Mody, US
Apurva N. Mody, Lowell, MA US
Patent application number | Description | Published |
---|---|---|
20080293353 | Cognitive radio methodology, physical layer policies and machine learning - In a method of cognitive communication for non-interfering transmission, wherein the improvement comprises the step of conducting radio scene analysis to find not just the spectrum holes or White spaces; but also to use the signal classification, machine learning and prediction information to learn more things about the existing signals and its underlying protocols, to find the Gray space, hence utilizing the signal space, consisting of space, time, frequency (spectrum), code and location more efficiently. | 11-27-2008 |
20090102981 | SPECTRUM SENSING FUNCTION FOR COGNITIVE RADIO APPLICATIONS - A method and system are disclosed to detect a broad class of signals including Advanced Television Systems Committee (ATSC) digital television (DTV) and wireless microphone signals. This signal detection method performs in Gaussian noise, employing Higher Order Statistics (HOS). Signals are processed in time and frequency domains as well as by real and imaginary components. The spectrum sensing employed also supports Denial of Service (DoS) signal classification. The method can include parameters that may be tailored to adjust the probability of detection and false alarm. | 04-23-2009 |
20090124207 | Protocol Reference Model, Security and Inter-Operability in a Cognitive Communications System - Various cognitive communications system architectures and their corresponding Protocol Reference Models (PRMs) are disclosed. Such PRMs incorporate a Cognitive Plane in addition to conventional Data and Management Planes. The additional Cognitive Plane functionality may include, for example, spectrum sensing, spectrum management, geolocation, and security functions. The Cognitive Plane may further include a Policy Engine and a Learning and Reasoning Module. In some embodiments, Management Plane functions may be effectively combined to form a database of primitives (and their respective values) called a Management Information Base (MIB). In addition, techniques are provided by which various components of cognitive and non-cognitive, as well as mesh-enabled and non-mesh-enabled nodes in a network, inter-operate with each other. The architectures allow a Spectrum Manager (or Signal Space Manager) to combine information from various network layers (e.g., PHY/MAC Layers, Spectrum Sensing Function, Geolocation Function, and/or Security Sublayers), and to make informed decisions on spectrum utilization. | 05-14-2009 |
20090124208 | PROTOCOL REFERENCE MODEL, SECURITY AND INTER-OPERABILITY IN A COGNITIVE COMMUNICATIONS SYSTEM - Various cognitive communications system architectures and their corresponding Protocol Reference Models (PRMs) are disclosed. Such PRMs incorporate a Cognitive Plane in addition to conventional Data and Management Planes. The additional Cognitive Plane functionality may include, for example, spectrum sensing, spectrum management, geolocation, and security functions. The Cognitive Plane may further include a Policy Engine and a Learning and Reasoning Module. In some embodiments, Management Plane functions may be effectively combined to form a database of primitives (and their respective values) called a Management Information Base (MIB). In addition, techniques are provided by which various components of cognitive and non-cognitive, as well as mesh-enabled and non-mesh-enabled nodes in a network, inter-operate with each other. The architectures allow a Spectrum Manager (or Signal Space Manager) to combine information from various network layers (e.g., PHY/MAC Layers, Spectrum Sensing Function, Geolocation Function, and/or Security Sublayers), and to make informed decisions on spectrum utilization. | 05-14-2009 |
20100002816 | METHOD AND APPARATUS FOR MULTIPLE SIGNAL IDENTIFICATION AND FINDING THE BASIS FUNCTIONS OF THE RECEIVED SIGNAL - A method is disclosed to detect a broad class of signals in Gaussian noise using higher order statistics. The method detects a number of different signal types. The signals may be in the base-band or the pass-band, single-carrier or multi-carrier, frequency hopping or non-hopping, broad-pulse or narrow-pulse etc. In a typical setting this method provides an error rate of 3% at a signal to noise ratio of 0 dB. This method gives the time frequency detection ratio which may be used to determine if the detected signal falls in Class Single-Carrier of Class Multi-Carrier. Additionally, this method may be used for a number of different applications such as multiple signal identification, finding the basis functions of the received signal. | 01-07-2010 |
20100227622 | RESOURCE ALLOCATION IN CO-EXISTENCE MODE - Techniques are disclosed that allow for resource allocation during situations requiring co-existence in cognitive radios. Even under situations of bandwidth scarcity, the techniques allow various users to be guaranteed quality of service (QoS) by proper distribution and allocation of resources. The techniques allow wireless communication systems to operate in a normal mode and a co-existence mode. In the co-existence mode of operation, sub-frame creation, sharing and zone formation schemes are implemented that enable the existing underlying frame structure to remain intact and inter-operable with the legacy systems and at the same time, provide a guaranteed QoS. The zones effectively create partitions in space, time and frequency, which result in interference avoidance and allow various users in neighboring cells to communicate on the same frequencies. | 09-09-2010 |
20100317391 | METHOD FOR COLLABORATIVE DISCRIMATION BETWEEN AUTHENTIC AND SPURIOUS SIGNALS IN A WIRELESS COGNITIVE NETWORK - A WRAN discriminates between authentic incumbent and spurious/malicious signals by collaboratively sensing the frequency environment, classifying and fusing the sensed results, and categorizing each signal as valid or invalid. Embodiments categorize signals according to reports from at least two nodes, thereby increasing detection confidence and resisting denial-of-service attacks. A “voting-rule” can be applied whereby a signal is authentic only if it is detected by a specified percentage of the nodes. Some embodiments categorized signals by comparing sensed analog signal properties, such as amplitude, bandwidth, pulse width, mean, variance, modulation, standard deviation, moments, cumulants, and rise and fall times, with properties of known incumbents and/or known incumbent types. Sensed results can be weighted according to known node locations and/or local topology, sensed signal strengths, and comparisons of sensed analog features with corresponding features of known incumbents and/or known incumbent types in the same class. | 12-16-2010 |
20110131260 | EFFICIENT DETECTION ALGORITHM SYSTEM FOR A BROAD CLASS OF SIGNALS USING HIGHER-ORDER STATISTICS IN TIME AS WELL AS FREQUENCY DOMAINS - An algorithm system to detect a broad class of signals in Gaussian noise using higher-order statistics. The algorithm system detects a number of different signal types. The signals may be in the base-band or the pass-band, single-carrier or multi-carrier, frequency hopping or non-hopping, broad-pulse or narrow-pulse etc. In a typical setting this algorithm system provides an error rate of 3/100 at a signal to noise ratio of 0 dB. This algorithm system gives the time frequency detection ratio that may be used to determine if the detected signal falls in Class Single-Carrier of Class Multi-Carrier. Additionally this algorithm system may be used for a number of different applications such as multiple signal identification, finding the basis functions of the received signal and the like. | 06-02-2011 |
20110138183 | METHOD FOR ENSURING SECURITY AND PRIVACY IN A WIRELESS COGNITIVE NETWORK - In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management and control messages as well as data traffic, thereby protecting information pertaining to node identification, node location, node-sensed incumbent transmissions, CRN frequency channel selections, and such like. During initial network registration, a temporary ID can be issued to a node, and then replaced once encrypted communication has been established. This prevents association of initial, clear-text messages with later encrypted transmissions. Elliptic curve cryptography can be used for mutual authentication between subscribers and the base station. ECC-based implicit digital certificates can be embedded in co-existence beacons used by CRN nodes to coordinate use of frequency channels, thereby preventing denial of service attacks due to transmitting of falsified beacons. Similar certificates can be embedded within identity beacons used to protect certain incumbents from interference by the CRN. | 06-09-2011 |
20120071189 | METHOD AND SYSTEM FOR THE SPECTRUM MANAGER OPERATION IN COGNITIVE RADIO SYSTEMS - A system and method for the operation of a Spectrum Manager (SM) within a cognitive radio system includes two primary states of operation: SM at network initialization and SM at network operation. While in the network Initialization state, the SM's primary responsibility is to find an operating channel. After an operating channel is found, the SM moves from the network initialization state to the network operation state while executing a procedure to establish a network. While in the network operation state, the SM can execute other procedures, a procedure to update list of available channel from the incumbent database of channel and frequency data, a procedure to determine a signal type, a procedure to enter co-existence mode, deciding when to move to a backup channel and issuing calls for the same as well as background procedures such as looking for better backup channels when the SM is otherwise idle. | 03-22-2012 |
20120142386 | METHOD AND SYSTEM TO MAKE CURRENT WIRELESS RADIOS COGNITIVE USING AN EXTERNAL SENSOR AND APPLICATION LEVEL MESSAGING - A system and method for converting a non-cognitive radio into a cognitive radio is presented. A cognitive radio system includes, a non-cognitive radio; an electronic device, a spectrum sensing logic and configuration and management logic. The electronic device is connected to the non-cognitive radio so that it receives and/or transmits messages to/from a wireless network. The configuration and management logic is connected between the non-cognitive radio and the spectrum sensing logic. The spectrum sensing logic and the configuration and management logic are removable from the non-cognitive radio allowing the cognitive radio to operate in a non-cognitive mode. The spectrum sensing logic senses a wireless environment to determine available frequencies and available channels. The configuration and management logic transmits available frequencies, available channels or other spectrum data to a remote spectrum manager that is managing access to the wireless network. | 06-07-2012 |
20130288734 | COGNITIVE RADIO METHODOLOGY, PHYSICAL LAYER POLICIES AND MACHINE LEARNING - In a method of cognitive communication a system for generating non-interfering transmission, includes conducting radio scene analysis to find grey space using external signal parameters for incoming signal analysis without having to decode incoming signals. | 10-31-2013 |
Apurva N. Mody, Chelmsford, MA US
Patent application number | Description | Published |
---|---|---|
20150050917 | METHOD FOR ENSURING SECURITY AND PRIVACY IN A WIRELESS COGNITIVE NETWORK - In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management and control messages as well as data traffic, thereby protecting information pertaining to node identification, node location, node-sensed incumbent transmissions, CRN frequency channel selections, and such like. During initial network registration, a temporary ID can be issued to a node, and then replaced once encrypted communication has been established. This prevents association of initial, clear-text messages with later encrypted transmissions. Elliptic curve cryptography can be used for mutual authentication between subscribers and the base station. ECC-based implicit digital certificates can be embedded in co-existence beacons used by CRN nodes to coordinate use of frequency channels, thereby preventing denial of service attacks due to transmitting of falsified beacons. Similar certificates can be embedded within identity beacons used to protect certain incumbents from interference by the CRN. | 02-19-2015 |
20150063570 | METHOD FOR ENSURING SECURITY AND PRIVACY IN A WIRELESS COGNITIVE NETWORK - In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management and control messages as well as data traffic, thereby protecting information pertaining to node identification, node location, node-sensed incumbent transmissions, CRN frequency channel selections, and such like. During initial network registration, a temporary ID can be issued to a node, and then replaced once encrypted communication has been established. This prevents association of initial, clear-text messages with later encrypted transmissions. Elliptic curve cryptography can be used for mutual authentication between subscribers and the base station. ECC-based implicit digital certificates can be embedded in co-existence beacons used by CRN nodes to coordinate use of frequency channels, thereby preventing denial of service attacks due to transmitting of falsified beacons. Similar certificates can be embedded within identity beacons used to protect certain incumbents from interference by the CRN. | 03-05-2015 |
Fersheed Khodadad Mody, Houston, TX US
Patent application number | Description | Published |
---|---|---|
20110247802 | BARRIER METHODS FOR USE IN SUBSURFACE HYDROCARBON FORMATIONS - Systems and methods used in treating a subsurface formation are described herein. Some embodiments also generally relate to barriers that have novel components therein. Such barriers may be obtained by using the systems and methods described. Some embodiments also generally relate to systems, methods, and/or processes for treating fluid produced from the subsurface formation. | 10-13-2011 |
Himanshu Champaklal Mody, Springville, UT US
Patent application number | Description | Published |
---|---|---|
20140087398 | OXIDIZED CARDIOLIPIN AND USES TO DETECT CARDIOLIPIN ANTIBODIES - Compositions, methods and devices for the detection of anti-lipoidal antibodies and the diagnosis of disease, for example, syphilis, are described. In particular, oxidized cardiolipins, which may be conjugated with a variety of attachment molecules, such as BSA, KLH, biotin, synthetic protein MAPS, IgY, streptavidin, or avidin, are described. Such oxidized cardiolipin, alone or complexed with one or more attachment molecules, are useful to detect anti-lipoidal antibodies (such as IgG and IgM antibodies) in subjects, for example, when used in ELISA plates. ELISA plates are described that permit the detection of anti-lipoidal antibodies and that permit the co-detection of nontreponemal and treponemal antibodies in biological samples. | 03-27-2014 |
20140322800 | OXIDIZED CARDIOLIPIN AND USES TO DETECT CARDIOLIPIN ANTIBODIES - Compositions, methods and devices for the detection of anti-lipoidal antibodies and the diagnosis of disease, for example, syphilis, are described. In particular, oxidized cardiolipins, which may be conjugated with a variety of attachment molecules, such as BSA, KLH, biotin, synthetic protein MAPS, IgY, streptavidin, or avidin, are described. Such oxidized cardiolipin, alone or complexed with one or more attachment molecules, are useful to detect anti-lipoidal antibodies (such as IgG and IgM antibodies) in subjects, for example, when used in ELISA plates. ELISA plates are described that permit the detection of anti-lipoidal antibodies and that permit the co-detection of nontreponemal and treponemal antibodies in biological samples. | 10-30-2014 |
Jigar Mody, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20120260343 | AUTOMATED MALWARE SIGNATURE GENERATION - Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature. | 10-11-2012 |
Jigar Mody, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090327267 | BASING SEARCH RESULTS ON METADATA OF PRIOR RESULTS - Embodiments of the invention provide a method, system, and media for determining search results based on a query. One embodiment of the method includes receiving an initial query, inspecting an initial set of query-related information that is associated with the query, which is the fruit of analyzing aggregated user-interaction data, which includes information related to how users have previously interacted with former search results that were presented in response to the query. This information includes prior metadata associated with the former search results. Embodiments further include presenting an initial set of search results based on the initial set of query-related information, gathering current user-interaction data, and updating the initial set of query-related information based on the current user-interaction data. In this way, an embodiment of the invention helps, among other things, map a semantic meaning of a query to results that bring about a satisfying user experience. | 12-31-2009 |
Jigar J. Mody, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090083852 | Whitelist and Blacklist Identification Data - Aspects of the subject matter described herein relate to identifying good files and malware based on whitelists and blacklists. In aspects, a node starts a scan of files on a data store. In conjunction with starting the scan, the node creates a data structure that indicates the directories on the data store. The node sends the data structure to a whitelist server and a blacklist server and an indication of a last successful time of communication. The whitelist and blacklist servers respond to the node with information about any new files that have been added to the directories since the last successful communication. The node may subsequently use the information to identify known good files and malware. | 03-26-2009 |
Jigar J. Mody, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20100077481 | COLLECTING AND ANALYZING MALWARE DATA - A malware analysis system is described that provides information about malware execution history on a client computer and allows automated back-end analysis for faster creation of identification signatures and removal instructions. The malware analysis system collects threat information on client computers and sends the threat information to a back-end analysis component for automated analysis. The back-end analysis component analyzes the threat information by comparing the threat information to information about known threats. The system builds a signature for identifying the threat family and a mitigation script for neutralizing the threat. The system sends the signature and mitigation data to client computers, which use the information to mitigate the threat. Thus, the malware analysis system detects and mitigates threats more quickly than previous systems by reducing the burden on technicians to manually create environments for reproducing the threats and manually analyze the threat behavior. | 03-25-2010 |
20110191757 | Defining Code by its Functionality - A system and method for defining code by its functionality is disclosed. The technology initially accesses a portion of code. Once the portion of code is accessed at least one functional operation embedded in the code is determined. When the functional operation in the code is determined, the portion of code is then defined by the functional operation. In so doing, the portion of code can be defined by functional operation without requiring the consideration of any semantics related to the portion of code. | 08-04-2011 |
Jigar Vijay Mody, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20090271390 | PRODUCT SUGGESTIONS AND BYPASSING IRRELEVANT QUERY RESULTS - A computer system, computer media, and computer-implemented method for generating product suggestions and providing product information are provided. The computer system includes a relevance engine, a product database, and a graphical user interface to respond to user queries and to provide product details associated with one or more products included in the user queries. The relevance engine determines which products are similar to products included in the user queries. The graphical user interface displays product suggestions that refine the user queries without executing the query on the product database, where a subset of the product suggestions are linked to product details pages. User selection of any of the product suggestions within the subset directs the user to a product details page for a specific product and bypasses a listing of results having many products that match the refined user queries. | 10-29-2009 |
Jyoti Mody, Frisco, TX US
Patent application number | Description | Published |
---|---|---|
20130038617 | Method and apparatus to record, archive, and playback computer monitor output - A recording apparatus for storing a screen output of at least one display device is disclosed. The at least one display device is connected to at least one processing unit for receiving a plurality of display signals forming the screen output and the recording apparatus is connected to at least one processing unit in a way that the recording apparatus functions independent of the connected processing unit. A recorder is capturing the screen output from the replica of the plurality of display signals thereon and stores into a data repository. An output interface is provided for playing the screen output on an user interface including a mobile device, or a web page or a third party application in communication with the recording apparatus. The recording apparatus may also be accessed from the remote users such that the recorded information may be accessed and played back. | 02-14-2013 |
Kamlesh Mody, Woodridge, IL US
Patent application number | Description | Published |
---|---|---|
20150112029 | Polyester Polyols and Methods of Making and Using the Same - Polyester polyols are generally disclosed, including methods of making and using them. In some embodiments, the polyester polyols are incorporated into a block copolymer, such as a polyurethane block copolymer. In some embodiments, the polyurethane block copolymers can be used as compatibilizing agents, which can be used, for example, in polymer blends, polymer alloys, solutions, emulsions, as well as in extruded and injection molded articles. In some embodiments, at least a portion of the polyurethane block copolymer is derived from a renewable source. | 04-23-2015 |
Mehernosh Adi Mody, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20130204858 | SYSTEMS AND METHODS FOR INCREASING RELEVANCY OF SEARCH RESULTS IN INTRA WEB DOMAIN AND CROSS WEB DOMAIN SEARCH AND FILTER OPERATIONS - An object of this invention is to filter the results of a website search or a published list on a website, by applying mathematical or logical criteria selected by the user or program, to any of the informational details of an element in the search result or list. An object of this invention is to expand the set of details associated with each element of the search result or published list by gathering user specified information associated with each element from the same or different websites. An object of this invention is to allow the user to identify details of interest of an element in the search result or published list and to limit the presentation of the results to the details of interest. An object of this invention is to accomplish this functionality in a generic manner independent of a specific or set of websites. | 08-08-2013 |
Mihir Narendra Mody, Bangalore, IN US
Patent application number | Description | Published |
---|---|---|
20150023609 | METHOD AND APPARATUS FOR DECODING A PROGRESSIVE JPEG IMAGE - A progressive JPEG (joint photographic experts group) decoder is disclosed. The progressive JPEG decoder includes a processing unit that receives a plurality of progressive scans and generates a plurality of modified progressive scans (MPSs). A baseline JPEG decoder, coupled to the processing unit, includes a Huffman decoder, an inverse quantization unit and an inverse transform unit. The Huffman decoder receives a current MPS and generates a set of transform coefficients corresponding to the current MPS. The processing unit adds a set of transform coefficients corresponding to a previous MPS to the set of transform coefficients corresponding to the current MPS, and the processing unit generates quantization indices. The inverse quantization unit estimates inverse quantization values based on the quantization indices. The inverse transform unit estimates inverse transform decoded values based on the estimated inverse quantization values and generates a set of pixels corresponding to the current MPS. | 01-22-2015 |
Neil Mody, Clarksburg, MD US
Patent application number | Description | Published |
---|---|---|
20120009199 | ANTIBODY FORMULATIONS - The present invention relates to formulations comprising sucrose, and methods of making such formulations, wherein the sucrose content promotes the reduction or elimination of the reversible self-association (RSA) tendency of the antibody in the formulation. The present invention also relates to formulations comprising an anti-PDGFR-alpha antibody or antibody fragment. Such antibodies can be used in various methods of treatment. The application further relates to a method of eliminating or reducing the RSA tendency of antibodies in a formulation. | 01-12-2012 |
Nipa A. Mody, West Henrietta, NY US
Patent application number | Description | Published |
---|---|---|
20090253204 | Continuous flow chamber device for separation, concentration, and/or purification of cells - The present invention relates to methods and apparatuses for cell separation. In particular, the invention relates to separation of a particular cell type from a mixture of different cell types based on the differential rolling property of the particular cell type on a substrate coated with molecules that exhibits adhesive property with the particular cell type. This technology is adaptable for use in implantable shunts and devices for cell trafficking or tumor neutralization. | 10-08-2009 |
Nirmal Mody, Lansdale, PA US
Patent application number | Description | Published |
---|---|---|
20100325217 | System and Method for Improved In-Browser Notification - Systems and methods for sending/receiving improved in-browser notification messages are provided. The notification messages are overlaid on HTTP traffic on port 80 for IP addresses provisioned to receive the notification messages from various sources, including weather, emergency broadcast, and police stations. A load balancer within the end-to-end system allows HTTP traffic on port 80 to be forked from non HTTP traffic on port 80 to selectively insert notification messages. The notifications are inserted by an internet content adoption protocol (ICAP) server in communication with other devices within the system. | 12-23-2010 |
20120224572 | System and Method for Improved In-Browser Notification - Systems and methods for sending/receiving improved in-browser notification messages are provided. The notification messages are overlaid on HTTP traffic on port | 09-06-2012 |
20140324996 | System and Method for Improved Notifications - Systems and methods for sending/receiving improved in-browser notification messages are provided. The notification messages are overlaid on HTTP traffic on port | 10-30-2014 |
Ravi Mody, Ann Arbor, MI US
Patent application number | Description | Published |
---|---|---|
20080302758 | Container base - A one-piece plastic container includes a body defining a longitudinal axis and having an upper portion, a sidewall portion and a base portion. The base portion defines a plurality of feet extending therearound. The base portion defines a contact diameter ratio of approximately 70-74% and a contact length ratio of approximately 20-23% for a plastic container having a volume capacity of approximately one (1) liter (1000 cc). According to additional features, the one-piece plastic container can have a nub defined on the base portion. For a one-piece plastic container having a volume capacity of approximately one (1) liter (1000 cc), the nub has a diameter of approximately 3-7 mm (0.12-0.28 inch), the base portion defines a contact area ratio of approximately 23-25%, and each foot defines corner transition portions each having a fillet radius of approximately 4-10 mm (0.16-0.39 inch). | 12-11-2008 |
Rustom K. Mody, Bellaire, TX US
Patent application number | Description | Published |
---|---|---|
20140332273 | CUTTING ELEMENT, TOOL AND METHOD OF CUTTING WITHIN A BOREHOLE - A cutting element includes, a body having two planes, each of the two planes defining a plurality of edges, and a support extending from a first of the two planes. The support and the body are configured such that when the cutting element is resting against a planar surface such that at least one of the plurality of edges and the support are in contact with the planar surface, the second of the two planes forms an acute angle with the planar surface. Additionally, a protrusion extends laterally from at least one face of the body and an indentation is formed in at least one face of the body. The protrusion and the indentation are complementary to one another such that the protrusion of a first of the cutting elements is positionable within the indentation of a second of the cutting elements. | 11-13-2014 |
Salil Kirit Mody, Mumbai, IN US
Patent application number | Description | Published |
---|---|---|
20150019422 | GUI-BASED WALLET PROGRAM FOR ONLINE TRANSACTIONS - Provided is a method and a GUI-based software application that acts as a wallet with network interconnectivity for enabling a user to securely and seamlessly conduct transactions with his or her online financial transaction program by means of a computer or a wireless handheld device without having to depend on an Internet browser. | 01-15-2015 |
Saumil C. Mody, Smyrna, GA US
Patent application number | Description | Published |
---|---|---|
20130042581 | SNAP-ON PROTECTIVE COVER FOR ELECTRONIC DEVICE - An electronic device protective cover that includes a substantially rigid screen protector panel. The electronic device cover attaches by snap-on connection over a portion of the electronic device. The protective cover can optionally secure to a base by a snap-on connection to form a multi-component protective system. | 02-21-2013 |
Saumil Chetan Mody, Smyrna, GA US
Patent application number | Description | Published |
---|---|---|
20130113348 | RUGGEDIZED CASE FOR HAND-HELD ELECTRONIC DEVICE - A ruggedized case having a main cover to be fitted closely over a hand-held electronic device is tub-shaped and is open on one side thereof for receiving the device therein. The main cover includes a rigid tub and resilient portions on the inside and outside of the tub. A substantially rigid screen protector is provided for protecting the display and is closely fitted over a front face of the hand-held electronic device and is closely fitted within the ruggedized main cover and held firmly therein. Thus, resilient material is placed closely against the hand-held electronic device, the rigid protective portion is closely against the inner soft cushioning, and an outer layer of soft cushioning material is closely against the rigid protective portion. The rigid protective panel is sandwiched between elements of soft, cushioning material. This composite, cushion-first construction provides superior protection against mechanical shock. | 05-09-2013 |
Seema Mody, Montville, NJ US
Patent application number | Description | Published |
---|---|---|
20080220029 | Fast-dissolving/disintegrating film preparation having high proportion of active - The invention provides a fast-dissolving or fast-disintegrating film preparation having a high proportion (i.e., at least about 40%) of active agent(s) and related methods for its preparation. In one embodiment, the active agent is a pharmaceutical and the film comprises between about 10% and about 40% pullulan as a primary or sole water-soluble polymer. | 09-11-2008 |
Viraj Mody, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20140297759 | CONTENT-ITEM LINKING SYSTEM FOR MESSAGING SERVICES - A client service, such as a plug-in to a browser, can alter a document retrieved from a compatible service to augment the document with services from an online content management service. When an application retrieves a compatible document, the client service can detect a document element within the document and alter the document to provide an activatable reference to the online content management service. For example, a client service can recognize an email composition webpage or an email display webpage and insert activatable references provide services from the online content management service. In email composition webpages, a reference can be a button that allows an email author to insert a link to a content item from the online content management service. In email display webpages, references can be added that allow attachments to be sent to the online content management service for storage. | 10-02-2014 |
Viraj B. Mody, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20100088300 | RESOURCE TRACKING - Clients may subscribe to resources for the purpose of receiving notifications of changes in the resource (e.g., a file is added to a shared folder). Storing subscriptions within persistent storage provides data security in the event of a service failure, at the cost of high latency in accessing subscription data. An efficient method for tracking a resource is provided herein. A subscription service creates subscriptions and monitors resources for a client. Upon a subscribed resource change, a notification service stores a notification of the change into a queue associated with the client. Efficient resource tracking is achieved because notification and subscription data is stored in low latency soft memory. The notification service is configured to detect a failure in the notification service and/or subscription service. In the event a service fails, the client provides a recovery mechanism by resubscribing to resources the client is interested in. | 04-08-2010 |
20130111069 | RESOURCE TRACKING | 05-02-2013 |