Batra
Amandeep Batra, Chandigarh IN
Patent application number | Description | Published |
---|---|---|
20140240755 | Printer Event Subscription - A printing device is registered at a cloud server and a secure connection is established with the printing device. A subscription packet is sent to the printing device. The subscription packet specifics at least one event to be reported by the printing device. A notification that indicates an occurrence of the at least one event is received from the printing device. | 08-28-2014 |
Amit Batra, New Delhi IN
Patent application number | Description | Published |
---|---|---|
20140033321 | METHOD AND APPARATUS FOR SECURELY EXECUTING MULTIPLE ACTIONS USING LESS THAN A CORRESPONDING MULTIPLE OF PRIVILEGE ELEVATION PROMPTS - A method and apparatus for securely executing a plurality of actions requiring elevated privilege using less than a corresponding plurality of prompts for privilege elevation, and in some embodiments, only a single prompt for privilege elevation, comprising: receiving a request to perform a first action requiring an elevated privilege; acquiring the elevated privilege to perform the first action; executing the first action, wherein the first action is executed based on the elevated privilege; receiving a request to perform a second action requiring an elevated privilege; and executing the second action using the elevated privilege acquired for the first action. | 01-30-2014 |
Anil Batra, New Delhi IN
Patent application number | Description | Published |
---|---|---|
20160117693 | DIGITAL MATURITY ASSESSMENT FOR TRANSPORTATION PROVIDERS - An aspect of the present disclosure facilitates the assessment of the digital maturity of a transport provider. In one embodiment, data indicating availability of engagement capabilities on respective digital channels of the transport provider is received, and scores representing digital maturity of the transport provider are computed based on the availability. The engagement capabilities may be categorized according to functional areas qualifying an industry of the transport provider, and as such the scores may correspond to respective functional areas. Thus, the transport provider is enabled to compare the engagement capabilities of his/her organization with those of other providers or with pre-defined standards. | 04-28-2016 |
Ankit Batra, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20160132411 | STORAGE CLUSTER FAILURE DETECTION - Direct monitoring of a plurality of storage nodes in a primary cluster is performed based on connectivity with the storage nodes. Indirect monitoring of a first storage node is performed, in response to direct monitoring of the first storage node indicating failure of the connectivity with the first storage node, wherein a second storage node of the plurality of nodes is a backup node for the first storage node. The indirect monitor of the first storage node indicates failure of the first storage node in response to performance of storage access operations by the second storage node that were previously performed by the first storage node. A cluster-switch operation is initiated to switch to from the primary cluster to a backup cluster based on an occurrence of at least one cluster-failure condition that comprises the indirect monitor of the first storage node indicating failure of the first storage node. | 05-12-2016 |
Ashita Batra, Patiala IN
Patent application number | Description | Published |
---|---|---|
20150333568 | SUPPLY-SWITCHING SYSTEM - A system for providing a first voltage generated by a main supply and a second voltage generated by a battery to an integrated circuit (IC) includes supply-selection, control logic and switching circuits. The supply-selection circuit includes first, second, and third transistors. The switching circuit includes fourth and fifth transistors that supply the first and second voltages to the IC when switched on. The supply-selection circuit selects and provides the higher of the first and second voltages to body terminals of the fourth and fifth transistors for maintaining required body-bias voltage conditions. The control logic circuit generates a first control signal as long as the first voltage is within a predetermined range for keeping the fourth transistor switched on and a second control signal when the first voltage is not within the predetermined range for switching on the fifth transistor to supply the second voltage. | 11-19-2015 |
Kapil Batra, Westmead AU
Patent application number | Description | Published |
---|---|---|
20090161957 | CONSTELLATION DETECTION - Disclosed herein is a method for identifying a constellation of alignment marks within an arrangement of computer readable marks in an image ( | 06-25-2009 |
20150363110 | MEMORY CONFIGURATION FOR INTER-PROCESSOR COMMUNICATION IN AN MPSoC - A method determines a configuration for inter-processor communication for a heterogeneous multi-processor system. The method determines at least one subgraph of a graph representing communication between processors of the heterogeneous multi-processor system. For each subgraph the method (i) determines a plurality of subgraph design points. Each subgraph design point has a variation of channel mapping between any two of the processors in the subgraph by selecting from first-in-first-out (FIFO) memory and shared cache, and varying the shared cache and a local memory associated with at least one of the processors according to the channel mapping; and (ii) selects a memory solution for the subgraph, based on a cost associated with the selected memory solution. The method then determines a configuration for the graph of the heterogeneous multi-processor system, based on the selected memory solutions, to determine the configuration for inter-processor communication for the heterogeneous multi-processor system. | 12-17-2015 |
Mohit Batra, Derawal Nagar IN
Patent application number | Description | Published |
---|---|---|
20160028602 | SYSTEMS AND METHODS TO DETECT AND PROPAGATE UNI OPERATIONAL SPEED MISMATCH IN ETHERNET SERVICES - A method, a network element, and a network operating an Ethernet service include transmitting information related to an operational speed of a first connection to the second switch, wherein the first switch is connected to a first Customer Premises Equipment (CPE) device through the first connection and the second switch is connected to a second CPE device through a second connection; receiving information related to an operational speed of the second connection; and triggering a modification to the Ethernet service, responsive to a mismatch between the operational speed of the first connection and the operational speed of the second connection. | 01-28-2016 |
Mohit Batra, Delhi IN
Patent application number | Description | Published |
---|---|---|
20140071825 | LOAD BALANCING SYSTEMS AND METHODS OF MAC LEARNING IN MULTI-SLOT ARCHITECTURES - Line cards in a multi-slot network element utilize load balancing systems and methods for synchronizing learned Media Access Control (MAC) addresses therebetween. It is an objective of the load balancing systems and methods to enable high data rate scalability between line cards in a distributed system while preventing adverse effects on packet traffic. The load balancing systems and methods include inter alia MAC address updates between data path devices (e.g., network processors, application specific integrated circuits, etc.) using data frames and a hash-based time slot strategy ensuring MAC address updates are distributed over time as opposed to large scale, singular events. | 03-13-2014 |
Naveen Batra, Bahadurgarh IN
Patent application number | Description | Published |
---|---|---|
20110026309 | SELF-TIMED WRITE BOOST FOR SRAM CELL WITH SELF MODE CONTROL - A write boost circuit provides an automatic mode control for boost with different modalities with respect to the external supply voltage and also with respect to the extent of boost required at different process corners. The write boost circuit also takes care of the minimum boost provided to process corners with good writability where less boost is required. The boost is realized in terms of ground raising in the particular context and in general applicable to all other methods. | 02-03-2011 |
Naveen Batra, Haryana IN
Patent application number | Description | Published |
---|---|---|
20100115385 | DETECTING DATA-ACCESS-ELEMENT-SELECTION ERRORS DURING DATA ACCESS IN DATA-STORAGE ARRAYS - An embodiment of the present disclosure relates to detection of data access element selection errors during data access in data storage arrays. An embodiment of the disclosure describes a system including a data storage array comprising a first and a second error identifier. The error identifiers generate an error signal in case multiple data access elements are selected or no data access element is selected, respectively. A system for detection of data-access-element-selection errors further comprises a common error-signal generator which provides an output when an error signal is generated by either of said error identifiers. | 05-06-2010 |
Naveen Batra, Greater Noida IN
Patent application number | Description | Published |
---|---|---|
20110149662 | MEMORY DEVICE AND METHOD OF WRITING DATA TO A MEMORY DEVICE - A memory device includes bitlines, wordlines and a matrix of memory cells arranged in rows and columns. Each of the bitlines is electrically connected to memory cells in one of the columns. Each of the wordlines is electrically connected to memory cells in one of the rows. A bitline write voltage is applied to a first bitline. A wordline voltage is applied to a first wordline for writing data to a first memory cell connected to the first wordline and the first bitline. The first bitline and the second bitline are electrically connected for charge sharing between the first bitline and the second bitline. A predetermined time after electrically connecting the first bitline and the second bitline, the first and the second bitline are electrically disconnected and the bitline write voltage is applied to the second bitline. The wordline voltage is applied to a second wordline for writing data to a second memory cell connected to the second wordline and the second bitline. | 06-23-2011 |
20120224440 | MEMORY DEVICE AND METHOD OF WRITING DATA TO A MEMORY DEVICE - In a memory device, a bitline write voltage is applied to a first bitline. A wordline voltage is applied to a first wordline for writing data to a first memory cell connected to the first wordline and the first bitline. The first bitline and the second bitline are electrically connected for charge sharing between the first bitline and the second bitline. A predetermined time after electrically connecting the first bitline and the second bitline, the first and the second bitline are electrically disconnected and the bitline write voltage is applied to the second bitline. The wordline voltage is applied to a second wordline for writing data to a second memory cell connected to the second wordline and the second bitline. | 09-06-2012 |
20150098267 | Method and Circuit to Enable Wide Supply Voltage Difference in Multi-Supply Memory - A method and apparatus for operating a memory device with wider difference in array and periphery voltage is presented. The memory device includes a bit line, a complementary bit line, a memory cell, a first pre-charge circuit, and a second pre-charge circuit. The memory cell, the first pre-charge circuit, and the second pre-charge circuit are coupled between the bit line and the complementary bit line. The first pre-charge circuit is configured to pre-charge the bit line and the complementary bit line to a first voltage level. The second pre-charge circuit is configured to pre-charge the bit line and the complementary bit line to a second voltage level that is different than the first voltage level. In some examples, two precharge circuits are configured to operate such that memory access is ensured to be static noise margin safe even under wider difference between two voltage levels. | 04-09-2015 |
Saroj Batra, Chandigarh IN
Patent application number | Description | Published |
---|---|---|
20100104170 | FAKE DOCUMENT INCLUDING FAKE CURRENCY DETECTOR USING INTEGRATED TRANSMISSION AND REFLECTIVE SPECTRAL RESPONSE - A currency genuineness detection system using plurality of opto-electronic sensors with both transmission and reflective (including fluorescence) properties of security documents is developed. Both detection sensing strategies utilize integrated response of the wide optical band sensed under UV visible along with optional near infra red light illumination. A security document is examined under static condition. A window signal signature is thus possible from photodetectors responses for various kinds of documents of different denominations, kinds and country of origin. A programmable technique for checking the genuineness of a security document is possible by feeding a unique code of the currency under examination. | 04-29-2010 |
Vikas Batra, Karnai IN
Patent application number | Description | Published |
---|---|---|
20090324715 | HIGH DOSE ORAL PHARMACEUTICAL COMPOSITIONS OF ARTEMETHER AND LUMEFANTRINE - The present invention relates to high dose oral pharmaceutical compositions of artemether and lumefantrine, and process for preparation thereof. The compositions comprise of artemether and lumefantrine comprising artemether in an amount of from about 40 mg to about 80 mg, lumefantrine in an amount of from about 240 mg to about 480 mg. The compositions are useful for treatment of uncomplicated infections with | 12-31-2009 |
Vishal Batra, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110246702 | Management Of Configuration Data Using Persistent Memories Requiring Block-Wise Erase Before Rewriting - According to an aspect, the values corresponding to each group of parameters are stored in successive memory locations of a set of blocks, and pointer locations are maintained to point to the area where the groups of values are stored. When a new value is received for a parameter of a group, the values of parameters (with the new value substituted for the corresponding old value) of the group are replicated to a new set of locations in the same set of blocks if sufficient number of successive unwritten memory locations are available. A pointer data from the prior set of locations to the new set of locations is also maintained. According to another aspect, when there is insufficient space for the replication, all the present valid values of all groups are first written to a new set of blocks, and then only the earlier set of blocks are erased. | 10-06-2011 |
20130077779 | ENABLING WIRELESS CLIENTS FOR LOW-POWER OPERATION WHEN CLIENTS REQUIRE CONTROL MESSAGES FROM EXTERNAL SOURCES FOR COMMUNICATION - A wireless station (A) is operated in a power-save mode, in which the station is alternately in power-ON and power-OFF states to reduce power consumption. Wireless station (A) computes at least some future time instances at which another wireless station (B) is expected to start transmitting control messages. Wireless station (A) is ensured to be in the power-ON state in corresponding time intervals encompassing durations of at least some of such future transmissions of control messages by wireless station (B), and is thereby enabled to receive the control messages. In an embodiment, the control messages correspond to group key message updates in which values of a decryption key are transmitted, wireless station (A) being a wireless client, wireless station (B) being an access point, with wireless stations (A) and (B) operating in a wireless network consistent with IEEE 802.11 specifications, and communication between wireless stations (A) and (B) being encrypted. | 03-28-2013 |
20130286951 | FACILITATING COMMUNICATION BETWEEN RESOURCE-CONSTRAINED DEVICES AND WIRELESS COMMUNICATION TERMINALS - A link device facilitating communication between a wireless communication terminal and a resource-constrained device. According to an aspect, the link device receives messages from the wireless communication terminal on a wireless path according to a first protocol, converts the messages into a second protocol, and forwards the converted messages in the second protocols to the resource-constrained device on a wired path connecting the link device to the resource-constrained device. In an embodiment, the first protocol corresponds to HTTP protocol and the second protocol corresponds to a simpler protocol which requires relatively lesser processing and memory resources. | 10-31-2013 |
20130294303 | REDUCING POWER CONSUMPTION IN A DEVICE OPERATING AS AN ACCESS POINT OF A WIRELESS LOCAL AREA NETWORK - An access point communicates with a wireless station based on a point-to-point channel, to determine time instances of future communication to be received from the wireless station. In intervals between such future communications, the access point powers down at least some portions of a circuit contained within the access point for at least a partial duration between such future communications. In an embodiment, the powered-down portions include the receiver portions of the access point. The access point may be battery-powered, and the powering-down of the receiver portions enables reduction of power consumption in the access point. | 11-07-2013 |
20130294426 | PROVIDING CONNECTIVITY TO END DEVICES USING WIRELESS LOCAL AREA NETWORK TECHNOLOGIES - An end device operates as an access point to setup communication with a wireless station. Once the communication has been setup, the end device exchanges data packets with the wireless station while operating as an access point. The end device and the wireless station are included in a WLAN network according to IEEE 802.11 standards. Operation as an access point enables the end device to communicate with a large number of wireless stations. Such communication can be the basis for implementation of various management applications on wireless stations. In an embodiment, the end point includes a blood pressure sensor, and transmits (while operating as an access point) blood pressure measurements to a mobile phone operating as a wireless station. | 11-07-2013 |
20140169349 | EXTENDED CONNECTIVITY BASED ON WIRELESS PATHS BETWEEN STATIONS OF A WIRELESS LOCAL AREA NETWORK (WLAN) - A wireless station in a WLAN generates a first set of data elements for sending to a final destination. The wireless station forms a first Internet Protocol (IP) packet with a header portion and a payload portion. The header portion specifies an IP address of a neighbor access point (AP) as the next hop destination. The payload portion of the IP packet includes an IP address of the final destination to indicate that the data elements are to be delivered to the final destination. The wireless station transmits the IP packet to the neighbor AP according to the IP address of the neighbor AP. Extended connectivity based on wireless paths between stations of a wireless local area network (WLAN) is thus provided. | 06-19-2014 |
20140192691 | RELIABLE DELIVERY OF DATA SPECIFIED FOR TRANSMISSION BY MULTICASTING IN WIRELESS NETWORKS - An access point (AP) of a WLAN maintains a list of wireless clients in the WLAN that belong to a special class. The AP receives data to be transmitted to the wireless clients as a multicast packet, and examines the list to determine whether any wireless clients belong to the special class. If none of the wireless clients belongs to the special class, the AP transmits the data as a multicast packet. However, if one or more wireless clients belong to the special class, the AP transmits the data in the form of unicast packets to each wireless client of the special class in addition to transmitting the data as a multicast packet. | 07-10-2014 |
20140297714 | PROVIDING BINARY IMAGES CUSTOMIZED FOR DIFFERENT USERS IN MEMORY SPACE CONSTRAINED ENVIRONMENTS - A web-based system is provided for generating binary images customized for different users in memory space constrained environments. Inputs from a user identifying a set of features of interest in a software program, and a maximum size of memory space available for storing the software program are received. A required size of memory space for the software program, including the set of features is computed. If the required size is more than the maximum size, the user is notified that the set of features cannot be fit into the available memory space. Otherwise, a corresponding binary image implementing both of a core functionality of the software program and the set of features of interest is built. The user can retrieve the binary image from the server via the client system. | 10-02-2014 |
20140328334 | PROVISIONING A WIRELESS DEVICE FOR SECURE COMMUNICATION USING AN ACCESS POINT DESIGNED WITH PUSH-BUTTON MODE OF WPS (WI-FI PROTECTED SETUP) - A wireless device is provisioned according to WPS (WiFi Protected Setup) push button mode. The wireless device receives an electronic signal from a provisioning agent external to the wireless device, the electronic signal indicating to the wireless device that the wireless device is to start WPS provisioning procedures. A user presses a push button on an AP to which the wireless device is to be connected. On receipt of the electronic signal, the wireless device enrolls in a wireless network, of which the AP is a part, by communicating with the access point in accordance with push button mode of WPS. The technique enables a wireless device to be provisioned without a user requiring to press any button on the wireless device. | 11-06-2014 |
20140355579 | CONVENIENT USE OF PUSH BUTTON MODE OF WPS (WI-FI PROTECTED SETUP) FOR PROVISIONING WIRELESS DEVICES - An access point (AP) in accordance with an aspect of the present disclosure provides a convenient approach to provision wireless devices. In an embodiment, the AP initiates push button mode of WPS procedures with a wireless device, in response to receiving of a provisioning request from the wireless device, without requiring a WPS push button signal locally. The AP thereafter operates to complete provisioning of the wireless device. According to yet another aspect of the present disclosure, a wireless device may also participate in push button mode of WPS, without requiring a push button signal locally. In an embodiment, a wireless device automatically transmits a request for provisioning. An AP within the transmission range, responds back with a command to initiate push button mode of WPS procedures. The wireless device communicates with the AP to complete provisioning. | 12-04-2014 |
20160080889 | PROVISIONING OF MULTIPLE WIRELESS DEVICES BY AN ACCESS POINT - An aspect of the present disclosure enables an access point (AP) to conveniently provision multiple wireless devices. In an embodiment, the AP may normally operate in a secure mode to disregard non-secure provisioning requests from wireless devices. However, upon receipt of a request to accept provisioning requests from multiple wireless devices, the AP permits multiple wireless devices to be provisioned via the AP, in response to corresponding provisioning requests received from the respective wireless devices. The request to accept may be generated upon pressing of a push button provided on the AP, which may be referred to as a group provisioning button since multiple wireless devices are provisioned in response to pressing of that button. | 03-17-2016 |
20160095143 | REMOTE PROVISIONING OF WIRELESS STATIONS WITH CONFIRMATION - Aspects of the present disclosure are related to provisioning of wireless devices. In an embodiment, a wireless device (sought to be provisioned) receives values for provisioning parameters from an external user device, and attempts to join a wireless local network according to the received values for the provisioning parameters. The wireless device sends a response to the external user device indicating whether or not the joining was successful. The external user device may display the result indicating whether or not provisioning was successful. The wireless device may operate in a time division multiplexed manner as an access point (for securing the credentials) and as a station (once provisioning is complete). | 03-31-2016 |
20160112311 | ENHANCED CONNECTIVITY TO END DEVICES VIA ACCESS POINTS OF WIRELESS LOCAL AREA NETWORKS (WLAN) - A wireless node of a wireless network maintains link information for a set of layer-2 addresses, each of the layer-2 addresses corresponding to a medium access control (MAC) address of a corresponding device that transmits packets on the wireless network. The link information indicates whether the corresponding device is in an uplink direction or a downlink direction with respect to the wireless node. The wireless node receives a layer-2 packet in one of the uplink direction and downlink directions, the layer-2 packet containing a layer-2 address specifying a destination system, with no layer-2 address in the layer-2 packet indicating that the packet is destined to the wireless node. The wireless node forwards the layer-2 packet to a next wireless device in one of the uplink direction and downlink direction. | 04-21-2016 |
20160112951 | COMMUNICATION BETWEEN WIRELESS DEVICES CAPABLE OF COMMUNICATING USING MULTIPLE MAC PROTOCOLS - A first wireless device and a second wireless device are each capable of communicating using multiple MAC protocols. The first wireless device sets a first receiver to a power savings mode, the first receiver designed to operate according to a first MAC protocol. The first wireless device then receives, from the second wireless device, an indication on a second receiver corresponding to a second MAC protocol that data is available to be transmitted to the first wireless device from the second wireless device. In response to receipt of the indication, the first wireless sets the first receiver to an active mode, and receives the data from the second wireless device using the first receiver operating in accordance with the first MAC protocol. The second receiver consumes less power than the first receiver. Reduction of power consumption in the first wireless device may be achieved. | 04-21-2016 |
20160119868 | REDUCING POWER CONSUMPTION IN WIRELESS STATIONS WITH LIMITED MEMORY - A wireless station of a wireless network receives, using a receiver, data units from another wireless device in the wireless network. The wireless station stores the data units in a memory contained in the wireless station. The wireless station determines if a current storage level in the memory is greater than a first threshold, and if so, sets the receiver in power savings mode. The wireless station then consumes data units stored in the local memory until the current storage level is lower than a second threshold. The wireless station maintains the receiver in the power savings mode until the current storage level falls below the second threshold. The receiver is then placed in active mode so that the station can receive additional data units for storing in the memory. Power consumption in the wireless station is thereby reduced. | 04-28-2016 |
20160119869 | REDUCING POWER CONSUMPTION IN WIRELESS STATIONS PROVIDING NETWORK CONNECTIVITY FOR EMBEDDED DEVICES - A system contains a wireless station connected to an embedded device by a wired path, with the wireless station being part of a wireless network. According to an aspect of the present disclosure, the wireless station places a receiver (communicating on the wireless network) in power savings mode upon occurrence of a first condition, and restores the receiver to active mode upon occurrence of a second condition. Such transitions between active and power savings modes are employed while receiving data units from a wireless network and providing the data units to the embedded device. In one embodiment, the first and second conditions correspond to a higher threshold and lower threshold for available data in the memory of the wireless station used for buffering not-yet-transferred data units. In alternative embodiments, the conditions are determined based on corresponding express indications by the embedded device. | 04-28-2016 |
20160135125 | OPERATING A WIRELESS RECEIVER OF A WIRELESS STATION IN POWER-SAVINGS MODE - A wireless station of a wireless network receives data indicating inactive time durations during a day. The wireless station places a receiver, used to receive data from the wireless network, in power savings mode during the inactive time durations. The wireless station receives data when operating in an active mode. Power consumption in the wireless station is reduced. In an embodiment, the receiver is implemented according to IEEE 802.11 standards. | 05-12-2016 |
20160135127 | REDUCING POWER CONSUMPTION IN WIRELESS STATIONS EXECUTING VARIOUS CLIENT APPLICATIONS - A wireless station of a wireless network identifies required active durations based on outbound request packets. Each active duration is from around a first time instance at which a corresponding request packet is to be transmitted to a second time instance corresponding to receipt of the corresponding response packet. A receiver of the wireless station is placed in an active mode in the active durations. The wireless station transmits and receives packets in the active durations. The wireless station operates the receiver in power-down mode when the receiver is not required to be operated in the active mode. | 05-12-2016 |
Vishal S. Batra, New Delhi IN
Patent application number | Description | Published |
---|---|---|
20120191636 | Smarter Business Intelligence Systems - An embodiment of the invention provides a method and system for analyzing a plurality of reports. More specifically, a change detection module predicts results of future reports based on past reports and identifies a first report that deviates from its predicted results. A dependency analysis module connected to the change detection module at least one report sharing a dependency with the first report by performing a dependency analysis and/or a usage analysis. The dependency analysis labels the first report and at least one second report as sharing a dependency if the second report deviates from its predicted results. The usage analysis labeling the first report and at least one report analyzed by an analyst as sharing a dependency if the report analyzed by the analyst is analyzed in response to the identification of the first report. | 07-26-2012 |
20120290345 | Smarter Business Intelligence Systems - An embodiment of the invention provides a method and system for analyzing a plurality of reports. More specifically, a change detection module predicts results of future reports based on past reports and identifies a first report that deviates from its predicted results. A dependency analysis module connected to the change detection module at least one report sharing a dependency with the first report by performing a dependency analysis and/or a usage analysis. The dependency analysis labels the first report and at least one second report as sharing a dependency if the second report deviates from its predicted results. The usage analysis labeling the first report and at least one report analyzed by an analyst as sharing a dependency if the report analyzed by the analyst is analyzed in response to the identification of the first report. | 11-15-2012 |
20150073902 | Financial Transaction Analytics - Methods, systems, and articles of manufacture for financial transaction analytics are provided herein. A method includes generating a profile of a customer, the customer profile comprising multiple commercial-related parameters pertaining to the customer based at least on past transaction information of the customer; determining the identity of a merchant from a message pertaining to a transaction of the customer; determining location information of the customer from the message pertaining to the customer transaction; and generating at least one commercial offer personalized for the customer based on (i) the customer profile, (ii) the merchant identified from the message, and (iii) the customer location determined from the message. | 03-12-2015 |
Vishal S. Batra, Noida IN
Patent application number | Description | Published |
---|---|---|
20130297412 | DELIVERING PERSONALIZED RECOMMENDATIONS THAT RELATE TO TRANSACTIONS ON DISPLAY - Provided are techniques for providing personalized recommendations. One or more transactions are received from one or more customer interaction channels. The received one or more transactions are stored in an incremental data store. One or more predictive rules are generated based on the received one or more transactions and based on one or more transactions previously stored in the incremental data store. In real-time, one or more personalized recommendations specific to a user and to the received one or more transactions are generated using the one or more generated predictive rules. | 11-07-2013 |
20140278741 | CUSTOMER COMMUNITY ANALYTICS - A method, system and software for using customer community analytics for: (i) discovering relationships (for example, financial transactional relationships) between customers and other entities (such as companies); (ii) representing the customers, other entities and their relationships in the form of a machine readable graph; and (iii) using the graph to perform graph-based functions. These functions may include: up-selling, cross-selling, making personalized recommendations, discovering a financial products supply chain and/or facilitating social interactions between and among customers and other entities. | 09-18-2014 |
Vishal Singh Batra, Noida IN
Patent application number | Description | Published |
---|---|---|
20120239515 | SYSTEMS AND METHODS FOR DYNAMIC PRODUCT AND SERVICE BUNDLING - Systems and methods for dynamic product bundling are described herein. For example, embodiments dynamically generate product bundle for customer within a particular segment in view of that customer's interest in a particular product. Embodiments determine customer affinity, customer commonality, and product complementarity and use this information to dynamically generate and optimize product bundles for customers interested in one or more products. | 09-20-2012 |
20120323727 | DYNAMIC PRODUCT AND SERVICE BUNDLING - Systems and methods for dynamic product bundling are described herein. For example, embodiments dynamically generate product bundle for customer within a particular segment in view of that customer's interest in a particular product. Embodiments determine customer affinity, customer commonality, and product complementarity and use this information to dynamically generate and optimize product bundles for customers interested in one or more products. | 12-20-2012 |
Vishal Singh Batra, New Delhi IN
Patent application number | Description | Published |
---|---|---|
20130290170 | ESTABLISHING PERSONALIZED MOBILE MONEY TRANSFER LIMITS - Methods and arrangements for establishing financial transfer limits. A customer reputation score for mobile money transfer is determined. A mobile money transfer limit is established based on the customer reputation score, and the customer reputation score is updated in response to predetermined parameters. | 10-31-2013 |