heart Day Dr Satya Gupta has highlighted 10 t...

  • Duration:
    20m 15s

Why exercise needed everyday? | scientific e...

drsatyagupta #exercise #health #fitness.

  • Duration:
    8m 33s

Flickr

Myspace

Satya Gupta Photo 19

Satya Gupta

view source
Locality:
India
Gender:
Male
Birthday:
1923
Satya Gupta Photo 20

SAtya GUpta

view source
Locality:
Lakhimpur, Uttar Pradesh
Gender:
Male
Birthday:
1941
Satya Gupta Photo 21

Satya priya Gupta

view source
Locality:
Sitamarhi, Bihar
Gender:
Male
Birthday:
1937

Googleplus

Satya Gupta Photo 22

Satya Gupta

Work:
Earth Infrastructures Ltd noida
Education:
SSIC Palia Sultanpur, Ram Manohar Lohia university Faizabad
Satya Gupta Photo 23

Satya Gupta

Work:
PDO - Drilling supervisor
Education:
AMU, Aligarh - BE (Mech)
Satya Gupta Photo 24

Satya Gupta

Work:
Municipal Council - Computer Operator
Satya Gupta Photo 25

Satya Gupta

Satya Gupta Photo 26

Satya Gupta

Satya Gupta Photo 27

Satya Gupta

About:
SATYA
Satya Gupta Photo 28

Satya Gupta

Satya Gupta Photo 29

Satya Gupta


Get Report for Satya P Gupta from Conyers, GA, age ~89
Control profile