Shrikant
Shrikant Adhikarla, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20160006760 | DETECTING AND PREVENTING PHISHING ATTACKS - Embodiments are directed to detecting and preventing phishing attacks. In one scenario, a computer system accesses a message and analyzes content in the message to determine whether a link is present. The link has a link destination and at least some text that is designated for display in association with the link (i.e. the anchor), where the text designated for display indicates a specified destination. Then, upon determining that a link is present in the message, the computer system determines whether the link destination matches the destination specified by the text designated for display and, if it determines that the destination specified by the text designated for display does not match the link destination, the computer system flags the message to indicate that the message includes at least one suspicious link. | 01-07-2016 |
Shrikant Apsangi, Fairfax, VA US
Patent application number | Description | Published |
---|---|---|
20140189353 | APPARATUS AND METHODS FOR PROVISIONING IN A DOWNLOAD-ENABLED SYSTEM - Apparatus and methods for provisioning of customer premise equipment (CPE) equipped with a secure microprocessor to receive e.g., digital video content by entering unique identification of the CPE at one or more servers located at the headend or other location of a content-based network. In one embodiment, the CPE comprises a download-enabled (e.g., DCAS) host with embedded cable modem and embedded set-top box functionality, and the provisioning includes enabling DOCSIS functionality of the CPE, assigning an IP address to the CPE and providing the CPE with a client image for the conditional access system chosen by the network operator. In one variant, the network operator can deactivate a provisioned device while connected to the network, as well when disconnected from the network. The network operator can also add, delete or replace conditional access client image in a provisioned device. | 07-03-2014 |
Shrikant Basurtekar, Belgaum IN
Patent application number | Description | Published |
---|---|---|
20100012204 | VALVE MANIFOLD - A valve is provided including a first valve member and a second valve member. The first valve member includes a first step and a first orifice adjacent the first step. The second valve member includes a second step and a second orifice adjacent the second step. The second valve member is movable relative to the first valve member between an open position, in which the first orifice is fluidly connected the second orifice, and a closed position, in which the first orifice is substantially fluidly disconnected from the second orifice. The first and second steps are fluidly connected to the second orifice and substantially fluidly disconnected from the first orifice when the second valve member is in the closed position, and the first and second steps are fluidly connected to the first and second orifices when the second valve member is in the open position. | 01-21-2010 |
20130276921 | VALVE MANIFOLD - A valve is provided including a first valve member and a second valve member. The first valve member includes a first step and a first orifice adjacent the first step. The second valve member includes a second step and a second orifice adjacent the second step. The second valve member is movable relative to the first valve member between an open position, in which the first orifice is fluidly connected the second orifice, and a closed position, in which the first orifice is substantially fluidly disconnected from the second orifice. The first and second steps are fluidly connected to the second orifice and substantially fluidly disconnected from the first orifice when the second valve member is in the closed position, and the first and second steps are fluidly connected to the first and second orifices when the second valve member is in the open position. | 10-24-2013 |
Shrikant Havale, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20090281131 | DIEBENZOFURAN DERIVATIVES AS INHIBITORS OF PDE-4 AND PDE-10 - The present invention relates to novel heterocyclic compounds that are useful as phosphodiesterase inhibitors (PDEs) in particular phosphodiesterase type 4 (PDE IV) inhibitors and phosphodiesterase type 10 (PDE 10) inhibitors, processes for their preparation, pharmaceutical compositions containing them and their use in treating allergic and inflammatory diseases as well as for inhibiting the production of Tumor Necrosis Factor (TNF-α). | 11-12-2009 |
Shrikant Kamble, Mumbai IN
Patent application number | Description | Published |
---|---|---|
20110136873 | Inhibitors of Cyclin Dependent Kinases and Their Use - The present invention relates to novel compounds for the inhibition of cyclin-dependent kinases, and more particularly, to chromenone derivatives of formula (Ia), | 06-09-2011 |
20130045993 | INHIBITORS OF CYCLIN-DEPENDENT KINASES AND THEIR USE - The present invention relates to novel compounds for the inhibition of cyclindependent kinases, and more particularly, to chromenone derivatives of formula (Ia), | 02-21-2013 |
Shrikant Kanaparti, Karnataka IN
Patent application number | Description | Published |
---|---|---|
20090254980 | METHOD OF PROVIDING ACCESS RIGHTS BASED ON DEVICE PROXIMITY AND CENTRAL ACCESS DEVICE USED FOR THE METHOD - Provided is method of providing access rights based on device proximity and central access device used for method. Method of providing access rights to mobile device includes: determining proximity showing how close mobile device is to central access device when mobile device connects to central access device in home network; and granting access right to mobile device according to determined proximity. Access rights used for protecting contents of various devices in home network can be seamlessly controlled, and in network, identity of person (identified by his/her device) can be generated and his/her access right can be properly controlled. In addition, there is no need to concern about leakage of data beyond the house and there is no need to try to change anything of set parameters for this purpose, and there is no need to try to protect data in a ubiquitous information network. | 10-08-2009 |
Shrikant Lohohare, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20090173718 | Method of damaged low-k dielectric film layer removal - An apparatus, system and method for removing a damaged material from a low-k dielectric film layer include identifying a control chemistry, the control chemistry configured to selectively remove the damaged material from the low-k dielectric film layer, the damaged material being in a region where a feature was formed through the low-k dielectric film layer; establishing a plurality of process parameters characterizing aspects of the damaged material to be removed and applying the control chemistry to the low-k dielectric film layer, the application of the control chemistry being defined based on the established process parameters of the damaged material, such that the damaged material is substantially removed from the areas around the feature and the areas around the feature are substantially defined by low-k characteristics of the low-k dielectric film layer. | 07-09-2009 |