Kannappan
Babu Kannappan, Hawker AU
Patent application number | Description | Published |
---|---|---|
20090203532 | PROCESS FOR GENERATION OF PROTEIN AND USES THEROF - A method of generating a protein with an improved functional property, the method comprising: | 08-13-2009 |
Jayaraman Kannappan, Gujrat IN
Patent application number | Description | Published |
---|---|---|
20090187018 | Manufacture of Pure Hydralazine Salts - The present invention provides an improved process of preparing hydralazine hydrochloride, which involves the preparation of 1-chlorophthalazine salt and further reacting with hydrazine followed by purification of hydralazine hydrochloride, which is free of phosphate, does not contain any individual impurities more than 0.05%, total impurities less than 0.5%, and a hydrazine content of not more than 0.001 %, and preferably less than 0.0003%. One benefit of improved purity is enhanced storage stability. | 07-23-2009 |
Karthik Kannappan, Auckland NZ
Patent application number | Description | Published |
---|---|---|
20140342128 | ARRAYS AND METHODS OF MANUFACTURE - The invention relates to a microarray structure including a substrate material layer, a continuous three-dimensional (3D) surface layer on the substrate material layer that is capable of functionalisation for use as an array, and an inert material wherein the structure includes accurately defined and functionalisable isolated areas which are millimeter to nanometer in size. The functionalised areas are part of the continuous 3D surface layer and are isolated by the inert material and are interconnected within the structure by the continuous 3D surface layer. | 11-20-2014 |
Ken Kannappan, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20140057614 | Communications Network Call Initiation Transition - Systems and methods for initiating telephony calls are presented. In one example, a phone call initiation is detected on a first communications network. The phone call initiation is redirected to a second communications network. The call is connected utilizing the second communications network. | 02-27-2014 |
20140378083 | Device Sensor Mode to Identify a User State - Methods and apparatuses for user state detection are disclosed. In one example, a body worn device microphone is enabled to receive sound to determine a user state. The method includes receiving a sound signal from the body worn device microphone. The method further includes identifying a user state from the sound signal. | 12-25-2014 |
Kenneth Kannappan, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20100215170 | Presence Based Telephony Call Signaling - Methods and systems for presence based telephony call signaling are presented. An incoming call is received at a computer, where the computer includes a computer loudspeaker and computer display. A headset donned state or a headset doffed state is identified for a wireless headset, where the wireless headset includes a headset speaker and headset output user interface. A proximity between the wireless headset and the computer is determined. An incoming call notification is output to the headset speaker, the headset output user interface, the computer loudspeaker, or the computer display responsive to identifying the headset donned state or headset doffed state and determining the headset proximity. | 08-26-2010 |
20120230484 | Audo-Dial Connection Into Conference Calls with Attendee Status Broadcast - Methods and systems for dialing into conference calls are presented. A meeting reminder is displayed and a conference call confirmation instruction, delay instruction, or cancellation instruction is received from a meeting attendee. Responsive to receiving a delay instruction, a delayed call-in time is established and a status message is sent to all meeting attendees. The conference call dial-in number is automatically dialed at the proposed or delayed time. | 09-13-2012 |
20120257740 | Communications Network Call Initiation Transition - Systems and methods for initiating telephony calls are presented. In one example, a phone call initiation is detected on a first communications network. The phone call initiation is redirected to a second communications network. The call is connected utilizing the second communications network. | 10-11-2012 |
Kenneth A Kannappan, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20130208717 | Presence Based Telephony Call Signaling - Methods and systems for presence based telephony call signaling are presented. An incoming call is received at a computer, where the computer includes a computer loudspeaker and computer display. A headset donned state or a headset doffed state is identified for a wireless headset, where the wireless headset includes a headset speaker and headset output user interface. A proximity between the wireless headset and the computer is determined. An incoming call notification is output to the headset speaker, the headset output user interface, the computer loudspeaker, or the computer display responsive to identifying the headset donned state or headset doffed state and determining the headset proximity. | 08-15-2013 |
Kenneth S. Kannappan, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20100130198 | Remote processing of multiple acoustic signals - Systems and methods for remote digital signal processing of multiple signals are disclosed. The system generally includes a mobile communication device with a first microphone for receiving a first acoustic signal and a second microphone for receiving a second acoustic signal. The first acoustic signal and the second acoustic signal are transmitted to a processing station for processing using a wireless protocol. | 05-27-2010 |
Lakshmanan Kannappan, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20090089625 | Method and Apparatus for Multi-Domain Identity Interoperability and certification - A method and apparatus to provide identity management deployment interoperability and compliance verification. In one embodiment, the system also provides on-demand services including automated certification, monitoring, alerting, routing, and translation of tokens for federated identity related interactions between multi-domain identity management systems is provided. | 04-02-2009 |
20130254882 | MULTI-DOMAIN IDENTITY INTEROPERABILITY AND COMPLIANCE VERIFICATION - An identity management deployment, interoperability, and compliance verification is discussed. In one embodiment, the system also provides on-demand services including automated certification, monitoring, alerting, routing, and translation of tokens for federated identity related interactions between multi-domain identity management systems is provided. | 09-26-2013 |
Ramesh Kannappan, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20090299808 | METHOD AND SYSTEM FOR PROJECT MANAGEMENT - In one example embodiment, a system and method is shown that includes receiving a plurality of appropriation amounts and corresponding requested amounts associated with a project. The system and method also includes tabulating the plurality of received appropriation amounts and requested amount data in a budget table. Further, initiating an approval request for a requested amount may also be implemented. In an additional embodiment, the system and method include sending the approval request to one or more approvers using an email system. Further, the system and method includes receiving an approval response from the approvers using the email system. Moreover, the system and method includes updating the budget table to indicate the status of the approval request. | 12-03-2009 |
Saravanan Kannappan, Boynton Beach, FL US
Patent application number | Description | Published |
---|---|---|
20090094695 | ACCOUNT ASSOCIATION GENERATION - Illustrative embodiments provide a computer implemented method, data processing system and computer program product for generating an association between a configuration item and an account. In one illustrative embodiment, the computer implemented method comprises selecting the configuration item requiring account association to create a selected configuration item, and selecting a set of rules for the selected configuration item to form a set of selected rules, wherein the selected set of rules is used to associate configuration items to accounts. Further the method determines whether a match is present between the set of selected rules and the selected configuration item, and responsive to determining that a match is present, obtains account mapping information for an account identified by the match, and associates the selected configuration item with the account using the account mapping information. | 04-09-2009 |
Sasikumar Kannappan, Foster City, CA US
Patent application number | Description | Published |
---|---|---|
20110247063 | Mutual Mobile Authentication Using a Key Management Center - A system, method, and server computer configured to authenticate a consumer device. The consumer device is authenticated via a mobile gateway using challenge-response authentication. If the consumer device is successfully authenticated, a secure channel is established between the consumer device and a first entity. The secure channel allows for secure communication between the consumer device and the first entity. | 10-06-2011 |
20130024383 | Mobile Device With Secure Element - Embodiments of the present invention are directed to methods, systems, and apparatuses for securely communicating issuer updates, upgrades, and allowing configuration of payment-related applications on a mobile communication device using a mobile security application. One embodiment is directed to a method of using a mobile communication device comprising a mobile security application, a key associated with the mobile security application, a first mobile payment application in communication with the mobile security application and a second mobile payment application in communication with the mobile security application. The method includes communicating, by the first mobile payment application in the mobile communication device with a mobile gateway, in a first communication, wherein the first communication is encrypted using the key and communicating, by the second mobile payment application in the mobile communication device with a mobile gateway, in a second communication, wherein the second communication is encrypted using the key. | 01-24-2013 |
20140122339 | MUTUAL MOBILE AUTHENTICATION USING A KEY MANAGEMENT CENTER - A system, method, and server computer configured to authenticate a consumer device. The consumer device is authenticated via a mobile gateway using challenge-response authentication. If the consumer device is successfully authenticated, a secure channel is established between the consumer device and a first entity. The secure channel allows for secure communication between the consumer device and the first entity. | 05-01-2014 |
Vithya Kannappan, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130282960 | INTELLIGENT SCHEDULING OF BACKGROUND OPERATIONS IN MEMORY - A memory system or flash card may include an algorithm for identifying a pattern in a sustained or continuous write operation. In one example, a video recording device may be a host that continuously writes data to a memory card in an identifiable pattern. The pattern identification algorithm may be stored in the firmware of the memory card and used to schedule background operations during the predicted idle times in which the host is not writing data to the memory card. | 10-24-2013 |
20140164681 | Systems and Methods for Intelligent Flash Management - Systems and method for performing intelligent flash management are disclosed. A controller may determine if a write pattern exists between a set of writes associated with a first data chunk and a set of writes associated with a second data chunk based on whether a number of writes for first data chunk is equal to a number of writes for second data chunk; a degree to which a sequence of logical block address for the first data chunk matches the sequence of logical block addresses for the second data chunk; and a degree to which a size of each write for the first data chunk matches a size of each write for the second data chunk. The controller may then perform storage management operations based on whether or not a write pattern exists. | 06-12-2014 |
20140281158 | FILE DIFFERENTIATION BASED ON DATA BLOCK IDENTIFICATION - A memory system or flash card may include an algorithm for identifying and accounting for the rewrite frequency of data to be written to the card. The file system partition or file type of data may be used for monitoring rewrite frequency and predicting future rewrites. A learning algorithm that monitors rewrites may be implemented in firmware for accurate and dynamic identification of file types/partitions with the most likely rewrites. The identification of rewrites may be used to sort the data into groups (e.g. hot data=likely rewritten, and cold data=not likely to be rewritten). The hot data may stay in single level cell (SLC) update blocks longer, while the cold data can be moved to MLC blocks sooner. | 09-18-2014 |
20140281458 | SYSTEM AND METHOD FOR PREDICTING AND IMPROVING BOOT-UP SEQUENCE - A method for optimizing a boot up sequence includes, during a host idle time or during data transfer: obtaining a predicted read address from the a prediction table, prefetching from the non-volatile data store, and saving the prefetched data in memory. Also included is receiving a current read command issued by the host and if the read address matches the predicted read address, providing to the host the prefetched data saved in temporary memory, and indicating a match. If a match is not indicated, obtaining current data from the non-volatile data store corresponding to the read address of the current read command, and providing the current data to the host. If a match was not indicated, searching the data prediction table for the predicted read address that matches the read address corresponding to the current read command, and if found in the data prediction table, recording the offset value. | 09-18-2014 |