Saurabh
Saurabh Adya, Milpitas, CA US
Patent application number | Description | Published |
---|---|---|
20100199234 | METHODS AND APPARATUSES FOR CIRCUIT DESIGN AND OPTIMIZATION - In one aspect of an embodiment, a method implemented on a data processing system for circuit design, includes: identifying one or more first portions (e.g., islands) of a design of a circuit, where each of the one or more first portions contains a set of elements interconnected via timing critical nets; and reporting inter-dependency between portions of the circuit in view of the one or more first portions. In one aspect of an embodiment, a method implemented on a data processing system for circuit design, includes: identifying a first portion (e.g., island) of a design of a circuit, the first portion containing a set of elements interconnected via timing critical nets; and performing a synthesis transformation of the first portion to isolate timing dependency of the first portion on a non-critical net connected to an element of the first portion. | 08-05-2010 |
20130061195 | Methods and Apparatuses for Circuit Design and Optimization - In one aspect of an embodiment, a method implemented on a data processing system for circuit design, includes identifying one or more first portions of a design of a circuit, each of the one or more first portions containing a set of elements interconnected via timing nets and generating weights for the timing critical nets, the weights being generated after identifying the one or more first portions and executing a placer algorithm which uses the weights for the timing critical nets to place the set of elements on a representation of the design. In this method, in one embodiment, the weights for the timing critical nets can be generated to have values that differ from weights for non-critical nets. The placer algorithm can be any one of a variety of conventional placer algorithms such as a weighted wire length driven placer algorithm or a force directed timing driven placer algorithm or a min-cut placer algorithm. | 03-07-2013 |
Saurabh Agarwal, Gurgaon IN
Patent application number | Description | Published |
---|---|---|
20140289236 | REFINING SEARCH RESULTS FOR A COMPOUND SEARCH QUERY - A method for refining search results. The method includes receiving a search query and in response to determining the search query is a compound search query, the method includes parsing the compound search query into at least two sub-queries. The method includes performing a search for each of the sub-queries and receiving a set of results from each search. The method then includes receiving a selection of a received result from one of the results sets and performing a second search using the selected received result and a subquery not associated with the selected received result. | 09-25-2014 |
Saurabh Aggarwal, Lausanne CH
Patent application number | Description | Published |
---|---|---|
20140297021 | HIGH SPEED POCKET MILLING OPTIMISATION - The invention relates to a method of toolpath generation and cutting parameters optimization for high speed milling of a convex pocket, wherein said method comprises a first sub-method of generating a toolpath and a second sub-method of generating optimized chatfree cutting parameters using a genetic algorithm wherein the first sub-method generates milling toolpaths that minimize the radial depth of cut variations as well as the curvature change variations while avoiding leftover material at the corners, wherein said toolpaths automatically avoid self-intersecting features encountered during the offsetting of pocket boundary such that the said toolpaths result in reduction in milling time for a given maximum acceptable radial depth of cut and wherein said second sub-method allows the free choice of cutting parameters and optimizes the milling time and wherein the optimization method incorporates relevant milling constraints as milling stability constraint, cutting forces, machine-tool and cutting tool capabilities. | 10-02-2014 |
Saurabh Barjatiya, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20130347095 | ISOLATION AND SECURITY HARDENING AMONG WORKLOADS IN A MULTI-TENANT NETWORKED ENVIRONMENT - A method and associated systems for enhanced isolation and security hardening among multi-tenant workloads. An agent running on a processor of a networked computer system on which multicast and broadcast communications have been disabled captures an address-resolution query message from a querying tenant, converts the query message to a unicast message, and forwards the converted unicast query message to a switch. The switch forwards the converted unicast message to a redirection device and in response receives an address-resolution response message only after the redirection device verifies that the query and response messages comply with security policies. The switch forwards the address-resolution response to the querying tenant in conformance with security policies. | 12-26-2013 |
Saurabh Barnwal, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20140253740 | MANAGING SESSIONS BETWEEN NETWORK CAMERAS AND USER DEVICES - A server is configured to receive, from a user device, a first connection request including a request for a list of one or more camera devices connected to the server; establish a first channel, between the user device and the server, based on receiving the first connection request; provide the list of one or more camera devices to the user device via the first channel; receive a second connection request identifying a particular camera device of the one or more camera devices; establish a second channel based on receiving the second connection request; and provide the second connection request to the particular camera device via the second channel. A third channel may circumvent the server, and may be used to provide content, captured by the particular camera device, to the user device independently of the server. | 09-11-2014 |
Saurabh Bhadkaria, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130197789 | TRAVEL MANAGEMENT - A travel management system may include a client module to generate a request to update and/or search for data related to a trip. A database module may receive the request and communicate with a database. The database may include data organized in a trip data store table including unique keys respectively identifying trips. The database may further include index tables related to attributes of the trips and identified by the unique keys. The database module may obtain data related to the request from an index table corresponding to a unique key and forward a response to the client module. | 08-01-2013 |
20140142834 | SITUATION-AWARE MOBILE TRAVEL ADVISORY TO PUBLIC TRANSPORT COMMUTERS - A method for managing a public transport system comprises receiving information indicating a change of status of a component of a public transport system; identifying a commuter who is affected by the change of status; generating an alternative travel advisory for the commuter based on the change of status; and transmitting the alternative travel advisory to the commuter. In some embodiments the change of status includes a delay in an expected time of arrival of a public transport vehicle; identifying the commuter includes locating the commuter in the vehicle; and the alternative travel advisory includes a message advising the commuter to leave the vehicle. In some embodiments, locating the commuter in the vehicle is based on comparing a location of the commuter with a location of the vehicle. In some embodiments, the method further comprises receiving from the commuter information indicating that the commuter has boarded the vehicle. | 05-22-2014 |
20150046083 | DYNAMIC ETA AND STA TRANSPORTATION SYSTEM - A transportation system may store a standard time of arrival table including standard time of arrivals for fixed stops and waypoints or geo-sections. Delay of a vehicle reaching a fixed stop is determined and may be used to determine an estimated time of arrival to a destination on the route. Delay may be determined in response to traversing the waypoints or geo-sections on the route, and the estimated time of arrival may be updated according to the delay at each waypoint or geo-section. | 02-12-2015 |
20160062739 | SERVICE EXTRACTION AND APPLICATION COMPOSITION - Service extraction and application composition may include preprocessing and instrumenting an existing application that is to be converted to a service-oriented application. The existing application may be executed to generate traces related to a runtime behavior of services related to the existing application. The traces may be used to generate calling code related to the services related to the existing application. Representational state transfer (REST) application programming interfaces (APIs) that include the calling code to call the services related to the existing application may be generated. Refactored code for the existing application may be generated for invocation of the services related to the existing application by the REST APIs. | 03-03-2016 |
Saurabh Boyed, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20120254047 | SOFTWARE APPLICATION LICENSE ROAMING - A master license entry that links a software application to a user identification can be made. Application licenses to use the software application can be roamed to multiple computing machines. Feature licenses for added features of the software application can be roamed to those computing machines as well. Multiple overlapping license rights for the software application may be linked to the master license entry. A count of how many license rights for the software application are linked to the master license entry can be maintained. Requests for licenses may be refused if the count of license rights has reached zero. | 10-04-2012 |
20120255033 | LICENSING SOFTWARE ON A SINGLE-USER BASIS - The claimed subject matter provides a method for licensing software in a computing environment. An exemplary method includes initiating application software program on a computer system having a plurality of authorized users, one of the authorized users having a single-user license to use the software program. An identity of a current user of the computer system is checked. Operation of the software program is prohibited if the current user is one of the plurality of authorized users other than the user who is granted the single-user license. | 10-04-2012 |
20150347723 | SOFTWARE APPLICATION LICENSE ROAMING - A master license entry that links a software application to a user identification can be made. Application licenses to use the software application can be roamed to multiple computing machines. Feature licenses for added features of the software application can be roamed to those computing machines as well. Multiple overlapping license rights for the software application may be linked to the master license entry. A count of how many license rights for the software application are linked to the master license entry can be maintained. Requests for licenses may be refused if the count of license rights has reached zero. | 12-03-2015 |
Saurabh Bundela, Chhatarpur IN
Patent application number | Description | Published |
---|---|---|
20150227700 | METHODS FOR DRUG REPURPOSING AND DEVICES THEREOF - The present invention provides a method and system for drug repurposing. In accordance with a disclosed embodiment, the method may include selecting a set of positive drugs for an indication and listing a set of pathways for the set of positive drugs and a set of negative drugs. Further, the method shall include associating a pathway for each drug with an index value, based on an action of the each drug on the pathway. A pathway weight shall be calculated from the index value of the each pathway based on a frequency of occurrence of the each pathway in the set of positive drugs and in the set of negative drugs. A drug score for a drug to be repurposed shall be identified from the negative set of drugs, based on the pathway weight. The drug with a relatively high drug score can be repurposed for the indication. | 08-13-2015 |
Saurabh Chandorkar, Stanford, CA US
Patent application number | Description | Published |
---|---|---|
20080204173 | COMPOSITE MECHANICAL TRANSDUCERS AND APPROACHES THEREFOR - Mechanical transducers such as pressure sensors, resonators or other frequency-reference devices are implemented under conditions characterized by different temperatures. According to an example embodiment of the present invention, a combination of materials is implemented for mechanical transducer applications to mitigate temperature-related changes at or near a selected turnover temperature. In one application, a material property mismatch is used to facilitate single-anchor transducer applications, such as for resonators. Another application is directed to a Silicon-Silicon dioxide combination of materials. | 08-28-2008 |
Saurabh Chhaparwal, Minneapolis, MN US
Patent application number | Description | Published |
---|---|---|
20140137332 | MULTI-ZONE FLUID CHAMBER AND MATTRESS SYSTEM - A support surface assembly comprises a support surface and a multi-zone chamber comprising two or more inflatable bladders forming the support surface. In an example, first and second bladders of the multi-zone chamber are arranged in a head to toe configuration and are substantially free to move with respect to one another. In another example, a flexible joint is included between first and second bladders, the flexible joint including one or more releasable fasteners. In another example, a fluid communication conduit between first and second bladders couples the first and second bladders in a series fluid communication. In another example, the bladders form an array of bladders arranged in series from a head to a foot of the support surface, wherein each of the bladders has substantially the same dimensions. | 05-22-2014 |
Saurabh Dadu, Tigard, OR US
Patent application number | Description | Published |
---|---|---|
20100169630 | Pre-boot Recovery of a Locked Computer System - Embodiments of the present disclosure provide methods, apparatuses, articles, and removable storage devices for pre-boot recovery of a locked computer system. Other embodiments may also be described and claimed. | 07-01-2010 |
20110076986 | THEFT DETERRENT TECHNIQUES AND SECURE MOBILE PLATFORM SUBSCRITION FOR WIRELESSLY ENABLED MOBILE DEVICES - Theft deterrence and secure mobile platform subscription techniques for wireless mobile devices are described. An apparatus may comprise a removable secure execution module arranged to connect with a computing platform for a wireless mobile device. The removable secure execution module may comprise a first processing system to execute a security control module. The security control module may be operative to communicate with a security server over a wireless channel on a periodic basis to obtain a security status for the wireless mobile device. The security control module may output control directives to control operations for one or more components of the computing platform based on the security status. Other embodiments are described and claimed. | 03-31-2011 |
20110078791 | Using chipset-based protected firmware for host software tamper detection and protection - A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host operating system of the host system, which may be implemented by firmware of a chipset of the host system, obtains file metadata from the host system and uses the file metadata to identify a first file for examination for tampering. The secure partition obtains data blocks for the first file, communicates with a service via an out-of-band communication channel, and uses information obtained from the service and the data blocks to determine whether the first file has been corrupted. The secure partition obtains the file metadata and the data blocks for the first file without invoking an operating system or file system of the host system. | 03-31-2011 |
20110125485 | METHODS AND SYSTEMS FOR REAL TIME LANGUAGE TRANSLATION USING SOCIAL NETWORKING - Methods and systems with which a language translation may be obtained. An originator may request a translation by sending the passage to be translated to a server. The server may then broadcast the passage to prospective translators. In an embodiment, the translators may be connected to the originator and/or each other through a social network. Some or all of the prospective translators then return translations of the passage to the originator, via the server. The originator may then select the most desirable translation and inform the server. In an embodiment, the provision of the translation service may be part of an exchange or barter transaction. The server may apply a credit to the translator of the chosen translation. The translator may then use the credit in a subsequent trade or other transaction. | 05-26-2011 |
20110129077 | METHODS AND SYSTEMS FOR REAL TIME DISPLAY OF CALLER LOCATION, PROFILE, AND TRUST RELATIONSHIP - Methods and systems to display, in real time, detailed attribute information regarding a calling party. This information may be presented to a user in conjunction with an incoming voice-call or message on the user's smartphone/mobile internet device (MID) or other mobile device. Such information can help him/her in real-time to decide whether to respond to the communication. Attribute information is collected at a caller attributes processing server and communicated to a receiver device of the called party. | 06-02-2011 |
20110131447 | Automated modular and secure boot firmware update - A method, apparatus, system, and computer program product for an automated modular and secure boot firmware update. An updated boot firmware code module is received in a secure partition of a system, the updated boot firmware code module to replace one original boot firmware code module for the system. Only the one original boot firmware code module is automatically replaced with the updated boot firmware code module. The updated boot firmware code module is automatically executed with the plurality of boot firmware code modules for the system and without user intervention when the system is next booted. The updated boot firmware code module may be written to an update partition of a firmware volume, wherein the update partition of the firmware volume is read along with another partition of the firmware volume containing the plurality of boot firmware code modules when the system is booted. | 06-02-2011 |
20110151836 | Secure subscriber identity module service - A method, apparatus, system, and computer program product for a secure subscriber identity module service. Communication via a mobile network is activated in response to receiving a request to activate communication service for the system by a secure partition of the system. In response to receiving the request, a key is retrieved for a permit service from storage accessible only by the secure partition. The key is included in a permit requesting to activate the communication service, and the permit is sent to a service provider for the communication service. The service provider communicates with the permit service to obtain a digital signature for the permit. The secure partition receives a signed permit from the service provider, confirms that the signed permit contains the digital signature by the permit service, and activates the communication service for the system in response to confirming that the signed permit contains the digital signature. | 06-23-2011 |
20110151854 | REMOTE MANAGEMENT OVER A WIRELESS WIDE-AREA NETWORK USING SHORT MESSAGE SERVICE - A method and device for remote management over a wireless wide-area network includes receiving a short message over a wireless wide-area network (WWAN) using an out-of-band (OOB) processor of a computing device. The OOB processor is capable of communicating over the WWAN irrespective of an operational state of an in-band processor of the computing device. The computing device executes at least one operation with the OOB processor in response to receiving the short message. | 06-23-2011 |
20110154030 | Methods and apparatus for restoration of an anti-theft platform - Embodiments of methods for restoration an anti-theft platform are generally described herein. Other embodiments may be described and claimed. | 06-23-2011 |
20110154502 | Data Protection - A method to manage data access in an electronic device comprising a housing having a lid comprises receiving, from a remote server, a data protection policy, storing the data protection policy in a memory location on the electronic device, detecting a transition from a lid open status to a lid closed status, and in response to the transition, implementing the data protection policy on the electronic device. Other embodiments may be described. | 06-23-2011 |
20110161145 | METHOD AND DEVICE FOR SECURELY DISPLAYING DIGITAL CONTENT ON A COMPUTING DEVICE - A method and device for securely displaying digital content, such as an advertisement, on a computing device includes establishing an advertisement enforcement module in a secured environment on the computing device. The computing device receives advertisements from a remote advertisement server, which are validated by the advertisement enforcement module. The advertisement enforcement module ensures that the advertisement is displayed on the computing device in a secure manner and monitors for tampering of the advertisement and advertisement service by the user of the device. | 06-30-2011 |
20110237221 | METHOD AND APPARATUS FOR BEARER AND SERVER INDEPENDENT PARENTAL CONTROL ON SMARTPHONE, MANAGED BY THE SMARTPHONE - In some embodiments, the invention involves parental or master control of a child or subordinate mobile phone without service provider intervention. An embodiment of the invention is a system and method relating to master control of the subordinate smart phone using features on the smart phones, and independent of features provided by the phone service providers. Communication between the master and subordinate phones may be initiated using SMS messaging, near field communication, Bluetooth, direct connect to a PC, or by other secure wireless or wired connections. Once initiated, desired communication events are captured by the parental control application to effect control policies on the subordinate phone. Communication between the phones may be encrypted to prevent malicious intervention of message traffic Other embodiments are described and claimed. | 09-29-2011 |
20110238970 | System and method to lock electronic device - A method to lock an electronic device comprising an operating system comprises placing the electronic device in a disable state in which the processor is blocked from accessing the operating system, receiving a first unlock password from a remote source during a power-up operation of the electronic device, and placing the electronic device in a temporary unlock state which allows the processor to boot the operating system for a predetermined period of time when the first unlock password matches a password stored in the electronic device. Other embodiments may be described. | 09-29-2011 |
20110246373 | PAYMENT MANAGEMENT ON MOBILE DEVICES - Embodiments of techniques and systems for asynchronous offline bill review and payment are described. A bill payment management module, operated on a manageability engine on a mobile device, communicates with an online bill payment service. The bill payment management module may receive information about bill payments, including bills which are due, and presents selective information to a bill payment client application. A bill payer can then access the information on the mobile device through the bill payment client application and review or change the payment amounts. The review and the modifications may be performed when the mobile device is offline and the modifications may be stored until a later time when the mobile device can connect to a network. Once a network is available, the bill payment management module may send payment instructions to the online bill payment service. Other embodiments may be described and claimed. | 10-06-2011 |
20110246757 | UNATTENDED SECURE REMOTE PC CLIENT WAKE, BOOT AND REMOTE LOGIN USING SMART PHONE - Methods and systems to allow an authorized user to remotely awaken, boot, and login to a computer in a secure manner. The user and computer may communicate using a short message service. (SMS). The user may communicate with the computer using a mobile device, such as a smart phone. The user may initially provide a wake-up message to the computer, which may then respond by asking for one or more boot passwords. In an embodiment, these boot passwords may be basic input/output system (BIOS) passwords that are required for the loading and operations of the computer's BIOS. The user may then provide these one or more passwords to the computer. The computer may further request an operating system (OS) login password. The user may then provide this password to the computer. In an embodiment, all passwords may be provided to the computer in encrypted form. Moreover, authentication measures may be used to provide assurance that the user is legitimate. | 10-06-2011 |
20120030110 | DEVICE, SYSTEM, AND METHOD FOR LOCATION-BASED PAYMENT AUTHORIZATION - A device, system, and method for location-based payment authorization includes receiving a payment request for an order submitted from a mobile computing device via an e-commerce vendor website. A location of the mobile computing device is determined based on location data. In one embodiment, the payment request is authorized or denied based on whether the e-commerce vendor website has been authorized for the determined location of the mobile computing device. | 02-02-2012 |
20120115442 | SECURE SUBSCRIBER IDENTITY MODULE SERVICE - A method, apparatus, system, and computer program product for a secure subscriber identity module service. Communication via a mobile network is activated in response to receiving a request to activate communication service for the system by a secure partition of the system. In response to receiving the request, a key is retrieved for a permit service from storage accessible only by the secure partition. The key is included in a permit requesting to activate the communication service, and the permit is sent to a service provider for the communication service. The service provider communicates with the permit service to obtain a digital signature for the permit. The secure partition receives a signed permit from the service provider, confirms that the signed permit contains the digital signature by the permit service, and activates the communication service for the system in response to confirming that the signed permit contains the digital signature. | 05-10-2012 |
20120131345 | SECURE SOFTWARE LICENSING AND PROVISIONING USING HARDWARE BASED SECURITY ENGINE - Provisioning a license and an application program from a first server to a computing platform over a network. The host application derives a symmetric key at least in part from a user password, and sends the license to a license management firmware component of a security engine, in a message signed by the symmetric key. The license management firmware component derives the symmetric key at least in part from the user password stored in a secure storage of the security engine, verifies the signature on the message using the symmetric key, verifies the first server's signature on the license, decrypts the license using a first private key of the license management firmware component corresponding to the first public key to obtain the second key, and sends the second key to the host application, which decrypts the application program using the second key. | 05-24-2012 |
20120166304 | REAL-TIME MOBILE PAYMENT PROCESSING SYSTEM - A method, system, and device are disclosed. In one embodiment the method includes receiving a recipient phone number into an electronic gift phone module (EGPM). The EGPM also receives a set of gift data that includes a gift identification. The EGPM sends the recipient phone number and at least some gift data to an electronic gift processing server module (EGPSM). The EGPSM purchases a recipient gift by utilizing the gift identification. The EGPSM also sends notification of the recipient gift purchase to the recipient phone number. | 06-28-2012 |
20120178481 | REMOTE MANAGEMENT OVER A WIRELESS WIDE-AREA NETWORK USING SHORT MESSAGE SERVICE - Illustrative embodiments of systems and methods providing remote management over a wireless wide-area network (WWAN) using short messages are disclosed. In one embodiment, a computing device may include an in-band processor, a wireless transceiver configured for communications over a WWAN, and an out-of-band (OOB) processor capable of communicating over the WWAN using the wireless transceiver irrespective of an operational state of the in-band processor. The OOB processor may be configured to receive a short message via the wireless transceiver, determine whether the short message originated from a trusted remote computing device, and execute at least one operation indicated by the short message in response to determining that the short message originated from a trusted remote computing device. | 07-12-2012 |
20130003502 | CONFIGURABLE ULTRASOUND MEASUREMENT LOGIC IN A MOBILE COMPUTING DEVICE - A device, system, method, and machine readable medium for configurable ultrasound Doppler measurements from a mobile device are disclosed. In one embodiment, the device includes an oscillator capable of generating an ultrasound frequency sound wave. The device also includes an ultrasound emission module capable of emitting a first ultrasound wave at a first frequency and at a first power level and a second ultrasound wave at a second frequency and at a second power level. The device also an ultrasound receiver and amplifier module capable of receiving and amplifying ultrasound emission waves. The device also includes processing logic capable of receiving the first and second ultrasound waves and displaying those waves on a display device. | 01-03-2013 |
20130007873 | SYSTEMS AND METHODS FOR POWER-ON USER AUTHENTICATION - Embodiments of systems and methods for power-on user authentication are disclosed. A method for power-on user authentication may comprise receiving an authentication input with a security controller of a computing device prior to supplying power to a primary processor of the computing device, comparing the authentication input to an authentication code using the security controller, and supplying power to the primary processor in response to the authentication input matching the authentication code. | 01-03-2013 |
20130283182 | MECHANISM FOR FACILITATING PROXY USER INTERFACE-BASED REMOTE MANAGEMENT AND CONTROL OF COMPUTING AND NON-COMPUTING DEVICES - A mechanism is described for facilitating proxy user interface-based remote management and control of computing devices according to one embodiment of the invention. A method of embodiments of the invention includes remotely pairing a first device with a second device, and remotely controlling the second device via a user interface provided at the first device. The user interface may serve as a proxy user interface at the first device for remotely controlling the second device. The first device may include a first computing device, and wherein the second device may include a second computing device or a second non-computing device. | 10-24-2013 |
20130322648 | MULTI-STREAM-MULTIPOINT-JACK AUDIO STREAMING - A method and device for streaming the output of one or more audio sources to one or more smart headsets includes establishing a secure connection with a smart headset, associating an audio channel of the one or more audio sources with the smart headset, and streaming the associated audio channel to the smart headset. The audio streaming device may selectively stream one or more audio channels from one or more audio sources to one or more of the smart headsets as a function of a streaming policy. | 12-05-2013 |
20140013136 | POWER EFFICIENT LOCATION NOTIFICATION - Before a device enters a power saving mode, a location-aware application in the device may provide at least one wake trigger (and a trigger limit) to a low power monitoring module (LPMM). In power saving mode, the LPMM receives device locations from a location service module and may determine when the device location corresponds to the at least one wake trigger or trigger limit. In one embodiment, device location may only be provided to the LPMM based on a condition (e.g., timer expiration or reaching a displacement threshold as measured by sensors in the device). When device location corresponds to the trigger limit, the LPMM may notify the device (e.g., cause a transition to an active power mode) so that the location-aware application can redetermine the at least one wake trigger. The device location corresponding to the at least wake trigger may also cause the LPMM to notify the device. | 01-09-2014 |
20140015987 | CONTEXT BASED MANAGEMENT FOR SECURE AUGMENTED REALITY APPLICATIONS - An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device including a camera, the camera including a secure mode of operation and a display, an image processing module configured to convert image data from the camera to encoded data when the camera is in the secure mode and protect image data stored in the system, an encryption module configured to encrypt encoded data from the image processing module, and a protected audiovisual path mechanism configured to securely send augmented encoded data to the display. | 01-16-2014 |
20140047428 | AUTOMATED MODULAR AND SECURE BOOT FIRMWARE UPDATE - A method, apparatus, system, and computer program product for an automated modular and secure boot firmware update. An updated boot firmware code module is received in a secure partition of a system, the updated boot firmware code module to replace one original boot firmware code module for the system. Only the one original boot firmware code module is automatically replaced with the updated boot firmware code module. The updated boot firmware code module is automatically executed with the plurality of boot firmware code modules for the system and without user intervention when the system is next booted. The updated boot firmware code module may be written to an update partition of a firmware volume, wherein the update partition of the firmware volume is read along with another partition of the firmware volume containing the plurality of boot firmware code modules when the system is booted. | 02-13-2014 |
20140075496 | MOBILE PLATFORM WITH SENSOR DATA SECURITY - Generally, this disclosure describes devices, methods and systems for securely providing context sensor data to mobile platform applications. The method may include configuring sensors to provide context data, the context data associated with a mobile device; providing an application programming interface (API) to a sensor driver, the sensor driver configured to control the sensors; providing a trusted execution environment (TEE) operating on the mobile device, the TEE configured to host the sensor driver and restrict control and data access to the sensor driver and to the sensors; generating a request for the context data through the API, the request generated by an application associated with the mobile device; receiving, by the application, the requested context data and a validity indicator through the API; verifying, by the application, the requested context data based on the validity indicator; and adjusting a policy associated with the application based on the verified context data. | 03-13-2014 |
20140075550 | HARDWARE-ENFORCED ACCESS PROTECTION - The present disclosure is directed to systems and methods related to hardware-enforced access protection. An example device may comprise a login agent module (LAM), an operating system login authentication module (OSLAM) and a secure user authentication module (SUAM). The LAM may be configured to cause a prompt requesting login information to be presented by the device. The LAM may then provide the login information to the OSLAM, which may be configured to authenticate the login information using known user information. If authenticated, the OSLAM may generate and transmit a signed login success message to the SUAM using a private key. The SUAM may be secure/trusted software loaded by device firmware, and may be configured to authenticate the signed login success message. If authenticated, the SUAM may transmit an encrypted authentication message to the OSLAM. If the encrypted authentication message is authenticated, the OSLAM may grant access to the device. | 03-13-2014 |
20140089507 | APPLICATION INDEPENDENT CONTENT CONTROL - Systems and techniques for application independent content control are described herein. It may be determined that a content filter is enabled for a computing device. The content filter may include a restricted term. A content container may be identified in a device buffer of the computing device. The content container may also include the restricted term. A portion of the content container corresponding to the restricted term may be modified in the device buffer to block the restricted term. | 03-27-2014 |
20140093083 | SYSTEM, DEVICE, AND METHOD FOR SECURING VOICE AUTHENTICATION AND END-TO-END SPEECH INTERACTION - A method, device, and system for secure end-to-end audio recognition is disclosed. A client device launches an application that connects with a server. The client device and server exchange cryptographic keys and establish a secure connection and a shared cryptographic key. The server transmits an encrypted audio prompt to the client device. The client device decrypts the encrypted audio prompt and stores the decrypted audio prompt in secure memory inaccessible to the operating system using an audio engine of the client device. The audio engine then retrieves the audio and renders it for the user through the speakers of the client device. The client device captures the user's audio response with a microphone and stores the audio response in the secure memory. The stored audio response is encrypted and transmitted to the server. | 04-03-2014 |
20140094989 | MECHANISM FOR FACILITATING REAL-TIME CONTEXT-AWARE MESSAGES FOR VEHICLE-BASED AND OTHER COMPUTING DEVICES - A mechanism is described for facilitating real-time context-aware messages at computing devices according to one embodiment. A method of embodiments, as described herein, includes evaluating real-time context-aware data relating to a vehicle, recommending a real-time message based the evaluation of the context-aware data. The recommended message may include one or more of a warning message, an alert message, a reminder message, and an information message. The method may further include facilitating displaying the recommended real-time message at a first display screen at the vehicle or a second display screen of a mobile computing device within a proximity of the vehicle. Other embodiments are described and claimed. | 04-03-2014 |
20140169634 | SYSTEM, DEVICE, AND METHOD FOR DETECTING AND LOCATING WANTED VEHICLES - A method, system, and device for analyzing images captured by a vehicle-based camera includes establishing a communication connection between a mobile communication device and an in-vehicle computing system. Scanning data may be retrieved from a scanning data server by the mobile communication device and, in some embodiments, forwarded to the in-vehicle computing system. A vehicle-base camera may be used to capture one or more images. An image analysis module of the in-vehicle computing system or mobile communication device may be used to analyze the captured image(s) for a match between the image(s) and the scanning data. In response to identifying a match, the mobile communication device may notify the scanning data server of the identified match. | 06-19-2014 |
20140173271 | POWER LINE BASED THEFT PROTECTION OF ELECTRONIC DEVICES - Technologies for establishing and managing a connection with a power line communication network include establishing a communication connection between an electronic device and a security server. A default device encryption key associated with the electronic device is changed to correspond with a new device encryption key of the security server. Thereafter, the electronic device may only join a power line communication network of a particular security server using a network membership key, which is encrypted with the device encryption key that the particular security server associates to the electronic device. The electronic device contains a circuit interrupt to interrupt a circuit of the electronic device if the electronic device is not able to successfully decrypt the network membership key. | 06-19-2014 |
20140181691 | SHARING OF SELECTED CONTENT FOR DATA COLLECTION - Private information can be collected from a receiving computing device user via a requesting computing device sharing selected content presented on a requesting device display with the receiving device. Communication between the devices can be secure, peer-to-peer and can be established using Near Field Communication technologies. The selected content comprises data fields for which a receiving device user supplies data values. The requesting computing device can update the presented selected content based on the received receiving user input and send updated display information to the receiving device. Alternatively, the receiving device can send data fields to the requesting device as data fields are fully entered. The selected content shared with and the data values received from the mobile device can be translated into other languages. Cloud resources can be involved in the pairing and authentication of devices, the translation of data sent between devices and the communication of data between devices. | 06-26-2014 |
20140189017 | COMPREHENSIVE TASK MANAGEMENT - Technologies for generating tasks from communication messages includes a mobile computing device for monitoring communication messages, parsing the communication messages to detect content indicative of upcoming tasks, generating a task for each of the upcoming tasks detected, generating a task list from the generated tasks, and generating an alarm for each task. Additionally, the mobile computing device receives tasks generated by a cloud server. | 07-03-2014 |
20140189392 | COMMUNICATION LINK AND NETWORK CONNECTIVITY MANAGEMENT IN LOW POWER MODE - Methods and apparatus relating to communication link and network connectivity management in low power mode are described. In one embodiment, logic manages one or more external communication network links (also referred as “links”) in response to a determination that a processor has entered a low power consumption state and based on policy information. The logic also blocks/intercepts one or more signals, corresponding to management of the one or more links, that are directed to the processor to allow the processor to stay in the low power consumption. Other embodiments are also claimed and disclosed. | 07-03-2014 |
20140208340 | DYNAMIC CONTENT RATING MANAGEMENT ACROSS A VARIETY OF TELEVISION INPUT SOURCES - Generally, this disclosure describes a system and method for dynamic content management across a variety of television input sources. The system may include an audience detection module configured to identify a viewer in a viewing area of a display configured to display received media content; a media scanning module configured to determine a media content rating associated with a portion of a media content received from at least one of a local content source and a remote content source; and a media player configured to adapt display of the portion of the received media content based on a policy when the associated media content rating corresponds to inappropriate content for the identified viewer. | 07-24-2014 |
20140212051 | METHOD AND APPARATUS FOR CONTROLLING CONTENT CAPTURE OF PROHIBITED CONTENT - Embodiments of methods, apparatuses, and storage mediums associated with controlling content capture of prohibited content on remote devices, are disclosed. In embodiments, components of a remote device may receive image data of an image captured by the remote device and analyze the image data to determine whether the image includes prohibited content. In embodiments, the remote device may conditionally display or persistently store the image data, based at least in part on a result of the analysis. | 07-31-2014 |
20140283018 | MECHANISMS FOR LOCKING COMPUTING DEVICES - Various systems and methods for locking computing devices are described herein. In an example, a portable device comprises an electro-mechanical lock; and a firmware module coupled to the electro-mechanical lock, the firmware module configured to: receive an unlock code; validate the unlock code; and unlock the electro-mechanical lock when the unlock code is validated. In another example, device for managing BIOS authentication, the device comprising an NFC module, the NFC module comprising an NFC antenna; and a firmware module, wherein the firmware module is configured to: receive an unlock code from an NFC device via the NFC antenna; validate the unlock code; and unlock a BIOS of the device when the unlock code is validated. | 09-18-2014 |
20140289789 | CLOUD BASED REAL TIME APP PRIVACY DASHBOARD - A method of operating an electronic device comprises detecting access to private information stored in memory of the electronic device. The detecting is performed by a privacy management module downloadable to the electronic device as object code for execution on the electronic device and the access is performed by a client application program. The method further comprises tracking, using the privacy management module, the private information being accessed by the client application program, and reconfiguring the electronic device, using the privacy management module, to change the access to the private information by the client application program according to at least one privacy access policy stored in the electronic device. | 09-25-2014 |
20140308924 | METHOD AND APARATUS FOR BEARER AND SERVER INDEPENDENT PARENTAL CONTROL ON SMARTPHONE, MANAGED BY SMARTPHONE - In some embodiments, the invention involves parental or master control of a child or subordinate mobile phone without service provider intervention. An embodiment of the invention is a system and method relating to master control of the subordinate smart phone using features on the smart phones, and independent of features provided by the phone service providers. Communication between the master and subordinate phones may be initiated using near field communication, Bluetooth, direct connect to a PC, or by other secure, local wireless or wired connections. Once initiated, desired communication events are captured by the parental control application to effect control policies on the subordinate phone. Communication between the phones may be encrypted to prevent malicious intervention of message traffic. Other embodiments are described and claimed. | 10-16-2014 |
20140362236 | CONTEXT BASED MANAGEMENT FOR SECURE AUGMENTED REALITY APPLICATIONS - An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device including a camera, the camera including a secure mode of operation and a display, an image processing module configured to convert image data from the camera to encoded data when the camera is in the secure mode and protect image data stored in the system, an encryption module configured to encrypt encoded data from the image processing module, and a protected audiovisual path mechanism configured to securely send augmented encoded data to the display. | 12-11-2014 |
20150046698 | POWER LINE BASED THEFT PROTECTION OF ELECTRONIC DEVICES - Technologies for establishing and managing a connection with a power line communication network include establishing a communication connection between an electronic device and a security server. A default device encryption key associated with the electronic device is changed to correspond with a new device encryption key of the security server. Thereafter, the electronic device may only join a power line communication network of a particular security server using a network membership key, which is encrypted with the device encryption key that the particular security server associates to the electronic device. The electronic device contains a circuit interrupt to interrupt a circuit of the electronic device if the electronic device is not able to successfully decrypt the network membership key. | 02-12-2015 |
20150065199 | MOBILE PHONE WITH VARIABLE ENERGY CONSUMING SPEECH RECOGNITION MODULE - Apparatus, computer-readable storage medium, and method associated with speech recognition are described. In embodiments, a mobile phone may include a processor; and a speech recognition module coupled with the processor. The voice recognition module may be configured to recognize one or more voice commands and may include first echo cancellation logic and second echo cancellation logic to be selectively employed during recognition of voice commands. Employment of the first and second echo cancellation logic respectively may cause the mobile phone to variably consume a first and second amount of energy, with the second amount of energy being less than the first amount energy. | 03-05-2015 |
20150070184 | LOW POWER VOICE TRIGGER FOR FINDING MOBILE DEVICES - Systems and methods may provide for monitoring an input audio signal from an onboard microphone of a mobile device while a host processor of the mobile device is in a standby mode. Additionally, a predetermined audio pattern may be identified in the input audio signal and a device location session may be triggered with respect to the mobile device based on the predetermined audio pattern. In one example, an output audio signal is generated during the device location session. | 03-12-2015 |
20150098578 | CANCELLATION OF INTERFERING AUDIO ON A MOBILE DEVICE - Generally, this disclosure provides devices, systems and methods for cancelling an interfering audio signal. The system may include a mobile device including a microphone configured to capture an acoustic audio signal, the acoustic audio signal a combination of the interfering audio signal and a desired audio signal, the desired audio signal generated by a user of the mobile device. The system may also include a wireless communication module incorporated in the mobile device, to receive a reference signal through a side-channel, the reference signal associated with the interfering audio signal. The system may further include an acoustic echo cancellation module incorporated in the mobile device, the acoustic echo cancellation module to cancel the interfering audio signal from the captured acoustic audio signal, the cancellation based on the reference signal. | 04-09-2015 |
20150179189 | PERFORMING AUTOMATED VOICE OPERATIONS BASED ON SENSOR DATA REFLECTING SOUND VIBRATION CONDITIONS AND MOTION CONDITIONS - Systems and methods may provide for determining a sound vibration condition of an ambient environment of a wearable device and determining a motion condition of the wearable device. In addition, one or more automated voice operations may be performed based at least in part on the sound vibration condition and the motion condition. In one example, two or more signals corresponding to the sound vibration condition and the motion condition may be combined. | 06-25-2015 |
20150186636 | EXTENDING USER AUTHENTICATION ACROSS A TRUST GROUP OF SMART DEVICES - Particular embodiments described herein provide for a wearable electronic device with a biometric sensor and logic. At least a portion of the logic is implemented in hardware. The logic is configured to receive input data indicative of biometric input and attempt to authenticate the input data based, at least in part, on at least one biometric credential of an authorized user. The logic is configured to establish a wireless connection to a smart device, determine whether the smart device is included in a trust group of one or more smart devices, and send a communication to unlock the smart device when the input data is successfully authenticated and when the trust group includes the smart device. | 07-02-2015 |
20150187206 | TECHNIQUES FOR DETECTING SENSOR INPUTS ON A WEARABLE WIRELESS DEVICE - Various embodiments are generally directed to an apparatus, method and other techniques for detecting, by one or more sensor components, at least one sensor input, and executing, by logic, at least one instruction to cause an event on a wearable wireless device, the event comprising at least one of a change in a physical parameter on the wearable wireless device and a wireless communication with a computing device via a transceiver. | 07-02-2015 |
20150187369 | INTELLIGENT ANCILLARY ELECTRONIC DEVICE - In one example a controller comprises logic, at least partially including hardware logic, configured to detect a key phrase in a received audio signal, and in response to the key phrase, to transmit a signal to a personal assistant in a remote electronic device, determine whether an audio input was received, and in response to a determination that additional audio input was received prior to receiving a response from the personal assistant in the remote electronic device, to buffer the audio input in a memory and forward the audio input to the personal assistant in the remote electronic device. Other examples may be described. | 07-02-2015 |
20150220916 | TECHNIQUES FOR AN IN-VEHICLE ELECTRONIC WALLET - Various embodiments are generally directed to an apparatus, method and other techniques for activating a payment account for an vehicle electronic wallet component and to associate the payment account with a vehicle. In various embodiments, a request for payment for a transaction may be received over a contactless communication link when the vehicle is in proximity to a payment processing entity and authentication information to approve the request for payment may be received. The payment information corresponding to the payment account may be transmitted over the contactless communication link to the payment processing entity to enable payment for the transaction. Other embodiments are described and claimed. | 08-06-2015 |
20150221307 | TRANSITION FROM LOW POWER ALWAYS LISTENING MODE TO HIGH POWER SPEECH RECOGNITION MODE - Disclosed are embodiments for seamless, single-step, and speech-triggered transition of a host processor and/or computing device from a low functionality mode to a high functionality mode in which full vocabulary speech recognition can be accomplished. First audio samples are captured by a low power audio processor while the host processor is in a low functionality mode. The low power audio processor may identify a predetermined audio pattern. The low power audio processor, upon identifying the predetermined audio pattern, triggers the host processor to transition to a high functionality mode. An end portion of the first audio samples that follow an end-point of the predetermined audio pattern may be stored in system memory accessible by the host processor. Second audio samples are captured and stored with the end portion of the first audio samples. Once the host processor transitions to a high functionality mode, multi-channel full vocabulary speech recognition can be performed and functions can be executed based on detected speech interaction phrases. | 08-06-2015 |
20150245154 | MECHANISM AND APPARATUS FOR SEAMLESS VOICE WAKE AND SPEAKER VERIFICATION - Technologies are described herein that allow a user to wake up a computing device operating in a low-power state and for the user to be verified by speaking a single wake phrase. Wake phrase recognition is performed by a low-power engine. In some embodiments, the low-power engine may also perform speaker verification. In other embodiments, the mobile device wakes up after a wake phrase is recognized and a component other than the low-power engine performs speaker verification on a portion of the audio input comprising the wake phrase. More than one wake phrases may be associated with a particular user, and separate users may be associated with different wake phrases. Different wake phrases may cause the device transition from a low-power state to various active states. | 08-27-2015 |
20150281583 | IMAGE SENSOR - The present disclosure provides techniques for capturing an image or video. In particular, the present disclosure provides techniques for capturing the image or video using a camera integrated with a computing device, such as a cellular phone. A computing device can include an image sensor to capture image data and a processor to process the image data. The image sensor is to capture the image data in an orientation format irrespective of an orientation of the computing device. | 10-01-2015 |
20150296362 | SECURE SHARING OF DEVICE VOICE AND DATA SERVICES WITH FEE BASED POLICIES - Methods and systems may provide for conducting an authentication of an external card associated with a borrower of a device, and tracking a usage of the device by the borrower if the authentication of the external card is successful. In addition, the usage may be reported to a billing service. The usage may be billed according to a fee based policy so that payment for the usage may be obtained from the borrower of the device rather than the owner of the device. | 10-15-2015 |
20150327035 | FAR-END CONTEXT DEPENDENT PRE-PROCESSING - This application discusses among other things apparatus and methods for optimizing speech recognition at a far-end device. In an example, a method can include establishing a link with a far-end communication device using a near-end communication device, identifying a context of the far end communication device, and selecting one audio processing mode of a plurality of audio processing modes at the near-end communication device, the one audio processing mode associated with the identified context of the far-end device, and configured to reduce reception error by the far-end communication device of audio transmitted from the near-end communication device. | 11-12-2015 |
20150349913 | SYSTEM, DEVICE, AND METHOD FOR SECURING VOICE AUTHENTICATION AND END-TO-END SPEECH INTERACTION - A method, device, and system for secure end-to-end audio recognition is disclosed. A client device launches an application that connects with a server. The client device and server exchange cryptographic keys and establish a secure connection and a shared cryptographic key. The server transmits an encrypted audio prompt to the client device. The client device decrypts the encrypted audio prompt and stores the decrypted audio prompt in secure memory inaccessible to the operating system using an audio engine of the client device. The audio engine then retrieves the audio and renders it for the user through the speakers of the client device. The client device captures the user's audio response with a microphone and stores the audio response in the secure memory. The stored audio response is encrypted and transmitted to the server. | 12-03-2015 |
20150358733 | MULTI-STREAM-MULTIPOINT-JACK AUDIO STREAMING - A method and device for streaming the output of one or more audio sources to one or more smart headsets includes establishing a secure connection with a smart headset, associating an audio channel of the one or more audio sources with the smart headset, and streaming the associated audio channel to the smart headset. The audio streaming device may selectively stream one or more audio channels from one or more audio sources to one or more of the smart headsets as a function of a streaming policy. | 12-10-2015 |
20150379624 | PROXIMITY-BASED INTER-COMPUTING DEVICE NEGOTIATION - Embodiments are disclosed herein for inter-computing device negotiation. In some embodiments, a first computing device may determine that a second computing device is within a predetermined proximity of the first computing device, and may cause the transmission of negotiation initiation data to the second computing device in response to the determination. The first computing device may receive negotiation response data provided by the second computing device, and may determine that the negotiation response data meets negotiation evaluation criteria. In response, the first computing device may cause the transmission of a confirmation message to the second computing device. Other embodiments may be disclosed and/or claimed. | 12-31-2015 |
20150381609 | WEARABLE ELECTRONIC DEVICES - Wearable electronic device technology is disclosed. In an example, a wearable electronic device can include a handling portion that facilitates donning the wearable electronic device on a user. The wearable electronic device can also include a user authentication sensor associated with the handling portion and configured to sense a biometric characteristic of the user while the user is donning the wearable electronic device. In addition, the wearable electronic device can include a security module to determine whether the sensed biometric characteristic indicates an authorized user of the wearable electronic device. | 12-31-2015 |
20150381704 | MECHANISM FOR FILE TRANSFORMATION AND SHARING ACROSS DEVICES USING CAMERA INTERFACE - Embodiments described herein relate generally to the transmission of a request for a file from a first computing device to a second computing device. The first computing device may present an image having a representation of a file to a user and detect a selection of a location on the image at which the representation of the file is disposed. The first computing device, in turn, may transmit the image and a description of the selection to the second computing device. Based on the received image and description of the selection, the second computing device may identify the file corresponding to the selected location on the image. The second computing device may adapt, or cause to be adapted, the identified file. The second computing device may then transmit the identified file (or the adapted version) to the first computing device. Other embodiments may be described and/or claimed. | 12-31-2015 |
20160034711 | CLOUD BASED REAL TIME APP PRIVACY DASHBOARD - A method of operating an electronic device comprises detecting access to private information stored in memory of the electronic device. The detecting is performed by a privacy management module downloadable to the electronic device as object code for execution on the electronic device and the access is performed by a client application program. The method further comprises tracking, using the privacy management module, the private information being accessed by the client application program, and reconfiguring the electronic device, using the privacy management module, to change the access to the private information by the client application program according to at least one privacy access policy stored in the electronic device. | 02-04-2016 |
20160080683 | CONTEXT BASED MANAGEMENT FOR SECURE AUGMENTED REALITY APPLICATIONS - An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device including a camera, the camera including a secure mode of operation and a display, an image processing module configured to convert image data from the camera to encoded data when the camera is in the secure mode and protect image data stored in the system, an encryption module configured to encrypt encoded data from the image processing module, and a protected audiovisual path mechanism configured to securely send augmented encoded data to the display. | 03-17-2016 |
20160091867 | DIGITAL ANALOG DISPLAY WITH ROTATING BEZEL - A wearable device is described herein. The wearable device includes a display. The display can be a digital display with analog components. The wearable device also includes an input device. The input device is to control the digital display and the analog components correspond to the digital display. In some cases, the input device is a bezel. | 03-31-2016 |
20160098610 | SYSTEM, DEVICE, AND METHOD FOR GEO-LOCATING OBJECTS - A method, system, and device for analyzing images captured by a vehicle-based camera includes establishing a communication connection between a mobile communication device and an in-vehicle computing system. Scanning data may be retrieved from a scanning data server by the mobile communication device and, in some embodiments, forwarded to the in-vehicle computing system. A vehicle-base camera may be used to capture one or more images. An image analysis module of the in-vehicle computing system or mobile communication device may be used to analyze the captured image(s) for a match between the image(s) and the scanning data. In response to identifying a match, the mobile communication device may notify the scanning data server of the identified match. | 04-07-2016 |
Saurabh Dravid, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20100100369 | Translating Source Locale Input String To Target Locale Output String - A dictionary mapping source locale strings to target locale strings is constructed. A tree is constructed from the dictionary. The tree has nodes including a start node, end nodes, and string nodes. The nodes form node chains of the tree that correspond to the source locale strings. Each node chain links a collection of the nodes from the start node to a string node. Each node other than the start node has a parent node and corresponds to a character of the source locale strings. Each node other than the end nodes has one or more child nodes. Each string node ends a node chain, and corresponds to a mapping within the dictionary of a source locale string to a target locale string. An input string having the source locale is processed against the tree to generate an output string having the target locale. | 04-22-2010 |
Saurabh Gaba, Gurgaon IN
Patent application number | Description | Published |
---|---|---|
20140067669 | Methods and Systems for Managing Communication Streams - Methods and systems for managing communication streams from multiple sources while utilizing a single short code employ a processor coupled to memory and other computer hardware and software components for establishing at least one conversation session with an outbound message to a recipient and defining a lifespan of the outbound message of the at least one conversation session. At least one reply to a response from the recipient to the outbound message of the at least one conversation session is delivered during the lifespan of the outbound message of the at least one conversation session. | 03-06-2014 |
Saurabh Gayali, New Delhi IN
Patent application number | Description | Published |
---|---|---|
20150247161 | METHOD OF PRODUCING STRESS TOLERANT PLANTS OVER-EXPRESSING OsAlba1 - In the present disclosure there is provided transgenic plants that are resistant to a host of abiotic stress factors. In particular, the said transgenic plants over-express the translated product of OsAlba1 gene. Also provided in the present disclosure are cDNA fragments, recombinant DNA constructs, vectors and host cells useful in generating transgenic plants that are resistant to abiotic stress susceptibility. | 09-03-2015 |
Saurabh Gorecha, Ratlam IN
Patent application number | Description | Published |
---|---|---|
20130111528 | DYNAMIC PROVISIONING OF CLOSED CAPTIONING TO USER DEVICES | 05-02-2013 |
Saurabh Gorecha, Chennai IN
Patent application number | Description | Published |
---|---|---|
20110058609 | SYSTEM AND METHOD FOR OBJECT BASED PARAMETRIC VIDEO CODING - A video compression framework based on parametric object and background compression is proposed. At the encoder, an embodiment detects objects and segments frames into regions corresponding to the foreground object and the background. The object and the background are individually encoded using separate parametric coding techniques. While the object is encoded using the projection of coefficients to the orthonormal basis of the learnt subspace (used for appearance based object tracking), the background is characterized using an auto-regressive (AR) process model. An advantage of the proposed schemes is that the decoder structure allows for simultaneous reconstruction of object and background, thus making it amenable to the new multi-thread/multi-processor architectures. | 03-10-2011 |
20130145406 | VIDEO ON DEMAND PROCESSING - A device may include a communication interface configured to receive a request from a client device, where the request identifies a first video on demand (VOD). The device may also include logic configured to identify capabilities associated with the client device, the capabilities including at least one of a decoding capability of the client device, a content protection scheme supported by the client device, or a transport protocol via which the client device can communicate, and forward the request for the VOD to a service provider associated with providing the first VOD. The logic may also be configured to receive a media stream from the service provider, the media stream corresponding to the first VOD, process the media stream in accordance with the identified capabilities, and forward the processed media stream to the client device. | 06-06-2013 |
20130227597 | PERSONAL PROGRAM CHANNEL - Method, device, and storage medium for receiving a request for a program from a user device; transmitting the program to the user device; storing tuning information associated with the request of the program; generating a program log that includes a user's viewing history based on the tuning information; analyzing the program log to identify programs of interest to the user; generating personal program channel information based on the analyzing, wherein the personal program channel information includes a schedule of programs; and providing to the user device a personal program channel that operates according to the schedule of programs. | 08-29-2013 |
20130232205 | EMAIL ATTACHMENT HELPER - A computing device receives instructions, from a user, to send an email message and determines if the email message includes an attachment. When the email message does not include an attachment, the computing device conducts a scan of text of the email message for implications that an attachment should be included. When the email message includes an attachment, the computing device conducts a scan of the email text for implications of a particular type of attachment. The computing device provides, to the user, a notification when there is a positive result from the scan of the email text for implications that an attachment should be included or from the scan of the email text for implications of a particular type of attachment. | 09-05-2013 |
20140348231 | SYSTEM AND METHOD FOR OBJECT BASED PARAMETRIC VIDEO CODING - A video compression framework based on parametric object and background compression is proposed. At the encoder, an embodiment detects objects and segments frames into regions corresponding to the foreground object and the background. The object and the background are individually encoded using separate parametric coding techniques. While the object is encoded using the projection of coefficients to the orthonormal basis of the learnt subspace (used for appearance based object tracking), the background is characterized using an auto-regressive (AR) process model. An advantage of the proposed schemes is that the decoder structure allows for simultaneous reconstruction of object and background, thus making it amenable to the new multi-thread/multi-processor architectures. | 11-27-2014 |
Saurabh Gorecha, Adambakkam IN
Patent application number | Description | Published |
---|---|---|
20130151893 | CUSTOMER PREMISES EQUIPMENT DIAGNOSTIC, RECOVERY, AND REPORTING SYSTEMS AND METHODS - Exemplary customer premises equipment (“CPE”) diagnostic, recovery, and reporting systems and methods are disclosed herein. An exemplary method includes a technical support server subsystem aggregating, over time, technical support data representing technical issues of CPE devices and operations performed to resolve the technical issues, identifying a subset of the technical support data, and providing the identified subset of the technical support data to a CPE device for local storage by the CPE device, locally stored technical support data configured to be used by the CPE device to self-recover from a future technical issue associated with the CPE device. In certain embodiments, the CPE device may be configured to function as a media server device and/or as an intermediary technical support device at a customer premises. Corresponding methods and systems are also disclosed. | 06-13-2013 |
Saurabh Gupta, Ghaziabad IN
Patent application number | Description | Published |
---|---|---|
20150269295 | Switching Activity Reduction Through Retiming - Aspects of the invention relate to techniques for using retiming to reduce circuit switching activity. Switching activity values at output ports of circuit elements of a circuit design are first computed based on switching activity values at input ports of the circuit elements and scaling factors associated with the circuit elements. Based on the switching activity values at the output ports of the circuit elements, one or more regions of the circuit design for retiming are identified. Retiming location information is then determined for the one or more regions. Finally, the identified one or more regions are then retimed to reduce switching activity based on the retiming location information. | 09-24-2015 |
Saurabh Gupta, Noida IN
Patent application number | Description | Published |
---|---|---|
20150332119 | Propagating Object Selection Across Multiple Images - Propagating object selection across multiple images is described. In one or more embodiments, an object is selected from a first image according to selection inputs. Features that are representative of the selected object are then ascertained. To propagate selection of the object to the second image, a determination is made as to whether the second image includes features that resemble those ascertained from the first image. Once a determination is made as to the features of the second image that resemble the features of the first image, the second image is divided into regions. Each of the regions includes pixels that are similar within the region, one pixel to another. The regions of the second image that include the features resembling those ascertained from the first image are then combined. The combined regions are used to select the object from the second image without receiving selection inputs to do so. | 11-19-2015 |
Saurabh Gupta, San Mateo, CA US
Patent application number | Description | Published |
---|---|---|
20150360366 | SYSTEM AND METHOD FOR REINFORCING PROGRAMMING EDUCATION THROUGH ROBOTIC FEEDBACK - A method for toy robot programming, the toy robot including a set of sensors, the method including, at a user device remote from the toy robot: receiving sensor measurements from the toy robot during physical robot manipulation; in response to detecting a programming trigger event, automatically converting the sensor measurements into a series of puppeted programming inputs; and displaying graphical representations of the set of puppeted programming inputs on a programming interface application on the user device. | 12-17-2015 |
20150364060 | SYSTEM AND METHOD FOR REINFORCING PROGRAMMING EDUCATION THROUGH ROBOTIC FEEDBACK - A method for reinforcing programming education through toy robot feedback, including: at a user device, remote from the toy robot: receiving a series of programming inputs from a user at a programming interface application on the user device; receiving a set of sensor measurements from the toy robot; automatically generating a set of control instructions for the toy robot based on a programming input of the series and the set of sensor measurements; and sending the set of control instructions to the toy robot; and, at the toy robot: receiving the set of control instructions from the user device; operating the toy robot based on the set of control instructions; recording a second set of sensor measurements during toy robot operation; and sending the second set of sensor measurements to the user device. | 12-17-2015 |
Saurabh Gupta, Suunyvale, CA US
Patent application number | Description | Published |
---|---|---|
20110093729 | MOTION SENSOR DATA PROCESSING USING VARIOUS POWER MANAGEMENT MODES - Systems and methods for processing motion sensor data using various power management modes of an electronic device are provided. Power may be provided to a motion sensor during a first power mode of the device. In response to the motion sensor detecting a motion event with a magnitude exceeding a threshold, the sensor may transmit a wake up signal to a power management unit of the device. In response to receiving the wake up signal, the power management unit may switch the device to a second power mode. The device may provide power to a processor and load the processor with a motion sensing application when switching to the second power mode. During the second power mode, motion sensor data may be processed to determine that the motion event is not associated with an intentional user input and the device may return to the first power mode. | 04-21-2011 |
Saurabh Gupta, Madhya Pradesh IN
Patent application number | Description | Published |
---|---|---|
20160048560 | System and Method for Querying a Distributed Dwarf Cube - Systems and methods for querying a distributed dwarf cube are disclosed. A query for retrieving data from a distributed dwarf cube is received. The distributed dwarf cube is built of the data. The data comprises cube values. The distributed dwarf cube is built by processing the data to generate indexes for the data. The cube values in one or more dimensions are sorted based on a cardinality of the cube values. The data is partitioned into data blocks to build distributed dwarf cube from each data block based upon the cardinality of the cube values. The distributed dwarf cube comprises one or more ranges defined for the cube values. The one or more ranges of the cube values are checked based upon the query. Using the cube values, a list is created. The list of the cube values is transmitted from the distributed dwarf cube corresponding to the query. | 02-18-2016 |
20160048572 | Building a Distributed Dwarf Cube using Mapreduce Technique - Systems and methods for building a distributed dwarf cube comprising dwarf cuboid using mapreduce technique are disclosed. Data comprising cube values and a cube definition may be received. The cube definition comprises dimensions defined for the cube values. The data received is processed. The data may be transformed to a format. Based upon the format of the data, indexes may be generated. The cube values in one or more dimensions may be sorted based on a cardinality of the cube values. The cube values may be sorted in an order of highest cardinality to lowest cardinality. The cardinality indicates distinctiveness of the cube values in the one or more dimensions. The data may be partitioned into data blocks. A dwarf cuboid may be built for one or more data blocks based upon the order of the cardinality of the cube values. | 02-18-2016 |
Saurabh Gupta, Etawah (u.p.) IN
Patent application number | Description | Published |
---|---|---|
20160087857 | METHODS, NETWORK NODES, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING COST-INFORMATION FROM MULTIPLE BALANCES - A method performed in a first network node, includes the first network node receiving, from a second network node, a request specifying a user account and a media content. The method further includes the first network node retrieving, from a database, a database object associated with the user account, the database object including a first parameter associated with a non-monetary balance. The method further includes the first network node retrieving, from the database, at least one predefined rule associated with the media content. The method further includes the first network node determining an advice of charge using the database object and the at least one predefined rule, the advice of charge specifying a deduction from the non-monetary balance for downloading the media content. The method also includes the first network node transmitting the advice of charge to the second network node. | 03-24-2016 |
Saurabh Gupta, Hsinchu TW
Patent application number | Description | Published |
---|---|---|
20110038451 | ULTRA HIGH RESOLUTION TIMING MEASUREMENT - An integrated circuit for high-resolution timing measurement includes a delay pulse generator, the first oscillator to generate the first clock with the first frequency, the second oscillator to generate the second clock with the second frequency, an oscillator tuner, a sampling module, a counter, wherein the delay pulse generator generated a delayed pulse from the second clock, the oscillator tuner controls the second frequency to be as close as possible to the first frequency without being the same as the second frequency, the sampling module samples the delayed pulse at the first frequency, the counter generates a digital counter value by counting a number of sampling by the sampling module, and a time width of the delayed pulse can be calculated by the digital counter value. The second oscillator can be a tunable ring oscillator with one or more coarse tune stages and one or more fine-tune stages. | 02-17-2011 |
20110273967 | ULTRA HIGH RESOLUTION TIMING MEASUREMENT - A method for high-resolution timing measurement includes a first oscillator generating a first clock with a first frequency. A second oscillator generates a second clock with a second frequency. A delay pulse generator generates a delayed pulse from the second clock. An oscillator tuner controls the second frequency to be as close as possible to the first frequency without being the same as the first frequency. A sampling module samples the delayed pulse at the first frequency. A counter generates a digital counter value by counting a number of samples made by the sampling module. | 11-10-2011 |
20130127441 | APPARATUS AND METHOD FOR ON-CHIP SAMPLING OF DYNAMIC IR VOLTAGE DROP - Test points on an integrated circuit chip, especially points subject to IR voltage drop along power supply rails, are coupled to comparators controlled by an automatic test controller, all included on the chip. Each test point can have one or more comparators and one or more reference voltages over a testing range. A change of state at a comparator sets a latch that is read and reset by the on-chip automatic test controller during test intervals. The automatic test controller can coordinate with external automatic test equipment that applies stimulus signals to the chip during testing. The greatest voltage drop during a test interval is determined from the latched output of the switched comparator coupled to the lowest reference voltage. The setting and resetting of the latch can be gated through a selectable delay so as to discriminate for excursions that persist for a longer or shorter time. | 05-23-2013 |
Saurabh Jain, Noida IN
Patent application number | Description | Published |
---|---|---|
20150277574 | METHOD OF INTERACTING WITH MULTIPLE DEVICES - The present disclosure provides a method that allows user to select an object on a first device, select a modification in order to modify the object and transferring information so that the modified object may be displayed on another device. | 10-01-2015 |
Saurabh Jayawant, Aliso Viejo, CA US
Patent application number | Description | Published |
---|---|---|
20150077074 | Circuit and Method for Producing an Average Output Inductor Current Indicator - In one implementation, a circuit for producing an average output inductor current indicator in a voltage converter is configured to start a counter when a high side power switch turns on, to sense a sample current through an output inductor of the voltage converter after the high side power switch turns off and when a low side power switch is on, and to register a first count of the counter when the low side power switch turns off. The circuit is further configured to register a second count of the counter when the high side power switch subsequently turns on, and to produce the average output inductor current indicator based on the sample current and the first and second counts of the counter. | 03-19-2015 |
Saurabh Kajaria, Houston, TX US
Patent application number | Description | Published |
---|---|---|
20110266006 | HYDRAULIC SURFACE CONNECTOR - A connector to secure a blow out preventer to tubing or a casing head of a well or wellhead and a method of securing a blow out preventer to the well utilizing the connector. The connector may be configured to secure the blow out preventer adapter to the wellhead and provide, within fifteen minutes, a seal operable to withstand ten thousand pounds per square inch of pressure. The connector may include both a hydraulically operated locking segment and a separate mechanical locking segment, and wherein both locking segments may be transitioned from a fully retracted position to a fully locked position within fifteen minutes. The connector may be configured to accommodate up to ten degrees of misalignment between the blow out preventer and the tubing. | 11-03-2011 |
20120181013 | MODULAR SKID SYSTEM FOR MANIFOLDS - The disclosure provides an adjustable modular skid system with a plurality of skid modules having a frame to support oil field fluid components, such as manifolds, mixing blocks, collection blocks, fracturing pumps, piping and connections, and other devices used to transport water, sand slurries, gas, oil, or other fluids in oil field applications. The modules can be arranged in multiple configuration to fit a particular well site. The modules can include supply modules, transition modules, and distribution modules. The skid modules can be coupled together through piping and relevant connections at the well site. If appropriate, the skid modules can be supported on pilings or other foundational supports. The system can be assembled remotely, started and tested, partially disassembled into the skid modules, and then installed at the well site with minimal additional effort by generally providing lines and connections between the modules. | 07-19-2012 |
20120181015 | UNI-BORE DUMP LINE FOR FRACTURING MANIFOLD - The disclosure provides one or more manifolds having manifold portions primarily of fluid conduit and flow components mounted to the manifold portions, such as valves and fluid fittings. The manifold is formed with a uniform bore, so that the manifold portions are the same size along the flow path of the manifold, and the valves and fluid fittings have a bore the same size of the bore of the manifold portions. The uni-bore manifold creates a less turbulent flow path and allows draining of the manifold through one or more valves coupled to an end of the manifold that otherwise can to become restricted or plugged with particles entrained in fluids in the manifold. | 07-19-2012 |
20120181016 | COLLECTION BLOCK WITH MULTI-DIRECTIONAL FLOW INLETS IN OILFIELD APPLICATIONS - The disclosure provides a collection block that aggregates multiple incoming flow lines and provides a consolidated outgoing flow path. The collection block can be remote from a given well that is being fractured to minimize safety risk in operations around the well. The collection block has dual capabilities of being connected to individual incoming flow lines as well as to manifold systems for distributing the out flowing fluids. The one or more inlets can be formed in the collection block at an offset to a centerline of a longitudinal bore through the collection block. In some to embodiments, frac trucks can connect along an extended connection zone that provides the fluids from the truck to the collection block. | 07-19-2012 |
20120181030 | GOAT HEAD TYPE INJECTION BLOCK FOR FRACTURING TREES IN OILFIELD APPLICATIONS - The disclosure provides a goat head, as a mixing block, for multiple fluids in oilfield applications, the goat head having a reversing directional flow, mixing portion, wear reduction surfaces, and restricted outlet bore. The goat head provides an underneath approach for piping, reducing the overall height, and mixes the fluids dynamically within the goat head from angled flow paths. The goat head then reverses at least a component of the fluid flow direction that enters the wellbore below the goat head and exits the goat head into the well therebelow. The goat head to contains hardened wear surfaces, including surfaces in specific zones, to resist erosion caused by the reversing directional flow. A restricted outlet bore has a cross-sectional area that is less than the sum of cross-sectional areas of the inlets to assist in creating higher velocity and streamlined flow as the fluid exits the goat head. | 07-19-2012 |
20120181046 | ADJUSTABLE SUPPORT SYSTEM FOR MANIFOLD TO MINIMIZE VIBRATION - The disclosure provides an adjustable modular skid system with a plurality of skid modules to support oil field fluid components, such as manifolds, mixing blocks, collection blocks, fracturing pumps, piping and connections, and other devices used to transport water, sand slurries, gas, oil, or other fluids in oil field applications. The skid system has vibration adjusting features. The skid modules can be coupled together through piping and relevant connections at the well site. If appropriate, the skid modules can be supported on pilings or other foundational supports. The system can be assembled remotely, started and tested, partially disassembled into the skid modules, and then installed at the well site with minimal additional effort by generally providing lines and connections between the modules. Excessive vibrations in the system can be reduced by adjusting an overall stiffness of the system to change a natural frequency of the system. | 07-19-2012 |
20120181785 | INTEGRATED TARGET HUB FLANGE FOR OILFIELD FRACTURING SYSTEMS - The disclosure provides fittings having one or more inlets and one or more outlets with a target port and a target hub adapted to be coupled to the target port. The target hub is adapted to be removably coupled to the target port at a target coupler and sealingly engage the target port. The target hub includes a protrusion that protrudes into a flow path, where the protrusion includes a target face. A protrusion seal on the periphery of the protrusion sealingly engages a surrounding wall of the target port bore. | 07-19-2012 |
20130284455 | Delivery System for Fracture Applications - Described herein is a modular, adjustable system for distributing fluids to one or more wellbores. The system is readily configured and assembled at a well site, and allows for one portion of the system to be isolated for service or repair while the remainder of the system continues to operate. The system includes a plurality of pump skids having both a distribution junction in fluid communication with inlets to of plurality of pump trucks and an exit junction in fluid communication with outlets of the plurality of pump trucks. | 10-31-2013 |
20140020900 | ADJUSTABLE ISOLATION SLEEVE ASSEMBLY FOR WELL STIMULATION THROUGH PRODUCTION TUBING - A fracturing system includes a fracturing spool that mounts onto a wellhead assembly for injecting fracturing fluid into a well beneath the wellhead assembly. An isolation sleeve is included with the fracturing system that couples to the fracturing spool and extends into the wellhead to isolate and protect portions of the wellhead assembly from the fracturing fluid. A seal is between the isolation sleeve and bore of the wellhead assembly, which is threaded to the isolation sleeve. Manipulating the threaded connection between the isolation sleeve and seal selectively positions the isolation sleeve to designated axial positions within the wellhead assembly. | 01-23-2014 |
20140020901 | HIGH PRESSURE ISOLATION SYSTEM FOR WELL STIMULATION THROUGH PRODUCTION TUBING - A fracturing system includes a fracturing spool that mounts onto a wellhead assembly for injecting fracturing fluid into a well beneath the wellhead assembly. The fracturing system includes an isolation sleeve and fracturing spool. The isolation sleeve inserts in an axial bore of the fracturing spool, and has a lower end that extends into the wellhead to isolate and protect portions of the wellhead assembly from the fracturing fluid. A groove in an inner surface of the fracturing spool receives an annular seal for sealing between the isolation sleeve and fracturing spool. Injecting a viscous fluid into the groove energizes the seal, and blocks high pressure fracturing fluid from flowing between the isolation sleeve and fracturing spool. | 01-23-2014 |
20140116723 | METHOD OF INSTALLING A MULTI-BOWL WELLHEAD ASSEMBLY - A method of completing a well includes Lowering a wellhead onto a base al as upper end of the well. A hub with internal threads and an external circumferential stepped recess is secured to external threads of the wellhead. A blowout preventer assembly with an annular locking member having a plurality of locking demerits is landed on the hub, and the looking elements are engaged with the recess of the hub. The well is drilled through the blowout preventer assembly to a greater depth then the blowout preventer assembly and the hub are removed. A threaded flange with & plurality of bolt holes spaced around die flange is secured to the external threads of the wellhead and a wellhead member is bolted to the bolt holes of the threaded flange. | 05-01-2014 |
20140131954 | SHRINKAGE COMPENSATED SEAL ASSEMBLY AND RELATED METHODS - Shrinkage compensated seal assemblies and methods of compensating for shrinkage of a seal due to temperature variations, are provided. According to an exemplary shrinkage compensated seal assembly, the assembly includes a seal, a first compression member for engaging the upper surface of the seal, a second compression member for engaging the lower surface of the seal, and a plurality of pin members each having an elongate body and a head portion. The elongate body of each separate one of the plurality of pin members slidably extends through a different one of a plurality of sets of apertures in the first compression member, the seal, and the second compression member to provide for maintaining a substantially constant pressure on the seal at given pressure under varying temperature conditions that result in variations in the volume size of the seal. | 05-15-2014 |
20140151069 | TENSION TUBING HANGER AND METHOD OF APPLYING TENSION TO PRODUCTION TUBING - A tubing hanger assembly includes a tubular outer tubing hanger member adapted to land in a bore of a wellhead. A tubular inner tubing hanger member is adapted to be secured to a string of production tubing and has an engaged position in a bore of the outer tubing hanger member. A retaining mechanism selectively allows the inner tubing hanger member to be lowered relative to the outer tubing hanger member, then selectively allowing the inner tubing hanger member to be returned back to the engaged position, to create tension in the string of production tubing. The retaining mechanism operates in response to rotational movement of the inner tubing hanger member while the outer tubing hanger member remains stationary with the wellhead. | 06-05-2014 |
20140238693 | WELLHEAD SYSTEM FOR TIEBACK RETRIEVAL - A wellhead assembly includes a casing head, tubing head, and a production tree mounted on the tubing head. An isolation sleeve is set in a main bore of the wellhead assembly that extends across an interface between the casing and tubing heads so that a portion resides in each. The isolation sleeve is configured so that a fracturing string, and its associated hanger, can be retrieved through the isolation sleeve; which significantly reduces the time and steps required to conduct a fracturing operation in a well. Moreover, the present isolation sleeve can be used without changes to existing casing or tubing heads. | 08-28-2014 |
20150292297 | Safety Systems for Isolating Overpressure During Pressurized Fluid Operations - An overpressure safety system for use with a distribution of pressurized fluid associated with hydrocarbon production operations includes a safety valve in fluid communication with a main bore of a fluid control manifold assembly. The safety valve has a blocking condition where the safety valve blocks a flow of pressurized fluid through the safety valve, and a venting condition where the safety valve provides a fluid flow path for the pressurized fluid at a set overpressure to pass through the safety valve. A valve member is moveable within the safety valve between a first position where a pressure side of the valve member blocks the flow of the pressurized fluid at a pressure below the set overpressure from passing through the safety valve, and a second position where the valve member provides a fluid flow path for the pressurized fluid at any pressure to pass through the safety valve. | 10-15-2015 |
20150345272 | Remote Mobile Operation and Diagnostic Center for Frac Services - A method for remotely controlling services to a well during hydraulic fracturing operations includes the steps of (a) generating a high pressure fluid and pumping the high pressure fluid into a subterranean geologic formation through a wellbore of a first well, the high pressure fluid being provided at a sufficient pressure to fracture the subterranean geologic formation: (b) performing a service on a second well, the second well being located within a pressure zone defined around the first well and the second well; and (c) controlling the performance of the service from a remote operations hub. Step (a) and step (b) are performed simultaneously and step (c) is performed from the remote operations hub located outside of the pressure zone. | 12-03-2015 |
Saurabh Kajaria US
Patent application number | Description | Published |
---|---|---|
20150184491 | Line Manifold for Concurrent Fracture Operations - A modular, adjustable system for distributing fluids to one or more wellbores includes a plurality of modules that can be arranged at a well site to create an appropriate manifold to enable selective fluid communication between a fluid pumping system and the one or more wellbores. The modules each include a fluid inlet, a fluid outlet and a valve coupled therebetween to selectively permit or restrict fluid flow between the respective fluid inlets and fluid outlets. The modules are configured to be readily maneuvered, coupled and locked to one another at a well site. | 07-02-2015 |
Saurabh Kaujalgikar, Dombivali (west) IN
Patent application number | Description | Published |
---|---|---|
20130289291 | ESTOLIDE DERIVATIVES PREPARED FROM TRIGLYCERIDES - A process to prepare an estolide derivative composition comprises reacting a triglyceride having an unsaturation level of less than 0.1 m Eq/g and an alcohol having from 2 to 22 carbon atoms, under conditions such that a product including an oligomerized ester having residual hydroxyl groups is formed; and reacting the product with a capping agent under conditions such that an estolide derivative composition is formed. The compositions may exhibit desirably low pour point, desirable viscosity and thermoxidative stability, and a high level of renewable carbons, making them suitable for use as biolubricants, process fluids, plasticizers, or starting materials for polyurethane polymers. | 10-31-2013 |
Saurabh Kaujalgikar, Pune IN
Patent application number | Description | Published |
---|---|---|
20150044407 | COMPOSITE VESSELS - A barrier liner for a composite vessel, the barrier liner including (A) a polymeric substrate; and (B) a gas barrier coating layer attached to at least a portion of the polymeric substrate; a composite vessel containing the above barrier liner; and a UV curable composition for producing the above barrier liner. | 02-12-2015 |
20150240050 | EPOXIDIZED FATTY ACID ALKYL ESTER PLASTICIZERS AND METHODS FOR MAKING EPOXIDIZED FATTY ACID ALKYL ESTER PLASTICIZERS - Epoxidized fatty acid alkyl ester and methods for making epoxidized fatty acid alkyl ester. The epoxidized fatty acid alkyl ester is prepared from a fatty acid alkyl ester starting material comprising at least one of mono-unsaturated and di-unsaturated fatty acid alkyl ester molecules in a combined amount of at least 85 weight percent. Such epoxidized fatty acid alkyl esters can be employed in plasticizer compositions, either alone or in combination with other plasticizers, such as epoxidized natural oils. Such plasticizers in turn may be used in the formation of polymeric compositions. | 08-27-2015 |
20150252014 | METHODS FOR MAKING EPOXIDIZED FATTY ACID ALKYL ESTERS - Methods for making epoxidized fatty acid alkyl esters. Such epoxidized fatty acid alkyl esters can be prepared by epoxidizing a natural oil with an acid and a peroxide. Residual acid in the epoxidized natural oil is not neutralized, such as with a base, prior to esterification to produce the epoxidized fatty acid alkyl esters. Epoxidized fatty acid alkyl esters can be employed in plasticizers, either alone or in combination with other plasticizers, such as epoxidized natural oils. Such plasticizers in turn may be used in the formation of polymeric compositions. | 09-10-2015 |
20150337112 | EPOXIDIZED FATTY ACID ALKYL ESTER PLASTICIZERS AND METHODS FOR MAKING EPOXIDIZED FATTY ACID ALKYL ESTER PLASTICIZERS - Epoxidized fatty acid alkyl esters and methods for making epoxidized fatty acid alkyl esters. Such epoxidized fatty acid alkyl esters can be prepared by epoxidizing fatty acid alkyl esters with an acid and a peroxide. Epoxidation can be performed under controlled reaction conditions to provide epoxidized fatty acid alkyl esters having an iodine value in the range of from 4 to 15 g I | 11-26-2015 |
Saurabh Keshav, Boise, ID US
Patent application number | Description | Published |
---|---|---|
20110312171 | Methods Of Forming Integrated Circuitry Comprising Charge Storage Transistors - Methods include forming a charge storage transistor gate stack over semiconductive material. One such stack includes a tunnel dielectric, charge storage material over the tunnel dielectric, a high-k dielectric over the charge storage material, and conductive control gate material over the high-k dielectric. The stack is etched at least to the tunnel dielectric to form a plurality of charge storage transistor gate lines over the semiconductive material. Individual of the gate lines have laterally projecting feet which include the high-k dielectric. After etching the stack to form the gate lines, ions are implanted into an implant region which includes the high-k dielectric of the laterally projecting feet. The ions are chemically inert to the high-k dielectric. The ion implanted high-k dielectric of the projecting feet is etched selectively relative to portions of the high-k dielectric outside of the implant region. | 12-22-2011 |
20140162418 | Methods of Forming Vertically-Stacked Structures, and Methods of Forming Vertically-Stacked Memory Cells - Some embodiments include methods of forming vertically-stacked structures, such as vertically-stacked memory cells. A first hardmask is formed over a stack of alternating electrically conductive levels and electrically insulative levels. A first opening is formed through the first hardmask and the stack. Cavities are formed to extend into the electrically conductive levels. A fill material is formed within the first opening and within the cavities. A second hardmask is formed over the first hardmask and over the fill material. A second opening is formed through the second hardmask. The second opening is narrower than the first opening. The second opening is extended into the fill material to form an upwardly-opening container from the fill material. Sidewalls of the upwardly-opening container are removed, while leaving the fill material within the cavities as a plurality of vertically-stacked structures. | 06-12-2014 |
Saurabh Khanwalkar, Waltham, MA US
Patent application number | Description | Published |
---|---|---|
20160034426 | Creating Cohesive Documents From Social Media Messages - A technique to construct a cohesive document is described including accessing a communication system having a plurality of social media message units accessible; collecting a plurality of related social media message units among users over a predetermined period of time; outputting to a single file the plurality of related social media message units when the file reaches a predetermined size to construct a cohesive document; and outputting to a single file a plurality of related social media message units after a maximum predetermined period of time to construct a different cohesive document. | 02-04-2016 |
Saurabh Khetrapal, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20090271292 | SYSTEMS AND METHODS FOR EXCHANGING DIRECT RESPONSE MARKETING PHONE LEADS - Systems and methods for managing a phone lead transaction between a lead seller and a lead buyer as part of a first transaction between said lead seller and a consumer. The method, for example, includes enabling a plurality of lead buyers to bid for phone leads from at least, one lead seller. When the lead seller conducts a transaction with a consumer, a prequalification question is displayed to an agent associated with the lead seller to allow the agent to ascertain whether the consumer qualifies. If the consumer qualifies, the consumer is connected to the lead buyer either immediately or at a later time. Methods are disclosed for tracking the phone lead transaction and performing back-end accounting for account settlement purposes. | 10-29-2009 |
20120323722 | SYSTEM FOR EXCHANGING SALES LEADS - A subscriber-based sales leads exchange system for efficiently maximizing revenue to lead sellers and for providing high quality, temporally relevant sales leads to lead buyers based on a transaction between a lead seller and a customer of said lead seller. | 12-20-2012 |
Saurabh Kumar, San Mateo, CA US
Patent application number | Description | Published |
---|---|---|
20100150148 | Method and system for IP fragmentation handling - In a network, packets are fragmented into head and non-head fragments. Non-head fragments are saved up front at an entry point, while a network switch forwards only the head fragment to Layer 4-Layer 7 (L4-L7) features for processing. The switch records changes that are performed on the head fragment's fields by the L4-L7 features while they process the head fragment. At an exit point, fields of the saved non-head fragments are overwritten with information that was recorded for the head fragment. This can include updating or modifying the source and destination parameters of the non-head fragments in an intelligent manner by reusing the results of the packet processing that was performed on the head fragment. This fragmentation handling technique avoids having to redundantly process the non-head fragments in the same manner as the head fragments. | 06-17-2010 |
20110274431 | APPARATUS AND METHOD FOR CONTROLLING A DYNAMIC GAIN EQUALIZER - Consistent with the present disclosure, a method and apparatus for providing a uniform spectral gain of an optical amplifier is provided. Namely, a “balancing” step is carried out in which an optical channel having the lowest power level input to an optical circuit, such as an dynamic gain equalizer (DGE), is assigned a zero “attenuation error” and is substantially un-attenuated by the DGE. The lowest power level optical signal does not require further attenuation and effectively serves as a reference power level, which the power levels of the remaining optical signals are set to. For example, remaining optical signals are assigned either positive or negative attenuation errors relative to the zero attenuation error based on optical signal input powers to the DGE and accumulated DGE attenuations over time. Those optical signals having a negative attenuation error are substantially unattenuated by the DGE, because such optical signals are adequately attenuated and do not require further attenuation. On the other hand, the DGE is controlled to attenuate those optical signals having positive attenuation errors to thereby flatten the output spectrum of the amplifier. In one example, interpolation techniques may be employed to control those portions of the DGE (e.g., attenuators or pixels) that do not receive a channel, such that adjacent pixels that receive channels may impart a desired amount of attenuation. In addition, further interpolation may be provided to appropriately control the DGE pixels, if the number of channels supplied to the DGE is different than the number of pixels of the DGE. | 11-10-2011 |
20110305459 | OPTICAL AMPLIFIER - Consistent with the present disclosure, an optical amplifier is provided that is configurable in one of two modes. In both modes, the optical service channel (OSC) may be dropped and converted to an electrical signal. In the first mode, the electrical signal is subject to further processing and the monitoring and/or control information carried by the OSC may be updated with new data. Such updated monitoring and control information is then supplied to an OSC transmitter and modulated onto an OSC output from the optical amplifier. In a second mode of operation (“loop back” mode), however, the monitoring and/or control information bypasses the processing noted above is looped back to the OSC transmitter unchanged. Accordingly, OSC monitoring and control information or data can be rapidly passed through the optical amplifier with little delay. Moreover, the optical amplifier may be configured to operate in either the first or second modes by appropriately configuring a switch. Thus, a standard optical amplifier can be used as a both a line amplifier, in which OSC data is processed and updated, as well as a booster amplifier in which such updating does not occur, for example, but the OSC data may be propagated to other amplifiers with little delay. | 12-15-2011 |
Saurabh Kumar, Dordrecht NL
Patent application number | Description | Published |
---|---|---|
20130259999 | METHOD FOR INHIBITING YEAST ACTIVITY - The combination of EGCG and a derivative of a basic amino acid has been found to be an effective anti-yeast agent in acidic food. The present invention relates to a method for controlling or preventing the growth of yeast in acidic food (i.e. with a pH between 2 and 6) including adding to the food a) epigallocatechin gallate (EGCG) and b) a derivative of a basic amino acid, and/or a salt thereof, as an anti-yeast agent. The present invention further relates to a composition for addition to food and to an acidic food including the composition, which includes a) epigallocatechin gallate and b) both lauric arginate and polylysine. | 10-03-2013 |
Saurabh Kumar, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150095128 | IN-STORE CUSTOMER ENGAGEMENT SYSTEMS AND METHODS - An in-store customer engagement system is provided. The system includes a retail processing device located in a store, wherein the retail processing device is configured to process transactions of a customer. The system also includes a customer registration device configured to receive customer data from the customer and to register the customer with a customer relationship management (CRM) application of the store. The system further includes a first server communicatively coupled to the retail processing device and to the customer registration device wherein the first server is configured to transmit the customer data to the retail processing device upon registration of the customer with the customer relationship management application. | 04-02-2015 |
Saurabh Kumar, Lucknow IN
Patent application number | Description | Published |
---|---|---|
20150278158 | METHOD SYSTEM AND COMPUTER READABLE MEDIUM FOR DYNAMIC GAMIFICATION OVER A NETWORK - The present invention describes a method of dynamic gamification over a network and comprises of the steps of creating a network of statistical models associated with a real life situation by using a processor, modifying a predefined parameter of a first statistical model by either a player or a moderator which triggers a modification subsequently in the other statistical models related to the first statistical model and deciding an outcome of the gamification in response to the modification of the first and the other statistical models | 10-01-2015 |
Saurabh Lodha, Hillsboro, OR US
Patent application number | Description | Published |
---|---|---|
20080237603 | METHOD OF FORMING CMOS TRANSISTORS WITH DUAL-METAL SILICIDE FORMED THROUGH THE CONTACT OPENINGS AND STRUCTURES FORMED THEREBY - Methods and associated structures of forming a microelectronic device are described. Those methods may include amorphizing at least one contact area of a source/drain region of a transistor structure by implanting through at least one contact opening, forming a first layer of metal on the at least one contact area, forming a second layer of metal on the first layer of metal, selectively etching a portion of the second metal layer, and annealing the at least one contact area to form at least one silicide. | 10-02-2008 |
Saurabh Madhu, Pune IN
Patent application number | Description | Published |
---|---|---|
20160001834 | DEVICE FOR ENHANCED SAFETY IN USING A SIDE STAND FOR PARKING OF TWO WHEELED VEHICLE - A device adapted for accurate and quick assembly on a two wheeled vehicle for enhanced safety in using a side stand for parking of the vehicle is disclosed. | 01-07-2016 |
20160003352 | SAFETY DEVICE FOR INDICATING THE DISENGAGED AND ENGAGED POSITION OF THE DRIVE SHAFT AND THE GEARS IN A GEARBOX OF A TWO WHEELED VEHICLE - A contactless and failsafe safety device for indicating the disengaged and engaged position of the drive shaft and the gears in a gearbox of a two wheeled vehicle is disclosed | 01-07-2016 |
Saurabh Mehta, Singapore SG
Patent application number | Description | Published |
---|---|---|
20160048913 | Systems and Methods for Assigning a Variable Length Bank Identification Number - Systems and methods for use in assigning bank identification numbers (BINs) are disclosed. One exemplary method includes identifying a payment account demand for an issuer. The payment account demand is associated with an anticipated number of primary account numbers (PANs) for the issuer, each PAN having a PAN length. The method further includes selecting a BIN length for the issuer based on the payment account demand where the BIN length being less than the PAN length, assigning a BIN to the issuer where the BIN has the BIN length, and appending the BIN to a BIN directory. The BIN is associated with the issuer. The BIN is different than each other BIN in the BIN directory. | 02-18-2016 |
Saurabh Mishra, Mysore IN
Patent application number | Description | Published |
---|---|---|
20150286044 | METHOD AND SYSTEM FOR EXTENDED DEPTH OF FIELD CALCULATION FOR MICROSCOPIC IMAGES - The invention relates to an image processing method and system for constructing composite image with extended depth of field. The composite image may be constructed from a plurality of source images of a scene stored in an image stack. The method includes aligning the images in the image stack such that every image in the image stack is aligned with other images in the stack, performing illumination and color correction on the aligned images in the image stack, generating an energy matrix for each pixel of each illumination and color corrected image in the image stack by computing energy content for each pixel, generating a raw index map that contains the location of every pixels having maximum energy level among all the images in the image stack, generating degree of defocus ma and constructing the composite image. | 10-08-2015 |
Saurabh Mishra, Delhi IN
Patent application number | Description | Published |
---|---|---|
20160119887 | SIGNAL PROCESSING METHOD FOR UPLINK IN SMALL CELL BASE STATION - A base station and method of synchronizing with a user equipment (UE) in a cell of the base station. The base station signals to the UE an indication relating to a subset of preambles chosen for synchronization with the cell from a set of preambles derivable from one or more given root sequences. The subset of preambles is chosen to provide an increased cell radius compared to the cell radius achievable if the specified full set of preambles for random access procedures was generated from the given root sequences using a given cyclic shift value. | 04-28-2016 |
Saurabh Mookerjea, Hillsboro, OR US
Patent application number | Description | Published |
---|---|---|
20120106236 | TFET BASED 6T SRAM CELL - Memory devices and methods of operation are provided. A memory device includes first and second cross-coupled inverters and first and second access transistors coupled to an input node of the second inverter. The memory device also includes a control circuit for providing a first reference voltage at a first ground node of the first inverter and a second reference voltage at a second ground node of the second inverter. The first access transistor is configured to conduct current from a first bit line to the input node and to provide substantially no current conduction from the input node to the first bit line. The second access transistor is configured to conduct current from the input node to one of the first bit line and a second bit line and to provide substantially no current conduction from the input node to the one of first and second bit lines. | 05-03-2012 |
Saurabh Mookherjea, Hillsboro, OR US
Patent application number | Description | Published |
---|---|---|
20110299326 | TFET BASED 4T MEMORY DEVICES - A four transistor (4T) memory device is provided. The device includes a first cell transistor and a second cell transistor, the first and second cell transistors coupled to each other and defining latch circuitry having at least one multi-stable node. The device further includes a first access transistor and a second access transistor, the first and second access transistors coupling the at least one multi-stable node to at least one bit-line. In the device, each of the first and second cell transistors and each of the first and second access transistors is a unidirectional field effect transistor configured for conducting current in a first direction and to be insubstantially incapable of conducting current in a second direction. | 12-08-2011 |
Saurabh Nirantar, Singapore SG
Patent application number | Description | Published |
---|---|---|
20130143749 | METHODS OF IDENTIFYING A PAIR OF BINDING PARTNERS - The present invention relates to methods of identifying a binding partner of a target molecule within a plurality of analyte molecules, including a plurality of peptides and/or proteins. The target molecule is physically combined with a target labeling nucleic acid molecule, which includes a specific nucleotide sequence. Where the target molecule is a peptide/protein this specific nucleotide sequence may include a sequence encoding the target molecule. Each member of the plurality of analyte molecules is physically linked to an analyte labeling nucleic acid molecule, each analyte labeling nucleic acid molecule comprising a selected nucleotide sequence. This specific nucleotide sequence may include a sequence encoding a peptide/protein combined therewith. The target molecule is contacted with the analyte molecules and a complex between the target molecule and an analyte molecule forms. The mixture is subdivided into compartments, with each compartment comprising at most one target molecule or one complex between the target and an analyte molecule. The target labeling nucleic acid molecule and the analyte labeling nucleic acid molecule are linked and the plurality of compartments allowed to disintegrate. The linked nucleic acid molecule is retrieved and the sequence determined. | 06-06-2013 |
Saurabh Palan, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20140266655 | AFTER MARKET DRIVING ASSISTANCE SYSTEM - The system comprises a sensing system and a speed detection system to monitor and gather information associated with a driver, a vehicle being operated by the driver, a monitored area proximate to the vehicle. The system further comprises a display module located within the interior of the vehicle and a controller in communication with the speed detection system, the sensing system and the display module. Upon receiving the gathered information from the sensing system, the controller utilizes the gathered information to detect the presence and the proximity of an object in the monitored zone of the vehicle and the speed of the vehicle. Upon detecting said object in the monitored zone of the vehicle, the controller determines the appropriateness of providing a warning to a driver of the vehicle regarding said object. The appropriateness of providing the warning is determined as a function of the proximity of said object to the vehicle and a speed of the vehicle. Upon determining that the warning is appropriate, the controller displays the warning to the driver through the display module. | 09-18-2014 |
20140272811 | SYSTEM AND METHOD FOR PROVIDING DRIVING AND VEHICLE RELATED ASSISTANCE TO A DRIVER - Disclosed here are methods, systems, paradigms and structures for providing driving and vehicle related assistance to a driver of a vehicle. The method includes receiving information related the operation of the vehicle by the driver, where the received information is gathered by monitoring the driver, the vehicle and the proximity of the vehicle during a period of operation of the vehicle by the driver. The method includes analyzing the received information to determine condition of the vehicle and a driving performance of the driver during the operation of the vehicle. The method further includes determining a driving and vehicle related assistance to provide to the driver based on the determined driving performance of the driver and the condition of the vehicle respectively. The method further includes providing the determined driving and vehicle related assistance to the driver of the vehicle. | 09-18-2014 |
20140277833 | EVENT TRIGGERED TRIP DATA RECORDER - Technology is disclosed for performing a combination of detecting events and recording data associated with the events (“the technology”). The technology monitors for various predefined events, where the events can include any unsafe vehicle operation, any unusual objects on the road, a scenic view, a traffic incident, etc. The technology gathers and stores data associated with the predefined events when any one or more of such events are detected during the monitoring. The technology uses cameras and other sensors to gather data associated with a detected event. | 09-18-2014 |
Saurabh Pandya, Wales GB
Patent application number | Description | Published |
---|---|---|
20100036892 | DETERMINATION OF AN UPDATED DATA SOURCE FROM DISPARATE DATA SOURCES - A method and system for determining an updated data source from first and second disparate data sources. A first and second data list is received from the first and second data sources, respectively. The data elements in the first data list matching data elements in the second data list are written to a first aggregation data list. The data elements in the first data list not matching data elements in the second data list are written to an additions data list. The data elements in the second data list not matching data elements in the first data list are written to a first deletions data list. All data elements in the first aggregation data list and the additions data list are written into a second aggregation data list. All data elements matching the data elements in the first deletions data list are written into a second deletions data list. | 02-11-2010 |
Saurabh Saket, Roorkee IN
Patent application number | Description | Published |
---|---|---|
20130339021 | Intent Discovery in Audio or Text-Based Conversation - Techniques, an apparatus and an article of manufacture identifying one or more utterances that are likely to carry the intent of a speaker, from a conversation between two or more parties. A method includes obtaining an input of a set of utterances in chronological order from a conversation between two or more parties, computing an intent confidence value of each utterance by summing intent confidence scores from each of the constituent words of the utterance, wherein intent confidence scores capture each word's influence on the subsequent utterances in the conversation based on (i) the uniqueness of the word in the conversation and (ii) the number of times the word subsequently occurs in the conversation, and generating a ranked order of the utterances from highest to lowest intent confidence value, wherein the highest intent value corresponds to the utterance which is most likely to carry intent of the speaker. | 12-19-2013 |
Saurabh Sandhir, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20100268845 | ROUTING INSTANCES FOR NETWORK SYSTEM MANAGEMENT AND CONTROL - A network system uses a management routing instance to route management information between elements involved in management of the system. The system registers each element in the management routing instance when the element comes on line. Based on the management routing instance, the system creates management forwarding tables. The system then uses the management forwarding tables to route management information between the elements. Multiple systems, for example systems connected by a network, may exchange management routing instance information to allow elements in different systems to communicate management information with each other. | 10-21-2010 |
Saurabh Santhosh,, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150199609 | SELF-LEARNING SYSTEM FOR DETERMINING THE SENTIMENT CONVEYED BY AN INPUT TEXT - A self learning system and a method for analyzing the sentiments conveyed by an input text have been disclosed. The system includes a generator that generates an initial training set comprising a plurality of words linked to corresponding sentiments. The words and corresponding sentiments are stored in a repository. A rule based classifier segregates the input text into individual words, and compares the words with the entries in the repository, and subsequently determines a first score corresponding to the input text. The input text is also provided to a machine-learning based classifier that generates a plurality of features corresponding to the input text and subsequently generates a second score corresponding to the input text. The first score and the second score are further aggregated by an ensemble classifier which further generates a classification score indicative of the sentiment conveyed by the input text. | 07-16-2015 |
Saurabh Sensharma, Uttar Pradesh IN
Patent application number | Description | Published |
---|---|---|
20150264567 | METHOD AND APPARATUS FOR AUTHENTICATING A USER ON A MOBILE DEVICE - Disclosed is a method and apparatus for authenticating a user on a mobile device. The method may include initiating authentication of the user for access to the mobile device, where access to the mobile device is granted upon successful authentication of the user by the mobile device. The method may also include performing face recognition analysis on an image of a face of the user to determine an identity of the user. Furthermore, the method may also include determining whether a first pulse information and a second pulse information associated with the user indicate a pulse match. The method may also include authenticating the user for access to the mobile device when a pulse match is determined and the determined identity of the user has permission to access the mobile device. | 09-17-2015 |
Saurabh Sensharma, Ghaziabad IN
Patent application number | Description | Published |
---|---|---|
20140253666 | INTENT ENGINE FOR ENHANCED RESPONSIVENESS IN INTERACTIVE REMOTE COMMUNICATIONS - Systems, methods, and devices are provided which may enable a communication device to respond to a caller based on an intent of the caller as determined by an intent engine and the caller's privilege level. In an aspect, the caller may be engaged, the caller's privilege level may be determined, an intent engine may determine the caller's intent, and based on the caller's intent and privilege level the caller may be provided with information and/or a set of configurable follow-up actions may be taken in the absence of the intended communication recipient. | 09-11-2014 |
Saurabh Sharma, El Dorado Hills, CA US
Patent application number | Description | Published |
---|---|---|
20140025908 | FAST MECHANISM FOR ACCESSING 2n.+-.1 INTERLEAVED MEMORY SYSTEM - A mechanism implemented by a controller enables efficient access to an interleaved memory system that includes M modules, M being (2 | 01-23-2014 |
20160086299 | Position-Only Shading Pipeline - In position-only shading, two geometry pipes exist, a trimmed down version called the Cull Pipe and a full version called the Replay Pipe. Thus, the Cull Pipe executes the position shaders in parallel with the main application, but typically generates the critical results much faster as it fetches and shades only the position attribute of the vertices and avoids the rasterization as well as the rendering of pixels for the frame buffer. Furthermore, the Cull Pipe uses these critical results to compute visibility information for all the triangles whether they are culled or not. On the other hand, the Replay Pipe consumes the visibility information to skip the culled triangles and shades only the visible triangles that are finally passed to the rasterization phase. Together the two pipes can hide the long cull runs of discarded triangles and can complete the work faster in some embodiments. | 03-24-2016 |
20160093069 | METHOD AND APPARATUS FOR PIXEL HASHING - An apparatus and method for pixel hashing. For example, one embodiment of a method comprises: determining X and Y coordinates for a pixel block to be processed; performing a lookup in a data structure indexed based on the X and Y coordinates of the pixel block, the lookup identifying an entry in the data structure corresponding to the X and Y coordinates of the pixel block; reading information from the entry identifying an execution cluster to process the pixel block; and executing the pixel block by the execution cluster. | 03-31-2016 |
Saurabh Sharma, Arlington Heights, IL US
Patent application number | Description | Published |
---|---|---|
20100319725 | SYSTEMS, METHODS, AND COMPOSITIONS FOR SANITIZING FOOD PRODUCTS - Inventive methods, systems and compositions for sanitizing food products are described. A method for sanitizing food products includes: (a) activating a solution, which includes a solute and a solvent, by using acoustic energy to form a coherent solution including solute clusters, in which each solute cluster is organized such that at least one solute molecule is surrounded by many solvent molecules; and (b) submerging the food products into a tank containing the coherent solution to sanitize the food products. | 12-23-2010 |
20120308657 | MAGNETIC NANOSTRUCTURES AS THERANOSTIC AGENTS - The present invention relates to magnetic nanostructures as theranostic agents, which provide dual function as diagnostic and therapeutic agents. In particular, the present invention relates to compositions comprising magnetic nanostructures and their use as targeted therapeutic agents for cancers (e.g., medulloblastoma) and Alzheimer's disease and related diseases and conditions. | 12-06-2012 |
20150335743 | MAGNETIC NANOSTRUCTURES AS THERANOSTIC AGENTS - The present invention relates to magnetic nanostructures as theranostic agents, which provide dual function as diagnostic and therapeutic agents. In particular, the present invention relates to compositions comprising magnetic nanostructures and their use as targeted therapeutic agents for cancers (e.g., medulloblastoma) and Alzheimer's disease and related diseases and conditions. | 11-26-2015 |
Saurabh Sirolia, Ujjain IN
Patent application number | Description | Published |
---|---|---|
20120078725 | METHOD AND SYSTEM FOR CONTEXTUAL ADVERTISEMENT RECOMMENDATION ACROSS MULTIPLE DEVICES OF CONTENT DELIVERY - The present invention includes a method and a system for recommending at least one advertisement to a user. The recommendation is provided based on the interaction with at least two devices. The user is identified when an interactive session is initiated by the user on a device of the at least two devices. Thereafter, a contextual profile of the identified user is selected from a database. The contextual profile is associated with one or more contextual sub-profiles. Further, each contextual sub-profile is associated with a corresponding device. Furthermore, one or more contextual attributes are dynamically captured from the interactive session. Thereafter, at least one of the contextual profile and the captured contextual attributes is mapped with a plurality of pre-stored advertisements. Subsequently, at least one advertisement is suggested on the device based on the mapping. | 03-29-2012 |
Saurabh Sodani, Lone Tree, CO US
Patent application number | Description | Published |
---|---|---|
20120158470 | SYSTEM FOR SUPPLY FORECASTING - A method of forecasting a supply using data from a plurality of data servers is described. The method includes receiving a request for a supply forecast and sending a query for supply data to a plurality of data servers. The method also includes receiving the supply data from one or more of the plurality of data servers in response to the query. A response level is determined based on the received supply data, and is compared to a threshold level. The method also includes computing the supply forecast based on the received supply data when the response level equals or exceeds the threshold level. | 06-21-2012 |
20120221591 | System for Processing Complex Queries - A method of processing a supply query is described. The method includes receiving a first supply query comprising a first set of attributes. A size of the first set of attributes is compared to a threshold value. A second supply query comprising a second set of attributes is generated when the comparison indicates that the size of the first set of attributes is greater than the threshold value. | 08-30-2012 |
20120239468 | HIGH-PERFORMANCE SUPPLY FORECASTING USING OVERRIDE RULES IN DISPLAY ADVERTISING SYSTEMS - A method, system and computer readable medium to adjust impression supply sampling weights in a display advertising environment while providing high-performance supply forecasting using trends adjustments and override rules. A forecasting system initiates the method upon submitting a campaign query (with a campaign query predicate to be matched with impression supply predicates) and a campaign query time period (specifying time-wise aspects of an advertising campaign). Upon receiving initial campaign query results (e.g. impression supply datastructure with base weights), the method proceeds to identify applicable weight adjustment rules for applying to the impression supply node, then, after accounting for trends or other time-wise aspects of the weight adjustment rule, applying the adjustment rule to the impression supply base weight of an impression supply node, resulting in at least one adjusted trend weight. Given adjusted trend weights, the forecasting system can more accurately predict future supply and pricing characteristics of the campaign. | 09-20-2012 |
Saurabh Sohoney, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130018884 | Systems and Methods for Providing a Content Item Database and Identifying Content ItemsAANM Chandrasekharappa; Santhosh BaramasagaraAACI BangaloreAACO INAAGP Chandrasekharappa; Santhosh Baramasagara Bangalore INAANM Ekambaram; SivakumarAACI BangaloreAACO INAAGP Ekambaram; Sivakumar Bangalore INAANM Sohoney; SaurabhAACI BangaloreAACO INAAGP Sohoney; Saurabh Bangalore INAANM Nigam; RakeshAACI ChennalAACO INAAGP Nigam; Rakesh Chennal IN - Systems and methods are provided for identifying unsolicited or unwanted electronic communications, such as spam. The disclosed embodiments also encompass systems and methods for selecting content items from a content item database. Consistent with certain embodiments, computer-implemented systems and methods may use a clustering based statistical content matching anti-spam algorithm to identify and filter spam. Such a anti-spam algorithm may be implemented to determine a degree of similarity between an incoming e-mail with a collection of one or more spam e-mails stored in a database. If the degree of similarity exceeds a predetermined threshold, the incoming e-mail may be classified as spam. Further, in accordance with other embodiments, systems and methods may be provided to determine a degree of similarity between a query or search string from a user and content items stored in a database. If the degree of similarity exceeds a predetermined threshold, the content item from the database may be identified as a content item that matches the query or search string provided by the user. | 01-17-2013 |
20150142809 | SYSTEMS AND METHODS FOR PROVIDING A CONTENT ITEM DATABASE AND IDENTIFYING CONTENT ITEMS - Systems and methods are provided for identifying unsolicited or unwanted electronic communications, such as spam. The disclosed embodiments also encompass systems and methods for selecting content items from a content item database. Consistent with certain embodiments, computer-implemented systems and methods may use a clustering based statistical content matching anti-spam algorithm to identify and filter spam. Such a anti-spam algorithm may be implemented to determine a degree of similarity between an incoming e-mail with a collection of one or more spam e-mails stored in a database. If the degree of similarity exceeds a predetermined threshold, the incoming e-mail may be classified as spam. Further, in accordance with other embodiments, systems and methods may be provided to determine a degree of similarity between a query or search string from a user and content items stored in a database. If the degree of similarity exceeds a predetermined threshold, the content item from the database may be identified as a content item that matches the query or search string provided by the user. | 05-21-2015 |
Saurabh Tara, Henderson, NV US
Patent application number | Description | Published |
---|---|---|
20120290311 | Method and Apparatus for Physician Location Tracking - A medical personal location tracking system provides efficient physician location reporting based on physician client device location. The medical communication system permits physicians to define location tracking control settings to control when and where the client device sends location data to a server and database. Subject to the location tracking control settings, the location tracking system provides location updates for the physicians so that requestors that wish to contact the physicians or know the location of one or more physicians can access the server to obtain location data. To obtain medical assistance to a medical emergency, an emergency alert may be generated and sent to physicians within a defined geographic area. Upon receipt by a physician, a physician may accept the emergency alert and travel to the medical emergency and be provided updates regarding the medical emergency. The person generating the emergency alert may track the location of accepting physicians. | 11-15-2012 |
20120290638 | PHYSICIAN REGIONAL ACCESS NETWORKING AGENT - A medical communication system provides efficient messaging and communications services with physicians. The medical communication system permits physicians to define contact preferences so that they may receive messages in an efficient way based on various criteria, such as urgency, type, and time of a message. The medical communication system provides status for each of its physicians so that requestors that wish to contact the physicians can immediately know if a physician is available and the best way to reach the physician at a particular time and for a particular circumstance. The medical communication system protects to the privacy of physician's personal contact information and provides tracking of communications for the purpose of patient records. In addition, the medical communication system may be configured to meet various regulatory requirements, including HIPAA regulations. | 11-15-2012 |
20140358574 | Method and Apparatus for Secure Messaging of Medical Information - A medical personal communication system provides efficient and secure communication between medical personal and other medical personal, and between medical personal and patients. In one method of operation a secure message system accepting a message having message text and associates a recipient identifier with the message to identify the message recipient and message. The system determines if the message recipient is a registered user and if so then the message text is sent to the registered user within the system. If the message recipient is not a registered user, then the system generates a code and a message notification, which is sent to the message recipient using the recipient identifier. Using the code, the message recipient can view access the secure message system, such as on the Internet or network, securely view the message. | 12-04-2014 |
Saurabh Tara, Las Vegas, NV US
Patent application number | Description | Published |
---|---|---|
20140316800 | Physician Regional Access Networking Agent - A medical communication system provides efficient messaging and communications services with physicians. The medical communication system permits physicians to define contact preferences so that they may receive messages in an efficient way based on various criteria, such as urgency, type, and time of a message. The medical communication system provides status for each of its physicians so that requestors that wish to contact the physicians can immediately know if a physician is available and the best way to reach the physician at a particular time and for a particular circumstance. The medical communication system protects the privacy of physician's personal contact information and provides tracking of communications for the purpose of patient records. In addition, the medical communication system may be configured to meet various regulatory requirements, including HIPAA regulations. | 10-23-2014 |
Saurabh Thapliyal, San Mateo, CA US
Patent application number | Description | Published |
---|---|---|
20090063251 | System And Method For Simultaneous Price Optimization And Asset Allocation To Maximize Manufacturing Profits - Systems and methods in accordance with various embodiments of the present invention provide for a system and method for simultaneous price optimization and asset allocation to maximize manufacturing profits. In one embodiment, a set of price points for the item and a set of expected demand values for each price point are determined. A supply-side constraint which models inventory, replenishment, and capacities associated with replenishment and a joining constraint, which requires that the set of expected demand values be equal to a planned supply of the item, are determined. A demand-side constraint is determined. Further, an objective function to maximize profits is determined, based on the set of price points, the set of expected demand values, and subject to the supply-side, joining, and demand-side constraints. Based on the objective function, an optimal price profile for the item is provided. | 03-05-2009 |
Saurabh Thukral, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130030962 | MANAGING CONSISTENT INTERFACES FOR AN ACCOUNTING DATA COLLECTION FOR LEGAL REPORTING BUSINESS OBJECTS ACROSS HETEROGENEOUS SYSTEMS - A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to an accounting data collection for legal reporting business object. | 01-31-2013 |
Saurabh Tiwary, Berkeley, CA US
Patent application number | Description | Published |
---|---|---|
20110153271 | METHODS AND SYSTEMS FOR HIGH SIGMA YIELD ESTIMATION - For an integrated circuit associated with a plurality of parameters whose values are described by a first probability distribution function, a method for estimating a failure probability includes selecting a first plurality of samples, performing a first test to determine an outcome for each of the first plurality of samples and identifying failed samples, and clustering the failed samples using a computer-implemented cluster forming method that, in some cases, returns multiple clusters. The method also includes forming a probability distribution function for each of the clusters, forming a composite probability distribution function that includes a weighted combination of the first probability distribution function and the probability distribution function for each of the clusters. The method further includes selecting a second plurality of samples using the composite probability distribution function and performing a second test to determine an outcome for each of the second plurality of samples. A failure probability can then be computed. | 06-23-2011 |
20110153272 | METHODS AND SYSTEMS FOR HIGH SIGMA YIELD ESTIMATION USING REDUCED DIMENSIONALITY - For an integrated circuit associated with a first plurality of parameters whose values are described by a first probability distribution function, a method for estimating a failure probability includes selecting a first plurality of samples, performing a first test to determine an outcome for each of the first plurality of samples and identifying failed samples. A second plurality of parameters is selected that has fewer parameters than the first plurality of parameters. The failed samples are clustered in the space of the second plurality of parameters using a computer-implemented cluster forming method that, in some cases, returns multiple clusters. The method also includes forming a probability distribution function for each of the clusters, forming a composite probability distribution function that includes a weighted combination of the first probability distribution function and the probability distribution function for each of the clusters. The method further includes selecting a second plurality of samples using the composite probability distribution function and performing a second test to determine an outcome for each of the second plurality of samples. A failure probability can then be computed. | 06-23-2011 |
Saurabh Ullal US
Patent application number | Description | Published |
---|---|---|
20120153971 | SYSTEM AND METHOD FOR TESTING AN ELECTROSTATIC CHUCK - The present invention provides a reliable, non-invasive, electrical test method for predicting satisfactory performance of electrostatic chucks (ESCs). In accordance with an aspect of the present invention, a parameter, e.g., impedance, of an ESC is measured over a frequency band to generate a parameter functions. This parameter function may be used to establish predetermined acceptable limits of the parameter within the frequency band. | 06-21-2012 |
Saurabh Vats, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20090141413 | INTEGRATED ELECTROSTATIC DISCHARGE (ESD) PROTECTION CIRCUITRY FOR SIGNAL ELECTRODE - An integrated electrostatic discharge (ESD) protection circuitry for a signal electrode. Coupled in shunt between the signal electrode and the positive and negative power supply electrodes are opposing sets of multiple diodes coupled in series. Each set includes a diode across which is applied a nominal reverse bias voltage These opposing reverse bias voltages are maintained at substantially constant predetermined nominal magnitudes in relation to the voltage at the signal electrode, thereby ensuring minimal leakage current via the signal electrode over the full dynamic range of the signal. | 06-04-2009 |
Saurabh Vilekar, Hamden, CT US
Patent application number | Description | Published |
---|---|---|
20130174485 | PROCESS AND APPARATUS FOR REFORMING A HIGH SULFUR-CONTAINING LIQUID FUEL - A reforming process and apparatus exhibiting improved catalyst longevity towards reforming a high sulfur-containing liquid fuel. The process involves contacting in a first reforming zone a first oxidant and a liquid fuel containing high molecular weight organosulfur compounds with a partial oxidation catalyst under CPDX reaction conditions to form a first reformate stream containing a mixture of unconverted and partially-converted hydrocarbons and one or more low molecular weight sulfur compounds; and then contacting in a second reforming zone the first reformate stream with steam and optionally a second oxidant in the presence of an autothermal reforming catalyst under ATR reaction conditions to form a second reformate stream containing carbon monoxide and hydrogen and one or more low molecular weight sulfur compounds. The low molecular weight sulfur compounds can be readily removed from the first and/or second reformate streams by gas phase adsorption methods. | 07-11-2013 |
Saurabh Vyawahare, Pasadena, CA US
Patent application number | Description | Published |
---|---|---|
20100309112 | COLOR DISPLAY MATERIALS AND RELATED METHODS AND DEVICES - Pixel devices, comprising ink particles differing in electrical charge, mass and/or shape contained within a fluidic structure, and related arrays methods and systems. | 12-09-2010 |
20140141211 | Method for self-assembly of arbitrary metal patterns on DNA scaffolds - The present invention relates to methods for self-assembly of arbitrarily-shaped metal nanostructures using specifically-designed patterns on nucleic acid scaffolds. The methods involve using the nucleic acid scaffolds as templates on which a second material patterned, as seed nuclei. The patterns are then selectively plated with metal using an electro-less plating process to create arbitrarily-shaped metal nanostructures that are not constrained by the structure of the scaffold. The methods herein use controlled-growth processes to actively select the dimensions, positions, and alignments of the patterns to create different arbitrary shapes of metal nanostructures. | 05-22-2014 |